Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Publisher: Luniver Press
Languages: English
Types: Unknown
Subjects: QA76
When building simulations of complex systems the task of validation is often overlooked. Validation helps provide confidence in the simulation by exploring the link between the models that we build and the real complex system. We investigate software engineering validation techniques from outside the area of complex systems to assess their applicability for the types of simulation we build. We then provide an example of how such techniques can be applied to a complex systems simulation of cells migrating from blood vessels into lymph nodes through the walls of the blood vessels. We suggest that explicitly stating the modelling and simulation assumptions we make is key to the process of validation. Concluding, we highlight a possible process for validating complex systems that explicitly incorporates environmental aspects.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] R. Alexander. Using Simulation for Systems of Systems Hazard Analysis. PhD thesis, Department of Computer Science, University of York, 2007.
    • [2] K. Allenby and T. P. Kelly. Deriving safety requirements using scenarios. In 5th IEEE International Symposium on Requirements Engineering (RE'01). IEEE Computer Society Press, 2001.
    • [3] Paul S. Andrews, Adam T. Sampson, John Markus Bjorndalen, Susan Stepney, Jon Timmis, Douglas N. Warren, and Peter H. Welch. Investigating patterns for the process-oriented modelling and simulation of space in complex systems. In To appear: Arti cial Life XI: Proceedings of the Eleventh International Conference on the Simulation and Synthesis of Living Systems. MIT Press, 2008.
    • [4] G. Bergers and S. Song. The role of pericytes in blood-vessel formation and maintenance. Neuro-Oncology, 7(4):452{464, 2005.
    • [5] J. Bryden and J. Noble. Computational modelling, explicit mathematical treatments, and scienti c explanation. In Arti cial Life X, pages 520{526. MIT Press, 2006.
    • [6] M. Calder, S. Gilmore, and J. Hillston. Modelling the in uence of RKIP on the ERK signalling pathway using the stochastic process algebra PEPA. Transactions on Computational Systems Biology VII, 4230:1{23, 2006.
    • [7] M. Calder, S. Gilmore, J. Hillston, and V. Vyshemirsky. Formal methods for biochemical signalling pathways. In Formal Methods: State of the Art and New Directions. Springer, 2008.
    • [8] G Despotou and T Kelly. Design and development of dependability case architecture during system development. In 25th International System Safety Conference. System Safety Society, 2007.
    • [9] S. Efroni, D. Harel, and I. R. Cohen. Reactive animation: realistic modeling of complex dynamic systems. IEEE Computer, 38(1):38{47, 2005.
    • [10] S. Efroni, D. Harel, and I. R. Cohen. Emergent dynamics of thymocyte development and lineage determination. PLoS Computational Biology, 3(1):0127{0135, 2007.
    • [11] J. M. Epstein. Agent-based computational models and generative social science. Complexity, 4(5):41{60, 1999.
    • [12] M. George , B. Pell, M. Pollack, M. Tambe, and M. Wooldridge. The belief-desire-intention model of agency. In ATAL'98, volume 1555 of LNCS, pages 1{10. Springer, 2000.
    • [13] J. Girard and T. Springer. High endothelial venules (HEVs): specialized endothelium for lymphocyte migration. Immunology Today, 15:449{457, 1995.
    • [14] D. Harel, Y. Setty, S. Efroni, N. Swerdlin, and I. R. Cohen. Concurrency in biological modeling: Behavior, execution and visualization. FBTC 2007: Electronic Notes in Theoretical Computer Science, 194(3):119{131, 2008.
    • [15] P. G. Herman, I. Yamamoto, and H. Z. Mellins. Blood microcirculation in the lymph node during the primary immune response. The Journal of Experimental Medicine, 136:697{713, 1972.
    • [16] C. A. Janeway, P. Travers, M. Walport, and M. J. Shlomchik. Immunobiology: The Immune System in Health and Disease (6th Edition). Garland Science Publishing, 2005.
    • [17] T. P. Kelly. Arguing safety { a systematic approach to managing safety cases. PhD thesis, Department of Computer Science, University of York, 1999. YCST 99/05.
    • [18] K. Ley, C. Laudanna, M. I. Cybulsky, and S. Nourshargh. Getting to the site of in ammation: the leukocyte adhesion cascade updated. Nature Reviews Immunology, 7(9):678{689, 2007.
    • [19] G. F. Miller. Arti cial life as theoretical biology: How to do real science with computer simulation. Technical Report Cognitive Science Research Paper 378, School of Cognitive and Computing Sciences, University of Sussex, 1995.
    • [20] M. Miyasaka and T. Tanaka. Lymphocyte tra cking across high endothelial venules: dogmas and enigmas. Nature Reviews Immunology, 4(5):360{370, 2004.
    • [21] L Padgham and M Winiko . Prometheus: A methodology for developing intelligent agents. In AOSE III, volume 2585 of LNCS, pages 174{185. Springer, 2003.
    • [22] E. Di Paolo, J. Noble, and S. Bullock. Simulation models as opaque thought experiments. In Arti cial Life VII, pages 497{506. MIT Press, 2000.
    • [23] F. Polack, S. Stepney, H. Turner, P. Welch, and F. Barnes. An architecture for modelling emergence in CA-like systems. In ECAL, volume 3630 of LNAI, pages 433{442. Springer, 2005.
    • [24] F. A. C. Polack, T. Hoverd, A. T. Sampson, S. Stepney, and J. Timmis. Complex systems models: Engineering simulations. In ALife XI. MIT press, 2008. to appear.
    • [25] D. J. Pumfrey. The Principled Design of Computer System Safety Analyses. PhD thesis, Department of Computer Science, University of York, 2000.
    • [26] H. K. Rucker, H. J. Wynder, and W. E. Thomas. Cellular mechanisms of CNS pericytes. Brain Research Bulletin, 51(5):363{369, 2000.
    • [27] A. Sadot, J. Fisher, D. Barak, Y. Admanit, M. J. Stern, E. J. A. Hubbard, and D. Harel. Towards veri ed biological models. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2007.
    • [28] R. G. Sargent. An exposition on veri cation and validation of simulation models. In 17th Winter Simulation Conference, pages 15{22. ACM, 1985.
    • [29] R. G. Sargent. The use of graphical models in model validation. In 18th Winter Simulation Conference, pages 237{241. ACM, 1986.
    • [30] R. G. Sargent. Veri cation and validation of simulation models. In 37th Winter Simulation Conference, pages 130{143. ACM, 2005.
    • [31] T. Srivatanakul. Security Analysis with Deviational Techniques. PhD thesis, Department of Computer Science, University of York, UK, 2005. http://www.cs.york.ac.uk/ftpdir/reports/YCST-2005-12.pdf.
    • [32] S. Stepney, F. Polack, and H. Turner. Engineering emergence. In ICECCS'06, pages 89{97. IEEE Computer Society, 2006.
    • [33] J. Sudeikat, L. Braubach, A. Pokahr, and W. Lamersdorf. Evaluation of agent-oriented software methodologies { examination of the gap between modeling and platform. In AOSE 2004, volume 3382 of LNCS, pages 126{141. Sringer, 2004.
    • [34] H. Turner, S. Stepney, and F. Polack. Rule migration: Exploring a design framework for emergence. Int. J. Unconventional Computing, 3(1):49{66, 2007.
    • [35] R. A. Weaver. The Safety of Software { Constructing and Assuring Arguments. PhD thesis, Department of Computer Science, University of York, 2003. YCST-2004-01.
    • [36] M. Wheeler, S. Bullock, E. Di Paolo, J. Noble, M. Bedau, P. Husbands, S. Kirby, and A. Seth. The view from elsewhere: Perspectives on alife modelling. Arti cial Life, 8(1):87{100, 2002.
    • [37] S. Wilson, J. McDermid, P. Fenelon, and P. Kirkham. No more spineless safety cases: A structured method and comprehensive tool support for the production of safety cases. In 2nd International Conference on Control and Instrumentation in Nuclear Installations (INEC'95), 1995.
    • [38] W. Wu and T. Kelly. Towards evidence-based architectural design for safety-critical software applications. In Architecting Dependable Systems, volume 4615 of LNCS. Springer, 2007.
    • [39] B. P. Zeigler. A theory-based conceptual terminology for m&s vv&a. Technical Report 99S-SIW-064, Arizona Center for Integrative Modeling and Simulation, 1999. http://www.acims.arizona.edu/PUBLICATIONS/publications.shtml.
  • Inferred research data

    The results below are discovered through our pilot algorithms. Let us know how we are doing!

    Title Trust
  • No similar publications.

Share - Bookmark

Download from

Cite this article