Author of the publication

Tracking and Analyzing the Evolution of Provenance from Scripts.

, , , and . IPAW, volume 9672 of Lecture Notes in Computer Science, page 16-28. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DyeVC: an approach for monitoring and visualizing distributed repositories., , and . J. Software Eng. R&D, (2017)Deriving scientific workflows from algebraic experiment lines: A practical approach., , , , , , , and . Future Generation Comp. Syst., (2017)Improving workflow design by mining reusable tasks., , , and . J. Braz. Comp. Soc., 21 (1): 16:1-16:16 (2015)A Study about the Life Cycle of Code Anomalies., , and . SBCARS, page 71-80. IEEE Computer Society, (2016)Automatic assignment of integrators to pull requests: The importance of selecting appropriate attributes., , , and . Journal of Systems and Software, (2018)Managing Provenance of Implicit Data Flows in Scientific Experiments., , , , and . ACM Trans. Internet Techn., 17 (4): 36:1-36:22 (2017)What factors influence the reviewer assignment to pull requests?, , , and . Information & Software Technology, (2018)Versioned-PROV: A PROV Extension to Support Mutable Data Entities., , , and . IPAW, volume 11017 of Lecture Notes in Computer Science, page 87-100. Springer, (2018)Yin & Yang: Demonstrating Complementary Provenance from noWorkflow & YesWorkflow., , , , , , , and . IPAW, volume 9672 of Lecture Notes in Computer Science, page 161-165. Springer, (2016)Towards semantic diff of XML documents., , and . SAC, page 833-838. ACM, (2014)