Provenance Tracking for End-to-End Machine Learning Pipelines

被引:1
|
作者
Grafberger, Stefan [1 ]
Groth, Paul [2 ]
Schelter, Sebastian [2 ]
机构
[1] Univ Amsterdam, AIRLab, Amsterdam, Netherlands
[2] Univ Amsterdam, Amsterdam, Netherlands
关键词
D O I
10.1145/3543873.3587557
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
引用
收藏
页码:1512 / 1512
页数:1
相关论文
共 50 条
  • [21] An End-to-End Machine Learning System for Harmonic Analysis of Music
    Ni, Yizhao
    McVicar, Matt
    Santos-Rodriguez, Raul
    De Bie, Tijl
    IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2012, 20 (06): : 1771 - 1783
  • [22] Applying Machine Learning to End-to-end Slice SLA Decomposition
    Iannelli, Michael
    Rahman, Muntasir Raihan
    Choi, Nakjung
    Wang, Le
    PROCEEDINGS OF THE 2020 6TH IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2020): BRIDGING THE GAP BETWEEN AI AND NETWORK SOFTWARIZATION, 2020, : 92 - 99
  • [23] Analysis of the Effect of Sensors for End-to-End Machine Learning Odometry
    Rodriguez-Peral, Carlos Marquez
    Pena, Dexmont
    COMPUTER VISION - ECCV 2018 WORKSHOPS, PT VI, 2019, 11134 : 82 - 95
  • [24] End-to-End Synthesis of Dynamically Controlled Machine Learning Accelerators
    Curzel, Serena
    Agostini, Nicolas Bohm
    Castellana, Vito Giovanni
    Minutoli, Marco
    Limaye, Ankur
    Manzano, Joseph
    Zhang, Jeff
    Brooks, David
    Wei, Gu-Yeon
    Ferrandi, Fabrizio
    Tumeo, Antonino
    IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (12) : 3074 - 3087
  • [25] S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance
    Suen, Chun Hui
    Ko, Ryan K. L.
    Tan, Yu Shyang
    Jagadpramana, Peter
    Lee, Bu Sung
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 594 - 602
  • [26] End-to-End Learning from Noisy Crowd to Supervised Machine Learning Models
    Younesian, Taraneh
    Hong, Chi
    Ghiassi, Amirmasoud
    Birke, Robert
    Chen, Lydia Y.
    2020 IEEE SECOND INTERNATIONAL CONFERENCE ON COGNITIVE MACHINE INTELLIGENCE (COGMI 2020), 2020, : 17 - 26
  • [27] Tracking Counterfeit Cryptocurrency End-to-end
    Gao, Bingyu
    Wang, Haoyu
    Xia, Pengcheng
    Wu, Siwei
    Zhou, Yajin
    Luo, Xiapu
    Tyson, Gareth
    PROCEEDINGS OF THE ACM ON MEASUREMENT AND ANALYSIS OF COMPUTING SYSTEMS, 2020, 4 (03)
  • [28] DLBooster: Boosting End-to-End Deep Learning Workflows with Offloading Data Preprocessing Pipelines
    Cheng, Yang
    Li, Dan
    Guo, Zhiyuan
    Jiang, Binyao
    Lin, Jiaxin
    Fan, Xi
    Geng, Jinkun
    Yu, Xinyi
    Bai, Wei
    Qu, Lei
    Shu, Ran
    Cheng, Peng
    Xiong, Yongqiang
    Wu, Jianping
    PROCEEDINGS OF THE 48TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING (ICPP 2019), 2019,
  • [29] A Comparison of End-to-End Decision Forest Inference Pipelines
    Guan, Hong
    Masood, Saif
    Dwarampudi, Mahidhar
    Gunda, Venkatesh
    Min, Hong
    Yu, Lei
    Nag, Soham
    Zou, Jia
    PROCEEDINGS OF THE 2023 ACM SYMPOSIUM ON CLOUD COMPUTING, SOCC 2023, 2023, : 200 - 215
  • [30] End-to-End Machine Learning Solution for Recognizing Handwritten Arabic Documents
    Shtaiwi, Reem E.
    Abandah, Gheith A.
    Sawalhah, Safaa A.
    2022 13TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2022, : 180 - 185