Provenance and the Price of Identity. Adriane Chapman H. V. Jagadish. Obj. 2. Obj. 1. Obj. 3. Obj. 4. Obj. 5. Obj. 6. Obj. 7. Identity and Provenance. ALIGNMENT MOUSE_ABC1 HUMAN_ABC1. Create Q-gram In. Object3. FASTA8. Mod BLAST. Hash-Join Filter. Object9. Object7.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
H. V. Jagadish
Object2Strong Identification + IDSet
The relative strengths
are shown here.
What are the costs?
These results are expected.
But intermittent is highly attractive for “implicit” workflows with no reuse.
By changing the run-time of the manipulations, the identification strategies fare differently.
Because of the need for re-running, if the run-time is too long,
Strong ID actually is faster.
Unsurprisingly, these are workflow systems
Execute code trained on dataset
Named Entity Tag
Chk1 interacts with p53
Example of processes found in BioSearch-2DSystems that use “Weak” Strategies