A Tool for Tracking Provenance and Reproducibility of Big Data Experiments

Total Page:16

File Type:pdf, Size:1020Kb

A Tool for Tracking Provenance and Reproducibility of Big Data Experiments PROB: A tool for Tracking Provenance and Reproducibility of Big Data Experiments. Vlad Korolev Anupam Joshi University of Maryland, Baltimore County University of Maryland, Baltimore County Baltimore, MD, USA Baltimore, MD, USA [email protected] [email protected] Abstract In this work, we propose a tool that aids tracking of the provenance and the ability to achieve reproducibility Reproducibility of computations and data prove- of experiments that involve big data workflows. The nance are very important goals to achieve in order to development of this tool is still ongoing, therefore, the improve the quality of one’s research. Unfortunately, code is not available to the public yet. despite some efforts made in the past, it is still very hard to reproduce computational experiments with high de- gree of certainty. The Big Data phenomenon in recent 2. Background years makes this goal even harder to achieve. In this work, we propose a tool that aids researchers to improve Most of the scientific data analysis workflows have reproducibility of their experiments through automated very similar structure. Especially big-data workflows keeping of provenance records. that are based on Map-Reduce model[4]. A typical six step big-data scientific pipeline is shown on Figure 1. At step 1, the data is collected by observing some phe- 1. Introduction nomenon or performing a study of some population of the subjects. For big-data workflows, this is usually done by a third party. In the case of Gene Wide Association Reproducibility and provenance tracking is an on- Studies (GWAS) in United States, the National Center going concern in the scientific community. Historically for Biotechnology Information (NCBI) [5] would be computational sciences were particularly bad about dis- conducting the work. closing the actual data and code used to obtain published results. To quote David Donoho “Computing results are At step 2, the data is transferred to the researcher now being presented in a very loose, “breezy” way – in who considers it as raw data. For many domains espe- journal articles, in conferences, and in books. All too cially the ones related to medicine or biology, where often one simply takes computations at face value. [1].” the privacy of subjects is of very high importance, re- With the recent increase of collaboration between searchers must follow specific protocols before the data computational and biological scientific communities, it is released. Often most of the controlled distribution is especially important to demonstrate provenance of the datasets arrive encrypted and must be decrypted before- source and allow other researchers to reproduce experi- hand. Very often the agencies encrypt the dataset using ments described in the publications. In fact according to the tools not available for the operating systems that will [2] a major cause of low rate of collaboration between be used for the actual analysis of the data. This step is different research groups is attributed to difficulties in usually performed on a different machine. reproduction of experiments. Which consequently leads For big-data workflows, after the data is decrypted to the poor quality of research. Conversely it has been and converted it must be loaded onto the distributed argued that allowing for easier reproducibility of the computation cluster that will be used for actual analysis. experiments leads to the higher quality of research [3]. Such transfer happens at step 3. To address this problem we must strive for higher At step 4, the actual analysis takes place. During degree of reproducibility. Which is impossible without this step the researcher uses some software that reads the thorough tracking of the provenance of original data and input data and outputs some results. Besides the input all manipulations done to it. data, the researcher can supply different parameters to the software which will tune the course of the analysis. Hamake[9] and Taverna[10] has been around for sev- The result of this step is a derived data that was obtained eral years and were used in a variety of research projects. as a result of the performed analysis. This step is usually These systems allow the researcher to setup and exe- performed repeatedly, while the researcher fine-tunes the cute analytic workflows. All of these tools represent a parameters given to the analytic software. The software workflow as a directed acyclic graph (DAG) where the itself could be changed either by the researcher or a third nodes are either data files, parameters or preprocessing party vendor. Also, this step could consist of multiple and analysis routines. The edges connect the inputs of sub-steps where the output of one sub-step is supplied these routines to the datasets, parameters or the outputs as an input or a parameter to the subsequent sub-step. of another step. Usually these tools are more domain After the researcher have obtained the desired result oriented than traditional programming languages, thus in step 4, step 5 is performed. In this step, the data is making a job of the researcher much easier. extracted out of a distributed cluster and then visualized Software developers have been using version con- and described to produce a publication. trol systems (VCS) for considerable time [11]. Among At the final step, the derived data and/or publication the modern VCS tools there is a growing trend towards is placed into publicly accessible storage where it could distributed version control systems DVCS which do not serve as raw data for a different research. rely on a central server. The emergence of cloud based web services such as GitHub and BitBucket has led to the explosive popularity of DVCS tools. Subjects / Phenomena Expressing and recording provenance information has been a known problem. There were several attempts 1 Collection to address it such as [12]. Recently W3C has introduced Raw Data a new standard PROV[13] for tracking provenance of P the artifact. A notable tool Git2Prov[14] was developed r 2 Transfer /Preprocess to convert metadata stored in GIT version control system o v into the PROV format. Preprocessed Data e Unfortunately, we believe that none of the tools men- n a tioned above provide functionality that is comprehensive 3 Data Load n enough to track provenance and provide reproducibil- c Data loaded e ity of big-data map-reduce workflows. Such workflows onto cluster file system have their own challenges. They must run on Hadoop type distributed clusters. Whereas most of the scientific 4 Analysis / Workflows T r workflow tools mentioned above, with the exception of Derived Data a Kangaroo and Hamake, are designed to be used on a c single workstation. Also most of the tools above do not k 5 Visualize / Describe i provide the means to store and reconstruct inputs and ex- n act workflow steps. The tools that do either rely on VCS g Publications systems to store the artifacts or in case of VisTrails they assume that entire experiment including all code and 6 Distribute data files could be packaged and given to a third party. Such approach would not work with strictly controlled Distributed / Shared Data datasets that have strict distribution policies. Even for publicly available datasets such approach is not feasible. For example, GoogleBooks dataset is 2.2TB. Including a copy of such large datasets in every workflow archive will make regular exchange of the workflows infeasi- Figure 1. Typical scientific big data workflow. ble. Storing such large datasets directly in the VCS also does not work. In addition to poor performance and inefficiency of these tools with very large files, most of 3. Prior work these tools limit the maximum object size well below the file size found such datasets. Moreover, a typical map- Scientific workflow systems are widely used to reduce file systems such as HDFS, do not implement full represent and execute computation experiments. Sys- POSIX call interface, so it is not possible to use standard tems such as Kangaroo[6], VisTrails[7], NiPype[8], VCS with such file-system. Recently a new tool called Git-Annex[15] was de- provenance information. In addition to its own ontology, veloped to address some problems of storing large files the PROB tool uses several existing ontologies discussed in git repositories and allow for controlled transfers of earlier. To represent basic provenance assertions such as restricted datasets. This tool uses a storage format sim- authorship and artifacts, we use PROV W3C standard. ilar to git, but it keeps the large object store separately The Git2Prov ontology is used to represent information from the regular git-object store. The storage format of contained in Git version control system. The NiPype git-annex has been modified to allow handling of very ontology is used to express facts about data analysis large files on the order of multiple terabytes. However workflows and the execution environments. the git-annex tools still maintains full metadata related At present the PROB tool is geared towards work- to the large files in the main git repository so git still flows written in PIG language which are intended to run can record all manipulations done to these large files as Hadoop Map-Reduce clusters. The tool could be used to well as maintain the integrity of the repository through support the pipelines such as the one depicted on figure 1. the use of checksums. This is achieved by git-annex While the steps 2 through 4 of the pipeline are being exe- checking-in the links to the hashes of the large files into cuted the tool makes the record of all produced artifacts the git repository. Such scheme also allows research as well as exact operations that were performed on the groups at different organizations to share the code used data objects.
Recommended publications
  • V2.0.0-Beta.1
    Liquidprompt Mark Vander Stel Dec 09, 2020 CONTENTS: 1 Installation 3 1.1 Packages.................................................3 1.2 Download.................................................5 1.3 Dependencies...............................................5 1.4 Test Drive.................................................6 1.5 Shell Installation.............................................6 2 Config Options 7 2.1 General..................................................8 2.2 Features..................................................8 2.3 Thresholds................................................ 12 2.4 Marks................................................... 12 2.5 Colors.................................................. 14 3 Theming 19 3.1 Default Theme.............................................. 19 3.2 Included Themes............................................. 22 3.3 Custom Themes............................................. 28 3.4 Switching Themes............................................ 30 4 Functions 31 4.1 Public Functions............................................. 31 4.2 Data Functions.............................................. 33 4.3 Default Theme Functions........................................ 46 4.4 Utility Functions............................................. 49 4.5 Internal Functions............................................ 50 5 Release Notes 55 5.1 Version 2.0 Release Notes........................................ 55 5.2 Version 1.12 Release Notes....................................... 57 6 Upgrading Liquidprompt
    [Show full text]
  • Citrix Gateway Service
    Citrix Gateway Service Citrix Product Documentation | docs.citrix.com September 28, 2021 Citrix Gateway Service Contents Release Notes 3 Get started with Citrix Gateway service 14 Technical Security Overview 15 Migrate Citrix Gateway to Citrix Gateway service for HDX Proxy 18 HDX Adaptive transport with EDT support for Citrix Gateway service 24 Support for Citrix Virtual Apps and Desktops 27 Route tables to resolve conflicts if the related domains in both SaaS and web apps are the same ‑ Tech Preview 29 Contextual access to Enterprise Web and SaaS applications – Tech Preview 33 Read‑only access for admins to SaaS and Web apps 37 Support for Software as a Service apps 41 Apps configuration using a template 52 SaaS app server specific configuration 59 Citrix Gateway Connector 73 Citrix Gateway Connector dashboard 96 Support for Enterprise web apps 97 Support for Citrix Endpoint Management 109 Citrix Cloud Gateway Connector availability in Azure Marketplace 113 Citrix Cloud Gateway Connector availability in Azure 118 Deploy a Citrix Gateway Connector instance on AWS ‑ Tech Preview 125 ADFS integration with Secure Workspace Access 131 FAQ 140 © 1999–2021 Citrix Systems, Inc. All rights reserved. 2 Citrix Gateway Service Release Notes August 24, 2021 The Citrix Gateway service release to cloud release notes describe the new features, enhancements to existing features, fixed issues, and known issues available in a service release. The release notes include one or more of the following sections: What’s new: The new features and enhancements available in the current release. Fixed issues: The issues that are fixed in the current release.
    [Show full text]
  • Kubuntu Desktop Guide
    Kubuntu Desktop Guide Ubuntu Documentation Project <[email protected]> Kubuntu Desktop Guide by Ubuntu Documentation Project <[email protected]> Copyright © 2004, 2005, 2006 Canonical Ltd. and members of the Ubuntu Documentation Project Abstract The Kubuntu Desktop Guide aims to explain to the reader how to configure and use the Kubuntu desktop. Credits and License The following Ubuntu Documentation Team authors maintain this document: • Venkat Raghavan The following people have also have contributed to this document: • Brian Burger • Naaman Campbell • Milo Casagrande • Matthew East • Korky Kathman • Francois LeBlanc • Ken Minardo • Robert Stoffers The Kubuntu Desktop Guide is based on the original work of: • Chua Wen Kiat • Tomas Zijdemans • Abdullah Ramazanoglu • Christoph Haas • Alexander Poslavsky • Enrico Zini • Johnathon Hornbeck • Nick Loeve • Kevin Muligan • Niel Tallim • Matt Galvin • Sean Wheller This document is made available under a dual license strategy that includes the GNU Free Documentation License (GFDL) and the Creative Commons ShareAlike 2.0 License (CC-BY-SA). You are free to modify, extend, and improve the Ubuntu documentation source code under the terms of these licenses. All derivative works must be released under either or both of these licenses. This documentation is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE AS DESCRIBED IN THE DISCLAIMER. Copies of these licenses are available in the appendices section of this book. Online versions can be found at the following URLs: • GNU Free Documentation License [http://www.gnu.org/copyleft/fdl.html] • Attribution-ShareAlike 2.0 [http://creativecommons.org/licenses/by-sa/2.0/] Disclaimer Every effort has been made to ensure that the information compiled in this publication is accurate and correct.
    [Show full text]
  • What Is Revision Control?  Why Should I Care?  Hints  Which Tool Should I Use?  Etckeeper  Git  Bazaar  Mercurial  Meld  What Next?  Urls, Wrap up and Q&A
    Revision Control for the Rest of Us * * SysAdmins, scripters and anyone who is not a full-time Real Programmer™ Updated: 2017-11-21 JP Vossen, CISSP bashcookbook.com http://www.jpsdomain.org/public/Revision_Control_for_the_Rest_of_Us.pdf http://www.jpsdomain.org/public/Revision_Control_for_the_Rest_of_Us.odp Agenda The “rest of us?” What is revision control? Why should I care? Hints Which tool should I use? etckeeper git Bazaar Mercurial Meld What next? URLs, Wrap up and Q&A The “rest of us?” Not all of us are “Real Programmers” working on large-scale, world-wide distributed teams Not everyone realizes how useful revision control is If you use a computer, you probably do something that revision control can help with If you are a system administrator or scripter, you should be using revision control If you are any kind of programmer, revision control should be like breathing, it's critical and I shouldn't have to tell you to do it What is revision control? A way to travel back in time to see what changed, and when, and who, and why Similar to Mac's Time Machine AKA “version control,” “source control,” “code management” and more https://en.wikipedia.org/wiki/Revision_control http://betterexplained.com/articles/a-visual-guide-to-version-control/ http://www.catb.org/esr/writings/version-control/version-control.html Why should I care? If you work on a development team, it's just required; but you already know that and aren't the audience for this. Have you ever changed something then wished you could undo the change? Have you ever forgotten why you changed something? (Or who changed it?) Would a new backup every time anything changed, detailing why it changed, and with the ability to compare (diff) the change ever be useful? Hints Most useful for plain text: code, wiki markup, configs /etc/ Not good for binaries: ODF, OOXML, ZIP, ISO, music, videos, etc.
    [Show full text]
  • Liquidprompt Documentation
    Liquidprompt Mark Vander Stel Jan 28, 2021 CONTENTS: 1 Installation 3 1.1 Packages.................................................3 1.2 Download.................................................5 1.3 Dependencies...............................................5 1.4 Test Drive.................................................6 1.5 Shell Installation.............................................6 2 Config Options 7 2.1 General..................................................8 2.2 Features..................................................9 2.3 Thresholds................................................ 13 2.4 Marks................................................... 13 2.5 Colors.................................................. 15 3 Theming 21 3.1 Default Theme.............................................. 21 3.2 Included Themes............................................. 24 3.3 Custom Themes............................................. 33 3.4 Switching Themes............................................ 35 4 Functions 37 4.1 Public Functions............................................. 37 4.2 Data Functions.............................................. 39 4.3 Default Theme Functions........................................ 53 4.4 Utility Functions............................................. 57 4.5 Internal Functions............................................ 58 5 Release Notes 63 5.1 Version 2.0 Release Notes........................................ 63 5.2 Version 1.12 Release Notes....................................... 65 6 Upgrading Liquidprompt
    [Show full text]
  • Game Architecture and Design: a New Edition
    00 3634_FM_Intro 9/30/03 10:14 AM Page i Game Architecture and Design: A New Edition Contents at a Glance I Game Design III Game Architecture 1 First Concept 3 16 Current Development Methods 433 2 Core Design 35 17 Initial Design 457 3 Gameplay 59 18 Use of Technology 511 4 Detailed Design 87 19 Building Blocks 553 5 Game Balance 105 20 Initial Architecture Design 607 6 Look and Feel 141 21 Development 637 7 Wrapping Up 171 22 The Run-Up to Release 687 8 The Future of Game Design 197 23 Postmortem 719 24 The Future of Game Development 747 II Team Building and Management 9 Current Methods of Team Management 227 IV Appendixes 10 Roles and Divisions 245 A Sample Game Design Documents 785 11 The Software Factory 263 B Bibliography and References 887 12 Milestones and Deadlines 293 Glossary 893 13 Procedures and “Process” 327 Index 897 14 Troubleshooting 367 15 The Future of the Industry 409 00 3634_FM_Intro 9/30/03 10:14 AM Page ii 00 3634_FM_Intro 9/30/03 10:14 AM Page iii Game Architecture and Design: A New Edition Andrew Rollings Dave Morris 800 East 96th Street, 3rd Floor, Indianapolis, Indiana 46240 An Imprint of Pearson Education Boston • Indianapolis • London • Munich • New York • San Francisco 00 3634_FM_Intro 9/30/03 10:14 AM Page iv Game Architecture and Design: A New Edition Publisher Stephanie Wall Copyright © 2004 by New Riders Publishing Production Manager All rights reserved. No part of this book shall be reproduced, Gina Kanouse stored in a retrieval system, or transmitted by any means— electronic, mechanical, photocopying, recording, or otherwise— Senior Project Editor without written permission from the publisher, except for the Kristy Hart inclusion of brief quotations in a review.
    [Show full text]
  • Ubuntu: Powerful Hacks and Customizations
    Hacks, tips, and tricks to Krawetz put your OS into overdrive ubuntu Whether it’s speed, glitz, sounds, or security, you want to get the most out of your Ubuntu Linux system. This book shows you how to do just that. You’ll fi nd out how to customize the user interface, implement networking tools, optimize video, and more. You’ll then be able to build on these hacks to further tune, tweak, and customize Ubuntu to meet all your needs. The basic Ubuntu system is good, but with a few modifi cations, it can be made great. This book is packed with techniques that will help you: • Choose the right options when installing Ubuntu onto a Netbook, server, or other system • Install fi les for interoperability and collaborate with non-Linux systems • Tune the operating system for optimal performance ® • Enhance your graphics to take them to the next level Powerful Hacks and Customizations Powerful • Navigate the desktop, manage windows, and multitask between applications • Check for vulnerabilities and prevent undesirable access • Learn tricks to safely opening up the system with external network services Neal Krawetz, PhD, is a computer security professional with experience in computer forensics, ® profi ling, cryptography and cryptanalysis, artifi cial intelligence, and software solutions. Dr. Krawetz’s company, Hacker Factor, specializes in uncommon forensic techniques and anti-anonymity technologies. He has confi gured Ubuntu on everything from personal workstations to mission-critical servers. ubuntu Visit our Web site at www.wiley.com/compbooks $39.99 US/$47.99 CAN Powerful Hacks and Customizations ISBN 978-0-470-58988-5 Neal Krawetz Operating Systems / Linux Ubuntu® Powerful Hacks and Customizations Dr.
    [Show full text]
  • The Bug That Cried Wolf
    The Bug That Cried Wolf Finding trends in statically checked bugs over time Edward Chen, Kevin Yu, Arvind Saripalli Motivation ● Static bug analysis bug tools are notorious for creating false positive results. False positives can deter developers from relying on these tools, reducing their effectiveness. ● To better understand the effectiveness of bugs found using static checkers, especially in large repository involving multiple contributors, we built a tool that tracks the inception and lifespan of bugs by combining existing static analysis tools with version control systems. ● We also did some exploration on the effectiveness of static analysis tools on large code bases such as the Mozilla Firefox code by comparing its results against documented bug fixes. Breezy Framework Breezy tracks bugs over time provided a repository and set of static bug checkers to run Breezy Framework Demo Video Breezy Framework What is a bug? What is a bug report? ● File ● Data structure to store list of bugs in a single commit ● Line of code (LOC) ● Bug reports are generated and saved for specified ● Code segment commit window ● Type of bug ● This can be the longest step in the process depending ● Description on repo size, num checkers used, etc. ● It took us ~2 hours to get single report on firefox with clang. Breezy Framework When is a bug born? ● In order to track bugs, we have to know when new ones pop up. ● Between two commits, new bugs show up in modified or added files. ● Bugs that are unique to the new commit that aren’t in the previous commit are considered to be new.
    [Show full text]
  • The Official Ubuntu Book, 7Th Edition.Pdf
    ptg8126969 Praise for Previous Editions of The Official Ubuntu Book “The Official Ubuntu Book is a great way to get you started with Ubuntu, giving you enough information to be productive without overloading you.” —John Stevenson, DZone book reviewer “OUB is one of the best books I’ve seen for beginners.” —Bill Blinn, TechByter Worldwide “This book is the perfect companion for users new to Linux and Ubuntu. It covers the basics in a concise and well-organized manner. General use is covered separately from troubleshooting and error-handling, making the book well-suited both for the beginner as well as the user that needs extended help.” —Thomas Petrucha, Austria Ubuntu User Group “I have recommended this book to several users who I instruct regularly on ptg8126969 the use of Ubuntu. All of them have been satisfied with their purchase and have even been able to use it to help them in their journey along the way.” —Chris Crisafulli, Ubuntu LoCo Council, Florida Local Community Team “This text demystifies a very powerful Linux operating system . In just a few weeks of having it, I’ve used it as a quick reference a half-dozen times, which saved me the time I would have spent scouring the Ubuntu forums online.” —Darren Frey, Member, Houston Local User Group This page intentionally left blank ptg8126969 The Official Ubuntu Book Seventh Edition ptg8126969 This page intentionally left blank ptg8126969 The Official Ubuntu Book Seventh Edition Matthew Helmke Amber Graner With Kyle Rankin, Benjamin Mako Hill, ptg8126969 and Jono Bacon Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks.
    [Show full text]
  • CVS, 2Nd Edition by Jennifer Vesperman
    Essential CVS, 2nd Edition By Jennifer Vesperman ............................................... Publisher: O'Reilly Pub Date: November 2006 Print ISBN-10: 0-596-52703-9 Print ISBN-13: 978-0-59-652703-7 Pages: 428 Table of Contents | Index This easy-to-follow reference shows a variety of professionals how to use the Concurrent Versions System (CVS), the open source tool that lets you manage versions of anything stored in files. Ideal for software developers tracking different versions of the same code, this new edition has been expanded to explain common usages of CVS for system administrators, project managers, software architects, user-interface (UI) specialists, graphic designers and others. Current for version 1.12, Essential CVS, 2nd Edition offers an overview of CVS, explains the core concepts, and describes the commands that most people use on a day-to-day basis. For those who need to get up to speed rapidly, the book's Quickstart Guide shows you how to build and use a basic CVS repository with the default settings and a minimum of extras. You'll also find: A full command reference that details all aspects of customizing CVS for automation, logging, branching, merging documents, and creating alerts Examples and descriptions of the most commonly used options for each command Why and when to tag or branch your project, tagging before releases, and using branching to create a bugfix version of a project Details on the systems used in CVS to permit multiple developers to work on the same project without loss of data An entire section devoted to document version management and project management includes ways to import and export projects, work with remote repositories, and shows how to fix things that can go wrong when using CVS.
    [Show full text]
  • Networking and Security with Linux
    Networking and Security with Linux by Steven Gordon School of Engineering and Technology CQUniversity Australia This book is available as: HTML: sandilands.info/nsl/ PDF: sandilands.info/nsl/nsl.pdf NSL 19.03 1 March 2019 (r1671) Contents List of Figures xi List of Tables xiii Glossary xv 1 Introduction1 1.1 Purpose of This Book.............................1 1.1.1 History.................................1 1.1.2 Audience................................2 1.1.3 This is NOT a Textbook.......................2 1.2 Using This Book...............................3 1.2.1 Organisation of the Chapters....................3 1.2.2 Following the Examples.......................3 1.2.3 Terminology and Notation......................4 1.2.4 Book Website and Formats......................4 1.2.5 Downloading Example Files.....................4 1.2.6 Other Books and Sources.......................4 1.3 Recognition..................................7 1.3.1 Acknowledgements..........................7 1.3.2 Apologies, Limitations and Reporting Bugs.............7 1.3.3 Licensing...............................8 2 Linux, Ubuntu and VirtualBox9 2.1 What is Ubuntu Linux?...........................9 2.1.1 Why Not Microsoft Windows?....................9 2.2 Installing Ubuntu Linux........................... 10 2.2.1 Ubuntu Variants........................... 10 2.2.2 Installation Approaches....................... 11 2.3 Virtualisation and VirtualBox........................ 12 3 Virtual Networking with Linux and VirtualBox 15 3.1 Virtual Networking and virtnet....................... 15 3.1.1 What is Virtual Networking?.................... 15 3.1.2 Motivation for virtnet........................ 15 3.1.3 How Does virtnet Work?....................... 17 3.1.4 virtnet Terminology.......................... 17 3.1.5 History of virtnet........................... 18 i ii CONTENTS 3.2 Getting Started................................ 19 3.2.1 General Requirements........................ 19 3.2.2 Installation.............................
    [Show full text]
  • Film Music and Film Genre
    Film Music and Film Genre Mark Brownrigg A thesis submitted for the degree of Doctor of Philosophy University of Stirling April 2003 FILM MUSIC AND FILM GENRE CONTENTS Page Abstract Acknowledgments 11 Chapter One: IntroductionIntroduction, Literature Review and Methodology 1 LiteratureFilm Review Music and Genre 3 MethodologyGenre and Film Music 15 10 Chapter Two: Film Music: Form and Function TheIntroduction Link with Romanticism 22 24 The Silent Film and Beyond 26 FilmTheConclusion Function Music of Film Form Music 3733 29 Chapter Three: IntroductionFilm Music and Film Genre 38 FilmProblems and of Genre Classification Theory 4341 FilmAltman Music and Genre and GenreTheory 4945 ConclusionOpening Titles and Generic Location 61 52 Chapter Four: IntroductionMusic and the Western 62 The Western and American Identity: the Influence of Aaron Copland 63 Folk Music, Religious Music and Popular Song 66 The SingingWest Cowboy, the Guitar and other Instruments 73 Evocative of the "Indian""Westering" Music 7977 CavalryNative and American Civil War WesternsMusic 84 86 PastoralDown andMexico Family Westerns Way 89 90 Chapter Four contd.: The Spaghetti Western 95 "Revisionist" Westerns 99 The "Post - Western" 103 "Modern-Day" Westerns 107 Impact on Films in other Genres 110 Conclusion 111 Chapter Five: Music and the Horror Film Introduction 112 Tonality/Atonality 115 An Assault on Pitch 118 Regular Use of Discord 119 Fragmentation 121 Chromaticism 122 The A voidance of Melody 123 Tessitura in extremis and Unorthodox Playing Techniques 124 Pedal Point
    [Show full text]