Using Provenance to Support Real-Time Collaborative Design of Workflows Workflow evolution provenance and OPM Tommy Ellkvist and Juliana Freire.

Slides:



Advertisements
Similar presentations
Querying with Units Getting what you asked for IVOA interoperability meeting M Hill (ROE), May 2004.
Advertisements

Brief Introduction to Provenance "As data becomes plentiful, verifiable truth becomes scarce
Feedback on OPM Yogesh Simmhan Microsoft Research Synthesis of pairwise conversations with: Roger Barga Satya Sahoo Microsoft Research Beth Plale Abhijit.
Q UERY L ANGUAGE C ONSTRUCTS FOR P ROVENANCE Murali Mani, Mohamad Alawa, Arunlal Kalyanasundaram University of Michigan, Flint Presented at IDEAS 2011.
Interval Heaps Complete binary tree. Each node (except possibly last one) has 2 elements. Last node has 1 or 2 elements. Let a and b be the elements in.
Interval Trees Store intervals of the form [li,ri], li <= ri.
Open Provenance Model Tutorial Session 2: OPM Overview and Semantics Luc Moreau University of Southampton.
Composing XSL Transformations with XML Publishing Views Chengkai LiUniversity of Illinois at Urbana-Champaign Philip Bohannon Lucent Technologies, Bell.
Open Provenance Model Tutorial Session 7: Open Provenance Model Vocabulary.
ICS-FORTH May 23, An Ontological Approach to Digital Preservation Metadata Martin Doerr Foundation for Research and Technology - Hellas Institute.
Open Provenance Model Tutorial Session 3: OPM Serializations Luc Moreau University of Southampton.
UTPB: A Benchmark for Scientific Workflow Provenance Storage and Querying Systems Artem Chebotko Joint work with E. De Hoyos, C. Gomez, A. Kashlev, X.
DISCOVER: Keyword Search in Relational Databases Vagelis Hristidis University of California, San Diego Yannis Papakonstantinou University of California,
A Provenance-based Access Control Model (PBAC) July 18, 2012 PST’12, Paris, France Jaehong Park, Dang Nguyen and Ravi Sandhu Institute for Cyber Security.
11 World-Leading Research with Real-World Impact! Integrated Provenance Data for Access Control in Group-centric Collaboration Dang Nguyen, Jaehong Park.
Storing, Indexing and Querying Large Provenance Data Sets as RDF Graphs in Apache HBase Artem Chebotko Joint work with John Abraham and Pearl Brazier University.
Building and Analyzing Social Networks Web Data and Semantics in Social Network Applications Dr. Bhavani Thuraisingham February 15, 2013.
Provenance in Open Distributed Information Systems Syed Imran Jami PhD Candidate FAST-NU.
An Algorithm for Streaming XPath Processing with Forward and Backward Axes Charles Barton, Philippe Charles, Deepak Goyal, Mukund Raghavchari IBM T. J.
VisTrails Provenance In VisIt David Koop. VisIt Basics ‘Turn-key’ visualization application Viewer GUI Plots / Operators.
1 XEM: Managing the Evolution of XML Documents Author: Hong Su, Diane Kramer. Li Chen, Kajal Claypool and Elke A. Rundensteiner Presented by: Li Shuhong.
VisTrails: Overview Juliana Freire University of Utah Joint work with: Erik Andersen, Steven P. Callahan, David Koop, Emanuele.
Is the following graph Hamiltonian- connected from vertex v? a). Yes b). No c). I have absolutely no idea v.
Page 1 Multidatabase Querying by Context Ramon Lawrence, Ken Barker Multidatabase Querying by Context.
The Mathematics of Networks Chapter 7. Trees A tree is a graph that –Is connected –Has no circuits Tree.
The information integration wizard (Iwiz) project Report on work in progress Joachim Hammer Presented by Muhammed Al-Muhammed.
Mining Metamodels From Instance Models: The MARS System Faizan Javed Department of Computer & Information Sciences, University of Alabama at Birmingham.
Interoperability for Provenance-aware Databases using PROV and JSON Dieter Gawlick, Zhen Hua Liu, Vasudha Krishnaswamy Oracle Corporation Raghav Kapoor,
Open Provenance Model Tutorial Session 5: OPM Emerging Profiles.
Amarnath Gupta Univ. of California San Diego. An Abstract Question There is no concrete answer …but …
Using Provenance to Support Real-Time Collaborative Design of Workflows Tommy Ellkvist 1, Erik Anderson 2, David Koop 2, Juliana Freire 2, and Claudio.
Cytoscape A powerful bioinformatic tool Mathieu Michaud
E-VLBI Software Suite & DRAGON Interoperability Chet Ruszczyk, Jason Soohoo.
11 World-Leading Research with Real-World Impact! Towards Provenance and Risk-Awareness in Social Computing Yuan Cheng, Dang Nguyen, Khalid Bijon, Ram.
Provenance-based Access Control in Cloud IaaS August 23, 2013 Dissertation Proposal Dang Nguyen Institute for Cyber Security University of Texas at San.
On Data Provenance in Group-centric Secure Collaboration Oct. 17, 2011 CollaborateCom Jaehong Park, Dang Nguyen and Ravi Sandhu Institute for Cyber Security.
Pavan Reddiavri (Ebiquity Labs) “R ♫ P” RDF Access control Policies.
Structured Documentation Management (Smart Documents for Open Data) Project.
©Ferenc Vajda 1 Semantic Grid Ferenc Vajda Computer and Automation Research Institute Hungarian Academy of Sciences.
Lecture A/18-849B/95-811A/19-729A Internet-Scale Sensor Systems: Design and Policy Lecture 24 – Part 2 XML Query Processing Phil Gibbons April.
1 Knowledge Transfer in the Cyber-Infrastructure Group –Microsoft eScience Tools –NANOOS and IOOS Web Services.
A Systemic Approach for Effective Semantic Access to Cultural Content Ilianna Kollia, Vassilis Tzouvaras, Nasos Drosopoulos and George Stamou Presenter:
____________________________ XML Access Control for Semantically Related XML Documents & A Role-Based Approach to Access Control For XML Databases BY Asheesh.
Dependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems June 14, 2012 TaPP’12 Dang Nguyen, Jaehong Park and Ravi Sandhu.
Steven Seida How Does an RDF Knowledge Store Compare to an RDBMS?
New COOL Tag Browser Release 10 Giorgi BATIASHVILI Georgian Engineering Center 23/10/2012
VisTrails Second Provenance Challenge Tommy Ellkvist David Koop Juliana Freire Joint work with: Erik Andersen, Steven P. Callahan, Emanuele Santos, Carlos.
A Portrait of the Semantic Web in Action Jeff Heflin and James Hendler IEEE Intelligent Systems December 6, 2010 Hyewon Lim.
Scheduling of Transactions on XML Documents Author: Stijin Dekeyser Jan Hidders Reviewed by Jason Chen, Glenn, Steven, Christian.
ABAP Objects Role in SAP Programming John Benson.
Graphs Definition: a graph is an abstract representation of a set of objects where some pairs of the objects are connected by links. The interconnected.
7 Finding Bridge in a Graph. What is a bridge ? A C D B F G E.
Graph Representations And Traversals. Graphs Graph : – Set of Vertices (Nodes) – Set of Edges connecting vertices (u, v) : edge connecting Origin: u Destination:
SPADE on Android
International Workshop 28 Jan – 2 Feb 2011 Phoenix, AZ, USA Modeling Standards Activity Team Model-based Systems Engineering (MBSE) Initiative Roger Burkhart.
The Java API for XML Binding. The Need for Data Binding To support unmarshlling to convert XML data into Java objects. To support marshalling to convert.
Visualization for Ontology Evolution
A SmartMobile GuiDE Goals: Phone GuiDE: Key Insight:
UCSD Neuron-Centered Database
Grid Metadata Management
Associative Query Answering via Query Feature Similarity
Analyzing and Securing Social Networks
A Plug-In Architecture for Graph Based Collaborative Modeling Systems
NSDL Data Repository (NDR)
2/18/2019.
EOC Practice #15 SPI
Administration Module
Graphs & Trees.
On Premise High Availability DR Template
DBA Capture Diagram Template
Presentation transcript:

Using Provenance to Support Real-Time Collaborative Design of Workflows Workflow evolution provenance and OPM Tommy Ellkvist and Juliana Freire

Workflow Evolution Version Tree Workflows Data Products

Action based representation of workflows u Nodes represents workflows u Edges represents actions u Actions are transformations on workflows u Actions are performed by users Add Module(0) Add Module(1) 3 Add Connection(0,1)

OPM XML schema: Example of OPM (The OPM, 2007)

OPM XML schema: Translated OPM Example 1 G O 1 G O … 1 G 2 O 3 O … G O O O O O G …

Vistrails XML Model

Vistrails XML Model: Translated to OPM <Used ProcessId = "1" Role = "in" ArtifactId = "0"stopTimeBegin = " :35:39" stopTimeEnd = " :35:39"> G G G <WasGeneratedBy ArtifactId = "1" Role = "out" ProcessId = "1” stopTimeBegin = " :35:39” stopTimeEnd = " :35:39"> G G G <WasControlledBy ProcessId = "1" AgentId = "concat.xml" startTimeBegin = " :35:39” startTimeEnd = " :35:39” stopTimeBegin = " :35:39” stopTimeEnd = " :35:39"> G G G concat.xml G 0 G 1 G 2 G 3 G 1 G 2 G 3

Observations u General model –Only contains enough information to traverse the provenance graph –No additional information stored u Different ways of representing workflow design provenance –Edges as actions –Edges as version differences

Observations u What is the time? –How to interpret a time T of a process? –Does interpretation affect querying –Semantics of intervals u Who is the Agent? –Users –Workflow system –The session –Workflow specification u ”OPM Level 2”? –Are ther workflow specifics we want to express

Interoperability