{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:07:10Z","timestamp":1772906830351,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,6,21]],"date-time":"2010-06-21T00:00:00Z","timestamp":1277078400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000105","name":"Office of Cyberinfrastructure","doi-asserted-by":"publisher","award":["OCI-0722068"],"award-info":[{"award-number":["OCI-0722068"]}],"id":[{"id":"10.13039\/100000105","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,6,21]]},"DOI":"10.1145\/1851476.1851567","type":"proceedings-article","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T12:04:33Z","timestamp":1285157073000},"page":"613-621","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Efficient querying of distributed provenance stores"],"prefix":"10.1145","author":[{"given":"Ashish","family":"Gehani","sequence":"first","affiliation":[{"name":"SRI International, Menlo Park, CA"}]},{"given":"Minyoung","family":"Kim","sequence":"additional","affiliation":[{"name":"SRI International, Menlo Park, CA"}]},{"given":"Tanu","family":"Malik","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]}],"member":"320","published-online":{"date-parts":[[2010,6,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"32nd International Conference on Very Large Data Bases","author":"Agrawal P.","year":"2006"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564765"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11890850_4"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2003.1260881"},{"key":"e_1_3_2_1_5_1","unstructured":"}}Ask.com http:\/\/www.ask.com  }}Ask.com http:\/\/www.ask.com"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11890850_18"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/297805.297827"},{"key":"e_1_3_2_1_9_1","volume-title":"Data Engineering","author":"Chapman A.","year":"2008"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1032647.1033304"},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX Symposium on Internet Technology and Systems","author":"Cao P.","year":"1997"},{"key":"e_1_3_2_1_12_1","volume-title":"International Conference on Very Large Data Bases","author":"Dar S.","year":"1996"},{"key":"e_1_3_2_1_13_1","unstructured":"}}Facebook http:\/\/www.facebook.com  }}Facebook http:\/\/www.facebook.com"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/800263.809204"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSDM.2002.1029704"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1350745.1350759"},{"key":"e_1_3_2_1_17_1","volume-title":"23rd Annual Computer Security Applications Conference (ACSAC), IEEE Computer Society","author":"Gehani Ashish","year":"2007"},{"key":"e_1_3_2_1_18_1","unstructured":"}}Ashish Gehani Minyoung Kim and Jian Zhang Steps toward managing lineage metadata in Grid clusters Theory and Practice of Provenance affiliated with the 7th USENIX Conference on File and Storage Technologies 2009.   }}Ashish Gehani Minyoung Kim and Jian Zhang Steps toward managing lineage metadata in Grid clusters Theory and Practice of Provenance affiliated with the 7th USENIX Conference on File and Storage Technologies 2009."},{"key":"e_1_3_2_1_19_1","unstructured":"}}P. Groth S. Miles and L. Moreau Preserv: Provenance recording for services UK OST e-Science Second All Hands Meeting 2005.  }}P. Groth S. Miles and L. Moreau Preserv: Provenance recording for services UK OST e-Science Second All Hands Meeting 2005."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376716"},{"key":"e_1_3_2_1_21_1","volume-title":"2nd International Provenance and Annotation Workshop","author":"Holland D. A.","year":"2008"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258666"},{"key":"e_1_3_2_1_23_1","volume-title":"International Conference on Distributed Computing Systems","author":"Jin S.","year":"2000"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(00)00312-1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564695"},{"key":"e_1_3_2_1_26_1","unstructured":"}}Aditya Kashyap File System Extensibility and Reliability Using an In-kernel Database Master's Thesis State University of New York Stony Brook 2004.  }}Aditya Kashyap File System Extensibility and Reliability Using an In-kernel Database Master's Thesis State University of New York Stony Brook 2004."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.206"},{"issue":"2","key":"e_1_3_2_1_28_1","volume":"49","author":"Kernighan B. W.","year":"1970","journal-title":"An effficient heuristic procedure for partitioning graphs, Bell System Technical Journal"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.270"},{"key":"e_1_3_2_1_31_1","unstructured":"}}LinkedIn http:\/\/www.linkedin.com  }}LinkedIn http:\/\/www.linkedin.com"},{"key":"e_1_3_2_1_32_1","volume-title":"Conference on Innovative Data Systems Research","author":"Malik T.","year":"2003"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.30"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/E-SCIENCE.2007.22"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1329125.1329185"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.v20:5"},{"key":"e_1_3_2_1_37_1","volume-title":"Workshop on Internet Server Performance","author":"Niclausse N.","year":"1998"},{"key":"e_1_3_2_1_38_1","unstructured":"}}Novel Information Gathering and Harvesting Techniques for Intelligence in Global Autonomous Language Exploitation http:\/\/www.speech.sri.com\/projects\/GALE\/  }}Novel Information Gathering and Harvesting Techniques for Intelligence in Global Autonomous Language Exploitation http:\/\/www.speech.sri.com\/projects\/GALE\/"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2004.36"},{"issue":"4","key":"e_1_3_2_1_40_1","volume":"33","author":"Rajasekar A.","year":"2003","journal-title":"Storage resource broker-managing distributed data in a Grid, Computer Society of India Journal"},{"key":"e_1_3_2_1_41_1","volume-title":"USENIX Annual Technical Conference","author":"Muniswamy-Reddy Kiran-Kumar","year":"2006"},{"key":"e_1_3_2_1_42_1","unstructured":"}}Lineage File System http:\/\/crypto.stanford.edu\/~cao\/lineage.html  }}Lineage File System http:\/\/crypto.stanford.edu\/~cao\/lineage.html"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1084805.1084812"},{"key":"e_1_3_2_1_44_1","unstructured":"}}Support for Provenance Auditing in Distributed Environments http:\/\/spade.csl.sri.com\/  }}Support for Provenance Auditing in Distributed Environments http:\/\/spade.csl.sri.com\/"},{"key":"e_1_3_2_1_45_1","volume-title":"Science","volume":"2001","author":"Szalay A."},{"key":"e_1_3_2_1_46_1","volume-title":"John Wiley","author":"Thain Douglas","year":"2003"},{"key":"e_1_3_2_1_47_1","volume-title":"Bulletin of the American Astronomical Society Meeting","volume":"34","author":"Thakar A. R.","year":"2002"},{"key":"e_1_3_2_1_48_1","volume-title":"International Conference on Data Engineering","author":"Ten Team The Times","year":"2000"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/283554.283259"},{"key":"e_1_3_2_1_50_1","volume-title":"Symposium on Discrete Algorithms","author":"N.","year":"1991"}],"event":{"name":"HPDC '10: The 19th International Symposium on High Performance Distributed Computing","location":"Chicago Illinois","acronym":"HPDC '10","sponsor":["University of Arizona University of Arizona","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1851476.1851567","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1851476.1851567","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:30Z","timestamp":1750246770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1851476.1851567"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,21]]},"references-count":49,"alternative-id":["10.1145\/1851476.1851567","10.1145\/1851476"],"URL":"https:\/\/doi.org\/10.1145\/1851476.1851567","relation":{},"subject":[],"published":{"date-parts":[[2010,6,21]]},"assertion":[{"value":"2010-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}