Linked e-resources
Details
Table of Contents
Intro
Preface
Organization
Contents
Provenance Capture and Representation
A Delayed Instantiation Approach to Template-Driven Provenance for Electronic Health Record Phenotyping
1 Introduction
2 The Revised Template Model
3 The Capture Service
4 The Query Service
4.1 Document Views
4.2 Query Templates
5 Implementation
6 Evaluation
7 Related Work
8 Conclusions and Future Work
References
Provenance Supporting Hyperparameter Analysis in Deep Neural Networks
1 Introduction
2 Related Work
2.1 Machine- and Deep Learning-Specific Approaches
2.2 Domain-Agnostic Approaches
3 DNNProv and Keras-Prov
3.1 Provenance Model
3.2 Architecture of DNNProv and Keras-Prov
3.3 Using DNNProv and Keras-Prov
4 Evaluation
5 Conclusions
References
Evidence Graphs: Supporting Transparent and FAIR Computation, with Defeasible Reasoning on Data, Methods, and Results
1 Introduction
1.1 Motivation
1.2 Related Work
2 Methods
3 Results
4 Discussion
References
The PROV-JSONLD Serialization
1 Introduction
2 Example
3 PROV-JSONLD Schema
3.1 Preliminary Definitions
3.2 Encoding a PROV Expression
3.3 Encoding a PROV Document and a PROV Bundle
4 PROV-JSONLD Context
4.1 Default Context Elements
4.2 Contexts for PROV Elements
4.3 Contexts for PROV Relations
5 Interoperability Considerations
6 Implementation and Evaluation
7 Conclusion
References
Security
Proactive Provenance Policies for Automatic Cryptographic Data Centric Security
1 Introduction
2 The ACDC FaaS Paradigm
3 ACDC Provenance Model
4 A Case Study on Detecting Voter Fraud in E-Voting
4.1 ACDC E-Voting Scenario
4.2 Voter Fraud Scenarios
4.3 Challenges of Voting Provenance
5 Related Work
6 Conclusion and Future Work
References
Provenance-Based Security Audits and Its Application to COVID-19 Contact Tracing Apps
1 Introduction
2 Development of the ``Corona-Warn-App''
3 Provenance of Repositories
3.1 Generating Retrospective Provenance for Git Repositories
3.2 Using and Analyzing Provenance-An Example
4 Code Audit with Static Analysis
5 Provenance-Driven Code Analysis
6 Case Study: Corona-Warn-App
7 Related Work
8 Conclusions and Future Work
References
Provenance Types, Inference, Queries and Summarization
Notebook Archaeology: Inferring Provenance from Computational Notebooks
1 Introduction
2 Related Work
3 Definitions
3.1 Provenance
4 Data and Statistics
4.1 Notebooks
4.2 History
5 Algorithm
5.1 Base Algorithm
5.2 Informed Algorithm
6 Evaluation
7 Discussion
8 Conclusion
References
Efficient Computation of Provenance for Query Result Exploration
1 Introduction
2 Preliminaries
2.1 Query Language
2.2 Provenance Definition
2.3 Dependencies
3 Optimizing Provenance Queries Without Materialization
Preface
Organization
Contents
Provenance Capture and Representation
A Delayed Instantiation Approach to Template-Driven Provenance for Electronic Health Record Phenotyping
1 Introduction
2 The Revised Template Model
3 The Capture Service
4 The Query Service
4.1 Document Views
4.2 Query Templates
5 Implementation
6 Evaluation
7 Related Work
8 Conclusions and Future Work
References
Provenance Supporting Hyperparameter Analysis in Deep Neural Networks
1 Introduction
2 Related Work
2.1 Machine- and Deep Learning-Specific Approaches
2.2 Domain-Agnostic Approaches
3 DNNProv and Keras-Prov
3.1 Provenance Model
3.2 Architecture of DNNProv and Keras-Prov
3.3 Using DNNProv and Keras-Prov
4 Evaluation
5 Conclusions
References
Evidence Graphs: Supporting Transparent and FAIR Computation, with Defeasible Reasoning on Data, Methods, and Results
1 Introduction
1.1 Motivation
1.2 Related Work
2 Methods
3 Results
4 Discussion
References
The PROV-JSONLD Serialization
1 Introduction
2 Example
3 PROV-JSONLD Schema
3.1 Preliminary Definitions
3.2 Encoding a PROV Expression
3.3 Encoding a PROV Document and a PROV Bundle
4 PROV-JSONLD Context
4.1 Default Context Elements
4.2 Contexts for PROV Elements
4.3 Contexts for PROV Relations
5 Interoperability Considerations
6 Implementation and Evaluation
7 Conclusion
References
Security
Proactive Provenance Policies for Automatic Cryptographic Data Centric Security
1 Introduction
2 The ACDC FaaS Paradigm
3 ACDC Provenance Model
4 A Case Study on Detecting Voter Fraud in E-Voting
4.1 ACDC E-Voting Scenario
4.2 Voter Fraud Scenarios
4.3 Challenges of Voting Provenance
5 Related Work
6 Conclusion and Future Work
References
Provenance-Based Security Audits and Its Application to COVID-19 Contact Tracing Apps
1 Introduction
2 Development of the ``Corona-Warn-App''
3 Provenance of Repositories
3.1 Generating Retrospective Provenance for Git Repositories
3.2 Using and Analyzing Provenance-An Example
4 Code Audit with Static Analysis
5 Provenance-Driven Code Analysis
6 Case Study: Corona-Warn-App
7 Related Work
8 Conclusions and Future Work
References
Provenance Types, Inference, Queries and Summarization
Notebook Archaeology: Inferring Provenance from Computational Notebooks
1 Introduction
2 Related Work
3 Definitions
3.1 Provenance
4 Data and Statistics
4.1 Notebooks
4.2 History
5 Algorithm
5.1 Base Algorithm
5.2 Informed Algorithm
6 Evaluation
7 Discussion
8 Conclusion
References
Efficient Computation of Provenance for Query Result Exploration
1 Introduction
2 Preliminaries
2.1 Query Language
2.2 Provenance Definition
2.3 Dependencies
3 Optimizing Provenance Queries Without Materialization