Results 31 to 40 of about 356,041 (290)
Germination responses to light of four Neotropical forest tree species along an elevational gradient in the southern Central Andes [PDF]
Seed germination is a key part of plants' life cycle and is mostly affected by the genetic background, the environmental conditions experienced by the mother plant and the seedbed conditions.
Caron, Maria Mercedes +4 more
core +1 more source
Cenozoic surface uplift of Tibetan Plateau has driven the birth and reorganization of large river systems in Asia. The development of the Yangtze River, closely linked to plateau uplift, has important implications for the regional tectonic‐geomorphology ...
Mengying He +6 more
doaj +1 more source
Data provenance is an effective approach for data security supervision. In the distributed, multi-user, and multi-layer big data system, only the provenance generation method, which leverages the information logged at both application and operating ...
Yuanzhao Gao +3 more
doaj +1 more source
Watchword-Oriented and Time-Stamped Algorithms for Tamper-Proof Cloud Provenance Cognition
Provenance is derivative journal information about the origin and activities of system data and processes. For a highly dynamic system like the cloud, provenance can be accurately detected and securely used in cloud digital forensic investigation ...
Imran, Asif, Nahar, Nadia, Sakib, Kazi
core +1 more source
Enhancing Workflow with a Semantic Description of Scientific Intent [PDF]
Peer ...
Edwards, Peter +3 more
core +1 more source
Language-integrated provenance by trace analysis [PDF]
Language-integrated provenance builds on language-integrated query techniques to make provenance information explaining query results readily available to programmers. In previous work we have explored language-integrated approaches to provenance in Links and Haskell.
Fehrenbach, Stefan, Cheney, James
openaire +3 more sources
Forensic analysis of digital photo provenance relies on intrinsic traces left in the photograph at the time of its acquisition. Such analysis becomes unreliable after heavy post-processing, such as down-sampling and re-compression applied upon ...
Korus, Pawel, Memon, Nasir
core +1 more source
Runtime Analysis of Whole-System Provenance [PDF]
Identifying the root cause and impact of a system intrusion remains a foundational challenge in computer security. Digital provenance provides a detailed history of the flow of information within a computing system, connecting suspicious events to their root causes.
Pasquier, Thomas +7 more
openaire +4 more sources
Geochemical Data of Scaglia Bianca Chert from Central Italy for Provenance Studies
This work presents the first geochemical characterization data of Scaglia Bianca Fm chert from Central Italy. The dataset is part of the chert reference collection (SiliROck) of Sapienza, University of Rome, and includes 110 chert samples collected from ...
Elena Carletti +5 more
doaj +1 more source
Detailed zircon U–Pb dating and whole-rock geochemical analyses were carried out on the sedimentary rocks of the Paleogene Dainan Formation from Gaoyou Sag in the North Jiangsu Basin, East China. Whole-rock rare earth element characteristics suggest that
Chun-Ming Lin +5 more
doaj +1 more source

