WP3: Provenance and Access Control Irini Fundulaki Giorgos Flouris Institute of Computer Science-FORTH 1st year review Luxembourg, December 2011.
2012 03-28 Wf4ever, preserving workflows as digital research objects
Session 48 - Principles of Semantic metadata management
Research Objects Tutorial (TPDL)
Tapp 2014 (belhajjame)
2015 TaPP - Interoperability for Provenance-aware Databases using PROV and JSON
NetKarma Portal Chris Small. Portal Goals Make it much easier for experimenters to capture provenance data with experiment Integrate with: – Measurement.
Programming Trustworthy Provenance Andy Cirillo Radha Jagadeesan Corin Pitcher James Riely School of CTI, DePaul University, Chicago Workshop on Principles.
Towards a Provenance Architecture Karen Schuchardt PNNL.
What (inputs)
Neuroimaging Data Provenance Using the LONI Pipeline Workflow Environment Allan MacKenzie-Graham IPAW2008 Arash Payan Ivo Dinov John Van Horn Arthur W.
Neuroimaging Data Provenance Using the LONI Pipeline Workflow Environment