Academic literature on the topic 'Software risk assessment'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software risk assessment.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Software risk assessment"

1

Greene, N. "Computer Software for Risk Assessment." Journal of Chemical Information and Computer Sciences 37, no. 1 (January 1997): 148–50. http://dx.doi.org/10.1021/ci960095h.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Xingyuan, and Yong Deng. "An Evidential Software Risk Evaluation Model." Mathematics 10, no. 13 (July 2, 2022): 2325. http://dx.doi.org/10.3390/math10132325.

Full text
Abstract:
Software risk management is an important factor in ensuring software quality. Therefore, software risk assessment has become a significant and challenging research area. The aim of this study is to establish a data-driven software risk assessment model named DDERM. In the proposed model, experts’ risk assessments of probability and severity can be transformed into basic probability assignments (BPAs). Deng entropy was used to measure the uncertainty of the evaluation and to calculate the criteria weights given by experts. In addition, the adjusted BPAs were fused using the rules of Dempster–Shafer evidence theory (DST). Finally, a risk matrix was used to get the risk priority. A case application demonstrates the effectiveness of the proposed method. The proposed risk modeling framework is a novel approach that provides a rational assessment structure for imprecision in software risk and is applicable to solving similar risk management problems in other domains.
APA, Harvard, Vancouver, ISO, and other styles
3

Ammar, H. H., T. Nikzadeh, and J. B. Dugan. "Risk assessment of software-system specifications." IEEE Transactions on Reliability 50, no. 2 (June 2001): 171–83. http://dx.doi.org/10.1109/24.963125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hyatt, Lawrence E., and Linda H. Rosenberg. "Software metrics program for risk assessment." Acta Astronautica 40, no. 2-8 (January 1997): 223–33. http://dx.doi.org/10.1016/s0094-5765(97)00148-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xu Jian, Yan Han, and Li Qianmu. "A Methodology for Software Reliability Risk Assessment." Journal of Convergence Information Technology 6, no. 4 (April 30, 2011): 188–200. http://dx.doi.org/10.4156/jcit.vol6.issue4.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chittister, C., and Y. Y. Haimes. "Assessment and management of software technical risk." IEEE Transactions on Systems, Man, and Cybernetics 24, no. 2 (1994): 187–202. http://dx.doi.org/10.1109/21.281419.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Barki, Henri, Suzanne Rivard, and Jean Talbot. "Toward an Assessment of Software Development Risk." Journal of Management Information Systems 10, no. 2 (September 1993): 203–25. http://dx.doi.org/10.1080/07421222.1993.11518006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Funieru, Cristian, and Răzvan Funieru. "Caries Risk software – a new tool used for children caries risk assessment." Romanian Journal of Stomatology 61, no. 2 (June 30, 2015): 179–82. http://dx.doi.org/10.37897/rjs.2015.2.13.

Full text
Abstract:
Introduction. Dental caries risk is a key factor which may influence dental health in the near future. It is a very important factor for developing individual or community preventive strategies. Material and method. 46 dental records were analyzed including data of caries baseline and caries risk factors in a group of 46 schoolchildren from city of Bucharest. The overall caries risk was estimated using version 1.0 of Caries Risk software, the first software designed and calibrated to provide caries risk for Romanian patients. Results. The caries risk was approximately 40% in our sample. The girls had a higher risk by about 13% compared to boys. Conclusions. Caries Risk software is an effective tool for estimating caries risk by having an easy mode for input data and a short time needed for processing.
APA, Harvard, Vancouver, ISO, and other styles
9

Taylor, David, Derek Williamson, Harprit Kaur, Kevin Macintosh, Leo Brewster, and Ramon Roach. "BARBADOS NATIONAL COASTAL RISK INFORMATION AND PLANNING PLATFORM A SOFTWARE SYSTEM FOR HAZARDS, VULNERABILITY & RISK." Coastal Engineering Proceedings, no. 36 (December 30, 2018): 55. http://dx.doi.org/10.9753/icce.v36.risk.55.

Full text
Abstract:
The Barbados National Coastal Risk Information and Planning Platform (NCRIPP) is a study nearing completion to quantify coastal risk and develop a software system to serve this information country-wide. The NCRIPP follows extensive coastal baseline studies and includes assessment of eight hazards, vulnerability assessment and finally a risk assessment. The software platform is a cloud-based system that includes a large catalogue of assets, hazard overlays, and the ability to calculate damages , and mitigation alternatives.
APA, Harvard, Vancouver, ISO, and other styles
10

Kumar, Chandan, and Dilip Kumar Yadav. "A Probabilistic Software Risk Assessment and Estimation Model for Software Projects." Procedia Computer Science 54 (2015): 353–61. http://dx.doi.org/10.1016/j.procs.2015.06.041.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Software risk assessment"

1

Matsuo, Eric K. "Risk assessment in incremental software development." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA374495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alexander, Byron Vernon Terry. "Legacy system upgrade for software risk assessment." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA401409.

Full text
Abstract:
Thesis (M.S in Computer Science) Naval Postgtaduate School, December 2001.
Thesis Advisor(s): Berzins, Valdis ; Murrah, Michael. "December 2001." Includes bibliographical references (p. 91). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhu, Dongfeng. "Integrating software behavior into dynamic probabilistic risk assessment." College Park, Md. : University of Maryland, 2005. http://hdl.handle.net/1903/3305.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2005.
Thesis research directed by: Reliability Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
4

Radlinski, Lukasz. "Improved Software Project Risk Assessment Using Bayesian Nets." Thesis, Queen Mary, University of London, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.509672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nogueira, Juan Carlos. "A formal model for risk assessment in software projects." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA382304.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, Sept. 2000.
Thesis advisor(s): Jones, Carl R.; Brady, Terrance. "September 2000." Includes bibliographical references (p. 149-160). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
6

Nogueira, de Leon Juan Carlos. "A formal model for risk assessment in software projects." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA382304.

Full text
Abstract:
Dissertation (Ph.D. Software Engineering) Naval Postgraduate School, Sept. 2000.
Dissertation supervisor, LuQi. DTIC descriptor(s): Software Engineering, Rule Based Systems, Risk Analysis, Data Management, Computer Aided Design, Cost Analysis, Theses, Computer Program Reliability, Technology Assessment, Risk Management. DTIC Identifier(s): Caps (Computer Aided Prototyping System), Case (Computer Aided Software Engineering). Author(s): subject terms: Risk Assessment, Formal Models, Software Estimation Models, Software Metrics, Project Management. Includes bibliographical references (p. 233-246). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
7

Silva, Liliane Sheyla da. "A Risk Identification Technique for Requirements Assessment." Universidade Federal de Pernambuco, 2012. https://repositorio.ufpe.br/handle/123456789/10903.

Full text
Abstract:
Submitted by Pedro Henrique Rodrigues (pedro.henriquer@ufpe.br) on 2015-03-05T18:53:32Z No. of bitstreams: 2 Dissertacao_Liliane.pdf: 2808869 bytes, checksum: 6681e2b17bafbf1b2fb94a8f0d2ad701 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5)
Made available in DSpace on 2015-03-05T18:53:32Z (GMT). No. of bitstreams: 2 Dissertacao_Liliane.pdf: 2808869 bytes, checksum: 6681e2b17bafbf1b2fb94a8f0d2ad701 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) Previous issue date: 2012-03-01
CAPES, CNPQ
One recurrent issue in software development is the effective creation of testcases from requirements. Several techniques and methods are applied to minimize the risks associated with test cases building, aiming to meet the requirements specified correctly. Risks identification for requirements assessment is essential to tests cases generation. However, test engineers still face difficulties to apply it in practice due to the lack of solid knowledge about Risk Management activities and tool support for such activities. This work proposes a technique that helps test engineers in risk identification from requirements for software testing. From studies that used the similarity concept to compare software projects in order to reuse previously identified risks, the developed technique uses the same assertion applied to requirements. Within this context, this work aims to: (i) to define a technique based on analogies by categorizing requirements, thus being able to identify risks through a database of similar requirements, and (ii) to reuse risks previously identified at requirements for the evaluation of new requirements.
APA, Harvard, Vancouver, ISO, and other styles
8

Mkpong-Ruffin, Idongesit Okon Umphress David A. Hamilton John A. "Quantitative risk assessment model for software security in the design phase of software development." Auburn, Ala., 2009. http://hdl.handle.net/10415/1584.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

ESPINHA, RAFAEL DE SOUZA LIMA. "A COMPLIANCE AND RISK-BASED SOFTWARE DEVELOPMENT PROCESS ASSESSMENT APPROACH." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2007. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=10205@1.

Full text
Abstract:
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
CONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICO
Atualmente, um dos principais requisitos de um projeto de desenvolvimento de software é a entrega de um produto de qualidade que obedeça ao prazo e orçamento estipulados e atenda às necessidades do cliente. Utilizando a premissa de que a qualidade do produto desenvolvido está intimamente relacionada à qualidade dos processos utilizados no seu desenvolvimento, muitas organizações investem em programas de melhoria contínua de processos, onde estes processos são constantemente avaliados e melhorados. Este trabalho propõe uma abordagem para a avaliação de processos baseada em análise do risco e da conformidade em processos de desenvolvimento. Esta abordagem é constituída por um método de avaliação em duas etapas e por uma ferramenta de apoio. Na primeira fase do método, uma avaliação em abrangência é realizada para identificar em que áreas se encontram os maiores problemas nos processos. Na segunda fase, uma avaliação mais elaborada e criteriosa é realizada apenas nas áreas críticas, diminuindo o custo e aumentando a eficiência do investimento em melhoria. A ferramenta utiliza um mecanismo de questionários e checklists para verificar o risco e a conformidade dos processos da organização. Estes questionários e checklists estão associados a uma base de conhecimento organizada segundo um modelo de maturidade ou norma de qualidade de referência. Ao final de uma avaliação são gerados relatórios, tabelas e gráficos que apóiam a tomada de decisão e orientam a elaboração de um plano de ação para a melhoria dos processos. A abordagem foi utilizada em três experimentos controlados.
Nowadays, one of the main requirements of a software development project is the delivery of a quality product that conforms to the expected schedule and budget and satisfies customer needs. Using the hypothesis that the quality of the developed product is closely related to the quality of the processes used in its development, many organizations invest in process improvement programs, where the processes are continuously assessed and improved. In this work we propose an approach for process assessment based on risk and process compliance analysis. This approach is composed of a two-step appraisal method and a supporting tool. In the first step of the method, a quick analysis is executed to identify the most problematic areas. In the second one, a more elaborated analysis is performed only in the critical areas, reducing the costs and increasing the effectiveness of the appraisal. The tool uses a mechanism of surveys and checklists to verify the risk and the compliance of the process of the organization. A knowledge base is organized in accordance to a reference quality norm or maturity model. At the end of an assessment, reports, tables and charts support the decision-taking, and they can be used to guide an improvement program. The approach has been used in three case studies.
APA, Harvard, Vancouver, ISO, and other styles
10

Shook, Alexis M. "User's Manual for Tardigrade Risk Assessment." ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2492.

Full text
Abstract:
This user-guide provides instructions for operating Tardigrade 1.1.3, a cybersecurity software for Nollysoft, LLC. This guide instructs users step-by-step on how to set security controls, risk assessments, and administrative maintenance. Tardigrade 1.1.3 is a Risk Assessment Enterprise that evaluates the risk level of corporations and offers solutions to any security gaps within an organization. Tardigrade 1.1.3 is a role-based software that operates through three modules, Cybersecurity Assessment, Internal Control, and Security Requirement Traceability Matrix.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Software risk assessment"

1

Mayer, F. L. Risk assessment tools: Software and user's guide. Pensacola: SETAC Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mayer, F. L. Risk assessment tools: Software and user's guide. Pensacola: SETAC Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Trendowicz, Adam. Software Cost Estimation, Benchmarking, and Risk Assessment. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-30764-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jones, Capers. Assessment and control of software risks. Englewood Cliffs, N.J: Yourdon Press, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nogueira, Juan Carlos. A formal model for risk assessment in software projects. Monterey, Calif: Naval Postgraduate School, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Charette, Robert N. Applications strategies for risk analysis. New York: Intertext Publications, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Trendowicz, Adam. Software Cost Estimation, Benchmarking, and Risk Assessment: The Software Decision-Makers' Guide to Predictable Software Development. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lawrence, J. D. Software safety hazard analysis. Washington, DC: Division of Reactor Controls and Human Factors, Office of Nuclear Reactor Regulation, U.S. Nuclear Regulatory Commission, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Davis, Thomas M. Study guide and software to accompany Core concepts in health, fifth edition, by Paul M. Insel and Walton T. Roth. Mountain View, Calif: Mayfield Pub., 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

W, Bolander T., Idaho National Engineering Laboratory, and U.S. Nuclear Regulatory Commission. Office of Nuclear Regulatory Research., eds. Verification and validation of the SAPHIRE version 4.0 PRA software package. Washington, D.C: Division of Safety Issue Resolution, Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Commission, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Software risk assessment"

1

Donič, Jan. "Risk Assessment Software Tools." In Advances in Intelligent Systems and Computing, 309–14. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20142-5_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bröckers, Alfred. "Process-based software risk assessment." In Software Process Technology, 9–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-59205-9_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lunkeit, Armin. "A Graph-Based Approach for Analysis of Software Security." In Risk Assessment and Risk-Driven Testing, 68–79. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-14114-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lunkeit, Armin. "A Graph-Based Approach for Analysis of Software Security." In Risk Assessment and Risk-Driven Testing, 68–79. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07076-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Felderer, Michael, Florian Auer, and Johannes Bergsmann. "Risk Management During Software Development: Results of a Survey in Software Houses from Germany, Austria and Switzerland." In Risk Assessment and Risk-Driven Quality Assurance, 143–55. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-57858-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lima, Adailton, and Alberto Avritzer. "Practice: Risk Assessment in Globally Distributed Projects." In Global Software and IT, 179–87. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118135105.ch22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ramler, Rudolf, Michael Felderer, and Matthias Leitner. "A Lightweight Approach for Estimating Probability in Risk-Based Software Testing." In Risk Assessment and Risk-Driven Quality Assurance, 115–28. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-57858-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Felderer, Michael, Christian Haisjackl, Viktor Pekar, and Ruth Breu. "A Risk Assessment Framework for Software Testing." In Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications, 292–308. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45231-8_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Neowhouse, Maxxine M. "The use of software based qualitative risk assessment methodologies in industry." In Probabilistic Risk and Hazard Assessment, 147–55. London: Routledge, 2022. http://dx.doi.org/10.1201/9780203742037-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vriezekolk, Eelco, Sandro Etalle, and Roel Wieringa. "Experimental Validation of a Risk Assessment Method." In Requirements Engineering: Foundation for Software Quality, 1–16. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16101-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Software risk assessment"

1

Saada, Gabriel, Frano Mika, and Sabatino De Sanctis. "Health Risk Assessment (HRA) Software." In SPE International Conference on Health, Safety, and Environment in Oil and Gas Exploration and Production. Society of Petroleum Engineers, 2008. http://dx.doi.org/10.2118/111377-ms.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Michelle Parada Carvallo, Juliette, Hanna Oktaba, and Elsa Ramirez Hernandez. "Risk Assessment Forum." In 2018 6th International Conference in Software Engineering Research and Innovation (CONISOFT). IEEE, 2018. http://dx.doi.org/10.1109/conisoft.2018.8645949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gupta, Daya, and Mohd Sadiq. "Software Risk Assessment and Estimation Model." In 2008 International Conference on Computer Science and Information Technology (ICCSIT). IEEE, 2008. http://dx.doi.org/10.1109/iccsit.2008.184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Manalif, Ekananta, Luiz Fernando Capretz, Ali Bou Nassif, and Danny Ho. "Fuzzy-ExCOM Software Project Risk Assessment." In 2012 Eleventh International Conference on Machine Learning and Applications (ICMLA). IEEE, 2012. http://dx.doi.org/10.1109/icmla.2012.193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lima, Adailton Magalhães. "Risk assessment on distributed software projects." In the 32nd ACM/IEEE International Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1810295.1810387.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mkpong-Ruffin, Idongesit, David Umphress, John Hamilton, and Juan Gilbert. "Quantitative software security risk assessment model." In the 2007 ACM workshop. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1314257.1314267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sahily, H., and R. A. Haraty. "A Comparative Study of Software Engineering Process Models for Middle East Airlines." In Advances in Management Science and Risk Assessment. Calgary,AB,Canada: ACTAPRESS, 2011. http://dx.doi.org/10.2316/p.2011.704-022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hwang, J. G., H. J. Jo, and H. S. Kim. "Design of automatic testing tool for railway signalling systems software safety assessment." In RISK ANALYSIS 2008. Southampton, UK: WIT Press, 2008. http://dx.doi.org/10.2495/risk080501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Xiaohong, and Qiang Liu. "Requirement Risk Assessment Focused-On Stakeholder Risk Analysis." In 2009 33rd Annual IEEE International Computer Software and Applications Conference. IEEE, 2009. http://dx.doi.org/10.1109/compsac.2009.199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Courandier, Jean-Michel, and Bernard Pradier. "Industrial Hygiene Risk Assessment using a risk assessment Matrix and a dedicated software:." In Middle East Health, Safety, Security, and Environment Conference and Exhibition. Society of Petroleum Engineers, 2010. http://dx.doi.org/10.2118/136656-ms.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Software risk assessment"

1

Peercy, David E., Jr Huebner, and Walter. Risk Assessment Methodology for Software Supportability (RAMSS): guidelines for Adapting Software Supportability Evaluations. Fort Belvoir, VA: Defense Technical Information Center, April 1986. http://dx.doi.org/10.21236/ada190286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wyss, G. D., and S. L. Daniel. Recent enhancements to probabilistic risk assessment software at Sandia National Laboratories. Office of Scientific and Technical Information (OSTI), May 1994. http://dx.doi.org/10.2172/10146080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hardwick, Meredith J., Nina Donath, and John W. Tatom. User's Reference Manual for the Safety Assessment for Explosives Risk Software. Fort Belvoir, VA: Defense Technical Information Center, July 2009. http://dx.doi.org/10.21236/ada511623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Miller, R. Development of a Software Framework for System-Level Carbon Sequestration Risk Assessment. Office of Scientific and Technical Information (OSTI), February 2013. http://dx.doi.org/10.2172/1084725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lehner, J. Workshop on Philosophical Basis for Incorporating Software Failures in a Probabilistic Risk Assessment. Office of Scientific and Technical Information (OSTI), October 2009. http://dx.doi.org/10.2172/1439792.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Smith, Curtis, James Knudsen, Kurt Vedros, Michael Michael, Kellie Kvarfordt, and Ted Wood. SAPHIRE 8 Basics An Introduction to Probabilistic Risk Assessment via the Systems Analysis Program for Hands-On Integrated Reliability Evaluations (SAPHIRE) Software P-201. Office of Scientific and Technical Information (OSTI), February 2016. http://dx.doi.org/10.2172/1467591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Curtis, James Knudsen, Kurt Vedros, and Ted Wood. Advanced SAPHIRE 8 Modeling Methods for Probabilistic Risk Assessment via the Systems Analysis Program for Hands-On Integrated Reliability Evaluations (SAPHIRE) Software P-202. Office of Scientific and Technical Information (OSTI), February 2016. http://dx.doi.org/10.2172/1467592.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Beltman, W. H. J., C. Vink, and A. Poot. Calculation of exposure concentrations for NL standard scenarios by the TOXSWA model : use of FOCUS_TOXSWA 4.4.3 software for plant protection products and their metabolitesin Dutch risk assessment for aquatic ecosystems. Wageningen: Statutory Research Tasks Unit for Nature & the Environment (WOT Natuur & Milieu), 2016. http://dx.doi.org/10.18174/401195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yaroshchuk, Svitlana O., Nonna N. Shapovalova, Andrii M. Striuk, Olena H. Rybalchenko, Iryna O. Dotsenko, and Svitlana V. Bilashenko. Credit scoring model for microfinance organizations. [б. в.], February 2020. http://dx.doi.org/10.31812/123456789/3683.

Full text
Abstract:
The purpose of the work is the development and application of models for scoring assessment of microfinance institution borrowers. This model allows to increase the efficiency of work in the field of credit. The object of research is lending. The subject of the study is a direct scoring model for improving the quality of lending using machine learning methods. The objective of the study: to determine the criteria for choosing a solvent borrower, to develop a model for an early assessment, to create software based on neural networks to determine the probability of a loan default risk. Used research methods such as analysis of the literature on banking scoring; artificial intelligence methods for scoring; modeling of scoring estimation algorithm using neural networks, empirical method for determining the optimal parameters of the training model; method of object-oriented design and programming. The result of the work is a neural network scoring model with high accuracy of calculations, an implemented system of automatic customer lending.
APA, Harvard, Vancouver, ISO, and other styles
10

Hantos, Peter. Software Technology Readiness Assessments - Managing Technology Risks in Space System Acquisitions. Fort Belvoir, VA: Defense Technical Information Center, June 2008. http://dx.doi.org/10.21236/ada484526.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography