Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …
sources in the cloud during transit and processing. For instance, data provenance, which …
Determination of dissolved organic carbon in seawater using high temperature catalytic oxidation techniques
G Spyres, M Nimmo, PJ Worsfold, EP Achterberg… - TrAC Trends in …, 2000 - Elsevier
The high temperature catalytic oxidation (HTCO)–discrete injection method for liquid
samples is currently the preferred analytical technique for the determination of dissolved …
samples is currently the preferred analytical technique for the determination of dissolved …
The foundations for provenance on the web
L Moreau - Foundations and Trends® in Web Science, 2010 - nowpublishers.com
Provenance, ie, the origin or source of something, is becoming an important concern, since it
offers the means to verify data products, to infer their quality, to analyse the processes that …
offers the means to verify data products, to infer their quality, to analyse the processes that …
The requirements of using provenance in e-science experiments
In e-Science experiments, it is vital to record the experimental process for later use such as
in interpreting results, verifying that the correct process took place or tracing where data …
in interpreting results, verifying that the correct process took place or tracing where data …
Blockchain-based anonymous data sharing with accountability for Internet of Things
Blockchain has been a promising infrastructure for enabling secure data sharing for the
Internet of Things (IoT). With the widespread of IoT applications, security issues, such as …
Internet of Things (IoT). With the widespread of IoT applications, security issues, such as …
An architecture for provenance systems
This document covers the logical and process architectures of provenance systems. The
logical architecture identifies key roles and their interactions, whereas the process …
logical architecture identifies key roles and their interactions, whereas the process …
A protocol for recording provenance in service-oriented grids
Both the scientific and business communities, which are beginning to rely on Grids as
problem-solving mechanisms, have requirements in terms of provenance. The provenance …
problem-solving mechanisms, have requirements in terms of provenance. The provenance …
Security and data accountability in distributed systems: A provenance survey
While provenance research is common in distributed systems, many proposed solutions do
not address the security of systems and accountability of data stored in those systems. In this …
not address the security of systems and accountability of data stored in those systems. In this …
Preserv: Provenance recording for services
The importance of understanding the process by which a result was generated in an
experiment is fundamental to science. Without such information, other scientists cannot …
experiment is fundamental to science. Without such information, other scientists cannot …
Transient processes near the acoustic threshold of parametrically-driven bubble shape oscillations
AO Maksimov, TG Leighton - Acta Acustica united with Acustica, 2001 - ingentaconnect.com
The nonlinear response of a gas bubble to a low frequency ωp pum** wave results in
parametrically-generated shape oscillations above a well-defined threshold. This may be …
parametrically-generated shape oscillations above a well-defined threshold. This may be …