A Framework for Simulation Validation & Verification Method Selection

Bill Roungas, Sebastiaan Meijer, Alexander Verbraeck

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

782 Downloads (Pure)

Abstract

Thirty years of research on validation and verification (V\&V) has returned a plethora of methods, statistical techniques, and reported case studies. It is that abundance of methods that poses a major challenge. Because of overlap between methods and time and budget constraints, it is impossible to apply all the available methods in a single study, so a careful selection of methods has to be made. This paper builds on two assumptions: a) that both simulations and V\&V methods can be defined on the basis of different characteristics and b) that certain V\&V methods are more suitable than others for different kinds of simulations. The present study aims at identifying the specific characteristics that make a V\&V method more effective and more efficient than others, when confronting these with the simulations' different characteristics. The conclusion will advance a methodology for choosing the most appropriate method or methods for validating and/or verifying a simulation.
Original languageEnglish
Title of host publicationProceedings of the 9th International Conference on Advances in System Simulation, SIMUL 2017
EditorsArash Ramezani, Edward Williams, Marek Bauer
Pages35-40
Number of pages6
ISBN (Electronic)978-1-61208-594-4
Publication statusPublished - 2017
EventThe 9th International Conference on Advances in System Simulation SIMUL 2017 - athens, Greece
Duration: 8 Oct 201712 Dec 2017
Conference number: 9

Conference

ConferenceThe 9th International Conference on Advances in System Simulation SIMUL 2017
Abbreviated titleSIMUL 2017
Country/TerritoryGreece
Cityathens
Period8/10/1712/12/17

Keywords

  • simulation
  • validation
  • verification
  • method selection

Fingerprint

Dive into the research topics of 'A Framework for Simulation Validation & Verification Method Selection'. Together they form a unique fingerprint.

Cite this