Author of the publication

Towards Usable and Interoperable Workflow Provenance: Empirical Case Studies using PML.

, , , , , , , and . SWPM, volume 526 of CEUR Workshop Proceedings, CEUR-WS.org, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A dual-rail static edge-triggered latch., , and . ISCAS (2), page 645-648. IEEE, (2001)On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework., , , , , and . AAAI Spring Symposium: AI Technologies for Homeland Security, page 157-160. AAAI, (2005)Organizing Committee., , , and . AAAI Spring Symposium: Social Semantic Web: Where Web 2.0 Meets Web 3.0, AAAI, (2009)Sparsity-driven high resolution FDLFM-MIMO radar imaging., , , and . WCSP, page 1-5. IEEE, (2012)A storage approach for OpenFlow switch based on Protocol Oblivious Forwarding., , , , and . ISCC, page 1145-1150. IEEE Computer Society, (2016)Search on the Semantic Web., , , , , and . IEEE Computer, 38 (10): 62-69 (2005)The Impact of Bit-Line Coupling and Ground Bounce on CMOS SRAM Performance., and . VLSI Design, page 234-. IEEE Computer Society, (2003)IRAS: An Inmates' Risk Assessment System., , and . I. J. Comput. Appl., 16 (2): 91-97 (2009)An analytical model of the overshooting effect for multiple-input gates in nanometer technologies., , , , and . ISCAS, page 1712-1715. IEEE, (2013)A distributed event-triggered transmission strategy for exponential consensus of general linear multi-agent systems with directed topology., , , and . J. Franklin Institute, 352 (12): 5866-5881 (2015)