Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Texas at El Paso

2008

Cyber-infrastructure

Articles 1 - 1 of 1

Full-Text Articles in Computer Engineering

Identifying And Explaining Map Quality Through Provenance: A User Study, Nicholas Ricky Del Rio, Paulo Pinheiro Da Silva Jan 2008

Identifying And Explaining Map Quality Through Provenance: A User Study, Nicholas Ricky Del Rio, Paulo Pinheiro Da Silva

Departmental Technical Reports (CS)

Applications deployed on cyber-infrastructures often rely on multiple data sources and distributed compute resources to access, process, and derive results. When application results are maps, it is possible that non-intentional imperfections can get introduced into the map generation processes because of several reasons including the use of low quality datasets, use of data filtering techniques incompatible for the kind of map to be generated, or even the use of inappropriate mapping parameters, e.g., low-resolution gridding parameters. Without some means for accessing and visualizing the provenance associated with map generation processes, i.e., metadata about information sources and methods used to derive …