Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A declarative approach to customize workflow provenance., and . EDBT/ICDT Workshops, page 9-16. ACM, (2013)Computing Location-Based Lineage from Workflow Specifications to Optimize Provenance Queries., , , and . IPAW, volume 8628 of Lecture Notes in Computer Science, page 180-193. Springer, (2014)Scientific Workflows and Provenance: Introduction and Research Opportunities., , , , and . Datenbank-Spektrum, 12 (3): 193-203 (2012)UP & DOWN: Improving Provenance Precision by Combining Workflow- and Trace-Level Information., , , , , and . TAPP, USENIX Association, (2014)Linking Prospective and Retrospective Provenance in Scripts., , , , and . TaPP, USENIX Association, (2015)Scientific Workflows and Provenance: Introduction and Research Opportunities., , , , and . CoRR, (2013)Provenance Storage, Querying, and Visualization in PBase., , , , , , , and . IPAW, volume 8628 of Lecture Notes in Computer Science, page 239-241. Springer, (2014)Reconciling Provenance Policy Conflicts by Inventing Anonymous Nodes., , and . ESWC Workshops, volume 7117 of Lecture Notes in Computer Science, page 172-185. Springer, (2011)D-PROV: Extending the PROV Provenance Model with Workflow Structure., , , , and . TaPP, USENIX Association, (2013)Golden Trail: Retrieving the Data History that Matters from a Comprehensive Provenance Repository., , , , , , , and . IJDC, 7 (1): 139-150 (2012)