Utilizing Provenance in Reusable Research Objects
Journal Title: Informatics - Year 2018, Vol 5, Issue 1
Abstract
Science is conducted collaboratively, often requiring the sharing of knowledge about computational experiments. When experiments include only datasets, they can be shared using Uniform Resource Identifiers (URIs) or Digital Object Identifiers (DOIs). An experiment, however, seldom includes only datasets, but more often includes software, its past execution, provenance, and associated documentation. The Research Object has recently emerged as a comprehensive and systematic method for aggregation and identification of diverse elements of computational experiments. While a necessary method, mere aggregation is not sufficient for the sharing of computational experiments. Other users must be able to easily recompute on these shared research objects. Computational provenance is often the key to enable such reuse. In this paper, we show how reusable research objects can utilize provenance to correctly repeat a previous reference execution, to construct a subset of a research object for partial reuse, and to reuse existing contents of a research object for modified reuse. We describe two methods to summarize provenance that aid in understanding the contents and past executions of a research object. The first method obtains a process-view by collapsing low-level system information, and the second method obtains a summary graph by grouping related nodes and edges with the goal to obtain a graph view similar to application workflow. Through detailed experiments, we show the efficacy and efficiency of our algorithms.
Authors and Affiliations
Zhihao Yuan, Dai Hai Ton That, Siddhant Kothari, Gabriel Fils and Tanu Malik
Exploiting Rating Abstention Intervals for Addressing Concept Drift in Social Network Recommender Systems
One of the major problems that social networks face is the continuous production of successful, user-targeted information in the form of recommendations, which are produced exploiting technology from the field of recom...
Back-Off Time Calculation Algorithms in WSN
In a Mobile Wireless Sensor Mesh Network (MWSMN), based on the IEEE 802.15.4 standard, low power consumption is vitally important since the network devices are mostly battery driven. This is especially true for devices...
Thinking about The Information Age
“It is a pleasure to open the Information Age exhibition today at the @ScienceMuseum and I hope people will enjoy visiting. Elizabeth R.” The museum proudly claims that the exhibition had been several years in planning...
Player–Game Interaction and Cognitive Gameplay: A Taxonomic Framework for the Core Mechanic of Videogames
Cognitive gameplay—the cognitive dimension of a player’s experience—emerges from the interaction between a player and a game. While its design requires careful consideration, cognitive gameplay can be designed only ind...
Developing a Model of Distributed Sensemaking: A Case Study of Military Analysis
In this paper, we examine the role of representational artefacts in sensemaking. Embodied within representational media, such as maps, charts and lists, are a number of affordances, which can furnish sensemakers with t...