{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:27:18Z","timestamp":1729661238974,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/bigdata.2016.7840958","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T21:46:59Z","timestamp":1486504019000},"page":"3045-3051","source":"Crossref","is-referenced-by-count":4,"title":["Facilitating reproducible research by investigating computational metadata"],"prefix":"10.1109","author":[{"given":"Priyaa","family":"Thavasimani","sequence":"first","affiliation":[]},{"given":"Paolo","family":"Missier","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2006.11.003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376772"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.9"},{"key":"ref13","first-page":"132","article-title":"Deter-mining the trustworthiness of new electronic contracts","volume":"5881","author":"groth","year":"2009","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1098\/rsta.2012.0085","article-title":"Developing cloud applications using the e-Science Central platform","volume":"371","author":"hiden","year":"2013","journal-title":"Philosophical Transactions Series A Mathematical Physical and Engineering Sciences"},{"key":"ref15","first-page":"1:1","article-title":"ReproZip: Using Provenance to Support Computational Reproducibility","author":"chirigati","year":"2013","journal-title":"Proceedings of the 5th USENIX Workshop on the Theory and Practice of Provenance"},{"key":"ref16","first-page":"1","article-title":"Provenance Trails in the Wings \/ Pegasus System Wings \/ Pegasus: Creating and Executing Large Workflows","volume":"20","author":"kim","year":"2007","journal-title":"Information Sciences"},{"key":"ref17","first-page":"4","article-title":"Setting the default to reproducible","volume":"46","author":"stodden","year":"2013","journal-title":"Comput Sci Res SIAM News"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkl320"},{"key":"ref19","first-page":"1","article-title":"Scientific Workflow Management and the Kepler System","volume":"78296","author":"lud\u00e4scher","year":"2005","journal-title":"Electrical Engineering"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2994031"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1126\/science.1218263","article-title":"Research priorities. Shining light into black boxes","volume":"336","author":"morin","year":"2012","journal-title":"Science"},{"article-title":"Alan Turing Intitute Symposium on Reproducibility for Data-Intensive Research &#x2013; Final Report","year":"2016","author":"burgess","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1126\/science.1179653"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2038642.2038650"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pbio.1001745"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2723872.2723875"},{"key":"ref7","first-page":"1","article-title":"Replicability is not reproducibility: Nor is it good science","author":"drummond","year":"2009","journal-title":"Proceedings of the Evaluation Methods for Machine Learning Workshop 26th International Conference for Machine Learning"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/5992.881708"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213908"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/467753a"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2015.146"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1256"},{"key":"ref21","first-page":"14","article-title":"Provenance for the Cloud","author":"muniswamy-reddy","year":"2010","journal-title":"Proceedings of the 8th USENIX Conference on File and Storage Technologies"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2218\/ijdc.v10i1.370"},{"key":"ref23","first-page":"273","article-title":"Provenance for generalized map and reduce workflows","author":"ikeda","year":"2011","journal-title":"Proc of the Fifth CIDR Conf"},{"key":"ref26","volume":"6","author":"freire","year":"2016","journal-title":"Reproducibility of Data-Oriented Experiments in e-Science (Dagstuhl Seminar 16041)"},{"key":"ref25","first-page":"3","article-title":"Collecting and Analyzing Provenance on Interactive Notebooks: when IPython meets noWorkflow","author":"pimentel","year":"2015","journal-title":"Usenix Org"}],"event":{"name":"2016 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2016,12,5]]},"location":"Washington DC,USA","end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7818133\/7840573\/07840958.pdf?arnumber=7840958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T11:17:43Z","timestamp":1568805463000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7840958\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2016.7840958","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}