Jörg Thalheim

  • Citations Per Year
Learn More
Data provenance strives for explaining how the computation was performed by recording a trace of the execution. The provenance trace is useful across a wide-range of workflows to improve the dependability, security, and efficiency of software systems. In this paper, we present Inspector, a POSIX-compliant data provenance library for shared-memory(More)
Major cloud computing operators provide powerful monitoring tools to understand the current (and prior) state of the distributed systems deployed in their infrastructure. While such tools provide a detailed monitoring mechanism at scale, they also pose a signiicant challenge for the application developers/operators to transform the huge space of monitored(More)
Data provenance strives for explaining how the computation was performed by recording a trace of the execution. The provenance trace is useful across a widerange of workflows to improve the dependability, security, and efficiency of software systems. In this paper, we present INSPECTOR, a POSIX-compliant data provenance library for shared-memory(More)
Major cloud computing operators provide powerful monitoring tools to understand the current (and prior) state of the distributed systems deployed in their infrastructure. While such tools provide a detailed monitoring mechanism at scale, they also pose a significant challenge for the application developers/operators to transform the huge space of monitored(More)
  • 1