{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T02:59:04Z","timestamp":1768013944790,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T00:00:00Z","timestamp":1687824000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CCF-1763788 and CCF-1956374"],"award-info":[{"award-number":["CCF-1763788 and CCF-1956374"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,27]]},"DOI":"10.1145\/3589806.3600037","type":"proceedings-article","created":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T20:09:22Z","timestamp":1687982962000},"page":"74-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Automatic Reproduction of Workflows in the Snakemake Workflow Catalog and nf-core Registries"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5411-356X","authenticated-orcid":false,"given":"Samuel","family":"Grayson","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Illinois at Urbana-Champaign, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5023-3492","authenticated-orcid":false,"given":"Darko","family":"Marinov","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Illinois at Urbana-Champaign, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5934-7525","authenticated-orcid":false,"given":"Daniel S.","family":"Katz","sequence":"additional","affiliation":[{"name":"NCSA &amp; CS &amp; ECE &amp; iSchool, University of Illinois at Urbana-Champaign, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1701-0008","authenticated-orcid":false,"given":"Reed","family":"Milewicz","sequence":"additional","affiliation":[{"name":"Department of Software Engineering and Research, Sandia National Laboratories, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5194\/gmd-6-1233-2013"},{"key":"e_1_3_2_1_2_1","unstructured":"STIG Authors. 2020. Red Hat Enterprise Linux 8 Security Technical Implementation Guide. https:\/\/www.stigviewer.com\/stig\/red_hat_enterprise_linux_8\/2020-11-25\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307681.3325400"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1038\/nbt.3780"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62008-0_30"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152493.3152556"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","unstructured":"Ludovic Court\u00e8s and Ricardo Wurmus. 2015. Reproducible and User-Controlled Software Environments in HPC with Guix. In Euro-Par 2015: Parallel Processing Workshops(Lecture Notes in Computer Science) Sascha Hunold Alexandru Costan Domingo Gim\u00e9nez Alexandru Iosup Laura Ricci Mar\u00eda\u00a0Engracia G\u00f3mez\u00a0Requena Vittorio Scarano Ana\u00a0Lucia Varbanescu Stephen\u00a0L. Scott Stefan Lankes Josef Weidendorfer and Michael Alexander (Eds.). Springer International Publishing Cham 579\u2013591. https:\/\/doi.org\/10.1007\/978-3-319-27308-2_47 interest: 99.","DOI":"10.1007\/978-3-319-27308-2_47"},{"key":"e_1_3_2_1_8_1","unstructured":"CVE database. 2020. CVE - CVE-2020-14386. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-14386"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094342017704893"},{"key":"e_1_3_2_1_10_1","unstructured":"Linux Developers. 2021. user_namespaces(7) - Linux manual page. https:\/\/www.man7.org\/linux\/man-pages\/man7\/user_namespaces.7.html"},{"key":"e_1_3_2_1_11_1","unstructured":"Singularity Developers. 2023. Security in SingularityCE \u2014 SingularityCE Admin Guide 3.11 documentation. https:\/\/docs.sylabs.io\/guides\/latest\/admin-guide\/security.html"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1038\/nbt.3820"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","unstructured":"Dave Dykstra. 2022. Apptainer Without Setuid. https:\/\/doi.org\/10.48550\/arXiv.2208.12106 arXiv:2208.12106 [cs].","DOI":"10.48550\/arXiv.2208.12106"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41587-020-0439-x"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/WORKS54523.2021.00016"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/WORKS51914.2020.00012"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807591.2807623"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41338-4_6"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970358"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2019.2900945"},{"key":"e_1_3_2_1_22_1","unstructured":"John\u00a0P. Holden. 2013. Increasing Access to the Results of Federally Funded Scientific Research."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5334\/jors.by"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1093\/gigascience"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2020.0069"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0177459"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.05.116"},{"key":"e_1_3_2_1_29_1","volume-title":"The sociology of science: theoretical and empirical investigations (4. dr. ed.). Univ. of Chicago Pr","author":"Merton K.","unstructured":"Robert\u00a0K. Merton. 1974. The sociology of science: theoretical and empirical investigations (4. dr. ed.). Univ. of Chicago Pr, Chicago."},{"key":"e_1_3_2_1_30_1","unstructured":"Alondra Nelson. 2022. Ensuring Free Immediate and Equitable Access to Federally Funded Research."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.12688\/f1000research.10137.1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00077"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094342019839124"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126908.3126925"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23987-9_14"},{"key":"e_1_3_2_1_36_1","volume-title":"staff","author":"ACM\u00a0Inc.","year":"2020","unstructured":"ACM\u00a0Inc. staff. 2020. Artifact Review and Badging. https:\/\/www.acm.org\/publications\/policies\/artifact-review-and-badging-current"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5334\/jors.ay"},{"key":"e_1_3_2_1_38_1","unstructured":"[38] The\u00a0Snakemake Team. 2023. https:\/\/snakemake.github.io\/snakemake-workflow-catalog."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-022-01143-6"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-022-01720-9"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416585"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/eScience.2012.6404482"},{"key":"e_1_3_2_1_43_1","unstructured":"Thomas\u00a0H. Zurbuchen. 2022. SMD Policy Document SPD-41a."}],"event":{"name":"ACM REP '23: 2023 ACM Conference on Reproducibility and Replicability","location":"Santa Cruz CA USA","acronym":"ACM REP '23","sponsor":["EIGREP Emerging Interest Group on Reproducibility and Replicability"]},"container-title":["Proceedings of the 2023 ACM Conference on Reproducibility and Replicability"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589806.3600037","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589806.3600037","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589806.3600037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:22Z","timestamp":1750182562000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589806.3600037"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,27]]},"references-count":42,"alternative-id":["10.1145\/3589806.3600037","10.1145\/3589806"],"URL":"https:\/\/doi.org\/10.1145\/3589806.3600037","relation":{},"subject":[],"published":{"date-parts":[[2023,6,27]]},"assertion":[{"value":"2023-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}