{"7b78bd3729e1ba8acf0505472ba75669m.herschel":{"DOI":"10.1007/s00778-017-0486-1","ISBN":"","ISSN":"","URL":"https://www.ipvs.uni-stuttgart.de/departments/de/resources/papers/provenance_survey_online.pdf","abstract":"","annote":"","author":[{"family":"Herschel","given":"Melanie"},{"family":"Diestelkämper","given":"Ralf"},{"family":"Ben Lahmar","given":"Houssem"}],"citation-label":"herschel2017survey","collection-editor":[],"collection-title":"","container-author":[],"container-title":"The VLDB Journal","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2017"]],"literal":"2017"},"event-place":"","id":"7b78bd3729e1ba8acf0505472ba75669m.herschel","interhash":"a8acf1ec91c81df66b5c3a657f0dbd4b","intrahash":"7b78bd3729e1ba8acf0505472ba75669","issue":"6","issued":{"date-parts":[["2017"]],"literal":"2017"},"keyword":"pebble d03 ipvs-de trr161","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1007/s00778-017-0486-1"},"note":"","number":"6","number-of-pages":"25","page":"881-906","page-first":"881","publisher":"","publisher-place":"","status":"","title":"A survey on provenance: What for? What form? What from?","type":"article-journal","username":"m.herschel","version":"","volume":"26"},"78f35eaff59c8e81b7b545f97db11e06m.herschel":{"DOI":"10.1145/2882903.2912568","ISBN":"","ISSN":"","URL":"https://doi.org/10.1145/2882903.2912568","abstract":"","annote":"","author":[{"family":"Herschel","given":"Melanie"},{"family":"Hlawatsch","given":"Marcel"}],"citation-label":"herschel2016provenance","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Proceedings of the ACM International Conference on the Management of Data (SIGMOD)","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2016"]],"literal":"2016"},"event-place":"","id":"78f35eaff59c8e81b7b545f97db11e06m.herschel","interhash":"bacbec459a2d159c6f6991194cb207ae","intrahash":"78f35eaff59c8e81b7b545f97db11e06","issue":"","issued":{"date-parts":[["2016"]],"literal":"2016"},"keyword":"d03 ipvs-de trr161","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1145/2882903.2912568"},"note":"","number":"","number-of-pages":"4","page":"2213-2217","page-first":"2213","publisher":"","publisher-place":"","status":"","title":"Provenance: On and Behind the Screens","type":"paper-conference","username":"m.herschel","version":"","volume":""},"7fe62d6b69e51b3f5946208fcc6771d0m.herschel":{"DOI":"","ISBN":"","ISSN":"","URL":"https://www.usenix.org/conference/tapp17/workshop-program/presentation/lahmar","abstract":"","annote":"","author":[{"family":"Ben Lahmar","given":"Houssem"},{"family":"Herschel","given":"Melanie"}],"citation-label":"benlahmar2017provenancebased","collection-editor":[],"collection-title":"","container-author":[],"container-title":"International Workshop on the Theory and Practice of Provenance (TAPP)","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2017"]],"literal":"2017"},"event-place":"","id":"7fe62d6b69e51b3f5946208fcc6771d0m.herschel","interhash":"868eb8c0c45b2947192f1f0b6f6ac1b5","intrahash":"7fe62d6b69e51b3f5946208fcc6771d0","issue":"","issued":{"date-parts":[["2017"]],"literal":"2017"},"keyword":"d03 ipvs-de trr161","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org"},"note":"","number":"","page":"","page-first":"","publisher":"USENIX Association","publisher-place":"","status":"","title":"Provenance-based Recommendations for Visual Data Exploration","type":"paper-conference","username":"m.herschel","version":"","volume":""},"2b5eb4618d776b1d68843997477773fcm.herschel":{"DOI":"","ISBN":"","ISSN":"","URL":"https://www.usenix.org/conference/tapp2019/presentation/lahmar","abstract":"","annote":"","author":[{"family":"Ben Lahmar","given":"Houssem"},{"family":"Herschel","given":"Melanie"}],"citation-label":"benlahmar2019structural","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Proceedings of the International Workshop on Theory and Practice of Provenance (TaPP)","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"2b5eb4618d776b1d68843997477773fcm.herschel","interhash":"78f74eadde9baaaa8a6aec5fd260cadc","intrahash":"2b5eb4618d776b1d68843997477773fc","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"d03 ipvs-de trr161","note":"","number":"","page":"","page-first":"","publisher":"USENIX Association","publisher-place":"","status":"","title":"Structural summaries for visual provenance analysis.","type":"paper-conference","username":"m.herschel","version":"","volume":""},"7034d0b5fd81c215a2f9cb5c5dd454d8m.herschel":{"DOI":"10.1109/VISSOFT.2018.00017","ISBN":"","ISSN":"","URL":"https://ieeexplore.ieee.org/document/8530134/","abstract":"","annote":"","author":[{"family":"Schulz","given":"Christoph"},{"family":"Zeyfang","given":"Adrian"},{"family":"van Garderen","given":"Mereke"},{"family":"Ben Lahmar","given":"Houssem"},{"family":"Herschel","given":"Melanie"},{"family":"Weiskopf","given":"Daniel"}],"citation-label":"schulz2018simultaneous","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Proceedings of the IEEE Working Conference on Software Visualization (VISSOFT)","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2018"]],"literal":"2018"},"event-place":"","id":"7034d0b5fd81c215a2f9cb5c5dd454d8m.herschel","interhash":"6873455ad8c5780d8e1c5a61e22e02c5","intrahash":"7034d0b5fd81c215a2f9cb5c5dd454d8","issue":"","issued":{"date-parts":[["2018"]],"literal":"2018"},"keyword":"d03 ipvs-de trr161","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1109/VISSOFT.2018.00017"},"note":"","number":"","number-of-pages":"8","page":"87-95","page-first":"87","publisher":"","publisher-place":"","status":"","title":"Simultaneous Visual Analysis of Multiple Software Hierarchies","type":"paper-conference","username":"m.herschel","version":"","volume":""},"c1fcb73e1ee6ae275ff4fb200b4d229em.herschel":{"DOI":"10.5441/002/edbt.2018.85","ISBN":"","ISSN":"","URL":"https://doi.org/10.5441/002/edbt.2018.85","abstract":"","annote":"","author":[{"family":"Ben Lahmar","given":"Houssem"},{"family":"Herschel","given":"Melanie"},{"family":"Blumenschein","given":"Michael"},{"family":"Keim","given":"Daniel A."}],"citation-label":"benlahmar2018provenancebased","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Proceedings of International Conference on Extending Database Technology (EDBT)","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2018"]],"literal":"2018"},"event-place":"","id":"c1fcb73e1ee6ae275ff4fb200b4d229em.herschel","interhash":"fea5897daa0d28fbfb1ee3a411bef8ae","intrahash":"c1fcb73e1ee6ae275ff4fb200b4d229e","issue":"","issued":{"date-parts":[["2018"]],"literal":"2018"},"keyword":"d03 ipvs-de trr161","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.5441/002/edbt.2018.85"},"note":"","number":"","number-of-pages":"3","page":"686--689","page-first":"686","publisher":"","publisher-place":"","status":"","title":"Provenance-Based Visual Data Exploration with EVLIN","type":"paper-conference","username":"m.herschel","version":"","volume":""},"0834720fa54bd8f4a0e55032a511f697m.herschel":{"DOI":"10.1007/978-3-030-30278-8\\_19","ISBN":"","ISSN":"","URL":"https://doi.org/10.1007/978-3-030-30278-8\\_19","abstract":"","annote":"","author":[{"family":"Ben Lahmar","given":"Houssem"},{"family":"Herschel","given":"Melanie"}],"citation-label":"benlahmar2019towards","collection-editor":[],"collection-title":"","container-author":[],"container-title":"New Trends in Databases and Information Systems, (ADBIS) 2019 Short Papers, Workshops BBIGAP, QAUCA, SemBDM, SIMPDA, M2P, MADEISD, and Doctoral Consortium","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"0834720fa54bd8f4a0e55032a511f697m.herschel","interhash":"fdef11402cd43e4f1880a4d4640f58d7","intrahash":"0834720fa54bd8f4a0e55032a511f697","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"d03 ipvs-de trr161","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1007/978-3-030-30278-8\\_19"},"note":"","number":"","number-of-pages":"7","page":"153--160","page-first":"153","publisher":"","publisher-place":"","status":"","title":"Towards Integrating Collaborative Filtering in Visual Data Exploration Systems","type":"paper-conference","username":"m.herschel","version":"","volume":""},"c48791aa43fcdc32a261715042bd6108m.herschel":{"DOI":"10.1007/s11042-019-07878-6","ISBN":"","ISSN":"","URL":"https://doi.org/10.1007/s11042-019-07878-6","abstract":"","annote":"","author":[{"family":"Bruder","given":"Valentin"},{"family":"Ben Lahmar","given":"Houssem"},{"family":"Hlawatsch","given":"Marcel"},{"family":"Frey","given":"Steffen"},{"family":"Burch","given":"Michael"},{"family":"Weiskopf","given":"Daniel"},{"family":"Herschel","given":"Melanie"},{"family":"Ertl","given":"Thomas"}],"citation-label":"bruder2019volumebased","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Multimedia Tools and Applications","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"c48791aa43fcdc32a261715042bd6108m.herschel","interhash":"f5b3ac2c744acbaf1d6f1e05bfb2d194","intrahash":"c48791aa43fcdc32a261715042bd6108","issue":"23","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"d03 ipvs-de trr161","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1007/s11042-019-07878-6"},"note":"","number":"23","number-of-pages":"26","page":"32939-32965","page-first":"32939","publisher":"","publisher-place":"","status":"","title":"Volume-based large dynamic graph analysis supported by evolution provenance","type":"article-journal","username":"m.herschel","version":"","volume":"78"},"b5258d9f4bd3f96f5a005f5b6f2f204em.herschel":{"DOI":"10.1016/j.is.2020.101620","ISBN":"","ISSN":"","URL":"https://doi.org/10.1016/j.is.2020.101620","abstract":"","annote":"","author":[{"family":"Ben Lahmar","given":"Houssem"},{"family":"Herschel","given":"Melanie"}],"citation-label":"benlahmar2021collaborative","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Information Systems","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2021"]],"literal":"2021"},"event-place":"","id":"b5258d9f4bd3f96f5a005f5b6f2f204em.herschel","interhash":"e2b4ae99b341938f8cf9791d103119ae","intrahash":"b5258d9f4bd3f96f5a005f5b6f2f204e","issue":"","issued":{"date-parts":[["2021"]],"literal":"2021"},"keyword":"d03 ipvs-de trr161","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1016/j.is.2020.101620"},"note":"","number":"","page":"101620","page-first":"101620","publisher":"","publisher-place":"","status":"","title":"Collaborative filtering over evolution provenance data for interactive visual data exploration","type":"article-journal","username":"m.herschel","version":"","volume":"95"},"e931977230f6563fbbced0fa9ca8d421m.herschel":{"DOI":"10.1007/s00778-017-0486-1","ISBN":"","ISSN":"","URL":"https://doi.org/10.1007/s00778-017-0486-1","abstract":"Provenance refers to any information describing the production process of an end product, which can be anything from a piece of digital data to a physical object. While this survey focuses on the former type of end product, this definition still leaves room for many different interpretations of and approaches to provenance. These are typically motivated by different application domains for provenance (e.g., accountability, reproducibility, process debugging) and varying technical requirements such as runtime, scalability, or privacy. As a result, we observe a wide variety of provenance types and provenance-generating methods. This survey provides an overview of the research field of provenance, focusing on what provenance is used for (what for?), what types of provenance have been defined and captured for the different applications (what form?), and which resources and system requirements impact the choice of deploying a particular provenance solution (what from?). For each of these three key questions, we provide a classification and review the state of the art for each class. We conclude with a summary and possible future research challenges.","annote":"","author":[{"family":"Herschel","given":"Melanie"},{"family":"Diestelkämper","given":"Ralf"},{"family":"Ben Lahmar","given":"Houssem"}],"citation-label":"herschel2017survey","collection-editor":[],"collection-title":"","container-author":[],"container-title":"The VLDB Journal","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2017"]],"literal":"2017"},"event-place":"","id":"e931977230f6563fbbced0fa9ca8d421m.herschel","interhash":"a8acf1ec91c81df66b5c3a657f0dbd4b","intrahash":"e931977230f6563fbbced0fa9ca8d421","issue":"","issued":{"date-parts":[["2017"]],"literal":"2017"},"keyword":"pebble ivps-de vldbj d03 trr161","misc":{"doi":"10.1007/s00778-017-0486-1"},"note":"","number":"","number-of-pages":"25","page":"881-906","page-first":"881","publisher":"","publisher-place":"","status":"","title":"A Survey on Provenance - What for? What form? What from?","type":"article-journal","username":"m.herschel","version":"","volume":"26"},"8c5e63061b23aaf628a1a953893a4a8cm.herschel":{"DOI":"","ISBN":"","ISSN":"","URL":"https://doi.org/10.1145/3299869.3320225","abstract":"","annote":"","author":[{"family":"Diestelkämper","given":"Ralf"},{"family":"Herschel","given":"Melanie"}],"citation-label":"diestelkmper2019capturing","collection-editor":[],"collection-title":"","container-author":[],"container-title":"In ACM International Conference on Management of Data (SIGMOD)","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"8c5e63061b23aaf628a1a953893a4a8cm.herschel","interhash":"b35f83138eea50ec98f8a106d1f3a677","intrahash":"8c5e63061b23aaf628a1a953893a4a8c","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"pebble peer d03 ipvs-de trr161 rp9","misc":{"ee":"https://doi.org/10.1145/3299869.3320225"},"note":"","number":"","number-of-pages":"3","page":"1893-1896","page-first":"1893","publisher":"","publisher-place":"","status":"","title":"Capturing and Querying Structural Provenance in Spark with Pebble","type":"paper-conference","username":"m.herschel","version":"","volume":""}}