Old Web
English
Sign In
Acemap
>
Paper
>
Exploiting Execution Provenance to Explain Difference Between Two Data-Intensive Computations
Exploiting Execution Provenance to Explain Difference Between Two Data-Intensive Computations
2018
Priyaa Thavasimani
Jacek Cala
Paolo Missier
Keywords:
Computation
Data mining
Big data
Computer science
Provenance
Data modeling
Correction
Source
Cite
Save
Machine Reading By IdeaReader
4
References
1
Citations
NaN
KQI
[]