Modeling correction activities in the context of verification strategies
dc.contributor.author | Xu, Peng | |
dc.contributor.author | Salado, Alejandro | |
dc.date.accessioned | 2021-12-08T21:59:08Z | |
dc.date.available | 2021-12-08T21:59:08Z | |
dc.date.issued | 2021-11-19 | |
dc.identifier.citation | Xu, P., & Salado, A. (2021). Modeling correction activities in the context of verification strategies. Systems Engineering. | en_US |
dc.identifier.issn | 1098-1241 | |
dc.identifier.doi | 10.1002/sys.21609 | |
dc.identifier.uri | http://hdl.handle.net/10150/662470 | |
dc.description.abstract | Correction activities (CAs), which can take the form of redesign, rework, or repair, are essential to system development. Whereas verification activities (VAs) provide information about the state of the system, CAs modify the state of the system to facilitate its correct operation. However, existing approaches to modeling and optimizing verification strategies take a simplistic approach to CAs. Specifically, CAs are modeled as an expected cost to achieve a desired confidence level after a VA has failed and are inherent to such VAs. In this paper, we present a modeling paradigm based on Bayesian networks (BNs) that captures the effects of different types of CAs. This modeling paradigm allows for the integration of verification and correction decisions (CDs) under a common framework. The modeling paradigm is illustrated in the notional case of a communication system. | en_US |
dc.description.sponsorship | National Science Foundation | en_US |
dc.language.iso | en | en_US |
dc.publisher | Wiley | en_US |
dc.rights | © 2021 Wiley Periodicals LLC. | en_US |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | en_US |
dc.subject | Bayesian network | en_US |
dc.subject | causal interaction | en_US |
dc.subject | redesign | en_US |
dc.subject | repair | en_US |
dc.subject | rework | en_US |
dc.subject | system verification | en_US |
dc.subject | uncertain evidence | en_US |
dc.subject | verification planning | en_US |
dc.title | Modeling correction activities in the context of verification strategies | en_US |
dc.type | Article | en_US |
dc.identifier.eissn | 1520-6858 | |
dc.contributor.department | Department of Systems and Industrial Engineering, The University of Arizona | en_US |
dc.identifier.journal | Systems Engineering | en_US |
dc.description.note | 12 month embargo; published online: 19 November 2021 | en_US |
dc.description.collectioninformation | This item from the UA Faculty Publications collection is made available by the University of Arizona with support from the University of Arizona Libraries. If you have questions, please contact us at repository@u.library.arizona.edu. | en_US |
dc.eprint.version | Final accepted manuscript | en_US |
dc.identifier.pii | 10.1002/sys.21609 | |
dc.source.journaltitle | Systems Engineering |