{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:14:30Z","timestamp":1763507670098,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,29]],"date-time":"2012-10-29T00:00:00Z","timestamp":1351468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,29]]},"DOI":"10.1145\/2396761.2398511","type":"proceedings-article","created":{"date-parts":[[2012,11,15]],"date-time":"2012-11-15T16:38:00Z","timestamp":1352997480000},"page":"1752-1756","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["A hybrid approach for efficient provenance storage"],"prefix":"10.1145","author":[{"given":"Yulai","family":"Xie","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Dan","family":"Feng","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Zhipeng","family":"Tan","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Lei","family":"Chen","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Kiran-Kumar","family":"Muniswamy-Reddy","sequence":"additional","affiliation":[{"name":"Harvard University, Boston, MA, USA"}]},{"given":"Yan","family":"Li","sequence":"additional","affiliation":[{"name":"University of California, Santa Cruz, Santa Cruz, CA, USA"}]},{"given":"Darrell D.E.","family":"Long","sequence":"additional","affiliation":[{"name":"University of California, Santa Cruz, Santa Cruz, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988752"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES-I.2009.54"},{"key":"e_1_3_2_1_3_1","unstructured":"Provenance challenge. http:\/\/twiki.ipaw.info\/bin\/view\/Challenge.  Provenance challenge. http:\/\/twiki.ipaw.info\/bin\/view\/Challenge."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376715"},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. of the 2nd International Workshop on Traceability and Compliance of Semi-Structured Processes, in conjunction with the 9th International Conference on Business Process Management","author":"Cheah Y.-W.","year":"2011","unstructured":"Y.-W. Cheah , B. Plale , J. Kendall-Morwick , D. Leake , and L. Ramakrishnan . A noisy 10GB provenance database . In Proc. of the 2nd International Workshop on Traceability and Compliance of Semi-Structured Processes, in conjunction with the 9th International Conference on Business Process Management , 2011 . Y.-W. Cheah, B. Plale, J. Kendall-Morwick, D. Leake, and L. Ramakrishnan. A noisy 10GB provenance database. In Proc. of the 2nd International Workshop on Traceability and Compliance of Semi-Structured Processes, in conjunction with the 9th International Conference on Business Process Management, 2011."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.2005.1520960"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkl859"},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. USENIX'06","author":"Muniswamy-Reddy K.-K.","year":"2006","unstructured":"K.-K. Muniswamy-Reddy , D. A. Holland , U. Braun , and M. I. Seltzer . Provenance-aware storage systems . In Proc. USENIX'06 , 2006 . K.-K. Muniswamy-Reddy, D. A. Holland, U. Braun, and M. I. Seltzer. Provenance-aware storage systems. In Proc. USENIX'06, 2006."},{"key":"e_1_3_2_1_9_1","unstructured":"Provenance aware service oriented architecture. http:\/\/twiki.pasoa.ecs.soton.ac.uk\/bin\/view\/PASOA\/WebHome.  Provenance aware service oriented architecture. http:\/\/twiki.pasoa.ecs.soton.ac.uk\/bin\/view\/PASOA\/WebHome."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2006.5"},{"key":"e_1_3_2_1_11_1","unstructured":"Taverna workow management system. http:\/\/www.taverna.org.uk\/.  Taverna workow management system. http:\/\/www.taverna.org.uk\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Tupelo semantic content repository. http:\/\/leovip217.ncsa.uiuc.edu\/.  Tupelo semantic content repository. http:\/\/leovip217.ncsa.uiuc.edu\/."}],"event":{"name":"CIKM'12: 21st ACM International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Maui Hawaii USA","acronym":"CIKM'12"},"container-title":["Proceedings of the 21st ACM international conference on Information and knowledge management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2396761.2398511","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2396761.2398511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:14Z","timestamp":1750238474000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2396761.2398511"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,29]]},"references-count":12,"alternative-id":["10.1145\/2396761.2398511","10.1145\/2396761"],"URL":"https:\/\/doi.org\/10.1145\/2396761.2398511","relation":{},"subject":[],"published":{"date-parts":[[2012,10,29]]},"assertion":[{"value":"2012-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}