First Page | Document Content | |
---|---|---|
![]() Date: 2011-07-24 15:42:53Archival science Art history Data collection Provenance Reachability Knowledge discovery Graph Science Information science Data mining Mathematics Knowledge representation | Add to Reading List |
![]() | Information Diffusion and Provenance of Interactions in Twitter: Is it only about Retweets? Io Taxidou* Peter M. Fischer* Tom De Nies‡DocID: 1xVN1 - View Document |
![]() | Stabilizing Floating-Point Programs Using Provenance Analysis Yijia Gu(B) and Thomas Wahl College of Computer and Information Science, Boston, USA {guyijia,wahl}@ccs.neu.eduDocID: 1xTsE - View Document |
![]() | Privacy-Preserving Network Provenance Yuankai Zhang Adam O’Neill Georgetown UniversityDocID: 1vr8Y - View Document |
![]() | Knowing Where Your Input is From: Kernel-Level Data-Provenance Verification ? Deian Stefan1 , Chehai Wu2 , Danfeng (Daphne) Yao3 , and Gang Xu4DocID: 1vkvT - View Document |
![]() | Using Trust and Provenance for Content Filtering on the Semantic Web Jennifer Golbeck Aaron MannesDocID: 1vc6k - View Document |