Open is not enough
Open is not enough | Nature Physics Skip to main content Thank you for visiting nature.com.
You are using a browser version with limited support for CSS. To obtain the best experience, we …
You are using a browser version with limited support for CSS. To obtain the best experience, we …
A large-scale study on research code quality and execution
This article presents a study on the quality and execution of research code from publicly-
available replication datasets at the Harvard Dataverse repository. Research code is …
available replication datasets at the Harvard Dataverse repository. Research code is …
Not just for programmers: How GitHub can accelerate collaborative and reproducible research in ecology and evolution
Researchers in ecology and evolutionary biology are increasingly dependent on
computational code to conduct research. Hence, the use of efficient methods to share …
computational code to conduct research. Hence, the use of efficient methods to share …
Low availability of code in ecology: A call for urgent action
Access to analytical code is essential for transparent and reproducible research. We review
the state of code availability in ecology using a random sample of 346 nonmolecular articles …
the state of code availability in ecology using a random sample of 346 nonmolecular articles …
Toward reliable biodiversity dataset references
No systematic approach has yet been adopted to reliably reference and provide access to
digital biodiversity datasets. Based on accumulated evidence, we argue that location-based …
digital biodiversity datasets. Based on accumulated evidence, we argue that location-based …
[PDF][PDF] BlockTrack-L: A lightweight blockchain-based provenance message tracking in IoT
Data tracking is of great significance and a central part in digital forensics. In today's
complex network design, Internet of Things (IoT) devices communicate with each other and …
complex network design, Internet of Things (IoT) devices communicate with each other and …
Secure data provenance in IoT network using bloom filters
MS Siddiqui, A Rahman, A Nadeem - Procedia Computer Science, 2019 - Elsevier
Abstract Internet of Things (IoT) network are considered the future in monitoring and
surveillance. With the advent of autonomous organization, and network and service …
surveillance. With the advent of autonomous organization, and network and service …
The influence of visual provenance representations on strategies in a collaborative hand-off data analysis scenario
Conducting data analysis tasks rarely occur in isolation. Especially in intelligence analysis
scenarios where different experts contribute knowledge to a shared understanding …
scenarios where different experts contribute knowledge to a shared understanding …
Towards integration of data-driven agronomic experiments with data provenance
SMS da Cruz, JAP do Nascimento - Computers and Electronics in …, 2019 - Elsevier
With improvements in computing and communications, the amount of scientific data in
agriculture has been exploding. Thus, researchers must rely on computational simulations to …
agriculture has been exploding. Thus, researchers must rely on computational simulations to …
Guidelines for collaborative development of sustainable data treatment software
J Wuttke, S Cottrell, MA Gonzalez… - Journal of Neutron …, 2022 - content.iospress.com
Software development for data reduction and analysis at large research facilities is
increasingly professionalized, and internationally coordinated. To foster software quality and …
increasingly professionalized, and internationally coordinated. To foster software quality and …