2009 Congress on Services - I 2009
DOI: 10.1109/services-i.2009.18
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Taxonomy of Provenance in Scientific Workflow Management Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0
15

Year Published

2011
2011
2024
2024

Publication Types

Select...
6
3
1

Relationship

2
8

Authors

Journals

citations
Cited by 72 publications
(46 citation statements)
references
References 27 publications
0
21
0
15
Order By: Relevance
“…The techniques have been developed having in mind compute-intensive applications disregarding important information sources such the size or the structure of data, to say nothing of data provenance [4] (i.e. the origin and transformations suffered by the data during the execution of an application).…”
Section: Related Workmentioning
confidence: 99%
“…The techniques have been developed having in mind compute-intensive applications disregarding important information sources such the size or the structure of data, to say nothing of data provenance [4] (i.e. the origin and transformations suffered by the data during the execution of an application).…”
Section: Related Workmentioning
confidence: 99%
“…In this study, we use provenance annotations about field observations, to improve the efficiency and accuracy of patterns recognition algorithms, previously developed by our research group [5,6]. The pattern recognition algorithm performs the following steps: first, it reduces the definition of the colored images about 70 % in order to speed the performance of further procedures; second, the reduced colored image is converted to black and white images; third, the reduced color images are used to generate novel images, containing only red, green and black pixels.…”
Section: Foliage Disease Pattern Recognitionmentioning
confidence: 99%
“…Like so, surveyed techniques have been developed having in mind compute-intensive applications disregarding important information sources such the size or the structure of data, to say nothing of data provenance [4] (i.e. the origin and transformations suffered by the data during the execution of an application).…”
Section: Related Workmentioning
confidence: 99%