Author of the publication

PUG: A Framework and Practical Implementation for Why & Why-Not Provenance (extended version).

, , and . CoRR, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LDV: Light-weight database virtualization., , , and . ICDE, page 1179-1190. IEEE Computer Society, (2015)Perm: Processing Provenance and Data on the Same Data Model through Query Rewriting., and . ICDE, page 174-185. IEEE Computer Society, (2009)Using SQL for Efficient Generation and Querying of Provenance Information., , and . In Search of Elegance in the Theory and Practice of Computation, volume 8000 of Lecture Notes in Computer Science, page 291-320. Springer, (2013)The exception that improves the rule., , , and . HILDA@SIGMOD, page 7. ACM, (2016)Ariadne: managing fine-grained provenance on data streams., , , and . DEBS, page 39-50. ACM, (2013)The Case for Fine-Grained Stream Provenance., , , and . BTW Workshops, page 58-61. Technische Universität Kaiserslautern, (2011)Provenance-based Data Skipping., , , , , , , and . Proc. VLDB Endow., 15 (3): 451-464 (2021)Provenance for Data Mining., , , and . TaPP, USENIX Association, (2013)HRDBMS: A NewSQL Database for Analytics., , and . CLUSTER, page 519-520. IEEE Computer Society, (2015)Mimir: Bringing CTables into Practice., , , , , , and . CoRR, (2016)