Author of the publication

Applying Provenance to Protect Attribution in Distributed Computational Scientific Experiments.

, and . IPAW, volume 8628 of Lecture Notes in Computer Science, page 139-151. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying reinforcement learning to scheduling strategies in an actual grid environment., , and . Int. J. High Perform. Syst. Archit., 2 (2): 116-128 (2009)Using Domain-Specific Data to Enhance Scientific Workflow Steering Queries., , , , and . IPAW, volume 7525 of Lecture Notes in Computer Science, page 152-167. Springer, (2012)Towards a Threat Model for Provenance in e-Science., , , and . IPAW, volume 6378 of Lecture Notes in Computer Science, page 277-279. Springer, (2010)Deep Learning Provenance Data Integration: a Practical Approach., , , and . WWW (Companion Volume), page 1542-1550. ACM, (2023)Avaliação de Estratégias para o Processamento de Expressões de Caminho., and . SBBD, page 136-150. UFRGS, (2002)Planning spatial workflows to optimize grid performance., , , , and . SAC, page 786-790. ACM, (2006)Exploratory Analysis of Raw Data Files through Dataflows., , and . SBAC-PAD (Workshops), page 114-119. IEEE Computer Society, (2014)Experiencing DfAnalyzer for Runtime Analysis of Phylogenomic Dataflows., , , and . BSB, volume 12558 of Lecture Notes in Computer Science, page 105-116. Springer, (2020)Towards a Human-in-the-Loop Library for Tracking Hyperparameter Tuning in Deep Learning Development., , , , , , and . LADaS@VLDB, volume 2170 of CEUR Workshop Proceedings, page 84-87. CEUR-WS.org, (2018)Processamento de Alto Desempenho em Consultas sobre Bases de Dados Geoestatísticas Usando Replicação Parcial., , and . SBBD, page 241-255. SBC, (2009)