. (2015), “Estimating direct and indirect effects of foreign direct investment on firm productivity in the presence of interactions between firms”, Journal of International Economics, Vol. 95, No. 1, pp. 157-169.
46. Girma, S., Görg, H., Pisu, M. (2008), “Exportation, effets d’entraînement, et effets externes de productivité en provenance de l’investissement direct de l’étranger’” (Exporting, linkages and productivity spillovers from foreign direct investment), Canadian Journal of Economics/Revue canadienne d’économique, Vol. 41, No. 1, pp. 320-340.
Naik, Prasad (2007): “Integrated Marketing Communications: Provenance, Practice and Principles,” in: Ambler, T./Tellis, G.: Handbook of Advertising, Sage Publications, pp. 35 - 53.
Naik, Prasad; Peters, Kay (2009): “A Hierarchical Marketing Communications Model of Online and Offline Media Synergies,” Journal of Interactive Marketing, Vol. 23 (4), pp. 288 - 299.
Naik, Prasad; Raman, Kalyan (2003): “Understanding the Impact of Synergy in Multimedia Communications,” Journal of Marketing Research, Vol. 40
Weijia Xu, Maria Esteva, Jessica Trelogan and Dan Wu
between machine learning, cyberinfrastructure and digital library is an important step to achieve smart data and information management. However, there is lack of mediums and forums that bring together researchers and practitioners to share visions, questions, latest advances in methodology, application experiences, and best practices. Library and archival professionals are often unfamiliar with cyberinfrastructure. In turn, cyberinfrastructure experts lack experience in traditional digital library and archives practices such as metadata, provenance, publishing
Maria Esteva, Ramona L. Walls, Andrew B. Magill, Weijia Xu, Ruizhu Huang, James Carson and Jawon Song
functions create a representation of a dataset’s provenance and evolution. IDS can be used by researchers to track data stored at multiple locations, and vice versa, by repositories and data stores to continue tracking the evolution of the datasets.
This paper is organized as follows. In the Related Work section, we discuss authenticity as the conceptual framework for IDS, and review how different repository and data management projects support identity functions and implement data models. Along with each point, we clarify the novel contributions brought by IDS. In the