{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:49:46Z","timestamp":1773481786466,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,9]],"date-time":"2017-05-09T00:00:00Z","timestamp":1494288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1302212 and 1547360"],"award-info":[{"award-number":["1302212 and 1547360"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Simons Institute for Theory of Computing","award":["Visiting Scientist"],"award-info":[{"award-number":["Visiting Scientist"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,9]]},"DOI":"10.1145\/3034786.3056125","type":"proceedings-article","created":{"date-parts":[[2017,5,10]],"date-time":"2017-05-10T18:09:00Z","timestamp":1494439740000},"page":"93-99","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["The Semiring Framework for Database Provenance"],"prefix":"10.1145","author":[{"given":"Todd J.","family":"Green","sequence":"first","affiliation":[{"name":"LogicBlox Inc., Atlanta, GA, USA"}]},{"given":"Val","family":"Tannen","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,5,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806429"},{"key":"e_1_3_2_1_2_1","volume-title":"6th Workshop on the Theory and Practice of Provenance, TaPP'14","author":"Ainy E.","year":"2014","unstructured":"E. Ainy , S. B. Davidson , D. Deutch , and T. Milo . Approximated provenance for complex applications . In 6th Workshop on the Theory and Practice of Provenance, TaPP'14 , Cologne, Germany, June 12--13 , 2014 , 2014. E. Ainy, S. B. Davidson, D. Deutch, and T. Milo. Approximated provenance for complex applications. In 6th Workshop on the Theory and Practice of Provenance, TaPP'14, Cologne, Germany, June 12--13, 2014, 2014."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17819-1_6"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14778\/2095686.2095693"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989284.1989303"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2389241.2389249"},{"key":"e_1_3_2_1_7_1","volume-title":"3rd Workshop on the Theory and Practice of Provenance, TaPP'11","author":"Amsterdamer Y.","year":"2011","unstructured":"Y. Amsterdamer , D. Deutch , and V. Tannen . On the limitations of provenance for queries with difference . In 3rd Workshop on the Theory and Practice of Provenance, TaPP'11 , Heraklion, Crete, Greece, June 20--21 , 2011 , 2011. See also CoRR abs\/1105.2255. Y. Amsterdamer, D. Deutch, and V. Tannen. On the limitations of provenance for queries with difference. In 3rd Workshop on the Theory and Practice of Provenance, TaPP'11, Heraklion, Crete, Greece, June 20--21, 2011, 2011. See also CoRR abs\/1105.2255."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989284.1989302"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1182635.1164209"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/993462"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/256303.256306"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498289"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11965893_15"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/645504.656274"},{"key":"e_1_3_2_1_15_1","volume-title":"Conference on Innovative Data Systems Research (CIDR'17)","author":"Chen A.","year":"2017","unstructured":"A. Chen , Y. Wu , A. Haeberlen , B. T. Loo , and W. Zhou . Data provenance at internet scale: Architecture, experiences, and the road ahead . In Conference on Innovative Data Systems Research (CIDR'17) , Jan. 2017 . A. Chen, Y. Wu, A. Haeberlen, B. T. Loo, and W. Zhou. Data provenance at internet scale: Architecture, experiences, and the road ahead. In Conference on Innovative Data Systems Research (CIDR'17), Jan. 2017."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1561\/1900000006"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639950.1640064"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/846219.847324"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/357775.357777"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536222.2536239"},{"issue":"4","key":"e_1_3_2_1_21_1","first-page":"44","article-title":"ascher, T. M. McPhillips, S. Bowers, M. K. Anand, and J. Freire. Provenance in scientific workflow systems","volume":"30","author":"Davidson S. B.","year":"2007","unstructured":"S. B. Davidson , S. C. Boulakia , A. Eyal , B. Lud\\ \" ascher, T. M. McPhillips, S. Bowers, M. K. Anand, and J. Freire. Provenance in scientific workflow systems . IEEE Data Eng. Bull. , 30 ( 4 ): 44 -- 50 , 2007 . S. B. Davidson, S. C. Boulakia, A. Eyal, B. Lud\\\"ascher, T. M. McPhillips, S. Bowers, M. K. Anand, and J. Freire. Provenance in scientific workflow systems. IEEE Data Eng. Bull., 30(4):44--50, 2007.","journal-title":"IEEE Data Eng. Bull."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498344"},{"key":"e_1_3_2_1_23_1","volume-title":"CIDR","author":"Deutch D.","year":"2013","unstructured":"D. Deutch , Z. G. Ives , T. Milo , and V. Tannen . Caravan: Provisioning for what-if analysis . In CIDR , 2013 . D. Deutch, Z. G. Ives, T. Milo, and V. Tannen. Caravan: Provisioning for what-if analysis. In CIDR, 2013."},{"key":"e_1_3_2_1_24_1","first-page":"201","volume-title":"Proc. 17th International Conference on Database Theory (ICDT)","author":"Deutch D.","year":"2014","unstructured":"D. Deutch , T. Milo , S. Roy , and V. Tannen . Circuits for datalog provenance . In Proc. 17th International Conference on Database Theory (ICDT) , Athens, Greece, March 24--28 , 2014 ., pages 201 -- 212 , 2014. D. Deutch, T. Milo, S. Roy, and V. Tannen. Circuits for datalog provenance. In Proc. 17th International Conference on Database Theory (ICDT), Athens, Greece, March 24--28, 2014., pages 201--212, 2014."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-015-0390-5"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2401764"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376916.1376954"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jal.2009.09.001"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810037"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514894.1514930"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00224-011-9327-6"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00224-011-9323-x"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1325851.1325929"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1265530.1265535"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1462571.1462577"},{"key":"e_1_3_2_1_36_1","first-page":"107","volume-title":"CIDR 2005, Second Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 4--7, 2005, Online Proceedings","author":"Ives Z. G.","year":"2005","unstructured":"Z. G. Ives , N. Khandelwal , A. Kapur , and M. Cakir . ORCHESTRA: rapid, collaborative sharing of dynamic data . In CIDR 2005, Second Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 4--7, 2005, Online Proceedings , pages 107 -- 118 , 2005 . Z. G. Ives, N. Khandelwal, A. Kapur, and M. Cakir. ORCHESTRA: rapid, collaborative sharing of dynamic data. In CIDR 2005, Second Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 4--7, 2005, Online Proceedings, pages 107--118, 2005."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807269"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807085.1807100"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.2000.1713"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592785"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786851"},{"key":"e_1_3_2_1_42_1","unstructured":"M. Naik. Private communication.  M. Naik. Private communication."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/1098690"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/2031527"},{"key":"e_1_3_2_1_45_1","volume-title":"ICDT","author":"Sundarmurthy B.","year":"2017","unstructured":"B. Sundarmurthy , P. Koutris , W. Lang , J. Naughton , and V. Tannen . m-tables: Representing missing data . In ICDT , 2017 . To appear. B. Sundarmurthy, P. Koutris, W. Lang, J. Naughton, and V. Tannen. m-tables: Representing missing data. In ICDT, 2017. To appear."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1739041.1739043"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1007\/978-3-642-41660-6_26","volume-title":"Search of Elegance in the Theory and Practice of Computation - Essays Dedicated to Peter Buneman","author":"Tannen V.","year":"2013","unstructured":"V. Tannen . Provenance propagation in complex queries . In In Search of Elegance in the Theory and Practice of Computation - Essays Dedicated to Peter Buneman , pages 483 -- 493 , 2013 . V. Tannen. Provenance propagation in complex queries. In In Search of Elegance in the Theory and Practice of Computation - Essays Dedicated to Peter Buneman, pages 483--493, 2013."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3051528.3051533"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI'17)","author":"Wu Y.","year":"2017","unstructured":"Y. Wu , A. Chen , A. Haeberlen , W. Zhou , and B. T. Loo . Automated network repair with meta provenance . In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI'17) , Mar. 2017 . Y. Wu, A. Chen, A. Haeberlen, W. Zhou, and B. T. Loo. Automated network repair with meta provenance. In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI'17), Mar. 2017."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626335"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026947.3026948"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594327"},{"key":"e_1_3_2_1_53_1","volume-title":"Proceedings of the 3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP'11)","author":"Zhou W.","year":"2011","unstructured":"W. Zhou , L. Ding , A. Haeberlen , Z. Ives , and B. T. Loo . TAP: Time-aware provenance for distributed systems . In Proceedings of the 3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP'11) , June 2011 . W. Zhou, L. Ding, A. Haeberlen, Z. Ives, and B. T. Loo. TAP: Time-aware provenance for distributed systems. In Proceedings of the 3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP'11), June 2011."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043584"}],"event":{"name":"SIGMOD\/PODS'17: International Conference on Management of Data","location":"Chicago Illinois USA","acronym":"SIGMOD\/PODS'17","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the 36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3034786.3056125","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3034786.3056125","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3034786.3056125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:05Z","timestamp":1750218605000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3034786.3056125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,9]]},"references-count":54,"alternative-id":["10.1145\/3034786.3056125","10.1145\/3034786"],"URL":"https:\/\/doi.org\/10.1145\/3034786.3056125","relation":{},"subject":[],"published":{"date-parts":[[2017,5,9]]},"assertion":[{"value":"2017-05-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}