{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T13:11:50Z","timestamp":1759497110707,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/escience.2013.39","type":"proceedings-article","created":{"date-parts":[[2014,1,3]],"date-time":"2014-01-03T17:52:45Z","timestamp":1388771565000},"page":"180-187","source":"Crossref","is-referenced-by-count":9,"title":["Dependency Provenance in Agent Based Modeling"],"prefix":"10.1109","author":[{"given":"Peng","family":"Chen","sequence":"first","affiliation":[]},{"given":"Beth","family":"Plale","sequence":"additional","affiliation":[]},{"given":"Tom","family":"Evans","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201211"},{"journal-title":"Wolf Sheep Predation Model","year":"1997","author":"wilensky","key":"15"},{"journal-title":"NetLogo","year":"1999","author":"wilensky","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1084805.1084812"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1463434.1463515"},{"key":"11","first-page":"101","article-title":"Spade: Support for provenance auditing in distributed environments","author":"gehani","year":"2012","journal-title":"Proceedings of the 13th International Middleware Conference"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2457317.2457371"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29931-5_3"},{"journal-title":"PIN Provenance in NetLogo","year":"2013","key":"2"},{"journal-title":"Neo4j","year":"2013","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75987-4_10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44503-X_20"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1080\/1747423X.2011.558598"},{"journal-title":"Prov-DM The Prov data model","year":"2012","author":"belhajjame","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecolmodel.2011.07.010"},{"key":"9","first-page":"22","article-title":"Program slicing and data provenance","volume":"30","author":"cheney","year":"2007","journal-title":"IEEE Data Eng Bull"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/HiPC.2012.6507517"}],"event":{"name":"2013 IEEE 9th International Conference on eScience (eScience)","start":{"date-parts":[[2013,10,22]]},"location":"Beijing, China","end":{"date-parts":[[2013,10,25]]}},"container-title":["2013 IEEE 9th International Conference on e-Science"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6680792\/6683875\/06683906.pdf?arnumber=6683906","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T01:00:47Z","timestamp":1490230847000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6683906\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/escience.2013.39","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}