<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A List of Pre-Requisites to Make Recommender Systems Deployable in Critical Context</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>E. Bouzekri</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>A. Canny</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>C. Fayollas</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>C. Martinie</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>P. Palanque</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>E. Barboni</string-name>
          <email>barbonig@irit.fr</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Y. Deleris</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>C. Gris</string-name>
          <email>Christine.Grisg@airbus.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>AIRBUS Operations 316 Route de Bayonne 31060 Toulouse</institution>
          ,
          <country country="FR">France</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Elodie.Bouzekri</institution>
          ,
          <addr-line>Alexandre.Canny, fayollas,palanque,barboni</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>ICS-IRIT, University of Toulouse 118</institution>
          ,
          <addr-line>route de Narbonne 31042 Toulouse</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
      </contrib-group>
      <fpage>42</fpage>
      <lpage>55</lpage>
      <abstract>
        <p>In the academic area, recommender systems have received a lot of attention in the recent years (see for instance the increasing success of the RecSys conference). This success has also reached industry and the general public via large platforms such as Amazon or Net ix. The recommender systems present multiple bene ts that can be attributed to automation by means of the migration of function from the operator to the Recommender System itself. Depending on the type of recommender system, these functions can cover: support to perception of information, support to identi cation of potentially relevant elements, support to the selection of one element amongst a list... Despite their widespread use, their development has not reached the level of maturity required for the deployment in the context of critical command and control systems. This position paper identi es some pre-requisite for making recommender systems deployable in critical context of critical systems.</p>
      </abstract>
      <kwd-group>
        <kwd>Automation</kwd>
        <kwd>recommender systems</kwd>
        <kwd>automation</kwd>
        <kwd>operator tasks</kwd>
        <kwd>dependability</kwd>
        <kwd>certi cation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Recommender Systems (RS) are nowadays widely used in the area of consumer
electronics and home entertainment. They are exploited by large companies (such
as Amazon in the area of e-commerce [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]) and used by millions of users (e.g.
93 million for Net ix [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]). The main target for RS designers and developers has
been accuracy as demonstrated in [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. More recently, focus has moved to other
perceived quality of use such as user experience and speci c attributes of this
quality factor [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Despite all these e orts, engineering recommender systems
follows craft processes and remain far away from software engineering practices.
Contributions such as [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] address reliability but only in the sense of reliability
of users (in the information they provide to the system) and [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] only consider
recommender systems in software engineering i.e. how a recommender system
could help software engineers.
      </p>
      <p>
        As for the development of RS, several platforms have been proposed
throughout the years starting with Lenskit [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Other open source platforms for
developing RS have been proposed such as ?? or [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] focusing on the integration of
various algorithms implementing the main types of RS (e.g. item-based,
knowledgebased, collaborative ...). Assessing which platform produces better results has
also been identi ed as a challenge that RiVal [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] is meant to address.
      </p>
      <p>The software engineering aspects of RS thus remain mainly an untouched
problem whose challenges range from requirements and speci cation to
validation and veri cation and are not covered by generic programming platforms.</p>
      <p>This position paper intent to highlight the pre-requisite related to the
software engineering of recommender systems to be deployed in a critical context.
Next section introduces brie y the main characteristics of recommender systems
and highlights their role as automation of users' tasks. The following introduces
both the challenges raised by critical systems engineering and the tools and
methods that have to be used to ensure adequate levels of dependability. Through
this list, we elicit a list of requirements that recommender systems should meet
to be eligible for deployment in critical context. Last section presents the ECAM
concept of civil aircrafts and highlights how its functioning could be extended
to cover more functions of recommender systems.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Brief Introduction to Recommender Systems</title>
      <p>This section presents the characteristics of recommender systems and makes
explicit their role as automation of users' tasks.
2.1</p>
      <sec id="sec-2-1">
        <title>What are recommender systems</title>
        <p>
          Recommender Systems (RSs) are \software tools and techniques providing
suggestions for items to be of use to a user or a group of users" [
          <xref ref-type="bibr" rid="ref15 ref28 ref6">6, 15, 28</xref>
          ]. The
RSs provides support for the process of decision-making for a user or a group
of users. Recommendations are predictions of the most suitable items based
on user's preferences [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ]. An \Item" is the general term referring to what the
system recommends to users [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ]. They also argue that a RS normally focuses
on a speci c type of item (e.g., product, news or command) and that the user
interface has to be designed accordingly.
        </p>
        <p>
          Recommender systems implement one of the following recommendation
methods [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]:
{ Memory-based: heuristics that make rating predictions based on all rated
items by the users.
{ \Model-based": a machine-learning algorithm updates a model from rated
items to make rating predictions.
        </p>
        <p>
          Types of RSs Recommender systems can implement several types of
ltering, following the sources of information and algorithm used for the ltering.
These ltering can be: collaborative ltering (e.g. [
          <xref ref-type="bibr" rid="ref13 ref20">13, 20</xref>
          ]), content-based
ltering (e.g. [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]), knowledge-based ltering (e.g. [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]) and hybrid ltering (e.g. [
          <xref ref-type="bibr" rid="ref16 ref26">16,
26</xref>
          ]) or demographic ltering (e.g. [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]) that predict absolute value of ratings.
        </p>
        <p>
          In addition, other recommender systems predict relative preferences for users
and not absolute values. Jerbi et al. [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] presents a preference-based
recommender system that uses the past queries of the user to generate
recommendations.
        </p>
        <p>
          The RSs include more and more criteria to improve the quality of
recommendations and take into account the context [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]: real-time recommendations (e.g.
the one used by Amazon [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]), location awareness (e.g. [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]) and recommendation
for a group of users (e.g. [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]) for example.
        </p>
        <p>
          Tasks when interacting with a RS Recommender systems provide support
for particular types of user goals. The tasks to be performed in order for the
user to reach their goal are both generic (i.e. supported by most recommender
systems e.g. \browse recommendations") and speci c (i.e. only supported by a
given recommender system e.g. \ nd director of the recommended movie"). List
of generic tasks are provided in the literature [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ] and can be seen as generic
requirements for recommender systems in order to support users goals. When
using a RS, users target the accomplishment of the following goals:
{ Find some good items / Find all good items
{ Find a recommended sequence of items
{ Find a recommended bundle of items
{ Browse the proposed list of items
{ Look in detail at one recommended item
{ Annotate in context the item under consideration
{ Improve my pro le / Express myself
{ Help others / In uence others
2.2
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Recommender systems as partly-autonomous interactive systems</title>
        <p>Recommender systems execute functions that users were previously performing
on their own. Fig. 1 depicts the functions performed by the RSs with respects
to the stages of human information processing:
{ Sensory processing stage: RS lters, ranks and highlight recommended items.</p>
        <p>
          Localization of the information from the recommender system might deeply
a ect that sensing.
{ Perception/working memory: RS reminds items to the users by duplicating
them or recalls items by repeating them. In addition, RS lters items and
presents only the relevant items for the user or the group of users. Human
errors such as interference, overshooting a stop rule... [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ] and thus should
be avoided (and if not possible shall be detected, recovered or mitigated).
{ Decision-making: RS lters recommendation by ordering information about
items presented. It brands one or several recommendations by highlighting
information that are interesting for the user.
        </p>
        <p>{ Response selection: RS enables the user to select one of the recommendation.
Currently, there is no recommender system deployed in critical contexts.
However, as detailed above, recommender systems present multiple bene ts that can
be attributed to automation by means of the migration of function from the
operator to the Recommender System itself. Depending on the type of
recommender system, these functions can cover: support to perception of information,
support to identi cation of potentially relevant elements, support to the
selection of one element amongst a list... These automation means could be useful in
supporting operators' activities in critical context. For instance, in the avionics
domain, aircrafts pilots have to manage all of the aircraft systems through the
cockpit (the ight deck). The cockpit is a really complex environment and the
use of automation is mandatory to support the pilots' activities. The use of
recommender systems in this context may, for instance, help the pilots in choosing
an action from a multitude. The example of how a recommender system may be
useful in an aircraft cockpit is detailed in the last section of this paper.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Critical Systems Engineering</title>
      <p>This section highlights the software engineering and dependability context of
critical systems development. We use this presentation as a mean for identifying
12 requirements to address when engineering recommender systems for a critical
context.</p>
      <sec id="sec-3-1">
        <title>Dependability for critical systems</title>
        <p>
          Building dependable critical systems is a cumbersome task that raises the need
to identify and treat the threats that can impair their functioning. In the
perspective of identifying all of those threats, Avizienis et al. [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] have de ned a
typology of all the faults and errors that can impair a computing system. This
typology leads to the identi cation of 31 elementary classes of faults. Fig. 3
presents a simpli ed view of this typology. It makes explicit the two main
categories of faults (top level of the gure): i) the ones occurring at development
time (including bad designs, programming errors,...) and ii) the one occurring at
operation times (right-hand side of the gure including user error such as slips,
lapses and mistakes as de ned in [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ]). This Figure organizes the leaves of the
typology in ve di erent groups, each of them bringing a di erent issue that has
to be addressed:
{ Development software faults (issue 1): software faults introduced by a human
during the system development.
{ Malicious faults (issue 2): faults introduced by human with the deliberate
objective of damaging the system (e.g. causing service denial or crash of the
system).
{ Development hardware faults (issue 3): natural (e.g. caused by a natural
phenomenon without human involvement) and human-made faults a ecting
the hardware during its development.
{ Operational natural faults (issue 4): faults caused by a natural phenomenon
without human participation, a ecting the hardware and occurring during
the service of the system. As they a ect hardware, they are likely to damage
software as well.
{ Operational human-errors (issue 5): faults resulting from human action
during the use of the system. These faults are particularly of interest for
interactive system and the next subsection describe them in detail.
We consider that development hardware faults (that are more on the electronic
side of computing) and malicious faults (that are a separated concern in the
avionics domain for now) are beyond the scope of this paper. Each remaining
branch of this classi cation of faults calls for speci c engineering methods,
processes and tools to be used and followed for developing recommender systems to
be used in a critical context.
3.2
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Regulation for critical systems</title>
        <p>Several types of standards rule the development and operation of critical systems.
In this article, we focus on standards that de ne processes and methods for the
development of interactive software applications in aeronautics.</p>
        <p>Development
Assurance
Level</p>
        <p>A
B
C
D
E</p>
        <p>No safety
e ect</p>
        <p>Description of the failure Failure rate
conditions (failures/hour)
Failure
condition
categories
Catastrophic Failure conditions that may Extremely
cause a crash improbable
10 9 +fail safe
Hazardous Failure has a large negative Extremely
impact or performance, Or remote
reduces the ability of crew to 10 7
operate the plane
Major Failure is signi cant, but Remote
has lesser impact than haz- 10 5
ardous
Minor Failure is noticeable, but has Probable
lesser impact than Major 10 3</p>
        <p>No impact on dependability Any range</p>
      </sec>
      <sec id="sec-3-3">
        <title>Regulation for software development DO-178C [3] de nes Development As</title>
        <p>
          surance Levels (DAL) for commercial software-based aerospace systems. These
levels correspond to failure condition categories de ned by certi cation
authorities such as EASA (European Aviation Safety Agency) or FAA (Federal Aviation
Administration). Table 1 presents the ve Development Assurance Levels
associated with their failure condition category and its description (summarized from
the EASA CS-25 standard [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]). As presented in the rst row of Table 1, a
failure having catastrophic consequences (failure condition column) must not occur
more often than once per 10-9 hours of functioning (failure rate column).
        </p>
        <p>According to the standard DO 178-C, the rst two rows of Table 1 (colored
in grey) correspond to so-called critical systems while systems in the lower rows
are called non critical.</p>
        <p>Requirement1: DAL level of recommender system must be identi ed.
Requirement2: Development methods used for the recommender system must
be adequate with the identi ed level of DAL.</p>
        <p>
          It is important to note that DAL levels can also be ensured by the availability
of redundant systems of a lower DAL. This means that systems not developed
following DAL A constraints could be used for systems with potentially
catastrophic failure conditions, provided it exists redundant systems of a lower DAL.
Interactive systems for ight crew The Certi cation Speci cation 25 (CS
25) standard [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] speci es, in its section 1302 named \Installed systems and
equipment for use of the ight crew", that the cockpit must allow the crew to
perform safely all of their tasks and that the cockpit must not lead to error prone
behaviors. In addition to requirements, the CS 25 standard provides a list of
Acceptable Means of Compliances (AMC), which are acceptable means of showing
compliance with the requirements. Fig. 3 depicts an excerpt of these means of
compliance for systems that contain automation (see [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ], page 2-F-20).
Requirement3: Tasks performed by the operator using the recommender
system should be explicitly described.
        </p>
        <p>Requirement4: The functions of the recommender system should support all
the tasks identi ed.</p>
        <p>Requirement5: The presentation and interaction with the recommender
system must not be error prone.</p>
        <p>Requirement6: As the recommender system automates ight crew tasks, the
design of this speci c automation shall follow guidelines on automation.
Requirement7: The automation behavior should be as dependable as the
other part of the recommender systems.
3.3</p>
      </sec>
      <sec id="sec-3-4">
        <title>Model-based approaches for dealing with faults during development</title>
        <p>
          Model-based approaches and in particular formal model-based approaches
provide support for the design and analysis of interactive systems. They are a
mean to analyze in a complete and unambiguous way the interactions between
a user and a system [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]. Several types of approaches have been developed [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ],
which encompass contributions about formal description of an interactive system
and/or formal veri cation of its properties. For example, developing a system of
a DAL A or B now requires the use of formal description techniques according
to DO-178C supplement 330 [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. This supplement de nes the overall analysis
process (depicted in Fig. 4) that developers of aircraft systems must apply.
        </p>
        <p>In this process, presented in Fig. 4, software engineers have to rely on the
software requirements (\shall" statement) to develop a model of the system
and, independently, they have to express the same requirements in the format of
CTL properties. A formal analysis model integrates the system model and the
properties. A model checker takes the analysis model as input and generate a
counterexample if a property of the system does not hold.</p>
        <p>Requirement8: High-level requirements for the recommender system shall be
formally described.</p>
        <p>Requirement9: Behavior of the recommender system shall be described using
formal methods.</p>
        <p>Requirement10: Compatibility between behavioral descriptions and
highlevel requirements shall be checked using veri cations techniques.
3.4</p>
      </sec>
      <sec id="sec-3-5">
        <title>Approaches for dealing with natural faults during operations</title>
        <p>
          The issue of operational natural faults must be addressed, more particularly
when dealing with the avionics domain as a higher probability of occurrence of
these faults [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ] concerns systems deployed in the high atmosphere (e.g.,
aircrafts [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ]) or in space (e.g., manned spacecraft). As the operational natural
faults are unpredictable and unavoidable, the dedicated approach for dealing
with them is fault-tolerance [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] that can be achieved through specialized
faulttolerant architectures (such as the COM-MON architecture [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ]), by adding
redundancy (e.g. [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ] or diversity using multiple versions of the same software
or by fault mitigation (reducing the severity of faults using barriers or healing
behaviors [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ]).
        </p>
        <p>Requirement11: Fault-tolerant mechanisms shall be embedded in the
implementation of the recommender system (at least to support detection of faults).
Requirement12: E ective fault-tolerance of the recommender system shall
be checked using, for instance, fault-injection techniques.
3.5</p>
      </sec>
      <sec id="sec-3-6">
        <title>Summary of the Identi ed Requirements</title>
        <p>In this section, we identi ed 12 requirements to address when engineering
recommender systems for a critical context. These requirements cover both the certi
cation aspects (more particularly in the avionic domain) and the dependability
aspects of critical systems. They also cover properties speci c to interactive
systems (such as usability aspects). It is important to note that the some of these
requirements are speci c to recommender systems (e.g.requirement 6) while
others (e.g.requirement 12) are generic for interactive applications deployed in the
cockpit. Finally, while these requirements might not be exhaustive, they depict
a rst draft of the issues that have to be addressed to deploy recommender
systems and call for methods from the area of software engineering, dependable
computing and human-computer interaction to address them.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>An Illustrative Example of Recommender System in</title>
    </sec>
    <sec id="sec-5">
      <title>Aircraft Cockpit</title>
      <p>Currently, there is no recommender system deployed in critical contexts. In the
avionics domain, this is due (in particular) to the lack of means to ensure their
dependability. However, the concepts underlying recommender systems (e.g.
restriction of choices from a multitude) could be useful in supporting operators'
activities. This section presents a system from large commercial aircraft that
could be a good candidate to become a recommender system in future
programs. This section rst presents the current concepts of the ECAM (Electronic
Centralized Aircraft Monitor) and then highlights what would be required for
its engineering in order to embed recommender systems' philosophy.
4.1</p>
      <sec id="sec-5-1">
        <title>Overview of the ECAM</title>
        <p>The ECAM, in the Airbus family, monitors aircraft systems (e.g., the engines)
and relays to the pilots data about their state (e.g., if their use is limited due
to a failure) as well as the procedures that have to be achieved by the pilots to
recover from a failure.</p>
        <p>The ECAM is in charge of the processing of data from the monitoring of the
aircraft systems and produces:
{ The display of information about the status of the aircraft systems
parameters. In the example of the Airbus A380, this display is done on the System
Display (SD in Fig. 5).
{ The display of alerts about system failures and procedures that have to be
completed by the pilot to manage the detected warning. In the example of
the Airbus A380, this display is done on Warning Display (WD in Fig. 5).
{ Aural and visual alerts - also called attention getters (using several lights
and loudspeakers in the cockpit).</p>
        <p>Fig. 6 presents an example of the display of warning messages (one \APU
FIRE" called red warning on line L1) and its associated recovery procedure
on the Warning Display. In this example, the pilots are informed that a re
has been detected within the APU (Auxiliary Power Unit) system. The APU
system provides bleed and electricity to the aircraft and consumes fuel. In case
of failure, among others, the APU can trigger APU FAULT and APU FIRE
alarms. The corresponding recovery procedure rst indicates to the pilots that
they have to land as soon as possible (\LAND ASAP" indication onL2). Then,
they rst have to push the \APU FIRE" pushbutton (L3) and shut o the \APU
BLEED" service (L4). Then, if the re is still present after 10 seconds (L5), they
have to discharge an agent (L6) to stop the re and to shut the APU o (L7).</p>
        <p>If the Flight Warning System processes simultaneously several warning
messages, it sorts them, in order to obtain a display order, according to three
mechanisms:
{ Their relationship with others warning messages: some warning messages
may be inhibited in case of presence of others warning messages (for instance,
the \APU FAULT" warning message is not displayed if the \APU FIRE" is
already detected);
{ The current ight phase: some warning messages are only displayed when the
aircraft is in a given ight phase (for instance, ight management systems
failures are not displayed after landing);
{ Their priority level: a priority level is associated to each alert message in
order to prioritize the more critical ones.
4.2</p>
      </sec>
      <sec id="sec-5-2">
        <title>Flight Warning System as a Recommender System</title>
        <p>The processing of warning messages (as presented above) is similar to the ltering
activity of a recommender system. Indeed, only some of the potential messages
are presented to the pilot according to the context (e.g. ight phases or other
messages). However, this ltering could be extended to other aspects (beyond
context) such as feedback from other pilots who performed the same procedure
(this is called collaborative ltering). Beyond that, FWS only presents one list
of procedures at a time to the pilot. Procedures are sorted by order of priority
and should be performed in that order by the pilot even though within a given
procedure, options are o ered. Exploiting recommender systems functionalities
would allow presenting alternatives to the pilots that could select the most
appropriate procedure to perform according to information that is not present in
the system (for instance, in case of a LAND ASAP, the selection of the most
practical airport for the airline to repair the aircraft).
5</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Summary and Conclusions</title>
      <p>To our knowledge, recommender systems have not been deployed in critical
contexts. This position paper has rst presented how the use of recommender
systems in critical context could be helpful to support the operators' activities.
The paper has then presented the issues that have to be addressed in order to
deploy recommender systems in a critical context. We have made explicit those
issues as a list of 12 requirements that call for methods in the area of software
engineering, dependable computing and human-computer interaction to address
them. Finally, the paper has presented an illustrative example of recommender
system in an aircraft cockpit for supporting the pilots' activities while managing
aircraft systems failures.</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgments</title>
      <p>This work has been partially founded by the project SEFA IKKY (Integration
du KoKpit et de ses sYstemes) under the convention number #IA-2016-08-02
(Programme d'Investissement Avenir).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. Net ix users statistics. https://www.statista.com/statistics/250934/ quarterly-number
          <article-title>-of-netflix-streaming-subscribers-worldwide/</article-title>
          .
          <source>Accessed: March</source>
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2. DO-
          <volume>333</volume>
          , Formal Methods Supplement to DO-178C
          <source>and DO-278A. RTCA and EUROCAE</source>
          ,
          <year>December 2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3. DO-178C / ED-12C,
          <article-title>Software Considerations in Airborne Systems and Equipment Certi cation</article-title>
          .
          <source>RTCA and EUROCAE</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. CS-25 - Amendment 17 -
          <article-title>Certi cation Speci cations and Acceptable Means of Compliance for Large Aeroplanes</article-title>
          . EASA,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>G.</given-names>
            <surname>Adomavicius</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Tuzhilin</surname>
          </string-name>
          .
          <article-title>Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions</article-title>
          .
          <source>IEEE Trans. on Knowl. and Data Eng</source>
          .,
          <volume>17</volume>
          (
          <issue>6</issue>
          ):
          <volume>734</volume>
          {
          <fpage>749</fpage>
          ,
          <year>June 2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>G.</given-names>
            <surname>Adomavicius</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Tuzhilin</surname>
          </string-name>
          .
          <article-title>Context-aware recommender systems</article-title>
          . In F. Ricci,
          <string-name>
            <given-names>L.</given-names>
            <surname>Rokach</surname>
          </string-name>
          , and B. Shapira, editors,
          <source>Recommender Systems Handbook</source>
          , pages
          <volume>191</volume>
          {
          <fpage>226</fpage>
          . Springer,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>A.</given-names>
            <surname>Avizienis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-C.</given-names>
            <surname>Laprie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Randell</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Landwehr</surname>
          </string-name>
          .
          <article-title>Basic concepts and taxonomy of dependable and secure computing</article-title>
          .
          <source>IEEE Trans. Dependable Secur. Comput.</source>
          ,
          <volume>1</volume>
          (
          <issue>1</issue>
          ):
          <volume>11</volume>
          {
          <fpage>33</fpage>
          ,
          <string-name>
            <surname>Jan</surname>
          </string-name>
          .
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>J.</given-names>
            <surname>Bobadilla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ortega</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hernando</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Bernal</surname>
          </string-name>
          .
          <article-title>Generalization of recommender systems: Collaborative ltering extended to groups of users and restricted to groups of items</article-title>
          .
          <source>Expert Syst. Appl.</source>
          ,
          <volume>39</volume>
          (
          <issue>1</issue>
          ):
          <volume>172</volume>
          {
          <fpage>186</fpage>
          ,
          <string-name>
            <surname>Jan</surname>
          </string-name>
          .
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>J.</given-names>
            <surname>Bobadilla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ortega</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hernando</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <surname>A. GutieRrez.</surname>
          </string-name>
          <article-title>Recommender systems survey</article-title>
          .
          <source>Know.-Based Syst.</source>
          ,
          <volume>46</volume>
          :
          <fpage>109</fpage>
          {
          <fpage>132</fpage>
          ,
          <year>July 2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>D.</given-names>
            <surname>Chatzopoulos</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Hui</surname>
          </string-name>
          .
          <article-title>Readme: A real-time recommendation system for mobile augmented reality ecosystems</article-title>
          .
          <source>In Proceedings of the 2016 ACM on Multimedia Conference, MM '16</source>
          , pages
          <fpage>312</fpage>
          {
          <fpage>316</fpage>
          , New York, NY, USA,
          <year>2016</year>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>A.</given-names>
            <surname>Dix</surname>
          </string-name>
          .
          <article-title>Upside down As and algorithms - computational formalisms and theory</article-title>
          .
          <source>HCI Models Theories and Frameworks: Toward a Multidisciplinary Science</source>
          . Morgan Kaufmann,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>M. D. Ekstrand</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Ludwig</surname>
            ,
            <given-names>J. A.</given-names>
          </string-name>
          <string-name>
            <surname>Konstan</surname>
            , and
            <given-names>J. T.</given-names>
          </string-name>
          <string-name>
            <surname>Riedl</surname>
          </string-name>
          .
          <article-title>Rethinking the recommender research ecosystem: Reproducibility, openness, and lenskit</article-title>
          .
          <source>In Proceedings of the Fifth ACM Conference on Recommender Systems, RecSys '11</source>
          , pages
          <fpage>133</fpage>
          {
          <fpage>140</fpage>
          , New York, NY, USA,
          <year>2011</year>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>A.</given-names>
            <surname>Felfernig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Jeran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Ninaus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Reinfrank</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Reiterer</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Stettinger</surname>
          </string-name>
          .
          <article-title>Basic approaches in recommendation systems</article-title>
          . In M. P. Robillard,
          <string-name>
            <given-names>W.</given-names>
            <surname>Maalej</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. J.</given-names>
            <surname>Walker</surname>
          </string-name>
          , and T. Zimmermann, editors,
          <source>Recommendation Systems in Software Engineering</source>
          , pages
          <volume>15</volume>
          {
          <fpage>37</fpage>
          . Springer Berlin Heidelberg, Berlin, Heidelberg,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>Z.</given-names>
            <surname>Gantner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rendle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Freudenthaler</surname>
          </string-name>
          , and L.
          <string-name>
            <surname>Schmidt-Thieme</surname>
          </string-name>
          .
          <article-title>Mymedialite: A free recommender system library</article-title>
          .
          <source>In Proceedings of the Fifth ACM Conference on Recommender Systems, RecSys '11</source>
          , pages
          <fpage>305</fpage>
          {
          <fpage>308</fpage>
          , New York, NY, USA,
          <year>2011</year>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15. I.
          <string-name>
            <surname>Garcia</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Sebastia</surname>
            , and
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Onaindia</surname>
          </string-name>
          .
          <article-title>On the design of individual and group recommender systems for tourism</article-title>
          .
          <source>Expert Syst. Appl.</source>
          ,
          <volume>38</volume>
          (
          <issue>6</issue>
          ):
          <volume>7683</volume>
          {
          <fpage>7692</fpage>
          ,
          <year>June 2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Ghazanfar</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Pru</surname>
          </string-name>
          <article-title>gel-</article-title>
          <string-name>
            <surname>Bennett</surname>
          </string-name>
          .
          <article-title>A scalable, accurate hybrid recommender system</article-title>
          .
          <source>In Third International Conference on Knowledge Discovery and Data Mining, WKDD</source>
          <year>2010</year>
          , Phuket, Thailand,
          <fpage>9</fpage>
          -
          <issue>10</issue>
          <year>January 2010</year>
          , pages
          <fpage>94</fpage>
          {
          <fpage>98</fpage>
          . IEEE Computer Society,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>J. R. Hauser</surname>
            ,
            <given-names>G. L.</given-names>
          </string-name>
          <string-name>
            <surname>Urban</surname>
            , G. Liberali, and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Braun</surname>
          </string-name>
          .
          <article-title>Website morphing</article-title>
          .
          <source>Marketing Science</source>
          ,
          <volume>28</volume>
          (
          <issue>2</issue>
          ):
          <volume>202</volume>
          {
          <fpage>223</fpage>
          ,
          <string-name>
            <surname>Mar</surname>
          </string-name>
          .
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18. H.
          <string-name>
            <surname>Jerbi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Ravat</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Teste</surname>
            , and
            <given-names>G.</given-names>
          </string-name>
          <article-title>Zur uh. Preference-based recommendations for olap analysis</article-title>
          .
          <source>In Proceedings of the 11th International Conference on Data Warehousing and Knowledge Discovery</source>
          ,
          <source>DaWaK '09</source>
          , pages
          <fpage>467</fpage>
          {
          <fpage>478</fpage>
          , Berlin, Heidelberg,
          <year>2009</year>
          . Springer-Verlag.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <given-names>B. P.</given-names>
            <surname>Knijnenburg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Willemsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Gantner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Soncu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Newell</surname>
          </string-name>
          .
          <article-title>Explaining the user experience of recommender systems</article-title>
          .
          <source>User Modeling</source>
          and
          <string-name>
            <surname>User-Adapted</surname>
            <given-names>Interaction</given-names>
          </string-name>
          ,
          <volume>22</volume>
          (
          <issue>4-5</issue>
          ):
          <volume>441</volume>
          {
          <fpage>504</fpage>
          ,
          <string-name>
            <surname>Oct</surname>
          </string-name>
          .
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>Y.</given-names>
            <surname>Koren</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Bell</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Volinsky</surname>
          </string-name>
          .
          <article-title>Matrix factorization techniques for recommender systems</article-title>
          .
          <source>Computer</source>
          ,
          <volume>42</volume>
          (
          <issue>8</issue>
          ):
          <volume>30</volume>
          {
          <fpage>37</fpage>
          ,
          <string-name>
            <surname>Aug</surname>
          </string-name>
          .
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21. G. Linden,
          <string-name>
            <given-names>B.</given-names>
            <surname>Smith</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and J.</given-names>
            <surname>York</surname>
          </string-name>
          . Amazon.
          <article-title>com recommendations: Item-to-item collaborative ltering</article-title>
          .
          <source>IEEE Internet Computing</source>
          ,
          <volume>7</volume>
          (
          <issue>1</issue>
          ):
          <volume>76</volume>
          {
          <fpage>80</fpage>
          ,
          <string-name>
            <surname>Jan</surname>
          </string-name>
          .
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>P.</given-names>
            <surname>Moradi</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Ahmadian</surname>
          </string-name>
          .
          <article-title>A reliability-based recommendation method to improve trust-aware recommender systems</article-title>
          .
          <source>Expert Syst. Appl.</source>
          ,
          <volume>42</volume>
          (
          <issue>21</issue>
          ):
          <volume>7386</volume>
          {
          <fpage>7398</fpage>
          ,
          <string-name>
            <surname>Nov</surname>
          </string-name>
          .
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <given-names>D.</given-names>
            <surname>Navarre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Palanque</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-F.</given-names>
            <surname>Ladry</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Barboni</surname>
          </string-name>
          .
          <article-title>Icos: A model-based user interface description technique dedicated to interactive systems addressing usability, reliability and scalability</article-title>
          .
          <source>ACM Trans. Comput</source>
          .-Hum. Interact.,
          <volume>16</volume>
          (
          <issue>4</issue>
          ):
          <volume>18</volume>
          :1{
          <fpage>18</fpage>
          :
          <fpage>56</fpage>
          ,
          <string-name>
            <surname>Nov</surname>
          </string-name>
          .
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24. S. Neema,
          <string-name>
            <given-names>T.</given-names>
            <surname>Bapty</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Shetty</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Nordstrom</surname>
          </string-name>
          .
          <article-title>Autonomic fault mitigation in embedded systems</article-title>
          .
          <source>Eng. Appl</source>
          . Artif. Intell.,
          <volume>17</volume>
          (
          <issue>7</issue>
          ):
          <volume>711</volume>
          {
          <fpage>725</fpage>
          ,
          <string-name>
            <surname>Oct</surname>
          </string-name>
          .
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25. E. Normand.
          <article-title>Single-event e ects in avionics</article-title>
          .
          <source>IEEE Transactions on Nuclear Science</source>
          ,
          <volume>43</volume>
          (
          <issue>2</issue>
          ):
          <volume>461</volume>
          {
          <fpage>474</fpage>
          ,
          <string-name>
            <surname>Apr</surname>
          </string-name>
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>C. Porcel</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Tejeda-Lorente</surname>
            ,
            <given-names>M. A.</given-names>
          </string-name>
          <article-title>Mart nez, and</article-title>
          <string-name>
            <given-names>E.</given-names>
            <surname>Herrera-Viedma</surname>
          </string-name>
          .
          <article-title>A hybrid recommender system for the selective dissemination of research resources in a technology transfer o ce</article-title>
          .
          <source>Inf. Sci.</source>
          ,
          <volume>184</volume>
          (
          <issue>1</issue>
          ):1{
          <fpage>19</fpage>
          ,
          <string-name>
            <surname>Feb</surname>
          </string-name>
          .
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <given-names>J. Reason. Human</given-names>
            <surname>Error</surname>
          </string-name>
          . Cambridge University Press,
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <given-names>F.</given-names>
            <surname>Ricci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Rokach</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Shapira</surname>
          </string-name>
          .
          <article-title>Introduction to recommender systems handbook</article-title>
          . In F. Ricci,
          <string-name>
            <given-names>L.</given-names>
            <surname>Rokach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Shapira</surname>
          </string-name>
          , and P. B. Kantor, editors,
          <source>Recommender Systems Handbook</source>
          , pages
          <fpage>1</fpage>
          <lpage>{</lpage>
          35. Springer,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Robillard</surname>
          </string-name>
          and
          <string-name>
            <given-names>R. J.</given-names>
            <surname>Walker</surname>
          </string-name>
          .
          <article-title>An introduction to recommendation systems in software engineering</article-title>
          . In M. P. Robillard,
          <string-name>
            <given-names>W.</given-names>
            <surname>Maalej</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. J.</given-names>
            <surname>Walker</surname>
          </string-name>
          , and T. Zimmermann, editors,
          <source>Recommendation Systems in Software Engineering</source>
          , pages
          <fpage>1</fpage>
          <lpage>{</lpage>
          11. Springer,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <given-names>A.</given-names>
            <surname>Said</surname>
          </string-name>
          and
          <string-name>
            <surname>A.</surname>
          </string-name>
          <article-title>Bellog n. Replicable evaluation of recommender systems</article-title>
          .
          <source>In Proceedings of the 9th ACM Conference on Recommender Systems, RecSys '15</source>
          , pages
          <fpage>363</fpage>
          {
          <fpage>364</fpage>
          , New York, NY, USA,
          <year>2015</year>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <given-names>B.</given-names>
            <surname>Schroeder</surname>
          </string-name>
          , E. Pinheiro, and W.-D. Weber.
          <article-title>Dram errors in the wild: A large-scale eld study</article-title>
          .
          <source>SIGMETRICS Perform. Eval. Rev.</source>
          ,
          <volume>37</volume>
          (
          <issue>1</issue>
          ):
          <volume>193</volume>
          {
          <fpage>204</fpage>
          ,
          <year>June 2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <given-names>P.</given-names>
            <surname>Traverse</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Lacaze</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Souyris</surname>
          </string-name>
          .
          <article-title>Airbus y-by-wire - A total approach to dependability</article-title>
          . In R. Jacquart, editor,
          <source>Building the Information Society, IFIP 18th World Computer Congress, Topical Sessions</source>
          ,
          <fpage>22</fpage>
          -27
          <source>August</source>
          <year>2004</year>
          , Toulouse, France, volume
          <volume>156</volume>
          <source>of IFIP</source>
          , pages
          <volume>191</volume>
          {
          <fpage>212</fpage>
          . Kluwer/Springer,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <given-names>Y. C.</given-names>
            <surname>Yeh</surname>
          </string-name>
          .
          <article-title>Triple-triple redundant 777 primary ight computer</article-title>
          .
          <source>In 1996 IEEE Aerospace Applications Conference. Proceedings</source>
          , volume
          <volume>1</volume>
          , pages
          <fpage>293</fpage>
          <lpage>{</lpage>
          307 vol.
          <volume>1</volume>
          ,
          <string-name>
            <surname>Feb</surname>
          </string-name>
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>