2022
DOI: 10.1109/tse.2020.2977016
|View full text |Cite
|
Sign up to set email alerts
|

Integrating Provenance Capture and UML With UML2PROV: Principles and Experience

Abstract: This block will depict the excerpt of the UML diagram with the elements that model the previous key elements. In addition, we provide a table, whose structure is illustrated below, that explains the representation of each key element, by means of UML elements. Additionally, we assign a green label containing a numeric identifier to each UML element, which makes it easier its location in the UML diagram. Key Element UML RationaleName of the element UML element id The fundamental reasons serving to account for t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 37 publications
(1 reference statement)
0
7
0
Order By: Relevance
“…The work in [37] provides quantitative data and qualitative arguments to show the benefits and trade-offs of applying UML2PROV, focusing mainly on how the level of detail of several UML designs of an application affect aspects such as provenance design generation, application instrumentation, maintenance of provenance capabilities, storage and run-time overheads, and quality of the generated provenance. In that evaluation only one of the configurations presented in Sect.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…The work in [37] provides quantitative data and qualitative arguments to show the benefits and trade-offs of applying UML2PROV, focusing mainly on how the level of detail of several UML designs of an application affect aspects such as provenance design generation, application instrumentation, maintenance of provenance capabilities, storage and run-time overheads, and quality of the generated provenance. In that evaluation only one of the configurations presented in Sect.…”
Section: Discussionmentioning
confidence: 99%
“…Here, as well as in [37], a Bioinformatics application called GelJ [18] is used as case study. GelJ is a platform-independent, open-source tool that arose for analyzing DNA fingerprint gel-images [18].…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations