Bertram Ludaescher

147

Publications

--

Readers

21

h-index

2507

Citations

9839

Views

Followers (20)

Explore network

Following (20)

Explore network

Publications

Computing location-based lineage from workflow specifications to optimize provenance queries

Dey S, Köhler S, Bowers S, Ludäscher B

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2015)

  • Get full text at journal
  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Improving workflow design using abstract provenance graphs

Song T, Dey S, Bowers S, Ludäscher B

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2015)

  • Get full text at journal
  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based Processes

Sarkar A, Kohler S, Ludascher B, Bishop M

IEEE Systems Journal (2015)

  • Get full text at journal
  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Preface

Ludäscher B, Plale B

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2015)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Provenance for explaining taxonomy alignments

Chen M, Yu S, Kianmajd P, Franz N, Bowers S, Ludäscher B

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2015)

  • Get full text at journal
  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.