Situation-aware based self-adaptive architecture for mission critical systems

Sangsoo Kim, Jiyong Park, Heeseo Chae, Hoh Peter In

Research output: Chapter in Book/Report/Conference proceedingConference contribution


Conventional mission-critical systems cannot prevent mission failure in dynamic battlefield environments in which the execution situations or missions change abruptly. To solve this problem, self-adaptive systems have been proposed in the literature. However, the previous studies do not offer specifics on how to identify changes in a system situation or to transform situation information into the actions the systems must take in dynamic environments. This paper proposes a situation-awareness based self-adaptive system architecture (SASA) to support more efficient adaptation and, hence, achieve more accurate and successful missions, even in dynamic execution environments. A case study for air defense systems (ADS) using tests in a HLA/TRI-based real-time distributed simulation environment was implemented.

Original languageEnglish
Title of host publicationEmbedded Software and Systems - Third International Conference, ICESS 2007, Proceedings
PublisherSpringer Verlag
Number of pages12
ISBN (Print)3540726845, 9783540726845
Publication statusPublished - 2007
Event3rd International Conference on Embedded Software and Systems, ICESS 2007 - Daegu, Korea, Republic of
Duration: 2007 May 142007 May 16

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4523 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other3rd International Conference on Embedded Software and Systems, ICESS 2007
Country/TerritoryKorea, Republic of


  • Mission critical system
  • Real-time distributed simulation
  • Self-adaptation
  • Situation-awareness

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Situation-aware based self-adaptive architecture for mission critical systems'. Together they form a unique fingerprint.

Cite this