[1] Vishwakarma S, Agrawal A.A Survey on Activity Recognition and Behavior Understanding in Video Surveillance[J]. The Visual Computer (S0178-2789), 2013, 29(10): 983-1009. [2] 王昌金, 龚光红. 计算机生成兵力[M]. 北京: 国防工业出版社, 2013. Wang Changjin, Gong Guanghong.Computer Generate Forces[M]. Beijing: National Defense Industry Press, 2013. [3] 刘博, 李蜀瑜. 基于NuSMV的AADL行为模型验证的探究[J]. 计算机技术与发展, 2012, 22(2): 110-113. Liu Bo, Li Shuyu.Research on Verification Method of AADL Behavior Model Based on NuSMV[J]. Computer Technology and Development, 2012, 22(2): 110-113. [4] U.S DoD, Defense Modeling and Simulation Office (DMSO). Verification, Validation and Accreditation Recommended Practice Guides (RPG)[EB/OL]. (2016-08-10) [2020-10-20]. http://www.dmso.mil. [5] Balci O, Ormby W F, Carr, et al. Planning for verification, validation, and accreditation of modeling and simulation applications[C]// 32nd conference on Winter simulation. San Diego, CA, USA: Society for Computer Simulation International, 2000. [6] IEEE 1278.EEE 1278.4. IEEE Trial-Use Recommended Practice for Distributed Interactive Simulation Verification, Validation, and Accreditation[Z]. 1997. [7] 总装备部电子信息基础部. 美国校核、验证与确认实践指南(上、下册)[M]. 徐学文, 译. 北京: 海潮出版社, 2001. Electronic Information Foundation Department of General Equipment Department. Verification, Validation and Accreditation (VV&A) recommended practices guide[M]. Xu Xuewen, translated. Beijing: Haichao Press, 2001. [8] 张琪. 学习驱动的CGF决策行为建模方法研究[D]. 长沙: 国防科技大学, 2019. Zhang Qi.Learning Driven Behavior Modeling Methods for Decision Making of CGFs[D]. Changsha: National University of Defense Technology, 2019. [9] 郭齐胜. 计算机生成兵力导论[M]. 北京: 国防工业出版社, 2006. Guo Qisheng.An Introduction of Computer Generated Forces[M]. Beijing: National Defense Industry Press, 2006. [10] 唐见兵, 查亚兵. 作战仿真校核、验证与确认及可信度评估[M]. 北京: 国防工业出版社, 2013. Tang Jianbing, Zha Yabing.Verification, Validation and Accreditation and Credibility Evaluation for Warfare Simulation System[M]. Beijing: National Defense Industry Press, 2013. [11] 唐见兵. 作战仿真系统可信性研究[D]. 长沙: 国防科技大学, 2009. Tang Jianbing.Research on the credibility for warfare simulation system[D]. Changsha: National University of Defense Technology, 2009. [12] 唐见兵, 查亚兵. 基于UML的作战仿真VV&A过程形式化建模[J]. 系统仿真技术, 2013, 9(1): 14-20, 44. Tang Jianbing, Zha Yabing.Formalization Modeling on VV&A Process for Warfare Simulation by UML[J]. System Simulation Technology, 2013, 9(1): 14-20, 44. [13] 叶丽君. 基于UML描述的概念模型校验技术研究[D]. 郑州: 解放军信息工程大学, 2008. Ye Lijun.Research on the V&V Technology of the Conceptual Model Described by UML[D]. Zhengzhou: PLA Information Engineering University, 2008. [14] 李振松, 顾斌. 基于UPPAAL的AADL行为模型验证方法研究[J]. 计算机科学, 2012, 39(2): 159-161. Li Zhensong, Gu Bin.Research on Verification Method of AADL Behavior Model Based on UPPAAL[J]. Computer Science, 2012, 39(2): 159-161. |