{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T22:40:07Z","timestamp":1751928007081,"version":"3.41.2"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030809591"},{"type":"electronic","value":"9783030809607"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80960-7_7","type":"book-chapter","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T06:02:37Z","timestamp":1625724157000},"page":"109-126","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Notebook Archaeology: Inferring Provenance from Computational Notebooks"],"prefix":"10.1007","author":[{"given":"David","family":"Koop","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,9]]},"reference":[{"key":"7_CR1","unstructured":"Apache Zeppelin. http:\/\/zeppelin.apache.org"},{"key":"7_CR2","unstructured":"Beaker Notebook. http:\/\/beakernotebook.com"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-34222-6_7","volume-title":"Provenance and Annotation of Data and Processes","author":"S Bowers","year":"2012","unstructured":"Bowers, S., McPhillips, T., Lud\u00e4scher, B.: Declarative rules for inferring fine-grained data provenance from scientific workflow execution traces. In: Groth, P., Frew, J. (eds.) IPAW 2012. LNCS, vol. 7525, pp. 82\u201396. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34222-6_7"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Chattopadhyay, S., Prasad, I., Henley, A.Z., Sarma, A., Barik, T.: What\u2019s wrong with computational notebooks? Pain points, needs, and design opportunities. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201312 (2020)","DOI":"10.1145\/3313831.3376729"},{"key":"7_CR5","unstructured":"Datalore. https:\/\/datalore.jetbrains.com"},{"key":"7_CR6","unstructured":"Dey, S., Belhajjame, K., Koop, D., Song, T., Missier, P., Lud\u00e4scher, B.: UP & DOWN: improving provenance precision by combining workflow-and trace-level information. In: 6th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2014) (2014)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Head, A., Hohman, F., Barik, T., Drucker, S.M., DeLine, R.: Managing messes in computational notebooks. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, p. 270. ACM (2019)","DOI":"10.1145\/3290605.3300500"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Huq, M.R., Apers, P.M., Wombacher, A.: ProvenanceCurious: a tool to infer data provenance from scripts. In: Proceedings of the 16th International Conference on Extending Database Technology, pp. 765\u2013768 (2013)","DOI":"10.1145\/2452376.2452475"},{"key":"7_CR9","unstructured":"Jupyter. http:\/\/jupyter.org"},{"key":"7_CR10","doi-asserted-by":"publisher","unstructured":"Kery, M.B., Myers, B.A.: Interactions for untangling messy history in a computational notebook. In: 2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC), pp. 147\u2013155 (October 2018). https:\/\/doi.org\/10.1109\/VLHCC.2018.8506576","DOI":"10.1109\/VLHCC.2018.8506576"},{"key":"7_CR11","doi-asserted-by":"publisher","unstructured":"Kery, M.B., John, B.E., O\u2019Flaherty, P., Horvath, A., Myers, B.A.: Towards effective foraging by data scientists to find past analysis choices. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI 2019, pp. 92:1\u201392:13. ACM, New York (2019). https:\/\/doi.org\/10.1145\/3290605.3300322, http:\/\/doi.acm.org\/10.1145\/3290605.3300322","DOI":"10.1145\/3290605.3300322"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Koenzen, A.P., Ernst, N.A., Storey, M.A.D.: Code duplication and reuse in Jupyter notebooks. In: 2020 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC), pp. 1\u20139. IEEE (2020)","DOI":"10.1109\/VL\/HCC50065.2020.9127202"},{"key":"7_CR13","unstructured":"Koop, D., Patel, J.: Dataflow notebooks: encoding and tracking dependencies of cells. In: 9th Workshop on the Theory and Practice of Provenance (TaPP 2017) (2017)"},{"issue":"6","key":"7_CR14","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.14778\/3447689.3447712","volume":"14","author":"S Macke","year":"2021","unstructured":"Macke, S., Gong, H., Lee, D.J.L., Head, A., Xin, D., Parameswaran, A.: Fine-grained lineage for safer notebook interactions. Proc. VLDB Endow. 14(6), 1093\u20131101 (2021)","journal-title":"Proc. VLDB Endow."},{"key":"7_CR15","unstructured":"Nodebook. https:\/\/github.com\/stitchfix\/nodebook"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"North, S., Scheidegger, C., Urbanek, S., Woodhull, G.: Collaborative visual analysis with rcloud. In: 2015 IEEE Conference on Visual Analytics Science and Technology (VAST), pp. 25\u201332. IEEE (2015)","DOI":"10.1109\/VAST.2015.7347627"},{"key":"7_CR17","unstructured":"Observable. https:\/\/observablehq.com"},{"issue":"3","key":"7_CR18","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MCSE.2007.53","volume":"9","author":"F P\u00e9rez","year":"2007","unstructured":"P\u00e9rez, F., Granger, B.E.: IPython: a system for interactive scientific computing. Comput. Sci. Eng. 9(3), 21\u201329 (2007)","journal-title":"Comput. Sci. Eng."},{"issue":"3","key":"7_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3311955","volume":"52","author":"JF Pimentel","year":"2019","unstructured":"Pimentel, J.F., Freire, J., Murta, L., Braganholo, V.: A survey on collecting, managing, and analyzing provenance from scripts. ACM Comput. Surv. (CSUR) 52(3), 1\u201338 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Pimentel, J.F., Murta, L., Braganholo, V., Freire, J.: A large-scale study about quality and reproducibility of Jupyter notebooks. In: Proceedings of the 16th International Conference on Mining Software Repositories, pp. 507\u2013517. IEEE Press (2019)","DOI":"10.1109\/MSR.2019.00077"},{"key":"7_CR21","unstructured":"reactivepy. https:\/\/github.com\/jupytercalpoly\/reactivepy"},{"issue":"CSCW","key":"7_CR22","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1145\/3274419","volume":"2","author":"A Rule","year":"2018","unstructured":"Rule, A., Drosos, I., Tabard, A., Hollan, J.D.: Aiding collaborative reuse of computational notebooks with annotated cell folding. Proc. ACM Hum.-Comput. Interact. 2(CSCW), 150 (2018)","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"key":"7_CR23","doi-asserted-by":"publisher","unstructured":"Rule, A., Tabard, A., Hollan, J.D.: Exploration and explanation in computational notebooks. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI 2018, pp. 32:1\u201332:12. ACM, New York (2018). https:\/\/doi.org\/10.1145\/3173574.3173606, http:\/\/doi.acm.org\/10.1145\/3173574.3173606","DOI":"10.1145\/3173574.3173606"},{"key":"7_CR24","unstructured":"Sage Developers: SageMath, the Sage Mathematics Software System (2017). http:\/\/www.sagemath.org"},{"key":"7_CR25","unstructured":"Samuel, S., K\u00f6nig-Ries, B.: Provbook: provenance-based semantic enrichment of interactive notebooks for reproducibility. In: International Semantic Web Conference (P&D\/Industry\/BlueSky) (2018)"},{"issue":"CSCW","key":"7_CR26","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/3359141","volume":"3","author":"AY Wang","year":"2019","unstructured":"Wang, A.Y., Mittal, A., Brooks, C., Oney, S.: How data scientists use computational notebooks for real-time collaboration. Proc. ACM Hum.-Comput. Interact. 3(CSCW), 39 (2019)","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Wang, J., Tzu-Yang, K., Li, L., Zeller, A.: Assessing and restoring reproducibility of Jupyter notebooks. In: 2020 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 138\u2013149. IEEE (2020)","DOI":"10.1145\/3324884.3416585"},{"key":"7_CR28","unstructured":"Wolfram Research Inc.: Mathematica. https:\/\/www.wolfram.com\/mathematica\/"}],"container-title":["Lecture Notes in Computer Science","Provenance and Annotation of Data and Processes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80960-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T22:02:00Z","timestamp":1751925720000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80960-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030809591","9783030809607"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80960-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"9 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IPAW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Provenance and Annotation Workshop","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ipaw2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iitdbgroup.github.io\/ProvenanceWeek2021\/ipaw.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"In addition, 6 posters and system demonstrations were accepted for publication","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}