{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:18:13Z","timestamp":1730200693005,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/bigdata.2016.7840748","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T16:46:59Z","timestamp":1486486019000},"page":"1402-1411","source":"Crossref","is-referenced-by-count":12,"title":["LogProv: Logging events as provenance of big data analytics pipelines with trustworthiness"],"prefix":"10.1109","author":[{"given":"Ruoyu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Guoqiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Atif","sequence":"additional","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref31"},{"year":"0","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2520883"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2615919"},{"year":"0","key":"ref12"},{"key":"ref13","article-title":"A survey of data provenance techniques","author":"simmhan","year":"2006","journal-title":"Technical Report Indiana University"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1084805.1084812"},{"key":"ref15","first-page":"227","article-title":"Data provenance: A categorization of existing approaches","volume":"103","author":"glavic","year":"2007","journal-title":"BTW Ser LNI"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2013.6702685"},{"key":"ref17","article-title":"Reliable management of community data pipelines using scientific workflows","author":"simmhan","year":"2009","journal-title":"Tech Rep MSR- TR-2009-125 September 2009 a short version of this paper appears in IEEE eScience"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.86"},{"key":"ref19","first-page":"92","article-title":"The Semantic Web-ISWC 2004","author":"zhao","year":"0","journal-title":"Third International Semantic Web Conference Hiroshima Japan November 7-11 2004 Proceedings Berlin Heidelberg Springer Berlin Heidelberg 2004 ch Using Semantic Web Technologies for Representing E-science Provenance"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15546-8_1"},{"key":"ref4","first-page":"72","article-title":"Big data provenance: Challenges and implications for benchmarking","author":"glavic","year":"2012","journal-title":"2nd Workshop on Big Data Benchmarking (WBDB)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14778\/2095686.2095693"},{"key":"ref3","article-title":"Machine learning: The high interest credit card of technical debt","author":"sculley","year":"2014","journal-title":"SE4ML Software Engineering for Machine Learning (NIPS 2014 Workshop)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.35"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29931-5"},{"key":"ref5","article-title":"The rating of chessplayers, past and present","author":"elo","year":"1978","journal-title":"Arco Pub"},{"year":"0","key":"ref8"},{"year":"0","key":"ref7"},{"year":"0","key":"ref2"},{"year":"0","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376772"},{"key":"ref20","first-page":"10","article-title":"Layering in provenance systems","author":"muniswamy-reddy","year":"2009","journal-title":"Proceedings of the 2009 Conference on USENIX Annual Technical Conference USENIX"},{"article-title":"Provenance for scientific workflows towards reproducible research","year":"0","author":"barga","key":"ref22"},{"year":"0","key":"ref21"},{"year":"0","key":"ref24"},{"key":"ref23","article-title":"Analysis of approaches for supporting the open provenance model: A case study of the trident workflow workbench","author":"simmhan","year":"2010","journal-title":"Future Generation Computer Systems - In Submission"},{"article-title":"Prov-o-viz: Interactive provenance visualization","year":"2014","author":"hoekstra","key":"ref26"},{"year":"0","key":"ref25"}],"event":{"name":"2016 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2016,12,5]]},"location":"Washington DC,USA","end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7818133\/7840573\/07840748.pdf?arnumber=7840748","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T17:29:13Z","timestamp":1488389353000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7840748\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2016.7840748","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}