{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T01:21:24Z","timestamp":1768008084762,"version":"3.49.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319164618","type":"print"},{"value":"9783319164625","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16462-5_6","type":"book-chapter","created":{"date-parts":[[2015,3,20]],"date-time":"2015-03-20T13:27:58Z","timestamp":1426858078000},"page":"71-83","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":64,"title":["noWorkflow: Capturing and Analyzing Provenance of Scripts"],"prefix":"10.1007","author":[{"given":"Leonardo","family":"Murta","sequence":"first","affiliation":[]},{"given":"Vanessa","family":"Braganholo","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Chirigati","sequence":"additional","affiliation":[]},{"given":"David","family":"Koop","sequence":"additional","affiliation":[]},{"given":"Juliana","family":"Freire","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,21]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-540-89965-5_24","volume-title":"Provenance and Annotation of Data and Processes","author":"C Bochner","year":"2008","unstructured":"Bochner, C., Gude, R., Schreiber, A.: A python library for provenance recording and querying. In: Freire, J., Koop, D., Moreau, L. (eds.) IPAW 2008. LNCS, vol. 5272, pp. 229\u2013240. Springer, Heidelberg (2008)"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1017\/S0960129511000211","volume":"21","author":"J Cheney","year":"2011","unstructured":"Cheney, J., Ahamed, A., Acar, U.A.: Provenance as dependency analysis. Math. Struct. Comput. Sci. 21, 1301\u20131337 (2011)","journal-title":"Math. Struct. Comput. Sci."},{"issue":"4","key":"6_CR3","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MCSE.2012.41","volume":"14","author":"A Davison","year":"2012","unstructured":"Davison, A.: Automated capture of experiment context for easier reproducibility in computational research. Comput. Sci. Eng. 14(4), 48\u201356 (2012)","journal-title":"Comput. Sci. Eng."},{"key":"6_CR4","volume-title":"Software Visualization - Visualizing the Structure, Behaviour, and Evolution of Software","author":"S Diehl","year":"2007","unstructured":"Diehl, S.: Software Visualization - Visualizing the Structure, Behaviour, and Evolution of Software. Springer, London (2007)"},{"issue":"3","key":"6_CR5","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MCSE.2008.79","volume":"10","author":"J Freire","year":"2008","unstructured":"Freire, J., Koop, D., Santos, E., Silva, C.: Provenance for computational tasks: a survey. Comput. Sci. Eng. 10(3), 11\u201321 (2008)","journal-title":"Comput. Sci. Eng."},{"issue":"5","key":"6_CR6","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1002\/cpe.1247","volume":"20","author":"J Frew","year":"2008","unstructured":"Frew, J., Metzger, D., Slaughter, P.: Automatic capture and reconstruction of computational provenance. Concurr. Comput. Pract. Exp. 20(5), 485\u2013496 (2008)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1016\/j.procs.2011.04.067","volume":"4","author":"M Gavish","year":"2011","unstructured":"Gavish, M., Donoho, D.: A universal identifier for computational results. Procedia Comput. Sci. 4, 637\u2013647 (2011)","journal-title":"Procedia Comput. Sci."},{"key":"6_CR8","unstructured":"Guo, P.J., Seltzer, M.: BURRITO: wrapping your lab notebook in computational infrastructure. In: TaPP, p. 7 (2012)"},{"issue":"3","key":"6_CR9","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.scico.2003.04.003","volume":"53","author":"A Hoek van der","year":"2004","unstructured":"van der Hoek, A.: Design-time product line architectures for any-time variability. Sci. Comput. Program. 53(3), 285\u2013304 (2004)","journal-title":"Sci. Comput. Program."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Huq, M.R., Apers, P.M.G., Wombacher, A.: ProvenanceCurious: a tool to infer data provenance from scripts. In: EDBT, pp. 765\u2013768 (2013)","DOI":"10.1145\/2452376.2452475"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Koop, D., Freire, J., Silva, C.: Visual summaries for graph collections. In: 2013 IEEE Pacific Visualization Symposium (PacificVis), pp. 57\u201364 (2013)","DOI":"10.1109\/PacificVis.2013.6596128"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/978-3-642-13818-8_28","volume-title":"Scientific and Statistical Database Management","author":"D Koop","year":"2010","unstructured":"Koop, D., Santos, E., Bauer, B., Troyer, M., Freire, J., Silva, C.T.: Bridging workflow and data provenance using strong links. In: Gertz, M., Lud\u00e4scher, B. (eds.) SSDBM 2010. LNCS, vol. 6187, pp. 397\u2013415. Springer, Heidelberg (2010)"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-642-17819-1_2","volume-title":"Provenance and Annotation of Data and Processes","author":"D Koop","year":"2010","unstructured":"Koop, D., Scheidegger, C.E., Freire, J., Silva, C.T.: The provenance of workflow upgrades. In: McGuinness, D.L., Michaelis, J.R., Moreau, L. (eds.) IPAW 2010. LNCS, vol. 6378, pp. 2\u201316. Springer, Heidelberg (2010)"},{"key":"6_CR14","unstructured":"Macko, P., Seltzer, M.: Provenance map orbiter: interactive exploration of large provenance graphs. In: TaPP (2011)"},{"key":"6_CR15","doi-asserted-by":"publisher","unstructured":"Missier, P., Woodman, S., Hiden, H., Watson, P.: Provenance and data differencing for workflow reproducibility analysis. Concurr. Comput. Pract. Exp. (2013). doi:\n                      10.1002\/cpe.3035","DOI":"10.1002\/cpe.3035"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-02279-1_21","volume-title":"Scientific and Statistical Database Management","author":"P Mouallem","year":"2009","unstructured":"Mouallem, P., Barreto, R., Klasky, S., Podhorszki, N., Vouk, M.: Tracking files in the kepler provenance framework. In: Winslett, M. (ed.) SSDBM 2009. LNCS, vol. 5566, pp. 273\u2013282. Springer, Heidelberg (2009)"},{"key":"6_CR17","unstructured":"Muniswamy-Reddy, K.K., Holland, D.A., Braun, U., Seltzer, M.: Provenance-aware storage systems. In: USENIX, p. 4 (2006)"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Neves, V.C., Braganholo, V., Murta, L.: Implicit provenance gathering through configuration management. In: SE-CSE, pp. 92\u201395 (2013)","DOI":"10.1109\/SECSE.2013.6615105"},{"key":"6_CR19","unstructured":"Tariq, D., Ali, M., Gehani, A.: Towards automated collection of application-level data provenance. In: TaPP, pp. 1\u20135 (2012)"}],"container-title":["Lecture Notes in Computer Science","Provenance and Annotation of Data and Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16462-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T13:23:34Z","timestamp":1559136214000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-16462-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319164618","9783319164625"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16462-5_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}