A Mathematical Framework to Apply Tradespace Exploration to the Design of Verification Strategies
MetadataShow full item record
This paper is intended to disseminate some initial outcomes of the NPS Research Acquisition Program's "Tradespace Exploration for Better Verification Strategies"project. The research addresses the design of verification strategies in large-scale systems. Verification activities provide the evidence of contractual fulfillment. Thus, the importance of adequately defining verification activities in any acquisition program is unquestionable. Its significance extends beyond contracting though. The biggest portion of the development financial budget is spent in executing verification activities, and verification activities are the main vehicle in discovering knowledge about the system, which is key to reduce development risk. In current practice, the definition of verification strategies is driven by industry standards and subject matter expert assessment. This research addresses the main question of whether tradespace exploration can support the definition of more valuable verification strategies than current practice. We present in this paper a mathematical framework that enables the application of tradespace exploration to the design of verification strategies.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
NPS Report NumberSYM-AM-18-105
Showing items related by title, author, creator and subject.
Towards the Dynamic Contracting of Verification Activities With Set-Based Design: An Initial Model of Rework Xu, Peng; Salado, Alejandro (Monterey, California. Naval Postgraduate School, 2019-04-30); SYM-AM-19-050This paper is intended to disseminate initial outcomes of the NPS Research Acquisition Program “Dynamic Contracting of Verification Activities by Applying Set-Based Design to the Definition of Verification Strategies” ...
Nguyen, Thuy D.; Irvine, Cynthia E. (International Conference on Information Warfare and Security (ICIW 2008), April 2008, Omaha, Nebraska, USA, 2008-04-01);Success in information warfare will depend on resilient, reconstitutable cyber assets and the ability to assess and respond to attacks. A cornerstone of this success will be the ability of Information Assurance professionals ...
Morris, Brett; Cook, Stephen; Cannon, Stuart; Dwyer, Dylan (Monterey, California. Naval Postgraduate School, 2018-04-30); SYM-AM-18-065This paper covers research to construct a Model-Based Systems Engineering (MBSE) methodology to support above-the-line, or left-of-contract stakeholders during the early stages of Australian naval vessel acquisition projects. ...