Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Provenance-Rdf'
Provenance-Rdf published presentations and documents on DocSlides.
On Data Provenance in Group-centric Secure Collaboration
by celsa-spraggs
Oct. 17, 2011. CollaborateCom. Jaehong. Park, Da...
KnowledgeWiki: An OpenSource Tool for Creating Community-Curated Vocabulary, with a Use Case in Mat
by min-jolicoeur
WWW - LDOW 2016, Canada. Nishita Jaykumar. , Pav...
KnowledgeWiki: An OpenSource Tool for Creating Community-Cu
by pamella-moone
WWW - LDOW 2016, Canada. Nishita Jaykumar. , Pav...
RDF-3X: a RISC style Engine for RDF
by ellena-manuel
Ref: Thomas Neumann and Gerhard Weikum [PVLDBâ...
Lecture 11: Provenance and Data privacy
by gianni201
December 8, 2010. Dan Suciu -- CSEP544 Fall 2010. ...
Provenance Research
by frogspyder
Raju, Todd Elsethagen, Eric . Stephan. 1. Pacific ...
A Provenance assisted Roadmap for
by popsmolecules
Life Sciences . Linked Open Data Cloud. Ali . Hasn...
The Semiring Framework for Database Provenance
by katrgolden
5/21/2018. 1. UW. Val Tannen. University of Pennsy...
Interpreting detrital zircon provenance in the context of regional stratigraphic and tectonic models: an example from Late Ordovician–Early Devonian cover rocks on Ganderia, eastern Maine
by lois-ondreau
Interpreting detrital zircon provenance in the co...
1 Provenance-Based Access Control (PBAC)
by yoshiko-marsland
Prof. Ravi Sandhu. Executive Director and Endowed...
Secure Network Provenance
by aaron
Wenchao. Zhou. *. , . Qiong. . Fei. *, . Arjun....
Update Exchange with Mappings and Provenance
by alida-meadow
Todd J. Green. Grigoris Karvounarakis Zachar...
Data Provenance Environmental Scan
by olivia-moreira
HITPC Consumer Empowerment Workgroup Meeting. Jul...
S&I Data Provenance Initiative
by calandra-battersby
Presentation to the HITSC on Data Provenance. Sep...
Collaborative Data Sharing with Mappings and Provenance
by olivia-moreira
Todd J. Green. University of Pennsylvania. Spring...
Asian Art Provenance:
by pasty-toler
Research and data at the . Freer|Sackler. Jeffrey...
Provenance Research
by conchita-marotz
Bibi . Raju, Todd Elsethagen, Eric . Stephan. 1. ...
Provenance
by conchita-marotz
Key components of the business plan. Customers. W...
Approximated Provenance for Complex Applications
by jane-oiler
Susan B. . Davidson. University of Pennsylvania. ...
Query Language Constructs for Provenance
by mitsue-stanley
Murali. Mani, . Mohamad. . Alawa. , . Arunlal. ...
Using Well-Founded Provenance
by alexa-scheidler
Ontologies. . to Query Meteorological Data . ....
A Generic Provenance
by yoshiko-marsland
Middleware for Database Queries. , Updates, and ....
An Overview of Data Provenance
by calandra-battersby
Why – How . – . Where. What’s up with this ...
Open Provenance Model Tutorial
by stefany-barnette
. Session 6: Interoperability. Session 6: Aims. ...
Open Provenance Model Tutorial
by celsa-spraggs
. Session 1: Background. Luc Moreau. L.Moreau@ec...
Querying Workflow Provenance
by giovanna-bartolotta
Susan B. Davidson. University of Pennsylvania. Jo...
Darwin Core RDF Guide from http://rs.tdwg.org/dwc/terms/guides/rdf/index.htm
by calandra-battersby
Describing . Taxon Concepts from http://. code.go...
How Can RDF and OWL Coexist with Property Graph
by briana-ranney
Zhe. Wu. Architect. Oracle Spatial and Graph. Ma...
RDF Examples
by debby-jeon
Examples. Dbpedia. Freebase. Library Congress LOD...
The Promise and Peril of RDF for Formalizing the Humanities
by phoebe-click
James Silas Creel. Sarah Potvin. Texas A&M Un...
Practical RDF
by karlyn-bohler
Chapter 4. Specialized RDF Relationships:. Reific...
RDF Generation and Linking
by sherrill-nordquist
using Open Refine. Daniel Vila-Suero. dvila@fi.up...
Practical RDF
by briana-ranney
Chapter 2. RDF: Heart and Soul. Shelley Powers, O...
Practical RDF
by debby-jeon
Chapter 10. Querying RDF: RDF as Data. Shelley Po...
RDFa Lite
by marina-yarberry
RDFa 1.1 Lite is a subset of RDFa 1.1. Five simpl...
IFLA in RDF (+ RDA)
by luanne-stotts
Gordon Dunsire. Chair, IFLA Namespaces Technical ...
Overview of BD Security
by julian
ECE 493/593 Big Data Security. Why overview (not m...
SWIMs : From Structured Summaries to Integrated Knowledge Base
by callie
ScAi Lab, CSD, UCLA. May 2014. Immense Knowledge F...
Summary of D1 AHM Xixi Luo
by kampsta
Semantic Products/Deliverables - 1. Automated Matc...
Provenance as a series of events
by debby-jeon
Provenance as a series of events Christian-Emil O...
Load More...