TaPP 2020 | An Event-based Data Model for Granular Information Flow Tracking | Joud Khoury, Timothy Upthegrove, Armando Caro, Brett Benyo, Derrick Kong |
TaPP 2020 | Integrity Checking and Abnormality Detection of Provenance Records | Sheung Chi Chan, Ashish Gehani, Hassaan Irshad, James Cheney |
TaPP 2020 | A First-Principles Algebraic Approach to Data Transformations in Data Cleaning: Understanding Provenance from the Ground Up | Santiago Núñez-Corrales, Lan Li, Bertram Ludäscher |
TaPP 2020 | Data Provenance for Attributes: Attribute Lineage | Dennis Dosso, Susan B. Davidson, Gianmaria Silvello |
TaPP 2020 | Discrepancy Detection in Whole Network Provenance | Raza Ahmad, Eunjin Jung, Carolina de Senne Garcia, Hassaan Irshad, Ashish Gehani |
TaPP 2020 | Efficient Provenance Alignment in Reproduced Executions | Yuta Nakamura, Tanu Malik, Ashish Gehani |
TaPP 2020 | A Generic Explainability Framework for Function Circuits | Sylvain Hallé, Hugo Tremblay |
TaPP 2020 | Provenance-Based Interpretation of Multi-Agent Information Analysis | |
TaPP 2019 | Modeling Provenance and Understanding Reproducibility for OpenRefine Data Cleaning Workflows | Timothy McPhillips, Lan Li, Nikolaus Parulian, Bertram Ludaescher |
TaPP 2019 | Provenance Meets Bidirectional Transformations | Anthony Anjorin, James Cheney |
TaPP 2019 | Structural summaries for visual provenance analysis | Houssem Ben Lahmar, Melanie Herschel |
TaPP 2019 | Query-based Why-not Explanations for Nested Data | Ralf Diestelkämper, Boris Glavic, Melanie Herschel, Seokki Lee |
TaPP 2019 | Aggregating unsupervised provenance anomaly detectors | Ghita Berrada, James Cheney |
TaPP 2019 | GitHub2PROV: Provenance for Supporting Software Project Management | Heather S. Packer, Adriane Chapman, Leslie Carr |
TaPP 2019 | Mining Data Provenance to Detect Advanced Persistent Threats | Mathieu Barre, Ashish Gehani, Vinod Yegneswaran |
TaPP 2018 | Using Provenance for Generating Automatic Citations | Dai Hai Ton That, Tanu Malik, Alexander Rasin, Andrew Youngdahl |
TaPP 2018 | Pointer Provenance in a Capability Architecture | Alfredo Mazzinghi, Ripduman Sohan, Robert N. M. Watson |
TaPP 2018 | Provenance-based Intrusion Detection: Opportunities and Challenges | Xueyuan Han, Thomas Pasquier, Margo Seltzer |
TaPP 2018 | Curator: Provenance Management for Modern Distributed Systems | Warren Smith, Thomas Moyer, Charles Munson |
TaPP 2018 | Wrattler: Reproducible, live and polyglot notebooks | Tomas Petricek, James Geddes, Charles Sutton |
TaPP 2018 | Semiring Provenance over Graph Databases | Yann Ramusat, Silviu Maniu, Pierre Senellart |
TaPP 2018 | How "How" Explains What "What" Computes — How-Provenance for SQL and Query Compilers | Daniel O’Grady, Tobias Müller, Torsten Grust |
TaPP 2017 | Provenance in DISC Systems: Reducing Space Overhead at Runtime | Ralf Diestelkämper, Melanie Herschel, Priyanka Jadhav |
TaPP 2017 | Corroboration via Provenance Patterns | Lina Barakat, Phillip Taylor, Nathan Griffiths, Simon Miles |
TaPP 2017 | Answering Historical What-if Queries with Provenance, Reenactment, and Symbolic Execution | Bahareh Sadat Arab, Boris Glavic |