{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:14:45Z","timestamp":1759335285203,"version":"3.37.3"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2124606"],"award-info":[{"award-number":["2124606"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s00766-021-00366-0","type":"journal-article","created":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:03:13Z","timestamp":1641600193000},"page":"161-182","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A multi-level semantic web for hard-to-specify domain concept, Pedestrian, in ML-based software"],"prefix":"10.1007","volume":"27","author":[{"given":"Hamed","family":"Barzamini","sequence":"first","affiliation":[]},{"given":"Murtuza","family":"Shahzad","sequence":"additional","affiliation":[]},{"given":"Hamed","family":"Alhoori","sequence":"additional","affiliation":[]},{"given":"Mona","family":"Rahimi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,8]]},"reference":[{"key":"366_CR1","unstructured":"Arthur D, Vassilvitskii S (2006) k-means++: the advantages of careful seeding. Technical report, Stanford"},{"key":"366_CR2","unstructured":"Ashmore R, Calinescu R, Paterson C (2019) Assuring the machine learning lifecycle: desiderata, methods, and challenges. arXiv:1905.04223"},{"key":"366_CR3","unstructured":"Banks A, Ashmore R (2019) Requirements assurance in machine learning. In: Workshop on artificial intelligence safety 2019 co-located with the thirty-third AAAI conference on artificial intelligence 2019 (AAAI-19)"},{"issue":"Jan","key":"366_CR4","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei DM, Ng AY, Jordan MI (2003) Latent Dirichlet allocation. J Mach Learn Res 3(Jan):993\u20131022","journal-title":"J Mach Learn Res"},{"key":"366_CR5","unstructured":"Bond F, Foster R (2013) Linking and extending an open multilingual wordnet. In: Proceedings of the 51st annual meeting of the association for computational linguistics, vol 1. Long Papers, pp 1352\u20131362"},{"key":"366_CR6","unstructured":"Bossche MV, Ross P, MacLarty I, Van\u00a0Nuffelen B, Pelov N (2007) Ontology driven software engineering for real life applications. In: Proceedings of the 3rd international workshop on semantic web enabled software engineering. Citeseer"},{"key":"366_CR7","doi-asserted-by":"crossref","unstructured":"Hu BC, Salay R, Czarnecki K, Rahimi M, Selim G, Chechik M (2020) Towards requirements specification for machine-learned perception based on human performance. In: Proceedings of the 25th international conference on requirements engineering. IEEE, Proceedings","DOI":"10.1109\/AIRE51212.2020.00014"},{"issue":"8","key":"366_CR8","doi-asserted-by":"publisher","first-page":"1844","DOI":"10.1109\/TPAMI.2019.2897684","volume":"41","author":"M Braun","year":"2019","unstructured":"Braun M, Krebs S, Flohr F, Gavrila D (2019) EuroCity persons: a novel benchmark for person detection in traffic scenes. IEEE Trans Pattern Anal Mach Intell 41(8):1844\u20131861","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"366_CR9","doi-asserted-by":"crossref","unstructured":"Burton S, Gauerhof L, Heinzemann C (2017) Making the case for safety of machine learning in highly automated driving. In: international conference on computer safety, reliability, and security. Springer, pp 5\u201316","DOI":"10.1007\/978-3-319-66284-8_1"},{"key":"366_CR10","doi-asserted-by":"crossref","unstructured":"Burton S, Gauerhof L, Sethy BB, Habli I, Hawkins R (2019) Confidence arguments for evidence of performance in machine learning for highly automated driving functions. In: International conference on computer safety, reliability, and security. Springer, pp 365\u2013377","DOI":"10.1007\/978-3-030-26250-1_30"},{"issue":"3","key":"366_CR11","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MS.2015.67","volume":"32","author":"J Cleland-Huang","year":"2015","unstructured":"Cleland-Huang J (2015) Mining domain knowledge [requirements]. IEEE Softw 32(3):16\u201319","journal-title":"IEEE Softw"},{"issue":"4","key":"366_CR12","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s00766-015-0222-6","volume":"21","author":"D Dermeval","year":"2016","unstructured":"Dermeval D, Vilela J, Bittencourt II, Castro J, Isotani S, Brito P, Silva A (2016) Applications of ontologies in requirements engineering: a systematic review of the literature. Requir Eng 21(4):405\u2013437","journal-title":"Requir Eng"},{"key":"366_CR13","doi-asserted-by":"crossref","unstructured":"Dillon TS, Chang E, Wongthongtham P (2008) Ontology-based software engineering-software engineering 2.0. In: 19th Australian conference on software engineering (ASWEC 2008). IEEE, pp 13\u201323","DOI":"10.1109\/ASWEC.2008.4483185"},{"key":"366_CR14","doi-asserted-by":"crossref","unstructured":"Dollar P, Wojek C, Schiele B, Perona P (2009) Pedestrian detection: a benchmark. In: 2009 IEEE conference on computer vision and pattern recognition, pp 304\u2013311. https:\/\/ieeexplore.ieee.org\/Xplore\/home.jsp","DOI":"10.1109\/CVPR.2009.5206631"},{"key":"366_CR15","unstructured":"Elkan C (2003) Using the triangle inequality to accelerate k-means. In: Proceedings of the 20th international conference on Machine Learning (ICML-03), pp 147\u2013153"},{"issue":"3","key":"366_CR16","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MS.2017.79","volume":"34","author":"F Falcini","year":"2017","unstructured":"Falcini F, Lami G, Costanza AM (2017) Deep learning in automotive software. IEEE Softw 34(3):56\u201363","journal-title":"IEEE Softw"},{"issue":"3","key":"366_CR17","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.1007\/s10664-016-9479-8","volume":"22","author":"J Guo","year":"2017","unstructured":"Guo J, Gibiec M, Cleland-Huang J (2017) Tackling the term-mismatch problem in automated trace retrieval. Empir Softw Eng 22(3):1103\u20131142","journal-title":"Empir Softw Eng"},{"key":"366_CR18","unstructured":"Ho Y, Wookey S (2020) The human visual system and adversarial AI. arXiv:2001.01172"},{"key":"366_CR19","doi-asserted-by":"crossref","unstructured":"Huang X, Kwiatkowska M, Wang S, Wu M (2017) Safety verification of deep neural networks. In: CAV\u201917, pp 3\u201329","DOI":"10.1007\/978-3-319-63387-9_1"},{"key":"366_CR20","unstructured":"ISO I (2018) International organization for standardization: ISO 26262: road vehicles\u2014functional safety. International Standard ISO\/FDIS 26262"},{"key":"366_CR21","unstructured":"Kaindl H, Kramer S (2020) Towards probability-based safety verification of systems with components from machine learning. arXiv:2003.01155"},{"issue":"7","key":"366_CR22","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1109\/TPAMI.2002.1017616","volume":"24","author":"T Kanungo","year":"2002","unstructured":"Kanungo T, Mount DM, Netanyahu NS, Piatko CD, Silverman R, Wu AY (2002) An efficient k-means clustering algorithm: analysis and implementation. IEEE Trans Pattern Anal Mach Intell 24(7):881\u2013892","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"366_CR23","doi-asserted-by":"publisher","unstructured":"Knight JC (2002) Safety critical systems: challenges and directions. In: Proceedings of the 24th international conference on software engineering, association for computing machinery, New York, NY, USA, ICSE \u201902, pp 547\u2013550. https:\/\/doi.org\/10.1145\/581339.581406,","DOI":"10.1145\/581339.581406"},{"issue":"4","key":"366_CR24","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/s10278-017-9976-3","volume":"30","author":"M Kohli","year":"2017","unstructured":"Kohli M, Summers R, Geis J (2017) Medical image data and datasets in the era of machine learning. JDI 30(4):392\u2013399. https:\/\/doi.org\/10.1007\/s10278-017-9976-3","journal-title":"JDI"},{"issue":"4","key":"366_CR25","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/s10278-017-9976-3","volume":"30","author":"MD Kohli","year":"2017","unstructured":"Kohli MD, Summers RM, Geis JR (2017) Medical image data and datasets in the era of machine learning\u2014whitepaper from the 2016 C-MIMI meeting dataset session. J Digit Imaging 30(4):392\u2013399","journal-title":"J Digit Imaging"},{"key":"366_CR26","doi-asserted-by":"crossref","unstructured":"Koopman P, Osyk B (2019) Safety argument considerations for public road testing of autonomous vehicles. Technical report, SAE Technical Paper","DOI":"10.4271\/2019-01-0123"},{"issue":"1","key":"366_CR27","doi-asserted-by":"publisher","first-page":"15","DOI":"10.4271\/2016-01-0128","volume":"4","author":"P Koopman","year":"2016","unstructured":"Koopman P, Wagner M (2016) Challenges in autonomous vehicle testing and validation. SAE Int J Transp Saf 4(1):15\u201324","journal-title":"SAE Int J Transp Saf"},{"key":"366_CR28","unstructured":"Koopman P, Kane A, Black J (2019) Credible autonomy safety argumentation"},{"issue":"1","key":"366_CR29","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/s11263-016-0981-7","volume":"123","author":"R Krishna","year":"2017","unstructured":"Krishna R, Zhu Y, Groth O, Johnson J, Hata K, Kravitz J, Chen S, Kalantidis Y, Li LJ, Shamma DA et al (2017) Visual genome: connecting language and vision using crowdsourced dense image annotations. Int J Comput Vis 123(1):32\u201373","journal-title":"Int J Comput Vis"},{"key":"366_CR30","doi-asserted-by":"crossref","unstructured":"Li Y, Cleland-Huang J (2013) Ontology-based trace retrieval. In: 2013 7th international workshop on traceability in emerging forms of software engineering (TEFSE). IEEE, pp 30\u201336","DOI":"10.1109\/TEFSE.2013.6620151"},{"key":"366_CR31","doi-asserted-by":"crossref","unstructured":"Lin TY, Maire M, Belongie S, Bourdev L, Girshick R, Hays J, Perona P, Ramanan D, Zitnick CL, Doll\u00e1r P (2014) Microsoft coco: common objects in context. arXiv:1405.0312","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"366_CR32","unstructured":"MacQueen J et al (1967) Some methods for classification and analysis of multivariate observations. In: Proceedings of the fifth Berkeley symposium on mathematical statistics and probability, Oakland, CA, USA, vol 1, pp 281\u2013297"},{"key":"366_CR33","unstructured":"Mikolov T, Chen K, Corrado G, Dean J (2013) Efficient estimation of word representations in vector space. arXiv preprint arXiv:13013781"},{"key":"366_CR34","unstructured":"NYtimes (2019) Self-driving Uber car kills pedestrian in Arizona, where robots roam. https:\/\/www.nytimes.com\/2018\/03\/19\/technology\/uber-driverless-fatality.html"},{"key":"366_CR35","doi-asserted-by":"crossref","unstructured":"Rozsa A, Rudd EM, Boult TE (2016) Adversarial diversity and hard positive generation. CVPRW\u201916, pp 410\u2013417","DOI":"10.1109\/CVPRW.2016.58"},{"key":"366_CR36","unstructured":"Salay R, Czarnecki K (2018) Using machine learning safely in automotive software: an assessment and adaption of software process requirements in ISO 26262. arXiv:1808.01614"},{"key":"366_CR37","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-030-26250-1_23","volume-title":"Computer safety, reliability, and security","author":"R Salay","year":"2019","unstructured":"Salay R, Czarnecki K (2019) Improving ML safety with partial specifications. In: Romanovsky A, Troubitsyna E, Gashi I, Schoitsch E, Bitsch F (eds) Computer safety, reliability, and security. Springer International Publishing, Cham, pp 288\u2013300"},{"key":"366_CR38","unstructured":"Seshia SA, Sadigh D (2016) Towards verified artificial intelligence. arXiv:1606.08514"},{"key":"366_CR39","doi-asserted-by":"crossref","unstructured":"Seshia SA, Desai A, Dreossi T, Fremont DJ, Ghosh S, Kim E, Shivakumar S, Vazquez-Chanlatte M, Yue X (2018) Formal specification for deep neural networks. In: International symposium on automated technology for verification and analysis. Springer, pp 20\u201334","DOI":"10.1007\/978-3-030-01090-4_2"},{"key":"366_CR40","unstructured":"Shao S, Zhao Z, Li B, Xiao T, Yu G, Zhang X, Sun J (2018) CrowdHuman: a benchmark for detecting human in a crowd. arXiv:1805.00123"},{"key":"366_CR41","doi-asserted-by":"crossref","unstructured":"Singh P, Lin T, Mueller ET, Lim G, Perkins T, Zhu WL (2002) Open mind common sense: knowledge acquisition from the general public. In: OTM confederated international conferences \u201cOn the move to meaningful internet systems\u201d. Springer, pp 1223\u20131237","DOI":"10.1007\/3-540-36124-3_77"},{"key":"366_CR42","doi-asserted-by":"crossref","unstructured":"Speer R, Chin J, Havasi C (2017) Conceptnet 5.5: an open multilingual graph of general knowledge. In: Thirty-first AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v31i1.11164"},{"key":"366_CR43","doi-asserted-by":"crossref","unstructured":"Tang K, Zhang H, Wu B, Luo W, Liu W (2019) Learning to compose dynamic tree structures for visual contexts. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 6619\u20136628","DOI":"10.1109\/CVPR.2019.00678"},{"key":"366_CR44","doi-asserted-by":"crossref","unstructured":"Tang K, Niu Y, Huang J, Shi J, Zhang H (2020) Unbiased scene graph generation from biased training. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 3716\u20133725. https:\/\/openaccess.thecvf.com\/menu","DOI":"10.1109\/CVPR42600.2020.00377"},{"key":"366_CR45","unstructured":"Team S, Rucinski S, Slenk E, Wigell D, Manning J (2013) Software requirements specification (SRS) automated pedestrian collision avoidance (APCA1)"},{"key":"366_CR46","unstructured":"TechCrunch (2019) Tesla model x fatal crash investigation. https:\/\/techcrunch.com\/story\/tesla-model-x-fatal-crash-investigation\/"},{"issue":"4","key":"366_CR47","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/BF02289263","volume":"18","author":"RL Thorndike","year":"1953","unstructured":"Thorndike RL (1953) Who belongs in the family? Psychometrika 18(4):267\u2013276","journal-title":"Psychometrika"},{"key":"366_CR48","unstructured":"Tilbrook M, Schwitter R (2004) Controlled natural language meets the semantic web. In: Australasian language technology workshop, vol\u00a02, p 2004"},{"key":"366_CR49","doi-asserted-by":"crossref","unstructured":"Verma K, Kass A (2008) Requirements analysis tool: a tool for automatically analyzing software requirements documents. In: International semantic web conference. Springer, pp 751\u2013763","DOI":"10.1007\/978-3-540-88564-1_48"},{"issue":"4","key":"366_CR50","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.jss.2010.11.920","volume":"84","author":"X Xie","year":"2011","unstructured":"Xie X, Ho JWK, Murphy C, Kaiser G, Xu B, Chen TY (2011) Testing and validating machine learning classifiers by metamorphic testing. J Syst Softw 84(4):544\u2013558. https:\/\/doi.org\/10.1016\/j.jss.2010.11.920","journal-title":"J Syst Softw"},{"key":"366_CR51","doi-asserted-by":"crossref","unstructured":"Xu D, Zhu Y, Choy CB, Fei-Fei L (2017) Scene graph generation by iterative message passing. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 5410\u20135419","DOI":"10.1109\/CVPR.2017.330"},{"key":"366_CR52","doi-asserted-by":"crossref","unstructured":"Zellers R, Yatskar M, Thomson S, Choi Y (2018) Neural motifs: scene graph parsing with global context. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 5831\u20135840","DOI":"10.1109\/CVPR.2018.00611"},{"key":"366_CR53","doi-asserted-by":"crossref","unstructured":"Zhang S, Benenson R, Schiele B (2017) Citypersons: a diverse dataset for pedestrian detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 3213\u20133221. https:\/\/openaccess.thecvf.com\/menu","DOI":"10.1109\/CVPR.2017.474"},{"key":"366_CR54","doi-asserted-by":"crossref","unstructured":"Zhang S, Xie Y, Wan J, Xia H, Li SZ, Guo G (2019) WiderPerson: a diverse dataset for dense pedestrian detection in the wild. arXiv:1909.12118","DOI":"10.1109\/TMM.2019.2929005"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-021-00366-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00766-021-00366-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-021-00366-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,22]],"date-time":"2023-01-22T08:28:14Z","timestamp":1674376094000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00766-021-00366-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,8]]},"references-count":54,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["366"],"URL":"https:\/\/doi.org\/10.1007\/s00766-021-00366-0","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"type":"print","value":"0947-3602"},{"type":"electronic","value":"1432-010X"}],"subject":[],"published":{"date-parts":[[2022,1,8]]},"assertion":[{"value":"11 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}