var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fbibbase.org%2Fnetwork%2Ffiles%2FaF4SWnfuDHswrcTyD&noBootstrap=1&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fbibbase.org%2Fnetwork%2Ffiles%2FaF4SWnfuDHswrcTyD&noBootstrap=1&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fbibbase.org%2Fnetwork%2Ffiles%2FaF4SWnfuDHswrcTyD&noBootstrap=1&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2023\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Provenance-based Explanations for Machine Learning (ML) Models.\n \n \n \n\n\n \n Turnau, J.; Akwari, N.; Lee, S.; and Rajput, D.\n\n\n \n\n\n\n In 2023 IEEE 39th International Conference on Data Engineering Workshops (ICDEW), pages 40–43, 2023. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{turnau2023provenance,\n  title={Provenance-based Explanations for Machine Learning (ML) Models},\n  author={Turnau, Justin and Akwari, Nkechi and Lee, Seokki and Rajput, Dwarkesh},\n  booktitle={2023 IEEE 39th International Conference on Data Engineering Workshops (ICDEW)},\n  pages={40--43},\n  year={2023},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Efficient sampling for big provenance.\n \n \n \n\n\n \n Moshtaghi Largani, S.; and Lee, S.\n\n\n \n\n\n\n In Companion Proceedings of the ACM Web Conference 2023, pages 1508–1511, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{moshtaghi2023efficient,\n  title={Efficient sampling for big provenance},\n  author={Moshtaghi Largani, Sara and Lee, Seokki},\n  booktitle={Companion Proceedings of the ACM Web Conference 2023},\n  pages={1508--1511},\n  year={2023}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Hybrid Query and Instance Explanations and Repairs.\n \n \n \n\n\n \n Lee, S.; Glavic, B.; Chapman, A.; and Ludäscher, B.\n\n\n \n\n\n\n In Companion Proceedings of the ACM Web Conference 2023, pages 1559–1562, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{lee2023hybrid,\n  title={Hybrid Query and Instance Explanations and Repairs},\n  author={Lee, Seokki and Glavic, Boris and Chapman, Adriane and Lud{\\"a}scher, Bertram},\n  booktitle={Companion Proceedings of the ACM Web Conference 2023},\n  pages={1559--1562},\n  year={2023}\n}\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Measuring information gain using provenance.\n \n \n \n\n\n \n Rawat, S.; Lee, S.; and Jung, T.\n\n\n \n\n\n\n In Proceedings of the 14th International Workshop on the Theory and Practice of Provenance, pages 1–4, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{rawat2022measuring,\n  title={Measuring information gain using provenance},\n  author={Rawat, Shemon and Lee, Seokki and Jung, Taeho},\n  booktitle={Proceedings of the 14th International Workshop on the Theory and Practice of Provenance},\n  pages={1--4},\n  year={2022}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Using provenance to evaluate risk and benefit of data sharing.\n \n \n \n\n\n \n Jung, T.; Lee, S.; and Tang, W.\n\n\n \n\n\n\n In 13th International Workshop on Theory and Practice of Provenance (TaPP 2021), 2021. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{jung2021using,\n  title={Using provenance to evaluate risk and benefit of data sharing},\n  author={Jung, Taeho and Lee, Seokki and Tang, Wenyi},\n  booktitle={13th International Workshop on Theory and Practice of Provenance (TaPP 2021)},\n  year={2021}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n To not miss the forest for the trees-A holistic approach for explaining missing answers over nested data.\n \n \n \n\n\n \n Diestelkämper, R.; Lee, S.; Herschel, M.; and Glavic, B.\n\n\n \n\n\n\n In Proceedings of the 2021 International Conference on Management of Data, pages 405–417, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{diestelkamper2021not,\n  title={To not miss the forest for the trees-A holistic approach for explaining missing answers over nested data},\n  author={Diestelk{\\"a}mper, Ralf and Lee, Seokki and Herschel, Melanie and Glavic, Boris},\n  booktitle={Proceedings of the 2021 International Conference on Management of Data},\n  pages={405--417},\n  year={2021}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Debugging missing answers for spark queries over nested data with breadcrumb.\n \n \n \n\n\n \n Diestelkämper, R.; Lee, S.; Glavic, B.; and Herschel, M.\n\n\n \n\n\n\n Proceedings of the VLDB Endowment, 14(12): 2731–2734. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{diestelkamper2021debugging,\n  title={Debugging missing answers for spark queries over nested data with breadcrumb},\n  author={Diestelk{\\"a}mper, Ralf and Lee, Seokki and Glavic, Boris and Herschel, Melanie},\n  journal={Proceedings of the VLDB Endowment},\n  volume={14},\n  number={12},\n  pages={2731--2734},\n  year={2021},\n  publisher={VLDB Endowment}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Approximate summaries for why and why-not provenance (extended version).\n \n \n \n\n\n \n Lee, S.; Ludäscher, B.; and Glavic, B.\n\n\n \n\n\n\n arXiv preprint arXiv:2002.00084. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{lee2020approximate,\n  title={Approximate summaries for why and why-not provenance (extended version)},\n  author={Lee, Seokki and Lud{\\"a}scher, Bertram and Glavic, Boris},\n  journal={arXiv preprint arXiv:2002.00084},\n  year={2020}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Why and Why-Not Provenance for Queries with Negation.\n \n \n \n\n\n \n Lee, S.\n\n\n \n\n\n\n Ph.D. Thesis, Illinois Institute of Technology, 2020.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@phdthesis{lee2020and,\n  title={Why and Why-Not Provenance for Queries with Negation},\n  author={Lee, Seokki},\n  year={2020},\n  school={Illinois Institute of Technology}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Query-based why-not explanations for nested data.\n \n \n \n\n\n \n Diestelkämper, R.; Glavic, B.; Herschel, M.; and Lee, S.\n\n\n \n\n\n\n In 11th International Workshop on Theory and Practice of Provenance (TaPP 2019), 2019. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{diestelkamper2019query,\n  title={Query-based why-not explanations for nested data},\n  author={Diestelk{\\"a}mper, Ralf and Glavic, Boris and Herschel, Melanie and Lee, Seokki},\n  booktitle={11th International Workshop on Theory and Practice of Provenance (TaPP 2019)},\n  year={2019}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n PUG: a framework and practical implementation for why and why-not provenance.\n \n \n \n\n\n \n Lee, S.; Ludäscher, B.; and Glavic, B.\n\n\n \n\n\n\n The VLDB Journal, 28(1): 47–71. 2019.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{lee2019pug,\n  title={PUG: a framework and practical implementation for why and why-not provenance},\n  author={Lee, Seokki and Lud{\\"a}scher, Bertram and Glavic, Boris},\n  journal={The VLDB Journal},\n  volume={28},\n  number={1},\n  pages={47--71},\n  year={2019},\n  publisher={Springer Berlin Heidelberg Berlin/Heidelberg}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Provenance summaries for answers and non-answers.\n \n \n \n\n\n \n Lee, S.; Ludäscher, B.; and Glavic, B.\n\n\n \n\n\n\n Proceedings of the VLDB Endowment, 11(12): 1954–1957. 2018.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{lee2018provenance,\n  title={Provenance summaries for answers and non-answers},\n  author={Lee, Seokki and Lud{\\"a}scher, Bertram and Glavic, Boris},\n  journal={Proceedings of the VLDB Endowment},\n  volume={11},\n  number={12},\n  pages={1954--1957},\n  year={2018},\n  publisher={VLDB Endowment}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n PUG: a framework and practical implementation for why & why-not provenance (extended version).\n \n \n \n\n\n \n Lee, S.; Ludäscher, B.; and Glavic, B.\n\n\n \n\n\n\n arXiv preprint arXiv:1808.05752. 2018.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{lee2018pug,\n  title={PUG: a framework and practical implementation for why \\& why-not provenance (extended version)},\n  author={Lee, Seokki and Lud{\\"a}scher, Bertram and Glavic, Boris},\n  journal={arXiv preprint arXiv:1808.05752},\n  year={2018}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n GProM-a swiss army knife for your provenance needs.\n \n \n \n\n\n \n Arab, B. S.; Feng, S.; Glavic, B.; Lee, S.; Niu, X.; and Zeng, Q.\n\n\n \n\n\n\n A Quarterly bulletin of the Computer Society of the IEEE Technical Committee on Data Engineering, 41(1). 2018.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{arab2018gprom,\n  title={GProM-a swiss army knife for your provenance needs},\n  author={Arab, Bahareh Sadat and Feng, Su and Glavic, Boris and Lee, Seokki and Niu, Xing and Zeng, Qitian},\n  journal={A Quarterly bulletin of the Computer Society of the IEEE Technical Committee on Data Engineering},\n  volume={41},\n  number={1},\n  year={2018}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Adaptive schema databases.\n \n \n \n\n\n \n Spoth, W.; Arab, B. S.; Chan, E. S; Gawlick, D.; Ghoneimy, A.; Glavic, B.; Hammerschmidt, B.; Kennedy, O.; Lee, S.; Liu, Z. H.; and others\n\n\n \n\n\n\n In CIDR 2017, 8th Biennial Conference on Innovative Data Systems Research, Chaminade, CA, USA, January 8-11, 2017, Online Proceedings, 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{spoth2017adaptive,\n  title={Adaptive schema databases},\n  author={Spoth, William and Arab, Bahareh Sadat and Chan, Eric S and Gawlick, Dieter and Ghoneimy, Adel and Glavic, Boris and Hammerschmidt, Beda and Kennedy, Oliver and Lee, Seokki and Liu, Zhen Hua and others},\n  booktitle={CIDR 2017, 8th Biennial Conference on Innovative Data Systems Research, Chaminade, CA, USA, January 8-11, 2017, Online Proceedings},\n  year={2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Integrating approximate summarization with provenance capture.\n \n \n \n\n\n \n Lee, S.; Niu, X.; Ludäscher, B.; and Glavic, B.\n\n\n \n\n\n\n In 9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017), 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{lee2017integrating,\n  title={Integrating approximate summarization with provenance capture},\n  author={Lee, Seokki and Niu, Xing and Lud{\\"a}scher, Bertram and Glavic, Boris},\n  booktitle={9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017)},\n  year={2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A SQL-middleware unifying why and why-not provenance for first-order queries.\n \n \n \n\n\n \n Lee, S.; Köhler, S.; Ludäscher, B.; and Glavic, B.\n\n\n \n\n\n\n In 2017 IEEE 33rd International Conference on Data Engineering (ICDE), pages 485–496, 2017. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{lee2017sql,\n  title={A SQL-middleware unifying why and why-not provenance for first-order queries},\n  author={Lee, Seokki and K{\\"o}hler, Sven and Lud{\\"a}scher, Bertram and Glavic, Boris},\n  booktitle={2017 IEEE 33rd International Conference on Data Engineering (ICDE)},\n  pages={485--496},\n  year={2017},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Efficiently computing provenance graphs for queries with negation.\n \n \n \n\n\n \n Lee, S.; Koehler, S.; Ludäscher, B.; and Glavic, B.\n\n\n \n\n\n\n arXiv preprint arXiv:1701.05699. 2017.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{lee2017efficiently,\n  title={Efficiently computing provenance graphs for queries with negation},\n  author={Lee, Seokki and Koehler, Sven and Lud{\\"a}scher, Bertram and Glavic, Boris},\n  journal={arXiv preprint arXiv:1701.05699},\n  year={2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Debugging transactions and tracking their provenance with reenactment.\n \n \n \n\n\n \n Niu, X.; Arab, B. S.; Lee, S.; Feng, S.; Zou, X.; Gawlick, D.; Krishnaswamy, V.; Liu, Z. H.; and Glavic, B.\n\n\n \n\n\n\n arXiv preprint arXiv:1707.09930. 2017.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{niu2017debugging,\n  title={Debugging transactions and tracking their provenance with reenactment},\n  author={Niu, Xing and Arab, Bahareh Sadat and Lee, Seokki and Feng, Su and Zou, Xun and Gawlick, Dieter and Krishnaswamy, Vasudha and Liu, Zhen Hua and Glavic, Boris},\n  journal={arXiv preprint arXiv:1707.09930},\n  year={2017}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Implementing Unified Why-and Why-Not Provenance Through Games.\n \n \n \n\n\n \n Lee, S.; Köhler, S.; Ludäscher, B.; and Glavic, B.\n\n\n \n\n\n\n In Provenance and Annotation of Data and Processes: 6th International Provenance and Annotation Workshop, IPAW 2016, McLean, VA, USA, June 7-8, 2016, Proceedings 6, pages 209–213, 2016. Springer International Publishing\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{lee2016implementing,\n  title={Implementing Unified Why-and Why-Not Provenance Through Games},\n  author={Lee, Seokki and K{\\"o}hler, Sven and Lud{\\"a}scher, Bertram and Glavic, Boris},\n  booktitle={Provenance and Annotation of Data and Processes: 6th International Provenance and Annotation Workshop, IPAW 2016, McLean, VA, USA, June 7-8, 2016, Proceedings 6},\n  pages={209--213},\n  year={2016},\n  organization={Springer International Publishing}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Automatic generation and ranking of explanations for mapping errors.\n \n \n \n\n\n \n Lee, S.; Wang, Z.; Glavic, B.; and Miller, R. J\n\n\n \n\n\n\n Technical Report Technical report, Illinois Institute of Technology, 2015.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@techreport{lee2015automatic,\n  title={Automatic generation and ranking of explanations for mapping errors},\n  author={Lee, Seokki and Wang, Zhen and Glavic, Boris and Miller, Ren{\\'e}e J},\n  year={2015},\n  institution={Technical report, Illinois Institute of Technology}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An efficient implementation of game provenance in DBMS.\n \n \n \n\n\n \n Lee, S.; Tang, Y.; Köhler, S.; Ludäscher, B.; and Glavic, B.\n\n\n \n\n\n\n Technical Report Technical Report IIT/CS-DB-2015-02, Illinois Institute of Technology, 2015.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@techreport{lee2015efficient,\n  title={An efficient implementation of game provenance in DBMS},\n  author={Lee, Seokki and Tang, Yuchen and K{\\"o}hler, Sven and Lud{\\"a}scher, Bertram and Glavic, Boris},\n  year={2015},\n  institution={Technical Report IIT/CS-DB-2015-02, Illinois Institute of Technology}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);