Detecting anomalies in constructed complex systems

It is well known that complex systems are difficult to design, implement, and analyze. Component-level verification has improved to the point that we can expect to produce formal or nearly formal verification analyses of all components of a complex system. What remains are the system-level verifications which we believe can be improved by our approach to system development. In earlier papers, we defined the wrapping integration infrastructure (C. Landauer and K.L. Bellman, 1996; 1998; 1999), which shows how a little bit of knowledge about the uses of the different resources goes a very long way towards using them properly, identifying anomalies and even monitoring their behavior. We first describe our knowledge based integration infrastructure, called "wrappings", then we describe some anomaly detection algorithms originally developed for verification and validation, of knowledge based systems, and finally, we show how systems organized using wrappings lend themselves to evaluation studies, both offline and online.

[1]  Alex Quilici,et al.  A knowledge-based approach to encouraging reuse of simulation and modeling programs , 1992, Proceedings Fourth International Conference on Software Engineering and Knowledge Engineering.

[2]  Robin Sibson,et al.  SLINK: An Optimally Efficient Algorithm for the Single-Link Cluster Method , 1973, Comput. J..

[3]  Donald O. Walter,et al.  Some issues in model integration , 1990 .

[4]  C. Landauer Correctness principles for rule-based expert systems☆ , 1990 .

[5]  Richard Bellman,et al.  On the Concepts of a Problem and Problem-Solving , 1960 .

[6]  A. Reinhardt,et al.  Debris analysis workstation: a modeling environment for studies on space debris , 1993 .

[7]  Christopher Landauer,et al.  Designing testable, heterogeneous software environments , 1995, J. Syst. Softw..

[8]  Christopher Landauer,et al.  Generic programming, partial evaluation, and a new programming paradigm , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[9]  Mary Shaw,et al.  Software architecture - perspectives on an emerging discipline , 1996 .

[10]  Mary Shaw,et al.  Tyrannical Languages Still Preempt System Design , 1992 .

[11]  Robin J. Wilson Introduction to Graph Theory , 1974 .

[12]  Kirstie L. Bellman An approach to integrating and creating flexible software environments supporting the design of complex systems , 1991, 1991 Winter Simulation Conference Proceedings..

[13]  Christopher Landauer,et al.  Integration Systems and Interaction Spaces , 1996, FroCoS.

[14]  Kirstie L. Bellman,et al.  The modeling issues inherent in testing and evaluating knowledge-based systems , 1990 .

[15]  Mary Shaw,et al.  Toward relaxing assumptions in languages and their implementations , 1980, SIGP.

[16]  K.L. Bellman,et al.  Wrappings for software development , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.

[17]  Christopher Landauer,et al.  Problem posing interpretation of programming languages , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[18]  Christopher Landauer,et al.  Challenges for conceptual design environments: the VEHICLES experience , 1993 .