<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Documentation of Non-Functional Requirements for Systems with Machine Learning Components</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Elma Bajraktari</string-name>
          <email>elma.bajraktari@adesso.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Thomas Krause</string-name>
          <email>thomas.krause@serapion.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Christian Kücherer</string-name>
          <email>christian.kuecherer@reutlingen-</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CEUR Workshop Proceedings</institution>
          ,
          <addr-line>CEUR-WS.org</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Reutlingen University</institution>
          ,
          <addr-line>72762 Reutlingen</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Serapion GmbH</institution>
          ,
          <addr-line>Schäufeleinstr. 7, 80687 München</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>_________________________ In: D. Mendez</institution>
          ,
          <addr-line>A. Moreira, J. Horkoff, T. Weyer, M. Daneva, M. Unterkalmsteiner, S. Bühne, J. Hehn, B. Penzenstadler, N. Condori-Fernández, O. Dieste, R. Guizzardi, K. M. Habibullah, A. Perini, A. Susi, S. Abualhaija, C. Arora, D. Dell'Anna, A. Ferrari, S. Ghanavati, F. Dalpiaz, J. Steghöfer, A. Rachmann, J. Gulden, A. Müller, M. Beck, D. Birkmeier, A. Herr-</addr-line>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>adesso SE</institution>
          ,
          <addr-line>Stockholmer Platz 1, 70173 Stuttgart</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>university.de</institution>
          ,
          <addr-line>C. Kücherer</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>[Context and motivation] Many of today´s systems use artificial intelligence, where Machine learning (ML) is a subfield. Requirements engineering (RE) addresses the needs of the stakeholders for systems development. In particular, systems with ML components require specific non-functional requirements (NFRs) to define ML relevant details, such as quality aspects of training datasets, retrainability of ML-models or specifics of the ML training pipeline. [Problem] The specific application of RE techniques in practical use to systems with ML components is not yet completely understood. It is not clear, which techniques for elicitation, documentation of requirements can be used efficiently for ML based systems. [Ideas and results] Based on a systematic mapping study; we identify 58 NFRs used in studies to describe particular ML requirements. Through an online survey and expert interviews, we identified 30 NFRs that need to be considered in particular for systems with ML components. For the documentation of the highly relevant NFRs, a template was designed, evaluated and optimized in two IT companies. This template helps to ensure consistent documentation of the NFRs. [Contribution] Based on the systematic mapping study, the online survey and the expert interviews, we provide a list of relevant NFRs and a template for documenting the NFRs for systems with ML components. We validated the proposed template using a real world case in the context of two IT industry companies and several software projects. The evaluation shows an increased completeness of requirements.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Requirements elicitation and documentation</kwd>
        <kwd>machine learning</kwd>
        <kwd>non-functional requirements</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In this paper, only NFRs are considered. Quality requirements describe quality criteria that the
system must meet, such as performance and availability, and constraints describe conditions
and restrictions that can influence the development of the system, such as laws, regulations or
standards [
        <xref ref-type="bibr" rid="ref1 ref3">1, 3</xref>
        ]. According to Ahmad et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], RE has been sufficiently explored in the
development of classical software-based systems, and it is clear which techniques can be used in RE
activities. Recent software developments are increasingly using artificial intelligence (AI)
components and machine learning (ML) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. According to Kreutzer and Sirrenberg [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] AI is
understood as an overarching term for systems that automatically generate intelligent solutions to a
problem [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. ML is understood as a subfield of AI in which self-learning algorithms are used.
These systems are able to learn and solve problems on their own without a human being
programming them to do so [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ]. The difference between classical software-based systems and
systems with ML components is that systems with ML components are probabilistic [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
According to Ahmad et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], the use of RE in the development of systems with AI or ML
components has not been sufficiently explored. This statement is confirmed by Yoshioka et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]
and Villamizar et al. [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] in that research regarding techniques of RE in the development of
MLbased systems is insufficient. According to Ahmad et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], new techniques are needed for RE
activities that can be used in the development of systems with AI or ML components. According
to Rupp and the SOPHISTs [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], the specification of ML-based systems differs from classical
systems in that this type of system focuses on the quality of the ML model used as well as the
training, validation, and test data. Greater emphasis must be placed on NFRs in ML-based
systems [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. A ML model is built using a selected ML algorithm trained on training data for solving
a particular problem [
        <xref ref-type="bibr" rid="ref4 ref5 ref8">4, 5, 8</xref>
        ]. Validation and test data are then used to check the quality of the
ML model before it is deployed [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. The quality aspects of NFRs that must be taken into account
when developing classic software-based systems are defined and categorized in ISO/IEC 25010
[10]. This standard does not yet explicitly consider quality criteria related to systems with ML
components. Quality criteria should not only refer to the end product, but also to the previous
aspects such as the training data used, or the ML model used.
      </p>
      <p>Summarizing this, there is a need for specific ML-related requirements documentation
techniques. This is also confirmed by the employees of adesso SE. Due to the lack of best practices
in this area, it is still unclear which documentation techniques are specifically suitable for
systems with ML components. With over 9,000 employees and annual sales of EUR 900.3 million
in 2022, adesso Group is one of Germany's largest IT service providers. We aim to provide a
template, focusing requirements analysts to ML specifics and improve the completeness of
requirements by specifying ML quality requirements. This approach promises to improve project
success and to help on save development costs. The primary goal of this paper is twofold: (1) to
identify the NFRs of systems with ML components that need to be specified in greater detail
when applying ML and (2) to conceptualize a template for the documentation of the most
relevant NFRs. This paper will answer the following research questions (RQ):
•
•
•
•
•</p>
      <p>RQ1: How are requirements for systems with ML components documented?
RQ2: Which NFRs are specific to systems with ML components?
RQ3: Which documentation styles for systems with ML components are most used in
industrial projects at adesso SE?
RQ4: Which problems do current elicitation and documentation techniques have for ML
components in industrial projects at adesso SE?</p>
      <p>RQ5: What is the template design to document NFRs for ML systems?</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Works</title>
      <p>
        The following previous works are relevant: The systematic mapping study of Villamizar et al.
[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] covers RE for ML-based systems. They provide an overview of 35 studies (2018-2020)
starting from the results of a Scopus search and snowballing. They investigated specific ML based
systems NFRs, based on their frequency in the primary studies, given in brackets hereinafter.
The ML specific requirements are Usability (1), Scalability (1), Modularity (1), Robustness (1),
Autonomy (1), Uncertainty (1), Suitability (1), Accuracy (2), Ethics (2), Accountability (2),
Testability (2), Legal requirements (2), Maintainability (3), Performance (3), Safety (4), Reliability (4),
Transparency (5), Fairness (5), Data quality (5), Privacy (6), Explainability (6) and Security (6).
The systematic literature review (SLR) of Yoshioka et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] covers 32 papers (2017-2021),
investigating which techniques are used to document ML system requirements with concrete
examples. They found GORE (i* and KAOS) in 10 cases, UML in 7 and safety cases in 1 case. The
ML specific requirements are Overfitting (2), Fairness (2), dataset requirements (6), Robustness
(6), Accuracy (7), Explainability, Transparency and Accountability (9).
      </p>
      <p>
        The literature review from Ahmad et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] covers RE for AI and ML based systems. They
analyzed 27 studies (2011-2020). The authors focused on the documentation techniques of
requirements for systems with AI or ML components with an emphasis on their specific NFRs. First of
all, the GORE notations FLAGS, CORE, GRL, i* und GORE-MLOps are used (5), and with the
same frequency UML and SysML notations (5) and Conceptual Models (CM). Further they
summarized ML relevant NFRs: Transparency, Trust, Privacy, Safety, Reliability, Security, Fairness,
Explainability, Ethics, Robustness, Accuracy, Uncertainty, Data quality, Testability, Legal
requirements und Availability of training-, validation- and test-data.
      </p>
      <p>
        The literature review of Gjorgjevikj et al. [
        <xref ref-type="bibr" rid="ref29">54</xref>
        ] shows an interesting mixed-method study on the
use of requirements for ML in projects. They validate that RE activities are crucial to the ML
development process. Requirements should cover quality ML specifics, which are
Interpretability, Fairness, Robustness, Security, Privacy, and Safety, that occurs also in our research. Most
importantly, they state future research should focus on adjusting the RE activities to fit the ML
development. The template described in this study, provides further research to this direction.
The existing SLRs show documentation forms for ML components (RQ1) and specific ML
components NFRs (RQ2) till 2021. We complete this view of related works to June 2022.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. State of the Art</title>
      <p>
        In this article, we perform a systematic mapping study according to the principles of Petersen
[
        <xref ref-type="bibr" rid="ref28">53</xref>
        ] to provide an overview of the state-of-the-art regarding use of NFR for ML systems,
answering RQ1 and RQ2. The mapping study, particularly the data gathering, was performed by
the first and reviewed by the third author. We used principles of Kitchenham und Charters [11]
for study selection and search term construction. Data was gathered in June 2022.
      </p>
      <sec id="sec-3-1">
        <title>3.1. Method of Literature Review</title>
        <p>As RQ1 and RQ2 are closely related, we use one search term for the literature acquisition:
(("requirements engineering") AND (documentation OR specification OR notation
OR "modeling language") AND "machine learning" AND (software OR application OR
system)). For a broad search and a high level of completeness around machine learning, the
search for additional ML sub-terms was omitted. We used the following databases: (i)
SpringerLink1 as they have broad basis on RE and AI, (ii) ScienceDirect2 focuses on engineering of AI
systems and architectures, (iii) IEEE Xplore3 and (iv) ACM Digital Library4 are engineering
databases for studies with emphasis on AI applications. Inclusion (In) and exclusion (En) criteria
are shown in Table 1. I1 selects studies after the SLRs in related works have been published. I2
assures studies to have minimal scientific standard, whilst the selected databases list peer
reviewed articles only. I3 includes papers that contribute to the topic of this article. A paper was
selected if a review showed it to offer a contribution to documentation techniques or NFRs for
systems with ML components. E1 filters studies that use ML techniques to support RE: If the
paper’s main focus was on approaches to support requirements activities by AI or ML, the paper
was excluded, as this was not our scope. This criterion was validated by a detailed review of the
article. E2 avoids SLRs or mapping studies, that we already addressed as related works. E3
deselects similar studies from the same authorship.</p>
        <p>Fig. 1. Study selection chart</p>
        <p>Study Selection. Fig. 1. shows the four phases of study selection. In phase 1 we queried
the selected databases with the presented search term, applied I1 and I2, resulting in 1233
publications. In phase 2 the title, keywords and abstracts were considered using I3 and E1. In phase
3 we reviewed the content and filtered according I3 and E2. As there were no duplicates E3, we
summed up to 15 relevant publications shown in Table 3. No relevant publication could be
identified from ScienceDirect. The contents of the listed publications did not cover
documentation techniques or NFRs for systems with ML components. The references of the literature from
phase 2 onwards are available for download in the last section.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Result of the Literature Review</title>
        <sec id="sec-3-2-1">
          <title>Documentation Techniques of Systems with ML Components.</title>
          <p>Four out of 15 selected studies cover techniques for requirements documentation. The other 11
studies cover NFRs of systems with ML components. Zaidi [12] shows the use of conceptual
models (CM) in various phases of ML to document requirements and goals of the project. The
use i* and UML, Business Process Model and Notation (BPMN) [13] and Building Information
Modeling (BIM). The latter is a domain specific notation model for building [14]. Tun et al. [15]
found several requirements documentation notations: An AI Project Canvas is used to document
decision making considerations and to capture the impact on organizational structure due to
1 https://link.springer.com/
2 https://www.sciencedirect.com/
3 https://ieeexplore.ieee.org/Xplore/home.jsp
4 https://dl.acm.org/
the ML components. Safety Cases and System-Theoretic Accident Model and Processes (STAMP)
are used for safety analysis, modelling possible accidents and giving evidence for the systems
suitability [16]. The architectural design of the system is described with SysML [17] and the
functional requirements with a Goal Model (GORE) notation.</p>
          <p>Khan et al. [18] investigates the use of NFRs for ML systems. They propose an extended
SysML requirements diagram, and a GORE-MLOps model, that addresses uncertainty and
unpredictability in ML systems during RE. Husen et al. [19] proposes a framework for
safetycritical ML systems consisting of the documentation techniques AI project canvas, ML Canvas,
KAOS, UML Component Diagram, STAMP/Systems Theoretic Process Analysis (STPA) and
Safety Cases. The AI project canvas details early business requirements from the system
specification. KAOS is used to document functional requirements that are detailed into an
architectural component model. By using safety cases counter measures for risks through STAMP/STPA
are defined, whereas STAMP is a method for risk [19, 20]. Table 2 summarizes these techniques.</p>
          <p>In summary, GORE notations and UML or SysML diagrams are mostly used for ML
requirements. Three studies provide details about GORE: i* [12], KAOS [19] and GORE-MLOps [18].
All four works use UML/SysML diagrams: in two papers this is detailed to component diagrams
[19] and extended SysML requirements diagrams [18]. For the documentation of NFRs GORE
[15], GORE-MLOps and an extension of a SysML requirements diagrams [18] is mentioned.</p>
        </sec>
        <sec id="sec-3-2-2">
          <title>NFRs of Systems with ML Components</title>
          <p>Within 14 of the 15 selected studies, we identified in summary 54 NFRs for ML components as
shown in the extraction table available for download as open research data (see last section).
The related works showed four more NFRs that were not included in the 14 selected studies.
We have added the additional four NFRs to the results: (i) Autonomy of ML algorithm, (ii)
Suitability, (iii) Legal requirements and (iv) dataset requirements. As there is no common set of ML
specific NFRs yet, we identified NFRs with synonymous terms or describing similar phenomena.
Therefore, we consolidated the 58 identified NFRs into 33 relevant NFRs with the following
descriptions. An overview of these results is given in Table 3.</p>
          <p>
            NFR-1 Suitability describes the appropriateness of the ML usage and the extent to which
the ML solves the given problem [
            <xref ref-type="bibr" rid="ref7">7, 21</xref>
            ]. NFR-2 Explainability and Interpretability describes
mechanisms that allows users to comprehend the systems results [22–25]. NFR-3
Justifiability Users require system’s decision to be rational [26]. NFR-4 Transparency describes details
about ML algorithms, training- and test data to validate the systems decisions [22, 24, 26, 27].
NFR-5 Traceability For users and developers the source of training and validation data,
artifacts and processes must be documented [22, 28]. NFR-6 Fairness describes that systems must
respect human rights, equal rights, equal opportunity for all users, and follow the democracy
principles. The results of AI are supposed to be un-biased and discrimination free [22, 25, 29,
30]. NFR-7 Safety describes requirements that avoids risks to humans or the environment [23].
NFR-8 Trust describes users expectation to the reliability of system decisions and the
correctness of results [10, 24]. NFR-9 Efficiency of ML algorithm are used to describes quality
aspects of the ML training and prediction algorithms [26]. NFR-10 Performance of ML model
describes the expectations to performance and correctness of the ML model for prediction and
the resources to gain these predictions [22]. This incorporates accuracy as internal performance
metric for the prediction quality [23, 31, 32] and correctness of the decisions or prediction results
[22, 23]. NFR-11 Latency of ML model defines the acceptable time between data acquisition
and the result of the prediction [33]. NFR-12 Security defines the access to used and created
data (sets) [22, 23]. NFR-13 Privacy considers rights of human privacy due to confidentiality
and protection of data [22, 23]. NFR-14 Integrity of data defines quality attributes to training,
validation and test data, e.g. correctness, preprocessing and data integrity [22, 23, 27]. NFR-15
Dataset requirements capture requirements to data records such as topic, domain, context,
origin of data [34], quantity of data [
            <xref ref-type="bibr" rid="ref9">9, 27</xref>
            ]. NFR-16 Accountability describes details to the
extent to which the system takes ownership and responsibility of its decisions [
            <xref ref-type="bibr" rid="ref10">26, 35</xref>
            ]. NFR-17
Reliability captures the predicted functioning expectations for the system [23, 25]. NFR-18
Reproducibility and Repeatability address the necessity that predictions must be identical
for multiple requests with the same data [
            <xref ref-type="bibr" rid="ref11">23, 26, 36</xref>
            ]. This is synonymously referred to as
consistency [
            <xref ref-type="bibr" rid="ref12">37</xref>
            ]. NFR-19 Fault tolerance describes expectation to resilience to incorrect data or
partial system failures to avoid complete failure [
            <xref ref-type="bibr" rid="ref13">38</xref>
            ], sometimes referred to as robustness [
            <xref ref-type="bibr" rid="ref14">22,
39</xref>
            ]. NFR-20 Autonomy of ML algorithm expresses the independence or encapsulation of ML
algorithms. The retraining of a ML subsystem must be possible without depending on the
application’s development [
            <xref ref-type="bibr" rid="ref4 ref7">4, 7</xref>
            ]. NFR-21 Maintainability describes the needs regarding further
development as extensions or system evolutions [
            <xref ref-type="bibr" rid="ref15">10, 40</xref>
            ]. NFR-22 Modularity defines the
required level of maintainability. A system consist of several modules that work independent but
collectively to provide the necessary functionality [
            <xref ref-type="bibr" rid="ref15">10, 40</xref>
            ]. NFR-23 Reusability describes
details about the possibility to reuse parts or components of the system in other contexts or
systems. In ML contexts this could be the reuse of ML models or data sets [
            <xref ref-type="bibr" rid="ref15">40</xref>
            ]. This NFR also
covers the domain adaptation, where in transfer learning scenarios labelled data are used to
create models of other domains [
            <xref ref-type="bibr" rid="ref16">41</xref>
            ]. NFR-24 Modifiability describes the extent to which a
module can be changed without affecting the ML module quality [
            <xref ref-type="bibr" rid="ref15">10, 40</xref>
            ]. NFR-25
Retrainability describes that ML models must be newly trained with other than initial data [27].
NFR26 Testability defines, how ML models and their prediction components can be tested and
what the resulting quality of decisions can be [
            <xref ref-type="bibr" rid="ref15">40</xref>
            ]. NFR-27 Usability describes the same
aspects as in ISO/IEC 25010 with a focus on ML models and their decision or prediction
presentation to users [10, 27]. NFR-28 Interoperability describes the requirements that allow the
communication and data exchange with other systems [
            <xref ref-type="bibr" rid="ref17">10, 42</xref>
            ]. NFR-29 Portability defines to
what extend ML models are supposed to be transferred to other contexts, e.g. a classification of
blood diseases for cancer patients to non-cancer patients [10, 32]. NFR-30 Adaptability
(portability of ISO/IEC 25010) describes how the ML model can be used in other contexts such as
operating systems or system environments [10, 27]. NFR-31 Scalability of ML pipeline defines
requirements for processing tools with regard to data volumes, large data sets and runtime
issues during training [
            <xref ref-type="bibr" rid="ref12 ref18">37, 43</xref>
            ]. NFR-32 Complexity of ML model describes the number of
features the ML model is capable of. A too high model complexity leads to overfitting and a too
low complexity leads to underfitting [
            <xref ref-type="bibr" rid="ref19">44</xref>
            ]. NFR-33 Legal requirements covers the specification
of regulatory needs such as standards, acts, laws etc. [
            <xref ref-type="bibr" rid="ref1 ref20">1, 45</xref>
            ].
          </p>
          <p>
            In addition to these NFRs, further requirements were mentioned in the primary studies, as
given below. We combined these requirements to the following NFRs: Ethics is part of NFR-33,
Uncertainty is part of NFR-17, data issues are details of dataset requirements in NFR-15 covering
cleaning of datasets, revision and transition is part of Maintainability NFR-21. Completeness is
discussed in Habibullah und Horkoff [
            <xref ref-type="bibr" rid="ref12">37</xref>
            ] but is not clearly defined; Flexibility covers the
flexibility of the ML pipeline and is categorized as Reusability NFR-23.
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Handling NFRs in Systems with ML Components in Practice</title>
      <p>An online survey (12 persons) and expert interviews (4 experts) with employees were conducted
at adesso SE, to identify the special needs of the documentation of NFRs for systems with ML
components. We used this case to prove the relevance of the NFRs identified by the literature
review and to identify further NFRs (RQ2). Moreover, we wanted to understand the
documentation techniques used by adesso SE (RQ3) and related problems of the documentation (RQ4).</p>
      <sec id="sec-4-1">
        <title>4.1. Relevant NFRs of Systems with ML Components</title>
        <p>After the analysis of the systematic mapping study, the online survey and the expert interviews,
the following 30 of the 33 NFRs mentioned in Table 3 were identified as especially relevant for
ML components and provide the final answer to RQ2: The NFRs marked in blue in Table 3 have
been classified as relevant in literature research but also in the online survey and expert
interviews at adesso SE. The NFRs marked in grey were additionally classified as relevant in the
online survey and in the expert interviews. The online survey questions are available for
download, given in the last section. Based on the online survey, the following NFRs were rated as the
most relevant NFRs (all of the participants gave a positive response): Suitability, Integrity of
data, Reliability, Latency of ML model, Testability, Explainability and Interpretability,
Performance of ML model, Security and Retrainability. Through the expert interviews, it was
determined that the NFRs Accountability and Transparency must be considered relevant, even
though they were not classified as relevant by the online survey. The expert interviews showed
that Integrity of data always appears in the top 2 of the most important NFRs. This is justified
by the fact that data is the basic building block of ML and therefore its integrity is necessary.</p>
        <p>The questions of the expert interviews are available for download, given in the last section.</p>
        <p>ID</p>
        <p>NFR
x
x
x
x
x
x
x
x
x
x
x
x
x
d
ahn ]73
la [
lu ff
ib ok
ab ro
H H
ID</p>
        <p>NFR
NFR-21
NFR-22
NFR-23
NFR-24
NFR-25
NFR-26
NFR-27
NFR-28
NFR-29
NFR-30
NFR-31
NFR-32
NFR-33</p>
        <p>Importance</p>
        <p>through
online survey</p>
        <p>x x x 3 8/9
x 1 6/7
x x 2 4/6
x x x 3 6/7</p>
        <p>x x 2 7/7
x x x x x 5 10/10
x x x 3 6/9
x x 2 5/6</p>
        <p>x x 2 4/9
x x 2 5/8
x x x 3 6/8
x x x x x x 6 1/8
0 8/9
8 3 2 8 10 10 12 3 9 19 7 25 15 14 -</p>
        <p>
          Table 3 shows that NFRs occur with different frequency in the articles. In particular the work of Habibullah and Horkoff [
          <xref ref-type="bibr" rid="ref12">37</xref>
          ] show the
most NFRs, as they performed a comprehensive qualitative interview study in which NFRs for ML were explored in detail. Part of the
interview study was to identify NFRs that are more or less important in the industry. The Importance through online survey column shows how
many people classified the respective NFR as relevant in the online survey. For each NFR, the participants were asked to state whether it is a
relevant NFR for systems with ML components. The participants could respond to the statement as follows: strongly disagree, disagree,
neither, agree and strongly agree. When evaluating the relevance of the NFRs, the answers with the selection Neither were sorted out in
relation to neutrality. An NFR was categorized as relevant for systems with ML components if more than 50% of the participants in the online
survey agreed with the statement. Only 14 of the 15 papers identified in Fig. 1. are listed in this table, as the paper from Zaidi [12] only deals
with documentation techniques and therefore makes no reference to the NFRs of systems with ML components. This table answers RQ2.
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Documentation Techniques for Systems with ML Components</title>
        <p>The online survey at adesso SE showed that employees use the following techniques to
document NFRs (in order of occurrences): user stories, sentence templates, to be concepts, UMLs
(e.g. use case diagram), entity relationship models (ERM), tests, service level agreements (SLA),
authorization concepts, mockups and usability standards. The first two techniques were also
identified as appropriate by online survey participants. These findings answer RQ3: Using user
stories, sentence templates, NFRs can be documented in natural language. The expert interviews
also confirm this finding.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Problems with the Documentation of NFRs</title>
        <p>Through the online survey and expert interviews, the following problems in documenting NFRs
were identified, which provide the answer to RQ4: (1) No consistent, appropriate, or proper
format in documentation, (2) definition problems in certain situations, (3) insufficient
specification and thus missing information, which later led to problems during implementation, and (4)
missing technical aspect in the requirements documentation.</p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Design of the Template for the Documentation of NFRs</title>
        <p>
          Based on project examples, the specifics of documenting NFRs for systems with ML components
were examined in the expert interviews. Table 4 shows the roles, skills and the work experience
in years of the experts. The projects did not use a standard template for the documentation of
NFRs. For example, in one project a combination of user story and key results was used to
document the requirements, and in another project the requirements were documented without
using an appropriate sentence template or similar. However, each requirement was prioritized
using the MoSCoW prioritization technique [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. Based on the results of the expert interviews
and a literature review, a template was designed that can be used to document NFRs as a natural
language documentation technique in a uniform manner. A natural language documentation
technique was chosen because natural language documentation techniques are used most
frequently at adesso SE. This does not exclude the possibility that the specified template can also
be supplemented by model-based documentation techniques. After the initial conception, the
template was evaluated with a further five experts in semi-structured expert interviews at
adesso SE. The template used for the evaluation is available for download in the last section.
The expert interviews showed beneficial aspects of the template and some need for
optimization. The experts were asked whether they would recommend the first conception of the
template to colleagues, measured by the Net Promoter Score (NPS). NPS is a metric that categorizes
people into three groups, promoters, passives, and detractors based on a question that can be
answered on a scale of 0-10. Only the number of detractors and promoters is required to
calculate the NPS, as the percentage of detractors is subtracted from the percentage of promoters
[
          <xref ref-type="bibr" rid="ref24">49</xref>
          ]. Out of five experts, two experts have a neutral attitude (passives), one expert has a critical
attitude (detractor) and two experts have a positive attitude (promoters) towards the present
template. The expert with the critical attitude mentioned that s/he would rate the template with
a much higher value if the role and benefits were taken out of the template. The benefit field is
covered by the justification of priority, which is why this field does not offer any added value.
Another expert agreed that the role should be removed, as this does not add any value. The
benefit field and the &lt;role&gt; in the sentence template have therefore been removed. But the Other
notes (optional) field was added to the template. The following NPS was determined for the first
draft of the template: NPS = ((2-1)/5) x 100 = 20%. According to Lee [
          <xref ref-type="bibr" rid="ref25">50</xref>
          ], 20% is a good
value. The improved template can be found in Table 5. and provides the answer to RQ5.
Furthermore, an example can be seen in Table 6. The template supports the management of
requirements through consistent documentation and the relation the NFR-classes in Table 3
defined by the NFR-class and the object of consideration in the template. The NFR-class, for
example, is relevant because different metrics must be defined in the acceptance criteria
depending on the NFR-class. These metrics are not considered in more detail in this paper but would
need to be analyzed and defined in more detail in further research work. The NFR-classes are
only an example in our template. These can be extended by further NFR-classes. In addition,
further research could determine whether the template could be expanded to include further
elements. Additionally, the template was evaluated in a second company Serapion, presented
below. This template is the answer to RQ5.
        </p>
        <p>The training dataset provided must consist of high-quality data.</p>
        <p>AC1: 100% of duplicates in the training data set were removed. AC2: The amount of data in
the data set for the two classes "must be maintained" and "must not be maintained" only
differs by a maximum of 15%. AC3: At least 10% of the data from the training data set were
manually checked for correct labeling as a sample and are correctly labeled 95% of the time.</p>
        <p>Integrity of data Priority Must-Have
Training data Owner Data Engineer
Training data is the basic building block of ML. Poor training data lead to incorrect and
unrealistic predictions about maintenance of a vehicle fleet. Therefore, high quality training data
is needed for creation of ML model.</p>
        <p>Review of the training data set must be done within one week.</p>
        <p>Done</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Evaluation of a Template for the Documentation of NFRs</title>
      <p>
        The second evaluation was done with Serapion GmbH, which is an IT service provider and
management consultancy with more than 100 employees that develops cross-industry solutions
in Europe. In order to expand the survey, Serapion was chosen as another consulting company
because this company is known as a pioneer of AI technology in the German market. The
proposed NFR-template was evaluated in practice using three projects with ML components. By
using the technology acceptance model (TAM) [
        <xref ref-type="bibr" rid="ref26">51</xref>
        ] the perceived usefulness was evaluated by
analysts to measure the degree to which a person believes that using this template would
enhance their job performance. Three randomly selected projects have been identified where ML
components currently or in the future are used. For each of the three projects, the responsible
project manager has been identified in the role of the Requirements Engineer, and the
implementing party has been pinpointed. The templated was presented to project members. After a
short discussion and feedback about the template, a real NFR was documented using the
template. The template was filled out together with the respective project manager and feedback
was then obtained through verbal interviews with the respective project manager and a
respective developer. The results illustrate the benefit (one of the experts called it a remarkable
benefit) of the proposed NFR template in specifically capturing and documenting requirements in
projects with ML components. Through the practical application of the project examples, the
template´s effectiveness in improving communication within the project team and stakeholders
as well as in helping to prioritize requirements became clear.
      </p>
      <p>The general feedback to the template was: (i) during a proof-of-concept phase, the template is
not required. In early project stages the focus lie on validating ideas and testing concepts. (ii)
The template is highly valuable in subsequent stages, where implementation and scaling occur.
The NFR template represents a valuable resource for managing NFR. The recommended
extensions ensure improved practicality and completeness. It is recommended to use this template in
software projects and customize it according to project situation and requirements.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Threats to Validity</title>
      <p>
        We follow the classification of Wohlin et al. [
        <xref ref-type="bibr" rid="ref27">52</xref>
        ]. Conclusion validity address whether the
soundness of the treatment is related to the actual observed outcome. As the template was found
useful by the experts, this is an indication that it contributes to capturing the requirements for
ML components adequately. Construct validity considers whether the study measures what
it claims to measure. For the systematic mapping study, the RQs were discussed in the team of
authors and feedback from a university talk was considered. The online survey was conducted
in one company only and contained 177 questions, which might frighten some participants.
Pretests were conducted with three people. Some answers did not describe precisely how the
NFRs were documented by the specified techniques. Expert interviews were conducted with
adesso SE using a guideline with questions, that might have been misunderstood by experts.
We used pretests with two people to mitigate misunderstanding. Internal validity determines
the extent of conclusions that can be drawn from a study. We scoped the systematic mapping
study to RE of NFRs for ML components. The search term was validated by all three authors
and the process of Petersens mapping study was followed, beside the quality measurement of
primary studies. The use of four databases covers publications since 2021 in a broad range.
Three related SLRs cover results before 2021. The online survey of adesso SE employees gained
a small sample size of 12. Results of the expert interviews were biased upon the level of
expertness of participants. Therefore, we raised questions about the participant’s ML experience. Only
4 people from adesso SE participated in the expert interviews. External validity describes the
possible generalization or transfer of the study results to other situations. The results of the
mapping study might be biased through the missing quality evaluation. The scope ML based
components limit the generality of the presented insights of the mapping study, online survey
and interviews; thus, results are not valid for other types of systems. We did not distinguish
different types of ML such as supervised, unsupervised, and reinforced learning. The evaluation
expert interviews were only conducted in two companies, which limits transferability to other
companies. For the evaluation in the second company, the template was rated by 3 people, who
had not seen the template before. However, the rating of the template overall, was useful.
      </p>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusion</title>
      <p>The peculiarities of documenting NFRs in systems with ML components were identified and 30
NFRs were considered relevant. In addition, no consistent, suitable format for the
documentation of ML NFRs could be found. Expert interviews showed a missing standardized approach to
documenting NFRs for ML systems. As a result, a specific template to capture NFR requirements
was proposed. The template was evaluated in practice and showed significant advantages in
usefulness. Criticisms have been raised wrt. early research phases of a project, where detailed
requirement documentation may not be relevant. The added value of the proposed NFR
template in later project phases was recognized, especially for the implementation of NFRs.
Feedback during the evaluations lead to a revision of the NFR template. There is still a need to
understand the effectiveness and applicability of the template in larger companies. The adaptation
of the template to different ML methods is still in its early stages and requires further research.
The identification and integration of relevant NFRs for these learning methods is an
underresearched area. In summary, this research showed particularly important NFRs for ML
components and showed the usefulness of the proposed NFR template to support the
implementation of projects with ML components.
10. ISO/IEC: 25010: Systems and software engineering — Systems and Software Quality Requirements and
Evaluation. System and software quality models, (2011)
11. Kitchenham, B.A., Charters, S.: Guidelines for Performing Systematic Literature Reviews in Software
Engineering. Tech. Rep. EBSE 2007-001. Keele, UK (2007)
12. Zaidi, M.A.: Conceptual Modeling Interacts with Machine Learning – A Systematic Literature Review. In:
Gervasi, O., et al. (eds.) Comp.Sc.and Its Appl.ICCSA 2021. LNCS, vol. 12957, pp. 522–532. Springer
International Publishing, Cham (2021).
13. Object Management Group: Business Process Model and Notation, (2014).
14. A. Borrmann, M. König, C. Koch, J. Beetz: Building Information Modeling: Technologische Grundlagen und
industrielle Praxis. Springer Fachm. Wiesbaden (2015)
15. Tun, H.T., Husen, J.H., Yoshioka, N., Washizaki, H., Fukazawa, Y.: Goal-Centralized Metamodel Based
Requirements Integration for Machine Learning Systems. In: 28th Asia-Pacific Soft.Eng.Conf.Works., IEEE (2021).
16. Leveson, N.: A new accident model for engineering safer systems. Safety Science, vol. 42, 237–270 (2004).
17. Object Management Group: Systems Modeling Language (OMG SysML™).
18. Khan, A., Siddiqui, I.F., Shaikh, M., Anwar, S., Shaikh, M.: Handling Non-Fuctional Requirements in IoT-based
Machine Learning Systems. In: Joint Int.Conf.on Digital Arts, Media a.Technology (ECTI DAMT &amp; NCON), pp.
477–479. IEEE (2022).
19. Husen, J.H., Washizaki, H., Tun, H.T., Yoshioka, N., Fukazawa, Y., Takeuchi, H.: Traceable business-to-safety
analysis framework for safety-critical machine learning systems. In: Crnkovic, I. (ed.) Proc.1st Int. Conf. on AI
Engineering: Softw.Eng. for AI, pp. 50–51. ACM, New York, NY, USA (2022).
20. Allison, C.K., Revell, K.M., Sears, R., Stanton, N.A.: Systems Theoretic Accident Model and Process safety
modelling applied to an aircraft rapid decompression event. Safety Science, vol. 98, 159–166 (2017). doi:
10.1016/j.ssci.2017.06.011
21. M. Hesenius, N. Schwenzfeier, O. Meyer, W. Koop and V. Gruhn: Towards a Software Engineering Process for</p>
      <p>Developing Data-Driven Applications.7th Int.Work.on Realizing AI Synergies in Softw.Eng.(RAISE), pp. 35–41.
22. Yurrita, M., Murray-Rust, D., Balayn, A., Bozzon, A.: Towards a multi-stakeholder value-based assessment
framework for algorithmic systems. In: ACM Conf.on Fairness, Accountability, and Transp., pp. 535–563. ACM,
New York, USA (2022).
23. Jain, S., Luthra, M., Sharma, S., Fatima, M.: Trustworthiness of Artificial Intelligence 2020 6th Int.Conf.on</p>
      <p>Adv.Comp.a.Comm. Syst.(ICACCS), pp. 907–912.
24. Llinas, J., Fouad, H., Mittu, R.: Systems Engineering for Artificial Intelligence-based Systems: A Review in Time.</p>
      <p>In: Lawless, W.F., et al. (eds.) Syst.Eng. and Artif.Int., pp. 93–113. Springer Internat. Publishing, Cham (2021).
25. Oliveira Carvalho, N. de, Libório Sampaio, A., Vasconcelos, D.R. de: MoReXAI - A Model to Reason About the
eXplanation Design in AI Systems. In: Degen, H.,et al. (eds.) Art.Int. in HCI. LNCS, vol. 13336, pp. 130–148.</p>
      <p>Springer Int. Pub., (2022).
26. Razaulla, S.M., Pasha, M., Farooq, M.U.: Integration of Machine Learning in Education: Challenges, Issues and</p>
      <p>Trends. In: Satyanarayana, C., et al. (eds.), Adv. Techn.and Soc. Change, pp. 23–34. Springer Singapore, (2022).
27. Nahar, N., Zhou, S., Lewis, G., Kästner, C.: Collaboration challenges in building ML-enabled systems. In: Dwyer,</p>
      <p>M.B., et al.(eds.) Proc. of the 44th Int.Conf.on Softw.Engi.,pp. 413–425. ACM, New York, NY, USA (2022).
28. Mora-Cantallops,M.,Sánchez-Alonso,S.,García-Barriocanal,E.,Sicilia,M.-A.: Traceability for Trustworthy AI: A</p>
      <p>Review of Models and Tools. BDCC, vol. 5, 20 (2021).
29. Xivuri, K., Twinomurinzi, H.: A Systematic Review of Fairness in Artificial Intelligence Algorithms. In: Dennehy,</p>
      <p>D., et al. (eds.) Resp.AI a.Anal.f.Ethical a.Inclusive Digitized Soc.,vol.12896, pp. 271–284.Springer,Cham (2021).
30. Barton, M.-C., Pöppelbuß, J.: Prinzipien für die ethische Nutzung künstlicher Intelligenz. HMD, vol. 59, 468–481
(2022).
31. Xiao, C., Sun, J.: Introduction to Deep Learning for Healthcare. Springer International Publishing, Cham (2021)
32. Hutchinson, B., Rostamzadeh, N., Greer, C., Heller, K., Prabhakaran, V.: Evaluation Gaps in Machine Learning</p>
      <p>Practice. In: 2022 ACM Conf. on Fairness, Accountability, and Transparency, pp. 1859–1876. ACM, USA (2022).
33. Zhu, B., Shin, U., Shoaran, M.: Closed-Loop Neural Prostheses With On-Chip Intelligence: A Review and a
Low</p>
      <p>Latency Machine Learning Model for Brain State Detection. IEEE Biomed.Circ.Syst., vol.15, 877–897 (2021).
34. Hutchinson, B., Smart, A., Hanna, A., Denton, E., Greer, C., Kjartansson, O., Barnes, P., Mitchell, M.: Towards</p>
      <p>Accountability for ML Datasets. In: Proc.Conf.on Fairness, Account.a.Transp., pp. 560–575. ACM, USA (2021).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>M.</given-names>
            <surname>Glinz</surname>
          </string-name>
          , H. van Loenhoud,
          <string-name>
            <given-names>S.</given-names>
            <surname>Staal</surname>
          </string-name>
          and
          <string-name>
            <surname>S.</surname>
          </string-name>
          <article-title>Bühne: Handbook for the CPRE Foundation Level</article-title>
          , IREB Standard (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2. C.
          <article-title>Rupp und SOPHISTen: Requirements-Engineering und -Management: Das Handbuch für Anforderungen in jeder Situation</article-title>
          . Hanser,
          <string-name>
            <surname>München</surname>
          </string-name>
          (
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Ahmad</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bano</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abdelrazek</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Arora</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grundy</surname>
          </string-name>
          , J.:
          <article-title>What's up with Requirements Engineering for Artificial Intelligence Systems</article-title>
          ? In: 2021 IEEE 29th International RE Conf., pp.
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          . IEEE (
          <year>2021</year>
          ).
          <source>doi: 10.1109/RE51729</source>
          .
          <year>2021</year>
          .00008
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Kreutzer</surname>
          </string-name>
          , R.T.,
          <string-name>
            <surname>Sirrenberg</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          : Künstliche Intelligenz verstehen. Springer Fachmedien Wiesbaden, (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Welsch</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eitle</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buxmann</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          : Maschinelles Lernen.
          <source>HMD</source>
          , vol.
          <volume>55</volume>
          ,
          <fpage>366</fpage>
          -
          <lpage>382</lpage>
          (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1365/s40702- 018-0404-z
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Yoshioka</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Husen</surname>
            ,
            <given-names>J.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tun</surname>
            ,
            <given-names>H.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Washizaki</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fukazawa</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Landscape of Requirements Engineering for Machine Learning-based AI Systems</article-title>
          . In: 28th
          <string-name>
            <surname>Asia-Pacific Softw</surname>
          </string-name>
          .Eng.Conf.Works.,
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Villamizar</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Escovedo</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalinowski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Requirements Engineering for Machine Learning: A Systematic Mapping Study</article-title>
          .
          <source>In: 2021 47th Euromicro Conf. on Softw. Eng. and Adv. Appl.(SEAA)</source>
          , pp.
          <fpage>29</fpage>
          -
          <lpage>36</lpage>
          . IEEE (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Gerard</surname>
            ,
            <given-names>C.:</given-names>
          </string-name>
          <article-title>Practical Machine Learning in JavaScript</article-title>
          . Apress, Berkeley, CA (
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Haller</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Managing AI in the Enterprise</article-title>
          . Apress, Berkeley, CA (
          <year>2022</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          35.
          <string-name>
            <surname>Lepri</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oliver</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Letouzé</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pentland</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vinck</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          : Fair, Transparent, and
          <string-name>
            <given-names>Accountable</given-names>
            <surname>Algorithm</surname>
          </string-name>
          .
          <source>Decisionmaking Proc. Philos.Techn</source>
          .vol.
          <volume>31</volume>
          ,
          <fpage>611</fpage>
          -
          <lpage>627</lpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          36.
          <string-name>
            <surname>Alahmari</surname>
            ,
            <given-names>S.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goldgof</surname>
            ,
            <given-names>D.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mouton</surname>
            ,
            <given-names>P.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hall</surname>
            ,
            <given-names>L.O.</given-names>
          </string-name>
          :
          <article-title>Challenges for the Repeatability of Deep Learning Models</article-title>
          .
          <source>IEEE Access</source>
          , vol.
          <volume>8</volume>
          ,
          <fpage>211860</fpage>
          -
          <lpage>211868</lpage>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          37.
          <string-name>
            <surname>Habibullah</surname>
            ,
            <given-names>K.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horkoff</surname>
          </string-name>
          , J.:
          <article-title>Non-functional Requirements for Machine Learning: Understanding Current Use and Challenges in Industry</article-title>
          .
          <source>In: 2021 IEEE 29th International RE Conf.</source>
          , pp.
          <fpage>13</fpage>
          -
          <lpage>23</lpage>
          . IEEE (
          <year>2021</year>
          ).
          <source>doi: 10.1109/RE51729</source>
          .
          <year>2021</year>
          .00009
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          38.
          <string-name>
            <surname>Myllyaho</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Raatikainen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Männistö</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nurminen</surname>
            ,
            <given-names>J.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mikkonen</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>On misbehaviour and fault tolerance in machine learning systems</article-title>
          .
          <source>Journal of Systems and Software</source>
          , vol.
          <volume>183</volume>
          ,
          <issue>111096</issue>
          (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .1016/j.jss.
          <year>2021</year>
          .111096
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          39.
          <string-name>
            <surname>Hanif</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khalid</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Putra</surname>
            ,
            <given-names>R.V.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rehman</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shafique</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>Robust Machine Learning Systems: Reliability and Security for Deep Neural Networks</article-title>
          .
          <source>In 24th Int. Symp.on On-Line Test.a.Robust Syst.Design (IOLTS)</source>
          , pp.
          <fpage>257</fpage>
          -
          <lpage>260</lpage>
          . IEEE (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          40.
          <string-name>
            <surname>Mikkonen</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nurminen</surname>
            ,
            <given-names>J.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Raatikainen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fronza</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mäkitalo</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Männistö</surname>
            ,
            <given-names>T.:</given-names>
          </string-name>
          <article-title>Is Machine Learning Software Just Software: A Maintainability View</article-title>
          .
          <source>In: Fut. Persp.o.Softw.Eng.Quality</source>
          . vol.
          <volume>404</volume>
          , pp.
          <fpage>94</fpage>
          -
          <lpage>105</lpage>
          . Springer Int.Publishing, (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          41.
          <string-name>
            <surname>Csurka</surname>
          </string-name>
          , G.:
          <article-title>A Comprehensive Survey on Domain Adaptation for Visual Applications</article-title>
          . In: Csurka,
          <string-name>
            <surname>G</surname>
          </string-name>
          . (ed.)
          <source>Advances in Computer Vision and Pattern Recognition</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>35</lpage>
          . Springer International Publishing,
          <string-name>
            <surname>Cham</surname>
          </string-name>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          42.
          <string-name>
            <surname>Russell</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jalaian</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moskowitz</surname>
            ,
            <given-names>I.S.</given-names>
          </string-name>
          :
          <article-title>Re-orienting Toward the Science of the Artificial: Engineering AI Systems</article-title>
          . In: Lawless,
          <string-name>
            <surname>W.F.</surname>
          </string-name>
          , et al. (eds.)
          <source>Syst.Eng.a.Artificial Intelligence</source>
          , pp.
          <fpage>149</fpage>
          -
          <lpage>174</lpage>
          . Springer International, Cham (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          43.
          <string-name>
            <surname>Migliorini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Castellotti</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Canali</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zanetti</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>ML Pipelines with Modern Big Data Tools for High Energy Physics</article-title>
          .
          <source>Comp.Softw Big Sci</source>
          , vol.
          <volume>4</volume>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          44.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Deep Learning and Practice with MindSpore</article-title>
          . Springer Singapore, (
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          45.
          <string-name>
            <surname>Wong</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Ethics and Regulation of Artificial Intelligence</article-title>
          .
          <source>In: Art.Int.for Knowl. Mgmnt. IFIP Adv.i.Inf.a.Comm.Techn</source>
          ,vol.
          <volume>614</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>18</lpage>
          . Springer Int. Pub.,(
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          46.
          <string-name>
            <surname>McDermott</surname>
            ,
            <given-names>T.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Blackburn</surname>
            ,
            <given-names>M.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beling</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          :
          <source>Artificial Intelligence and Future of Syst.Eng. In: Syst.Eng.a.Art</source>
          .Int., pp.
          <fpage>47</fpage>
          -
          <lpage>59</lpage>
          . Springer Int. Pub.
          <string-name>
            <surname>Cham</surname>
          </string-name>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          47.
          <string-name>
            <surname>Pankiewicz</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wrona</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Turlej</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Orłowski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Promises and Challenges of Reinforcement Learning Applications in Motion Planning of Automated Vehicles</article-title>
          .
          <source>In: Art. Int. Soft Comp</source>
          . vol.
          <volume>12855</volume>
          , pp.
          <fpage>318</fpage>
          -
          <lpage>329</lpage>
          . Springer Int. Pub., (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          48.
          <string-name>
            <surname>Zhang</surname>
          </string-name>
          , R.,
          <string-name>
            <surname>Albrecht</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kausch</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Putzer</surname>
            ,
            <given-names>H.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Geipel</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Halady</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>DDE process: A requirements engineering approach for machine learning in automated driving</article-title>
          .
          <source>In: 29th RE Conference (RE)</source>
          , pp.
          <fpage>269</fpage>
          -
          <lpage>279</lpage>
          . IEEE (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          49.
          <string-name>
            <surname>Owen</surname>
          </string-name>
          , R.:
          <article-title>Net Promoter Score and Its Successful Application</article-title>
          . In: Kompella,
          <string-name>
            <surname>K</surname>
          </string-name>
          . (ed.)
          <article-title>Marketing Wisdom</article-title>
          .
          <source>Management for Professionals</source>
          , pp.
          <fpage>17</fpage>
          -
          <lpage>29</lpage>
          . Springer Singapore, Singapore (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -981-10-7724-
          <issue>1</issue>
          _
          <fpage>2</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          50.
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Net Promoter Score</article-title>
          . In: Carney-Morris,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Appling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Spigelmyer</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 2018 ACM SIGUCCS Annual Conference</source>
          , pp.
          <fpage>63</fpage>
          -
          <lpage>64</lpage>
          . ACM, New York, NY, USA (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1145/3235715.3235752
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          51.
          <string-name>
            <surname>Davis</surname>
            ,
            <given-names>F.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bagozzi</surname>
            ,
            <given-names>R.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Warshaw</surname>
            ,
            <given-names>P.R.</given-names>
          </string-name>
          :
          <source>User Acceptance of Comp. Technology:A Comparison of Two Theoretical Models. Managm.Sc</source>
          .vol.
          <volume>35</volume>
          ,
          <fpage>982</fpage>
          -
          <lpage>1003</lpage>
          (
          <year>1989</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          52.
          <string-name>
            <surname>Wohlin</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Runeson</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Höst</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ohlsson</surname>
            ,
            <given-names>M.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Regnell</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wesslén</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          : Experimentation in Software Engineering. Springer Berlin Heidelberg, (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          53.
          <string-name>
            <surname>Petersen</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Feldt</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mujtaba</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Mattsson</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Systematic mapping studies in software engineering</article-title>
          .
          <source>In 12th International Conference on Evaluation and Assessment in Software Engineering (EASE) 12</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          54.
          <string-name>
            <given-names>A.</given-names>
            <surname>Gjorgjevikj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Mishev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Antovski</surname>
          </string-name>
          and
          <string-name>
            <surname>D.</surname>
          </string-name>
          <article-title>Trajanov: Requirements Engineering in Machine Learning Projects</article-title>
          ,
          <source>in IEEE Access</source>
          , vol.
          <volume>11</volume>
          , pp.
          <fpage>72186</fpage>
          -
          <lpage>72208</lpage>
          ,
          <year>2023</year>
          , doi: 10.1109/ACCESS.
          <year>2023</year>
          .
          <volume>3294840</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>