{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:02:11Z","timestamp":1756893731423},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642351723"},{"type":"electronic","value":"9783642351730"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35173-0_29","type":"book-chapter","created":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T10:03:56Z","timestamp":1351245836000},"page":"399-406","source":"Crossref","is-referenced-by-count":19,"title":["Reconstructing Provenance"],"prefix":"10.1007","author":[{"given":"Sara","family":"Magliacane","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"29_CR1","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/S0169-023X(03)00066-1","volume":"47","author":"W. Aalst van der","year":"2003","unstructured":"van der Aalst, W., van Dongen, B.F., Herbst, J., Maruster, L., Schimm, G.: Workflow mining: A survey of issues and approaches. Data & Knowledge Engineering\u00a047(2), 237\u2013267 (2003)","journal-title":"Data & Knowledge Engineering"},{"key":"29_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/978-3-642-19656-0_39","volume-title":"Social Computing, Behavioral-Cultural Modeling and Prediction","author":"G. Barbier","year":"2011","unstructured":"Barbier, G., Liu, H.: Information Provenance in Social Media. In: Salerno, J., Yang, S.J., Nau, D., Chai, S.-K. (eds.) SBP 2011. LNCS, vol.\u00a06589, pp. 276\u2013283. Springer, Heidelberg (2011)"},{"key":"29_CR3","unstructured":"Baryannis, G., Plexousakis, D.: Automated Web Service Composition: State of the Art and Research Challenges. Tech. Rep. October, Tech. Rep. 409, ICS-FORTH (October 2010)"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Bendersky, M., Croft, W.B.: Finding text reuse on the web. In: Proceedings of the Second ACM International Conference on Web Search and Data Mining (2009)","DOI":"10.1145\/1498759.1498835"},{"issue":"1-3","key":"29_CR5","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.tcs.2004.12.030","volume":"337","author":"P. Bille","year":"2005","unstructured":"Bille, P.: A survey on tree edit distance and related problems. Theoretical Computer Science\u00a0337(1-3), 217\u2013239 (2005)","journal-title":"Theoretical Computer Science"},{"key":"29_CR6","unstructured":"Broder, A.Z.: On the resemblance and containment of documents. In: Compression and Complexity of Sequences, SEQUENCES 1997 (1997)"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Chawathe, S., Garcia-Molina, H.: Meaningful change detection in structured data. ACM SIGMOD Record, 26\u201337 (1997)","DOI":"10.1145\/253262.253266"},{"key":"29_CR8","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1561\/1900000006","volume":"1","author":"J. Cheney","year":"2009","unstructured":"Cheney, J., Chiticariu, L., Tan, W.C.: Provenance in databases: Why, how, and where. Found. Trends Databases\u00a01, 379\u2013474 (2009)","journal-title":"Found. Trends Databases"},{"key":"29_CR9","unstructured":"Deolalikar, V., Laffitte, H.: Provenance as data mining: combining file system metadata with content analysis. In: First Workshop on Theory and Practice of Provenance, p. 10. USENIX Association (2009)"},{"issue":"3","key":"29_CR10","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1609\/aimag.v31i3.2303","volume":"31","author":"D. Ferrucci","year":"2010","unstructured":"Ferrucci, D., Brown, E., Chu-Carroll, J., Fan, J., Gondek, D., Kalyanpur, A.A., Lally, A., Murdock, J.W., Nyberg, E., Prager, J., Schlaefer, N., Welty, C.: Building Watson: An overview of the DeepQA project. AI Magazine\u00a031(3), 59\u201379 (2010)","journal-title":"AI Magazine"},{"key":"29_CR11","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MCSE.2008.79","volume":"10","author":"J. Freire","year":"2008","unstructured":"Freire, J., Koop, D., Santos, E., Silva, C.T.: Provenance for computational tasks: A survey. Computing in Science and Engg.\u00a010, 11\u201321 (2008)","journal-title":"Computing in Science and Engg."},{"issue":"5","key":"29_CR12","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1002\/cpe.1247","volume":"20","author":"J. Frew","year":"2008","unstructured":"Frew, J., Metzger, D., Slaughter, P.: Automatic capture and reconstruction of computational provenance. Concurrency and Computation: Practice and Experience\u00a020(5), 485\u2013496 (2008)","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"1","key":"29_CR13","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s10044-008-0141-y","volume":"13","author":"X. Gao","year":"2009","unstructured":"Gao, X., Xiao, B., Tao, D., Li, X.: A survey of graph edit distance. Pattern Analysis and Applications\u00a013(1), 113\u2013129 (2009)","journal-title":"Pattern Analysis and Applications"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Govindan, K., Wang, X., Khan, M., Dogan, G., Zeng, K., Davis, C.: PRONET: Network Trust Assessment Based on Incomplete Provenance. In: IEEE The Premier International Conference for Military Communications (2011)","DOI":"10.1109\/MILCOM.2011.6127466"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Groth, P., Gil, Y., Magliacane, S.: Automatic Metadata Annotation through Reconstructing Provenance. In: ESWC (2012)","DOI":"10.1007\/978-3-642-35173-0_29"},{"issue":"5","key":"29_CR16","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1002\/cpe.1227","volume":"20","author":"D.A. Holland","year":"2008","unstructured":"Holland, D.A., Seltzer, M.I., Braun, U., Muniswamy-Reddy, K.K.: Passing the provenance challenge. Concurrency and Computation: Practice and Experience\u00a020(5), 531\u2013540 (2008)","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Hu, B., Rakthanmanon, T., Campana, B., Mueen, A., Keogh, E.: Image mining of historical manuscripts to establish provenance. In: SIAM Conference on Data Mining, SDM (2012)","DOI":"10.1137\/1.9781611972825.69"},{"key":"29_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-642-23091-2_11","volume-title":"Database and Expert Systems Applications","author":"M.R. Huq","year":"2011","unstructured":"Huq, M.R., Wombacher, A., Apers, P.M.G.: Inferring Fine-Grained Data Provenance in Stream Data Processing: Reduced Storage Cost, High Accuracy. In: Hameurlain, A., Liddle, S.W., Schewe, K.-D., Zhou, X. (eds.) DEXA 2011, Part II. LNCS, vol.\u00a06861, pp. 118\u2013127. Springer, Heidelberg (2011)"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Lux, M., Chatzichristofis, S.A.: Lire: lucene image retrieval: an extensible java cbir library. In: Proceedings of the 16th ACM International Conference on Multimedia, pp. 1085\u20131088 (2008)","DOI":"10.1145\/1459359.1459577"},{"key":"29_CR20","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1561\/1800000010","volume":"2","author":"L. Moreau","year":"2010","unstructured":"Moreau, L.: The foundations for provenance on the web. Found. Trends Web Sci.\u00a02, 99\u2013241 (2010)","journal-title":"Found. Trends Web Sci."},{"key":"29_CR21","unstructured":"Moreau, L., Missier, P.: PROV-DM: The PROV Data Model, \n                    \n                      http:\/\/www.w3.org\/TR\/prov-dm\/"},{"key":"29_CR22","unstructured":"Nies, T.D., Coppens, S., Deursen, D.V., Mannens, E., Walle, R.V.D.: Automatic Discovery of High-Level Provenance using Semantic Similarity. In: IPAW 2012 (2012)"},{"key":"29_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-540-30475-3_19","volume-title":"The Semantic Web \u2013 ISWC 2004","author":"N.F. Noy","year":"2004","unstructured":"Noy, N.F., Kunnatur, S., Klein, M., Musen, M.A.: Tracking Changes During Ontology Evolution. In: McIlraith, S.A., Plexousakis, D., van Harmelen, F. (eds.) ISWC 2004. LNCS, vol.\u00a03298, pp. 259\u2013273. Springer, Heidelberg (2004)"},{"key":"29_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-540-30581-1_5","volume-title":"Semantic Web Services and Web Process Composition","author":"J. Rao","year":"2005","unstructured":"Rao, J., Su, X.: A Survey of Automated Web Service Composition Methods. In: Cardoso, J., Sheth, A.P. (eds.) SWSWPC 2004. LNCS, vol.\u00a03387, pp. 43\u201354. Springer, Heidelberg (2005)"},{"key":"29_CR25","doi-asserted-by":"crossref","unstructured":"Wu, B., Szekely, P., Knoblock, C.A.: Learning data transformation rules through examples: Preliminary results. In: Ninth International Workshop on Information Integration on the Web, IIWeb 2012 (2012)","DOI":"10.1145\/2331801.2331809"},{"key":"29_CR26","doi-asserted-by":"crossref","unstructured":"Zhao, J., Gomadam, K., Prasanna, V.: Predicting Missing Provenance using Semantic Associations in Reservoir Engineering. In: 2011 Fifth IEEE International Conference on Semantic Computing (ICSC), pp. 141\u2013148. IEEE (2011)","DOI":"10.1109\/ICSC.2011.42"}],"container-title":["Lecture Notes in Computer Science","The Semantic Web \u2013 ISWC 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35173-0_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T10:02:22Z","timestamp":1557309742000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35173-0_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642351723","9783642351730"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35173-0_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}