{"id":"https://openalex.org/W7125192848","doi":"https://doi.org/10.48550/arxiv.2601.12811","title":"Docker Does Not Guarantee Reproducibility","display_name":"Docker Does Not Guarantee Reproducibility","publication_year":2026,"publication_date":"2026-01-19","ids":{"openalex":"https://openalex.org/W7125192848","doi":"https://doi.org/10.48550/arxiv.2601.12811"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.12811","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.12811","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.12811","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121539880","display_name":"Julien Malka","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Malka, Julien","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123503157","display_name":"Stefano Zacchiroli","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zacchiroli, Stefano","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5123469839","display_name":"Th\u00e9o Zimmermann","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zimmermann, Th\u00e9o","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5121539880"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.738099992275238,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.738099992275238,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.0778999999165535,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.03009999915957451,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reproducibility","display_name":"Reproducibility","score":0.7554000020027161},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.6959999799728394},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.6455000042915344},{"id":"https://openalex.org/keywords/best-practice","display_name":"Best practice","score":0.5748000144958496},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.3434000015258789}],"concepts":[{"id":"https://openalex.org/C9893847","wikidata":"https://www.wikidata.org/wiki/Q1425625","display_name":"Reproducibility","level":2,"score":0.7554000020027161},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.6959999799728394},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.6455000042915344},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6198999881744385},{"id":"https://openalex.org/C184356942","wikidata":"https://www.wikidata.org/wiki/Q830382","display_name":"Best practice","level":2,"score":0.5748000144958496},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4796999990940094},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.3434000015258789},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.335099995136261},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.303600013256073},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.2978000044822693},{"id":"https://openalex.org/C2781018962","wikidata":"https://www.wikidata.org/wiki/Q5164884","display_name":"Container (type theory)","level":2,"score":0.2939999997615814}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.12811","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.12811","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.12811","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.12811","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"reproducibility":[1,61,103,148],"of":[2,19,66,124,149,156],"software":[3,11,23,39],"environments":[4,40],"is":[5,50,97],"a":[6,57,89,120],"critical":[7],"concern":[8],"in":[9,53,62,71,99,161],"modern":[10],"engineering,":[12],"with":[13,140],"ramifications":[14],"ranging":[15],"from":[16,129],"the":[17,54,64,138,146,154,157,162],"effectiveness":[18,155],"collaboration":[20],"workflows":[21],"to":[22,93,105],"supply":[24],"chain":[25],"security":[26],"and":[27,69,104,136,152],"scientific":[28,100],"reproducibility.":[29],"Containerization":[30],"technologies":[31],"like":[32],"Docker":[33,49,96,126,150],"address":[34,79],"this":[35,76,80],"problem":[36],"by":[37],"encapsulating":[38],"into":[41],"shareable":[42],"filesystem":[43],"snapshots":[44],"known":[45],"as":[46,56],"images.":[47],"While":[48],"frequently":[51],"cited":[52],"literature":[55,91],"tool":[58],"that":[59],"enables":[60],"theory,":[63],"extent":[65],"its":[67],"guarantees":[68],"limitations":[70],"practice":[72],"remains":[73],"under-explored.":[74],"In":[75],"work,":[77],"we":[78,87,118,144],"gap":[81],"through":[82],"two":[83],"complementary":[84],"approaches.":[85],"First,":[86],"conduct":[88],"systematic":[90],"review":[92],"examine":[94],"how":[95],"framed":[98],"discourse":[101],"on":[102],"identify":[106],"documented":[107],"best":[108,158],"practices":[109,159],"for":[110],"writing":[111],"Dockerfiles":[112],"enabling":[113],"reproducible":[114],"image":[115],"building.":[116],"Then,":[117],"perform":[119],"large-scale":[121],"empirical":[122],"study":[123],"5298":[125],"builds":[127],"collected":[128],"GitHub":[130],"workflows.":[131],"By":[132],"rebuilding":[133],"these":[134],"images":[135,151],"comparing":[137],"results":[139],"their":[141],"historical":[142],"counterparts,":[143],"assess":[145],"real":[147],"evaluate":[153],"identified":[160],"literature.":[163]},"counts_by_year":[],"updated_date":"2026-01-22T23:33:04.759266","created_date":"2026-01-22T00:00:00"}
