Abstract
“All models are wrong, but some are useful” as the statistician George Box famously remarked (1979). Indeed, all computer models entail approximations that make them quantitatively “wrong” to some degree. Yet some models can be useful, likewise to a degree, for some applications but not for all. This holds when computer models of sensor or weapon systems are used to simulate actual system performance during the action of the game. In war gaming (broadly defined here as any application relying on models of sensor & weapon systems), a model is useful insofar as it supports the outcomes of the gaming, which may be education, training, tactical evaluation, force optimization, concept development, and so forth. To prove that a model suffices for given objectives is difficult, costly, and usually inconclusive. An alternate method for evaluating model adequacy early in a project in light of gaming objectives is described here. The method is based on well-known principles of hypothesis testing. It is therefore 1) objective and evidence based; 2) applicable to a wide range of computer models and gaming objectives; 3) requires moderate technical expertise, without requiring war-game developers to venture into the specialization of model developers. The method provides a framework for soliciting and evaluating the available evidence for model adequacy in light of gaming objectives, when allocating resources and exploring modeling options and suitability, early in a project.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Box, G.E.P.: Robustness in the strategy of scientific model building. In: Launer, R.L., Wilkinson, G.N. (eds.) Robustness in Statistics. Academic Press, New York (1979)
Kessel, R.T.: How ground-truth data can quietly stall your modelling & simulation programme, Technical Note TN-001-08Mar14 (2014)
Carson, J.S.: Model Verification & Validation. In: Yücesan, E., Chen, C.-H., Snowdon, J.L., Charnes, J.M. (eds.) Proceedings of the 2002 Winter Simulation Conference (2002)
Sargent, R.G.: Verification and Validation of Simulation Models. In: Jain, S., Creasey, R.R., Himmelspach, J., White, K.P., Fu, M. (eds.) Proceedings of the 2011 Winter Simulation Conference (2011)
Kessel, R.T.: Probabilistic versus Physical Models of Sensor and Weapon Systems, Technical Note TN-002-08Mar14 (2014)
Kessel, R.T.: Harbour Protection Table-Top Exercise (HPT2E): Final Report, CMRE-FR-2013 (February 2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Kessel, R.T. (2014). Computer Models of Sensor and Weapon Systems: Assessing Model Utility Early in War-Game Development. In: Hodicky, J. (eds) Modelling and Simulation for Autonomous Systems. MESAS 2014. Lecture Notes in Computer Science, vol 8906. Springer, Cham. https://doi.org/10.1007/978-3-319-13823-7_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-13823-7_26
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13822-0
Online ISBN: 978-3-319-13823-7
eBook Packages: Computer ScienceComputer Science (R0)