Study of Constructing Data Supply Chain Based on PROV
暂无分享,去创建一个
Peng Li | Hong Luo | Xiyun Liu | Jiewei Lan
[1] Jiming Chen,et al. Dynamic Authentication with Sensory Information for the Access Control Systems , 2014, IEEE Transactions on Parallel and Distributed Systems.
[2] Dieter Uckelmann. Quantifying the Value of RFID and the EPCglobal Architecture Framework in Logistics , 2012 .
[3] E. W. Schuster,et al. Global RFID: The Value of the EPCglobal Network for Supply Chain Management , 2007 .
[4] Yehoshua Y. Zeevi,et al. Forward-and-backward diffusion processes for adaptive image enhancement and denoising , 2002, IEEE Trans. Image Process..
[5] Val Tannen,et al. Provenance semirings , 2007, PODS.
[6] Donald C. Trost,et al. Information mining over heterogeneous and high-dimensional time-series data in clinical trials databases , 2006, IEEE Transactions on Information Technology in Biomedicine.
[7] Benjamin C. M. Fung,et al. m-Privacy for collaborative data publishing , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[8] Ge Yu,et al. Unstructured Discovery Service Method Based on Extended ONS , 2011, 2011 International Conference on Internet Technology and Applications.
[9] Sudha Ram,et al. A New Perspective on Semantics of Data Provenance , 2009, SWPM.
[10] Технология. Springer Science+Business Media , 2013 .
[11] Sanjeev Khanna,et al. Why and Where: A Characterization of Data Provenance , 2001, ICDT.
[12] Paul T. Groth. Transparency and Reliability in the Data Supply Chain , 2013, IEEE Internet Computing.