Provenance Analyzer: Exploring Provenance Semantics with Logic Rules
نویسندگان
چکیده
What exactly can we say about the dependency between artifact A and process P? Can we say that A was in fact generated by P, or was A generated by another process Q which used an artifact B that was generated by P? In fact, we cannot be sure. In particular, the given provenance information is insufficient to describe unambiguously in which order some basic OPM events (i.e., start of P, creation of A, end of P) occurred. The authors of [4] introduced precise edges (in addition to the default imprecise edges) to help narrow such ambiguities, provided a formal temporal OPM semantics via partial orders, and gave an efficient deductive procedure to compute all constraints implied by the axioms. Precise edges are labeled with a role, and represent a direct rather than transitive relationship, whereas an imprecise edge can represent a direct or a transitive relationship.
منابع مشابه
Is provenance logical? [Invited Keynote]
Research on provenance in databases (or other settings) sometimes has an arbitrary flavor. Once we abandon the classical semantics of queries there is a large design space for alternative semantics that could provide some useful provenance information, but there is little guidance for how to explore this space or justify or compare different proposals. Topics from mathematical or philosophical ...
متن کاملWePIGE: The WebLab Provenance Information Generator and Explorer
WePIGE illustrates a new approach for extracting fine-grained provenance information from XML artefact-based workflow executions. The extraction framework relies on the usage of XPath mapping rules for inferring data and service dependency links [2]. This demonstration illustrates the usage of the WePIGE graphical user interface for exploring the provenance graph generated by a predefined set o...
متن کاملData Provenance Inference in Logic Programming: Reducing Effort of Instance-driven Debugging
Data provenance allows scientists in different domains validating their models and algorithms to find out anomalies and unexpected behaviors. In previous works, we described on-the-fly interpretation of (Python) scripts to build workflow provenance graph automatically and then infer finegrained provenance information based on the workflow provenance graph and the availability of data. To broade...
متن کاملProvenance and Temporally Annotated Logic Programming
In this paper, we consider provenance and temporally annotated logic rules (pt-logic rules, for short), which are definite logic programming rules associated with the name of the source that they originate and the temporal interval during which they are valid. A collection of pt-logic rules form a provenance and temporally annotated logic program P, called pt-logic program, for short. We develo...
متن کاملTowards Constraint Provenance Games
Provenance for positive queries is well understood and elegantly handled by provenance semirings [GKT07], which subsume many earlier approaches. However, the semiring approach does not extend easily to why-not provenance or, more generally, first-order queries with negation. An alternative approach is to view query evaluation as a game between two players who argue whether, for given database I...
متن کامل