Enabling the Verification of Computational Results An Empirical Evaluation of Computational Reproducibility

被引:11
|
作者
Stodden, Victoria [1 ]
Krafczyk, Matthew S. [1 ]
Bhaskar, Adhithya [1 ]
机构
[1] Univ Illinois, Champaign, IL 61820 USA
关键词
reproducible research; data access; code access; workflows; provenance; reproducibility policy; REPEATABILITY;
D O I
10.1145/3214239.3214242
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The ability to independently regenerate published computational claims is widely recognized as a key component of scientific reproducibility. In this article we take a narrow interpretation of this goal, and attempt to regenerate published claims from author-supplied information, including data, code, inputs, and other provided specifications, on a different computational system than that used by the original authors. We are motivated by Claerbout and Donoho's exhortation of the importance of providing complete information for reproducibility of the published claim. We chose the Elsevier journal, the Journal of Computational Physics, which has stated author guidelines that encourage the availability of computational digital artifacts that support scholarly findings. In an IRB approved study at the University of Illinois at Urbana-Champaign (IRB #17329) we gathered artifacts from a sample of authors who published in this journal in 2016 and 2017. We then used the ICERM criteria generated at the 2012 ICERM workshop "Reproducibility in Computational and Experimental Mathematics" to evaluate the sufficiency of the information provided in the publications and the ease with which the digital artifacts afforded computational reproducibility. We find that, for the articles for which we obtained computational artifacts, we could not easily regenerate the findings for 67% of them, and we were unable to easily regenerate all the findings for any of the articles. We then evaluated the artifacts we did obtain (55 of 306 articles) and find that the main barriers to computational reproducibility are inadequate documentation of code, data, and workflow information (70.9%), missing code function and setting information, and missing licensing information (75%). We recommend improvements based on these findings, including the deposit of supporting digital artifacts for reproducibility as a condition of publication, and verification of computational findings via re-execution of the code when possible.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Preparing Code and Data for Computational Reproducibility
    Fei, Xu
    2019 ACM/IEEE JOINT CONFERENCE ON DIGITAL LIBRARIES (JCDL 2019), 2019, : 449 - 450
  • [32] Reproducibility in Computational Neuroscience Models and Simulations
    McDougal, Robert A.
    Bulanova, Anna S.
    Lytton, William W.
    IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, 2016, 63 (10) : 2021 - 2035
  • [33] Improving Reproducibility of Distributed Computational Experiments
    Quan Pham
    Malik, Tanu
    Dai Hai Ton That
    Youngdahl, Andrew
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON PRACTICAL REPRODUCIBLE EVALUATION OF COMPUTER SYSTEMS (P-RECS'18), 2018,
  • [34] Reproducibility, verifiability, and computational historical research
    Toby Burrows
    International Journal of Digital Humanities, 2023, 5 (2-3) : 283 - 298
  • [35] The critical need to foster computational reproducibility
    Reinecke, Robert
    Trautmann, Tim
    Wagener, Thorsten
    Schueler, Katja
    ENVIRONMENTAL RESEARCH LETTERS, 2022, 17 (04):
  • [36] Hidden verification for computational mathematics
    Gottliebsen, H
    Kelsey, T
    Martin, U
    JOURNAL OF SYMBOLIC COMPUTATION, 2005, 39 (05) : 539 - 567
  • [38] On Computational Tractability for Rational Verification
    Gutierrez, Julian
    Najib, Muhammad
    Perelli, Giuseppe
    Wooldridge, Michael
    PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 329 - 335
  • [39] Computational verification of system architectures
    Zaidi, Abbas K.
    Levis, Alexander H.
    2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN SECURITY AND DEFENSE APPLICATIONS, 2007, : 42 - +
  • [40] Substructural verification and computational feasibility
    Leivant, D
    FOUNDATIONS OF INFORMATION TECHNOLOGY IN THE ERA OF NETWORK AND MOBILE COMPUTING, 2002, 96 : 498 - 510