{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T07:21:07Z","timestamp":1770276067033,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T00:00:00Z","timestamp":1602460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-18-1-2037"],"award-info":[{"award-number":["N00014-18-1-2037"]}],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science Foundation","award":["CCF-1764077, CCF-1527923, CCF-1723773"],"award-info":[{"award-number":["CCF-1764077, CCF-1527923, CCF-1723773"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,12]]},"DOI":"10.1145\/3419111.3421292","type":"proceedings-article","created":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T04:40:25Z","timestamp":1602564025000},"page":"372-386","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Influence-based provenance for dataflow applications with taint propagation"],"prefix":"10.1145","author":[{"given":"Jason","family":"Teoh","sequence":"first","affiliation":[{"name":"UCLA"}]},{"given":"Muhammad Ali","family":"Gulzar","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Miryung","family":"Kim","sequence":"additional","affiliation":[{"name":"UCLA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,12]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n.d.]. AggregateByKey. https:\/\/spark.apache.org\/docs\/2.1.1\/api\/java\/org\/apache\/spark\/rdd\/PairRDDFunctions.html.  [n.d.]. AggregateByKey. https:\/\/spark.apache.org\/docs\/2.1.1\/api\/java\/org\/apache\/spark\/rdd\/PairRDDFunctions.html."},{"key":"e_1_3_2_2_2_1","unstructured":"[n.d.]. Hadoop. http:\/\/hadoop.apache.org\/.  [n.d.]. Hadoop. http:\/\/hadoop.apache.org\/."},{"key":"e_1_3_2_2_3_1","unstructured":"[n.d.]. Spark. https:\/\/spark.apache.org\/.  [n.d.]. Spark. https:\/\/spark.apache.org\/."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93576"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1739041.1739078"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497516"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831713"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Tat W. Chan and Arun Lakhotia. 1998. Debugging program failure exhibited by voluminous data. Journal of Software Maintenance (1998).  Tat W. Chan and Arun Lakhotia. 1998. Debugging program failure exhibited by voluminous data. Journal of Software Maintenance (1998).","DOI":"10.1002\/(SICI)1096-908X(199803\/04)10:2<111::AID-SMR167>3.0.CO;2-8"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566211"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.14778\/2994509.2994530"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572301"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062522"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357223.3362738"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-002-0083-8"},{"key":"e_1_3_2_2_16_1","volume-title":"Arthur: Rich Post-Facto Debugging for Production Analytics Applications. Technical Report. Citeseer.","author":"Dave Ankur","year":"2013"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127479.3131624"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884813"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101948"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376716"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.118"},{"key":"e_1_3_2_2_23_1","volume-title":"In Proc. Conference on Innovative Data Systems Research (CIDR).","author":"Ikeda Robert","year":"2011"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544882"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-017-0474-5"},{"key":"e_1_3_2_2_26_1","volume-title":"Monitoring and Debugging DryadLINQ Applications with Daphne. In 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum. 1266--1273","author":"Jagannath V."},{"key":"e_1_3_2_2_27_1","volume-title":"Proceedings of the 34th International Conference on Machine Learning -","volume":"70","author":"Koh Pang Wei","year":"2017"},{"key":"e_1_3_2_2_28_1","unstructured":"Timothy Robert Leek Graham Z Baker Ruben Edward Brown Michael A Zhivich and RP Lippmann. 2007. Coverage maximization using dynamic taint tracing. Technical Report. DTIC Document.  Timothy Robert Leek Graham Z Baker Ruben Edward Brown Michael A Zhivich and RP Lippmann. 2007. Coverage maximization using dynamic taint tracing. Technical Report. DTIC Document."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2402"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523619"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2004.17"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.14778\/1880172.1880176"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134307"},{"key":"e_1_3_2_2_34_1","volume-title":"In In Proceedings of the 12th Network and Distributed Systems Security Symposium. Citeseer.","author":"Newsome James","year":"2005"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989459"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.14778\/3199517.3199522"},{"key":"e_1_3_2_2_37_1","unstructured":"Sudeepa Roy and Dan Suciu. 2014. A formal approach to finding explanations for database queries. In SIGMOD. 1579--1590.  Sudeepa Roy and Dan Suciu. 2014. A formal approach to finding explanations for database queries. In SIGMOD. 1579--1590."},{"key":"e_1_3_2_2_38_1","volume-title":"Provenance and Annotation of Data and Processes, Bertram Lud\u00e4scher and Beth Plale (Eds.)","author":"Stamatogiannakis Manolis"},{"key":"e_1_3_2_2_39_1","volume-title":"Program Slicing. In Proceedings of the 5th International Conference on Software Engineering","author":"Weiser Mark","year":"1981"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536354.2536356"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48166-4_16"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587053"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"}],"event":{"name":"SoCC '20: ACM Symposium on Cloud Computing","location":"Virtual Event USA","acronym":"SoCC '20","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 11th ACM Symposium on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419111.3421292","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419111.3421292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:32:05Z","timestamp":1750195925000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419111.3421292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,12]]},"references-count":43,"alternative-id":["10.1145\/3419111.3421292","10.1145\/3419111"],"URL":"https:\/\/doi.org\/10.1145\/3419111.3421292","relation":{},"subject":[],"published":{"date-parts":[[2020,10,12]]},"assertion":[{"value":"2020-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}