{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,23]],"date-time":"2025-11-23T15:02:39Z","timestamp":1763910159492,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/escience.2012.6404480","type":"proceedings-article","created":{"date-parts":[[2013,1,17]],"date-time":"2013-01-17T20:25:43Z","timestamp":1358454343000},"page":"1-8","source":"Crossref","is-referenced-by-count":14,"title":["Provenance analysis: Towards quality provenance"],"prefix":"10.1109","author":[{"given":"You-Wei","family":"Cheah","sequence":"first","affiliation":[]},{"given":"Beth","family":"Plale","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2007.106"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1739041.1739078"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376715"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376716"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1516360.1516470"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.4018\/jwsr.2008040101"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.2005.1520960"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.07.005"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1084805.1084812"},{"key":"21","article-title":"Provenance aware storage systems","author":"muniswamy-reddy","year":"0","journal-title":"Proceedings of the 2006 USENIX Annual Technical Conf June 2006"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142574"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.2218\/ijdc.v7i1.221"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2011.42"},{"key":"24","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1007\/11767138_20","article-title":"Workflow Exception Patterns","volume":"4001","author":"russell","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376772"},{"journal-title":"Challenges and Opportunities in Big Data","article-title":"A community white paper developed by leading researchers across the United States","year":"0","key":"26"},{"year":"0","key":"27"},{"journal-title":"NASA Earth Observing System Data and Information System Data Processing Levels","year":"0","key":"28"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85259-9_6"},{"key":"2","first-page":"180","article-title":"Using Provenance for Personalized Quality Ranking of Scientific Datasets","volume":"18","author":"simmhan","year":"2011","journal-title":"Intl Journal of Computers and Their Applications (IJCA)"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20652"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(02)00043-5"},{"key":"7","first-page":"100","article-title":"Business Provenance - A Technology to Increase Traceability of End-to-End Operations","author":"curbera","year":"2008","journal-title":"16th Intl Conference on Cooperative Information Systems (CoopIS'08)"},{"key":"6","article-title":"Using web data provenance for quality assessment","author":"hartig","year":"0","journal-title":"Proceedings of the 1st Intl Workshop on the Role of Semantic Web in Provenance Management ISWC 2009"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28115-0_35"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45921-9","author":"naumann","year":"2002","journal-title":"Quality-Driven Query Answering for Integrated Information Systems"},{"key":"9","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1080\/07421222.2003.11045775","article-title":"Knowing-why about data processes and data quality","volume":"20","author":"lee","year":"2003","journal-title":"Journal of Management Information Systems"},{"key":"8","article-title":"The Continuum of Metadata Quality: Defining, Expressing, Exploiting","author":"bruce","year":"2004","journal-title":"Metadata in Practice"}],"event":{"name":"2012 IEEE 8th International Conference on E-Science (e-Science)","start":{"date-parts":[[2012,10,8]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2012,10,12]]}},"container-title":["2012 IEEE 8th International Conference on E-Science"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6389598\/6404405\/06404480.pdf?arnumber=6404480","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T12:28:17Z","timestamp":1562588897000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6404480\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/escience.2012.6404480","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}