{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T18:42:23Z","timestamp":1770489743671,"version":"3.49.0"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,2,15]],"date-time":"2018-02-15T00:00:00Z","timestamp":1518652800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/I011587\/1"],"award-info":[{"award-number":["EP\/I011587\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/J017728\/2"],"award-info":[{"award-number":["EP\/J017728\/2"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Data Min Knowl Disc"],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1007\/s10618-017-0549-3","type":"journal-article","created":{"date-parts":[[2018,2,15]],"date-time":"2018-02-15T08:27:03Z","timestamp":1518683223000},"page":"708-735","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Provenance Network Analytics"],"prefix":"10.1007","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4937-2473","authenticated-orcid":false,"given":"Trung Dong","family":"Huynh","sequence":"first","affiliation":[]},{"given":"Mark","family":"Ebden","sequence":"additional","affiliation":[]},{"given":"Joel","family":"Fischer","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Roberts","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3494-120X","authenticated-orcid":false,"given":"Luc","family":"Moreau","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,15]]},"reference":[{"key":"549_CR1","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-1-4419-6045-0_2","volume-title":"Managing and mining graph data, advances in database systems, chap 2","author":"CC Aggarwal","year":"2010","unstructured":"Aggarwal CC, Wang H (2010) Graph data management and mining: a survey of algorithms and applications. In: Aggarwal CC, Wang H (eds) Managing and mining graph data, advances in database systems, chap 2, vol 40. Springer, Boston, pp 13\u201368. https:\/\/doi.org\/10.1007\/978-1-4419-6045-0_2"},{"issue":"3","key":"549_CR2","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2015","unstructured":"Akoglu L, Tong H, Koutra D (2015) Graph based anomaly detection and description: a survey. Data Min Knowl Discov 29(3):626\u2013688. https:\/\/doi.org\/10.1007\/s10618-014-0365-y","journal-title":"Data Min Knowl Discov"},{"key":"549_CR3","doi-asserted-by":"publisher","unstructured":"Alper P, Belhajjame K, Goble CA, Karagoz P (2013) Enhancing and abstracting scientific workflow provenance for data publishing. In: Proceedings of the joint EDBT\/ICDT 2013 workshops, ACM, New York, NY, USA, EDBT\u201913, pp 313\u2013318. https:\/\/doi.org\/10.1145\/2457317.2457370","DOI":"10.1145\/2457317.2457370"},{"key":"549_CR4","doi-asserted-by":"publisher","unstructured":"Altintas I, Barney O, Jaeger-Frank E (2006) Provenance collection support in the Kepler scientific workflow system. In: Proceedings of the 2006 international conference on provenance and annotation of data, Springer, IPAW\u201906, pp 118\u2013132. https:\/\/doi.org\/10.1007\/11890850_14","DOI":"10.1007\/11890850_14"},{"key":"549_CR5","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-642-17819-1_6","volume-title":"Provenance and annotation of data and processes","author":"I Altintas","year":"2010","unstructured":"Altintas I, Anand MK, Crawl D, Bowers S, Belloum A, Missier P, Lud\u00e4scher B, Goble CA, Sloot PMA (2010) Understanding collaborative studies through interoperable workflow provenance. In: McGuinness DL, Michaelis JR, Moreau L (eds) Provenance and annotation of data and processes. Springer, Berlin, Heidelberg, pp 42\u201358"},{"key":"549_CR6","doi-asserted-by":"publisher","first-page":"193","DOI":"10.7551\/mitpress\/9780262033589.003.0011","volume-title":"Semi-supervised learning","author":"Y Bengio","year":"2006","unstructured":"Bengio Y, Delalleau O, Roux NL (2006) Label propagation and quadratic criterion. In: Olivier C, Sch\u00f6lkopf B, Zien A (eds) Semi-supervised learning. MIT Press, Cambridge, pp 193\u2013216. https:\/\/doi.org\/10.7551\/mitpress\/9780262033589.003.0011"},{"key":"549_CR7","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-540-89965-5_9","volume-title":"Provenance and annotation of data and processes, Lecture Notes in Computer Science, chap 9","author":"S Bowers","year":"2008","unstructured":"Bowers S, McPhillips T, Riddle S, Anand MK, Lud\u00e4scher B (2008) Kepler\/pPOD: Scientific workflow and provenance support for assembling the tree of life. In: Freire J, Koop D, Moreau L (eds) Provenance and annotation of data and processes, Lecture Notes in Computer Science, chap 9, vol 5272. Springer, Berlin, pp 70\u201377. https:\/\/doi.org\/10.1007\/978-3-540-89965-5_9"},{"key":"549_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/b106453","volume-title":"Network analysis: methodological foundations","author":"U Brandes","year":"2005","unstructured":"Brandes U, Erlebach T (2005) Network analysis: methodological foundations. Springer, Berlin"},{"key":"549_CR9","volume-title":"Classification and regression trees","author":"L Breiman","year":"1984","unstructured":"Breiman L, Friedman J, Olshen R, Stone C (1984) Classification and regression trees. Wadsworth, Belmont"},{"issue":"3","key":"549_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2196-064X-1-3","volume":"1","author":"D Ceolin","year":"2014","unstructured":"Ceolin D, Nottamkandath A, Fokkink W (2014) Efficient semi-automated assessment of annotations trustworthiness. J Trust Manag 1(3):1\u201331. https:\/\/doi.org\/10.1186\/2196-064X-1-3","journal-title":"J Trust Manag"},{"key":"549_CR11","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2011","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2011) SMOTE: Synthetic minority over-sampling technique. J Artif Intell Res 16:321\u2013357. https:\/\/doi.org\/10.1613\/jair.953","journal-title":"J Artif Intell Res"},{"key":"549_CR12","doi-asserted-by":"publisher","unstructured":"Cheah YW, Plale B (2012) Provenance analysis: towards quality provenance. In: 2012 IEEE 8th international conference on e-science, IEEE, pp 1\u20138. https:\/\/doi.org\/10.1109\/eScience.2012.6404480","DOI":"10.1109\/eScience.2012.6404480"},{"key":"549_CR13","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.future.2013.09.032","volume":"36","author":"P Chen","year":"2014","unstructured":"Chen P, Plale B, Aktas MS (2014) Temporal representation for mining scientific data provenance. Future Gener Comput Syst 36:363\u2013378. https:\/\/doi.org\/10.1016\/j.future.2013.09.032","journal-title":"Future Gener Comput Syst"},{"key":"549_CR14","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-319-16462-5_9","volume-title":"Provenance and annotation of data and processes. IPAW 2014, Lecture Notes in Computer Science","author":"J Cheney","year":"2015","unstructured":"Cheney J, Perera R (2015) An analytical survey of provenance sanitization. In: Lud\u00e4scher B, Plale B (eds) Provenance and annotation of data and processes. IPAW 2014, Lecture Notes in Computer Science, vol 8628. Springer, Cham, pp 113\u2013126. https:\/\/doi.org\/10.1007\/978-3-319-16462-5_9"},{"key":"549_CR15","unstructured":"Cheney J, Missier P, Moreau L, Nies TD (2013) Constraints of the PROV data model. W3C recommendation REC-prov-constraints-20130430, World Wide Web Consortium, http:\/\/www.w3.org\/TR\/2013\/REC-prov-constraints-20130430\/"},{"key":"549_CR16","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-319-07821-2_13","volume-title":"Frequent pattern mining, chap 13","author":"H Cheng","year":"2014","unstructured":"Cheng H, Yan X, Han J (2014) Mining graph patterns. In: Aggarwal CC, Han J (eds) Frequent pattern mining, chap 13. Springer, Berlin, pp 307\u2013338. https:\/\/doi.org\/10.1007\/978-3-319-07821-2_13"},{"key":"549_CR17","unstructured":"Chirigati F, Shasha D, Freire J (2013) Reprozip: using provenance to support computational reproducibility. In: Proceedings of the 5th USENIX conference on theory and practice of provenance, USENIX Association, Berkeley, CA, USA"},{"key":"549_CR18","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1137\/070710111","volume":"51","author":"A Clauset","year":"2009","unstructured":"Clauset A, Shalizi C, Newman M (2009) Power-law distributions in empirical data. SIAM Rev 51:661\u2013703","journal-title":"SIAM Rev"},{"key":"549_CR19","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.future.2015.01.014","volume":"49","author":"R Danger","year":"2015","unstructured":"Danger R, Curcin V, Missier P, Bryans J (2015) Access control and view generation for provenance graphs. Future Gener Comput Syst 49:8\u201327. https:\/\/doi.org\/10.1016\/j.future.2015.01.014","journal-title":"Future Gener Comput Syst"},{"issue":"4","key":"549_CR20","first-page":"44","volume":"30","author":"SB Davidson","year":"2007","unstructured":"Davidson SB, Boulakia SC, Eyal A, Lud\u00e4scher B, McPhillips TM, Bowers S, Anand MK, Freire J (2007) Provenance in scientific workflow systems. Data Eng Bull 30(4):44\u201350","journal-title":"Data Eng Bull"},{"key":"549_CR21","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-642-34222-6_13","volume-title":"Provenance and annotation of data and processes, Lecture Notes in Computer Science","author":"M Ebden","year":"2012","unstructured":"Ebden M, Huynh TD, Moreau L, Ramchurn S, Roberts S (2012) Network analysis on provenance graphs from a crowdsourcing application. In: Groth P, Frew J (eds) Provenance and annotation of data and processes, Lecture Notes in Computer Science, vol 7525. Springer, Berlin, pp 168\u2013182. https:\/\/doi.org\/10.1007\/978-3-642-34222-6_13"},{"key":"549_CR22","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-319-06498-7_4","volume-title":"COOP 2014\u2014Proceedings of the 11th international conference on the design of cooperative systems","author":"JE Fischer","year":"2014","unstructured":"Fischer JE, Jiang W, Kerne A, Greenhalgh C, Ramchurn SD, Reece S, Pantidi N, Rodden T (2014) Supporting team coordination on the ground: requirements from a mixed reality game. In: Rossitto C, Ciolfi L, Martin D, Conein B (eds) COOP 2014\u2014Proceedings of the 11th international conference on the design of cooperative systems. Springer, Nice, pp 49\u201367. https:\/\/doi.org\/10.1007\/978-3-319-06498-7_4"},{"key":"549_CR23","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-540-31955-9_8","volume-title":"Network analysis, Lecture Notes in Computer Science, chap 8","author":"M Gaertler","year":"2005","unstructured":"Gaertler M (2005) Clustering. In: Brandes U, Erlebach T (eds) Network analysis, Lecture Notes in Computer Science, chap 8, vol 3418. Springer, Berlin, pp 178\u2013215. https:\/\/doi.org\/10.1007\/978-3-540-31955-9_8"},{"issue":"1","key":"549_CR24","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MIS.2010.9","volume":"26","author":"Y Gil","year":"2011","unstructured":"Gil Y, Ratnakar V, Kim J, Gonzalez-Calero P, Groth P, Moody J, Deelman E (2011) Wings: intelligent workflow-based design of computational experiments. IEEE Intell Syst 26(1):62\u201372. https:\/\/doi.org\/10.1109\/MIS.2010.9","journal-title":"IEEE Intell Syst"},{"key":"549_CR25","unstructured":"Hussein J, Sassone V, Moreau L (2016) A template-based graph transformation system for the prov data model. In: Seventh international workshop on graph computation models GCM 2016"},{"key":"549_CR26","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-3-319-16462-5_32","volume-title":"5th international provenance and annotation workshop, IPAW 2014, Lecture Notes in Computer Science","author":"TD Huynh","year":"2015","unstructured":"Huynh TD, Moreau L (2015) ProvStore: a public provenance repository. In: Lud\u00e4scher B, Plale B (eds) 5th international provenance and annotation workshop, IPAW 2014, Lecture Notes in Computer Science, vol 8628. Springer, Cologne, pp 275\u2013277. https:\/\/doi.org\/10.1007\/978-3-319-16462-5_32"},{"key":"549_CR27","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/978-3-319-11915-1","volume-title":"The semantic web\u2014ISWC 2014, Lecture Notes in Computer Science","author":"O Inel","year":"2014","unstructured":"Inel O, Khamkham K, Cristea T, Dumitrache A (2014) CrowdTruth: machine-human computation framework for harnessing disagreement in gathering annotated data. In: Mika P, Tudorache T, Bernstein A, Welty C, Knoblock C, Vrande\u010di\u0107 D, Groth P, Noy N, Janowicz K, Goble C (eds) The semantic web\u2014ISWC 2014, Lecture Notes in Computer Science, vol 8797. Springer, Berlin, pp 486\u2013504. https:\/\/doi.org\/10.1007\/978-3-319-11915-1"},{"issue":"8","key":"549_CR28","doi-asserted-by":"publisher","first-page":"083,042","DOI":"10.1088\/1367-2630\/10\/8\/083042","volume":"10","author":"M Kaiser","year":"2008","unstructured":"Kaiser M (2008) Mean clustering coefficients: the role of isolated nodes and leafs on clustering measures for small-world networks. New J Phys 10(8):083,042. https:\/\/doi.org\/10.1088\/1367-2630\/10\/8\/083042","journal-title":"New J Phys"},{"key":"549_CR29","unstructured":"Kohavi R (1995) A study of cross-validation and bootstrap for accuracy estimation and model selection. In: Proceedings of the 14th international joint conference on artificial intelligence, vol 2. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, pp 1137\u20131143"},{"issue":"1\u20132","key":"549_CR30","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/S0004-3702(97)00043-X","volume":"97","author":"R Kohavi","year":"1997","unstructured":"Kohavi R, John GH (1997) Wrappers for feature subset selection. Artif Intell 97(1\u20132):273\u2013324. https:\/\/doi.org\/10.1016\/S0004-3702(97)00043-X","journal-title":"Artif Intell"},{"key":"549_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-88146-1","volume-title":"Statistical analysis of network data","author":"E Kolaczyk","year":"2009","unstructured":"Kolaczyk E (2009) Statistical analysis of network data. Springer, Berlin"},{"issue":"3","key":"549_CR32","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10618-005-0003-9","volume":"11","author":"M Kuramochi","year":"2005","unstructured":"Kuramochi M, Karypis G (2005) Finding frequent patterns in a large sparse graph. Data Min Knowl Discov 11(3):243\u2013271. https:\/\/doi.org\/10.1007\/s10618-005-0003-9","journal-title":"Data Min Knowl Discov"},{"key":"549_CR33","unstructured":"Lebo T, Sahoo S, McGuinness D (2013) PROV-O: the PROV ontology. Tech. Rep. REC-prov-o-20130430, World Wide Web Consortium. https:\/\/www.w3.org\/TR\/2013\/REC-prov-o-20130430\/ , W3C Recommendation"},{"issue":"6","key":"549_CR34","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1038\/nclimate2141","volume":"4","author":"X Ma","year":"2014","unstructured":"Ma X, Fox P, Tilmes C, Jacobs K, Waple A (2014) Capturing provenance of global change information. Nat Clim Change 4(6):409\u2013413. https:\/\/doi.org\/10.1038\/nclimate2141","journal-title":"Nat Clim Change"},{"key":"549_CR35","unstructured":"Margo D, Smogor R (2010) Using provenance to extract semantic file attributes. In: Proceedings of the 2nd conference on theory and practice of provenance, Berkeley, USA, USENIX Association"},{"key":"549_CR36","doi-asserted-by":"publisher","DOI":"10.1201\/b16812-42","volume-title":"Machine learning: an algorithmic perspective","author":"S Marsland","year":"2014","unstructured":"Marsland S (2014) Machine learning: an algorithmic perspective. Chapman and Hall\/CRC, London"},{"key":"549_CR37","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-16462-5_1","volume-title":"Provenance and annotation of data and processes. IPAW 2014, Lecture Notes in Computer Science","author":"P Missier","year":"2015","unstructured":"Missier P, Bryans J, Gamble C, Curcin V, Danger R (2015) ProvAbs: Model, policy, and tooling for abstracting prov graphs. Provenance and annotation of data and processes. IPAW 2014, Lecture Notes in Computer Science, vol 8628. Springer, Cham, pp 3\u201315. https:\/\/doi.org\/10.1007\/978-3-319-16462-5_1"},{"issue":"2\u2014-3","key":"549_CR38","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1561\/1800000010","volume":"2","author":"L Moreau","year":"2010","unstructured":"Moreau L (2010) The foundations for provenance on the web. Found Trends Web Sci 2(2\u2014-3):99\u2013241. https:\/\/doi.org\/10.1561\/1800000010","journal-title":"Found Trends Web Sci"},{"key":"549_CR39","doi-asserted-by":"publisher","unstructured":"Moreau L (2015) Aggregation by provenance types: a technique for summarising provenance graphs. In: Graphs as models 2015, London, UK, pp 129\u2013144. https:\/\/doi.org\/10.4204\/EPTCS.181.9","DOI":"10.4204\/EPTCS.181.9"},{"key":"549_CR40","unstructured":"Moreau L, Missier P (2013) PROV-DM: The PROV data model. Tech. Rep. REC-prov-dm-20130430, World Wide Web Consortium. http:\/\/www.w3.org\/TR\/2013\/REC-prov-dm-20130430\/ , W3C Recommendation"},{"issue":"6","key":"549_CR41","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1016\/j.future.2010.07.005","volume":"27","author":"L Moreau","year":"2011","unstructured":"Moreau L, Clifford B, Freire J, Futrelle J, Gil Y, Groth P, Kwasnikowska N, Miles S, Missier P, Myers J, Plale B, Simmhan Y, Stephan E, Van den Bussche J (2011) The open provenance model core specification (v1.1). Future Gener Comput Syst 27(6):743\u2013756. https:\/\/doi.org\/10.1016\/j.future.2010.07.005","journal-title":"Future Gener Comput Syst"},{"key":"549_CR42","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001","volume-title":"Networks: an introduction","author":"M Newman","year":"2010","unstructured":"Newman M (2010) Networks: an introduction. Oxford University Press, Oxford"},{"issue":"2","key":"549_CR43","doi-asserted-by":"publisher","first-page":"026,126","DOI":"10.1103\/PhysRevE.67.026126","volume":"67","author":"MEJ Newman","year":"2003","unstructured":"Newman MEJ (2003) Mixing patterns in networks. Phys Rev E 67(2):026,126. https:\/\/doi.org\/10.1103\/PhysRevE.67.026126","journal-title":"Phys Rev E"},{"issue":"1","key":"549_CR44","first-page":"49","volume":"25","author":"H Park","year":"2003","unstructured":"Park H (2003) Hyperlink network analysis: a new method for the study of social structure on the web. Connections 25(1):49\u201361","journal-title":"Connections"},{"key":"549_CR45","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: machine learning in Python. J Mach Learn Res 12:2825\u20132830","journal-title":"J Mach Learn Res"},{"key":"549_CR46","doi-asserted-by":"crossref","unstructured":"Ramchurn SD, Huynh TD, Venanzi M, Shi B (2013) CollabMap: Crowdsourcing maps for emergency planning. In: 5th ACM web science conference (WebSci \u201913)","DOI":"10.1145\/2464464.2464508"},{"key":"549_CR47","doi-asserted-by":"publisher","unstructured":"Ramchurn SD, Huynh TD, Wu F, Ikuno Y, Flann J, Moreau L, Fischer JE, Jiang W, Rodden T, Simpson E, Reece S, Roberts S, Jennings NR (2016) A disaster response system based on human-agent collectives. J Artif Intell Res 57:661\u2013708. https:\/\/doi.org\/10.1613\/jair.5098 , http:\/\/www.jair.org\/papers\/paper5098.html","DOI":"10.1613\/jair.5098"},{"issue":"2","key":"549_CR48","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/s10618-016-0468-8","volume":"31","author":"M Riondato","year":"2016","unstructured":"Riondato M, Garc\u00eda-Soriano D, Bonchi F (2016) Graph summarization with quality guarantees. Data Min Knowl Discov 31(2):314\u2013349. https:\/\/doi.org\/10.1007\/s10618-016-0468-8","journal-title":"Data Min Knowl Discov"},{"key":"549_CR49","volume-title":"Artificial intelligence: a modern approach","author":"S Russell","year":"2010","unstructured":"Russell S, Norvig P (2010) Artificial intelligence: a modern approach, 3rd edn. Pearson, London","edition":"3"},{"issue":"1","key":"549_CR50","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s10994-008-5089-z","volume":"75","author":"H Saigo","year":"2009","unstructured":"Saigo H, Nowozin S, Kadowaki T, Kudo T, Tsuda K (2009) gBoost: A mathematical programming approach to graph classification and regression. Mach Learn 75(1):69\u201389. https:\/\/doi.org\/10.1007\/s10994-008-5089-z","journal-title":"Mach Learn"},{"issue":"1","key":"549_CR51","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1111\/j.1467-8659.2010.01830.x","volume":"30","author":"CT Silva","year":"2011","unstructured":"Silva CT, Anderson E, Santos E, Freire J (2011) Using VisTrails and provenance for teaching scientific visualization. Comput Graph Forum 30(1):75\u201384. https:\/\/doi.org\/10.1111\/j.1467-8659.2010.01830.x","journal-title":"Comput Graph Forum"},{"key":"549_CR52","doi-asserted-by":"publisher","DOI":"10.2200\/S00590ED1V01Y201408AIM029","volume-title":"Graph-based semi-supervised learning, synthesis lectures on artificial intelligence and machine learning","author":"A Subramanya","year":"2014","unstructured":"Subramanya A, Talukdar PP (2014) Graph-based semi-supervised learning, synthesis lectures on artificial intelligence and machine learning, vol 8. Morgan & Claypool, Los Altos. https:\/\/doi.org\/10.2200\/S00590ED1V01Y201408AIM029"},{"issue":"2","key":"549_CR53","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s10458-006-5952-x","volume":"12","author":"WTL Teacy","year":"2006","unstructured":"Teacy WTL, Patel J, Jennings NR, Luck M (2006) TRAVOS: Trust and reputation in the context of inaccurate information sources. Auton Agents MultiAgent Syst 12(2):183\u2013198","journal-title":"Auton Agents MultiAgent Syst"},{"issue":"11","key":"549_CR54","doi-asserted-by":"publisher","first-page":"5160","DOI":"10.1109\/TGRS.2013.2262179","volume":"51","author":"C Tilmes","year":"2013","unstructured":"Tilmes C, Fox P, Ma X, McGuinness DL, Privette AP, Smith A, Waple A, Zednik S, Zheng JG (2013) Provenance representation for the national climate assessment in the global change information system. IEEE Trans Geosci Remote Sens 51(11):5160\u20135168. https:\/\/doi.org\/10.1109\/TGRS.2013.2262179","journal-title":"IEEE Trans Geosci Remote Sens"},{"key":"549_CR55","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-1-4419-6045-0_11","volume-title":"Managing and mining graph data, advances in database systems, chap 11","author":"K Tsuda","year":"2010","unstructured":"Tsuda K, Saigo H (2010) Graph classification. In: Aggarwal CC, Wang H (eds) Managing and mining graph data, advances in database systems, chap 11, vol 40. Springer, Berlin, pp 337\u2013363. https:\/\/doi.org\/10.1007\/978-1-4419-6045-0_11"},{"key":"549_CR56","doi-asserted-by":"publisher","unstructured":"Varlamis I, Louta M (2009) Towards a personalized blog site recommendation system: a collaborative rating approach. In: Fourth international workshop on semantic media adaptation and personalization, IEEE, San Sebastian, Spain, pp 38\u201343. https:\/\/doi.org\/10.1109\/SMAP.2009.17 , http:\/\/ieeexplore.ieee.org\/document\/5381709\/","DOI":"10.1109\/SMAP.2009.17"},{"issue":"3","key":"549_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2362383.2362387","volume":"6","author":"POS Vaz de Melo","year":"2012","unstructured":"Vaz de Melo POS, Almeida VAF, Loureiro AAF, Faloutsos C (2012) Forecasting in the NBA and other team sports. ACM Trans Knowl Discov from Data 6(3):1\u201327. https:\/\/doi.org\/10.1145\/2362383.2362387","journal-title":"ACM Trans Knowl Discov from Data"},{"key":"549_CR58","first-page":"1201","volume":"11","author":"SVN Vishwanathan","year":"2010","unstructured":"Vishwanathan SVN, Schraudolph NN, Kondor R, Borgwardt KM (2010) Graph kenrels. J Mach Learn Res 11:1201\u20131242","journal-title":"J Mach Learn Res"},{"issue":"6684","key":"549_CR59","doi-asserted-by":"publisher","first-page":"440\u20132","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts DJ, Strogatz SH (1998) Collective dynamics of \u2018small-world\u2019 networks. Nature 393(6684):440\u20132. https:\/\/doi.org\/10.1038\/30918","journal-title":"Nature"},{"issue":"W1","key":"549_CR60","doi-asserted-by":"publisher","first-page":"W557","DOI":"10.1093\/nar\/gkt328","volume":"41","author":"K Wolstencroft","year":"2013","unstructured":"Wolstencroft K, Haines R, Fellows D, Williams A, Withers D, Owen S, Soiland-Reyes S, Dunlop I, Nenadic A, Fisher P, Bhagat J, Belhajjame K, Bacall F, Hardisty A, Nieva de la Hidalga A, Balcazar Vargas MP, Sufi S, Goble C (2013) The Taverna workflow suite: designing and executing workflows of web services on the desktop, web or in the cloud. Nucleic Acids Res 41(W1):W557\u2013W561. https:\/\/doi.org\/10.1093\/nar\/gkt328","journal-title":"Nucleic Acids Res"},{"key":"549_CR61","doi-asserted-by":"publisher","unstructured":"Yan X, Cheng H, Han J, Yu PS (2008) Mining significant graph patterns by leap search. In: Proceedings of the 2008 ACM SIGMOD international conference on Management of data, ACM, pp 433\u2013444. https:\/\/doi.org\/10.1145\/1376616.1376662","DOI":"10.1145\/1376616.1376662"},{"key":"549_CR62","first-page":"154","volume-title":"Cooperative information agents","author":"B Yu","year":"2000","unstructured":"Yu B, Singh MP (2000) A social mechanism of reputation management in electronic communities. Cooperative information agents. Springer, Berlin, pp 154\u2013165"}],"container-title":["Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10618-017-0549-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-017-0549-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-017-0549-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T21:13:43Z","timestamp":1570742023000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10618-017-0549-3"}},"subtitle":["An approach to data analytics using data provenance"],"short-title":[],"issued":{"date-parts":[[2018,2,15]]},"references-count":62,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["549"],"URL":"https:\/\/doi.org\/10.1007\/s10618-017-0549-3","relation":{},"ISSN":["1384-5810","1573-756X"],"issn-type":[{"value":"1384-5810","type":"print"},{"value":"1573-756X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,15]]},"assertion":[{"value":"18 October 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}