2023
DOI: 10.1007/978-3-031-29786-1_14
|View full text |Cite
|
Sign up to set email alerts
|

An Investigation of Challenges Encountered When Specifying Training Data and Runtime Monitors for Safety Critical ML Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 44 publications
0
1
0
Order By: Relevance
“…(R2): Implement a systematic data selection process: This fosters "Trustworthiness by Design" by bridging the gap between the data selected for the training of the ML model and the requirement engineering process (L2) by establishing traceability mechanisms between system requirements, data requirements, and the completeness criteria [18].…”
Section: Rq3: Recommendations For Trustworthy (Er) Autonomous Systemsmentioning
confidence: 99%
“…(R2): Implement a systematic data selection process: This fosters "Trustworthiness by Design" by bridging the gap between the data selected for the training of the ML model and the requirement engineering process (L2) by establishing traceability mechanisms between system requirements, data requirements, and the completeness criteria [18].…”
Section: Rq3: Recommendations For Trustworthy (Er) Autonomous Systemsmentioning
confidence: 99%