{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:10Z","timestamp":1750220170669,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,12]],"date-time":"2022-06-12T00:00:00Z","timestamp":1654992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2132318"],"award-info":[{"award-number":["2132318"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,12]]},"DOI":"10.1145\/3546930.3547494","type":"proceedings-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T23:14:49Z","timestamp":1660778089000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Enabling useful provenance in scripting languages with a human-in-the-loop"],"prefix":"10.1145","author":[{"given":"Yuze","family":"Lou","sequence":"first","affiliation":[{"name":"University of Michigan"}]},{"given":"Michael","family":"Cafarella","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2022,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. Time Travel Debugging for Python. https:\/\/pytrace.com\/  2020. Time Travel Debugging for Python. https:\/\/pytrace.com\/"},{"key":"e_1_3_2_1_2_1","unstructured":"2021. Data Science Stack Exchange. https:\/\/datascience.stackexchange.com\/  2021. Data Science Stack Exchange. https:\/\/datascience.stackexchange.com\/"},{"key":"e_1_3_2_1_3_1","unstructured":"2022. ast --- Abstract Syntax Trees --- Python 3.10.4 documentation. https:\/\/docs.python.org\/3\/library\/ast.html  2022. ast --- Abstract Syntax Trees --- Python 3.10.4 documentation. https:\/\/docs.python.org\/3\/library\/ast.html"},{"key":"e_1_3_2_1_4_1","unstructured":"2022. Feather File Format --- Apache Arrow V7.0.0. https:\/\/arrow.apache.org\/docs\/python\/feather.html  2022. Feather File Format --- Apache Arrow V7.0.0. https:\/\/arrow.apache.org\/docs\/python\/feather.html"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93576"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3314050"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 32nd International Conference on Very Large Data Bases","author":"Alexe Bogdan","year":"2006","unstructured":"Bogdan Alexe , Laura Chiticariu , and Wang-Chiew Tan . 2006 . SPIDER: A Schema MapPIng DEbuggeR . In Proceedings of the 32nd International Conference on Very Large Data Bases ( Seoul, Korea) (VLDB '06). VLDB Endowment, 1179--1182. Bogdan Alexe, Laura Chiticariu, and Wang-Chiew Tan. 2006. SPIDER: A Schema MapPIng DEbuggeR. In Proceedings of the 32nd International Conference on Very Large Data Bases (Seoul, Korea) (VLDB '06). VLDB Endowment, 1179--1182."},{"volume-title":"Provenance and Annotation of Data and Processes, Deborah L","author":"Angelino Elaine","key":"e_1_3_2_1_8_1","unstructured":"Elaine Angelino , Daniel Yamins , and Margo Seltzer . 2010. StarFlow: A Script-Centric Data Analysis Environment . In Provenance and Annotation of Data and Processes, Deborah L . McGuinness, James R. Michaelis, and Luc Moreau (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 236--250. Elaine Angelino, Daniel Yamins, and Margo Seltzer. 2010. StarFlow: A Script-Centric Data Analysis Environment. In Provenance and Annotation of Data and Processes, Deborah L. McGuinness, James R. Michaelis, and Luc Moreau (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 236--250."},{"key":"e_1_3_2_1_9_1","unstructured":"Matthias Boehm Iulian Antonov Sebastian Baunsgaard Mark Dokter Robert Ginthoer Kevin Innerebner Florijan Klezin Stefanie Lindstaedt Arnab Phani Benjamin Rath Berthold Reinwald Shafaq Siddiqi and Sebastian Benjamin Wrede. 2020. SystemDS: A Declarative Machine Learning System for the End-to-End Data Science Lifecycle. arXiv:1909.02976 [cs.DB]  Matthias Boehm Iulian Antonov Sebastian Baunsgaard Mark Dokter Robert Ginthoer Kevin Innerebner Florijan Klezin Stefanie Lindstaedt Arnab Phani Benjamin Rath Berthold Reinwald Shafaq Siddiqi and Sebastian Benjamin Wrede. 2020. SystemDS: A Declarative Machine Learning System for the End-to-End Data Science Lifecycle. arXiv:1909.02976 [cs.DB]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247646"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14778\/3436905.3436911"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2014.30"},{"key":"e_1_3_2_1_13_1","first-page":"22","article-title":"Program Slicing and Data Provenance","volume":"30","author":"Cheney James","year":"2007","unstructured":"James Cheney . 2007 . Program Slicing and Data Provenance . IEEE Data Engineering Bulletin 30 , 4 (2007), 22 -- 28 . James Cheney. 2007. Program Slicing and Data Provenance. IEEE Data Engineering Bulletin 30, 4 (2007), 22--28.","journal-title":"IEEE Data Engineering Bulletin"},{"key":"e_1_3_2_1_14_1","volume-title":"5th USENIX Workshop on the Theory and Practice of Provenance (TaPP 13)","author":"Chirigati Fernando","year":"2013","unstructured":"Fernando Chirigati , Dennis Shasha , and Juliana Freire . 2013 . ReproZip: Using Provenance to Support Computational Reproducibility . In 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP 13) . USENIX Association, Lombard, IL. https:\/\/www.usenix.org\/conference\/tapp13\/technical-sessions\/presentation\/chirigati Fernando Chirigati, Dennis Shasha, and Juliana Freire. 2013. ReproZip: Using Provenance to Support Computational Reproducibility. In 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP 13). USENIX Association, Lombard, IL. https:\/\/www.usenix.org\/conference\/tapp13\/technical-sessions\/presentation\/chirigati"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/362384.362685"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2000.839493"},{"key":"e_1_3_2_1_17_1","unstructured":"A. Dearmer. 2019. The Importance and Benefits of a Data Pipeline. https:\/\/www.xplenty.com\/blog\/what-is-a-data-pipeline\/  A. Dearmer. 2019. The Importance and Benefits of a Data Pipeline. https:\/\/www.xplenty.com\/blog\/what-is-a-data-pipeline\/"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2567709.2567736"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1247"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.15"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1265530.1265535"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 2011 USENIX Annual Technical Conference, 21--21","author":"Guo Philip","year":"2011","unstructured":"Philip Guo and Dawson Engler . 2011 . CDE: Using system call interposition to automatically create portable software packages . Proceedings of the 2011 USENIX Annual Technical Conference, 21--21 . Philip Guo and Dawson Engler. 2011. CDE: Using system call interposition to automatically create portable software packages. Proceedings of the 2011 USENIX Annual Technical Conference, 21--21."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-017-0486-1"},{"key":"e_1_3_2_1_24_1","unstructured":"Trung Dong Huynh. 2018. Prov Python. https:\/\/prov.readthedocs.io\/en\/latest\/index.html  Trung Dong Huynh. 2018. Prov Python. https:\/\/prov.readthedocs.io\/en\/latest\/index.html"},{"key":"e_1_3_2_1_25_1","unstructured":"Ankit Jain. 2020. Food Discovery with Uber Eats: Using Graph Learning to Power Recommendations. https:\/\/eng.uber.com\/uber-eats-graph-learning\/  Ankit Jain. 2020. Food Discovery with Uber Eats: Using Graph Learning to Power Recommendations. https:\/\/eng.uber.com\/uber-eats-graph-learning\/"},{"key":"e_1_3_2_1_26_1","unstructured":"Kelly Breland. 2021. How to Get a New Page Indexed Quickly. https:\/\/seranking.com\/blog\/10-steps-how-to-get-your-new-post-indexed-quickly\/  Kelly Breland. 2021. How to Get a New Page Indexed Quickly. https:\/\/seranking.com\/blog\/10-steps-how-to-get-your-new-post-indexed-quickly\/"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(98)00089-5"},{"volume-title":"Modeling and Analysis of Enterprise and Information Systems","author":"Li Qing","key":"e_1_3_2_1_28_1","unstructured":"Qing Li and Yu-Liu Chen . 2009. Entity-relationship diagram . In Modeling and Analysis of Enterprise and Information Systems . Springer , 125--139. Qing Li and Yu-Liu Chen. 2009. Entity-relationship diagram. In Modeling and Analysis of Enterprise and Information Systems. Springer, 125--139."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3384692"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.2218\/ijdc.v10i1.370"},{"key":"e_1_3_2_1_31_1","unstructured":"Jim Melton and Alan R Simon. 1993. Understanding the new SQL: a complete guide. Morgan Kaufmann.  Jim Melton and Alan R Simon. 1993. Understanding the new SQL: a complete guide. Morgan Kaufmann."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2659745"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267359.1267363"},{"volume-title":"Provenance and Annotation of Data and Processes, Bertram Lud\u00e4scher and Beth Plale (Eds.)","author":"Murta Leonardo","key":"e_1_3_2_1_34_1","unstructured":"Leonardo Murta , Vanessa Braganholo , Fernando Chirigati , David Koop , and Juliana Freire . 2015. noWorkflow: Capturing and Analyzing Provenance of Scripts . In Provenance and Annotation of Data and Processes, Bertram Lud\u00e4scher and Beth Plale (Eds.) . Springer International Publishing , Cham , 71--83. Leonardo Murta, Vanessa Braganholo, Fernando Chirigati, David Koop, and Juliana Freire. 2015. noWorkflow: Capturing and Analyzing Provenance of Scripts. In Provenance and Annotation of Data and Processes, Bertram Lud\u00e4scher and Beth Plale (Eds.). Springer International Publishing, Cham, 71--83."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403205"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.104"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3452788"},{"volume-title":"Provenance and Annotation of Data and Processes","author":"Pimentel Jo\u00e3o Felipe","key":"e_1_3_2_1_38_1","unstructured":"Jo\u00e3o Felipe Pimentel , Juliana Freire , Leonardo Murta , and Vanessa Braganholo . 2016. Fine-Grained Provenance Collection over Scripts Through Program Slicing . In Provenance and Annotation of Data and Processes , Marta Mattoso and Boris Glavic (Eds.). Springer International Publishing , Cham , 199--203. Jo\u00e3o Felipe Pimentel, Juliana Freire, Leonardo Murta, and Vanessa Braganholo. 2016. Fine-Grained Provenance Collection over Scripts Through Program Slicing. In Provenance and Annotation of Data and Processes, Marta Mattoso and Boris Glavic (Eds.). Springer International Publishing, Cham, 199--203."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.14778\/2733004.2733009"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085130.1085139"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319863"},{"key":"e_1_3_2_1_42_1","volume-title":"Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging. In 2004 USENIX Annual Technical Conference (USENIX ATC 04)","author":"Srinivasan Sudarshan M.","year":"2004","unstructured":"Sudarshan M. Srinivasan , Srikanth Kandula , Christopher R. Andrews , and Yuanyuan Zhou . 2004 . Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging. In 2004 USENIX Annual Technical Conference (USENIX ATC 04) . USENIX Association, Boston, MA. https:\/\/www.usenix.org\/conference\/ 2004-usenix-annual-technical-conference\/flashback-lightweight-extension-rollback-and Sudarshan M. Srinivasan, Srikanth Kandula, Christopher R. Andrews, and Yuanyuan Zhou. 2004. Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging. In 2004 USENIX Annual Technical Conference (USENIX ATC 04). USENIX Association, Boston, MA. https:\/\/www.usenix.org\/conference\/2004-usenix-annual-technical-conference\/flashback-lightweight-extension-rollback-and"},{"volume-title":"Provenance and Annotation of Data and Processes, Bertram Lud\u00e4scher and Beth Plale (Eds.)","author":"Stamatogiannakis Manolis","key":"e_1_3_2_1_43_1","unstructured":"Manolis Stamatogiannakis , Paul Groth , and Herbert Bos . 2015. Looking Inside the Black-Box: Capturing Data Provenance Using Dynamic Instrumentation . In Provenance and Annotation of Data and Processes, Bertram Lud\u00e4scher and Beth Plale (Eds.) . Springer International Publishing , Cham , 155--167. Manolis Stamatogiannakis, Paul Groth, and Herbert Bos. 2015. Looking Inside the Black-Box: Capturing Data Provenance Using Dynamic Instrumentation. In Provenance and Annotation of Data and Processes, Bertram Lud\u00e4scher and Beth Plale (Eds.). Springer International Publishing, Cham, 155--167."},{"key":"e_1_3_2_1_44_1","unstructured":"Wikipedia contributors. 2021. Abstract syntax tree. https:\/\/en.wikipedia.org\/wiki\/Abstract_syntax_tree  Wikipedia contributors. 2021. Abstract syntax tree. https:\/\/en.wikipedia.org\/wiki\/Abstract_syntax_tree"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.14778\/3229863.3236234"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/1325851.1325977"}],"event":{"name":"SIGMOD\/PODS '22: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"location":"Philadelphia Pennsylvania","acronym":"SIGMOD\/PODS '22"},"container-title":["Proceedings of the Workshop on Human-In-the-Loop Data Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546930.3547494","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3546930.3547494","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3546930.3547494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:41Z","timestamp":1750186841000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546930.3547494"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,12]]},"references-count":46,"alternative-id":["10.1145\/3546930.3547494","10.1145\/3546930"],"URL":"https:\/\/doi.org\/10.1145\/3546930.3547494","relation":{},"subject":[],"published":{"date-parts":[[2022,6,12]]},"assertion":[{"value":"2022-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}