In Search of Elegance in the Theory and Practice of Computation

We present two models for data-centric workflows: the first based on business artifacts and the second on Active XML. We then compare the two models and argue that Active XML is strictly more expressive, based on a natural semantics and choice of observables. Finally, we mention several verification results for the two models.

[1]  Luc Moreau,et al.  Provenance-based reproducibility in the Semantic Web , 2011, J. Web Semant..

[2]  Margo I. Seltzer,et al.  Provenance: a future history , 2009, OOPSLA Companion.

[3]  James Cheney,et al.  Edinburgh Research Explorer A Practical Theory of Language-integrated Query , 2022 .

[4]  Paul Blain Levy,et al.  Call-By-Push-Value: A Functional/Imperative Synthesis , 2003, Semantics Structures in Computation.

[5]  Greg Miller,et al.  A Scientist's Nightmare: Software Problem Leads to Five Retractions , 2006, Science.

[6]  Andrew C. Myers,et al.  Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..

[7]  Gordon D. Plotkin,et al.  A structural approach to operational semantics , 2004, J. Log. Algebraic Methods Program..

[8]  Glynn Winskel,et al.  The formal semantics of programming languages - an introduction , 1993, Foundation of computing series.

[9]  Martín Abadi,et al.  A core calculus of dependency , 1999, POPL '99.

[10]  Leslie Lamport State the problem before describing the solution , 1978, SOEN.

[11]  Benjamin C. Pierce,et al.  Combinators for bi-directional tree transformations: a linguistic approach to the view update problem , 2005, POPL '05.

[12]  Analysis and caching of dependencies , 1996, ICFP '96.

[13]  Paul T. Groth,et al.  Requirements for Provenance on the Web , 2012, Int. J. Digit. Curation.

[14]  Paul T. Groth,et al.  Provenance-based validation of e-science experiments , 2005, J. Web Semant..

[15]  Dan Suciu,et al.  Comprehension syntax , 1994, SGMD.

[16]  Yogesh L. Simmhan,et al.  The Open Provenance Model core specification (v1.1) , 2011, Future Gener. Comput. Syst..

[17]  James Cheney,et al.  A Formal Framework for Provenance Security , 2011, 2011 IEEE 24th Computer Security Foundations Symposium.

[18]  Ohad Kammar,et al.  Handlers in action , 2013, ICFP.

[19]  Stuart E. Madnick,et al.  A Polygen Model for Heterogeneous Database Systems: The Source Tagging Perspective , 1990, VLDB.

[20]  Donald I. Good The Foundations of Computer Security: We Need Some , 1986 .

[21]  Clifford A. Lynch,et al.  When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web , 2001, J. Assoc. Inf. Sci. Technol..

[22]  Stephen Chong Towards Semantics for Provenance Security , 2009, Workshop on the Theory and Practice of Provenance.

[23]  Deborah L. McGuinness,et al.  Explaining answers from the Semantic Web: the Inference Web approach , 2004, J. Web Semant..

[24]  James Cheney,et al.  Program Slicing and Data Provenance , 2007, IEEE Data Eng. Bull..

[25]  Guy E. Blelloch,et al.  An experimental analysis of self-adjusting computation , 2009 .

[26]  Michael Stonebraker,et al.  Supporting fine-grained data lineage in a database visualization environment , 1997, Proceedings 13th International Conference on Data Engineering.

[27]  James Cheney,et al.  A Graph Model of Data and Workflow Provenance , 2010, TaPP.

[28]  James Cheney,et al.  Provenance in Databases: Why, How, and Where , 2009, Found. Trends Databases.

[29]  V. Vianu,et al.  Edinburgh Why and Where: A Characterization of Data Provenance , 2017 .

[30]  Yong Zhao,et al.  Chimera: a virtual data system for representing, querying, and automating data derivation , 2002, Proceedings 14th International Conference on Scientific and Statistical Database Management.

[31]  Val Tannen,et al.  Annotated XML: queries and provenance , 2008, PODS.

[32]  Paul T. Groth,et al.  Principles of High Quality Documentation for Provenance: A Philosophical Discussion , 2006, IPAW.

[33]  James Cheney,et al.  Functional programs that explain their work , 2012, ICFP.

[34]  James Cheney,et al.  Causality and the Semantics of Provenance , 2010, DCM.

[35]  James Cheney,et al.  A Core Calculus for Provenance , 2012, POST.

[36]  James Cheney,et al.  Provenance as dependency analysis† , 2007, Mathematical Structures in Computer Science.

[37]  Ross Horne,et al.  Tracing where and who provenance in Linked Data: A calculus , 2012, Theor. Comput. Sci..

[38]  Frank Tip,et al.  A survey of program slicing techniques , 1994, J. Program. Lang..

[39]  Val Tannen,et al.  Provenance semirings , 2007, PODS.

[40]  Luc Moreau,et al.  The Foundations for Provenance on the Web , 2010, Found. Trends Web Sci..

[41]  Glynn Winskel,et al.  Events, Causality and Symmetry , 2008, Comput. J..

[42]  Luc Moreau,et al.  Extracting causal graphs from an open provenance data model , 2008 .

[43]  Vladimiro Sassone,et al.  A Formal Model of Provenance in Distributed Systems , 2009, Workshop on the Theory and Practice of Provenance.

[44]  Paul T. Groth,et al.  Provenance XG Final Report , 2010 .

[45]  Gilles Kahn,et al.  Natural Semantics , 1987, STACS.

[46]  Paul T. Groth,et al.  The Requirements of Using Provenance in e-Science Experiments , 2007, Journal of Grid Computing.

[47]  Paul Dourish,et al.  Accounting for system behavior: representation, reflection, and resourceful action , 1997 .

[48]  Guy E. Blelloch,et al.  Adaptive functional programming , 2002, POPL '02.

[49]  James Cheney,et al.  On the expressiveness of implicit provenance in query and update languages , 2008, TODS.

[50]  Joseph E. Stoy,et al.  Denotational Semantics: The Scott-Strachey Approach to Programming Language Theory , 1981 .

[51]  Jennifer Widom,et al.  Tracing the lineage of view data in a warehousing environment , 2000, TODS.