共 29 条
[1]
Agrawal R., 2002, Proceedings of the Twenty-eighth International Conference on Very Large Data Bases, P155
[2]
Ashbaugh D., 1991, J FORENSIC IDENTIFIC, V41, P16
[3]
Buneman P, 2001, LECT NOTES COMPUT SC, V1973, P316
[4]
Buneman P., 2002, P ACM S PRINCIPLES D, P150, DOI DOI 10.1145/543613.543633
[5]
Buneman Peter, 2006, Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, SIGMOD '06, P539, DOI DOI 10.1145/1142473.1142534
[7]
Provenance in Databases: Why, How, and Where
[J].
FOUNDATIONS AND TRENDS IN DATABASES,
2007, 1 (04)
:379-474
[9]
Cox I., 2001, Digital Watermarking
[10]
Cui Y., 2000, Proceedings of 16th International Conference on Data Engineering (Cat. No.00CB37073), P367, DOI 10.1109/ICDE.2000.839437