Abstract
There are a wide variety of data resources description methods, which are applied for different application backgrounds. Military data resources classified generally in accordance with branches or organization structure to describe. This paper focus on describing the relationship between the data and tracking the provenance of data, and proposes a method for describing data sources faced to data provenance, which is verified by simple example. Not only explores how to resolve the current military data problems about collection, verification, using and sharing difficulties, but also researches how to resolve the problems about data credibility, data quality and version information when sharing data by the method of data provenance, which can help the users to verify the quality of data, audit data origin, locate the error position, optimize the integration process and so on.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wu Dingming, Man Lung Yiu, Gao Cong, and Christian S.Jensen. in Joint Top-K Spatial Keyword Query Processing[J],IEEE International Conference on Data Engineering,2011,pp.55-56
Rocha Junio. “Top-K Spatial Keyword Queries on Road Networks”, in EDBT 2012 Berlin,Germany, 2012,pp.34-35
The Library of Congress. Australian National Bibliographic Database Metadata Project in MODS Implementation Registry[EB/OL].2012
Ariba. Microsoft Technical White Paper.UDDI.org, 2000,(9).pp.45-49
Amit S, Cartic R. “Semantic Technology in Action: Ontology Driven Information Systems for Search, Integration and Analysis” [J].IEEE Data Engineering Bulletin, 2003, 12, pp.67-69.
Curbera F, Duftler M, Khalaf R, et al. “Unraveling the Web Services Web: An Introduction to SOAP, WSDL, and UDDI”.IEEE Internet Computing, 2002,(03/04),pp.86-93
Xiaohui Wang, “Query and Reasoning of Ontology and its application in military field”, Chongqing University, Chongqing, 2012, pp.23-35. (Chinese)
Wu Yongbo, Sha jichang, Tan Dongfeng, “An Analysis of Military Organization Ontology”, Computer Engineering Scirence[J], 2007,29(2),pp.132-135. (Chinese)
Dai chaofan, Wang Tao, Zhang Pengcheng,”Survey of Data Provenance Technology” [J], Application Research of Computers, 2010,27(9),pp.3216-3218. (Chinese)
Ming Hua, Zhang Yong, Fu Xiaohui, “Survey of Data Provenance” [J], Journal of Chinese Computer Systems, 2012,33(9),pp.1918-1919. (Chinese)
Zhao Yanpeng, Dai Chaofan, “Research and Application of Data Provenance Based on PROV”[J], Advances in Engineering Research, 2015, pp.1551-1557. (Chinese)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Atlantis Press and the author(s)
About this paper
Cite this paper
Zhao, Yp., Dai, Cf., Zhang, Xy. (2016). Research of Data Resource Description Method Oriented Provenance. In: Qi, E., Shen, J., Dou, R. (eds) Proceedings of the 22nd International Conference on Industrial Engineering and Engineering Management 2015. Atlantis Press, Paris. https://doi.org/10.2991/978-94-6239-177-2_22
Download citation
DOI: https://doi.org/10.2991/978-94-6239-177-2_22
Published:
Publisher Name: Atlantis Press, Paris
Print ISBN: 978-94-6239-176-5
Online ISBN: 978-94-6239-177-2
eBook Packages: EngineeringEngineering (R0)