A ModSAF RDR File Interface for the U.S. Army Research Laboratory Vulnerability Server

Report No. ARL-TN-231
Authors: Erik Greenwald
Date/Pages: November 2004; 16 pages
Abstract: With the move to High-Level Architecture and the Modeling Architecture for Technology Research EXperimentation (MATREX) suite, the U.S. Army Research Laboratory Vulnerability/Lethality Server required the ability to read the new database format for vulnerability probabilities. Support was provided through a component to read these database files, find the stored probabilities, and compute the probability packing suitable for selecting an end condition given a random number. The component implements a fast parameter-driven reentrant interface, as well as a compatibility interface based on the server's global values. The new ModSAF "reader" (RDR) file format parser and lookup component provides a highperformance and simple way to extract vulnerability probabilities from MATREX RDR files. While the software was written to support the server software package, the interface to the core RDR parser was made in a generic fashion. This report describes the design and implementation of the component, how to interface it, and a performance analysis as compared to the alternative individual unit of action table component.
Distribution: Approved for public release
  Download Report ( 0.101 MBytes )
If you are visually impaired or need a physical copy of this report, please visit and contact DTIC.

Last Update / Reviewed: November 1, 2004