{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:02:55Z","timestamp":1742925775485,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030276171"},{"type":"electronic","value":"9783030276188"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-27618-8_20","type":"book-chapter","created":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T23:02:41Z","timestamp":1566169361000},"page":"263-272","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ML-PipeDebugger: A Debugging Tool for Data Processing Pipelines"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0999-1686","authenticated-orcid":false,"given":"Felix","family":"Kossak","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6549-6164","authenticated-orcid":false,"given":"Michael","family":"Zwick","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,6]]},"reference":[{"key":"20_CR1","unstructured":"Al-Naymat, G.H.: New methods for mining sequential and time series data. Ph.D. thesis, University of Sydney (2009). https:\/\/doi.org\/10.1.1.877.2611, http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.877.2611&rep=rep1&type=pdf"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Carbin, M., Rinard, M.: Automatically identifying critical input regions and code in applications. In: Proceedings of the 19th International Symposium on Software Testing and Analysis (ISSTA 2010), pp. 37\u201348 (2010)","DOI":"10.1145\/1831708.1831713"},{"key":"20_CR3","doi-asserted-by":"publisher","unstructured":"Chen, A., Wu, Y., Haeberlen, A., Zhou, W., Loo, B.T.: The good, the bad, and the differences: better network diagnostics with differential provenance. In: Proceedings of SIGCOMM 2016, pp. 115\u2013128 (2016). https:\/\/doi.org\/10.1145\/2934872.2934910","DOI":"10.1145\/2934872.2934910"},{"key":"20_CR4","unstructured":"Fernando, T.: WorkflowDSL: scalable workflow execution with provenance. Master thesis, KTH Royal Institute of Technology, School of Information and Communication Technology, Stockholm, Sweden (2017). http:\/\/www.diva-portal.org\/smash\/get\/diva2:1149093\/FULLTEXT01.pdf"},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.engappai.2010.09.007","volume":"24","author":"TC Fu","year":"2011","unstructured":"Fu, T.C.: A review on time series data mining. Eng. Appl. Artif. Intell. 24, 164\u2013181 (2011). https:\/\/doi.org\/10.1016\/j.engappai.2010.09.007","journal-title":"Eng. Appl. Artif. Intell."},{"key":"20_CR6","doi-asserted-by":"publisher","unstructured":"Gulzar, M.A., Interlandi, M., Han, X., Li, M., Condie, T., Kim, M.: Automated debugging in data-intensive scalable computing. In: Proceedings of SoCC 2017, pp. 520\u2013534 (2017). https:\/\/doi.org\/10.1145\/3127479.3131624","DOI":"10.1145\/3127479.3131624"},{"key":"20_CR7","unstructured":"Kagermann, H., Wahlster, W., Helbig, J.: Recommendations for implementing the strategic initiative INDUSTRIE 4.0, April 2013. https:\/\/www.din.de\/blob\/76902\/e8cac883f42bf28536e7e8165993f1fd\/recommendations-for-implementing-industry-4-0-data.pdf"},{"issue":"2","key":"20_CR8","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/3299887.3299891","volume":"47","author":"N Polyzotis","year":"2018","unstructured":"Polyzotis, N., Roy, S., Whang, S.E., Zinkevich, M.: Data lifecycle challenges in production machine learning: a survey. SIGMOD Rec. 47(2), 17\u201328 (2018)","journal-title":"SIGMOD Rec."},{"key":"20_CR9","doi-asserted-by":"publisher","unstructured":"Wang, X., Dong, X.L., Meliou, A.: Data X-RAy: a diagnostic tool for data errors. In: Proceedings of SIGMOD 2015, pp. 1231\u20131245 (2015). https:\/\/doi.org\/10.1145\/2723372.2750549","DOI":"10.1145\/2723372.2750549"},{"key":"20_CR10","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations","author":"IH Witten","year":"2005","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations, 2nd edn. Morgan Kaufmann, Burlington (2005)","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Database and Expert Systems Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-27618-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T17:30:49Z","timestamp":1710351049000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-27618-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030276171","9783030276188"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-27618-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"6 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DEXA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database and Expert Systems Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Linz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dexa2019a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mixed (Single-blind and Double-blind)","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfDriver","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"157","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4-6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}