Author of the publication

Provenance Capture and Use in a Satellite Data Processing Pipeline.

, , , , , and . IEEE Trans. Geoscience and Remote Sensing, 51 (11): 5090-5097 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of provenance in social computing: A case study., , , and . Concurrency and Computation: Practice and Experience, (2019)Provenance aware run-time verification of things for self-healing Internet of Things applications., and . Concurrency and Computation: Practice and Experience, (2019)On the Detection of Information Pollution and Violation of Copyrights in the Social Web., and . SOCA, page 252-254. IEEE Computer Society, (2015)Yapısal Kod Klon Analizinde Metrik Tabanlı Teknikler., , and . UYMS, volume 1072 of CEUR Workshop Proceedings, CEUR-WS.org, (2013)Improving Awareness in Ambient-Assisted Living Systems: Consolidated Data Stream Processing., and . HealthyIoT, volume 187 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 89-94. (2016)Information Services for Dynamically Assembled Semantic Grids., , and . SKG, page 10. IEEE Computer Society, (2005)A Data Provenance Visualization Approach., , and . SKG, page 84-91. IEEE, (2018)Grids for Real Time Data Applications., , , , , , , , , and . PPAM, volume 3911 of Lecture Notes in Computer Science, page 320-332. Springer, (2005)An approach to custom privacy policy violation detection problems using big social provenance data., and . Concurrency and Computation: Practice and Experience, (2018)Mobile Web Service Architecture Using Context-store., , and . TIIS, 4 (5): 836-858 (2010)