Author of the publication

Provenance for collaboration: Detecting suspicious behaviors and assessing trust in information.

, , , and . CollaborateCom, page 342-351. ICST / IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provenance and the Price of Identity., and . IPAW, volume 5272 of Lecture Notes in Computer Science, page 106-119. Springer, (2008)Capturing Provenance in the Wild., , , and . IPAW, volume 6378 of Lecture Notes in Computer Science, page 98-101. Springer, (2010)ESPRESSO: A Framework for Empowering Search on Decentralized Web., , , , , , and . WISE, volume 14306 of Lecture Notes in Computer Science, page 360-375. Springer, (2023)Capturing and querying fine-grained provenance of preprocessing pipelines in data science., , , and . Proc. VLDB Endow., 14 (4): 507-520 (2020)prFood: Ontology Principles for Provenance and Risk in the Food Domain., , , and . ICSC, page 17-24. IEEE Computer Society, (2018)The Secret Life of Immortal Data., , , , , , and . WebSci (Companion), page 89-90. ACM, (2020)A Demonstration of Decentralized Search Over Solid Personal Online Datastores., , , , , , , and . WWW (Companion Volume), page 1055-1058. ACM, (2024)DLProv: A Data-Centric Support for Deep Learning Workflow Analyses., , , , and . DEEM@SIGMOD, page 77-85. ACM, (2024)Using the Provenance from Astronomical Workflows to Increase Processing Efficiency., , , , and . IPAW, volume 11017 of Lecture Notes in Computer Science, page 101-112. Springer, (2018)Enabling Personal Consent in Databases., , and . Proc. VLDB Endow., 15 (2): 375-387 (2021)