Author of the publication

Kepler/pPOD: Scientific Workflow and Provenance Support for Assembling the Tree of Life.

, , , , and . IPAW, volume 5272 of Lecture Notes in Computer Science, page 70-77. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Workflow Fault Tolerance through Provenance-Based Recovery., , , , and . SSDBM, volume 6809 of Lecture Notes in Computer Science, page 207-224. Springer, (2011)Towards Constraint-based Explanations for Answers and Non-Answers., , , and . TaPP, USENIX Association, (2015)Towards Constraint Provenance Games., , and . TAPP, USENIX Association, (2014)Provenance Analyzer: Exploring Provenance Semantics with Logic Rules., , and . TaPP, USENIX Association, (2013)Insider Attack Identification and Prevention Using a Declarative Approach., , , , and . IEEE Symposium on Security and Privacy Workshops, page 265-276. IEEE Computer Society, (2014)Kepler/pPOD: Scientific Workflow and Provenance Support for Assembling the Tree of Life., , , , and . IPAW, volume 5272 of Lecture Notes in Computer Science, page 70-77. Springer, (2008)WATERS: a Workflow for the Alignment, Taxonomy, and Ecology of Ribosomal Sequences., , , , and . BMC Bioinformatics, (2010)Improving Workflow Fault Tolerance through Provenance-based Recovery, , , , and . (2011)An Analysis of the Hart Intercivic DAU eSlate., , , , , , and . EVT, USENIX Association, (2007)Scientific workflow design 2.0: Demonstrating streaming data collections in Kepler., , , , , , and . ICDE, page 1296-1299. IEEE Computer Society, (2011)