In Search of Elegance in the Theory and Practice of Computation
暂无分享,去创建一个
[1] Luc Moreau,et al. Provenance-based reproducibility in the Semantic Web , 2011, J. Web Semant..
[2] Margo I. Seltzer,et al. Provenance: a future history , 2009, OOPSLA Companion.
[3] James Cheney,et al. Edinburgh Research Explorer A Practical Theory of Language-integrated Query , 2022 .
[4] Paul Blain Levy,et al. Call-By-Push-Value: A Functional/Imperative Synthesis , 2003, Semantics Structures in Computation.
[5] Greg Miller,et al. A Scientist's Nightmare: Software Problem Leads to Five Retractions , 2006, Science.
[6] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[7] Gordon D. Plotkin,et al. A structural approach to operational semantics , 2004, J. Log. Algebraic Methods Program..
[8] Glynn Winskel,et al. The formal semantics of programming languages - an introduction , 1993, Foundation of computing series.
[9] Martín Abadi,et al. A core calculus of dependency , 1999, POPL '99.
[10] Leslie Lamport. State the problem before describing the solution , 1978, SOEN.
[11] Benjamin C. Pierce,et al. Combinators for bi-directional tree transformations: a linguistic approach to the view update problem , 2005, POPL '05.
[12] Analysis and caching of dependencies , 1996, ICFP '96.
[13] Paul T. Groth,et al. Requirements for Provenance on the Web , 2012, Int. J. Digit. Curation.
[14] Paul T. Groth,et al. Provenance-based validation of e-science experiments , 2005, J. Web Semant..
[15] Dan Suciu,et al. Comprehension syntax , 1994, SGMD.
[16] Yogesh L. Simmhan,et al. The Open Provenance Model core specification (v1.1) , 2011, Future Gener. Comput. Syst..
[17] James Cheney,et al. A Formal Framework for Provenance Security , 2011, 2011 IEEE 24th Computer Security Foundations Symposium.
[18] Ohad Kammar,et al. Handlers in action , 2013, ICFP.
[19] Stuart E. Madnick,et al. A Polygen Model for Heterogeneous Database Systems: The Source Tagging Perspective , 1990, VLDB.
[20] Donald I. Good. The Foundations of Computer Security: We Need Some , 1986 .
[21] Clifford A. Lynch,et al. When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web , 2001, J. Assoc. Inf. Sci. Technol..
[22] Stephen Chong. Towards Semantics for Provenance Security , 2009, Workshop on the Theory and Practice of Provenance.
[23] Deborah L. McGuinness,et al. Explaining answers from the Semantic Web: the Inference Web approach , 2004, J. Web Semant..
[24] James Cheney,et al. Program Slicing and Data Provenance , 2007, IEEE Data Eng. Bull..
[25] Guy E. Blelloch,et al. An experimental analysis of self-adjusting computation , 2009 .
[26] Michael Stonebraker,et al. Supporting fine-grained data lineage in a database visualization environment , 1997, Proceedings 13th International Conference on Data Engineering.
[27] James Cheney,et al. A Graph Model of Data and Workflow Provenance , 2010, TaPP.
[28] James Cheney,et al. Provenance in Databases: Why, How, and Where , 2009, Found. Trends Databases.
[29] V. Vianu,et al. Edinburgh Why and Where: A Characterization of Data Provenance , 2017 .
[30] Yong Zhao,et al. Chimera: a virtual data system for representing, querying, and automating data derivation , 2002, Proceedings 14th International Conference on Scientific and Statistical Database Management.
[31] Val Tannen,et al. Annotated XML: queries and provenance , 2008, PODS.
[32] Paul T. Groth,et al. Principles of High Quality Documentation for Provenance: A Philosophical Discussion , 2006, IPAW.
[33] James Cheney,et al. Functional programs that explain their work , 2012, ICFP.
[34] James Cheney,et al. Causality and the Semantics of Provenance , 2010, DCM.
[35] James Cheney,et al. A Core Calculus for Provenance , 2012, POST.
[36] James Cheney,et al. Provenance as dependency analysis† , 2007, Mathematical Structures in Computer Science.
[37] Ross Horne,et al. Tracing where and who provenance in Linked Data: A calculus , 2012, Theor. Comput. Sci..
[38] Frank Tip,et al. A survey of program slicing techniques , 1994, J. Program. Lang..
[39] Val Tannen,et al. Provenance semirings , 2007, PODS.
[40] Luc Moreau,et al. The Foundations for Provenance on the Web , 2010, Found. Trends Web Sci..
[41] Glynn Winskel,et al. Events, Causality and Symmetry , 2008, Comput. J..
[42] Luc Moreau,et al. Extracting causal graphs from an open provenance data model , 2008 .
[43] Vladimiro Sassone,et al. A Formal Model of Provenance in Distributed Systems , 2009, Workshop on the Theory and Practice of Provenance.
[44] Paul T. Groth,et al. Provenance XG Final Report , 2010 .
[45] Gilles Kahn,et al. Natural Semantics , 1987, STACS.
[46] Paul T. Groth,et al. The Requirements of Using Provenance in e-Science Experiments , 2007, Journal of Grid Computing.
[47] Paul Dourish,et al. Accounting for system behavior: representation, reflection, and resourceful action , 1997 .
[48] Guy E. Blelloch,et al. Adaptive functional programming , 2002, POPL '02.
[49] James Cheney,et al. On the expressiveness of implicit provenance in query and update languages , 2008, TODS.
[50] Joseph E. Stoy,et al. Denotational Semantics: The Scott-Strachey Approach to Programming Language Theory , 1981 .
[51] Jennifer Widom,et al. Tracing the lineage of view data in a warehousing environment , 2000, TODS.