{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:26:17Z","timestamp":1775874377445,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/bigdata.2017.8258038","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:47:28Z","timestamp":1516056448000},"page":"1123-1132","source":"Crossref","is-referenced-by-count":166,"title":["The ML test score: A rubric for ML production readiness and technical debt reduction"],"prefix":"10.1109","author":[{"given":"Eric","family":"Breck","sequence":"first","affiliation":[]},{"given":"Shanqing","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Nielsen","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Salib","sequence":"additional","affiliation":[]},{"given":"D.","family":"Sculley","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"40534103","article-title":"Parallelizing exploration-exploitation tradeoffs in gaussian process bandit optimization","volume":"15","author":"desautels","year":"2014","journal-title":"Journal of Machine Learning Research (JMLR)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098043"},{"key":"ref12","year":"2017","journal-title":"Google cloud machine learning now open to all with new professional services and education programs"},{"key":"ref13","article-title":"Man is to computer programmer as woman is to homemaker? debiasing word embeddings","volume":"29","author":"bolukbasi","year":"2016","journal-title":"Advances in neural information processing systems"},{"key":"ref14","first-page":"3315","article-title":"Equality of opportunity in supervised learning","author":"hardt","year":"2016","journal-title":"Advances in neural information processing systems"},{"key":"ref15","first-page":"1223","article-title":"Large scale distributed deep networks","volume":"25","author":"dean","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref16","article-title":"Ten-sorflow debugger: Debugging dataflow graphs for machine learning","author":"cai","year":"2016","journal-title":"Proceedings of the Reliable Machine Learning in the Wild-NIPS 2016 Workshop"},{"key":"ref17","author":"gawande","year":"2009","journal-title":"The Checklist Manifesto"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.05.006"},{"key":"ref3","volume":"28","author":"chandra","year":"2010","journal-title":"Sibyl A System for Large Scale Machine Learning"},{"key":"ref6","article-title":"Rules of machine learning","author":"zinkevich","year":"1996","journal-title":"Invited talk at the NIPS Reliable Machine Learning Workshop"},{"key":"ref5","first-page":"167","article-title":"An approach to software testing of machine learning applications","author":"murphy","year":"2007","journal-title":"SEKE Citeseer"},{"key":"ref8","author":"hsu","year":"2003","journal-title":"A Practical Guide to Support Vector Classification"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.01.015"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488200"},{"key":"ref1","article-title":"Machine learning: The high interest credit card of technical debt","author":"sculley","year":"2014","journal-title":"SE4ML Software Engineering for Machine Learning (NIPS 2014 Workshop)"},{"key":"ref9","article-title":"Practical bayesian optimization of machine learning algorithms","author":"snoek","year":"2012","journal-title":"Advances in neural information processing systems"}],"event":{"name":"2017 IEEE International Conference on Big Data (Big Data)","location":"Boston, MA","start":{"date-parts":[[2017,12,11]]},"end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8241556\/8257893\/08258038.pdf?arnumber=8258038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,20]],"date-time":"2018-02-20T00:01:39Z","timestamp":1519084899000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8258038\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2017.8258038","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}