Automated and non-intrusive provenance capture with UML2PROV

نویسندگان

چکیده

Abstract Data provenance is a form of knowledge graph providing an account what system performs, describing the data involved, and processes carried out over them. It crucial to ascertaining origin data, validating their quality, auditing applications behaviours, and, ultimately, making them accountable. However, instrumenting applications, especially legacy ones, track operations remains significant technical hurdle, hindering adoption technology. UML2PROV software-engineering methodology that facilitates instrumentation recording in designed with UML diagrams. automates generation (1) templates for be recorded (2) code capture values required instantiate those from application at run time, both application’s By so doing, frees developers manual capturing while ensuring quality provenance. In this paper, we present detail UML2PROV’s approach generating via means Bindings Generation Module (BGM). particular, propose set requirements BGM implementations describe event-based design relies on Aspect-Oriented Programming (AOP) paradigm automatically weave generated into application. Finally, three different following above analyze pros cons terms computing/storage overheads implications consumers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusive and non-intrusive watermarking

“Can we watermark without perturbing an image?” We present the salient results of the investigation carried out to find an answer to this question.

متن کامل

Model Based Approach to Non-Intrusive Human Motion Capture

Modelling and Animation of human movement with the use of motion capture is a valuable process for creating true ‘life-like’ motion for areas such as sports science, entertainment, and the medical industry. Traditional methods involved using intrusive techniques for the purpose of capturing the location and subsequent movements of joints and limbs. This paper describes the work being carried ou...

متن کامل

Integrating Approximate Summarization with Provenance Capture

How to use provenance to explain why a query returns a result or why a result is missing has been studied extensively. Recently, we have demonstrated how to uniformly answer these types of provenance questions for first-order queries with negation and have presented an implementation of this approach in our PUG (Provenance Unification through Graphs) system. However, for realisticallysized data...

متن کامل

Provenance Capture of Unmanaged Workflows with Karma

Article history: Received Received in revised form Accepted Available online

متن کامل

Towards Automated Non-Intrusive Load Monitoring Performance Evaluation

In the past couple of years Non-Intrusive Load Monitoring has been gaining special attention from the research community playing an important role in the solution of problems related to energy sustainability and smart-grids. However despite its notoriety, until recently no efforts were made towards having formal methods for evaluating its performance. In this paper we present our hardware-softw...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computing

سال: 2021

ISSN: ['0010-485X', '1436-5057']

DOI: https://doi.org/10.1007/s00607-021-01012-x