Fig. 3From: Learning topic description from clustering of trusted user roles and event models characterizing distributed provenance networks: a reinforcement learning approachExample of provenance path construction [131]Back to article page