{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:33:02Z","timestamp":1775230382195,"version":"3.50.1"},"reference-count":256,"publisher":"Emerald","issue":"3-4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,28]]},"abstract":"<jats:p>Data provenance has evolved from a niche topic to a mainstream area of research in databases and other research communities. This article gives a comprehensive introduction to data provenance. The main focus is on provenance in the context of databases. However, it will be insightful to also consider connections to related research in programming languages, software engineering, semantic web, formal logic, and other communities. The target audience are researchers and practitioners that want to gain a solid understanding of data provenance and the state-of-the-art in this research area. The article only assumes that the reader has a basic understanding of database concepts, but not necessarily any prior exposure to provenance.<\/jats:p>","DOI":"10.1561\/1900000068","type":"journal-article","created":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T05:55:00Z","timestamp":1619589300000},"page":"209-441","source":"Crossref","is-referenced-by-count":26,"title":["Data Provenance"],"prefix":"10.1561","volume":"9","author":[{"given":"Boris","family":"Glavic","sequence":"first","affiliation":[{"name":"Illinois Institute of Technology ,","place":["USA"]}]}],"member":"140","published-online":{"date-parts":[[2021,4,28]]},"reference":[{"key":"2025122814123539700_ref001","volume-title":"Foundations of Databases","author":"Abiteboul","year":"1995"},{"issue":"1","key":"2025122814123539700_ref002","first-page":"5","article-title":"An Introduction to ULDBs and the Trio System","volume":"29","author":"Agrawal","year":"2006","journal-title":"IEEE Data Engineering Bulletin"},{"key":"2025122814123539700_ref003","first-page":"516","volume-title":"Proceedings of the Thirtieth international conference on Very large data bases-Volume 30","author":"Agrawal","year":"2004"},{"key":"2025122814123539700_ref004","article-title":"HadoopProv: Towards Provenance As A First Class Citizen In MapReduce","volume-title":"TaPP","author":"Akoush","year":"2013"},{"key":"2025122814123539700_ref005","first-page":"1179","volume-title":"Proceedings of the 32nd international conference on Very large data bases","author":"Alexe","year":"2006"},{"issue":"7","key":"2025122814123539700_ref006","first-page":"1","article-title":"Control flow analysis","volume":"5","author":"Allen","year":"1970","journal-title":"Proceedings of a symposium on Compiler optimization"},{"key":"2025122814123539700_ref007","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1145\/2723372.2723711","volume-title":"Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data","author":"Alvaro","year":"2015"},{"key":"2025122814123539700_ref008","doi-asserted-by":"crossref","unstructured":"Amarilli, A., P.Bourhis, and P.Senellart. (2015). \u201cProvenance Circuits for Trees and Treelike Instances\u201d. In: Automata, Languages, and Programming - 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part II. 56\u201368. DOI: 10.1007\/978-3-662-47666-6\\_5. URL: https:\/\/doi.org\/10.1007\/978-3-662-47666-6%5C_5.","DOI":"10.1007\/978-3-662-47666-6"},{"issue":"4","key":"2025122814123539700_ref009","doi-asserted-by":"crossref","first-page":"346","DOI":"10.14778\/2095686.2095693","article-title":"Putting Lipstick on Pig: Enabling Database-style Workflow Provenance","volume":"5","author":"Amsterdamer","year":"2011","journal-title":"Proceedings of the VLDB Endowment"},{"key":"2025122814123539700_ref010","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1145\/1989284.1989303","article-title":"On Provenance Minimization","volume-title":"Proceedings of the 30th Symposium on Principles of Database Systems (PODS)","author":"Amsterdamer","year":"2011"},{"key":"2025122814123539700_ref011","article-title":"On the Limitations of Provenance for Queries with Difference","volume-title":"TaPP \u201911: 3rd USENIX Workshop on the Theory and Practice of Provenance","author":"Amsterdamer","year":"2011"},{"key":"2025122814123539700_ref012","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1145\/1989284.1989302","volume-title":"Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems","author":"Amsterdamer","year":"2011"},{"key":"2025122814123539700_ref013","first-page":"287","article-title":"Techniques for efficiently querying scientific workflow provenance graphs.","volume":"10","author":"Anand","year":"2010","journal-title":"EDBT"},{"key":"2025122814123539700_ref014","doi-asserted-by":"crossref","first-page":"958","DOI":"10.1145\/1516360.1516470","article-title":"Efficient Provenance Storage over Nested Data Collections","volume-title":"EDBT \u201909: Proceedings of the 12th International Conference on Extending Database Technology","author":"Anand","year":"2009"},{"key":"2025122814123539700_ref015","unstructured":"Apache\n          . http:\/\/atlas.apache.org\/. (Accessed on 2017)."},{"issue":"1","key":"2025122814123539700_ref016","first-page":"51","article-title":"GProM - A Swiss Army Knife for Your Provenance Needs","volume":"41","author":"Arab","year":"2018","journal-title":"IEEE Data Engineering Bulletin"},{"key":"2025122814123539700_ref017","first-page":"841","article-title":"Reenactment for Read-Committed Snapshot Isolation","volume-title":"Proceedings of the 25th ACM International Conference on Information and Knowledge Management","author":"Arab","year":"2016"},{"issue":"3","key":"2025122814123539700_ref018","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1109\/TKDE.2017.2769056","article-title":"Using Reenactment to Retroactively Capture Provenance for Transactions","volume":"30","author":"Arab","year":"2018","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"2025122814123539700_ref019","first-page":"157","article-title":"Value Invention for Data Exchange","volume-title":"Proceedings of the 39th International Conference on Management of Data","author":"Arocena","year":"2013"},{"key":"2025122814123539700_ref020","unstructured":"Assadi, S., S.Khanna, Y.Li, and V.Tannen. (2016). \u201cAlgorithms for Provisioning Queries and Analytics\u201d. In: 19th International Conference on Database Theory, ICDT 2016, Bordeaux, France, March 15-18, 2016. 18:1\u201318:18. DOI: 10.4230\/LIPIcs.ICDT.2016.18. URL: https:\/\/doi.org\/10.4230\/LIPIcs.ICDT.2016.18."},{"issue":"11","key":"2025122814123539700_ref021","doi-asserted-by":"crossref","first-page":"1232","DOI":"10.14778\/2350229.2350242","article-title":"FDB: A query engine for factorised relational databases","volume":"5","author":"Bakibayev","year":"2012","journal-title":"Proceedings of the VLDB Endowment"},{"key":"2025122814123539700_ref022","doi-asserted-by":"crossref","unstructured":"Bao, Z., H.K\u00f6hler, L.Wang, X.Zhou, and S. W.Sadiq. (2012). \u201cEfficient provenance storage for relational queries\u201d. In: 21st ACM International Conference on Information and Knowledge Management, CIKM\u201912, Maui, HI, USA, October 29 - November 02, 2012. Ed. by X.Chen, G.Lebanon, H.Wang, and M. J.Zaki. ACM. 1352\u20131361. ISBN: 978-1-4503-1156-4. DOI: 10.1145\/2396761.2398439. URL: https:\/\/doi.org\/10.1145\/2396761.2398439.","DOI":"10.1145\/2396761.2398439"},{"issue":"4","key":"2025122814123539700_ref023","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MSEC.2019.2913693","article-title":"Can Data Provenance Put an End To the Data Breach?","volume":"17","author":"Bates","year":"2019","journal-title":"IEEE Security & Privacy"},{"key":"2025122814123539700_ref024","first-page":"319","volume-title":"24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015","author":"Bates","year":"2015"},{"key":"2025122814123539700_ref025","first-page":"747","article-title":"Auditing of data analyses","volume-title":"Journal on Scientific and Statistical Computation","author":"Becker","year":"1988"},{"key":"2025122814123539700_ref026","first-page":"953","article-title":"ULDBs: Databases with Uncertainty and Lineage","volume-title":"Proceedings of the 32th International Conference on Very Large Data Bases (VLDB)","author":"Benjelloun","year":"2006"},{"issue":"2","key":"2025122814123539700_ref027","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/568271.223785","article-title":"A critique of ANSI SQL isolation levels","volume":"24","author":"Berenson","year":"1995","journal-title":"ACM SIGMOD Record"},{"key":"2025122814123539700_ref028","article-title":"Causality in Databases, Database Repairs, and Consistency-Based Diagnosis","author":"Bertossi","year":"2013"},{"issue":"4","key":"2025122814123539700_ref029","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s00778-005-0156-6","article-title":"An Annotation Management System for Relational Databases","volume":"14","author":"Bhagwat","year":"2005","journal-title":"VLDB J."},{"key":"2025122814123539700_ref030","first-page":"900","article-title":"An Annotation Management System for Relational Databases","volume-title":"VLDB \u201904: Proceedings of the 30th International Conference on Very Large Data Bases","author":"Bhagwat","year":"2004"},{"issue":"12","key":"2025122814123539700_ref031","doi-asserted-by":"crossref","first-page":"1916","DOI":"10.14778\/2824032.2824100","article-title":"Collaborative data analytics with DataHub","volume":"8","author":"Bhardwaj","year":"2015","journal-title":"Proceedings of the VLDB Endowment"},{"issue":"12","key":"2025122814123539700_ref032","doi-asserted-by":"crossref","first-page":"1346","DOI":"10.14778\/2824032.2824035","article-title":"Principles of dataset versioning: Exploring the recreation\/storage tradeoff","volume":"8","author":"Bhattacherjee","year":"2015","journal-title":"Proceedings of the VLDB Endowment"},{"key":"2025122814123539700_ref033","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1145\/2806416.2806426","volume-title":"Proceedings of the 24th ACM International Conference on Information and Knowledge Management, CIKM 2015, Melbourne, VIC, Australia, October 19 - 23, 2015","author":"Bidoit","year":"2015"},{"key":"2025122814123539700_ref034","article-title":"Query-Based Why-Not Provenance with NedExplain","volume-title":"Extending Database Technology (EDBT)","author":"Bidoit","year":"2014"},{"key":"2025122814123539700_ref035","volume-title":"8th USENIX Workshop on the Theory and Practice of Provenance (TaPP 16)","author":"Bidoit","year":"2016"},{"key":"2025122814123539700_ref036","first-page":"1072","article-title":"Querying and Managing Provenance through User Views in Scientific Workflows","volume-title":"Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on","author":"Biton","year":"2008"},{"key":"2025122814123539700_ref037","first-page":"1366","volume-title":"Proceedings of the 33rd international conference on Very large data bases","author":"Biton","year":"2007"},{"issue":"12","key":"2025122814123539700_ref038","doi-asserted-by":"publisher","first-page":"2476","DOI":"10.1109\/TVCG.2013.155","article-title":"Evaluation of Filesystem Provenance Visualization Tools","volume":"19","author":"Borkin","year":"2013","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"2025122814123539700_ref039","doi-asserted-by":"crossref","unstructured":"Bourhis, P., D.Deutch, and Y.Moskovitch. (2020). \u201cEquivalence-Invariant Algebraic Provenance for Hyperplane Update Queries\u201d. In: Proceedings of the 2020 International Conference on Management of Data, SIGMOD Conference 2020, online conference Portland, OR, USA, June 14-19, 2020. Ed. by D.Maier, R.Pottinger, A.Doan, W.-C.Tan, A.Alawini, and H. Q.Ngo. ACM. 415\u2013429. ISBN: 978-1-4503-6735-6. DOI: 10.1145\/3318464.3380578. URL: https:\/\/doi.org\/10.1145\/3318464.3380578.","DOI":"10.1145\/3318464.3380578"},{"key":"2025122814123539700_ref040","doi-asserted-by":"crossref","DOI":"10.1145\/3299869.3320246","article-title":"Data Debugging and Exploration with Vizier","volume-title":"Proceedings of the 44th International Conference on Management of Data (Demonstration Track)","author":"Brachmann","year":"2019"},{"key":"2025122814123539700_ref041","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-72200-7\\_5","volume-title":"Logic Programming and Nonmonotonic Reasoning, 9th International Conference, LPNMR 2007, Tempe, AZ, USA, May 15-17, 2007, Proceedings","author":"Brain","year":"2007"},{"key":"2025122814123539700_ref042","volume-title":"Answer Set Programming, Advances in Theory and Implementation, Proceedings of the 3rd Intl. ASP\u201905 Workshop, Bath, UK, September 27-29, 2005","author":"Brain","year":"2005"},{"issue":"4","key":"2025122814123539700_ref043","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1412331.1412340","article-title":"On the Expressiveness of Implicit Provenance in Query and Update Languages","volume":"33","author":"Buneman","year":"2008","journal-title":"ACM Transactions on Database Systems (TODS)"},{"key":"2025122814123539700_ref044","first-page":"316","article-title":"Why and Where: A Characterization of Data Provenance","volume-title":"ICDT","author":"Buneman","year":"2001"},{"key":"2025122814123539700_ref045","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1145\/543613.543633","article-title":"On Propagation of Deletions and Annotations through Views","volume-title":"PODS \u201902: Proceedings of the 21th Symposium on Principles of Database Systems","author":"Buneman","year":"2002"},{"key":"2025122814123539700_ref046","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1145\/2448496.2448518","volume-title":"Proceedings of the 16th International Conference on Database Theory","author":"Buneman","year":"2013"},{"key":"2025122814123539700_ref047","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1145\/2790449.2790522","volume-title":"Proceedings of the 17th International Symposium on Principles and Practice of Declarative Programming","author":"Caballero","year":"2015"},{"key":"2025122814123539700_ref048","first-page":"71","volume-title":"Data Engineering Workshops, 2006. Proceedings. 22nd International Conference on","author":"Callahan","year":"2006"},{"key":"2025122814123539700_ref049","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/2745754.2745765","volume-title":"Proceedings of the 34th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems","author":"Cate","year":"2015"},{"issue":"1","key":"2025122814123539700_ref050","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/69.43410","article-title":"What you always wanted to know about Datalog(and never dared to ask)","volume":"1","author":"Ceri","year":"1989","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"2025122814123539700_ref051","doi-asserted-by":"crossref","unstructured":"Chandra, A. K. and D.Harel. (1985). \u201cHorn Clauses Queries and Generalizations\u201d. J. Log. Program.2(1): 1\u201315. DOI: 10.1016\/0743-1066(85)90002-0. URL: https:\/\/doi.org\/10.1016\/0743-1066(85)900020.","DOI":"10.1016\/0743-1066(85)90002-0"},{"key":"2025122814123539700_ref052","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1145\/1559845.1559901","article-title":"Why Not?","volume-title":"SIGMOD \u201909: Proceedings of the 35th SIGMOD International Conference on Management of Data","author":"Chapman","year":"2009"},{"key":"2025122814123539700_ref053","first-page":"993","article-title":"Efficient Provenance Storage","volume-title":"SIGMOD \u201908: Proceedings of the 35th SIGMOD International Conference on Management of Data","author":"Chapman","year":"2008"},{"key":"2025122814123539700_ref054","volume-title":"7th USENIX Workshop on the Theory and Practice of Provenance, TaPP 2015, Edinburgh, Scotland, UK, July 8-9, 2015","author":"Chavan","year":"2015"},{"issue":"4","key":"2025122814123539700_ref055","first-page":"22","article-title":"Program Slicing and Data Provenance","volume":"30","author":"Cheney","year":"2007","journal-title":"IEEE Data Engineering Bulletin"},{"key":"2025122814123539700_ref056","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1145\/2643135.2643143","volume-title":"Proceedings of the 16th International Symposium on Principles and Practice of Declarative Programming, Kent, Canterbury, United Kingdom, September 8-10, 2014","author":"Cheney","year":"2014"},{"issue":"4","key":"2025122814123539700_ref057","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1561\/1900000006","article-title":"Provenance in Databases: Why, How, and Where","volume":"1","author":"Cheney","year":"2009","journal-title":"Foundations and Trends in Databases"},{"key":"2025122814123539700_ref058","article-title":"ReproZip: Using Provenance to Support Computational Reproducibility.","volume-title":"TaPP","author":"Chirigati","year":"2013"},{"key":"2025122814123539700_ref059","first-page":"79","article-title":"Debugging Schema Mappings with Routes","volume-title":"VLDB \u201906: Proceedings of the 32th International Conference on Very Large Data Bases","author":"Chiticariu","year":"2006"},{"key":"2025122814123539700_ref060","first-page":"942","article-title":"DBNotes: a Post-it System for Relational Databases based on Provenance","volume-title":"SIGMOD \u201905: Proceedings of the 31th SIGMOD International Conference on Management of Data","author":"Chiticariu","year":"2005"},{"issue":"1","key":"2025122814123539700_ref061","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1613\/jair.1391","article-title":"Responsibility and blame: A structural-model approach","volume":"22","author":"Chockler","year":"2004","journal-title":"Journal of Artificial Intelligence Research"},{"issue":"3","key":"2025122814123539700_ref062","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1352582.1352588","article-title":"What causes a system to satisfy a specification?","volume":"9","author":"Chockler","year":"2008","journal-title":"ACM Transactions on Computational Logic (TOCL)"},{"key":"2025122814123539700_ref063","first-page":"118","volume-title":"Studies in Logic and the Foundations of Mathematics","author":"Chomsky","year":"1959"},{"issue":"11","key":"2025122814123539700_ref064","doi-asserted-by":"crossref","first-page":"1482","DOI":"10.14778\/3236187.3236200","article-title":"Axiomatic foundations and algorithms for deciding semantic equivalences of SQL queries","volume":"11","author":"Chu","year":"2018","journal-title":"Proceedings of the VLDB Endowment"},{"key":"2025122814123539700_ref065","first-page":"159","article-title":"Efficient Detection of Incompleteness Errors in the Abstract Debugging of Logic Programs","volume-title":"Proceedings of the Second International Workshop on Automated Debugging, AADEBUG 1995, Saint Malo, France, May 22-24, 1995","author":"Comini","year":"1995"},{"key":"2025122814123539700_ref066","article-title":"On the Complexity of Annotation Propagation and View Update Analyses","volume-title":"IEEE Transactions on Knowledge and Data Engineering","author":"Cong","year":"2012"},{"key":"2025122814123539700_ref067","first-page":"367","article-title":"Practical Lineage Tracing in Data Warehouses","volume-title":"ICDE","author":"Cui","year":"2000"},{"key":"2025122814123539700_ref068","article-title":"Storing Auxiliary Data for Efficient Maintenance and Lineage Tracing of Complex Views","volume-title":"DMDW \u201900: Proceedings of the 2th International Workshop on Design and Management of Data Warehouses","author":"Cui","year":"2000"},{"key":"2025122814123539700_ref069","volume-title":"Tech. rep.","author":"Cui","year":"2001"},{"issue":"2","key":"2025122814123539700_ref070","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1145\/357775.357777","article-title":"Tracing the Lineage of View Data in a Warehousing Environment","volume":"25","author":"Cui","year":"2000","journal-title":"TODS"},{"key":"2025122814123539700_ref071","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1007\/978-3-642-40564-8_53","volume-title":"Logic Programming and Nonmonotonic Reasoning","author":"Dam\u00e1sio","year":"2013"},{"key":"2025122814123539700_ref072","first-page":"57","article-title":"Sumatra: A Toolkit for Reproducible Research","volume-title":"Implementing Reproducible Research","author":"Davison","year":"2014"},{"key":"2025122814123539700_ref073","volume-title":"Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6","author":"Dean","year":"2004"},{"key":"2025122814123539700_ref074","article-title":"Caravan: Provisioning for What-If Analysis","volume-title":"CIDR \u201913","author":"Deutch","year":"2013"},{"key":"2025122814123539700_ref075","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1109\/ICDE.2019.00054","volume-title":"2019 IEEE 35th International Conference on Data Engineering (ICDE)","author":"Deutch","year":"2019"},{"issue":"5","key":"2025122814123539700_ref076","doi-asserted-by":"crossref","DOI":"10.14778\/3055540.3055550","article-title":"Provenance for Natural Language Queries","volume":"10","author":"Deutch","year":"2017","journal-title":"Proceedings of the VLDB Endowment"},{"issue":"1","key":"2025122814123539700_ref077","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/s00778-019-00584-7","article-title":"Explaining Natural Language Query Results","volume":"29","author":"Deutch","year":"2020","journal-title":"VLDB J."},{"issue":"12","key":"2025122814123539700_ref078","doi-asserted-by":"publisher","first-page":"1986","DOI":"10.14778\/3229863.3236241","article-title":"Nlprovenans: Natural Language Provenance for Non-Answers","volume":"11","author":"Deutch","year":"2018","journal-title":"Proc. VLDB Endow."},{"key":"2025122814123539700_ref079","doi-asserted-by":"crossref","unstructured":"Deutch, D. and A.Gilad. (2016). \u201cQPlain: Query by explanation\u201d. In: 32nd IEEE International Conference on Data Engineering, ICDE 2016, Helsinki, Finland, May 16-20, 2016. 1358\u20131361. DOI: 10.1109\/ICDE.2016.7498344. URL: https:\/\/doi.org\/10.1109\/ICDE.2016. 7498344.","DOI":"10.1109\/ICDE.2016.7498344"},{"key":"2025122814123539700_ref080","unstructured":"Deutch, D. and A.Gilad. (2019). \u201cReverse-Engineering Conjunctive Queries from Provenance Examples\u201d. In: Advances in Database Technology - 22nd International Conference on Extending Database Technology, EDBT 2019, Lisbon, Portugal, March 26-29, 2019. 277\u2013288. DOI: 10.5441\/002\/edbt.2019.25. URL: https:\/\/doi.org\/10.5441\/002\/edbt.2019.25."},{"issue":"12","key":"2025122814123539700_ref081","doi-asserted-by":"crossref","DOI":"10.14778\/2824032.2824039","article-title":"Selective Provenance for Datalog Programs Using Top-K Queries","volume":"8","author":"Deutch","year":"2015","journal-title":"Proceedings of the VLDB Endowment"},{"key":"2025122814123539700_ref082","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1109\/ICDE.2015.7113407","volume-title":"Data Engineering (ICDE), 2015 IEEE 31st International Conference on","author":"Deutch","year":"2015"},{"issue":"2","key":"2025122814123539700_ref083","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s00778-018-0496-7","article-title":"Efficient Provenance Tracking for Datalog Using Top-K Queries","volume":"27","author":"Deutch","year":"2018","journal-title":"VLDB J."},{"key":"2025122814123539700_ref084","first-page":"201","article-title":"Circuits for Datalog Provenance","volume-title":"ICDT","author":"Deutch","year":"2014"},{"issue":"12","key":"2025122814123539700_ref085","doi-asserted-by":"crossref","DOI":"10.14778\/2536274.2536301","article-title":"PROPOLIS: Provisioned Analysis of Data-Centric Processes","volume":"6","author":"Deutch","year":"2013","journal-title":"Proceedings of the VLDB Endowment"},{"key":"2025122814123539700_ref086","unstructured":"Diestelk\u00e4mper, R. and M.Herschel. (2020). \u201cTracing nested data with structural provenance for big data analytics\u201d. In: Proceedings of the 23rd International Conference on Extending Database Technology, EDBT 2020, Copenhagen, Denmark, March 30 - April 02, 2020. Ed. by A.Bonifati, Y.Zhou, M. A. V.Salles, A.B\u00f6hm, D.Olteanu, G. H. L.Fletcher, A.Khan, and B.Yang. OpenProceedings.org. 253\u2013264. ISBN: 978-3-89318-083-7. DOI: 10.5441\/002\/edbt.2020.23. URL: https:\/\/doi.org\/10.5441\/002\/edbt.2020.23."},{"key":"2025122814123539700_ref087","doi-asserted-by":"crossref","first-page":"865","DOI":"10.1145\/2723372.2735358","volume-title":"Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data","author":"Dietrich","year":"2015"},{"issue":"6","key":"2025122814123539700_ref088","doi-asserted-by":"crossref","first-page":"639","DOI":"10.14778\/3311880.3311882","article-title":"Snapshot Semantics for Temporal Multiset Relations","volume":"12","author":"Dign\u00f6s","year":"2019","journal-title":"Proceedings of the VLDB Endowment"},{"key":"2025122814123539700_ref089","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1145\/2488388.2488422","article-title":"Compact explanation of data fusion decisions","volume-title":"Proceedings of the 22nd international conference on World Wide Web","author":"Dong","year":"2013"},{"key":"2025122814123539700_ref090","first-page":"501","article-title":"Algorithmic Debugging with Assertions","volume-title":"Meta-Programming in Logic Programming, Workshop on Meta-Programming in Logic, META 1988, University of Bristol, 22-24 June, 1988","author":"Drabent","year":"1988"},{"issue":"1","key":"2025122814123539700_ref091","doi-asserted-by":"crossref","DOI":"10.14778\/2735461.2735467","article-title":"Interpretable and informative explanations of outcomes","volume":"8","author":"El Gebaly","year":"2014","journal-title":"Proceedings of the VLDB Endowment"},{"key":"2025122814123539700_ref092","first-page":"14","article-title":"Explanation Tables","volume":"5","author":"El Gebaly","year":"2018","journal-title":"Sat"},{"key":"2025122814123539700_ref093","first-page":"1600","article-title":"Managing Biological Data using BDBMS","volume-title":"ICDE \u201908: Proceedings of the 24th International Conference on Data Engineering (demonstration)","author":"Eltabakh","year":"2008"},{"key":"2025122814123539700_ref094","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1007\/978-3-540-70918-3_26","article-title":"On fixed point equations over commutative semirings","volume-title":"STACS 2007","author":"Esparza","year":"2007"},{"key":"2025122814123539700_ref095","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-319-08846-4_1","article-title":"FPsolve: A Generic Solver for Fixpoint Equations over Semirings","volume-title":"Implementation and Application of Automata","author":"Esparza","year":"2014"},{"issue":"1","key":"2025122814123539700_ref096","doi-asserted-by":"crossref","first-page":"1","DOI":"10.14778\/2047485.2047486","article-title":"Explanation-based auditing","volume":"5","author":"Fabbri","year":"2011","journal-title":"Proceedings of the VLDB Endowment"},{"issue":"4","key":"2025122814123539700_ref097","doi-asserted-by":"crossref","first-page":"994","DOI":"10.1145\/1114244.1114249","article-title":"Composing schema mappings: Second-order dependencies to the rescue","volume":"30","author":"Fagin","year":"2005","journal-title":"ACM Transactions on Database Systems (TODS)"},{"issue":"1","key":"2025122814123539700_ref098","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.tcs.2004.10.033","article-title":"Data Exchange: Semantics and Query Answering","volume":"336","author":"Fagin","year":"2005","journal-title":"Theoretical Computer Science"},{"key":"2025122814123539700_ref099","doi-asserted-by":"crossref","unstructured":"Farnadi, G., B.Babaki, and L.Getoor. (2018). \u201cFairness in Relational Domains\u201d. In: Proceedings of the 2018 AAAI\/ACM Conference on AI, Ethics, and Society, AIES 2018, New Orleans, LA, USA, February 02-03, 2018. 108\u2013114. DOI: 10.1145\/3278721.3278733. URL: https:\/\/doi.org\/10.1145\/3278721.3278733.","DOI":"10.1145\/3278721.3278733"},{"key":"2025122814123539700_ref100","doi-asserted-by":"crossref","DOI":"10.1145\/3299869.3319887","article-title":"Uncertainty Annotated Databases - A Lightweight Approach for Approximating Certain Answers","volume-title":"Proceedings of the 44th International Conference on Management of Data","author":"Feng","year":"2019"},{"key":"2025122814123539700_ref101","unstructured":"Fernandez, C., F. J.Provost, and X.Han. (2019). \u201cCounterfactual Explanations for Data-Driven Decisions\u201d. In: Proceedings of the 40th International Conference on Information Systems, ICIS 2019, Munich, Germany, December 15-18, 2019. URL: https:\/\/aisel.aisnet.org\/icis2019\/data%5C_science\/data%5C_science\/8."},{"issue":"5","key":"2025122814123539700_ref102","doi-asserted-by":"crossref","first-page":"490","DOI":"10.14778\/2140436.2140445","article-title":"Aggregation in probabilistic databases via knowledge compilation","volume":"5","author":"Fink","year":"2012","journal-title":"Proceedings of the VLDB Endowment"},{"key":"2025122814123539700_ref103","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/3-540-62222-5_40","volume-title":"Database Theory\u2014ICDT\u201997","author":"Flum","year":"1997"},{"key":"2025122814123539700_ref104","first-page":"271","article-title":"Annotated XML: Queries and Provenance","volume-title":"PODS \u201908: Proceedings of the 27th Symposium on Principles of Database Systems","author":"Foster","year":"2008"},{"issue":"3","key":"2025122814123539700_ref105","doi-asserted-by":"crossref","first-page":"180","DOI":"10.14778\/2850583.2850592","article-title":"The complexity of resilience and responsibility for self-join-free conjunctive queries","volume":"9","author":"Freire","year":"2015","journal-title":"Proceedings of the VLDB Endowment"},{"key":"2025122814123539700_ref106","doi-asserted-by":"crossref","unstructured":"Freire, C., W.Gatterbauer, N.Immerman, and A.Meliou. (2020). \u201cNew Results for the Complexity of Resilience for Binary Conjunctive Queries with Self-Joins\u201d. In: Proceedings of the 39th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, PODS 2020, Portland, OR, USA, June 14-19, 2020. 271\u2013284. DOI: 10.1145\/3375395.3387647. URL: https:\/\/doi.org\/10.1145\/3375395.3387647.","DOI":"10.1145\/3375395.3387647"},{"key":"2025122814123539700_ref107","doi-asserted-by":"crossref","first-page":"1494","DOI":"10.14778\/3402755.3402804","article-title":"Exploring the coming repositories of reproducible experiments: Challenges and opportunities","volume":"4","author":"Freire","year":"2011","journal-title":"Proc. VLDB Endow"},{"key":"2025122814123539700_ref108","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1145\/2213836.2213908","volume-title":"Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data","author":"Freire","year":"2012"},{"key":"2025122814123539700_ref109","first-page":"15","article-title":"Provenance and the Different Flavors of Computational Reproducibility","volume-title":"Data Engineering","author":"Freire","year":"2018"},{"issue":"4","key":"2025122814123539700_ref110","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MCSE.2012.76","article-title":"Making Computations and Publications Reproducible with VisTrails","volume":"14","author":"Freire","year":"2012","journal-title":"Computing in Science and Engineering"},{"key":"2025122814123539700_ref111","article-title":"Fine Grain Provenance Using Temporal Databases","volume-title":"TaPP \u201911: 3rd USENIX Workshop on the Theory and Practice of Provenance","author":"Gawlick","year":"2011"},{"key":"2025122814123539700_ref112","article-title":"Algebraic Structures for Capturing the Provenance of SPARQL Queries","volume-title":"Proceedings of the 16th International Conference on Database Theory","author":"Geerts","year":"2012"},{"key":"2025122814123539700_ref113","first-page":"82","volume-title":"Data Engineering, 2006. ICDE\u201906. Proceedings of the 22nd International Conference on","author":"Geerts","year":"2006"},{"issue":"2","key":"2025122814123539700_ref114","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.jal.2009.09.001","article-title":"On database query languages for K-relations","volume":"8","author":"Geerts","year":"2010","journal-title":"Journal of Applied Logic"},{"key":"2025122814123539700_ref115","volume-title":"PhD thesis","author":"Glavic","year":"2010"},{"key":"2025122814123539700_ref116","first-page":"174","article-title":"Perm: Processing Provenance and Data on the same Data Model through Query Rewriting","volume-title":"Proceedings of the 25th IEEE International Conference on Data Engineering","author":"Glavic","year":"2009"},{"key":"2025122814123539700_ref117","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1145\/1516360.1516472","article-title":"Provenance for Nested Subqueries","volume-title":"Proceedings of the 12th International Conference on Extending Database Technology","author":"Glavic","year":"2009"},{"key":"2025122814123539700_ref118","first-page":"1055","article-title":"The Perm Provenance Management System in Action","volume-title":"Proceedings of the 35th ACM SIGMOD International Conference on Management of Data (Demonstration Track)","author":"Glavic","year":"2009"},{"issue":"1","key":"2025122814123539700_ref119","first-page":"1314","article-title":"TRAMP: Understanding the Behavior of Schema Mappings through Provenance","volume":"3","author":"Glavic","year":"2010","journal-title":"Proceedings of the Very Large Data Bases Endowment"},{"issue":"12","key":"2025122814123539700_ref120","doi-asserted-by":"crossref","first-page":"1383","DOI":"10.14778\/3402755.3402776","article-title":"Debugging Data Exchange with Vagabond","volume":"4","author":"Glavic","year":"2011","journal-title":"Proceedings of the VLDB Endowment (Demonstration Track)"},{"key":"2025122814123539700_ref121","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1145\/2488222.2488256","article-title":"Ariadne: Managing Fine-Grained Provenance on Data Streams","volume-title":"Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems","author":"Glavic","year":"2013"},{"key":"2025122814123539700_ref122","article-title":"Towards Constraint-based Explanations for Answers and Non-Answers","volume-title":"Proceedings of the 7th USENIX Workshop on the Theory and Practice of Provenance","author":"Glavic","year":"2015"},{"key":"2025122814123539700_ref123","article-title":"Trends in Explanations","volume-title":"Foundations and Trends\u00ae in Databases","author":"Glavic","year":"2021"},{"key":"2025122814123539700_ref124","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/978-3-642-41660-6_16","article-title":"Using SQL for Efficient Generation and Querying of Provenance Information","volume-title":"In search of elegance in the theory and practice of computation: a Festschrift in honour of Peter Buneman","author":"Glavic","year":"2013"},{"key":"2025122814123539700_ref125","volume-title":"Graphs, dioids and semirings: new models and algorithms","author":"Gondran","year":"2008"},{"key":"2025122814123539700_ref126","article-title":"Semiring Provenance for First-Order Model Checking","volume-title":"arXiv preprint arXiv:1712.01980","author":"Gr\u00e4del","year":"2017"},{"issue":"3","key":"2025122814123539700_ref127","doi-asserted-by":"crossref","first-page":"203","DOI":"10.2140\/moscow.2020.9.203","article-title":"Provenance analysis for logic and games","volume":"9","author":"Gr\u00e4del","year":"2020","journal-title":"Moscow Journal of Combinatorics and Number Theory"},{"issue":"2","key":"2025122814123539700_ref128","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1007\/s00224-011-9327-6","article-title":"Containment of conjunctive queries on annotated relations","volume":"49","author":"Green","year":"2011","journal-title":"Theory of Computing Systems"},{"key":"2025122814123539700_ref129","article-title":"Provenance in ORCHESTRA","author":"Green","year":"2010"},{"key":"2025122814123539700_ref130","first-page":"93","article-title":"The Semiring Framework for Database Provenance","volume-title":"PODS","author":"Green","year":"2017"},{"key":"2025122814123539700_ref131","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1145\/1514894.1514930","article-title":"Containment of Conjunctive Queries on Annotated Relations","volume-title":"ICDT \u201909: Proceedings of the 16th International Conference on Database Theory","author":"Green","year":"2009"},{"key":"2025122814123539700_ref132","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1145\/1514894.1514920","volume-title":"ICDT \u201909: Proceedings of the 16th International Conference on Database Theory","author":"Green","year":"2009"},{"key":"2025122814123539700_ref133","first-page":"31","article-title":"Provenance Semirings","volume-title":"PODS","author":"Green","year":"2007"},{"key":"2025122814123539700_ref134","doi-asserted-by":"crossref","DOI":"10.1145\/1247480.1247631","article-title":"ORCHESTRA: Facilitating Collaborative Data Sharing","volume-title":"SIGMOD \u201907: Proceedings of the 33th SIGMOD International Conference on Management of Data","author":"Green","year":"2007"},{"key":"2025122814123539700_ref135","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1145\/1951365.1951441","volume-title":"Proceedings of the 14th International Conference on Extending Database Technology","author":"Grust","year":"2011"},{"key":"2025122814123539700_ref136","doi-asserted-by":"crossref","first-page":"1627","DOI":"10.1145\/3035918.3058737","volume-title":"Proceedings of the 2017 ACM International Conference on Management of Data","author":"Gulzar","year":"2017"},{"key":"2025122814123539700_ref137","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1145\/3127479.3131624","volume-title":"Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, September 24-27, 2017","author":"Gulzar","year":"2017"},{"key":"2025122814123539700_ref138","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/2047196.2047205","volume-title":"Proceedings of the 24th annual ACM symposium on User interface software and technology","author":"Guo","year":"2011"},{"issue":"2","key":"2025122814123539700_ref139","first-page":"3","article-title":"Maintenance of materialized views: Problems, techniques, and applications","volume":"18","author":"Gupta","year":"1995","journal-title":"IEEE Data Eng. Bull."},{"key":"2025122814123539700_ref140","doi-asserted-by":"crossref","DOI":"10.1613\/jair.648","article-title":"Axiomatizing causal reasoning","volume-title":"Arxiv preprint cs\/0005030","author":"Halpern","year":"2000"},{"issue":"4","key":"2025122814123539700_ref141","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1093\/bjps\/axi147","article-title":"Causes and explanations: A structural-model approach. Part I: Causes","volume":"56","author":"Halpern","year":"2005","journal-title":"The British journal for the philosophy of science"},{"key":"2025122814123539700_ref142","first-page":"1007","article-title":"Efficient Lineage Tracking for Scientific Workflows","volume-title":"SIGMOD \u201908: Proceedings of the 34th SIGMOD International Conference on Management of Data","author":"Heinis","year":"2008"},{"key":"2025122814123539700_ref143","article-title":"Ground: A Data Context Service.","volume-title":"CIDR","author":"Hellerstein","year":"2017"},{"issue":"1","key":"2025122814123539700_ref144","first-page":"185","article-title":"Explaining Missing Answers to SPJUA Queries","volume":"3","author":"Herschel","year":"2010","journal-title":"PVLDB"},{"key":"2025122814123539700_ref145","first-page":"2213","volume-title":"Proceedings of the 22nd ACM international conference on Conference on information & knowledge management","author":"Herschel","year":"2013"},{"key":"2025122814123539700_ref146","first-page":"1","article-title":"A survey on provenance: What for? What form? What from?","volume-title":"The VLDB Journal","author":"Herschel","year":"2017"},{"key":"2025122814123539700_ref147","first-page":"1550","article-title":"Artemis: A System for Analyzing Missing Answers","volume-title":"VLDB \u201909: Proceedings of the 35th International Conference on Very Large Data Bases (demonstration)","author":"Herschel","year":"2009"},{"key":"2025122814123539700_ref148","doi-asserted-by":"crossref","unstructured":"Hoekstra, R. and P.Groth. (2014). \u201cPROV-O-Viz - Understanding the Role of Activities in Provenance\u201d. In: Provenance and Annotation of Data and Processes - 5th International Provenance and Annotation Workshop, IPAW 2014, Cologne, Germany, June 9-13, 2014. Revised Selected Papers. Ed. by B.Lud\u00e4scher and B.Plale. Vol. 8628. Lecture Notes in Computer Science. Springer. 215\u2013220. ISBN: 978-3-319-16461-8. DOI: 10.1007\/978-3-319-16462-5\\_18. URL: https:\/\/doi.org\/10.1007\/978-3-319-16462-5%5C_18.","DOI":"10.1007\/978-3-319-16462-5"},{"issue":"1","key":"2025122814123539700_ref149","first-page":"736","article-title":"On the Provenance of Non-answers to Queries over Extracted Data","volume":"1","author":"Huang","year":"2008","journal-title":"PVLDB: Proceedings of the VLDB Endowment archive"},{"key":"2025122814123539700_ref150","unstructured":"Hull, R. and M.Yoshikawa. (1990). \u201cILOG: Declarative Creation and Manipulation of Object Identifiers\u201d. In: 16th International Conference on Very Large Data Bases, August 13-16, 1990, Brisbane, Queensland, Australia, Proceedings. Morgan Kaufmann. 455\u2013468. ISBN: 1-55860-149-X. URL: http:\/\/www.vldb.org\/conf\/1990\/P455.PDF."},{"key":"2025122814123539700_ref151","doi-asserted-by":"crossref","first-page":"2017","DOI":"10.1145\/2723372.2749435","volume-title":"Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data","author":"Ibrahim","year":"2015"},{"key":"2025122814123539700_ref152","first-page":"273","article-title":"Provenance for generalized map and reduce workflows","volume-title":"CIDR","author":"Ikeda","year":"2011"},{"key":"2025122814123539700_ref153","doi-asserted-by":"crossref","first-page":"1659","DOI":"10.1145\/2063576.2063816","volume-title":"Proceedings of the 20th ACM international conference on Information and knowledge management","author":"Ikeda","year":"2011"},{"key":"2025122814123539700_ref154","volume-title":"TaPP \u201910","author":"Ikeda","year":"2010"},{"issue":"4","key":"2025122814123539700_ref155","doi-asserted-by":"crossref","first-page":"761","DOI":"10.1145\/1634.1886","article-title":"Incomplete Information in Relational Databases","volume":"31","author":"Imieli\u0144ski","year":"1984","journal-title":"Journal of the ACM (JACM)"},{"key":"2025122814123539700_ref156","doi-asserted-by":"crossref","unstructured":"Interlandi, M., A.Ekmekji, K.Shah, M. A.Gulzar, S. D.Tetali, M.Kim, T. D.Millstein, and T.Condie. (2018). \u201cAdding data provenance support to Apache Spark\u201d. VLDB J.27(5): 595\u2013615. DOI: 10.1007\/s00778-017-0474-5. URL: https:\/\/doi.org\/10.1007\/s00778-017-0474-5.","DOI":"10.1007\/s00778-017-0474-5"},{"issue":"3","key":"2025122814123539700_ref157","article-title":"Titian: Data Provenance Support in Spark","volume":"9","author":"Interlandi","year":"2016","journal-title":"PVLDB"},{"key":"2025122814123539700_ref158","article-title":"Querying provenance for ranking and recommending","author":"Ives","year":"2012"},{"issue":"2","key":"2025122814123539700_ref159","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/1462571.1462577","article-title":"The ORCHESTRA Collaborative Data Sharing System","volume":"37","author":"Ives","year":"2008","journal-title":"SIGMOD Record"},{"key":"2025122814123539700_ref160","article-title":"ORCHESTRA: Rapid, Collaborative Sharing of Dynamic Data","volume-title":"CIDR \u201905: Proceedings of the 2th Conference on Innovative Data Systems Research","author":"Ives","year":"2005"},{"key":"2025122814123539700_ref161","doi-asserted-by":"crossref","unstructured":"Jagadish, H. V., F.Bonchi, T.Eliassi-Rad, L.Getoor, K. P.Gummadi, and J.Stoyanovich. (2019). \u201cThe Responsibility Challenge for Data\u201d. In: Proceedings of the 2019 International Conference on Management of Data, SIGMOD Conference 2019, Amsterdam, The Netherlands, June 30 - July 5, 2019. Ed. by P. A.Boncz, S.Manegold, A.Ailamaki, A.Deshpande, and T.Kraska. ACM. 412\u2013414. ISBN: 978-1-4503-5643-5. DOI: 10.1145\/3299869.3314327. URL: https:\/\/doi.org\/10.1145\/3299869.3314327.","DOI":"10.1145\/3299869.3314327"},{"key":"2025122814123539700_ref162","doi-asserted-by":"crossref","unstructured":"Janin, Y., C.Vincent, and R.Duraffort. (2014). \u201cCARE, the comprehensive archiver for reproducible execution\u201d. In: Proceedings of the 1st ACM SIGPLAN Workshop on Reproducible Research Methodologies and New Publication Models in Computer Engineering, TRUST 2014, Edinburgh, United Kingdom, June 9-11, 2014. Ed. by G.Fursin, B. R.Childers, A. K.Jones, and D.Moss\u00e9. ACM. 1:1\u20131:7. ISBN: 978-1-4503-2951-4. DOI: 10.1145\/2618137.2618138. URL: https:\/\/doi.org\/10.1145\/2618137.2618138.","DOI":"10.1145\/2618137.2618138"},{"key":"2025122814123539700_ref163","first-page":"36","volume-title":"IEEE Transactions on Knowledge and Data Engineering","author":"Jensen","year":"1999"},{"issue":"1","key":"2025122814123539700_ref164","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TKDE.2017.2685998","article-title":"Interactive Data Exploration With Smart Drill-Down","volume":"31","author":"Joglekar","year":"2019","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"2025122814123539700_ref165","doi-asserted-by":"crossref","first-page":"3363","DOI":"10.1145\/1978942.1979444","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Kandel","year":"2011"},{"issue":"3","key":"2025122814123539700_ref166","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1145\/111197.111208","article-title":"Simplification Rules and Complete Axiomatization for Relational Update Transactions","volume":"16","author":"Karabeg","year":"1991","journal-title":"ACM Trans. Database Syst."},{"key":"2025122814123539700_ref167","volume-title":"PhD thesis","author":"Karvounarakis","year":"2009"},{"issue":"3","key":"2025122814123539700_ref168","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/2380776.2380778","article-title":"Semiring-Annotated Data: Queries and Provenance","volume":"41","author":"Karvounarakis","year":"2012","journal-title":"SIGMOD Record"},{"key":"2025122814123539700_ref169","first-page":"951","volume-title":"Proceedings of the 2010 international conference on Management of data","author":"Karvounarakis","year":"2010"},{"issue":"3","key":"2025122814123539700_ref170","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/2500127","article-title":"Collaborative data sharing via update exchange and provenance","volume":"38","author":"Karvounarakis","year":"2013","journal-title":"ACM Transactions on Database Systems (TODS)"},{"key":"2025122814123539700_ref171","first-page":"313","volume-title":"Proceedings of the 39th international conference on Very Large Data Bases","author":"Kaushik","year":"2013"},{"key":"2025122814123539700_ref172","doi-asserted-by":"crossref","unstructured":"Kaushik, R. and R.Ramamurthy. (2011). \u201cEfficient auditing for complex SQL queries\u201d. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2011, Athens, Greece, June 12-16, 2011. 697\u2013708. DOI: 10.1145\/1989323.1989396. URL: https:\/\/doi.org\/10.1145\/1989323.1989396.","DOI":"10.1145\/1989323.1989396"},{"issue":"1&2","key":"2025122814123539700_ref173","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/0304-3975(94)00153-A","article-title":"Bottom-Up Evaluation and Query Optimization of Well-Founded Models","volume":"146","author":"Kemp","year":"1995","journal-title":"Theor. Comput. Sci."},{"key":"2025122814123539700_ref174","first-page":"1885","article-title":"Understanding Black-box Predictions via Influence Functions","volume":"70","author":"Koh","year":"2017","journal-title":"Proceedings of the 34th International Conference on Machine Learning, ICML 2017, Sydney, NSW, Australia, 6-11 August 2017"},{"key":"2025122814123539700_ref175","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-642-32925-8_12","article-title":"Declarative datalog debugging for mere mortals","volume-title":"Datalog in Academia and Industry","author":"K\u00f6hler","year":"2012"},{"key":"2025122814123539700_ref176","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1007\/978-3-642-41660-6_20","volume-title":"In Search of Elegance in the Theory and Practice of Computation","author":"K\u00f6hler","year":"2013"},{"key":"2025122814123539700_ref177","doi-asserted-by":"crossref","unstructured":"Kolaitis, P. G. and C. H.Papadimitriou. (1988). \u201cWhy Not Negation by Fixpoint?\u201d In: Proceedings of the Seventh ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, March 21-23, 1988, Austin, Texas, USA. Ed. by C.Edmondson-Yurkanan and M.Yannakakis. ACM. 231\u2013239. ISBN: 0-89791-263-2. DOI: 10.1145\/308386.308446. URL: https:\/\/doi.org\/10.1145\/308386.308446.","DOI":"10.1145\/308386.308446"},{"key":"2025122814123539700_ref178","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-319-40593-3\\_9","volume-title":"Provenance and Annotation of Data and Processes - 6th International Provenance and Annotation Workshop, IPAW 2016, McLean, VA, USA, June 7-8, 2016, Proceedings","author":"Koop","year":"2016"},{"key":"2025122814123539700_ref179","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1145\/2274576.2274597","volume-title":"Proceedings of the 15th International Conference on Database Theory","author":"Kostylev","year":"2012"},{"key":"2025122814123539700_ref180","article-title":"Classification of Annotation Semirings over Containment of Conjunctive Queries","volume-title":"TODS","author":"Kostylev","year":"2013"},{"key":"2025122814123539700_ref181","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-540-89965-5\\_25","volume-title":"Provenance and Annotation of Data and Processes, Second International Provenance and Annotation Workshop, IPAW 2008, Salt Lake City, UT, USA, June 17-18, 2008. Revised Selected Papers","author":"Kunde","year":"2008"},{"key":"2025122814123539700_ref182","first-page":"485","article-title":"A SQL-Middleware Unifying Why and Why-Not Provenance for First-Order Queries","volume-title":"Proceedings of the 33rd IEEE International Conference on Data Engineering","author":"Lee","year":"2017"},{"issue":"1","key":"2025122814123539700_ref183","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s00778-018-0518-5","article-title":"PUG: a framework and practical implementation for why and why-not provenance","volume":"28","author":"Lee","year":"2018","journal-title":"The VLDB Journal"},{"issue":"6","key":"2025122814123539700_ref184","doi-asserted-by":"crossref","first-page":"912","DOI":"10.14778\/3380750.3380760","article-title":"Approximate Summaries for Why and Why-not Provenance","volume":"13","author":"Lee","year":"2020","journal-title":"Proceedings of the VLDB Endowment"},{"key":"2025122814123539700_ref185","first-page":"17","volume-title":"Proceedings of the 4th annual Symposium on Cloud Computing","author":"Logothetis","year":"2013"},{"key":"2025122814123539700_ref186","doi-asserted-by":"crossref","unstructured":"Luttenberger, M. and M.Schlund. (2013). \u201cConvergence of Newton\u2019s Method over Commutative Semirings\u201d. In: Language and Automata Theory and Applications - 7th International Conference, LATA 2013, Bilbao, Spain, April 2-5, 2013. Proceedings. 407\u2013418. DOI: 10.1007\/978-3-642-37064-9\\_36. URL: https:\/\/doi.org\/10.1007\/978-3-642-37064-9%5C_36.","DOI":"10.1007\/978-3-642-37064-9"},{"key":"2025122814123539700_ref187","article-title":"Regular Expressions for Provenance","volume-title":"TaPP","author":"Luttenberger","year":"2014"},{"issue":"1","key":"2025122814123539700_ref188","doi-asserted-by":"crossref","first-page":"34","DOI":"10.14778\/1880172.1880176","article-title":"The Complexity of Causality and Responsibility for Query Answers and non-Answers","volume":"4","author":"Meliou","year":"2010","journal-title":"Proceedings of the VLDB Endowment"},{"key":"2025122814123539700_ref189","first-page":"337","volume-title":"Proceedings of the 2012 international conference on Management of Data","author":"Meliou","year":"2012"},{"key":"2025122814123539700_ref190","first-page":"505","volume-title":"SIGMOD Conference","author":"Meliou","year":"2011"},{"issue":"3","key":"2025122814123539700_ref191","first-page":"321","article-title":"Semiring Frameworks and Algorithms for Shortest-Distance Problems","volume":"7","author":"Mohri","year":"2002","journal-title":"J. Autom. Lang. Comb."},{"issue":"6","key":"2025122814123539700_ref192","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1016\/j.future.2010.07.005","article-title":"The open provenance model core specification (v1. 1)","volume":"27","author":"Moreau","year":"2011","journal-title":"Future Generation Computer Systems"},{"key":"2025122814123539700_ref193","first-page":"323","article-title":"The Open Provenance Model: An Overview","volume-title":"IPAW \u201908: International Provenance and Annotation Workshop","author":"Moreau","year":"2008"},{"key":"2025122814123539700_ref194","article-title":"The Open Provenance Model","author":"Moreau","year":"2007"},{"issue":"4","key":"2025122814123539700_ref195","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-031-79450-6","article-title":"Provenance: An introduction to prov","volume":"3","author":"Moreau","year":"2013","journal-title":"Synthesis Lectures on the Semantic Web: Theory and Technology"},{"key":"2025122814123539700_ref196","unstructured":"Moreau, L. and P.Missier. (2013a). http:\/\/www.w3.org\/TR\/prov-overview\/."},{"key":"2025122814123539700_ref197","unstructured":"Moreau, L. and P.Missier. (2013b). \u201cProv-dm: The prov data model\u201d. http:\/\/www.w3.org\/TR\/2013\/REC-prov-dm-20130430\/."},{"issue":"9","key":"2025122814123539700_ref198","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1995376.1995394","article-title":"Satisfiability Modulo Theories: Introduction and Applications","volume":"54","author":"Moura","year":"2011","journal-title":"Commun. ACM"},{"issue":"11","key":"2025122814123539700_ref199","doi-asserted-by":"crossref","first-page":"1536","DOI":"10.14778\/3236187.3236204","article-title":"You say what, i hear where and why: (mis-)interpreting SQL to derive fine-grained provenance","volume":"11","author":"M\u00fcller","year":"2018","journal-title":"Proceedings of the VLDB Endowment"},{"issue":"12","key":"2025122814123539700_ref200","doi-asserted-by":"crossref","DOI":"10.14778\/2824032.2824089","article-title":"Provenance for SQL through Abstract Interpretation: Value-less, but Worthwhile","volume":"8","author":"M\u00fcller","year":"2015","journal-title":"Proceedings of the VLDB Endowment"},{"key":"2025122814123539700_ref201","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1109\/PST.2013.6596060","volume-title":"Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference on","author":"Nguyen","year":"2013"},{"key":"2025122814123539700_ref202","unstructured":"Niu, F., C.Zhang, C.R\u00e9, and J. W.Shavlik. (2012). \u201cDeepDive: Web-scale Knowledge-base Construction using Statistical Learning and Inference\u201d. In: Proceedings of the Second International Workshop on Searching and Integrating New Web Data Sources, Istanbul, Turkey, August 31, 2012. 25\u201328. URL: http:\/\/ceur-ws.org\/Vol-884\/VLDS2012%5C_p25%5C_Niu.pdf."},{"issue":"12","key":"2025122814123539700_ref203","doi-asserted-by":"crossref","first-page":"1857","DOI":"10.14778\/3137765.3137793","article-title":"Debugging Transactions and Tracking their Provenance with Reenactment","volume":"10","author":"Niu","year":"2017","journal-title":"Proceedings of the VLDB Endowment (Demonstration Track)"},{"key":"2025122814123539700_ref204","first-page":"473","article-title":"Provenance-aware Query Optimization","volume-title":"Proceedings of the 33rd IEEE International Conference on Data Engineering","author":"Niu","year":"2017"},{"key":"2025122814123539700_ref205","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2827074","article-title":"Heuristic and Cost-based Optimization for Diverse Provenance Tasks","volume-title":"IEEE Transactions on Knowledge and Data Engineering","author":"Niu","year":"2018"},{"issue":"12","key":"2025122814123539700_ref206","first-page":"1237","article-title":"Inspector Gadget: A Framework for Custom Monitoring and Debugging of Distributed Dataflows","volume":"4","author":"Olston","year":"2011","journal-title":"PVLDB"},{"issue":"2","key":"2025122814123539700_ref207","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/3003665.3003667","article-title":"Factorized Databases","volume":"45","author":"Olteanu","year":"2016","journal-title":"ACM SIGMOD Record"},{"key":"2025122814123539700_ref208","article-title":"On Factorisation of Provenance Polynomials","volume-title":"TaPP \u201911: 3rd USENIX Workshop on the Theory and Practice of Provenance","author":"Olteanu","year":"2011"},{"issue":"1","key":"2025122814123539700_ref209","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/2656335","article-title":"Size Bounds for Factorised Representations of Query Results","volume":"40","author":"Olteanu","year":"2015","journal-title":"ACM Transactions on Database Systems (TODS)"},{"key":"2025122814123539700_ref210","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1109\/PST.2012.6297930","volume-title":"Privacy, Security and Trust (PST), 2012 Tenth Annual International Conference on","author":"Park","year":"2012"},{"key":"2025122814123539700_ref211","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1145\/3127479.3129249","volume-title":"Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, September 24-27, 2017","author":"Pasquier","year":"2017"},{"key":"2025122814123539700_ref212","volume-title":"Causality: models, reasoning, and inference","author":"Pearl","year":"2000"},{"key":"2025122814123539700_ref213","doi-asserted-by":"crossref","unstructured":"Pereira, L. M.\n           (1986). \u201cRational Debugging in Logic Programming\u201d. In: Third International Conference on Logic Programming, Imperial College of Science and Technology, London, United Kingdom, July 14-18, 1986, Proceedings. 203\u2013210. DOI: 10.1007\/3-540-16492-8\\_76. URL: https:\/\/doi.org\/10.1007\/3-540-16492-8%5C_76.","DOI":"10.1007\/3-540-16492-8"},{"key":"2025122814123539700_ref214","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1145\/2364527.2364579","volume-title":"Proceedings of the 17th ACM SIGPLAN international conference on Functional programming","author":"Perera","year":"2012"},{"key":"2025122814123539700_ref215","first-page":"2","article-title":"Using provenance for repeatability","volume-title":"Proceedings of the 5th USENIX conference on Theory and Practice of Provenance","author":"Pham","year":"2013"},{"key":"2025122814123539700_ref216","first-page":"1179","article-title":"LDV: Light-weight Database Virtualization","volume-title":"Proceedings of the 31st IEEE International Conference on Data Engineering","author":"Pham","year":"2015"},{"key":"2025122814123539700_ref217","doi-asserted-by":"crossref","unstructured":"Pimentel, J. F., L.Murta, V.Braganholo, and J.Freire. (2019). \u201cA large-scale study about quality and reproducibility of jupyter notebooks\u201d. In: Proceedings of the 16th International Conference on Mining Software Repositories, MSR 2019, 26-27 May 2019, Montreal, Canada. Ed. by M. D.Storey, B.Adams, and S.Haiduc. IEEE. 507\u2013517. ISBN: 978-1-7281-3412-3. DOI: 10.1109\/MSR.2019.00077. URL: https:\/\/doi.org\/10.1109\/MSR.2019.00077.","DOI":"10.1109\/MSR.2019.00077"},{"key":"2025122814123539700_ref218","doi-asserted-by":"crossref","unstructured":"Psallidas, F. and E.Wu. (2018a). \u201cSmoke: Fine-Grained Lineage At Interactive Speed\u201d. Proc. VLDB Endow.11(6): 719\u2013732. DOI: 10.14778\/3184470.3184475. URL: https:\/\/doi.org\/10.14778\/3184470.3184475.","DOI":"10.14778\/3184470.3184475"},{"issue":"6","key":"2025122814123539700_ref219","doi-asserted-by":"crossref","first-page":"719","DOI":"10.14778\/3184470.3184475","article-title":"Smoke: Fine-grained lineage at interactive speed","volume":"11","author":"Psallidas","year":"2018","journal-title":"Proceedings of the VLDB Endowment"},{"key":"2025122814123539700_ref220","unstructured":"Ramusat, Y., S.Maniu, and P.Senellart. (2018). \u201cSemiring Provenance over Graph Databases\u201d. In: 10th USENIX Workshop on the Theory and Practice of Provenance, TaPP 2018, London, UK, July 11-12, 2018. Ed. by M.Herschel. USENIX Association. URL: https:\/\/www.usenix.org\/conference\/tapp2018\/presentation\/ramusat."},{"key":"2025122814123539700_ref221","doi-asserted-by":"crossref","unstructured":"Rio, N. D. and P. P.da Silva. (2007). \u201cProbe-It! Visualization Support for Provenance\u201d. In: Advances in Visual Computing, Third International Symposium, ISVC 2007, Lake Tahoe, NV, USA, November 26-28, 2007, Proceedings, Part II. Ed. by G.Bebis, R. D.Boyle, B.Parvin, D.Koracin, N.Paragios, T. F.Syeda-Mahmood, T.Ju, Z.Liu, S.Coquillart, C.Cruz-Neira, T.M\u00fcller, and T.Malzbender. Vol. 4842. Lecture Notes in Computer Science. Springer. 732\u2013741. ISBN: 978-3-540-76855-5. DOI: 10.1007\/978-3-540-76856-2\\_72. URL: https:\/\/doi.org\/10.1007\/978-3-540-76856-2%5C_72.","DOI":"10.1007\/978-3-540-76856-2"},{"key":"2025122814123539700_ref222","doi-asserted-by":"crossref","DOI":"10.1145\/2588555.2588578","article-title":"A formal approach to finding explanations for database queries","volume-title":"SIGMOD","author":"Roy","year":"2014"},{"key":"2025122814123539700_ref223","volume-title":"8th USENIX Workshop on the Theory and Practice of Provenance (TaPP 16)","author":"Salimi","year":"2016"},{"key":"2025122814123539700_ref224","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1145\/3183713.3196914","volume-title":"Proceedings of the 2018 International Conference on Management of Data","author":"Salimi","year":"2018"},{"key":"2025122814123539700_ref225","first-page":"1251","volume-title":"SIGMOD \u201908: Proceedings of the 34th SIGMOD International Conference on Management of Data","author":"Scheidegger","year":"2008"},{"key":"2025122814123539700_ref226","doi-asserted-by":"crossref","unstructured":"Schwartz, E. J., T.Avgerinos, and D.Brumley. (2010). \u201cAll You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)\u201d. In: 31st IEEE Symposium on Security and Privacy, S&P 2010, 16-19 May 2010, Berleley\/Oakland, California, USA. IEEE Computer Society. 317\u2013331. ISBN: 978-0-7695-4035-1. DOI: 10.1109\/SP.2010.26. URL: https:\/\/doi.org\/10.1109\/SP.2010.26.","DOI":"10.1109\/SP.2010.26"},{"key":"2025122814123539700_ref227","article-title":"Provenance and Probabilities in Relational Databases: From Theory to Practice","volume-title":"SIGMOD record","author":"Senellart","year":"2017"},{"issue":"12","key":"2025122814123539700_ref228","doi-asserted-by":"crossref","first-page":"2034","DOI":"10.14778\/3229863.3236253","article-title":"ProvSQL: provenance and probability management in postgreSQL","volume":"11","author":"Senellart","year":"2018","journal-title":"Proceedings of the VLDB Endowment"},{"issue":"2","key":"2025122814123539700_ref229","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1023\/A:1008726123320","article-title":"Using constraint satisfaction for view update","volume":"15","author":"Shu","year":"2000","journal-title":"Journal of Intelligent Information Systems"},{"key":"2025122814123539700_ref230","first-page":"25","article-title":"Tioga: Providing Data Management Support for Scientific Visualization Applications","volume-title":"VLDB","author":"Stonebraker","year":"1993"},{"key":"2025122814123539700_ref231","doi-asserted-by":"crossref","unstructured":"Suciu, D.\n           (2020). \u201cProbabilistic Databases for All\u201d. In: Proceedings of the 39th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, PODS 2020, Portland, OR, USA, June 14-19, 2020. Ed. by D.Suciu, Y.Tao, and Z.Wei. ACM. 19\u201331. ISBN: 978-1-4503-7108-7. DOI: 10.1145\/3375395.3389129. URL: https:\/\/doi.org\/10.1145\/3375395.3389129.","DOI":"10.1145\/3375395.3389129"},{"issue":"2","key":"2025122814123539700_ref232","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-031-01879-4","article-title":"Probabilistic databases","volume":"3","author":"Suciu","year":"2011","journal-title":"Synthesis Lectures on Data Management"},{"issue":"1","key":"2025122814123539700_ref233","doi-asserted-by":"crossref","DOI":"10.5334\/jors.bq","article-title":"Komadu: A Capture and Visualization System for Scientific Data Provenance","volume":"3","author":"Suriarachchi","year":"2015","journal-title":"Journal of Open Research Software"},{"issue":"1","key":"2025122814123539700_ref234","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/3051528.3051533","article-title":"Provenance analysis for FOL model checking","volume":"4","author":"Tannen","year":"2017","journal-title":"ACM SIGLOG News"},{"key":"2025122814123539700_ref235","doi-asserted-by":"crossref","unstructured":"That, D. H. T., G.Fils, Z.Yuan, and T.Malik. (2017). \u201cSciunits: Reusable Research Objects\u201d. In: 13th IEEE International Conference on e-Science, e-Science 2017, Auckland, New Zealand, October 24-27, 2017. IEEE Computer Society. 374\u2013383. ISBN: 978-1-5386-2686-3. DOI: 10.1109\/eScience.2017.51. URL: https:\/\/doi.org\/10.1109\/eScience.2017.51.","DOI":"10.1109\/eScience.2017.51"},{"key":"2025122814123539700_ref236","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/1807167.1807172","volume-title":"SIGMOD \u201910: Proceedings of the 2010 international conference on Management of data","author":"Tran","year":"2010"},{"key":"2025122814123539700_ref237","doi-asserted-by":"crossref","DOI":"10.1561\/9781680833157","article-title":"Query Processing on Probabilistic Data: A Survey","author":"Van den Broeck","year":"2017"},{"issue":"3","key":"2025122814123539700_ref238","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1145\/116825.116838","article-title":"The well-founded semantics for general logic programs","volume":"38","author":"Van Gelder","year":"1991","journal-title":"Journal of the ACM (JACM)"},{"issue":"4","key":"2025122814123539700_ref239","first-page":"29","article-title":"Recording Provenance for SQL Queries and Updates","volume":"30","author":"Vansummeren","year":"2007","journal-title":"IEEE Data Engineering Bulletin"},{"key":"2025122814123539700_ref240","doi-asserted-by":"crossref","unstructured":"Vollmer, M., L.Golab, K.B\u00f6hm, and D.Srivastava. (2019). \u201cInformative Summarization of Numeric Data\u201d. In: Proceedings of the 31st International Conference on Scientific and Statistical Database Management, SSDBM 2019, Santa Cruz, CA, USA, July 23-25, 2019. Ed. by C.Maltzahn and T.Malik. ACM. 97\u2013108. ISBN: 978-1-4503-6216-0. DOI: 10.1145\/3335783.3335797. URL: https:\/\/doi.org\/10.1145\/3335783.3335797.","DOI":"10.1145\/3335783.3335797"},{"key":"2025122814123539700_ref241","unstructured":"Wang, Q., T.Yu, N.Li, J.Lobo, E.Bertino, K.Irwin, and J.Byun. (2007). \u201cOn the Correctness Criteria of Fine-Grained Access Control in Relational Databases\u201d. In: Proceedings of the 33rd International Conference on Very Large Data Bases, University of Vienna, Austria, September 23-27, 2007. Ed. by C.Koch, J.Gehrke, M. N.Garofalakis, D.Srivastava, K.Aberer, A.Deshpande, D.Florescu, C. Y.Chan, V.Ganti, C.Kanne, W.Klas, and E. J.Neuhold. ACM. 555\u2013566. ISBN: 978-1-59593-649-3. URL: http:\/\/www.vldb.org\/conf\/2007\/papers\/research\/p555-wang.pdf."},{"key":"2025122814123539700_ref242","doi-asserted-by":"crossref","DOI":"10.1145\/2723372.2750549","article-title":"Data X-Ray: A Diagnostic Tool for Data Errors","volume-title":"Sigmod","author":"Wang","year":"2015"},{"key":"2025122814123539700_ref243","first-page":"439","article-title":"Program slicing","volume-title":"Proceedings of the 5th international conference on Software engineering","author":"Weiser","year":"1981"},{"key":"2025122814123539700_ref244","article-title":"SubZero: A Fine-Grained Lineage System for Scientific Databases","author":"Wu","year":"2012"},{"issue":"8","key":"2025122814123539700_ref245","first-page":"553","article-title":"Scorpion: Explaining Away Outliers in Aggregate Queries","volume":"6","author":"Wu","year":"2013","journal-title":"PVLDB"},{"key":"2025122814123539700_ref246","first-page":"3","volume-title":"Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks","author":"Wu","year":"2013"},{"key":"2025122814123539700_ref247","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1145\/2619239.2626335","volume-title":"Proceedings of the 2014 ACM conference on SIG-COMM","author":"Wu","year":"2014"},{"key":"2025122814123539700_ref248","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1145\/3318464.3380571","volume-title":"Proceedings of the 2020 International Conference on Management of Data, SIGMOD Conference 2020, online conference [Portland, OR, USA], June 14-19, 2020","author":"Wu","year":"2020"},{"key":"2025122814123539700_ref249","doi-asserted-by":"crossref","DOI":"10.1145\/2566486.2568014","article-title":"TripleProv: Efficient Processing of Lineage Queries in a Native RDF Store","volume-title":"Proceedings of the 24th international conference on World Wide Web (WWW)","author":"Wylot","year":"2014"},{"key":"2025122814123539700_ref250","first-page":"39","article-title":"Provenance Analysis for Missing Answers and Integrity Repairs","volume-title":"Data Engineering","author":"Xu","year":"2018"},{"key":"2025122814123539700_ref251","volume-title":"8th USENIX Workshop on the Theory and Practice of Provenance (TaPP 16)","author":"Yan","year":"2016"},{"issue":"12","key":"2025122814123539700_ref252","doi-asserted-by":"crossref","first-page":"1578","DOI":"10.14778\/2824032.2824055","article-title":"Lenses: an on-demand approach to ETL","volume":"8","author":"Yang","year":"2015","journal-title":"Proceedings of the VLDB Endowment"},{"key":"2025122814123539700_ref253","first-page":"10","article-title":"Spark: cluster computing with working sets","volume-title":"Proceedings of the 2nd USENIX conference on Hot topics in cloud computing","author":"Zaharia","year":"2010"},{"key":"2025122814123539700_ref254","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1145\/1739041.1739080","volume-title":"Proceedings of the 13th International Conference on Extending Database Technology","author":"Zhang","year":"2010"},{"key":"2025122814123539700_ref255","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1145\/3078597.3078603","volume-title":"Proceedings of the 26th International Symposium on High-Performance Parallel and Distributed Computing","author":"Zhang","year":"2017"},{"key":"2025122814123539700_ref256","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/ICDE.2019.00025","volume-title":"35th IEEE International Conference on Data Engineering, ICDE 2019, Macao, China, April 8-11, 2019","author":"Zheng","year":"2019"}],"container-title":["Foundations and Trends in Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/ftdbs\/article-pdf\/9\/3-4\/209\/11155554\/1900000068en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ftdbs\/article-pdf\/9\/3-4\/209\/11155554\/1900000068en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T19:13:15Z","timestamp":1766949195000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ftdbs\/article\/9\/3-4\/209\/1332411\/Data-ProvenanceOrigins-Applications-Algorithms-and"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,28]]},"references-count":256,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2021,4,28]]}},"URL":"https:\/\/doi.org\/10.1561\/1900000068","relation":{},"ISSN":["1931-7883","1931-7891"],"issn-type":[{"value":"1931-7883","type":"print"},{"value":"1931-7891","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,28]]}}}