{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:55:44Z","timestamp":1751608544296},"reference-count":58,"publisher":"Association for Computing Machinery (ACM)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2022,2]]},"abstract":"<jats:p>\n            In scientific computing and data science disciplines, it is often necessary to share application workflows and repeat results. Current tools containerize application workflows, and share the resulting container for repeating results. These tools, due to containerization, do improve sharing of results. However, they do not improve the efficiency of replay. In this paper, we present the multiversion replay problem, which arises when multiple versions of an application are containerized, and each version must be replayed to repeat results. To avoid executing each version separately, we develop\n            <jats:bold>CHEX<\/jats:bold>\n            , which checkpoints program state and determines when it is permissible to reuse program state across versions. It does so using system call-based execution lineage. Our capability to identify common computations across versions enables us to consider optimizing replay using an in-memory cache, based on a checkpoint-restore-switch system. We show the multiversion replay problem is NP-hard, and propose efficient heuristics for it.\n            <jats:bold>CHEX<\/jats:bold>\n            reduces overall replay time by sharing common computations but avoids storing a large number of checkpoints. We demonstrate that\n            <jats:bold>CHEX<\/jats:bold>\n            maintains lightweight package sharing, and improves the total time of multiversion replay by 50% on average.\n          <\/jats:p>","DOI":"10.14778\/3514061.3514075","type":"journal-article","created":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T22:26:10Z","timestamp":1655936770000},"page":"1297-1310","source":"Crossref","is-referenced-by-count":5,"title":["CHEX"],"prefix":"10.14778","volume":"15","author":[{"given":"Naga Nithin","family":"Manne","sequence":"first","affiliation":[{"name":"Argonne National Lab."}]},{"given":"Shilvi","family":"Satpati","sequence":"additional","affiliation":[{"name":"DePaul University"}]},{"given":"Tanu","family":"Malik","sequence":"additional","affiliation":[{"name":"DePaul University"}]},{"given":"Amitabha","family":"Bagchi","sequence":"additional","affiliation":[{"name":"IIT, Delhi, Delhi, India"}]},{"given":"Ashish","family":"Gehani","sequence":"additional","affiliation":[{"name":"SRI"}]},{"given":"Amitabh","family":"Chaudhary","sequence":"additional","affiliation":[{"name":"The University of Chicago"}]}],"member":"320","published-online":{"date-parts":[[2022,6,22]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"https:\/\/sciunit.run\/. [Online","year":"2021","unstructured":"2017. Sciunit. https:\/\/sciunit.run\/. [Online ; accessed 10- Sep- 2021 ]. 2017. Sciunit. https:\/\/sciunit.run\/. [Online; accessed 10-Sep-2021]."},{"key":"e_1_2_1_2_1","volume-title":"https:\/\/github.com\/bahuisman\/NatGasModel. [Online","year":"2021","unstructured":"Bahuisman. 2018. Natural-Gas-Model. https:\/\/github.com\/bahuisman\/NatGasModel. [Online ; accessed 10- Dec- 2021 ]. Bahuisman. 2018. Natural-Gas-Model. https:\/\/github.com\/bahuisman\/NatGasModel. [Online; accessed 10-Dec-2021]."},{"key":"e_1_2_1_3_1","volume-title":"OPUS: A Lightweight System for Observational Provenance in User Space. In 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP 13)","author":"Balakrishnan Nikilesh","year":"2013","unstructured":"Nikilesh Balakrishnan , Thomas Bytheway , Ripduman Sohan , and Andy Hopper . 2013 . OPUS: A Lightweight System for Observational Provenance in User Space. In 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP 13) . 1--4. Nikilesh Balakrishnan, Thomas Bytheway, Ripduman Sohan, and Andy Hopper. 2013. OPUS: A Lightweight System for Observational Provenance in User Space. In 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP 13). 1--4."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824035"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.57"},{"key":"e_1_2_1_6_1","volume-title":"Conference on Innovative Data Systems Research (CIDR).","author":"Brachmann Michael","year":"2020","unstructured":"Michael Brachmann , William Spoth , Oliver Kennedy , Boris Glavic , Heiko Mueller , Sonia Castelo , Carlos Bautista , and Juliana Friere . 2020 . Your notebook is not crumby enough, REPLace it . In Conference on Innovative Data Systems Research (CIDR). Michael Brachmann, William Spoth, Oliver Kennedy, Boris Glavic, Heiko Mueller, Sonia Castelo, Carlos Bautista, and Juliana Friere. 2020. Your notebook is not crumby enough, REPLace it. In Conference on Innovative Data Systems Research (CIDR)."},{"key":"e_1_2_1_7_1","volume-title":"USENIX Symposium on Internet Technologies and Systems. 193--206","author":"Cao Pei","year":"1997","unstructured":"Pei Cao and Sandy Irani . 1997 . Cost-aware www proxy caching algorithms .. In USENIX Symposium on Internet Technologies and Systems. 193--206 . Pei Cao and Sandy Irani. 1997. Cost-aware www proxy caching algorithms.. In USENIX Symposium on Internet Technologies and Systems. 193--206."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2899401"},{"key":"e_1_2_1_9_1","unstructured":"Jupyter Community. 2016. C++ implementation of the Jupyter Kernel protocol. https:\/\/github.com\/jupyter-xeus\/xeus.  Jupyter Community. 2016. C++ implementation of the Jupyter Kernel protocol. https:\/\/github.com\/jupyter-xeus\/xeus."},{"key":"e_1_2_1_10_1","volume-title":"https:\/\/criu.org\/. [Online","author":"Community The CRIU","year":"2019","unstructured":"The CRIU Community . 2019. Checkpoint\/ Restore In Userspace . https:\/\/criu.org\/. [Online ; accessed 8- Jan- 2019 ]. The CRIU Community. 2019. Checkpoint\/Restore In Userspace. https:\/\/criu.org\/. [Online; accessed 8-Jan-2019]."},{"key":"e_1_2_1_11_1","volume-title":"Introduction to Algorithms","author":"Cormen Thomas H.","unstructured":"Thomas H. Cormen , Charles E. Leiserson , Ronald L. Rivest , and Clifford Stein . 2009. Introduction to Algorithms , Third Edition (3 rd ed.). The MIT Press , Chapter 15. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. 2009. Introduction to Algorithms, Third Edition (3rd ed.). The MIT Press, Chapter 15.","edition":"3"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/645922.673462"},{"key":"e_1_2_1_13_1","volume-title":"https:\/\/github.com\/JEddy92\/TimeSeries_Seq2Seq. [Online","author":"Eddy Joseph","year":"2021","unstructured":"Joseph Eddy . 2019. Time-Series Forecasting . https:\/\/github.com\/JEddy92\/TimeSeries_Seq2Seq. [Online ; accessed 10- Dec- 2021 ]. Joseph Eddy. 2019. Time-Series Forecasting. https:\/\/github.com\/JEddy92\/TimeSeries_Seq2Seq. [Online; accessed 10-Dec-2021]."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14778\/3436905.3436925"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35170-9_6"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the 9th Symposium on Operating Systems Design and Implementation (OSDI). 75--88","author":"Gunda Pradeep Kumar","year":"2010","unstructured":"Pradeep Kumar Gunda , Lenin Ravindranath , Chandu Thekkath , Yuan Yu , and Li Zhuang . 2010 . Nectar: Automatic Management of Data and Computation in Datacenters . In Proceedings of the 9th Symposium on Operating Systems Design and Implementation (OSDI). 75--88 . Pradeep Kumar Gunda, Lenin Ravindranath, Chandu Thekkath, Yuan Yu, and Li Zhuang. 2010. Nectar: Automatic Management of Data and Computation in Datacenters. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation (OSDI). 75--88."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001455"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the 2nd Workshop on the Theory and Practice of Provenance (TAPP'10)","author":"Philip","unstructured":"Philip J. Guo and Dawson Engler. 2010. Towards Practical Incremental Recomputation for Scientists: An Implementation for the Python Language . In Proceedings of the 2nd Workshop on the Theory and Practice of Provenance (TAPP'10) . 6--6. Philip J. Guo and Dawson Engler. 2010. Towards Practical Incremental Recomputation for Scientists: An Implementation for the Python Language. In Proceedings of the 2nd Workshop on the Theory and Practice of Provenance (TAPP'10). 6--6."},{"key":"e_1_2_1_19_1","volume-title":"2011 USENIX Annual Technical Conference (USENIX ATC 11)","author":"Philip","unstructured":"Philip J. Guo and Dawson Engler. 2011. CDE: Using System Call Interposition to Automatically Create Portable Software Packages . In 2011 USENIX Annual Technical Conference (USENIX ATC 11) . 21--21. Philip J. Guo and Dawson Engler. 2011. CDE: Using System Call Interposition to Automatically Create Portable Software Packages. In 2011 USENIX Annual Technical Conference (USENIX ATC 11). 21--21."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.17"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367863"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2618137.2618138"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings 20th IEEE International Conference on Distributed Computing Systems. IEEE, 254--261","author":"Jin Shudong","year":"2000","unstructured":"Shudong Jin and Azer Bestavros . 2000 . Popularity-aware greedy dual-size web proxy caching algorithms . In Proceedings 20th IEEE International Conference on Distributed Computing Systems. IEEE, 254--261 . Shudong Jin and Azer Bestavros. 2000. Popularity-aware greedy dual-size web proxy caching algorithms. In Proceedings 20th IEEE International Conference on Distributed Computing Systems. IEEE, 254--261."},{"key":"e_1_2_1_24_1","volume-title":"9th USENIX Workshop on the Theory and Practice of Provenance (TaPP","author":"Koop David","year":"2017","unstructured":"David Koop and Jay Patel . 2017 . Dataflow notebooks: encoding and tracking dependencies of cells . In 9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017). 17--17. David Koop and Jay Patel. 2017. Dataflow notebooks: encoding and tracking dependencies of cells. In 9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017). 17--17."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453920"},{"key":"e_1_2_1_26_1","volume-title":"The Design Space of Computational Notebooks: An Analysis of 60 Systems in Academia and Industry. In 2020 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC). IEEE, 1--11","author":"Lau Sam","year":"2020","unstructured":"Sam Lau , Ian Drosos , Julia M Markel , and Philip J Guo . 2020 . The Design Space of Computational Notebooks: An Analysis of 60 Systems in Academia and Industry. In 2020 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC). IEEE, 1--11 . Sam Lau, Ian Drosos, Julia M Markel, and Philip J Guo. 2020. The Design Space of Computational Notebooks: An Analysis of 60 Systems in Academia and Industry. In 2020 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC). IEEE, 1--11."},{"key":"e_1_2_1_27_1","volume-title":"Stock Prediction Using Financial News. https:\/\/github.com\/AI4Finance-LLC\/Financial-News-for-Stock-Prediction-using-DP-LSTM-NIPS-2019. [Online","author":"Xinyi Li.","year":"2021","unstructured":"Xinyi Li. 2020. Stock Prediction Using Financial News. https:\/\/github.com\/AI4Finance-LLC\/Financial-News-for-Stock-Prediction-using-DP-LSTM-NIPS-2019. [Online ; accessed 5- Dec- 2021 ]. Xinyi Li. 2020. Stock Prediction Using Financial News. https:\/\/github.com\/AI4Finance-LLC\/Financial-News-for-Stock-Prediction-using-DP-LSTM-NIPS-2019. [Online; accessed 5-Dec-2021]."},{"key":"e_1_2_1_28_1","volume-title":"33rd Conference on Neural Information Processing Systems (NeurIPS 2019) Workshop on Robust AI in Financial Services: Data, Fairness, Explainability, Trustworthiness, and Privacy","author":"Li Xinyi","year":"2019","unstructured":"Xinyi Li , Yinchuan Li , Hongyang Yang , Liuqing Yang , and Xiao-Yang Liu . 2019 . DP-LSTM: Differential privacy-inspired LSTM for stock prediction using financial news . 33rd Conference on Neural Information Processing Systems (NeurIPS 2019) Workshop on Robust AI in Financial Services: Data, Fairness, Explainability, Trustworthiness, and Privacy (2019). Xinyi Li, Yinchuan Li, Hongyang Yang, Liuqing Yang, and Xiao-Yang Liu. 2019. DP-LSTM: Differential privacy-inspired LSTM for stock prediction using financial news. 33rd Conference on Neural Information Processing Systems (NeurIPS 2019) Workshop on Robust AI in Financial Services: Data, Fairness, Explainability, Trustworthiness, and Privacy (2019)."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2915212"},{"key":"e_1_2_1_30_1","volume-title":"Convex Over and Under ENvelopes for Nonlinear Estimation. https:\/\/www.coin-or.org\/Couenne\/. [Online","author":"Lougee-Heimer Robin","year":"2021","unstructured":"Robin Lougee-Heimer . 2003. Convex Over and Under ENvelopes for Nonlinear Estimation. https:\/\/www.coin-or.org\/Couenne\/. [Online ; accessed 21- July - 2021 ]. Robin Lougee-Heimer. 2003. Convex Over and Under ENvelopes for Nonlinear Estimation. https:\/\/www.coin-or.org\/Couenne\/. [Online; accessed 21-July-2021]."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.14778\/3447689.3447712"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.30"},{"key":"e_1_2_1_33_1","volume-title":"Image Classification. https:\/\/www.kaggle.com\/nithinmanne\/fashionmnist. [Online","author":"Manne Nithin","year":"2021","unstructured":"Nithin Manne . 2020. Image Classification. https:\/\/www.kaggle.com\/nithinmanne\/fashionmnist. [Online ; accessed 10- Dec- 2021 ]. Nithin Manne. 2020. Image Classification. https:\/\/www.kaggle.com\/nithinmanne\/fashionmnist. [Online; accessed 10-Dec-2021]."},{"key":"e_1_2_1_34_1","volume-title":"CHEX: Multiversion Replay with Ordered Checkpoints. arXiv:2202.08429 [cs.DB]","author":"Manne Naga Nithin","year":"2022","unstructured":"Naga Nithin Manne , Shilvi Satpati , Tanu Malik , Amitabha Bagchi , Ashish Gehani , and Amitabh Chaudhary . 2022 . CHEX: Multiversion Replay with Ordered Checkpoints. arXiv:2202.08429 [cs.DB] Naga Nithin Manne, Shilvi Satpati, Tanu Malik, Amitabha Bagchi, Ashish Gehani, and Amitabh Chaudhary. 2022. CHEX: Multiversion Replay with Ordered Checkpoints. arXiv:2202.08429 [cs.DB]"},{"key":"e_1_2_1_35_1","volume-title":"Rebecca Isaacs, and Michael Isard.","author":"McSherry Frank","year":"2013","unstructured":"Frank McSherry , Derek Gordon Murray , Rebecca Isaacs, and Michael Isard. 2013 . Differential Dataflow. In CIDR. Frank McSherry, Derek Gordon Murray, Rebecca Isaacs, and Michael Isard. 2013. Differential Dataflow. In CIDR."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629080.1629083"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522738"},{"key":"e_1_2_1_38_1","volume-title":"Efficient Provenance Alignment in Reproduced Executions. In 12th International Workshop on Theory and Practice of Provenance (TaPP","author":"Nakamura Yuta","year":"2020","unstructured":"Yuta Nakamura , Tanu Malik , and Ashish Gehani . 2020 . Efficient Provenance Alignment in Reproduced Executions. In 12th International Workshop on Theory and Practice of Provenance (TaPP 2020). 6--12. Yuta Nakamura, Tanu Malik, and Ashish Gehani. 2020. Efficient Provenance Alignment in Reproduced Executions. In 12th International Workshop on Theory and Practice of Provenance (TaPP 2020). 6--12."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462902.2462918"},{"key":"e_1_2_1_40_1","unstructured":"Tanu Malik Nithin Naga Manne. 2021. The CHEX System. https:\/\/bitbucket.org\/depauldbgroup\/storagevscompute\/src\/optimal\/.  Tanu Malik Nithin Naga Manne. 2021. The CHEX System. https:\/\/bitbucket.org\/depauldbgroup\/storagevscompute\/src\/optimal\/."},{"key":"e_1_2_1_41_1","volume-title":"2017 USENIX Annual Technical Conference. 377--389","author":"O'Callahan Robert","year":"2017","unstructured":"Robert O'Callahan , Chris Jones , Nathan Froyd , Kyle Huey , Albert Noll , and Nimrod Partush . 2017 . Engineering record and replay for deployability . In 2017 USENIX Annual Technical Conference. 377--389 . Robert O'Callahan, Chris Jones, Nathan Froyd, Kyle Huey, Albert Noll, and Nimrod Partush. 2017. Engineering record and replay for deployability. In 2017 USENIX Annual Technical Conference. 377--389."},{"key":"e_1_2_1_42_1","first-page":"1","article-title":"Using Provenance for Repeatability. In USENIX Theory and Practice of Provenance (TaPP'13)","volume":"2","author":"Pham Quan","year":"2013","unstructured":"Quan Pham , Tanu Malik , and Ian Foster . 2013 . Using Provenance for Repeatability. In USENIX Theory and Practice of Provenance (TaPP'13) . Article 2 , 2: 1 -- 2 :4 pages. Quan Pham, Tanu Malik, and Ian Foster. 2013. Using Provenance for Repeatability. In USENIX Theory and Practice of Provenance (TaPP'13). Article 2, 2:1--2:4 pages.","journal-title":"Article"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113366"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824118"},{"key":"e_1_2_1_45_1","volume-title":"STARE Cookbooks: STARE+Dask-Demo. https:\/\/bit.ly\/37dlK4B. [Online","author":"Rilee Michael","year":"2021","unstructured":"Michael Rilee . 2020. STARE Cookbooks: STARE+Dask-Demo. https:\/\/bit.ly\/37dlK4B. [Online ; accessed 10- Dec- 2021 ]. Michael Rilee. 2020. STARE Cookbooks: STARE+Dask-Demo. https:\/\/bit.ly\/37dlK4B. [Online; accessed 10-Dec-2021]."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397536.3422346"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2012.6264675"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335419"},{"key":"e_1_2_1_49_1","volume-title":"https:\/\/github.com\/sparsifai\/epruning. [Online","author":"Salehinejad Hojjat","year":"2021","unstructured":"Hojjat Salehinejad . 2020. E Pruning (EDropout). https:\/\/github.com\/sparsifai\/epruning. [Online ; accessed 10- Dec- 2021 ]. Hojjat Salehinejad. 2020. EPruning (EDropout). https:\/\/github.com\/sparsifai\/epruning. [Online; accessed 10-Dec-2021]."},{"key":"e_1_2_1_50_1","volume-title":"EDropout: Energy-Based Dropout and Pruning of Deep Neural Networks. arXiv preprint arXiv:2006.04270","author":"Salehinejad Hojjat","year":"2020","unstructured":"Hojjat Salehinejad and Shahrokh Valaee . 2020. EDropout: Energy-Based Dropout and Pruning of Deep Neural Networks. arXiv preprint arXiv:2006.04270 ( 2020 ), arXiv-2006. Hojjat Salehinejad and Shahrokh Valaee. 2020. EDropout: Energy-Based Dropout and Pruning of Deep Neural Networks. arXiv preprint arXiv:2006.04270 (2020), arXiv-2006."},{"key":"e_1_2_1_51_1","volume-title":"International Provenance and Annotation Workshop. Springer, 155--167","author":"Stamatogiannakis Manolis","year":"2014","unstructured":"Manolis Stamatogiannakis , Paul Groth , and Herbert Bos . 2014 . Looking inside the black-box: capturing data provenance using dynamic instrumentation . In International Provenance and Annotation Workshop. Springer, 155--167 . Manolis Stamatogiannakis, Paul Groth, and Herbert Bos. 2014. Looking inside the black-box: capturing data provenance using dynamic instrumentation. In International Provenance and Annotation Workshop. Springer, 155--167."},{"key":"e_1_2_1_52_1","volume-title":"Trade-Offs in Automatic Provenance Capture (IPAW","author":"Stamatogiannakis Manolis","year":"2016","unstructured":"Manolis Stamatogiannakis , Hasanat Kazmi , Hashim Sharif , Remco Vermeulen , Ashish Gehani , Herbert Bos , and Paul Groth . 2016. Trade-Offs in Automatic Provenance Capture (IPAW 2016 ). Springer-Verlag , 29--41. Manolis Stamatogiannakis, Hasanat Kazmi, Hashim Sharif, Remco Vermeulen, Ashish Gehani, Herbert Bos, and Paul Groth. 2016. Trade-Offs in Automatic Provenance Capture (IPAW 2016). Springer-Verlag, 29--41."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214239.3214242"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-018-0514-9"},{"key":"e_1_2_1_55_1","volume-title":"Sciunits: Reusable Research Objects","author":"Ton That Dai Hai","year":"2017","unstructured":"Dai Hai Ton That , Gabriel Fils , Zhihao Yuan , and Tanu Malik . 2017 . Sciunits: Reusable Research Objects . In IEEE eScience. 374--383. Dai Hai Ton That, Gabriel Fils, Zhihao Yuan, and Tanu Malik. 2017. Sciunits: Reusable Research Objects. In IEEE eScience. 374--383."},{"key":"e_1_2_1_56_1","volume-title":"Dai Hai Ton That, and Tanu Malik","author":"Youngdahl Andrew","year":"2019","unstructured":"Andrew Youngdahl , Dai Hai Ton That, and Tanu Malik . 2019 . SciInc: A Container Runtime for Incremental Recomputation. In IEEE eScience. IEEE , 291--300. Andrew Youngdahl, Dai Hai Ton That, and Tanu Malik. 2019. SciInc: A Container Runtime for Incremental Recomputation. In IEEE eScience. IEEE, 291--300."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.3390\/informatics5010014"},{"key":"e_1_2_1_58_1","volume-title":"https:\/\/multithreaded.stitchfix.com\/blog\/2017\/07\/26\/nodebook\/ [Online","author":"Zielnicki K","year":"2021","unstructured":"K Zielnicki . 2017. Nodebook. https:\/\/multithreaded.stitchfix.com\/blog\/2017\/07\/26\/nodebook\/ [Online ; accessed 10- July - 2021 ]. K Zielnicki. 2017. Nodebook. https:\/\/multithreaded.stitchfix.com\/blog\/2017\/07\/26\/nodebook\/ [Online; accessed 10-July-2021]."}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3514061.3514075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T09:28:00Z","timestamp":1672219680000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3514061.3514075"}},"subtitle":["multiversion replay with ordered checkpoints"],"short-title":[],"issued":{"date-parts":[[2022,2]]},"references-count":58,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["10.14778\/3514061.3514075"],"URL":"https:\/\/doi.org\/10.14778\/3514061.3514075","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2022,2]]}}}