The Provenance Hierarchy of Computer Programs
نویسندگان
چکیده
xiii
منابع مشابه
Selective Provenance for Datalog Programs Using Top-K Queries
Highly expressive declarative languages, such as datalog, are now commonly used to model the operational logic of dataintensive applications. The typical complexity of such datalog programs, and the large volume of data that they process, call for result explanation. Results may be explained through the tracking and presentation of data provenance, and here we focus on a detailed form of proven...
متن کاملDecoupling Provenance Capture and Analysis from Execution
Capturing provenance usually involves the direct observation and instrumentation of the execution of a program or workflow. However, this approach restricts provenance analysis to pre-determined programs and methods. This may not pose a problem when one is interested in the provenance of a well-defined workflow, but may limit the analysis of unstructured processes such as interactive desktop co...
متن کاملFramework for Prioritizing Solutions in Overcoming Data Quality Problems Using Analytic Hierarchy Process (AHP)
The Central Statistics Agency (BPS) is a government institution that has the authority to carry out statistical activities in the form of censuses and surveys, to produce statistical data needed by the government, the private sector and the general public, as a reference in planning, monitoring, and evaluation of development results. Therefore, providing quality statistical data is very decisiv...
متن کاملInspector: A Data Provenance Library for Multithreaded Programs
Data provenance strives for explaining how the computation was performed by recording a trace of the execution. The provenance trace is useful across a widerange of workflows to improve the dependability, security, and efficiency of software systems. In this paper, we present INSPECTOR, a POSIX-compliant data provenance library for shared-memory multithreaded programs. The INSPECTOR library is ...
متن کاملData Provenance in Distributed Propagator Networks
Existing distributed programs often require provenance to be included in the design of the distributed computing framework. Distributed programs making use of data propagation do not have this restriction; propagator networks allow non-provenance-aware applications to be easily transformed into provenance-aware forms by simply modifying existing program structure.
متن کامل