Author of the publication

Improving Workflow Fault Tolerance through Provenance-Based Recovery.

, , , , and . SSDBM, volume 6809 of Lecture Notes in Computer Science, page 207-224. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weaker Forms of Monotonicity for Declarative Networking: A More Fine-Grained Answer to the CALM-Conjecture., , , and . ACM Trans. Database Syst., 40 (4): 21:1-21:45 (2016)ProPub: Towards a Declarative Approach for Publishing Customized, Policy-Aware Provenance., , and . SSDBM, volume 6809 of Lecture Notes in Computer Science, page 225-243. Springer, (2011)Scientific workflow design for mere mortals., , , and . Future Generation Comp. Syst., 25 (5): 541-551 (2009)System-Level Simulation Modeling with MLDesigner., , , , , , , and . MASCOTS, page 207-212. IEEE Computer Society, (2003)Repairing Provenance Policy Violations by Inventing Non-Functional Nodes., , and . RED@ESWC, volume 737 of CEUR Workshop Proceedings, CEUR-WS.org, (2011)General-Purpose Join Algorithms for Listing Triangles in Large Graphs.. CoRR, (2015)Parallelizing XML data-streaming workflows via MapReduce., , , and . J. Comput. Syst. Sci., 76 (6): 447-463 (2010)Scientific workflow design with data assembly lines., , , and . SC-WORKS, ACM, (2009)Weaker forms of monotonicity for declarative networking: a more fine-grained answer to the calm-conjecture., , , and . PODS, page 64-75. ACM, (2014)First-Order Provenance Games., , and . In Search of Elegance in the Theory and Practice of Computation, volume 8000 of Lecture Notes in Computer Science, page 382-399. Springer, (2013)