{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T21:28:46Z","timestamp":1771018126705,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T00:00:00Z","timestamp":1463184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Australian Government","award":["Australian Research Council"],"award-info":[{"award-number":["Australian Research Council"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,14]]},"DOI":"10.1145\/2889160.2889207","type":"proceedings-article","created":{"date-parts":[[2016,5,16]],"date-time":"2016-05-16T12:27:23Z","timestamp":1463401643000},"page":"769-772","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Continuous validation for data analytics systems"],"prefix":"10.1145","author":[{"given":"Mark","family":"Staples","sequence":"first","affiliation":[{"name":"CSIRO and NICTA, Eveleigh NSW, Australia"}]},{"given":"Liming","family":"Zhu","sequence":"additional","affiliation":[{"name":"CSIRO and NICTA, Eveleigh NSW, Australia"}]},{"given":"John","family":"Grundy","sequence":"additional","affiliation":[{"name":"Deakin University, Geelong, Australia"}]}],"member":"320","published-online":{"date-parts":[[2016,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1108\/IR-12-2014-0434"},{"key":"e_1_3_2_1_2_1","volume-title":"UCLA School of Law","author":"Bainbridge S. M.","year":"2009","unstructured":"S. M. Bainbridge . Caremark and enterprise risk management. Law-Econ Research Paper 09-08 , UCLA School of Law , 2009 . S. M. Bainbridge. Caremark and enterprise risk management. Law-Econ Research Paper 09-08, UCLA School of Law, 2009."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SDG.2009.5071329"},{"key":"e_1_3_2_1_4_1","volume-title":"DevOps: A Software Architect's Perspective","author":"Bass L.","year":"2015","unstructured":"L. Bass , I. Weber , and L. Zhu . DevOps: A Software Architect's Perspective . Addison-Wesley , 2015 . L. Bass, I. Weber, and L. Zhu. DevOps: A Software Architect's Perspective. Addison-Wesley, 2015."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-29263-2_6"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.36"},{"key":"e_1_3_2_1_7_1","volume-title":"Two big challenges in machine learning","author":"Bottou L.","year":"2015","unstructured":"L. Bottou . Two big challenges in machine learning , 2015 . Slides presented at International Conference on Machine Learning , 6--11 July 2015. Available at: http:\/\/icml.cc\/2015\/invited\/LeonBottouICML2015.pdf. L. Bottou. Two big challenges in machine learning, 2015. Slides presented at International Conference on Machine Learning, 6--11 July 2015. Available at: http:\/\/icml.cc\/2015\/invited\/LeonBottouICML2015.pdf."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04133-4_15"},{"key":"e_1_3_2_1_9_1","volume-title":"Software engineering code of ethics and professional practice","author":"Gotterbarn D.","year":"2001","unstructured":"D. Gotterbarn , K. Miller , S. Rogerson , S. Barber , P. Barnes , I. Burnstein , M. Davis , A. El-Kadi , N. B. Fairweather , and M. Fulghum . Software engineering code of ethics and professional practice , 2001 . D. Gotterbarn, K. Miller, S. Rogerson, S. Barber, P. Barnes, I. Burnstein, M. Davis, A. El-Kadi, N. B. Fairweather, and M. Fulghum. Software engineering code of ethics and professional practice, 2001."},{"key":"e_1_3_2_1_10_1","volume-title":"Workshops at the Twenty-Eighth AAAI Conference on Artificial Intelligence","author":"Grace K.","year":"2014","unstructured":"K. Grace and M. L. Maher . Using computational creativity to guide data-intensive scientific discovery . In Workshops at the Twenty-Eighth AAAI Conference on Artificial Intelligence , 2014 . K. Grace and M. L. Maher. Using computational creativity to guide data-intensive scientific discovery. In Workshops at the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014."},{"key":"e_1_3_2_1_11_1","first-page":"403","volume-title":"Investigating policy processes: the governance analytical framework (GAF). Research for Sustainable Development: Foundations, Experiences, and Perspectives","author":"Hufty M.","year":"2011","unstructured":"M. Hufty . Investigating policy processes: the governance analytical framework (GAF). Research for Sustainable Development: Foundations, Experiences, and Perspectives , pages 403 -- 424 , 2011 . M. Hufty. Investigating policy processes: the governance analytical framework (GAF). Research for Sustainable Development: Foundations, Experiences, and Perspectives, pages 403--424, 2011."},{"issue":"6","key":"e_1_3_2_1_12_1","first-page":"119","article-title":"Specializing in software engineering","volume":"16","author":"Jackson M.","year":"1999","unstructured":"M. Jackson . Specializing in software engineering . IEEE Software , 16 ( 6 ): 119 -- 121 , 1999 . M. Jackson. Specializing in software engineering. IEEE Software, 16(6):119--121, 1999.","journal-title":"IEEE Software"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-93851-4_6"},{"key":"e_1_3_2_1_14_1","volume-title":"The American Statistician, 68(1):8--13","author":"Pearl J.","year":"2014","unstructured":"J. Pearl . Understanding Simpson's paradox. The American Statistician, 68(1):8--13 , 2014 . J. Pearl. Understanding Simpson's paradox. The American Statistician, 68(1):8--13, 2014."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401959"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2819009.2819093"},{"key":"e_1_3_2_1_17_1","first-page":"390","article-title":"On the planning crisis: Systems analysis of the 'first and second generations","volume":"8","author":"Rittel H.","year":"1972","unstructured":"H. Rittel . On the planning crisis: Systems analysis of the 'first and second generations '. Bedrifts\u00f8konomen , 8 : 390 -- 396 , 1972 . H. Rittel. On the planning crisis: Systems analysis of the 'first and second generations'. Bedrifts\u00f8konomen, 8:390--396, 1972.","journal-title":"Bedrifts\u00f8konomen"},{"key":"e_1_3_2_1_18_1","volume-title":"SE4ML: Software Engineering for Machine Learning (NIPS 2014 Workshop)","author":"Sculley D.","year":"2014","unstructured":"D. Sculley , G. Holt , D. Golovin , E. Davydov , T. Phillips , D. Ebner , V. Chaudhary , and M. Young . Machine learning: The high interest credit card of technical debt . In SE4ML: Software Engineering for Machine Learning (NIPS 2014 Workshop) , 2014 . D. Sculley, G. Holt, D. Golovin, E. Davydov, T. Phillips, D. Ebner, V. Chaudhary, and M. Young. Machine learning: The high interest credit card of technical debt. In SE4ML: Software Engineering for Machine Learning (NIPS 2014 Workshop), 2014."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11229-014-0396-3"},{"key":"e_1_3_2_1_20_1","first-page":"1","volume-title":"Emerging Technologies and Ethical Issues in Engineering: Papers from a Workshop","author":"Wulf W. A.","year":"2004","unstructured":"W. A. Wulf . Keynote address . In Emerging Technologies and Ethical Issues in Engineering: Papers from a Workshop , pages 1 -- 6 . The National Academies Press , 2004 . W. A. Wulf. Keynote address. In Emerging Technologies and Ethical Issues in Engineering: Papers from a Workshop, pages 1--6. The National Academies Press, 2004."}],"event":{"name":"ICSE '16: 38th International Conference on Software Engineering","location":"Austin Texas","acronym":"ICSE '16","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS\\TCSE TC on Software Engineering","IEEE-CS\\DATC IEEE Computer Society"]},"container-title":["Proceedings of the 38th International Conference on Software Engineering Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2889160.2889207","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2889160.2889207","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:12Z","timestamp":1750221552000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2889160.2889207"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,14]]},"references-count":20,"alternative-id":["10.1145\/2889160.2889207","10.1145\/2889160"],"URL":"https:\/\/doi.org\/10.1145\/2889160.2889207","relation":{},"subject":[],"published":{"date-parts":[[2016,5,14]]},"assertion":[{"value":"2016-05-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}