Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Workflow Fault Tolerance through Provenance-Based Recovery., , , , and . SSDBM, volume 6809 of Lecture Notes in Computer Science, page 207-224. Springer, (2011)Towards Constraint-based Explanations for Answers and Non-Answers., , , and . TaPP, USENIX Association, (2015)Towards Constraint Provenance Games., , and . TAPP, USENIX Association, (2014)Provenance Analyzer: Exploring Provenance Semantics with Logic Rules., , and . TaPP, USENIX Association, (2013)Scientific Workflows and Provenance: Introduction and Research Opportunities., , , , and . CoRR, (2013)Kepler/pPOD: Scientific Workflow and Provenance Support for Assembling the Tree of Life., , , , and . IPAW, volume 5272 of Lecture Notes in Computer Science, page 70-77. Springer, (2008)Insider Attack Identification and Prevention Using a Declarative Approach., , , , and . IEEE Symposium on Security and Privacy Workshops, page 265-276. IEEE Computer Society, (2014)Improving Workflow Fault Tolerance through Provenance-based Recovery, , , , and . (2011)Scientific Workflows and Provenance: Introduction and Research Opportunities., , , , and . Datenbank-Spektrum, 12 (3): 193-203 (2012)WATERS: a Workflow for the Alignment, Taxonomy, and Ecology of Ribosomal Sequences., , , , and . BMC Bioinform., (2010)