Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-Tier Provenance Model for Global Climate Research., , , , and . NBiS, page 481-486. IEEE Computer Society, (2009)Special Issue: The First Provenance Challenge, , , , , , , , , and 40 other author(s). Concurrency and Computation: Practice & Experience, Special Issue on The First Provenance Challenge, 20 (5): 409-418 (April 2008)CORE A.Application of Named Graphs Towards Custom Provenance Views., , and . Workshop on the Theory and Practice of Provenance, USENIX, (2009)Application of Provenance for Automated and Research Driven Workflows., , and . IPAW, volume 5272 of Lecture Notes in Computer Science, page 128-135. Springer, (2008)An Extensible, Scalable Architecture for Managing Bioinformatics Data and Analyses., , , , , and . eScience, page 190-197. IEEE Computer Society, (2008)Large-scale exploratory analysis, cleaning, and modeling for event detection in real-world power systems data., , , and . HiPCNA-PG@SC, page 4:1-4:9. ACM, (2013)