The Role of Modeling and Simulation in Requirements Analysis For Acquisition of C2 Software Systems
Loading...
Authors
Huynh, Thomas V.
Osmundson, John S.
Subjects
Advisors
Date of Issue
1996-06
Date
June 25-28, 1996
Publisher
Center for Advanced Concepts and Technology
Language
Abstract
1.0 Introduction - The C2 Software Requirements Problem. The DoD is currently spending over $40B per year for acquisition of software systems. Many o f these procurements experience cost growth, schedule delays, and technical shortfalls. Improvements have been made in recent years in the software acquisition process. The Software Engineering Institute (SEI) has introduced a capabilities maturity model (CMM) that is widely used by contractors as a guide to software development, and by the Government as a software proposal evaluation guideline. Nevertheless some procurements continue to experience serious troubles. C2 systems are intended to integrate and synchronize operations o f forces. Therefore, these systems have critical interface requirements, particularly time- critical interface requirements. This is an area where traditional system engineering lacks robust methods and tools to aid in requirements analysis prior to the begins of software development. Requirements analysis ofC2 software systems can be-improved, however, through the use of modeling and simulation, both on the part ofthe developer and the acquisition office, to improve the understanding of interface requirements and to serve as a software test bad. Most software errors are attnl>utable to errors made in the early stages o f a software system development, particularly during requirements analysis, and therefore the most critical role of simulation and modeling in the acquisition of C2 systems is in early stages of requirements analysis and interface definition.
Type
Conference Paper
Description
Proceedings of the 1996 Command and Control Research and Technology Symposium: Command and Control in the Information Age
Series/Report No
Department
Organization
Identifiers
NPS Report Number
Sponsors
Funder
Format
3 p.
Citation
Proceedings of the 1996 Command and Control Research and Technology Symposium: Command and Control in the Information Age, p. 792-794
Distribution Statement
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.