Ultra-Large-Scale Systems: The Software Challenge of the Future

Abstract : The U. S. Department of Defense (DoD) has a goal of information dominance to achieve and exploit superior collection, fusion, analysis, and use of information to meet mission objectives. This goal depends on increasingly complex systems characterized by thousands of platforms, sensors, decision nodes, weapons, and warfighters connected through heterogeneous wired and wireless networks. These systems will push far beyond the size of today s systems and systems of systems by every measure: number of lines of code; number of people employing the system for different purposes; amount of data stored, accessed, manipulated, and refined; number of connections and interdependencies among software components; and number of hardware elements. They will be ultra-largescale (ULS) systems. The sheer scale of ULS systems will change everything. ULS systems will necessarily be decentralized in a variety of ways, developed and used by a wide variety of stakeholders with conflicting needs, evolving continuously, and constructed from heterogeneous parts. People will not just be users of a ULS system; they will be elements of the system. Software and hardware failures will be the norm rather than the exception. The acquisition of a ULS system will be simultaneous with its operation and will require new methods for control. These characteristics are beginning to emerge in today s DoD systems of systems; in ULS systems they will dominate. Consequently, ULS systems will place unprecedented demands on software acquisition, production, deployment, management, documentation, usage, and evolution practices.

[1]  Kim B. Clark,et al.  Design Rules: The Power of Modularity , 2000 .

[2]  Martin C. Rinard,et al.  Automatic detection and repair of errors in data structures , 2003, OOPSLA '03.

[3]  E. L. Nichols,et al.  Supply Chain Redesign: Transforming Supply Chains into Integrated Value Systems , 2002 .

[4]  Christian Blum,et al.  Metaheuristics in combinatorial optimization: Overview and conceptual comparison , 2003, CSUR.

[5]  George Candea,et al.  Recursive restartability: turning the reboot sledgehammer into a scalpel , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.

[6]  David E. Kieras,et al.  Towards a Practical GOMS Model Methodology for User Interface Design , 1988 .

[7]  George Candea,et al.  Recovery-oriented computing: building multitier dependability , 2004, Computer.

[8]  Andrew P. Moore,et al.  Attack Modeling for Information Security and Survivability , 2001 .

[9]  Barry Boehm,et al.  Software economics: a roadmap , 2000, ICSE '00.

[10]  Noah Treuhaft,et al.  Recovery Oriented Computing (ROC): Motivation, Definition, Techniques, and Case Studies , 2002 .

[11]  Daniel Jackson,et al.  Software Abstractions - Logic, Language, and Analysis , 2006 .

[12]  Somesh Jha,et al.  Software Design as an Investment Activity: A Real Options Perspective , 1998 .

[13]  K. Kyamakya,et al.  Security and survivability of distributed systems: an overview , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).

[14]  Yuanyuan Song,et al.  Modular software design with crosscutting interfaces , 2006, IEEE Software.

[15]  John R. Koza,et al.  Genetic Programming IV: Routine Human-Competitive Machine Intelligence , 2003 .

[16]  Beverly M. Huey,et al.  Human Performance Models for Computer-Aided Engineering , 1990 .

[17]  F. Schneider Trust in Cyberspace , 1998 .

[18]  Allen Newell,et al.  The psychology of human-computer interaction , 1983 .

[19]  P. Nordin Genetic Programming III - Darwinian Invention and Problem Solving , 1999 .

[20]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.

[21]  Yossi Sheffi,et al.  The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage , 2005 .

[22]  William G. Griswold,et al.  The structure and value of modularity in software design , 2001, ESEC/FSE-9.

[23]  Manuel López-Ibáñez,et al.  Ant colony optimization , 2010, GECCO '10.

[24]  H. Rittel,et al.  Dilemmas in a general theory of planning , 1973 .

[25]  Martin C. Rinard,et al.  Exploring the acceptability envelope , 2005, OOPSLA '05.

[26]  Joan V. Robinson,et al.  The Nature of the Firm , 2004 .

[27]  John R. Koza,et al.  Genetic programming 2 - automatic discovery of reusable programs , 1994, Complex Adaptive Systems.

[28]  John R. Koza,et al.  Genetic programming - on the programming of computers by means of natural selection , 1993, Complex adaptive systems.

[29]  Barry W. Boehm,et al.  Software Engineering Economics , 1993, IEEE Transactions on Software Engineering.