With Jupyter notebooks becoming more commonly used within scientific research, more Jupyter notebook-based use cases have evolved to be distributed. This trend makes it more challenging to analyze anomalies and debug notebooks. Provenance data is an ideal option that can create more context around anomalies and make it easier to find the root cause of the anomaly. However, provenance rarely gets investigated in the context of distributed Jupyter notebooks. In this paper, we propose a framework that integrates two data types, provenance and detected performance anomalies based on performance data. We use the combined information to visually show the enduser the provenance at the time of the anomaly and the root cause of the anomaly. We build...
Provenance is a term originating from the work of art. It aims to provide a chain of information of ...
In this work we analyze the typical operations of data preparation within a machine learning process...
International audienceIdentifying the root cause and impact of a system intrusion remains a foundati...
We present FRAPpuccino (or FRAP), a provenance- based fault detection mechanism for Platform as a Se...
The self-documenting aspects and the ability to reproduce results have been touted as significant be...
Abstract. Provenance of scientific data is a key piece of the metadata record for the data's ongoing...
Scientists can facilitate data intensive applications to study and understand the behavior of a comp...
Provenance is defined as the origin or the earliest known history of a thing. In the aspect of dat...
Data provenance is the history of a digital artifact, from the point of collection to its present<br...
It is important to record the impact of users and processes on the evolution of data, to enable futu...
Data provenance tools seek to facilitate reproducible data science and auditable data analyses by ca...
A zip file containing the 100,000 Jupyter notebooks randomly sampled from GitHub notebooks published...
Monitoring often requires insight into the monitored system as well as concrete specifications of ex...
The open provenance architecture approach to the challenge was distinct in several regards. In parti...
Jupyter notebooks-documents that contain live code, equations, visualizations, and narrative text-no...
Provenance is a term originating from the work of art. It aims to provide a chain of information of ...
In this work we analyze the typical operations of data preparation within a machine learning process...
International audienceIdentifying the root cause and impact of a system intrusion remains a foundati...
We present FRAPpuccino (or FRAP), a provenance- based fault detection mechanism for Platform as a Se...
The self-documenting aspects and the ability to reproduce results have been touted as significant be...
Abstract. Provenance of scientific data is a key piece of the metadata record for the data's ongoing...
Scientists can facilitate data intensive applications to study and understand the behavior of a comp...
Provenance is defined as the origin or the earliest known history of a thing. In the aspect of dat...
Data provenance is the history of a digital artifact, from the point of collection to its present<br...
It is important to record the impact of users and processes on the evolution of data, to enable futu...
Data provenance tools seek to facilitate reproducible data science and auditable data analyses by ca...
A zip file containing the 100,000 Jupyter notebooks randomly sampled from GitHub notebooks published...
Monitoring often requires insight into the monitored system as well as concrete specifications of ex...
The open provenance architecture approach to the challenge was distinct in several regards. In parti...
Jupyter notebooks-documents that contain live code, equations, visualizations, and narrative text-no...
Provenance is a term originating from the work of art. It aims to provide a chain of information of ...
In this work we analyze the typical operations of data preparation within a machine learning process...
International audienceIdentifying the root cause and impact of a system intrusion remains a foundati...