{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T22:32:11Z","timestamp":1762900331953,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":77,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2124606"],"award-info":[{"award-number":["2124606"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3522664.3528589","type":"proceedings-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T16:30:14Z","timestamp":1666024214000},"page":"181-192","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Improving generalizability of ML-enabled software through domain specification"],"prefix":"10.1145","author":[{"given":"Hamed","family":"Barzamini","sequence":"first","affiliation":[{"name":"Northern Illinois University"}]},{"given":"Mona","family":"Rahimi","sequence":"additional","affiliation":[{"name":"Northern Illinois University"}]},{"given":"Murteza","family":"Shahzad","sequence":"additional","affiliation":[{"name":"Northern Illinois University"}]},{"given":"Hamed","family":"Alhoori","sequence":"additional","affiliation":[{"name":"Northern Illinois University"}]}],"member":"320","published-online":{"date-parts":[[2022,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Onelook Dictionary Search. https:\/\/www.onelook.com\/. Accessed: 2020-02-08."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/app11020796"},{"key":"e_1_3_2_1_3_1","volume-title":"Label refinery: Improving imagenet classification through label progression. arXiv preprint arXiv:1805.02641","author":"Bagherinezhad Hessam","year":"2018","unstructured":"Hessam Bagherinezhad, Maxwell Horton, Mohammad Rastegari, and Ali Farhadi. 2018. Label refinery: Improving imagenet classification through label progression. arXiv preprint arXiv:1805.02641 (2018)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11744023_32"},{"key":"e_1_3_2_1_5_1","unstructured":"Christopher M Bishop. 2006. Pattern recognition and machine learning. springer."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2897684"},{"key":"e_1_3_2_1_7_1","volume-title":"Fahad Shahbaz Khan, and Ling Shao","author":"Cao Jiale","year":"2020","unstructured":"Jiale Cao, Yanwei Pang, Jin Xie, Fahad Shahbaz Khan, and Ling Shao. 2020. From Handcrafted to Deep Features for Pedestrian Detection: A Survey. (Oct. 2020). arXiv:2010.00456 [cs.CV]"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.67"},{"key":"e_1_3_2_1_9_1","volume-title":"Autoaugment: Learning augmentation policies from data. arXiv preprint arXiv:1805.09501","author":"Cubuk Ekin D","year":"2018","unstructured":"Ekin D Cubuk, Barret Zoph, Dandelion Mane, Vijay Vasudevan, and Quoc V Le. 2018. Autoaugment: Learning augmentation policies from data. arXiv preprint arXiv:1805.09501 (2018)."},{"volume-title":"Histograms of oriented gradients for human detection. In 2005 IEEE computer society conference on computer vision and pattern recognition (CVPR'05)","author":"Dalal Navneet","key":"e_1_3_2_1_10_1","unstructured":"Navneet Dalal and Bill Triggs. 2005. Histograms of oriented gradients for human detection. In 2005 IEEE computer society conference on computer vision and pattern recognition (CVPR'05), Vol. 1. Ieee, 886--893."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-015-0222-6"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01619"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206631"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.155"},{"key":"e_1_3_2_1_15_1","volume-title":"Inheritance and loss? A brief survey of Google Books. First Monday","author":"Duguid Paul","year":"2007","unstructured":"Paul Duguid. 2007. Inheritance and loss? A brief survey of Google Books. First Monday (2007)."},{"key":"e_1_3_2_1_16_1","volume-title":"A neural algorithm of artistic style. arXiv preprint arXiv:1508.06576","author":"Gatys Leon A","year":"2015","unstructured":"Leon A Gatys, Alexander S Ecker, and Matthias Bethge. 2015. A neural algorithm of artistic style. arXiv preprint arXiv:1508.06576 (2015)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/0278364913491297"},{"key":"e_1_3_2_1_18_1","volume-title":"Generative adversarial networks. arXiv preprint arXiv:1406.2661","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial networks. arXiv preprint arXiv:1406.2661 (2014)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9479-8"},{"key":"e_1_3_2_1_20_1","volume-title":"Saad Ullah Akram, and Ling Shao","author":"Hasan Irtiza","year":"2020","unstructured":"Irtiza Hasan, Shengcai Liao, Jinpeng Li, Saad Ullah Akram, and Ling Shao. 2020. Generalizable Pedestrian Detection: The Elephant In The Room. (March 2020). arXiv:2003.08799 [cs.CV]"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","unstructured":"B. C. Hu R. Salay K. Czarnecki M. Rahimi G. Selim and M. Chechik. 2020. Towards Requirements Specification for Machine-learned Perception Based on Human Performance. In 2020 IEEE Seventh International Workshop on Artificial Intelligence for Requirements Engineering (AIRE). 48--51. 10.1109\/AIRE51212.2020.00014","DOI":"10.1109\/AIRE51212.2020.00014"},{"key":"e_1_3_2_1_23_1","volume-title":"Laurens Van Der Maaten, and Kilian Weinberger","author":"Huang Gao","year":"2019","unstructured":"Gao Huang, Zhuang Liu, Geoff Pleiss, Laurens Van Der Maaten, and Kilian Weinberger. 2019. Convolutional networks with dense connectivity. IEEE transactions on pattern analysis and machine intelligence (2019)."},{"key":"e_1_3_2_1_24_1","unstructured":"Christian Kaestner. 2020. Machine Learning is Requirements Engineering --- On the Role of Bugs Verification and Validation in Machine Learning. https:\/\/medium.com\/analytics-vidhya\/machine-learning-is-requirements-engineering-8957aee55ef4."},{"key":"e_1_3_2_1_25_1","volume-title":"Progressive growing of gans for improved quality, stability, and variation. arXiv preprint arXiv:1710.10196","author":"Karras Tero","year":"2017","unstructured":"Tero Karras, Timo Aila, Samuli Laine, and Jaakko Lehtinen. 2017. Progressive growing of gans for improved quality, stability, and variation. arXiv preprint arXiv:1710.10196 (2017)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-017-9976-3"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-017-9976-3"},{"key":"e_1_3_2_1_28_1","volume-title":"Icing on the cake: An easy and quick post-learnig method you can try after deep learning. arXiv preprint arXiv:1807.06540","author":"Konno Tomohiko","year":"2018","unstructured":"Tomohiko Konno and Michiaki Iwazume. 2018. Icing on the cake: An easy and quick post-learnig method you can try after deep learning. arXiv preprint arXiv:1807.06540 (2018)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-016-0981-7"},{"key":"e_1_3_2_1_30_1","unstructured":"Alex Krizhevsky Geoffrey Hinton et al. 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_2_1_31_1","volume-title":"Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems 25","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems 25 (2012), 1097--1105."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEFSE.2013.6620151"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.106"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15712-8_59"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.3115\/1118108.1118117"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_3_2_1_37_1","volume-title":"Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.257"},{"key":"e_1_3_2_1_42_1","volume-title":"Scikit-learn: Machine learning in Python. the Journal of machine Learning research 12","author":"Pedregosa Fabian","year":"2011","unstructured":"Fabian Pedregosa, Ga\u00ebl Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, et al. 2011. Scikit-learn: Machine learning in Python. the Journal of machine Learning research 12 (2011), 2825--2830."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.22"},{"key":"e_1_3_2_1_44_1","volume-title":"Toward Requirements Specification for Machine-Learned Components. In 2019 IEEE 27th International Requirements Engineering Conference Workshops (REW). IEEE, 241--244","author":"Rahimi Mona","year":"2019","unstructured":"Mona Rahimi, Jin LC Guo, Sahar Kokaly, and Marsha Chechik. 2019. Toward Requirements Specification for Machine-Learned Components. In 2019 IEEE 27th International Requirements Engineering Conference Workshops (REW). IEEE, 241--244."},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the European Conference on Computer Vision (ECCV) Workshops. 0--0.","author":"Rasouli Amir","year":"2018","unstructured":"Amir Rasouli, Iuliia Kotseruba, and John K Tsotsos. 2018. It's Not All About Size: On the Role of Data Properties in Pedestrian Detection. In Proceedings of the European Conference on Computer Vision (ECCV) Workshops. 0--0."},{"key":"e_1_3_2_1_46_1","volume-title":"Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767","author":"Redmon Joseph","year":"2018","unstructured":"Joseph Redmon and Ali Farhadi. 2018. Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767 (2018)."},{"key":"e_1_3_2_1_47_1","unstructured":"Radim Reh\u0159ek Petr Sojka et al. 2011. Gensim---statistical semantics in python. Retrieved from genism. org (2011)."},{"key":"e_1_3_2_1_48_1","volume-title":"Faster r-cnn: Towards real-time object detection with region proposal networks. arXiv preprint arXiv:1506.01497","author":"Ren Shaoqing","year":"2015","unstructured":"Shaoqing Ren, Kaiming He, Ross Girshick, and Jian Sun. 2015. Faster r-cnn: Towards real-time object detection with region proposal networks. arXiv preprint arXiv:1506.01497 (2015)."},{"key":"e_1_3_2_1_49_1","volume-title":"Using Machine Learning Safely in Automotive Software: An Assessment and Adaption of Software Process Requirements in ISO26262. ArXiv abs\/1808.01614","author":"Salay Rick","year":"2018","unstructured":"Rick Salay and Krzysztof Czarnecki. 2018. Using Machine Learning Safely in Automotive Software: An Assessment and Adaption of Software Process Requirements in ISO26262. ArXiv abs\/1808.01614 (2018)."},{"key":"e_1_3_2_1_50_1","volume-title":"Using machine learning safely in auto-motive software: An assessment and adaption of software process requirements in ISO 26262. arXiv preprint arXiv:1808.01614","author":"Salay Rick","year":"2018","unstructured":"Rick Salay and Czarnecki Krzysztof. 2018. Using machine learning safely in auto-motive software: An assessment and adaption of software process requirements in ISO 26262. arXiv preprint arXiv:1808.01614 (2018)."},{"volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition. 3626--3633","author":"Sermanet Pierre","key":"e_1_3_2_1_51_1","unstructured":"Pierre Sermanet, Koray Kavukcuoglu, Soumith Chintala, and Yann LeCun.2013. Pedestrian detection with unsupervised multi-stage feature learning. In Proceedings of the IEEE conference on computer vision and pattern recognition. 3626--3633."},{"key":"e_1_3_2_1_52_1","volume-title":"Seshia et al","author":"Sanjit","year":"2018","unstructured":"Sanjit A. Seshia et al. 2018. Formal Specification for Deep Neural Networks. In ATVA'18. Springer, 20--34."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01090-4_2"},{"key":"e_1_3_2_1_54_1","volume-title":"Seshia and Dorsa Sadigh","author":"Sanjit","year":"2016","unstructured":"Sanjit A. Seshia and Dorsa Sadigh. 2016. Towards Verified Artificial Intelligence. ArXiv abs\/1606.08514 (2016)."},{"key":"e_1_3_2_1_55_1","volume-title":"CrowdHuman: A Benchmark for Detecting Human in a Crowd. (April","author":"Shao Shuai","year":"2018","unstructured":"Shuai Shao, Zijian Zhao, Boxun Li, Tete Xiao, Gang Yu, Xiangyu Zhang, and Jian Sun. 2018. CrowdHuman: A Benchmark for Detecting Human in a Crowd. (April 2018). arXiv:1805.00123 [cs.CV]"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0197-0"},{"key":"e_1_3_2_1_57_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_1_58_1","first-page":"2012","article-title":"Challenges in applying the ISO 26262 for driver assistance systems","volume":"15","author":"Spanfelner Bernd","year":"2012","unstructured":"Bernd Spanfelner, Detlev Richter, Susanne Ebel, Ulf Wilhelm, Wolfgang Branz, and Carsten Patz. 2012. Challenges in applying the ISO 26262 for driver assistance systems. Tagung Fahrerassistenz, M\u00fcnchen 15, 16 (2012), 2012.","journal-title":"Tagung Fahrerassistenz, M\u00fcnchen"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Robyn Speer Joshua Chin and Catherine Havasi. 2017. ConceptNet 5.5: An Open Multilingual Graph of General Knowledge. 4444--4451 pages. http:\/\/aaai.org\/ocs\/index.php\/AAAI\/AAAI17\/paper\/view\/14972","DOI":"10.1609\/aaai.v31i1.11164"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00377"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00678"},{"key":"e_1_3_2_1_63_1","volume-title":"Proceedings of the international conference on machine learning (ICML), workshop track.","author":"Terrance V","year":"2017","unstructured":"V Terrance and W Taylor Graham. 2017. Dataset augmentation in feature space. In Proceedings of the international conference on machine learning (ICML), workshop track."},{"key":"e_1_3_2_1_64_1","unstructured":"Alexey Tsymbal. [n.d.]. The problem of concept drift: definitions and related work. ([n. d.])."},{"volume-title":"International semantic web conference","author":"Verma Kunal","key":"e_1_3_2_1_65_1","unstructured":"Kunal Verma and Alex Kass. 2008. Requirements analysis tool: A tool for automatically analyzing software requirements documents. In International semantic web conference. Springer, 751--763."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"e_1_3_2_1_67_1","volume-title":"Scene-specific pedestrian detection for static video surveillance","author":"Wang Xiaogang","year":"2013","unstructured":"Xiaogang Wang, Meng Wang, and Wei Li. 2013. Scene-specific pedestrian detection for static video surveillance. IEEE transactions on pattern analysis and machine intelligence 36, 2 (2013), 361--374."},{"volume-title":"Advances in Neural Information Processing Systems, H Wallach, H Larochelle, A Beygelzimer, F dAlch\u00e9-Buc","author":"Wang Yulin","key":"e_1_3_2_1_68_1","unstructured":"Yulin Wang, Xuran Pan, Shiji Song, Hong Zhang, Gao Huang, and Cheng Wu. 2019. Implicit Semantic Data Augmentation for Deep Networks. In Advances in Neural Information Processing Systems, H Wallach, H Larochelle, A Beygelzimer, F dAlch\u00e9-Buc, E Fox, and R Garnett (Eds.), Vol. 32. Curran Associates, Inc., 12635--12644."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.634"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.330"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01094"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.330110077"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00611"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.474"},{"key":"e_1_3_2_1_75_1","volume-title":"WiderPerson: A Diverse Dataset for Dense Pedestrian Detection in the Wild. (Sept","author":"Zhang Shifeng","year":"2019","unstructured":"Shifeng Zhang, Yiliang Xie, Jun Wan, Hansheng Xia, Stan Z Li, and Guodong Guo. 2019. WiderPerson: A Diverse Dataset for Dense Pedestrian Detection in the Wild. (Sept. 2019). arXiv:1909.12118 [cs.CV]"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.7000"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58583-9_34"}],"event":{"name":"CAIN '22: 1st Conference on AI Engineering - Software Engineering for AI","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE TCSC IEEE Technical Committee on Scalable Computing"],"location":"Pittsburgh Pennsylvania","acronym":"CAIN '22"},"container-title":["Proceedings of the 1st International Conference on AI Engineering: Software Engineering for AI"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3522664.3528589","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3522664.3528589","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3522664.3528589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:34Z","timestamp":1750183774000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3522664.3528589"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":77,"alternative-id":["10.1145\/3522664.3528589","10.1145\/3522664"],"URL":"https:\/\/doi.org\/10.1145\/3522664.3528589","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-10-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}