Author of the publication

Capturing Provenance in the Wild.

, , , and . IPAW, volume 6378 of Lecture Notes in Computer Science, page 98-101. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fit for Purpose: Toward an Engineering Basis for Data Exchange Standards., , , and . IWEI, volume 144 of Lecture Notes in Business Information Processing, page 91-103. Springer, (2013)Surrogate Parenthood: Protected and Informative Graphs, , , , and . CoRR, (2011)The Role of Schema Matching in Large Enterprises, , , , , , , and . CoRR, (2009)The Role of Schema Matching in Large Enterprises., , , , , , and . CIDR, www.cidrdb.org, (2009)Specifying Data Sharing Agreements., , and . POLICY, page 157-162. IEEE Computer Society, (2006)The Challenge of "Quick and Dirty" Information Quality., , and . ACM J. Data Inf. Qual., 7 (1-2): 1:1-1:4 (2016)Scalable Access Controls for Lineage., , , and . Workshop on the Theory and Practice of Provenance, USENIX, (2009)Galaxy: Encouraging Data Sharing among Sources with Schema Variants., , , , , , and . ICDE, page 1551-1554. IEEE Computer Society, (2009)OpenII: an open source information integration toolkit., , , , , , , , , and . SIGMOD Conference, page 1057-1060. ACM, (2010)Getting It Together: Enabling Multi-organization Provenance Exchange., , , and . TaPP, USENIX Association, (2011)