From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards Constraint-based Explanations for Answers and Non-Answers., , , и . TaPP, USENIX Association, (2015)Improving Workflow Fault Tolerance through Provenance-Based Recovery., , , , и . SSDBM, том 6809 из Lecture Notes in Computer Science, стр. 207-224. Springer, (2011)Towards Constraint Provenance Games., , и . TAPP, USENIX Association, (2014)Provenance Analyzer: Exploring Provenance Semantics with Logic Rules., , и . TaPP, USENIX Association, (2013)Insider Attack Identification and Prevention Using a Declarative Approach., , , , и . IEEE Symposium on Security and Privacy Workshops, стр. 265-276. IEEE Computer Society, (2014)Kepler/pPOD: Scientific Workflow and Provenance Support for Assembling the Tree of Life., , , , и . IPAW, том 5272 из Lecture Notes in Computer Science, стр. 70-77. Springer, (2008)An Analysis of the Hart Intercivic DAU eSlate., , , , , , и . EVT, USENIX Association, (2007)Scientific workflow design 2.0: Demonstrating streaming data collections in Kepler., , , , , , и . ICDE, стр. 1296-1299. IEEE Computer Society, (2011)WATERS: a Workflow for the Alignment, Taxonomy, and Ecology of Ribosomal Sequences., , , , и . BMC Bioinformatics, (2010)Improving Workflow Fault Tolerance through Provenance-based Recovery, , , , и . (2011)