default search action
Sven Köhler 0003
Person information
- affiliation: UC Davis Genome Center, University of California, Davis, USA
Other persons with the same name
- Sven Köhler 0001 — University of Freiburg, Department of Computer Science, Germany (and 4 more)
- Sven Köhler 0004 — Hasso Plattner Institute, Potsdam, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j4]Anandarup Sarkar, Sven Köhler, Bertram Ludäscher, Matt Bishop:
Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based Processes. IEEE Syst. J. 11(2): 522-533 (2017) - [c15]Seokki Lee, Sven Köhler, Bertram Ludäscher, Boris Glavic:
A SQL-Middleware Unifying Why and Why-Not Provenance for First-Order Queries. ICDE 2017: 485-496 - [i3]Seokki Lee, Sven Köhler, Bertram Ludäscher, Boris Glavic:
Efficiently Computing Provenance Graphs for Queries with Negation. CoRR abs/1701.05699 (2017) - 2016
- [c14]Seokki Lee, Sven Köhler, Bertram Ludäscher, Boris Glavic:
Implementing Unified Why- and Why-Not Provenance Through Games. IPAW 2016: 209-213 - 2015
- [c13]Boris Glavic, Sven Köhler, Sean Riddle, Bertram Ludäscher:
Towards Constraint-based Explanations for Answers and Non-Answers. TaPP 2015 - 2014
- [j3]Tianhong Song, Sven Köhler, Bertram Ludäscher, James Hanken, Maureen Kelly, David Lowery, James A. Macklin, Paul J. Morris, Robert A. Morris:
Towards Automated Design, Analysis and Optimization of Declarative Curation Workflows. Int. J. Digit. Curation 9(2): 111-122 (2014) - [c12]Saumen C. Dey, Sven Köhler, Shawn Bowers, Bertram Ludäscher:
Computing Location-Based Lineage from Workflow Specifications to Optimize Provenance Queries. IPAW 2014: 180-193 - [c11]Anandarup Sarkar, Sven Köhler, Sean Riddle, Bertram Ludäscher, Matt Bishop:
Insider Attack Identification and Prevention Using a Declarative Approach. IEEE Symposium on Security and Privacy Workshops 2014: 265-276 - [c10]Sean Riddle, Sven Köhler, Bertram Ludäscher:
Towards Constraint Provenance Games. TAPP 2014 - 2013
- [c9]Sven Köhler, Bertram Ludäscher, Daniel Zinn:
First-Order Provenance Games. In Search of Elegance in the Theory and Practice of Computation 2013: 382-399 - [c8]Saumen C. Dey, Víctor Cuevas-Vicenttín, Sven Köhler, Eric Gribkoff, Michael Wang, Bertram Ludäscher:
On implementing provenance-aware regular path queries with relational query engines. EDBT/ICDT Workshops 2013: 214-223 - [i2]Sven Köhler, Bertram Ludäscher, Daniel Zinn:
First-Order Provenance Games. CoRR abs/1309.2655 (2013) - [i1]Víctor Cuevas-Vicenttín, Saumen C. Dey, Sven Köhler, Sean Riddle, Bertram Ludäscher:
Scientific Workflows and Provenance: Introduction and Research Opportunities. CoRR abs/1311.4610 (2013) - 2012
- [j2]Víctor Cuevas-Vicenttín, Saumen C. Dey, Sven Köhler, Sean Riddle, Bertram Ludäscher:
Scientific Workflows and Provenance: Introduction and Research Opportunities. Datenbank-Spektrum 12(3): 193-203 (2012) - [c7]Sven Köhler, Bertram Ludäscher, Yannis Smaragdakis:
Declarative Datalog Debugging for Mere Mortals. Datalog 2012: 111-122 - [c6]Saumen C. Dey, Sven Köhler, Shawn Bowers, Bertram Ludäscher:
Datalog as a Lingua Franca for Provenance Querying and Reasoning. TaPP 2012 - [c5]Sven Köhler, Supriya Gulati, Gongjing Cao, Quinn J. Hart, Bertram Ludäscher:
Sliding Window Calculations on Streaming Data using the Kepler Scientific Workflow System. ICCS 2012: 1639-1646 - [c4]Sven Köhler, Phillip Seitzer, Marc T. Facciotti, Bertram Ludäscher:
Improved Motif Detection in Large Sequence Sets with Random Sampling in a Kepler workflow. ICCS 2012: 1999 - 2011
- [c3]Lei Dou, Daniel Zinn, Timothy M. McPhillips, Sven Köhler, Sean Riddle, Shawn Bowers, Bertram Ludäscher:
Scientific workflow design 2.0: Demonstrating streaming data collections in Kepler. ICDE 2011: 1296-1299 - [c2]Sven Köhler, Sean Riddle, Daniel Zinn, Timothy M. McPhillips, Bertram Ludäscher:
Improving Workflow Fault Tolerance through Provenance-Based Recovery. SSDBM 2011: 207-224 - 2010
- [j1]Daniel Zinn, Shawn Bowers, Sven Köhler, Bertram Ludäscher:
Parallelizing XML data-streaming workflows via MapReduce. J. Comput. Syst. Sci. 76(6): 447-463 (2010)
2000 – 2009
- 2008
- [c1]Johannes Klöckner, Sven Köhler, Wolfgang Fengler:
Model based Design of Networked Embedded Systems - A Modeling Approach using FlexRay as an Example. ICINCO-SPSMC 2008: 253-259
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint