PROGRAM
Days: Monday, July 9th Tuesday, July 10th Wednesday, July 11th Thursday, July 12th Friday, July 13th
Monday, July 9th
View this program: with abstractssession overviewtalk overview
09:45-11:00 Session 2: Welcome and IPAW Keynote: From Workflows to Provenance and Reproducibility - Looking Back and Forth
09:45 | IPAW Opening (abstract) |
10:00 | From Workflows to Provenance and Reproducibility: Looking Back and Forth (abstract) |
11:00-11:30Coffee
11:30-13:00 Session 3: IPAW - Reproducibility
11:30 | Provenance Annotation and Analysis to Support Process Re-Computation (abstract) |
12:00 | Provenance of Dynamic Adaptations
in User-steered Dataflows (abstract) |
12:30 | Classification of Provenance Triples for Scientific Reproducibility: A Comparative Evaluation of Deep Learning Models in the ProvCaRe Project (abstract) |
13:00-14:00Lunch
14:00-15:30 Session 4: IPAW - Modeling, Simulating and Capturing provenance
14:00 | A Provenance Model for the European Union General Data Protection Regulation (abstract) |
14:30 | Automating Provenance Capture in Software Engineering with UML2PROV (abstract) |
15:00 | Simulated Domain-specific Provenance (abstract) |
15:30-16:00Coffee
16:00-17:00 Session 5: IPAW - PROV Extensions
16:00 | Versioned-PROV: A PROV extension to support mutable data entities (abstract) |
16:30 | Using the Provenance from Astronomical Workflows (abstract) |
Tuesday, July 10th
View this program: with abstractssession overviewtalk overview
10:00-11:00 Session 7: IPAW - Scientific Workflows
10:00 | Discovering Similar Workflows via Provenance Clustering: a Case Study (abstract) |
10:30 | Validation and Inference of Schema-Level Workflow Data-Dependency Annotations (abstract) |
11:00-11:30Coffee
11:30-12:30 Session 8: IPAW - Applications
11:30 | Belief Propagation through Provenance Graphs (abstract) |
12:00 | Using Provenance to Efficiently Propagate SPARQL Updates on RDF Source Graphs (abstract) |
12:30-13:30Lunch
13:30-15:30 Session 9: Poster and Demo Lightning Talks
13:30 | Capturing Provenance for Runtime Data Analysis in Computational Science and Engineering Applications (abstract) |
13:35 | UniProv - Provenance Management for UNICORE Workflows in HPC Environments (abstract) |
13:40 | Towards a PROV Ontology for Simulation Models (abstract) |
13:45 | Capturing the Provenance of Internet of Things Deployments (abstract) |
13:50 | Towards Transparency of IoT Message Brokers (abstract) |
13:55 | Provenance-based Root Cause Analysis for Revenue Leakage Detection: Telecommunication Case Study (abstract) |
14:00 | Implementing Data Provenance in Health Data Analytics Software (abstract) |
14:05 | Case Base Reasoning decision support using the DecPROV ontology for decision modelling (abstract) |
14:10 | Research Data Alliance's Provenance Pattern Working Group (abstract) |
14:15 | Bottleneck Patterns in Provenance (abstract) |
14:20 | Architecture for Template-driven Provenance Recording (abstract) |
14:25 | Combining Provenance Management and Schema Evolution (abstract) |
14:30 | Provenance for Entity Resolution (abstract) |
14:35 | Where Provenance in Database Storage (abstract) |
14:40 | Streaming Provenance Compression (abstract) |
14:45 | Evidence of Power-law structure in Provenance graphs (abstract) |
14:50 | Quine: a Temporal Graph System for Provenance Storage and Analysis (abstract) |
14:55 | A Graph Testing Framework for Provenance Network Analytics (abstract) |
15:00 | Provenance for astrophysical data (abstract) |
15:05 | Data Provenance in Agriculture (abstract) |
15:10 | Extracting Provenance Metadata from Privacy Policies (abstract) |
15:15 | Provenance-Enabled Stewardship of Human Data in the GDPR era (abstract) |
Wednesday, July 11th
View this program: with abstractssession overviewtalk overview
10:00-11:00 Session 12: TaPP - Welcome to the 10th edition of TaPP
10:00 | Principles of Provenance: We (still) need some (abstract) |
11:00-11:30Coffee
11:30-13:00 Session 13: TaPP - Research session I: Provenance use cases and applications
11:30 | Using Provenance for Generating Automatic Citations (abstract) |
12:00 | Pointer Provenance in a Capability Architecture (abstract) |
12:30 | Provenance-based Intrusion Detection: Opportunities and Challenges (abstract) |
13:00-14:00Lunch
14:00-15:30 Session 14: TaPP - Keynote: Provenance and Probabilities in Relational Databases: From Theory to Practice
14:00 | Provenance and Probabilities in Relational Databases: From Theory to Practice (abstract) |
15:30-16:00Coffee
16:00-17:00 Session 15: TaPP - Research session II: Provenance enabled systems
16:00 | Curator: Provenance Management for Modern Distributed Systems (abstract) |
16:30 | Wrattler: Reproducible, live and polyglot notebooks (abstract) |
Thursday, July 12th
View this program: with abstractssession overviewtalk overview
10:00-11:00 Session 17: TaPP - Research session III: Extension and Implementation of How-Provenance
10:00 | Semiring Provenance over Graph Databases (abstract) |
10:30 | How 'How' Explains What 'What' Computes — How-Provenance for SQL and Query Compilers (abstract) |
11:00-11:30Coffee
12:30-13:30Lunch
15:30-16:00Coffee
Friday, July 13th
View this program: with abstractssession overviewtalk overview
11:00-11:30Coffee
13:00-14:00Lunch
15:30-16:00Coffee