2018 IEEE 14th International Conference on E-Science (E-Science) 2018
DOI: 10.1109/escience.2018.00109
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting execution provenance to explain difference between two data-intensive computations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…The interest in workflow provenance management has increased in the recent years, driven by a major effort by the provenance community, 31,35,[50][51][52][53][54][55][56][57][58][59][60][61][62] particularly to explore possibilities of optimizing workflows with the data captured by provenance tools and as a response to the urgent need for reproducible science, which is critical in scientific ML. 63 To exemplify, Thavasimani et al 14 investigate provenance traces recorded during workflow executions to observe differences in results with minor workflow configuration differences.…”
Section: Related Workmentioning
confidence: 99%
“…The interest in workflow provenance management has increased in the recent years, driven by a major effort by the provenance community, 31,35,[50][51][52][53][54][55][56][57][58][59][60][61][62] particularly to explore possibilities of optimizing workflows with the data captured by provenance tools and as a response to the urgent need for reproducible science, which is critical in scientific ML. 63 To exemplify, Thavasimani et al 14 investigate provenance traces recorded during workflow executions to observe differences in results with minor workflow configuration differences.…”
Section: Related Workmentioning
confidence: 99%
“…The interest in workflow provenance management has increased in the recent years, driven by a major effort by the provenance community [46], [47], [48], [49], [50], [51], [31], [52], [53], [35], [54], [55], [56], [57], [58] , particularly to explore possibilities of optimizing workflows with the data captured by provenance tools and as a response to the urgent need for reproducible science, which is critical in scientific ML [59]. To exemplify, Thavasimani et al, [14] investigate provenance traces recorded during workflow executions to observe differences in results with minor workflow configuration differences.…”
Section: Related Workmentioning
confidence: 99%
“…Here we extend our previous study to cover the general case where E is obtained from E through a sequence of edits, and as a consequence, the traces collected at runtime are non-isomorphic and reflect structural differences introduced through these edits. The abstract idea of comparing two non-isomorphic graphs is proposed in our earlier work [16].…”
Section: B Contributionsmentioning
confidence: 99%