Sven Koehler
Sven Koehler
Verified email at ucdavis.edu
Title
Cited by
Cited by
Year
First-order provenance games
S Köhler, B Ludäscher, D Zinn
In Search of Elegance in the Theory and Practice of Computation, 382-399, 2013
392013
Parallelizing XML data-streaming workflows via MapReduce
D Zinn, S Bowers, S Köhler, B Ludäscher
Journal of Computer and System Sciences 76 (6), 447-463, 2010
362010
Declarative datalog debugging for mere mortals
S Köhler, B Ludäscher, Y Smaragdakis
International Datalog 2.0 Workshop, 111-122, 2012
352012
Scientific workflows and provenance: Introduction and research opportunities
V Cuevas-Vicenttín, S Dey, S Köhler, S Riddle, B Ludäscher
Datenbank-Spektrum 12 (3), 193-203, 2012
332012
On implementing provenance-aware regular path queries with relational query engines
S Dey, V Cuevas-Vicenttín, S Köhler, E Gribkoff, M Wang, B Ludäscher
Proceedings of the Joint EDBT/ICDT 2013 Workshops, 214-223, 2013
312013
Scientific workflow design 2.0: Demonstrating streaming data collections in Kepler
L Dou, D Zinn, T McPhillips, S Köhler, S Riddle, S Bowers, B Ludäscher
2011 IEEE 27th International Conference on Data Engineering, 1296-1299, 2011
302011
A SQL-middleware unifying why and why-not provenance for first-order queries
S Lee, S Köhler, B Ludäscher, B Glavic
2017 IEEE 33rd International Conference on Data Engineering (ICDE), 485-496, 2017
242017
Towards constraint provenance games
S Riddle, S Köhler, B Ludäscher
6th {USENIX} Workshop on the Theory and Practice of Provenance (TaPP 2014), 2014
242014
Improving workflow fault tolerance through provenance-based recovery
S Köhler, S Riddle, D Zinn, T McPhillips, B Ludäscher
International Conference on Scientific and Statistical Database Management …, 2011
212011
Datalog as a Lingua Franca for Provenance Querying and Reasoning.
SC Dey, S Köhler, S Bowers, B Ludäscher
TaPP, 2012
202012
Insider attack identification and prevention using a declarative approach
A Sarkar, S Köhler, S Riddle, B Ludäscher, M Bishop
2014 IEEE Security and Privacy Workshops, 265-276, 2014
172014
Towards constraint-based explanations for answers and non-answers
B Glavic, S Köhler, S Riddle, B Ludäscher
7th {USENIX} Workshop on the Theory and Practice of Provenance (TaPP 15), 2015
162015
Parallelizing XML processing pipelines via MapReduce
D Zinn, S Bowers, S Köhler, B Ludäscher
Journal of Computer and System Sciences, 2009
62009
Insider attack identification and prevention in collection-oriented dataflow-based processes
A Sarkar, S Köhler, B Ludäscher, M Bishop
IEEE Systems Journal 11 (2), 522-533, 2015
52015
Improving Natural Science Collections data through quality control for research using Kepler workflows embedded in a FilteredPush network
PJ Morris, JA Macklin, J Hanken, M Kelly, S Koehler, D Lowery, ...
SPNHC 2013, 33, 2013
52013
Sliding window calculations on streaming data using the kepler scientific workflow system
S Kohler, S Gulati, G Cao, Q Hart, B Ludascher
Procedia Computer Science 9, 1639-1646, 2012
52012
Efficiently computing provenance graphs for queries with negation
S Lee, S Koehler, B Ludäscher, B Glavic
arXiv preprint arXiv:1701.05699, 2017
42017
Implementing Unified Why-and Why-Not Provenance Through Games
S Lee, S Köhler, B Ludäscher, B Glavic
International Provenance and Annotation Workshop, 209-213, 2016
42016
An efficient implementation of game provenance in DBMS
S Lee, Y Tang, S Köhler, B Ludäscher, B Glavic
Technical Report IIT/CS-DB-2015-02, Illinois Institute of Technology, 2015
32015
Towards automated design, analysis and optimization of declarative curation workflows
T Song, S Köhler, B Ludäscher, J Hanken, M Kelly, D Lowery, ...
32014
The system can't perform the operation now. Try again later.
Articles 1–20