REFERENCES
Bal, M., Shen, W., and Ghenniwa, H. (2010). Collabora-
tive signal and information processing in wireless sen-
sor networks: a review. In 2009 IEEE International
Conference on Systems, Man, and Cybernetics, pages
3240–3245.
Barseghian, D., Altintas, I., Jones, M., Crawl, D., Potter, N.,
Gallagher, J., Cornillon, P., Schildhauer, M., Borer, E.,
and Seabloom, E. (2010). Workflows and extensions
to the kepler scientific workflow system to support en-
vironmental sensor data access and analysis. Ecolog-
ical Informatics, 5(1):42–50.
Buneman, P. and Tan, W. (2007). Provenance in databases.
In Proceedings of the 2007 ACM SIGMOD inter-
national conference on Management of data, pages
1171–1173. ACM.
Cheney, J. (2010). Causality and the semantics of prove-
nance. Arxiv preprint arXiv:1004.3241.
Cheney, J., Chiticariu, L., and Tan, W. (2009). Provenance
in databases: Why, how, and where. Foundations and
Trends in Databases, 1(4):379–474.
Crawl, D. and Altintas, I. (2008). A provenance-based
fault tolerance mechanism for scientific workflows.
International Provenance and Annotation Workshop
(IPAW).
Cui, Y., Widom, J., and Wiener, J. (2000). Tracing the
lineage of view data in a warehousing environment.
ACM Transactions on Database Systems (TODS),
25(2):179–227.
Davidson, S. and Freire, J. (2008a). Provenance and sci-
entific workflows: challenges and opportunities. In
SIGMOD Conference, pages 1345–1350. Citeseer.
Davidson, S. and Freire, J. (2008b). Provenance and sci-
entific workflows: challenges and opportunities. In
SIGMOD Conference, pages 1345–1350. Citeseer.
Dogan, G., Brown, T., Govindan, K., Khan, M., Abdelza-
her, T., Mohapatra, P., and Cho, J. (2011). Evaluation
of network trust using provenance based on distributed
local intelligence. MILCOM.
Feng, T. and Lee, E. (2008). Real-time distributed discrete-
event execution with fault tolerance. In IEEE Real-
Time and Embedded Technology and Applications
Symposium, pages 205–214. IEEE.
Freire, J., Koop, D., Santos, E., and Silva, C. (2008). Prove-
nance for computational tasks: A survey. Computing
in Science & Engineering, 10(3):11–21.
Govindan, K., X., W., Khan, M., Dogan, G., Zeng, K. Pow-
ell, G., Brown, T., Abdelzaher, T., and Mohapatra, P.
(2011). Pronet: Network trust assessment based on
incomplete provenance. MILCOM.
Khan, M., Abdelzaher, T., Han, J., and Ahmadi, H. (2009).
Finding symbolic bug patterns in sensor networks.
Distributed Computing in Sensor Systems, pages 131–
144.
Le, Q. and Kaplan, L. (2010). Target localization using
proximity binary sensors. In Aerospace Conference,
2010 IEEE, pages 1–8. IEEE.
Ledlie, J., Ng, C., and Holland, D. (2005). Provenance-
aware sensor data storage. IEEE Computer Society.
Moreau, L. and Ludascher, B. (2007). The first provenance
challenge. Concurrency and Computation: Practice
and Experience.
Moreau, L., Ludascher, B., Altintas, I., Barga, R., Bow-
ers, S., Callahan, S., Chin, J., Clifford, B., Cohen, S.,
Cohen-Boulakia, S., et al. (2008). Special issue: The
first provenance challenge. Concurrency and Compu-
tation: Practice and Experience, 20(5):409–418.
Muniswamy-Reddy, K.-K. (2010). Foundations for
Provenance-Aware Systems. PhD thesis, Harvard Uni-
versity, Massachusetts.
Park, U. and Heidemann, J. (2008a). Provenance in sensor-
net republishing. Provenance and Annotation of Data
and Processes, pages 280–292.
Park, U. and Heidemann, J. (2008b). Provenance in sensor-
net republishing. In Freire, J., Koop, D., and Moreau,
L., editors, Provenance and Annotation of Data and
Processes, volume 5272 of Lecture Notes in Computer
Science, pages 280–292. Springer Berlin / Heidelberg.
Patni, H., Sahoo, S., Henson, C., and Sheth, A. (2010).
Provenance Aware Linked Sensor Data. In 2nd Work-
shop on Trust and Privacy on the Social and Semantic
Web, Co-located with ESWC2010, Heraklion Greece.
Sabelfeld, A. and Myers, A. C. (2003). Language-based
information-flow security. IEEE Journal on Selected
Areas in Communications, 21.
Stephan, E., Halter, T., and Ermold, B. (2010). Lever-
aging The Open Provenance Model as a Multi-Tier
Model for Global Climate Research. In Proc. of 3rd
International Provenance and Annotation Workshop
(IPAW10), Troy, NY.
Tan, W.-C. (2007). Provenance in databases : Past, current,
and future. IEEE Data Engineering Bulletin, 30:”3–
12”.
Tilak, S., Chiu, K., Abu-Ghazaleh, N., and Fountain, T.
(2005). Dynamic resource discovery for sensor net-
works. Embedded and Ubiquitous Computing, pages
785–796.
Wynbourne, M., Austin, M., Palmer, C., on Homeland Se-
curity, U. S. C. S. C., and Affairs, G. (2009). Na-
tional Cyber Security Research and Development
Challenges Related to Economics, Physical Infras-
tructure and Human Behavior: An Industry, Academic
and Government Perspective. Institute for Information
Infrastructure Protection.
Zahedi, S., Szczodrak, M., Ji, P., Mylaraswamy, D., Sri-
vastava, M., and Young, R. (2008). Tiered architec-
ture for on-line detection, isolation and repair of faults
in wireless sensor networks. In Military Communica-
tions Conference, 2008. MILCOM 2008. IEEE, pages
1–7. IEEE.
SENSORNETS 2012 - International Conference on Sensor Networks
52