scispace - formally typeset
Search or ask a question

Showing papers on "Verification and validation of computer simulation models published in 1985"


Journal ArticleDOI
TL;DR: An approach towards developing tests to empirically validate dynamic thermal models is given and numerous sources of error have existed in previous studies leading to uncertainty in model predictions.
Abstract: A methodology for the validation of dynamic thermal models of buildings has been presented. The three techniques, analytical verification, inter-model comparisons and empirical validation have been described and their relative merits assessed by reference to previous validation work on ESP, SERIR'S, DEROB and BLAST. Previous empirical validation work on these models has been reviewed. This research has shown that numerous sources of error have existed in previous studies leading to uncertainty in model predictions. The effects of these errors has meant that none of the previous empirical validation studies would have produced conclusive evidence of internal errors in the models themselves. An approach towards developing tests to empirically validate dynamic thermal models is given.

43 citations


Proceedings ArticleDOI
15 Dec 1985
TL;DR: This expository paper gives a general introduction to verification and validation of simulation models, define the various validation techniques, and presents a recommended model validation procedure.
Abstract: In this expository paper we give a general introduction to verification and validation of simulation models, define the various validation techniques, and present a recommended model validation procedure

40 citations


Journal ArticleDOI
Suzuki1
TL;DR: Conurrent Prolog provides a readable, efficient compromise between functional simulation and formal verification of VLSI chip design and may become the language of choice for this application.
Abstract: As long as simulation is relied upon, the hardware will only be as good as the test data; therefore most widely used computers contain bugs. Verification is the only known technique for theoretically complete debugging, but it remains impractical despite researchers' efforts. This article explores a methodology in between functional simulation and formal verification. The correctness of hardware is specified as in formal verification. Input and output assertions are given in predicate calculus. Then, instead of showing that output assertions will be satisfied by the functional specification of hardware for all inputs that satisfy input assertions, it is shown that this relation holds for selected inputs. The triple, input assertion, hardware specification, and output assertion are run against test data. The advantage of this method over functional simulation is that the output data are automatically checked for correctness. The advantage over formal verification is that processes can be executed without being penalized by the incompleteness and inefficiency of theorem provers. Concurrent Prolog provides a readable, efficient compromise between functional simulation and formal verification of VLSI chip design. It is well suited for simulation of component systems and may become the language of choice for this application.

34 citations


01 Nov 1985
TL;DR: The Software Engineering Laboratory applied the IV & V methodology to two medium-size flight dynamics software development projects and found that the use of the methodology did not help the overall process nor improve the product in these cases.
Abstract: One approach to reducing software cost and increasing reliability is the use of an independent verification and validation (IV & V) methodology. The Software Engineering Laboratory (SEL) applied the IV & V methodology to two medium-size flight dynamics software development projects. Then, to measure the effectiveness of the IV & V approach, the SEL compared these two projects with two similar past projects, using measures like productivity, reliability, and maintain ablilty. Results indicated that the use of the IV & V methodology did not help the overall process nor improve the product in these cases.

13 citations


Journal ArticleDOI
TL;DR: A two-step procedure to solve the problem of computer-aided verification of the software design, which results in a considerable improvement of reliability and the achievement of an error-free system and a substitute for a verification of safety.

2 citations


13 Mar 1985
TL;DR: This paper demonstrates how a simulation model can be developed to estimate the average time to run a computer simulation with a large number of users in a computer equipment environment where some of the equipment is dedicated to individual users during their session and other equipment is shared by the users.
Abstract: This paper demonstrates how a simulation model can be developed to estimate the average time to run a computer simulation with a large number of users in a computer equipment environment where some of the equipment is dedicated to individual users during their session and other equipment is shared by the users. We explain the rationale for building such a simulation, develop the analytical basis upon which the simulation is built and present the details of the simulation. In essence, we advocate the use of one simulation model to insure the successful use of another simulation model. In this paper we refer to the simulation used by the participants in the lab as the “object simulation” and the simulation used to estimate the average session time as the “estimator simulation.”

2 citations


Journal Article
TL;DR: A review is given of the types of models that have found use in real-time operations, ranging from basic simulations using only the physical constraint equations to hierarchical multiple-purpose optimization models.
Abstract: Over the years many mathematical models have been developed with potential application to computer-aided real-time reservoir operations. Only a few of these models have been practically used. Some reasons for this lack of implementation are discussed. Also, a review is given of the types of models that have found use in real-time operations, ranging from basic simulations using only the physical constraint equations to hierarchical multiple-purpose optimization models.

1 citations


ReportDOI
01 Nov 1985
TL;DR: Nonparametric statistical techniques were subsequently adapted to both deterministic and stochastic simulations, and these procedures were applied to a computer model currently in use at the Ballistic Research Laboratory.
Abstract: : Initially the authors completed a literature search in order to identify existing methods of computer simulation validation. Nonparametric statistical techniques were subsequently adapted to both deterministic and stochastic simulations, and these procedures were applied to a computer model currently in use at the Ballistic Research Laboratory. Monte-Carlo methods provided an indication of the power of these tests, and a mention of future work concerning attempts to increase this power has been included in this report. Keywords: VAST(Vulnerability Analysis for Surface Targets).

1 citations