SlideShare a Scribd company logo
1 of 27
Gregory Gay West Virginia University greg@greggay.com Finding Robust Solutions to Requirements Models
Consider a requirements model… Contains: Various goals of a project. All methods for reaching those goals. Risks that could compromise those goals. Mitigations that remove risks. A solution: balance between cost and attainment. This is a non-linear optimization problem! 2
Understanding the Solution Space Open and pressing issue.  Many SE problems are over-constrained – no right answer, so give partial solutions. Robustness of solutions is key – many algorithms give brittle results. Important to present insight into the neighborhood. What happens if I do B instead of A?  3
The Naïve Approach Naive approaches to understanding neighborhood: Run N times and report (a) the solutions appearing in more than N/2 cases, or (b) results with a 95% confidence interval. Both are flawed – they require multiple trials! Neighborhood assessment must be fast. Real-time if possible. 4
Research Goals 5 Two important concerns: Is demonstrating solution robustness a time-consuming task? Must solution quality be traded against solution robustness?
The Defect Detection and Prevention Model Used at NASA JPL Early-lifecycle requirements model Light-weight ontology represents: Requirements:  project objectives, weighted by importance. Risks: events that damage attainment of requirements. Mitigations: precautions that remove risk, carry a cost value. Mappings: Directed, weighted edges between requirements and risks and between risks and mitigations. Part-of-relations: Provide structure between model components. 6
Light-weight != Trivial 7
Why Use DDP? Three Reasons: Demonstrably useful – cost savings often over $100,000, numerous design improvements seen in DDP sessions, overall shift in risks in JPL projects. Availability of real-world models now and in the future. DDP is representative of other requirements tools. Set of influences, expressed in a hierarchy, relationships modeled through equations. 8
Using DDP Input = Set of enabled mitigations. Output = Two values: (Cost, Attainment) Those values are normalized and combined into a single score: 9
Theory of KEYS Theory: A minority of variables control the majority of the search space.  If so, then a search that (a) finds those keys and (b) explores their ranges will rapidly plateau to stable, optimal solutions. This is not new: narrows, master-variables, back doors, and feature subset selection all work on the same theory.  10
KEYS Algorithm Two components: greedy search and a Bayesian ranking method. Each round, a greedy search: Generate 100 configurations of mitigations 1…M. Score them. Sort top 10% of scores into “Best” grouping, bottom 90% into “Rest.” Rank individual mitigations using BORE. The top ranking mitigation is fixed for all subsequent rounds. Stop when every mitigation has a value, return final cost and attainment values. 11
BORE Ranking Heuristic We don’t have to actually search for the keys, just keep frequency counts for “best” and “rest” scores. BORE based on Bayes’ theorem. Use those frequency counts to calculate:  To avoid low-frequency evidence, add support term: 12
KEYS vs KEYS2 13 KEYS fixes a single top-ranked mitigation each round. KEYS2 incrementally sets more (1 in round 1, w in round 2… M in round M) Slightly less tame, much faster.
Benchmarked Algorithms KEYS much be benchmarked against standard SBSE techniques.  Simulated Annealing, MaxWalkSat, A* Search Chosen techniques are discrete, sequential, unconstrained algorithms. Constrained searches work towards a pre-determined number of solutions, unconstrained adjust to their goal space. 14
Simulated Annealing Classic, yet common, approach. Choose a random starting position.  Look at a “neighboring” configuration. If it is better, go to it. If not, move based on guidance from probability function (biased by the current temperature). Over time, temperature lowers. Wild jumps stabilize to small wiggles. 15
MaxWalkSat 16 Hybridized local/random search.  Start with random configuration. Either perform Local Search: Move to a neighboring configuration with a better score. (70%) Random Search: Change one random mitigation setting. (30%) Keeps working towards a score threshold. Allotted a certain number of resets, which it will use if it fails to pass the threshold within a certain number of rounds.
A* Search 17 Best first path-finding heuristic.  Uses distance from origin (G) and estimated cost to goal (H), and moves to the neighbor that minimizes G+H. Moves to new location and adds the previous location to a closed list to prevent backtracking. Optimal search because it always underestimates H. Stops after being stuck for 10 rounds.
Experiment 1: Costs and Attainments 18 Using real-world models 2,4,5 (1,3 are too small and were only used for debugging): Run each algorithm 1000 times per model. Removed outlier problems by generating a lot of data points. Still a small enough number to collect results in a short time span. Graph cost and attainment values. Values towards bottom-right better.
Experiment 1 Results 19
Experiment 2: Runtimes 20 For each model: Run each algorithm 100 times. Record runtime using Unix “time” command. Divide runtime/100 to get average.
Experiment 2 Results 21
Decision Ordering Diagrams 22 Design  of KEYS2 automatically provides a way to explore the decision neighborhood.  Decision ordering diagrams – Visual format that ranks decisions from most to least important .
Decision Ordering Diagrams 23 These diagrams can be used to assess solution robustness in linear time by  Considering the variance in performance after applying X decisions. Comparing the results of using the first X decisions to that of X-1 or X+1. Useful under three conditions: (a) scores output are well-behaved , (b) variance is tamed, and (c) they are generated in a timely manner.
Conclusions 24 Optimization tools can study the space of requirements, risks, and mitigations.  Finding a balance between costs and attainment is hard! Such solutions can be brittle, so we must comment on solution robustness. Candidate solution: KEYS2
Conclusions (2) 25 Pre-experimental concerns: An algorithm would need to trade solution quality for robustness (variance vs score). Demonstrating solution robustness  is time-consuming and requires multiple procedure calls. KEYS2 defies both concerns.  Generates higher quality solutions than standard methods, and generates results that are tame and well-behaved (thus, we can generate decision ordering graphs to assess robustness). Is faster than other techniques, and can generate decision ordering graphs in O(N2)
Conclusions (3) 26 Therefore, we recommend KEYS2 for the optimization of requirements models (and other SBSE problems) because it is fast, its results are well-behaved and tame, and it allows for exploration of the search space.
Questions? 27 I would like to thank Dr. Zhang for the invitation and all of you for attending! Want to contact me later? Email: greg@greggay.com MSN Messenger: greg@4colorrebellion.com Gtalk: momoku@gmail.com More about me: http://www.greggay.com

More Related Content

What's hot

Use of Definitive Screening Designs to Optimize an Analytical Method
Use of Definitive Screening Designs to Optimize an Analytical MethodUse of Definitive Screening Designs to Optimize an Analytical Method
Use of Definitive Screening Designs to Optimize an Analytical MethodPhilip Ramsey
 
352735346 rsh-qam11-tif-16-doc
352735346 rsh-qam11-tif-16-doc352735346 rsh-qam11-tif-16-doc
352735346 rsh-qam11-tif-16-docFiras Husseini
 
Modeling strategies for definitive screening designs using jmp and r
Modeling strategies for definitive  screening designs using jmp and rModeling strategies for definitive  screening designs using jmp and r
Modeling strategies for definitive screening designs using jmp and rPhilip Ramsey
 
ADVANCED OPTIMIZATION TECHNIQUES META-HEURISTIC ALGORITHMS FOR ENGINEERING AP...
ADVANCED OPTIMIZATION TECHNIQUES META-HEURISTIC ALGORITHMS FOR ENGINEERING AP...ADVANCED OPTIMIZATION TECHNIQUES META-HEURISTIC ALGORITHMS FOR ENGINEERING AP...
ADVANCED OPTIMIZATION TECHNIQUES META-HEURISTIC ALGORITHMS FOR ENGINEERING AP...Ajay Kumar
 
352735347 rsh-qam11-tif-14-doc
352735347 rsh-qam11-tif-14-doc352735347 rsh-qam11-tif-14-doc
352735347 rsh-qam11-tif-14-docFiras Husseini
 
Research Paper C - 1530 - 13-05-15
Research Paper C - 1530 - 13-05-15Research Paper C - 1530 - 13-05-15
Research Paper C - 1530 - 13-05-15Andrew Dash
 
352735343 rsh-qam11-tif-07-doc
352735343 rsh-qam11-tif-07-doc352735343 rsh-qam11-tif-07-doc
352735343 rsh-qam11-tif-07-docFiras Husseini
 
Response surface method
Response surface methodResponse surface method
Response surface methodIrfan Hussain
 
352735327 rsh-qam11-tif-04-doc
352735327 rsh-qam11-tif-04-doc352735327 rsh-qam11-tif-04-doc
352735327 rsh-qam11-tif-04-docFiras Husseini
 
Satisfaction and loyalty
Satisfaction and loyaltySatisfaction and loyalty
Satisfaction and loyaltyTheDataNation
 
Pa, moderation, mediation (final)
Pa, moderation, mediation (final)Pa, moderation, mediation (final)
Pa, moderation, mediation (final)ahmed-nor
 
Design of experiments-Box behnken design
Design of experiments-Box behnken designDesign of experiments-Box behnken design
Design of experiments-Box behnken designGulamhushen Sipai
 
RESPONSE SURFACE METHODOLOGY
RESPONSE SURFACE METHODOLOGYRESPONSE SURFACE METHODOLOGY
RESPONSE SURFACE METHODOLOGYhakitasina
 
165662191 chapter-03-answers-1
165662191 chapter-03-answers-1165662191 chapter-03-answers-1
165662191 chapter-03-answers-1Firas Husseini
 
200844797 rsh-qam11-tif-01-doc
200844797 rsh-qam11-tif-01-doc200844797 rsh-qam11-tif-01-doc
200844797 rsh-qam11-tif-01-docFiras Husseini
 
Confounding in Experimental Design
Confounding in Experimental DesignConfounding in Experimental Design
Confounding in Experimental DesignMdShakilSikder
 
Numerical analysis genetic algorithms
Numerical analysis  genetic algorithmsNumerical analysis  genetic algorithms
Numerical analysis genetic algorithmsSHAMJITH KM
 

What's hot (20)

Use of Definitive Screening Designs to Optimize an Analytical Method
Use of Definitive Screening Designs to Optimize an Analytical MethodUse of Definitive Screening Designs to Optimize an Analytical Method
Use of Definitive Screening Designs to Optimize an Analytical Method
 
352735346 rsh-qam11-tif-16-doc
352735346 rsh-qam11-tif-16-doc352735346 rsh-qam11-tif-16-doc
352735346 rsh-qam11-tif-16-doc
 
Modeling strategies for definitive screening designs using jmp and r
Modeling strategies for definitive  screening designs using jmp and rModeling strategies for definitive  screening designs using jmp and r
Modeling strategies for definitive screening designs using jmp and r
 
ADVANCED OPTIMIZATION TECHNIQUES META-HEURISTIC ALGORITHMS FOR ENGINEERING AP...
ADVANCED OPTIMIZATION TECHNIQUES META-HEURISTIC ALGORITHMS FOR ENGINEERING AP...ADVANCED OPTIMIZATION TECHNIQUES META-HEURISTIC ALGORITHMS FOR ENGINEERING AP...
ADVANCED OPTIMIZATION TECHNIQUES META-HEURISTIC ALGORITHMS FOR ENGINEERING AP...
 
Stochastic Optimization
Stochastic OptimizationStochastic Optimization
Stochastic Optimization
 
352735347 rsh-qam11-tif-14-doc
352735347 rsh-qam11-tif-14-doc352735347 rsh-qam11-tif-14-doc
352735347 rsh-qam11-tif-14-doc
 
Research Paper C - 1530 - 13-05-15
Research Paper C - 1530 - 13-05-15Research Paper C - 1530 - 13-05-15
Research Paper C - 1530 - 13-05-15
 
352735343 rsh-qam11-tif-07-doc
352735343 rsh-qam11-tif-07-doc352735343 rsh-qam11-tif-07-doc
352735343 rsh-qam11-tif-07-doc
 
Response surface method
Response surface methodResponse surface method
Response surface method
 
352735327 rsh-qam11-tif-04-doc
352735327 rsh-qam11-tif-04-doc352735327 rsh-qam11-tif-04-doc
352735327 rsh-qam11-tif-04-doc
 
Satisfaction and loyalty
Satisfaction and loyaltySatisfaction and loyalty
Satisfaction and loyalty
 
Pa, moderation, mediation (final)
Pa, moderation, mediation (final)Pa, moderation, mediation (final)
Pa, moderation, mediation (final)
 
Design of experiments-Box behnken design
Design of experiments-Box behnken designDesign of experiments-Box behnken design
Design of experiments-Box behnken design
 
Crv
CrvCrv
Crv
 
RESPONSE SURFACE METHODOLOGY
RESPONSE SURFACE METHODOLOGYRESPONSE SURFACE METHODOLOGY
RESPONSE SURFACE METHODOLOGY
 
165662191 chapter-03-answers-1
165662191 chapter-03-answers-1165662191 chapter-03-answers-1
165662191 chapter-03-answers-1
 
200844797 rsh-qam11-tif-01-doc
200844797 rsh-qam11-tif-01-doc200844797 rsh-qam11-tif-01-doc
200844797 rsh-qam11-tif-01-doc
 
Confounding in Experimental Design
Confounding in Experimental DesignConfounding in Experimental Design
Confounding in Experimental Design
 
Parameter estimation
Parameter estimationParameter estimation
Parameter estimation
 
Numerical analysis genetic algorithms
Numerical analysis  genetic algorithmsNumerical analysis  genetic algorithms
Numerical analysis genetic algorithms
 

Viewers also liked

Irrf Presentation
Irrf PresentationIrrf Presentation
Irrf Presentationgregoryg
 
Costing your Bug Data Operations
Costing your Bug Data OperationsCosting your Bug Data Operations
Costing your Bug Data OperationsDataWorks Summit
 
Using Predictive Analytics: Secrets to Creating a Successful Predictive Enter...
Using Predictive Analytics: Secrets to Creating a Successful Predictive Enter...Using Predictive Analytics: Secrets to Creating a Successful Predictive Enter...
Using Predictive Analytics: Secrets to Creating a Successful Predictive Enter...Decision Management Solutions
 
How to Build Decision Management Systems Part 2 Decision services
How to Build Decision Management Systems Part 2 Decision servicesHow to Build Decision Management Systems Part 2 Decision services
How to Build Decision Management Systems Part 2 Decision servicesDecision Management Solutions
 
Community-Assisted Software Engineering Decision Making
Community-Assisted Software Engineering Decision MakingCommunity-Assisted Software Engineering Decision Making
Community-Assisted Software Engineering Decision Makinggregoryg
 
The Robust Optimization of Non-Linear Requirements Models
The Robust Optimization of Non-Linear Requirements ModelsThe Robust Optimization of Non-Linear Requirements Models
The Robust Optimization of Non-Linear Requirements Modelsgregoryg
 
Don't be Hadooped when looking for Big Data ROI
Don't be Hadooped when looking for Big Data ROIDon't be Hadooped when looking for Big Data ROI
Don't be Hadooped when looking for Big Data ROIDataWorks Summit
 

Viewers also liked (7)

Irrf Presentation
Irrf PresentationIrrf Presentation
Irrf Presentation
 
Costing your Bug Data Operations
Costing your Bug Data OperationsCosting your Bug Data Operations
Costing your Bug Data Operations
 
Using Predictive Analytics: Secrets to Creating a Successful Predictive Enter...
Using Predictive Analytics: Secrets to Creating a Successful Predictive Enter...Using Predictive Analytics: Secrets to Creating a Successful Predictive Enter...
Using Predictive Analytics: Secrets to Creating a Successful Predictive Enter...
 
How to Build Decision Management Systems Part 2 Decision services
How to Build Decision Management Systems Part 2 Decision servicesHow to Build Decision Management Systems Part 2 Decision services
How to Build Decision Management Systems Part 2 Decision services
 
Community-Assisted Software Engineering Decision Making
Community-Assisted Software Engineering Decision MakingCommunity-Assisted Software Engineering Decision Making
Community-Assisted Software Engineering Decision Making
 
The Robust Optimization of Non-Linear Requirements Models
The Robust Optimization of Non-Linear Requirements ModelsThe Robust Optimization of Non-Linear Requirements Models
The Robust Optimization of Non-Linear Requirements Models
 
Don't be Hadooped when looking for Big Data ROI
Don't be Hadooped when looking for Big Data ROIDon't be Hadooped when looking for Big Data ROI
Don't be Hadooped when looking for Big Data ROI
 

Similar to Finding Robust Solutions to Requirements Models Using KEYS2

Multiobjective optimization and trade offs using pareto optimality
Multiobjective optimization and trade offs using pareto optimalityMultiobjective optimization and trade offs using pareto optimality
Multiobjective optimization and trade offs using pareto optimalityAmogh Mundhekar
 
Satisfaction And Its Application To Ai Planning
Satisfaction And Its Application To Ai PlanningSatisfaction And Its Application To Ai Planning
Satisfaction And Its Application To Ai Planningahmad bassiouny
 
ngboost.pptx
ngboost.pptxngboost.pptx
ngboost.pptxHadrian7
 
Hybrid Multi-Gradient Explorer Algorithm for Global Multi-Objective Optimization
Hybrid Multi-Gradient Explorer Algorithm for Global Multi-Objective OptimizationHybrid Multi-Gradient Explorer Algorithm for Global Multi-Objective Optimization
Hybrid Multi-Gradient Explorer Algorithm for Global Multi-Objective OptimizationeArtius, Inc.
 
Performance Analysis of Metaheuristics and Hybrid Metaheuristics for the Trav...
Performance Analysis of Metaheuristics and Hybrid Metaheuristics for the Trav...Performance Analysis of Metaheuristics and Hybrid Metaheuristics for the Trav...
Performance Analysis of Metaheuristics and Hybrid Metaheuristics for the Trav...IJCSIS Research Publications
 
Robust Design And Variation Reduction Using DiscoverSim
Robust Design And Variation Reduction Using DiscoverSimRobust Design And Variation Reduction Using DiscoverSim
Robust Design And Variation Reduction Using DiscoverSimJohnNoguera
 
Assignment oprations research luv
Assignment oprations research luvAssignment oprations research luv
Assignment oprations research luvAshok Sharma
 
Epsrcws08 campbell kbm_01
Epsrcws08 campbell kbm_01Epsrcws08 campbell kbm_01
Epsrcws08 campbell kbm_01Cheng Feng
 
Search and Optimization Strategies
Search and Optimization StrategiesSearch and Optimization Strategies
Search and Optimization StrategiesFulvio Corno
 
Verification of GIMP with Manufactured Solutions
Verification of GIMP with  Manufactured SolutionsVerification of GIMP with  Manufactured Solutions
Verification of GIMP with Manufactured Solutionswallstedt
 
MDPSO_SDM_2012_Souma
MDPSO_SDM_2012_SoumaMDPSO_SDM_2012_Souma
MDPSO_SDM_2012_SoumaMDO_Lab
 
Hyperheuristics in Logistics - kassem danach
Hyperheuristics in Logistics - kassem danachHyperheuristics in Logistics - kassem danach
Hyperheuristics in Logistics - kassem danachKassem Danach
 
ASS_SDM2012_Ali
ASS_SDM2012_AliASS_SDM2012_Ali
ASS_SDM2012_AliMDO_Lab
 
CounterFactual Explanations.pdf
CounterFactual Explanations.pdfCounterFactual Explanations.pdf
CounterFactual Explanations.pdfBong-Ho Lee
 
Ai lecture 11(unit02)
Ai lecture  11(unit02)Ai lecture  11(unit02)
Ai lecture 11(unit02)vikas dhakane
 

Similar to Finding Robust Solutions to Requirements Models Using KEYS2 (20)

Multiobjective optimization and trade offs using pareto optimality
Multiobjective optimization and trade offs using pareto optimalityMultiobjective optimization and trade offs using pareto optimality
Multiobjective optimization and trade offs using pareto optimality
 
Satisfaction And Its Application To Ai Planning
Satisfaction And Its Application To Ai PlanningSatisfaction And Its Application To Ai Planning
Satisfaction And Its Application To Ai Planning
 
AI Lesson 10
AI Lesson 10AI Lesson 10
AI Lesson 10
 
Penalty function
Penalty function Penalty function
Penalty function
 
ngboost.pptx
ngboost.pptxngboost.pptx
ngboost.pptx
 
ngboost.pptx
ngboost.pptxngboost.pptx
ngboost.pptx
 
Hybrid Multi-Gradient Explorer Algorithm for Global Multi-Objective Optimization
Hybrid Multi-Gradient Explorer Algorithm for Global Multi-Objective OptimizationHybrid Multi-Gradient Explorer Algorithm for Global Multi-Objective Optimization
Hybrid Multi-Gradient Explorer Algorithm for Global Multi-Objective Optimization
 
Performance Analysis of Metaheuristics and Hybrid Metaheuristics for the Trav...
Performance Analysis of Metaheuristics and Hybrid Metaheuristics for the Trav...Performance Analysis of Metaheuristics and Hybrid Metaheuristics for the Trav...
Performance Analysis of Metaheuristics and Hybrid Metaheuristics for the Trav...
 
Optimization techniques
Optimization techniquesOptimization techniques
Optimization techniques
 
Robust Design And Variation Reduction Using DiscoverSim
Robust Design And Variation Reduction Using DiscoverSimRobust Design And Variation Reduction Using DiscoverSim
Robust Design And Variation Reduction Using DiscoverSim
 
Assignment oprations research luv
Assignment oprations research luvAssignment oprations research luv
Assignment oprations research luv
 
Epsrcws08 campbell kbm_01
Epsrcws08 campbell kbm_01Epsrcws08 campbell kbm_01
Epsrcws08 campbell kbm_01
 
Search and Optimization Strategies
Search and Optimization StrategiesSearch and Optimization Strategies
Search and Optimization Strategies
 
Verification of GIMP with Manufactured Solutions
Verification of GIMP with  Manufactured SolutionsVerification of GIMP with  Manufactured Solutions
Verification of GIMP with Manufactured Solutions
 
MDPSO_SDM_2012_Souma
MDPSO_SDM_2012_SoumaMDPSO_SDM_2012_Souma
MDPSO_SDM_2012_Souma
 
Hyperheuristics in Logistics - kassem danach
Hyperheuristics in Logistics - kassem danachHyperheuristics in Logistics - kassem danach
Hyperheuristics in Logistics - kassem danach
 
ASS_SDM2012_Ali
ASS_SDM2012_AliASS_SDM2012_Ali
ASS_SDM2012_Ali
 
CounterFactual Explanations.pdf
CounterFactual Explanations.pdfCounterFactual Explanations.pdf
CounterFactual Explanations.pdf
 
Ai lecture 11(unit02)
Ai lecture  11(unit02)Ai lecture  11(unit02)
Ai lecture 11(unit02)
 
Moga
MogaMoga
Moga
 

More from gregoryg

Distributed Decision Tree Induction
Distributed Decision Tree InductionDistributed Decision Tree Induction
Distributed Decision Tree Inductiongregoryg
 
Optimizing Requirements Decisions with KEYS
Optimizing Requirements Decisions with KEYSOptimizing Requirements Decisions with KEYS
Optimizing Requirements Decisions with KEYSgregoryg
 
Confidence in Software Cost Estimation Results based on MMRE and PRED
Confidence in Software Cost Estimation Results based on MMRE and PREDConfidence in Software Cost Estimation Results based on MMRE and PRED
Confidence in Software Cost Estimation Results based on MMRE and PREDgregoryg
 
Promise08 Wrapup
Promise08 WrapupPromise08 Wrapup
Promise08 Wrapupgregoryg
 
Improving Analogy Software Effort Estimation using Fuzzy Feature Subset Selec...
Improving Analogy Software Effort Estimation using Fuzzy Feature Subset Selec...Improving Analogy Software Effort Estimation using Fuzzy Feature Subset Selec...
Improving Analogy Software Effort Estimation using Fuzzy Feature Subset Selec...gregoryg
 
Software Defect Repair Times: A Multiplicative Model
Software Defect Repair Times: A Multiplicative ModelSoftware Defect Repair Times: A Multiplicative Model
Software Defect Repair Times: A Multiplicative Modelgregoryg
 
Complementing Approaches in ERP Effort Estimation Practice: an Industrial Study
Complementing Approaches in ERP Effort Estimation Practice: an Industrial StudyComplementing Approaches in ERP Effort Estimation Practice: an Industrial Study
Complementing Approaches in ERP Effort Estimation Practice: an Industrial Studygregoryg
 
Multi-criteria Decision Analysis for Customization of Estimation by Analogy M...
Multi-criteria Decision Analysis for Customization of Estimation by Analogy M...Multi-criteria Decision Analysis for Customization of Estimation by Analogy M...
Multi-criteria Decision Analysis for Customization of Estimation by Analogy M...gregoryg
 
Implications of Ceiling Effects in Defect Predictors
Implications of Ceiling Effects in Defect PredictorsImplications of Ceiling Effects in Defect Predictors
Implications of Ceiling Effects in Defect Predictorsgregoryg
 
Practical use of defect detection and prediction
Practical use of defect detection and predictionPractical use of defect detection and prediction
Practical use of defect detection and predictiongregoryg
 
Risk And Relevance 20080414ppt
Risk And Relevance 20080414pptRisk And Relevance 20080414ppt
Risk And Relevance 20080414pptgregoryg
 
Organizations Use Data
Organizations Use DataOrganizations Use Data
Organizations Use Datagregoryg
 
Cukic Promise08 V3
Cukic Promise08 V3Cukic Promise08 V3
Cukic Promise08 V3gregoryg
 
Boetticher Presentation Promise 2008v2
Boetticher Presentation Promise 2008v2Boetticher Presentation Promise 2008v2
Boetticher Presentation Promise 2008v2gregoryg
 
Elane - Promise08
Elane - Promise08Elane - Promise08
Elane - Promise08gregoryg
 
Risk And Relevance 20080414ppt
Risk And Relevance 20080414pptRisk And Relevance 20080414ppt
Risk And Relevance 20080414pptgregoryg
 
Introduction Promise 2008 V3
Introduction Promise 2008 V3Introduction Promise 2008 V3
Introduction Promise 2008 V3gregoryg
 

More from gregoryg (17)

Distributed Decision Tree Induction
Distributed Decision Tree InductionDistributed Decision Tree Induction
Distributed Decision Tree Induction
 
Optimizing Requirements Decisions with KEYS
Optimizing Requirements Decisions with KEYSOptimizing Requirements Decisions with KEYS
Optimizing Requirements Decisions with KEYS
 
Confidence in Software Cost Estimation Results based on MMRE and PRED
Confidence in Software Cost Estimation Results based on MMRE and PREDConfidence in Software Cost Estimation Results based on MMRE and PRED
Confidence in Software Cost Estimation Results based on MMRE and PRED
 
Promise08 Wrapup
Promise08 WrapupPromise08 Wrapup
Promise08 Wrapup
 
Improving Analogy Software Effort Estimation using Fuzzy Feature Subset Selec...
Improving Analogy Software Effort Estimation using Fuzzy Feature Subset Selec...Improving Analogy Software Effort Estimation using Fuzzy Feature Subset Selec...
Improving Analogy Software Effort Estimation using Fuzzy Feature Subset Selec...
 
Software Defect Repair Times: A Multiplicative Model
Software Defect Repair Times: A Multiplicative ModelSoftware Defect Repair Times: A Multiplicative Model
Software Defect Repair Times: A Multiplicative Model
 
Complementing Approaches in ERP Effort Estimation Practice: an Industrial Study
Complementing Approaches in ERP Effort Estimation Practice: an Industrial StudyComplementing Approaches in ERP Effort Estimation Practice: an Industrial Study
Complementing Approaches in ERP Effort Estimation Practice: an Industrial Study
 
Multi-criteria Decision Analysis for Customization of Estimation by Analogy M...
Multi-criteria Decision Analysis for Customization of Estimation by Analogy M...Multi-criteria Decision Analysis for Customization of Estimation by Analogy M...
Multi-criteria Decision Analysis for Customization of Estimation by Analogy M...
 
Implications of Ceiling Effects in Defect Predictors
Implications of Ceiling Effects in Defect PredictorsImplications of Ceiling Effects in Defect Predictors
Implications of Ceiling Effects in Defect Predictors
 
Practical use of defect detection and prediction
Practical use of defect detection and predictionPractical use of defect detection and prediction
Practical use of defect detection and prediction
 
Risk And Relevance 20080414ppt
Risk And Relevance 20080414pptRisk And Relevance 20080414ppt
Risk And Relevance 20080414ppt
 
Organizations Use Data
Organizations Use DataOrganizations Use Data
Organizations Use Data
 
Cukic Promise08 V3
Cukic Promise08 V3Cukic Promise08 V3
Cukic Promise08 V3
 
Boetticher Presentation Promise 2008v2
Boetticher Presentation Promise 2008v2Boetticher Presentation Promise 2008v2
Boetticher Presentation Promise 2008v2
 
Elane - Promise08
Elane - Promise08Elane - Promise08
Elane - Promise08
 
Risk And Relevance 20080414ppt
Risk And Relevance 20080414pptRisk And Relevance 20080414ppt
Risk And Relevance 20080414ppt
 
Introduction Promise 2008 V3
Introduction Promise 2008 V3Introduction Promise 2008 V3
Introduction Promise 2008 V3
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Finding Robust Solutions to Requirements Models Using KEYS2

  • 1. Gregory Gay West Virginia University greg@greggay.com Finding Robust Solutions to Requirements Models
  • 2. Consider a requirements model… Contains: Various goals of a project. All methods for reaching those goals. Risks that could compromise those goals. Mitigations that remove risks. A solution: balance between cost and attainment. This is a non-linear optimization problem! 2
  • 3. Understanding the Solution Space Open and pressing issue. Many SE problems are over-constrained – no right answer, so give partial solutions. Robustness of solutions is key – many algorithms give brittle results. Important to present insight into the neighborhood. What happens if I do B instead of A? 3
  • 4. The Naïve Approach Naive approaches to understanding neighborhood: Run N times and report (a) the solutions appearing in more than N/2 cases, or (b) results with a 95% confidence interval. Both are flawed – they require multiple trials! Neighborhood assessment must be fast. Real-time if possible. 4
  • 5. Research Goals 5 Two important concerns: Is demonstrating solution robustness a time-consuming task? Must solution quality be traded against solution robustness?
  • 6. The Defect Detection and Prevention Model Used at NASA JPL Early-lifecycle requirements model Light-weight ontology represents: Requirements: project objectives, weighted by importance. Risks: events that damage attainment of requirements. Mitigations: precautions that remove risk, carry a cost value. Mappings: Directed, weighted edges between requirements and risks and between risks and mitigations. Part-of-relations: Provide structure between model components. 6
  • 8. Why Use DDP? Three Reasons: Demonstrably useful – cost savings often over $100,000, numerous design improvements seen in DDP sessions, overall shift in risks in JPL projects. Availability of real-world models now and in the future. DDP is representative of other requirements tools. Set of influences, expressed in a hierarchy, relationships modeled through equations. 8
  • 9. Using DDP Input = Set of enabled mitigations. Output = Two values: (Cost, Attainment) Those values are normalized and combined into a single score: 9
  • 10. Theory of KEYS Theory: A minority of variables control the majority of the search space. If so, then a search that (a) finds those keys and (b) explores their ranges will rapidly plateau to stable, optimal solutions. This is not new: narrows, master-variables, back doors, and feature subset selection all work on the same theory. 10
  • 11. KEYS Algorithm Two components: greedy search and a Bayesian ranking method. Each round, a greedy search: Generate 100 configurations of mitigations 1…M. Score them. Sort top 10% of scores into “Best” grouping, bottom 90% into “Rest.” Rank individual mitigations using BORE. The top ranking mitigation is fixed for all subsequent rounds. Stop when every mitigation has a value, return final cost and attainment values. 11
  • 12. BORE Ranking Heuristic We don’t have to actually search for the keys, just keep frequency counts for “best” and “rest” scores. BORE based on Bayes’ theorem. Use those frequency counts to calculate: To avoid low-frequency evidence, add support term: 12
  • 13. KEYS vs KEYS2 13 KEYS fixes a single top-ranked mitigation each round. KEYS2 incrementally sets more (1 in round 1, w in round 2… M in round M) Slightly less tame, much faster.
  • 14. Benchmarked Algorithms KEYS much be benchmarked against standard SBSE techniques. Simulated Annealing, MaxWalkSat, A* Search Chosen techniques are discrete, sequential, unconstrained algorithms. Constrained searches work towards a pre-determined number of solutions, unconstrained adjust to their goal space. 14
  • 15. Simulated Annealing Classic, yet common, approach. Choose a random starting position. Look at a “neighboring” configuration. If it is better, go to it. If not, move based on guidance from probability function (biased by the current temperature). Over time, temperature lowers. Wild jumps stabilize to small wiggles. 15
  • 16. MaxWalkSat 16 Hybridized local/random search. Start with random configuration. Either perform Local Search: Move to a neighboring configuration with a better score. (70%) Random Search: Change one random mitigation setting. (30%) Keeps working towards a score threshold. Allotted a certain number of resets, which it will use if it fails to pass the threshold within a certain number of rounds.
  • 17. A* Search 17 Best first path-finding heuristic. Uses distance from origin (G) and estimated cost to goal (H), and moves to the neighbor that minimizes G+H. Moves to new location and adds the previous location to a closed list to prevent backtracking. Optimal search because it always underestimates H. Stops after being stuck for 10 rounds.
  • 18. Experiment 1: Costs and Attainments 18 Using real-world models 2,4,5 (1,3 are too small and were only used for debugging): Run each algorithm 1000 times per model. Removed outlier problems by generating a lot of data points. Still a small enough number to collect results in a short time span. Graph cost and attainment values. Values towards bottom-right better.
  • 20. Experiment 2: Runtimes 20 For each model: Run each algorithm 100 times. Record runtime using Unix “time” command. Divide runtime/100 to get average.
  • 22. Decision Ordering Diagrams 22 Design of KEYS2 automatically provides a way to explore the decision neighborhood. Decision ordering diagrams – Visual format that ranks decisions from most to least important .
  • 23. Decision Ordering Diagrams 23 These diagrams can be used to assess solution robustness in linear time by Considering the variance in performance after applying X decisions. Comparing the results of using the first X decisions to that of X-1 or X+1. Useful under three conditions: (a) scores output are well-behaved , (b) variance is tamed, and (c) they are generated in a timely manner.
  • 24. Conclusions 24 Optimization tools can study the space of requirements, risks, and mitigations. Finding a balance between costs and attainment is hard! Such solutions can be brittle, so we must comment on solution robustness. Candidate solution: KEYS2
  • 25. Conclusions (2) 25 Pre-experimental concerns: An algorithm would need to trade solution quality for robustness (variance vs score). Demonstrating solution robustness is time-consuming and requires multiple procedure calls. KEYS2 defies both concerns. Generates higher quality solutions than standard methods, and generates results that are tame and well-behaved (thus, we can generate decision ordering graphs to assess robustness). Is faster than other techniques, and can generate decision ordering graphs in O(N2)
  • 26. Conclusions (3) 26 Therefore, we recommend KEYS2 for the optimization of requirements models (and other SBSE problems) because it is fast, its results are well-behaved and tame, and it allows for exploration of the search space.
  • 27. Questions? 27 I would like to thank Dr. Zhang for the invitation and all of you for attending! Want to contact me later? Email: greg@greggay.com MSN Messenger: greg@4colorrebellion.com Gtalk: momoku@gmail.com More about me: http://www.greggay.com