Exploiting execution provenance to explain difference between two data-intensive computations | IEEE Conference Publication | IEEE Xplore