Abstract | ||
---|---|---|
As developers acknowledge that provenance is essential, more and more datasets are attempting to keep provenance records describing how they were created. Some of these datasets are constructed using workflows, others cob- ble together processes and applications to manipulate the data. While the prove- nance needs are the same, the inputs and set of processes used must be kept, the identity needs are very different. We outline several ident ification strategies that can be used for data manipulation outside of workflows. We eva luate these strate- gies in terms of time to create and store identity, and the spa ce needed to keep this information. Additionally, we discuss the strengths a nd weaknesses of each strategy. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1007/978-3-540-89965-5_12 | International Provenance and Annotation Workshop |
Keywords | Field | DocType |
identity need,provenance record,provenance need,store identity,identification strategy,data manipulation | Data mining,World Wide Web,Computer science,Provenance,Data manipulation language,Strengths and weaknesses,Workflow,Database | Conference |
Volume | ISSN | Citations |
5272 | 0302-9743 | 4 |
PageRank | References | Authors |
0.57 | 23 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Adriane Chapman | 1 | 382 | 27.65 |
H. V. Jagadish | 2 | 11141 | 2495.67 |