Academic literature on the topic 'Sensitivy analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Sensitivy analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Sensitivy analysis"
Anders, Gilberto, and Itamar Borges. "Topological Analysis of the Molecular Charge Density and Impact Sensitivy Models of Energetic Molecules." Journal of Physical Chemistry A 115, no. 32 (August 18, 2011): 9055–68. http://dx.doi.org/10.1021/jp204562d.
Full textRismawati, Rismawati, Lince Bulutoding, and Eka Suhartini. "PENGARUH ORGANIZATIONAL CITIZENSHIP BEHAVIOR, SELF EFFICACY DAN PROFESSIONAL ETHICAL SENSITIVY TERHADAP KINERJA AUDITOR DENGAN EMPLOYEE ENGAGEMENT SEBAGAI MODERASI." ISAFIR: Islamic Accounting and Finance Review 2, no. 1 (June 30, 2021): 98–107. http://dx.doi.org/10.24252/isafir.v2i1.19935.
Full textTaji, Kouichi, and Keiji Matsumoto. "INVERSE SENSITIVE ANALYSIS OF PAIRWISE COMPARISON MATRICES." Journal of the Operations Research Society of Japan 49, no. 4 (2006): 332–41. http://dx.doi.org/10.15807/jorsj.49.332.
Full textRiveros, Bruno, Mariana Rosim, Gabriel Pedro, Rosa Lucchetta, and Marcelo Nita. "Análise de custo-efetividade e a análise de sensibilidade, um roteiro para execução de uma abordagem probabilística: Introdução à análise de sensibilidade probabilística (Parte I)." Jornal de Assistência Farmacêutica e Farmacoeconomia 1, no. 2 (December 2016): 33–38. http://dx.doi.org/10.22563/2525-7323.2016.v1.n2.p.33-38.
Full textHORVATH, Gabor, and Norbert PATAKI. "IMPROVING THE PRECISION OF FLOW-SENSITIVE LIFETIME ANALYSIS." Acta Electrotechnica et Informatica 20, no. 4 (January 21, 2020): 10–18. http://dx.doi.org/10.15546/aeei-2020-0020.
Full textKucherenko, D. Yu. "APPLICATION OF GLUTAMATE-SENSITIVE BIOSENSOR FOR ANALYSIS OF FOODSTUFF." Biotechnologia Acta 11, no. 4 (August 2018): 57–67. http://dx.doi.org/10.15407/biotech11.04.057.
Full textYunanto, Muhamad, and Henny Medyawati. "Fiscal Policy and Monetary Policy: Sensitivity Analysis." International Journal of Trade, Economics and Finance 6, no. 2 (April 2015): 79–84. http://dx.doi.org/10.7763/ijtef.2015.v6.447.
Full textDragičević, N., B. Karleuša, and N. Ožanić. "Erosion Potential Method (Gavrilović method) sensitivity analysis." Soil and Water Research 12, No. 1 (January 18, 2017): 51–59. http://dx.doi.org/10.17221/27/2016-swr.
Full textQichang An, Qichang An, Jingxu Zhang Jingxu Zhang, Fei Yang Fei Yang, and Hongchao Zhao Hongchao Zhao. "Normalized point source sensitivity analysis in GSSM prototype." Chinese Optics Letters 15, no. 11 (2017): 111202. http://dx.doi.org/10.3788/col201715.111202.
Full textJuhl, C. F. "A Context-Sensitive Liar." Analysis 57, no. 3 (July 1, 1997): 202–4. http://dx.doi.org/10.1093/analys/57.3.202.
Full textDissertations / Theses on the topic "Sensitivy analysis"
Fruth, Jana. "Sensitivy analysis and graph-based methods for black-box functions with on application to sheet metal forming." Thesis, Saint-Etienne, EMSE, 2015. http://www.theses.fr/2015EMSE0779/document.
Full textThe general field of the thesis is the sensitivity analysis of black-box functions. Sensitivity analysis studies how the variation of the output can be apportioned to the variation of input sources. It is an important tool in the construction, analysis, and optimization of computer experiments.The total interaction index is presented, which can be used for the screening of interactions. Several variance-based estimation methods are suggested. Their properties are analyzed theoretically as well as on simulations.A further chapter concerns the sensitivity analysis for models that can take functions as input variables and return a scalar value as output. A very economical sequential approach is presented, which not only discovers the sensitivity of those functional variables as a whole but identifies relevant regions in the functional domain.As a third concept, support index functions, functions of sensitivity indices over the input distribution support, are suggested.Finally, all three methods are successfully applied in the sensitivity analysis of sheet metal forming models
Nilsson, Martina. "Mitochondrial DNA in Sensitive Forensic Analysis." Doctoral thesis, Uppsala : Acta Universitatis Upsaliensis : Univ.-bibl. [distributör], 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-7458.
Full textGalanopoulos, Aristides. "Analysis of frequency sensitive competitive learning /." The Ohio State University, 1996. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487941504294837.
Full textWan, Din Wan Ibrahim. "Sensitivity analysis intolerance allocation." Thesis, Queen's University Belfast, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.675480.
Full textMunster, Drayton William. "Sensitivity Enhanced Model Reduction." Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/23169.
Full textMaster of Science
Edlund, Hanna. "Sensitive Identification Tools in Forensic DNA Analysis." Doctoral thesis, Uppsala universitet, Institutionen för genetik och patologi, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-131904.
Full textMazanec, Josef. "Exploratory market structure analysis. Topology-sensitive methodology." SFB Adaptive Information Systems and Modelling in Economics and Management Science, WU Vienna University of Economics and Business, 1999. http://epub.wu.ac.at/928/1/document.pdf.
Full textSeries: Report Series SFB "Adaptive Information Systems and Modelling in Economics and Management Science"
Boccardo, Davidson Rodrigo [UNESP]. "Context-sensitive analysis of x86 obfuscated executables." Universidade Estadual Paulista (UNESP), 2009. http://hdl.handle.net/11449/100286.
Full textCoordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Ofusca c~ao de c odigo tem por nalidade di cultar a detec c~ao de propriedades intr nsecas de um algoritmo atrav es de altera c~oes em sua sintaxe, entretanto preservando sua sem antica. Desenvolvedores de software usam ofusca c~ao de c odigo para defender seus programas contra ataques de propriedade intelectual e para aumentar a seguran ca do c odigo. Por outro lado, programadores maliciosos geralmente ofuscam seus c odigos para esconder comportamento malicioso e para evitar detec c~ao pelos anti-v rus. Nesta tese, e introduzido um m etodo para realizar an alise com sensitividade ao contexto em bin arios com ofuscamento de chamada e retorno de procedimento. Para obter sem antica equivalente, estes bin arios utilizam opera c~oes diretamente na pilha ao inv es de instru c~oes convencionais de chamada e retorno de procedimento. No estado da arte atual, a de ni c~ao de sensitividade ao contexto est a associada com opera c~oes de chamada e retorno de procedimento, assim, an alises interprocedurais cl assicas n~ao s~ao con aveis para analisar bin arios cujas opera c~oes n~ao podem ser determinadas. Uma nova de ni c~ao de sensitividade ao contexto e introduzida, baseada no estado da pilha em qualquer instru c~ao. Enquanto mudan cas em contextos a chamada de procedimento s~ao intrinsicamente relacionadas com transfer encia de controle, assim, podendo ser obtidas em termos de caminhos em um grafo de controle de uxo interprocedural, o mesmo n~ao e aplic avel para mudan cas em contextos a pilha. Um framework baseado em interpreta c~ao abstrata e desenvolvido para avaliar contexto baseado no estado da pilha e para derivar m etodos baseado em contextos a chamada de procedimento para uso com contextos baseado no estado da pilha. O metodo proposto n~ao requer o uso expl cito de instru c~oes de chamada e retorno de procedimento, por em depende do...
A code obfuscation intends to confuse a program in order to make it more di cult to understand while preserving its functionality. Programs may be obfuscated to protect intellectual property and to increase security of code. Programs may also be obfuscated to hide malicious behavior and to evade detection by anti-virus scanners. We introduce a method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations. These binaries may use direct stack operators instead of the native call and ret instructions to achieve equivalent behavior. Since de nition of context-sensitivity and algorithms for context-sensitive analysis has thus far been based on the speci c semantics associated to procedure call and return operations, classic interprocedural analyses cannot be used reliably for analyzing programs in which these operations cannot be discerned. A new notion of context-sensitivity is introduced that is based on the state of the stack at any instruction. While changes in calling-context are associated with transfer of control, and hence can be reasoned in terms of paths in an interprocedural control ow graph (ICFG), the same is not true for changes in stackcontext. An abstract interpretation based framework is developed to reason about stackcontext and to derive analogues of call-strings based methods for the context-sensitive analysis using stack-context. This analysis requires the knowledge of how the stack, rather the stack pointer, is represented and on the knowledge of operators that manipulate the stack pointer. The method presented is used to create a context-sensitive version of Venable et al.'s algorithm for detecting obfuscated calls. Experimental results show that the contextsensitive version of the algorithm generates more precise results and is also computationally more e cient than its context-insensitive counterpart.
Boccardo, Davidson Rodrigo. "Context-Sensitive Analysis of x86 Obfuscated Executables." Ilha Solteira : [s.n.], 2009. http://hdl.handle.net/11449/100286.
Full textBanca: Sergio Azevedo de Oliveira
Banca: Francisco Villarreal Alvarado
Banca: Rodolfo Jardim Azevedo
Banca: André Luiz Moura dos Santos
Resumo: Ofusca c~ao de c odigo tem por nalidade di cultar a detec c~ao de propriedades intr nsecas de um algoritmo atrav es de altera c~oes em sua sintaxe, entretanto preservando sua sem^antica. Desenvolvedores de software usam ofusca c~ao de c odigo para defender seus programas contra ataques de propriedade intelectual e para aumentar a seguran ca do c odigo. Por outro lado, programadores maliciosos geralmente ofuscam seus c odigos para esconder comportamento malicioso e para evitar detec c~ao pelos anti-v rus. Nesta tese, e introduzido um m etodo para realizar an alise com sensitividade ao contexto em bin arios com ofuscamento de chamada e retorno de procedimento. Para obter sem^antica equivalente, estes bin arios utilizam opera c~oes diretamente na pilha ao inv es de instru c~oes convencionais de chamada e retorno de procedimento. No estado da arte atual, a de ni c~ao de sensitividade ao contexto est a associada com opera c~oes de chamada e retorno de procedimento, assim, an alises interprocedurais cl assicas n~ao s~ao con aveis para analisar bin arios cujas opera c~oes n~ao podem ser determinadas. Uma nova de ni c~ao de sensitividade ao contexto e introduzida, baseada no estado da pilha em qualquer instru c~ao. Enquanto mudan cas em contextos a chamada de procedimento s~ao intrinsicamente relacionadas com transfer^encia de controle, assim, podendo ser obtidas em termos de caminhos em um grafo de controle de uxo interprocedural, o mesmo n~ao e aplic avel para mudan cas em contextos a pilha. Um framework baseado em interpreta c~ao abstrata e desenvolvido para avaliar contexto baseado no estado da pilha e para derivar m etodos baseado em contextos a chamada de procedimento para uso com contextos baseado no estado da pilha. O metodo proposto n~ao requer o uso expl cito de instru c~oes de chamada e retorno de procedimento, por em depende do... (Resumo completo, clicar acesso eletrônico abaixo)
Abstract: A code obfuscation intends to confuse a program in order to make it more di cult to understand while preserving its functionality. Programs may be obfuscated to protect intellectual property and to increase security of code. Programs may also be obfuscated to hide malicious behavior and to evade detection by anti-virus scanners. We introduce a method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations. These binaries may use direct stack operators instead of the native call and ret instructions to achieve equivalent behavior. Since de nition of context-sensitivity and algorithms for context-sensitive analysis has thus far been based on the speci c semantics associated to procedure call and return operations, classic interprocedural analyses cannot be used reliably for analyzing programs in which these operations cannot be discerned. A new notion of context-sensitivity is introduced that is based on the state of the stack at any instruction. While changes in calling-context are associated with transfer of control, and hence can be reasoned in terms of paths in an interprocedural control ow graph (ICFG), the same is not true for changes in stackcontext. An abstract interpretation based framework is developed to reason about stackcontext and to derive analogues of call-strings based methods for the context-sensitive analysis using stack-context. This analysis requires the knowledge of how the stack, rather the stack pointer, is represented and on the knowledge of operators that manipulate the stack pointer. The method presented is used to create a context-sensitive version of Venable et al.'s algorithm for detecting obfuscated calls. Experimental results show that the contextsensitive version of the algorithm generates more precise results and is also computationally more e cient than its context-insensitive counterpart.
Doutor
Gasparini, Luca. "Severity sensitive norm analysis and decision making." Thesis, University of Aberdeen, 2017. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=231873.
Full textBooks on the topic "Sensitivy analysis"
Borgonovo, Emanuele. Sensitivity Analysis. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3.
Full textD, Roberts Gary, Bowles Kenneth J, and United States. National Aeronautics and Space Administration., eds. ICAN sensitivity analysis. [Washington, DC]: National Aeronautics and Space Administration, 1990.
Find full textSensitivity and uncertainty analysis. Boca Raton, Fla: Chapman & Hall/CRC, 2003.
Find full textChoi, Kyung K. Structural sensitivity analysis and optimization. New York: Springer Science+Business Media, 2005.
Find full textChatterjee, Samprit. Sensitivity analysis in linear regression. New York: Wiley, 1988.
Find full textBarrick, Nettie J. OASDI short-range sensitivity analysis. [Washington, D.C.?]: Social Security Administration, Office of the Chief Actuary, 1996.
Find full textDeif, Assem. Sensitivity Analysis in Linear Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 1986. http://dx.doi.org/10.1007/978-3-642-82739-6.
Full textUstinov, Eugene A. Sensitivity Analysis in Remote Sensing. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15841-9.
Full textYeung, Daniel S., Ian Cloete, Daming Shi, and Wing W. Y. Ng. Sensitivity Analysis for Neural Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-02532-7.
Full textChatterjee, Samprit, and Ali S. Hadi, eds. Sensitivity Analysis in Linear Regression. Hoboken, NJ, USA: John Wiley & Sons, Inc., 1988. http://dx.doi.org/10.1002/9780470316764.
Full textBook chapters on the topic "Sensitivy analysis"
Becker, Claudia. "Exploring Sensitive Topics: Sensitivity, Jeopardy, and Cheating." In Studies in Classification, Data Analysis, and Knowledge Organization, 299–305. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-10745-0_32.
Full textBorgonovo, Emanuele. "Decisions and Sensitivity Analysis." In Sensitivity Analysis, 1–7. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_1.
Full textBorgonovo, Emanuele. "What to Use and When." In Sensitivity Analysis, 89–91. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_10.
Full textBorgonovo, Emanuele. "Value of Information." In Sensitivity Analysis, 93–100. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_11.
Full textBorgonovo, Emanuele. "Local Sensitivity Analysis with Constraints." In Sensitivity Analysis, 101–13. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_12.
Full textBorgonovo, Emanuele. "Uncertainty Quantification." In Sensitivity Analysis, 117–27. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_13.
Full textBorgonovo, Emanuele. "Global Sensitivity Analysis." In Sensitivity Analysis, 129–38. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_14.
Full textBorgonovo, Emanuele. "Variance-Based Methods." In Sensitivity Analysis, 139–62. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_15.
Full textBorgonovo, Emanuele. "The $$\delta $$ —Importance Measure." In Sensitivity Analysis, 163–80. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_16.
Full textBorgonovo, Emanuele. "CDF-Based Sensitivity Measures." In Sensitivity Analysis, 181–89. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_17.
Full textConference papers on the topic "Sensitivy analysis"
SPENCE, ANNE, and ROBERTO CELI. "EFFICIENT SENSITIVY ANALYSIS FOR ROTARI-WING AEROMECHANICAL PROBLEMS." In 34th Structures, Structural Dynamics and Materials Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1993. http://dx.doi.org/10.2514/6.1993-1648.
Full textHe-yi, Zhang, He Xuehua, and Tang Sing Hai. "High Sensitive Laser Spectroscopy For Detect Trace Rare Earth Impurities In YbF3 and CaF 2 : Y b 3 + Crystals." In Laser Applications to Chemical Analysis. Washington, D.C.: Optica Publishing Group, 1990. http://dx.doi.org/10.1364/laca.1990.tuc5.
Full textLi, Haofeng, Jie Lu, Haining Meng, Liqing Cao, Yongheng Huang, Lian Li, and Lin Gao. "Generic sensitivity: customizing context-sensitive pointer analysis for generics." In ESEC/FSE '22: 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3540250.3549122.
Full textVeirs, Kirk, Victor K. F. Chia, and Gerd M. Rosenblatt. "Application of Position-Sensitive, Photon-Counting Detectors in Raman Spectroscopy." In Laser Applications to Chemical Analysis. Washington, D.C.: Optica Publishing Group, 1987. http://dx.doi.org/10.1364/laca.1987.wa8.
Full textMohammadi, E., and N. Manavizadeh. "Performance and sensitivity analysis of Dual-gated ion sensitive FET." In 2017 Iranian Conference on Electrical Engineering (ICEE). IEEE, 2017. http://dx.doi.org/10.1109/iraniancee.2017.7985490.
Full textSounders, George C., Jomes H. Jett, John C. Martin, and Richard A. Keller. "Flow Cytometric Ultrasensitive Molecular Quantitation Via Antibody-Antigen Interactions." In Laser Applications to Chemical Analysis. Washington, D.C.: Optica Publishing Group, 1987. http://dx.doi.org/10.1364/laca.1987.ma2.
Full textVander Wal, R. L., R. L. Farrow, and D. J. Rakestraw. "Investigation of Line Intensities and Collisional Effects in Degenerate Four-Wave Mixing in Nitric Oxide." In Laser Applications to Chemical Analysis. Washington, D.C.: Optica Publishing Group, 1992. http://dx.doi.org/10.1364/laca.1992.tua2.
Full textWang, Lan-Wei, Fuqin Li, Imam Alam, David Jupp, Simon Oliver, and Medhavy Thankappan. "Analysis Ready Data Sensitivity Analyses." In IGARSS 2019 - 2019 IEEE International Geoscience and Remote Sensing Symposium. IEEE, 2019. http://dx.doi.org/10.1109/igarss.2019.8898667.
Full textZayhowski, J. J., and Bernadette Johnson. "Passively Q-Switched Microchip Lasers for Environmental Monitoring." In Laser Applications to Chemical and Environmental Analysis. Washington, D.C.: Optica Publishing Group, 1996. http://dx.doi.org/10.1364/lacea.1996.lwc.2.
Full textMarr, Andrew J., Bor-Chen Chang, Gregory E. Hall, and Trevor J. Sears. "Near-Infrared Frequency Modulated Detection of Transient Species." In Laser Applications to Chemical and Environmental Analysis. Washington, D.C.: Optica Publishing Group, 1998. http://dx.doi.org/10.1364/lacea.1998.lmc.13.
Full textReports on the topic "Sensitivy analysis"
Ralston-Hooper, Kimberly. Hanford Site Composite Analysis: Dose Sensitivity Analyses. Office of Scientific and Technical Information (OSTI), April 2022. http://dx.doi.org/10.2172/1861434.
Full textFlach, G. SENSITIVITY ANALYSIS FOR SALTSTONE DISPOSAL UNIT COLUMN DEGRADATION ANALYSES. Office of Scientific and Technical Information (OSTI), October 2014. http://dx.doi.org/10.2172/1163502.
Full textLombardi, D. D2PC sensitivity analysis. Office of Scientific and Technical Information (OSTI), August 1992. http://dx.doi.org/10.2172/7271811.
Full textVan Buren, Rachel. Railcar Sensitivity Analysis. Fort Belvoir, VA: Defense Technical Information Center, November 2011. http://dx.doi.org/10.21236/ada565001.
Full textLehoucq, Richard, Brian Franke, Stephen Bond, and Scott McKinley. Particle Sensitivity Analysis. Office of Scientific and Technical Information (OSTI), September 2020. http://dx.doi.org/10.2172/1669202.
Full textLombardi, D. D2PC sensitivity analysis. Office of Scientific and Technical Information (OSTI), August 1992. http://dx.doi.org/10.2172/10174720.
Full textCheng, J. J., C. Yu, and A. J. Zielen. RESRAD parameter sensitivity analysis. Office of Scientific and Technical Information (OSTI), August 1991. http://dx.doi.org/10.2172/6400651.
Full textFriedman-Hill, Ernest J., Edward L. Hoffman, Marcus J. Gibson, and Robert L. Clay. Integrated Sensitivity Analysis Workflow. Office of Scientific and Technical Information (OSTI), August 2014. http://dx.doi.org/10.2172/1171554.
Full textHorwedel, J. E., R. Q. Wright, and R. E. Maerker. Sensitivity analysis of EQ3. Office of Scientific and Technical Information (OSTI), January 1990. http://dx.doi.org/10.2172/7079359.
Full textKeiter, Eric R., Laura Painton Swiler, Thomas V. Russo, and Ian Zachary Wilcox. Sensitivity Analysis in Xyce. Office of Scientific and Technical Information (OSTI), September 2016. http://dx.doi.org/10.2172/1562422.
Full text