<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A List of Pre-Requisites to Make Recommender Systems Deployable in Critical Context</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">E</forename><surname>Bouzekri</surname></persName>
							<email>elodie.bouzekri@irit.fr</email>
							<affiliation key="aff0">
								<orgName type="department">ICS-IRIT</orgName>
								<orgName type="institution">University of Toulouse</orgName>
								<address>
									<addrLine>118, route de Narbonne</addrLine>
									<postCode>31042</postCode>
									<settlement>Toulouse</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">A</forename><surname>Canny</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">ICS-IRIT</orgName>
								<orgName type="institution">University of Toulouse</orgName>
								<address>
									<addrLine>118, route de Narbonne</addrLine>
									<postCode>31042</postCode>
									<settlement>Toulouse</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">C</forename><surname>Fayollas</surname></persName>
							<email>fayollas@irit.fr</email>
							<affiliation key="aff0">
								<orgName type="department">ICS-IRIT</orgName>
								<orgName type="institution">University of Toulouse</orgName>
								<address>
									<addrLine>118, route de Narbonne</addrLine>
									<postCode>31042</postCode>
									<settlement>Toulouse</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">C</forename><surname>Martinie</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">ICS-IRIT</orgName>
								<orgName type="institution">University of Toulouse</orgName>
								<address>
									<addrLine>118, route de Narbonne</addrLine>
									<postCode>31042</postCode>
									<settlement>Toulouse</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">P</forename><surname>Palanque</surname></persName>
							<email>palanque@irit.fr</email>
							<affiliation key="aff0">
								<orgName type="department">ICS-IRIT</orgName>
								<orgName type="institution">University of Toulouse</orgName>
								<address>
									<addrLine>118, route de Narbonne</addrLine>
									<postCode>31042</postCode>
									<settlement>Toulouse</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">E</forename><surname>Barboni</surname></persName>
							<email>barboni@irit.fr</email>
							<affiliation key="aff0">
								<orgName type="department">ICS-IRIT</orgName>
								<orgName type="institution">University of Toulouse</orgName>
								<address>
									<addrLine>118, route de Narbonne</addrLine>
									<postCode>31042</postCode>
									<settlement>Toulouse</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Y</forename><surname>Deleris</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">AIRBUS Operations</orgName>
								<address>
									<addrLine>316 Route de Bayonne</addrLine>
									<postCode>31060</postCode>
									<settlement>Toulouse</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">C</forename><surname>Gris</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">AIRBUS Operations</orgName>
								<address>
									<addrLine>316 Route de Bayonne</addrLine>
									<postCode>31060</postCode>
									<settlement>Toulouse</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A List of Pre-Requisites to Make Recommender Systems Deployable in Critical Context</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">4DF6268BFD836F9D10DFEACA074DEA47</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T05:40+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Automation</term>
					<term>recommender systems</term>
					<term>automation</term>
					<term>operator tasks</term>
					<term>dependability</term>
					<term>certification</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In the academic area, recommender systems have received a lot of attention in the recent years (see for instance the increasing success of the RecSys conference). This success has also reached industry and the general public via large platforms such as Amazon or Netflix. The recommender systems present multiple benefits that can be attributed to automation by means of the migration of function from the operator to the Recommender System itself. Depending on the type of recommender system, these functions can cover: support to perception of information, support to identification of potentially relevant elements, support to the selection of one element amongst a list... Despite their widespread use, their development has not reached the level of maturity required for the deployment in the context of critical command and control systems. This position paper identifies some pre-requisite for making recommender systems deployable in critical context of critical systems.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Recommender Systems (RS) are nowadays widely used in the area of consumer electronics and home entertainment. They are exploited by large companies (such as Amazon in the area of e-commerce <ref type="bibr" target="#b16">[17]</ref>) and used by millions of users (e.g. 93 million for Netflix <ref type="bibr" target="#b0">[1]</ref>). The main target for RS designers and developers has been accuracy as demonstrated in <ref type="bibr" target="#b21">[22]</ref>. More recently, focus has moved to other perceived quality of use such as user experience and specific attributes of this quality factor <ref type="bibr" target="#b18">[19]</ref>. Despite all these efforts, engineering recommender systems follows craft processes and remain far away from software engineering practices. Contributions such as <ref type="bibr" target="#b21">[22]</ref> address reliability but only in the sense of reliability of users (in the information they provide to the system) and <ref type="bibr" target="#b28">[29]</ref> only consider recommender systems in software engineering i.e. how a recommender system could help software engineers.</p><p>As for the development of RS, several platforms have been proposed throughout the years starting with Lenskit <ref type="bibr" target="#b11">[12]</ref>. Other open source platforms for developing RS have been proposed such as ?? or <ref type="bibr" target="#b13">[14]</ref> focusing on the integration of various algorithms implementing the main types of RS (e.g. item-based, knowledgebased, collaborative ...). Assessing which platform produces better results has also been identified as a challenge that RiVal <ref type="bibr" target="#b29">[30]</ref> is meant to address.</p><p>The software engineering aspects of RS thus remain mainly an untouched problem whose challenges range from requirements and specification to validation and verification and are not covered by generic programming platforms.</p><p>This position paper intent to highlight the pre-requisite related to the software engineering of recommender systems to be deployed in a critical context. Next section introduces briefly the main characteristics of recommender systems and highlights their role as automation of users' tasks. The following introduces both the challenges raised by critical systems engineering and the tools and methods that have to be used to ensure adequate levels of dependability. Through this list, we elicit a list of requirements that recommender systems should meet to be eligible for deployment in critical context. Last section presents the ECAM concept of civil aircrafts and highlights how its functioning could be extended to cover more functions of recommender systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Brief Introduction to Recommender Systems</head><p>This section presents the characteristics of recommender systems and makes explicit their role as automation of users' tasks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">What are recommender systems</head><p>Recommender Systems (RSs) are "software tools and techniques providing suggestions for items to be of use to a user or a group of users" <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b14">15,</ref><ref type="bibr" target="#b27">28]</ref>. The RSs provides support for the process of decision-making for a user or a group of users. Recommendations are predictions of the most suitable items based on user's preferences <ref type="bibr" target="#b27">[28]</ref>. An "Item" is the general term referring to what the system recommends to users <ref type="bibr" target="#b27">[28]</ref>. They also argue that a RS normally focuses on a specific type of item (e.g., product, news or command) and that the user interface has to be designed accordingly.</p><p>Recommender systems implement one of the following recommendation methods <ref type="bibr" target="#b4">[5]</ref>:</p><p>-Memory-based: heuristics that make rating predictions based on all rated items by the users. -"Model-based": a machine-learning algorithm updates a model from rated items to make rating predictions.</p><p>Types of RSs Recommender systems can implement several types of filtering, following the sources of information and algorithm used for the filtering. These filtering can be: collaborative filtering (e.g. <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b19">20]</ref>), content-based filtering (e.g. <ref type="bibr" target="#b8">[9]</ref>), knowledge-based filtering (e.g. <ref type="bibr" target="#b12">[13]</ref>) and hybrid filtering (e.g. <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b25">26]</ref>) or demographic filtering (e.g. <ref type="bibr" target="#b8">[9]</ref>) that predict absolute value of ratings.</p><p>In addition, other recommender systems predict relative preferences for users and not absolute values. Jerbi et al. <ref type="bibr" target="#b17">[18]</ref> presents a preference-based recommender system that uses the past queries of the user to generate recommendations.</p><p>The RSs include more and more criteria to improve the quality of recommendations and take into account the context <ref type="bibr" target="#b5">[6]</ref>: real-time recommendations (e.g. the one used by Amazon <ref type="bibr" target="#b20">[21]</ref>), location awareness (e.g. <ref type="bibr" target="#b9">[10]</ref>) and recommendation for a group of users (e.g. <ref type="bibr" target="#b7">[8]</ref>) for example.</p><p>Tasks when interacting with a RS Recommender systems provide support for particular types of user goals. The tasks to be performed in order for the user to reach their goal are both generic (i.e. supported by most recommender systems e.g. "browse recommendations") and specific (i.e. only supported by a given recommender system e.g. "find director of the recommended movie"). List of generic tasks are provided in the literature <ref type="bibr" target="#b27">[28]</ref> and can be seen as generic requirements for recommender systems in order to support users goals. When using a RS, users target the accomplishment of the following goals:</p><p>-Find some good items / Find all good items -Find a recommended sequence of items -Find a recommended bundle of items -Browse the proposed list of items -Look in detail at one recommended item -Annotate in context the item under consideration -Improve my profile / Express myself -Help others / Influence others</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Recommender systems as partly-autonomous interactive systems</head><p>Recommender systems execute functions that users were previously performing on their own. Fig. <ref type="figure" target="#fig_0">1</ref> depicts the functions performed by the RSs with respects to the stages of human information processing:</p><p>-Sensory processing stage: RS filters, ranks and highlight recommended items. Localization of the information from the recommender system might deeply affect that sensing. -Perception/working memory: RS reminds items to the users by duplicating them or recalls items by repeating them. In addition, RS filters items and presents only the relevant items for the user or the group of users. Human errors such as interference, overshooting a stop rule... <ref type="bibr" target="#b26">[27]</ref> and thus should be avoided (and if not possible shall be detected, recovered or mitigated). -Decision-making: RS filters recommendation by ordering information about items presented. It brands one or several recommendations by highlighting information that are interesting for the user. -Response selection: RS enables the user to select one of the recommendation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Recommender Systems in Critical Context</head><p>Currently, there is no recommender system deployed in critical contexts. However, as detailed above, recommender systems present multiple benefits that can be attributed to automation by means of the migration of function from the operator to the Recommender System itself. Depending on the type of recommender system, these functions can cover: support to perception of information, support to identification of potentially relevant elements, support to the selection of one element amongst a list... These automation means could be useful in supporting operators' activities in critical context. For instance, in the avionics domain, aircrafts pilots have to manage all of the aircraft systems through the cockpit (the flight deck). The cockpit is a really complex environment and the use of automation is mandatory to support the pilots' activities. The use of recommender systems in this context may, for instance, help the pilots in choosing an action from a multitude. The example of how a recommender system may be useful in an aircraft cockpit is detailed in the last section of this paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Critical Systems Engineering</head><p>This section highlights the software engineering and dependability context of critical systems development. We use this presentation as a mean for identifying 12 requirements to address when engineering recommender systems for a critical context.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Dependability for critical systems</head><p>Building dependable critical systems is a cumbersome task that raises the need to identify and treat the threats that can impair their functioning. In the perspective of identifying all of those threats, Avizienis et al. <ref type="bibr" target="#b6">[7]</ref> have defined a typology of all the faults and errors that can impair a computing system. This typology leads to the identification of 31 elementary classes of faults. Fig. <ref type="figure" target="#fig_1">3</ref> presents a simplified view of this typology. It makes explicit the two main categories of faults (top level of the figure): i) the ones occurring at development time (including bad designs, programming errors,...) and ii) the one occurring at operation times (right-hand side of the figure including user error such as slips, lapses and mistakes as defined in <ref type="bibr" target="#b25">[26]</ref>). This Figure organizes the leaves of the typology in five different groups, each of them bringing a different issue that has to be addressed:</p><p>-Development software faults (issue 1): software faults introduced by a human during the system development.</p><p>-Malicious faults (issue 2): faults introduced by human with the deliberate objective of damaging the system (e.g. causing service denial or crash of the system). -Development hardware faults (issue 3): natural (e.g. caused by a natural phenomenon without human involvement) and human-made faults affecting the hardware during its development.</p><p>-Operational natural faults (issue 4): faults caused by a natural phenomenon without human participation, affecting the hardware and occurring during the service of the system. As they affect hardware, they are likely to damage software as well. -Operational human-errors (issue 5): faults resulting from human action during the use of the system. These faults are particularly of interest for interactive system and the next subsection describe them in detail.</p><p>Fig. <ref type="figure">2</ref>. Typology of faults in computing systems (adapted from <ref type="bibr" target="#b6">[7]</ref>) and associated issues for the resilience of these systems.</p><p>We consider that development hardware faults (that are more on the electronic side of computing) and malicious faults (that are a separated concern in the avionics domain for now) are beyond the scope of this paper. Each remaining branch of this classification of faults calls for specific engineering methods, processes and tools to be used and followed for developing recommender systems to be used in a critical context.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Regulation for critical systems</head><p>Several types of standards rule the development and operation of critical systems.</p><p>In this article, we focus on standards that define processes and methods for the development of interactive software applications in aeronautics. Regulation for software development DO-178C <ref type="bibr" target="#b2">[3]</ref> defines Development Assurance Levels (DAL) for commercial software-based aerospace systems. These levels correspond to failure condition categories defined by certification authorities such as EASA (European Aviation Safety Agency) or FAA (Federal Aviation Administration). Table <ref type="table" target="#tab_0">1</ref> presents the five Development Assurance Levels associated with their failure condition category and its description (summarized from the EASA CS-25 standard <ref type="bibr" target="#b3">[4]</ref>). As presented in the first row of Table <ref type="table" target="#tab_0">1</ref>, a failure having catastrophic consequences (failure condition column) must not occur more often than once per 10-9 hours of functioning (failure rate column). According to the standard DO 178-C, the first two rows of Table <ref type="table" target="#tab_0">1</ref> (colored in grey) correspond to so-called critical systems while systems in the lower rows are called non critical.</p><p>Requirement1: DAL level of recommender system must be identified.</p><p>Requirement2: Development methods used for the recommender system must be adequate with the identified level of DAL.</p><p>It is important to note that DAL levels can also be ensured by the availability of redundant systems of a lower DAL. This means that systems not developed following DAL A constraints could be used for systems with potentially catastrophic failure conditions, provided it exists redundant systems of a lower DAL.</p><p>Interactive systems for flight crew The Certification Specification 25 (CS 25) standard <ref type="bibr" target="#b3">[4]</ref> specifies, in its section 1302 named "Installed systems and equipment for use of the flight crew", that the cockpit must allow the crew to perform safely all of their tasks and that the cockpit must not lead to error prone behaviors. In addition to requirements, the CS 25 standard provides a list of Acceptable Means of Compliances (AMC), which are acceptable means of showing compliance with the requirements. Fig. <ref type="figure" target="#fig_1">3</ref> depicts an excerpt of these means of compliance for systems that contain automation (see <ref type="bibr" target="#b3">[4]</ref>, page 2-F-20).</p><p>Requirement3: Tasks performed by the operator using the recommender system should be explicitly described.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Requirement4:</head><p>The functions of the recommender system should support all the tasks identified.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Requirement5:</head><p>The presentation and interaction with the recommender system must not be error prone.</p><p>Requirement6: As the recommender system automates flight crew tasks, the design of this specific automation shall follow guidelines on automation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Requirement7:</head><p>The automation behavior should be as dependable as the other part of the recommender systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Model-based approaches for dealing with faults during development</head><p>Model-based approaches and in particular formal model-based approaches provide support for the design and analysis of interactive systems. They are a mean to analyze in a complete and unambiguous way the interactions between a user and a system <ref type="bibr" target="#b22">[23]</ref>. Several types of approaches have been developed <ref type="bibr" target="#b10">[11]</ref>, which encompass contributions about formal description of an interactive system and/or formal verification of its properties. For example, developing a system of a DAL A or B now requires the use of formal description techniques according to DO-178C supplement 330 <ref type="bibr" target="#b1">[2]</ref>. This supplement defines the overall analysis process (depicted in Fig. <ref type="figure" target="#fig_2">4</ref>) that developers of aircraft systems must apply.</p><p>In this process, presented in Fig. <ref type="figure" target="#fig_2">4</ref>, software engineers have to rely on the software requirements ("shall" statement) to develop a model of the system and, independently, they have to express the same requirements in the format of CTL properties. A formal analysis model integrates the system model and the properties. A model checker takes the analysis model as input and generate a counterexample if a property of the system does not hold.</p><p>Requirement8: High-level requirements for the recommender system shall be formally described.</p><p>Requirement9: Behavior of the recommender system shall be described using formal methods.</p><p>Requirement10: Compatibility between behavioral descriptions and highlevel requirements shall be checked using verifications techniques.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4">Approaches for dealing with natural faults during operations</head><p>The issue of operational natural faults must be addressed, more particularly when dealing with the avionics domain as a higher probability of occurrence of these faults <ref type="bibr" target="#b30">[31]</ref> concerns systems deployed in the high atmosphere (e.g., aircrafts <ref type="bibr" target="#b24">[25]</ref>) or in space (e.g., manned spacecraft). As the operational natural faults are unpredictable and unavoidable, the dedicated approach for dealing  with them is fault-tolerance <ref type="bibr" target="#b6">[7]</ref> that can be achieved through specialized faulttolerant architectures (such as the COM-MON architecture <ref type="bibr" target="#b31">[32]</ref>), by adding redundancy (e.g. <ref type="bibr" target="#b32">[33]</ref> or diversity using multiple versions of the same software or by fault mitigation (reducing the severity of faults using barriers or healing behaviors <ref type="bibr" target="#b23">[24]</ref>).</p><p>Requirement11: Fault-tolerant mechanisms shall be embedded in the implementation of the recommender system (at least to support detection of faults).</p><p>Requirement12: Effective fault-tolerance of the recommender system shall be checked using, for instance, fault-injection techniques.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5">Summary of the Identified Requirements</head><p>In this section, we identified 12 requirements to address when engineering recommender systems for a critical context. These requirements cover both the certification aspects (more particularly in the avionic domain) and the dependability aspects of critical systems. They also cover properties specific to interactive systems (such as usability aspects). It is important to note that the some of these requirements are specific to recommender systems (e.g.requirement 6) while others (e.g.requirement 12) are generic for interactive applications deployed in the cockpit. Finally, while these requirements might not be exhaustive, they depict a first draft of the issues that have to be addressed to deploy recommender systems and call for methods from the area of software engineering, dependable computing and human-computer interaction to address them. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">An Illustrative Example of Recommender System in Aircraft Cockpit</head><p>Currently, there is no recommender system deployed in critical contexts. In the avionics domain, this is due (in particular) to the lack of means to ensure their dependability. However, the concepts underlying recommender systems (e.g. restriction of choices from a multitude) could be useful in supporting operators' activities. This section presents a system from large commercial aircraft that could be a good candidate to become a recommender system in future programs. This section first presents the current concepts of the ECAM (Electronic Centralized Aircraft Monitor) and then highlights what would be required for its engineering in order to embed recommender systems' philosophy.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Overview of the ECAM</head><p>The ECAM, in the Airbus family, monitors aircraft systems (e.g., the engines) and relays to the pilots data about their state (e.g., if their use is limited due to a failure) as well as the procedures that have to be achieved by the pilots to recover from a failure. The ECAM is in charge of the processing of data from the monitoring of the aircraft systems and produces:</p><p>-The display of information about the status of the aircraft systems parameters. In the example of the Airbus A380, this display is done on the System Display (SD in Fig. <ref type="figure" target="#fig_3">5</ref>). -The display of alerts about system failures and procedures that have to be completed by the pilot to manage the detected warning. In the example of the Airbus A380, this display is done on Warning Display (WD in Fig. <ref type="figure" target="#fig_3">5</ref>). -Aural and visual alerts -also called attention getters (using several lights and loudspeakers in the cockpit).</p><p>Fig. <ref type="figure" target="#fig_4">6</ref> presents an example of the display of warning messages (one "APU FIRE" called red warning on line L1) and its associated recovery procedure on the Warning Display. In this example, the pilots are informed that a fire has been detected within the APU (Auxiliary Power Unit) system. The APU system provides bleed and electricity to the aircraft and consumes fuel. In case of failure, among others, the APU can trigger APU FAULT and APU FIRE alarms. The corresponding recovery procedure first indicates to the pilots that they have to land as soon as possible ("LAND ASAP" indication onL2). Then, they first have to push the "APU FIRE" pushbutton (L3) and shut off the "APU BLEED" service (L4). Then, if the fire is still present after 10 seconds (L5), they have to discharge an agent (L6) to stop the fire and to shut the APU off (L7).</p><p>If the Flight Warning System processes simultaneously several warning messages, it sorts them, in order to obtain a display order, according to three mechanisms:</p><p>-Their relationship with others warning messages: some warning messages may be inhibited in case of presence of others warning messages (for instance, the "APU FAULT" warning message is not displayed if the "APU FIRE" is already detected); -The current flight phase: some warning messages are only displayed when the aircraft is in a given flight phase (for instance, flight management systems failures are not displayed after landing); -Their priority level: a priority level is associated to each alert message in order to prioritize the more critical ones.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Flight Warning System as a Recommender System</head><p>The processing of warning messages (as presented above) is similar to the filtering activity of a recommender system. Indeed, only some of the potential messages are presented to the pilot according to the context (e.g. flight phases or other messages). However, this filtering could be extended to other aspects (beyond context) such as feedback from other pilots who performed the same procedure (this is called collaborative filtering). Beyond that, FWS only presents one list of procedures at a time to the pilot. Procedures are sorted by order of priority and should be performed in that order by the pilot even though within a given procedure, options are offered. Exploiting recommender systems functionalities would allow presenting alternatives to the pilots that could select the most appropriate procedure to perform according to information that is not present in the system (for instance, in case of a LAND ASAP, the selection of the most practical airport for the airline to repair the aircraft).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Summary and Conclusions</head><p>To our knowledge, recommender systems have not been deployed in critical contexts. This position paper has first presented how the use of recommender systems in critical context could be helpful to support the operators' activities.</p><p>The paper has then presented the issues that have to be addressed in order to deploy recommender systems in a critical context. We have made explicit those issues as a list of 12 requirements that call for methods in the area of software engineering, dependable computing and human-computer interaction to address them. Finally, the paper has presented an illustrative example of recommender system in an aircraft cockpit for supporting the pilots' activities while managing aircraft systems failures.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. RSs automation of Four-stages model of Human information processing.</figDesc><graphic coords="4,134.77,116.83,316.80,167.62" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Excerpt of the Book 2 of EASA Certification Specification 25.</figDesc><graphic coords="8,134.77,409.99,345.15,231.26" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Analysis process from DO-178C supplement 330.</figDesc><graphic coords="9,134.77,116.83,342.01,173.26" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. Warning and system displays in A380 cockpit.</figDesc><graphic coords="10,134.77,116.83,346.04,171.79" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Fig. 6 .</head><label>6</label><figDesc>Fig. 6. Example of the display of warning messages on the Warning Display.</figDesc><graphic coords="11,175.68,116.83,264.00,115.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 .</head><label>1</label><figDesc>Development Assurance Level for civil aircraft.</figDesc><table><row><cell>Development</cell><cell>Failure</cell><cell>Description of the failure</cell><cell>Failure rate</cell></row><row><cell>Assurance</cell><cell>condition</cell><cell>conditions</cell><cell>(failures/hour)</cell></row><row><cell>Level</cell><cell>categories</cell><cell></cell><cell></cell></row><row><cell>A</cell><cell cols="2">Catastrophic Failure conditions that may</cell><cell>Extremely</cell></row><row><cell></cell><cell></cell><cell>cause a crash</cell><cell>improbable</cell></row><row><cell></cell><cell></cell><cell></cell><cell>10 −9 +fail safe</cell></row><row><cell>B</cell><cell>Hazardous</cell><cell>Failure has a large negative</cell><cell>Extremely</cell></row><row><cell></cell><cell></cell><cell>impact or performance, Or</cell><cell>remote</cell></row><row><cell></cell><cell></cell><cell>reduces the ability of crew to</cell><cell>10 −7</cell></row><row><cell></cell><cell></cell><cell>operate the plane</cell><cell></cell></row><row><cell>C</cell><cell>Major</cell><cell>Failure is significant, but</cell><cell>Remote</cell></row><row><cell></cell><cell></cell><cell>has lesser impact than haz-</cell><cell>10 −5</cell></row><row><cell></cell><cell></cell><cell>ardous</cell><cell></cell></row><row><cell>D</cell><cell>Minor</cell><cell>Failure is noticeable, but has</cell><cell>Probable</cell></row><row><cell></cell><cell></cell><cell>lesser impact than Major</cell><cell>10 −3</cell></row><row><cell>E</cell><cell>No safety</cell><cell cols="2">No impact on dependability Any range</cell></row><row><cell></cell><cell>effect</cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work has been partially founded by the project SEFA IKKY (Intégration du KoKpit et de ses sYstèmes) under the convention number #IA-2016-08-02 (Programme d'Investissement Avenir).</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<ptr target="https://www.statista.com/statistics/250934/quarterly-number-of-netflix-streaming-subscribers-worldwide/" />
		<title level="m">Netflix users statistics</title>
				<imprint>
			<date type="published" when="2017-03">March 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><surname>Do-</surname></persName>
		</author>
		<title level="m">Formal Methods Supplement to DO-178C and DO-278A</title>
				<imprint>
			<publisher>RTCA and EUROCAE</publisher>
			<date type="published" when="2011-12">December 2011</date>
			<biblScope unit="page">333</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Software Considerations in Airborne Systems and Equipment Certification</title>
		<idno>DO-178C</idno>
	</analytic>
	<monogr>
		<title level="m">ED-12C</title>
				<imprint>
			<publisher>RTCA and EUROCAE</publisher>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<idno>CS-25</idno>
		<title level="m">Amendment 17 -Certification Specifications and Acceptable Means of Compliance for Large Aeroplanes</title>
				<imprint>
			<publisher>EASA</publisher>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions</title>
		<author>
			<persName><forename type="first">G</forename><surname>Adomavicius</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Tuzhilin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. on Knowl. and Data Eng</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="734" to="749" />
			<date type="published" when="2005-06">June 2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Context-aware recommender systems</title>
		<author>
			<persName><forename type="first">G</forename><surname>Adomavicius</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Tuzhilin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Recommender Systems Handbook</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Ricci</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Rokach</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Shapira</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="191" to="226" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Basic concepts and taxonomy of dependable and secure computing</title>
		<author>
			<persName><forename type="first">A</forename><surname>Avizienis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-C</forename><surname>Laprie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Randell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Landwehr</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Dependable Secur. Comput</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="11" to="33" />
			<date type="published" when="2004-01">Jan. 2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Generalization of recommender systems: Collaborative filtering extended to groups of users and restricted to groups of items</title>
		<author>
			<persName><forename type="first">J</forename><surname>Bobadilla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Ortega</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hernando</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bernal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Expert Syst. Appl</title>
		<imprint>
			<biblScope unit="volume">39</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="172" to="186" />
			<date type="published" when="2012-01">Jan. 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Recommender systems survey</title>
		<author>
			<persName><forename type="first">J</forename><surname>Bobadilla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Ortega</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hernando</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gutiérrez</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Know.-Based Syst</title>
		<imprint>
			<biblScope unit="volume">46</biblScope>
			<biblScope unit="page" from="109" to="132" />
			<date type="published" when="2013-07">July 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Readme: A real-time recommendation system for mobile augmented reality ecosystems</title>
		<author>
			<persName><forename type="first">D</forename><surname>Chatzopoulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Hui</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2016 ACM on Multimedia Conference, MM &apos;16</title>
				<meeting>the 2016 ACM on Multimedia Conference, MM &apos;16<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="312" to="316" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Upside down As and algorithms -computational formalisms and theory</title>
		<author>
			<persName><forename type="first">A</forename><surname>Dix</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">HCI Models Theories and Frameworks: Toward a Multidisciplinary Science</title>
				<imprint>
			<publisher>Morgan Kaufmann</publisher>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Rethinking the recommender research ecosystem: Reproducibility, openness, and lenskit</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">D</forename><surname>Ekstrand</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ludwig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Konstan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">T</forename><surname>Riedl</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Fifth ACM Conference on Recommender Systems, RecSys &apos;11</title>
				<meeting>the Fifth ACM Conference on Recommender Systems, RecSys &apos;11<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="133" to="140" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Basic approaches in recommendation systems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Felfernig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Jeran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Ninaus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Reinfrank</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Reiterer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Stettinger</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Recommendation Systems in Software Engineering</title>
				<editor>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Robillard</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">W</forename><surname>Maalej</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Walker</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Zimmermann</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg; Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="15" to="37" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Mymedialite: A free recommender system library</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Gantner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rendle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Freudenthaler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Schmidt-Thieme</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Fifth ACM Conference on Recommender Systems, RecSys &apos;11</title>
				<meeting>the Fifth ACM Conference on Recommender Systems, RecSys &apos;11<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="305" to="308" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">On the design of individual and group recommender systems for tourism</title>
		<author>
			<persName><forename type="first">I</forename><surname>Garcia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Sebastia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Onaindia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Expert Syst. Appl</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="7683" to="7692" />
			<date type="published" when="2011-06">June 2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">A scalable, accurate hybrid recommender system</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Ghazanfar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Prügel-Bennett</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Third International Conference on Knowledge Discovery and Data Mining, WKDD 2010</title>
				<meeting><address><addrLine>Phuket, Thailand</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2010-01-10">9-10 January 2010. 2010</date>
			<biblScope unit="page" from="94" to="98" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Website morphing</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">R</forename><surname>Hauser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">L</forename><surname>Urban</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Liberali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Braun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Marketing Science</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="202" to="223" />
			<date type="published" when="2009-03">Mar. 2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Preference-based recommendations for olap analysis</title>
		<author>
			<persName><forename type="first">H</forename><surname>Jerbi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Ravat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Teste</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Zurfluh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 11th International Conference on Data Warehousing and Knowledge Discovery, DaWaK &apos;09</title>
				<meeting>the 11th International Conference on Data Warehousing and Knowledge Discovery, DaWaK &apos;09<address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="467" to="478" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Explaining the user experience of recommender systems</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">P</forename><surname>Knijnenburg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Willemsen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Gantner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Soncu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Newell</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">User Modeling and User-Adapted Interaction</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">4-5</biblScope>
			<biblScope unit="page" from="441" to="504" />
			<date type="published" when="2012-10">Oct. 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Matrix factorization techniques for recommender systems</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Koren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Bell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Volinsky</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="30" to="37" />
			<date type="published" when="2009-08">Aug. 2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">com recommendations: Item-to-item collaborative filtering</title>
		<author>
			<persName><forename type="first">G</forename><surname>Linden</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Smith</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>York</surname></persName>
		</author>
		<author>
			<persName><surname>Amazon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Internet Computing</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="76" to="80" />
			<date type="published" when="2003-01">Jan. 2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">A reliability-based recommendation method to improve trust-aware recommender systems</title>
		<author>
			<persName><forename type="first">P</forename><surname>Moradi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ahmadian</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Expert Syst. Appl</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="issue">21</biblScope>
			<biblScope unit="page" from="7386" to="7398" />
			<date type="published" when="2015-11">Nov. 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Icos: A model-based user interface description technique dedicated to interactive systems addressing usability, reliability and scalability</title>
		<author>
			<persName><forename type="first">D</forename><surname>Navarre</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Palanque</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-F</forename><surname>Ladry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Barboni</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Comput.-Hum. Interact</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page">56</biblScope>
			<date type="published" when="2009-11">Nov. 2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Autonomic fault mitigation in embedded systems</title>
		<author>
			<persName><forename type="first">S</forename><surname>Neema</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Bapty</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Shetty</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Nordstrom</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Eng. Appl. Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page" from="711" to="725" />
			<date type="published" when="2004-10">Oct. 2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Single-event effects in avionics</title>
		<author>
			<persName><forename type="first">E</forename><surname>Normand</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Nuclear Science</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="461" to="474" />
			<date type="published" when="1996-04">Apr 1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">A hybrid recommender system for the selective dissemination of research resources in a technology transfer office</title>
		<author>
			<persName><forename type="first">C</forename><surname>Porcel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Tejeda-Lorente</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Martínez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Herrera-Viedma</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Inf. Sci</title>
		<imprint>
			<biblScope unit="volume">184</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="1" to="19" />
			<date type="published" when="2012-02">Feb. 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<title level="m" type="main">Human Error</title>
		<author>
			<persName><forename type="first">J</forename><surname>Reason</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1990">1990</date>
			<publisher>Cambridge University Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Introduction to recommender systems handbook</title>
		<author>
			<persName><forename type="first">F</forename><surname>Ricci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Rokach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Shapira</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Recommender Systems Handbook</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Ricci</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Rokach</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Shapira</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><forename type="middle">B</forename><surname>Kantor</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="1" to="35" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">An introduction to recommendation systems in software engineering</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Robillard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Walker</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Recommendation Systems in Software Engineering</title>
				<editor>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Robillard</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">W</forename><surname>Maalej</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Walker</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Zimmermann</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="1" to="11" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Replicable evaluation of recommender systems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Said</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bellogín</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 9th ACM Conference on Recommender Systems, RecSys &apos;15</title>
				<meeting>the 9th ACM Conference on Recommender Systems, RecSys &apos;15<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="363" to="364" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Dram errors in the wild: A large-scale field study</title>
		<author>
			<persName><forename type="first">B</forename><surname>Schroeder</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Pinheiro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W.-D</forename><surname>Weber</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SIGMETRICS Perform. Eval. Rev</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="193" to="204" />
			<date type="published" when="2009-06">June 2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Airbus fly-by-wire -A total approach to dependability</title>
		<author>
			<persName><forename type="first">P</forename><surname>Traverse</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Lacaze</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Souyris</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Building the Information Society, IFIP 18th World Computer Congress, Topical Sessions</title>
				<editor>
			<persName><forename type="first">R</forename><surname>Jacquart</surname></persName>
		</editor>
		<meeting><address><addrLine>Toulouse, France</addrLine></address></meeting>
		<imprint>
			<publisher>Kluwer/Springer</publisher>
			<date type="published" when="2004-08-27">22-27 August 2004. 2004</date>
			<biblScope unit="volume">156</biblScope>
			<biblScope unit="page" from="191" to="212" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Triple-triple redundant 777 primary flight computer</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">C</forename><surname>Yeh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE Aerospace Applications Conference. Proceedings</title>
				<imprint>
			<date type="published" when="1996-02">1996. Feb 1996</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="293" to="307" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
