Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Provenance and Annotation of Data and Process: Third International Provenance and Annotation Workshop

Buy

Interest in and needs for provenance are growing as data proliferate. Data are increasing in a wide array of application areas, including scientific workflow systems, logical reasoning systems, text extraction, social media, and linked data. As data volumes expand and as applications become more hybrid and distributed in nature, there is growing interest in where data came from and how they were produced in order to understand when and how to rely on them. Provenance, or the origin or source of something, can capture a wide range of information. This includes, for example, who or what generated the data, the history of data stewardship, manner of manufacture, place and time of manufacture, and so on. Annotation is tightly connected with provenance since data are often commented on, described, and referred to. These descriptions or annotations are often critical to the understandability, reusability, and reproducibility of data and thus are often critical components of today’s data and knowledge systems.

Provenance has been recognized to be important in a wide range of areas including databases, workflows, knowledge representation and reasoning, and digital libraries. Thus, many disciplines have proposed a wide range of provenance models, techniques, and infrastructure for encoding and using provenance. One timely challenge for the broader community is to understand the range of strengths and weaknesses of different approaches sufficiently to find and use the best models for any given situation. This also comes at a time when a new incubator group has been formed at theWorldWideWeb Consortium(W3C) to provide a state-of-theart understanding and develop a roadmap in the area of provenance for Semantic Web technologies, development, and possible standardization.

The Third International Provenance and AnnotationWorkshop (IPAW2010) built on the success of previous workshops held in Salt Lake City (2008), Chicago (2006, 2002), and Edinburgh (2003). It was held during June 15–16, in Troy, New York, at Rensselaer Polytechnic Institute. IPAW 2010 brought together computer scientists from different areas and provenance users to discuss open problems related to the provenance of computational and non-computational artifacts. A total of 59 people attended the workshop. These attendees came from the United States (USA), the United Kingdom (UK), the Netherlands, Germany, Brazil, and Japan. We received 36 submissions in response to the initial call for papers. Each of these submissions was reviewed by at least three reviewers. Overall, 7 submissions were accepted as full papers, 11 were accepted as medium-length papers, 7 were accepted as demo papers, and 6 were accepted as short papers. In addition, a follow-up call for late-breaking work in the form of a poster and abstract was issued, which resulted in 10 additional contributions being made.

(HTML tags aren't allowed.)

You Are a Mathematician: A Wise and Witty Introduction to the Joy of Numbers
You Are a Mathematician: A Wise and Witty Introduction to the Joy of Numbers

What is the largest number less than 1?

If x and y are any of two different positive numbers, which is larger, x2 + y2 or 2xy?

What do you get if you cross a cube and an octahedron?

Discover the surprising answers as David Wells conclusively proves that: you Are a mathematician

Praise for David Wells's

The...

Microcontrollers: High-Performance Systems and Programming
Microcontrollers: High-Performance Systems and Programming

Focusing on the line of high-performance microcontrollers offered by Microchip, Microcontrollers: High-Performance Systems and Programming discusses the practical factors that make the high-performance PIC series a better choice than their mid-range predecessors for most systems. However, one consideration in favor of the mid-range...

Responsible Management of Information Systems
Responsible Management of Information Systems

This book discusses the question of how information systems can be used and managed in a responsible manner. Normative problems such as intellectual property, privacy, power distribution, etc., are at the heart of many of the problems faced by users and managers of information systems. Responsible Management of Information Systems...


Molecular Beacons
Molecular Beacons

Molecular Beacons explains working principle of molecular beacons, discusses their design, synthesis, purification and characterization, explores their thermodynamic and kinetic properties, and more importantly, reviews their in vivo and in vitro applications with the emphasis on the design and modification of molecular beacons for in...

Fit to Bust: How Great Companies Fail
Fit to Bust: How Great Companies Fail
Warren Buffet remarked that it takes 20 years to build a reputation and five minutes to ruin it. "If you think about that, you'll do things differently." Journalist Tim Phillips turns his eye toward the most avoidable business disasters of recent history. In each case, the story begins at the point where a disastrous...
Coping with Water Scarcity: Addressing the Challenges
Coping with Water Scarcity: Addressing the Challenges

One of the main problems confronting the world of the 21st Century is a shortage of water. There is already severe scarcity in many regions of the world, causing tremendous problems for local populations and indeed entire societies. There is insufficient water available for the production of food to alleviate poverty and starvation; the lack of...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy