First Page | Document Content | |
---|---|---|
![]() Date: 2014-07-25 00:10:49Java specification requests Database management systems Cross-platform software Java platform Data collection Provenance Cytoscape Database Java Database Connectivity Computing Software Data management | Source URL: d2i.indiana.eduDownload Document from Source WebsiteFile Size: 395,87 KBShare Document on Facebook |
![]() | Information Diffusion and Provenance of Interactions in Twitter: Is it only about Retweets? Io Taxidou* Peter M. Fischer* Tom De Nies‡DocID: 1xVN1 - View Document |
![]() | Stabilizing Floating-Point Programs Using Provenance Analysis Yijia Gu(B) and Thomas Wahl College of Computer and Information Science, Boston, USA {guyijia,wahl}@ccs.neu.eduDocID: 1xTsE - View Document |
![]() | Privacy-Preserving Network Provenance Yuankai Zhang Adam O’Neill Georgetown UniversityDocID: 1vr8Y - View Document |
![]() | Knowing Where Your Input is From: Kernel-Level Data-Provenance Verification ? Deian Stefan1 , Chehai Wu2 , Danfeng (Daphne) Yao3 , and Gang Xu4DocID: 1vkvT - View Document |
![]() | Using Trust and Provenance for Content Filtering on the Semantic Web Jennifer Golbeck Aaron MannesDocID: 1vc6k - View Document |