{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:32:13Z","timestamp":1725654733237},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642281143"},{"type":"electronic","value":"9783642281150"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28115-0_35","type":"book-chapter","created":{"date-parts":[[2012,1,24]],"date-time":"2012-01-24T10:44:07Z","timestamp":1327401847000},"page":"370-381","source":"Crossref","is-referenced-by-count":9,"title":["A Noisy 10GB Provenance Database"],"prefix":"10.1007","author":[{"given":"You-Wei","family":"Cheah","sequence":"first","affiliation":[]},{"given":"Beth","family":"Plale","sequence":"additional","affiliation":[]},{"given":"Joey","family":"Kendall-Morwick","sequence":"additional","affiliation":[]},{"given":"David","family":"Leake","sequence":"additional","affiliation":[]},{"given":"Lavanya","family":"Ramakrishnan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Antonatos, S., Anagnostakis, K., Markatos, E.: Generating realistic workloads for network intrusion detection systems. In: ACM Workshop on Software and Performance, Redwood Shores, CA, USA (2004)","DOI":"10.1145\/974044.974078"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Bodnarchuk, R.R., Bunt, R.B.: A synthetic workload model for a distributed systems file server. In: Proceedings of the SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, pp. 50\u201359 (1991)","DOI":"10.1145\/107971.107978"},{"key":"35_CR3","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s00778-002-0083-8","volume":"12","author":"Y. Cui","year":"2003","unstructured":"Cui, Y., Widom, J.: Lineage tracing for general data warehouse transformations. VLDB Journal\u00a012, 41\u201358 (2003)","journal-title":"VLDB Journal"},{"issue":"3","key":"35_CR4","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MCSE.2008.79","volume":"10","author":"J. Freire","year":"2008","unstructured":"Freire, J., Koop, D., Santos, E., Silva, C.T.: Provenance for Computational Tasks: A Survey. Computing in Science and Engineering\u00a010(3), 11\u201321 (2008)","journal-title":"Computing in Science and Engineering"},{"issue":"5","key":"35_CR5","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1002\/cpe.1247","volume":"20","author":"J. Frew","year":"2008","unstructured":"Frew, J., Metzger, D., Slaughter, P.: Automatic capture and reconstruction of computational provenance. Concurrency and Computation: Practice and Experience\u00a020(5), 485\u2013496 (2008)","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"9","key":"35_CR6","doi-asserted-by":"publisher","first-page":"1246","DOI":"10.1109\/TPDS.2008.215","volume":"20","author":"P. Groth","year":"2009","unstructured":"Groth, P., Moreau, L.: Recording Process Documentation for Provenance. IEEE Transactionson Parallel and Distributed Systems\u00a020(9), 1246\u20131259 (2009)","journal-title":"IEEE Transactionson Parallel and Distributed Systems"},{"issue":"5","key":"35_CR7","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1002\/cpe.1228","volume":"20","author":"J. Kim","year":"2008","unstructured":"Kim, J., Deelman, E., Gil, Y., Mehta, G., Ratnakar, V.: Provenance Trails in the Wings\/Pegasus System. Concurrency and Computation: Practice and Experience\u00a020(5), 587\u2013597 (2008)","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"35_CR8","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-540-85502-6_18","volume-title":"Advances in Case-Based Reasoning","author":"D.B. Leake","year":"2008","unstructured":"Leake, D.B., Kendall-Morwick, J.: Towards Case-Based Support for e-Science Workflow Generation by Mining Provenance. In: Althoff, K.-D., Bergmann, R., Minor, M., Hanft, A. (eds.) ECCBR 2008. LNCS (LNAI), vol.\u00a05239, pp. 269\u2013283. Springer, Heidelberg (2008)"},{"key":"35_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-642-02998-1_13","volume-title":"Case-Based Reasoning Research and Development","author":"D. Leake","year":"2009","unstructured":"Leake, D., Kendall-Morwick, J.: Four Heads are Better than One: Combining Suggestions for Case Adaptation. In: McGinty, L., Wilson, D.C. (eds.) ICCBR 2009. LNCS, vol.\u00a05650, pp. 165\u2013179. Springer, Heidelberg (2009)"},{"issue":"3","key":"35_CR10","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1017\/S0269888906000646","volume":"20","author":"R. Lopez de Mantaras","year":"2006","unstructured":"Lopez de Mantaras, R., McSherry, D., Leake, D., Smyth, B., Craw, S., Faltings, B., Maher, M.L., Cox, M., Forbus, K., Keane, M., Aamodt, A., Watson, I.: Retrieval, Revision, and Retention in CBR. Knowledge Engineering Review\u00a020(3), 215\u2013240 (2006)","journal-title":"Knowledge Engineering Review"},{"key":"35_CR11","doi-asserted-by":"crossref","unstructured":"Lud\u00e4scher, B., Altintas, I., Berkley, C., Higgins, D., Jaeger-Frank, E., Jones, M., Lee, E., Tao, J., Zhao, Y.: Scientific Workflow Management and the Kepler System. Concurrency and Computation: Practice & Experience, Special Issue on Scientific Workflows (2005)","DOI":"10.1002\/cpe.994"},{"issue":"3","key":"35_CR12","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/M-PDT.1995.414840","volume":"3","author":"P. Mehra","year":"1995","unstructured":"Mehra, P., Wah, B.: Synthetic Workload Generation for Load-balancing Experiments. IEEE Parallel and Distributed Technology\u00a03(3), 4\u201319 (1995)","journal-title":"IEEE Parallel and Distributed Technology"},{"key":"35_CR13","unstructured":"Moreau, L., Plale, B., Miles, S., Goble, C., Missier, P., Barga, R., Simmhan, Y., Futrelle, J., McGrath, R., Myers, J., Paulson, P., Bowers, S., Ludaescher, B., Kwasnikowska, N., Van den Bussche, J., Ellkvist, T., Freire, J., Groth, P.: The Open Provenance Model. Technical report, Electronics and Computer Science, University of Southampton, (2008)"},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Noble, B.D., Satyanarayanan, M., Nguyen, G.T., Katz, R.H.: Trace-Based Mobile Network Emulation. In: Proceedings of SIGCOMM 1997, Cannes, France, pp. 51\u201361 (September 1997)","DOI":"10.1145\/263109.263140"},{"key":"35_CR15","doi-asserted-by":"crossref","unstructured":"Ramakrishnan, L., Plale, B.: A Multi-Dimensional Classification Model for Workflow Characteristics. In: Workflow Approaches to New Data-centric Science, with ACM SIGMOD 2010, Indianapolis, IN (2010)","DOI":"10.1145\/1833398.1833402"},{"key":"35_CR16","doi-asserted-by":"crossref","unstructured":"Ramakrishnan, L., Plale, B., Gannon, D.: WORKEM: Representing and Emulating Distributed Scientific Workflow Execution State. In: Proceedings of the 10th IEEE\/ACM Int\u2019l. Symposium on Cluster, Cloud and Grid Computing, Melbourne, Australia (2010)","DOI":"10.1109\/CCGRID.2010.89"},{"key":"35_CR17","unstructured":"Shirasuna, S.: A Dynamic Scientific Workflow System for the Web Services Architecture. PhD thesis, Indiana University (September 2007)"},{"key":"35_CR18","doi-asserted-by":"crossref","unstructured":"Simmhan, Y., Plale, B., Gannon, D.: Karma2: Provenance Management for Data Driven Workflows. International Journal of Web Services Research\u00a05(2) (2008)","DOI":"10.4018\/jwsr.2008040101"},{"key":"35_CR19","doi-asserted-by":"crossref","unstructured":"Simmhan, Y., Plale, B., Gannon, D.: Towards a Quality Model for Effective Data Selection in Collaboratories. In: IEEE Workshop on Workflow and Data Flow for Scientific Applications, held in conjunction with ICDE, Atlanta, GA (2006)","DOI":"10.1109\/ICDEW.2006.150"},{"issue":"3","key":"35_CR20","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1084805.1084812","volume":"34","author":"Y. Simmhan","year":"2005","unstructured":"Simmhan, Y., Plale, B., Gannon, D.: A survey of data provenance in e-science. SIGMOD Record\u00a034(3), 31\u201336 (2005)","journal-title":"SIGMOD Record"},{"key":"35_CR21","doi-asserted-by":"crossref","unstructured":"Sreenivasan, K., Kleinman, A.J.: On the construction of a representative synthetic workload. Communications of the ACM, 127\u2013133 (1974)","DOI":"10.1145\/360860.360863"},{"key":"35_CR22","unstructured":"Widom, J.: Trio: A System for Integrated Management of Data, Accuracy, and Lineage. In: CIDR, Pacific Grove, California (January 2005)"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28115-0_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T01:50:24Z","timestamp":1556157024000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28115-0_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642281143","9783642281150"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28115-0_35","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2012]]}}}