Littérature scientifique sur le sujet « Sensitivy analysis »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Sensitivy analysis ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Sensitivy analysis"

1

Anders, Gilberto, et Itamar Borges. « Topological Analysis of the Molecular Charge Density and Impact Sensitivy Models of Energetic Molecules ». Journal of Physical Chemistry A 115, no 32 (18 août 2011) : 9055–68. http://dx.doi.org/10.1021/jp204562d.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Rismawati, Rismawati, Lince Bulutoding et Eka Suhartini. « PENGARUH ORGANIZATIONAL CITIZENSHIP BEHAVIOR, SELF EFFICACY DAN PROFESSIONAL ETHICAL SENSITIVY TERHADAP KINERJA AUDITOR DENGAN EMPLOYEE ENGAGEMENT SEBAGAI MODERASI ». ISAFIR : Islamic Accounting and Finance Review 2, no 1 (30 juin 2021) : 98–107. http://dx.doi.org/10.24252/isafir.v2i1.19935.

Texte intégral
Résumé :
Penelitian ini menguji pengaruh Organizational Citizenship Behavior, Self Efficacy, dan Professional Ethical Sensitivity terhadap Kinerja Auditor dengan Employee Engangement sebagai Variabel Moderasi. Penelitian ini merupakan penelitian kuantitatif dengan pendekatan deskriptif dengan populasi berasal dari auditor yang bekerja pada Inspektorat Kota Makassar. Sampel penelitian sebanyak 30 auditor yang mengembalikan kuisioner dari jumlah 35 kuisioner yang disebar. Analisis data yang digunakan adalah analisis regresi berganda dan pemoderasi digunakan uji MRA (Moderated Regression Analysis). Hasil penelitian menunjukkan bahwa berdasarkan uji regresi berganda yang dilakukan membuktikan bahwa Organizational Citizenship Behavior, Self Efficacy, dan Professional Ethical Sensitivity berpengaruh positif dan siginfikan terhadap kinerja auditor. Pada uji regresi moderasi, ditemukan bahwa employee engangement mampu memoderasi pengaruh positif Organizational Citizenship Behavior dan Professional Ethical Sensitivity terhadap Kinerja Auditor, namun tidak mampu memoderasi pengaruh positif self efficacy terhadap Kinerja Auditor.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Taji, Kouichi, et Keiji Matsumoto. « INVERSE SENSITIVE ANALYSIS OF PAIRWISE COMPARISON MATRICES ». Journal of the Operations Research Society of Japan 49, no 4 (2006) : 332–41. http://dx.doi.org/10.15807/jorsj.49.332.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Riveros, Bruno, Mariana Rosim, Gabriel Pedro, Rosa Lucchetta et Marcelo Nita. « Análise de custo-efetividade e a análise de sensibilidade, um roteiro para execução de uma abordagem probabilística : Introdução à análise de sensibilidade probabilística (Parte I) ». Jornal de Assistência Farmacêutica e Farmacoeconomia 1, no 2 (décembre 2016) : 33–38. http://dx.doi.org/10.22563/2525-7323.2016.v1.n2.p.33-38.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

HORVATH, Gabor, et Norbert PATAKI. « IMPROVING THE PRECISION OF FLOW-SENSITIVE LIFETIME ANALYSIS ». Acta Electrotechnica et Informatica 20, no 4 (21 janvier 2020) : 10–18. http://dx.doi.org/10.15546/aeei-2020-0020.

Texte intégral
Résumé :
Object lifetimes are a common source of bugs in C++ that can cause crashes, unexpected behavior, or even security vulnerabilities. Herb Sutter, the chair of the C++ standard committee proposed a flow-sensitive analysis to catch lifetime errors statically. Sadly, this analysis is prone to false positives unless the author follows some specific guidelines. We developed mitigations to eliminate some classes of false positives to make it easier to write conforming code. The first mitigation fixes a common false positive from a frequently used coding pattern by introducing local path-sensitivity. The second one is a filter based on reaching definitions and dominance algorithms to remove reports that might be the result of analyzing infeasible paths. We tested the effectiveness of the methods on the open source Google Fuchsia project.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Kucherenko, D. Yu. « APPLICATION OF GLUTAMATE-SENSITIVE BIOSENSOR FOR ANALYSIS OF FOODSTUFF ». Biotechnologia Acta 11, no 4 (août 2018) : 57–67. http://dx.doi.org/10.15407/biotech11.04.057.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Yunanto, Muhamad, et Henny Medyawati. « Fiscal Policy and Monetary Policy : Sensitivity Analysis ». International Journal of Trade, Economics and Finance 6, no 2 (avril 2015) : 79–84. http://dx.doi.org/10.7763/ijtef.2015.v6.447.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Dragičević, N., B. Karleuša et N. Ožanić. « Erosion Potential Method (Gavrilović method) sensitivity analysis ». Soil and Water Research 12, No. 1 (18 janvier 2017) : 51–59. http://dx.doi.org/10.17221/27/2016-swr.

Texte intégral
Résumé :
In recent decades, various methods for erosion intensity and sediment production assessment have been developed. The necessity for better model performance has led to the more frequent application of the method sensitivity and uncertainty assessments in order to decrease errors that arise from the model concept and its main assumptions. The analysis presented in this paper refers to the application of the Gavrilović method (Erosion Potential Method), an empirical and semi-quantitative method that can estimate the amount of sediment production and sediment transport as well as the erosion intensity and indicate the areas potentially threatened by erosion. The emphasis in this paper is given upon the method sensitivity analysis that has not previously been conducted for the Gavrilović method. The sensitivity analysis was conducted for fourteen different parameters included in the method, all in relation to different model outputs. Each parameter was perceived and discussed individually in relation to its effect upon the method outputs, and ranked into categories depending on their influence on one or more model outputs. The objective of the analysis was to explore the constraints of the Gavrilović method and the method response to changes deriving from the each individual parameter in an attempt to provide a better understanding of the method, the weight and the contribution of each parameter in the overall method. The parameters that could potentially be used in future research, for method modification and calibration in areas with different catchment characteristics (e.g. climate, geological, etc.) were identified. The most sensitive model parameters resulting from conducted sensitivity analysis for the Gavrilović method are also those considered to be significant in the scientific literature on erosion. The Gavrilović method sensitivity analysis has been done on a case study for the Dubracina catchment area, Croatia.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Qichang An, Qichang An, Jingxu Zhang Jingxu Zhang, Fei Yang Fei Yang et Hongchao Zhao Hongchao Zhao. « Normalized point source sensitivity analysis in GSSM prototype ». Chinese Optics Letters 15, no 11 (2017) : 111202. http://dx.doi.org/10.3788/col201715.111202.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Juhl, C. F. « A Context-Sensitive Liar ». Analysis 57, no 3 (1 juillet 1997) : 202–4. http://dx.doi.org/10.1093/analys/57.3.202.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Sensitivy analysis"

1

Fruth, Jana. « Sensitivy analysis and graph-based methods for black-box functions with on application to sheet metal forming ». Thesis, Saint-Etienne, EMSE, 2015. http://www.theses.fr/2015EMSE0779/document.

Texte intégral
Résumé :
Le domaine général de la thèse est l’analyse de sensibilité de fonctions boîte noire. L’analyse de sensibilité étudie comment la variation d’une sortie peut être reliée à la variation des entrées. C’est un outil important dans la construction, l’analyse et l’optimisation des expériences numériques (computer experiments).Nous présentons tout d’abord l’indice d’interaction total, qui est utile pour le criblage d’interactions. Plusieurs méthodes d’estimation sont proposées. Leurs propriétés sont étudiées au plan théorique et par des simulations.Le chapitre suivant concerne l’analyse de sensibilité pour des modèles avec des entrées fonctionnelles et une sortie scalaire. Une approche séquentielle très économique est présentée, qui permet non seulement de retrouver la sensibilité de entrées fonctionnelles globalement, mais aussi d’identifier les régions d’intérêt dans leur domaine de définition.Un troisième concept est proposé, les support index functions, mesurant la sensibilité d’une entrée sur tout le support de sa loi de probabilité.Finalement les trois méthodes sont appliquées avec succès à l’analyse de sensibilité de modèles d’emboutissage
The general field of the thesis is the sensitivity analysis of black-box functions. Sensitivity analysis studies how the variation of the output can be apportioned to the variation of input sources. It is an important tool in the construction, analysis, and optimization of computer experiments.The total interaction index is presented, which can be used for the screening of interactions. Several variance-based estimation methods are suggested. Their properties are analyzed theoretically as well as on simulations.A further chapter concerns the sensitivity analysis for models that can take functions as input variables and return a scalar value as output. A very economical sequential approach is presented, which not only discovers the sensitivity of those functional variables as a whole but identifies relevant regions in the functional domain.As a third concept, support index functions, functions of sensitivity indices over the input distribution support, are suggested.Finally, all three methods are successfully applied in the sensitivity analysis of sheet metal forming models
Styles APA, Harvard, Vancouver, ISO, etc.
2

Nilsson, Martina. « Mitochondrial DNA in Sensitive Forensic Analysis ». Doctoral thesis, Uppsala : Acta Universitatis Upsaliensis : Univ.-bibl. [distributör], 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-7458.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Galanopoulos, Aristides. « Analysis of frequency sensitive competitive learning / ». The Ohio State University, 1996. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487941504294837.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Wan, Din Wan Ibrahim. « Sensitivity analysis intolerance allocation ». Thesis, Queen's University Belfast, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.675480.

Texte intégral
Résumé :
In Computer Aided Design model the shape is usually defined as a boundary representation, a cell complex of faces, edges, and vertices. The boundary representation is generated from a system of geometric constraints, with parameters as degrees of freedom. The dimensions of the boundary representation are determined by the parameters in the CAD system used to model the part, and every single parametric perturbation may generate different changes in the part model shape and dimensions. Thus, one can compute dimensional sensitivity to parameter perturbations. A "Sensitivity Analysis" method is proposed to automatically quantify the dependencies of the Key Characteristic dimensions on each of the feature parameters in a CAD model. Once the sensitivities of the feature parameters to Key Characteristic dimensions have been determined the appropriate perturbations of each parameter to cause a desired change in critical dimension can be determined. This methodology is then applied to real applications of tolerancing in mechanical assembly models to show the efficiencies of this new developed strategy. The approach can identify where specific tolerances need to be applied to a Key Control Characteristic dimension, the range of part tolerances that could be used to achieve the desired Key Product Characteristic dimension tolerances, and also if existing part tolerances make it impossible to achieve the desired Key Product Characteristic dimension tolerances. This thesis provides an explanation of a novel automated tolerance allocation process for an assembly model based on the parametric CAD sensitivity method. The objective of this research is to expose the relationship between parameters sensitivity of CAD design in mechanical assembly product and tolerance design. This exposes potential new avenues of research in how to develop standard process and methodology for geometrical dimensioning and tolerancing (GD&T) in a digital design tools environment known as Digital MockUp (DMU).
Styles APA, Harvard, Vancouver, ISO, etc.
5

Munster, Drayton William. « Sensitivity Enhanced Model Reduction ». Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/23169.

Texte intégral
Résumé :
In this study, we numerically explore methods of coupling sensitivity analysis to the reduced model in order to increase the accuracy of a proper orthogonal decomposition (POD) basis across a wider range of parameters. Various techniques based on polynomial interpolation and basis alteration are compared. These techniques are performed on a 1-dimensional reaction-diffusion equation and 2-dimensional incompressible Navier-Stokes equations solved using the finite element method (FEM) as the full scale model. The expanded model formed by expanding the POD basis with the orthonormalized basis sensitivity vectors achieves the best mixture of accuracy and computational efficiency among the methods compared.
Master of Science
Styles APA, Harvard, Vancouver, ISO, etc.
6

Edlund, Hanna. « Sensitive Identification Tools in Forensic DNA Analysis ». Doctoral thesis, Uppsala universitet, Institutionen för genetik och patologi, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-131904.

Texte intégral
Résumé :
DNA as forensic evidence is valuable in criminal investigations. Implementation of new, sensitive and fast technologies is an important part of forensic genetic research. This thesis aims to evaluate new sensitive methods to apply in forensic DNA analysis including analysis of old skeletal remains. In Paper I and II, two novel systems for analysis of STRs, based on the Pyrosequencing technology, are presented. In Paper I, Y chromosomal STRs are analysed. Markers on the male specific Y chromosome are especially useful in analysis of DNA mixtures. In Paper II, ten autosomal STRs are genotyped. The systems are based on sequencing of STR loci instead of size determination of STR fragments as in routine analysis. This provides a higher resolution since sequence variants within the repeats can be detected. Determination of alleles is based on a termination recognition base. This is the base in the template strand that is excluded from the dispensation order in the sequencing of the complementary strand and therefore terminates the reaction. Furthermore, skeletal remains are often difficult to analyse, due to damaging effects from the surrounding environment on the DNA and the high risk of exogenous contamination. Analysis of mitochondrial DNA is useful on degraded samples and in Paper III, mtDNA analysis of 700 years old skeletal remains is performed to investigate a maternal relationship. The quantity and quality of DNA are essential in forensic genetics. In Paper IV the efficiency of DNA isolation is investigated. Soaking skeletal remains in bleach is efficient for decontamination but result in a lower DNA yield, especially on pulverised skull samples. In conclusion, this thesis presents novel sequencing systems for accurate and fast analysis of STR loci that can be useful in evaluation of new loci and database assembly as well as the utility of mtDNA in forensic genetics.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Mazanec, Josef. « Exploratory market structure analysis. Topology-sensitive methodology ». SFB Adaptive Information Systems and Modelling in Economics and Management Science, WU Vienna University of Economics and Business, 1999. http://epub.wu.ac.at/928/1/document.pdf.

Texte intégral
Résumé :
Given the recent abundance of brand choice data from scanner panels market researchers have neglected the measurement and analysis of perceptions. Heterogeneity of perceptions is still a largely unexplored issue in market structure and segmentation studies. Over the last decade various parametric approaches toward modelling segmented perception-preference structures such as combined MDS and Latent Class procedures have been introduced. These methods, however, are not taylored for qualitative data describing consumers' redundant and fuzzy perceptions of brand images. A completely different method is based on topology-sensitive vector quantization (VQ) for consumers-by-brands-by-attributes data. It maps the segment-specific perceptual structures into bubble-pie-bar charts with multiple brand positions demonstrating perceptual distinctiveness or similarity. Though the analysis proceeds without any distributional assumptions it allows for significance testing. The application of exploratory and inferential data processing steps to the same data base is statistically sound and particularly attractive for market structure analysts. A brief outline of the VQ method is followed by a sample study with travel market data which proved to be particularly troublesome for conventional processing tools. (author's abstract)
Series: Report Series SFB "Adaptive Information Systems and Modelling in Economics and Management Science"
Styles APA, Harvard, Vancouver, ISO, etc.
8

Boccardo, Davidson Rodrigo [UNESP]. « Context-sensitive analysis of x86 obfuscated executables ». Universidade Estadual Paulista (UNESP), 2009. http://hdl.handle.net/11449/100286.

Texte intégral
Résumé :
Made available in DSpace on 2014-06-11T19:30:32Z (GMT). No. of bitstreams: 0 Previous issue date: 2009-10-09Bitstream added on 2014-06-13T18:40:52Z : No. of bitstreams: 1 boccardo_dr_dr_ilha.pdf: 1178776 bytes, checksum: cdd885f0beff962757e3b9de59ce0832 (MD5)
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Ofusca c~ao de c odigo tem por nalidade di cultar a detec c~ao de propriedades intr nsecas de um algoritmo atrav es de altera c~oes em sua sintaxe, entretanto preservando sua sem antica. Desenvolvedores de software usam ofusca c~ao de c odigo para defender seus programas contra ataques de propriedade intelectual e para aumentar a seguran ca do c odigo. Por outro lado, programadores maliciosos geralmente ofuscam seus c odigos para esconder comportamento malicioso e para evitar detec c~ao pelos anti-v rus. Nesta tese, e introduzido um m etodo para realizar an alise com sensitividade ao contexto em bin arios com ofuscamento de chamada e retorno de procedimento. Para obter sem antica equivalente, estes bin arios utilizam opera c~oes diretamente na pilha ao inv es de instru c~oes convencionais de chamada e retorno de procedimento. No estado da arte atual, a de ni c~ao de sensitividade ao contexto est a associada com opera c~oes de chamada e retorno de procedimento, assim, an alises interprocedurais cl assicas n~ao s~ao con aveis para analisar bin arios cujas opera c~oes n~ao podem ser determinadas. Uma nova de ni c~ao de sensitividade ao contexto e introduzida, baseada no estado da pilha em qualquer instru c~ao. Enquanto mudan cas em contextos a chamada de procedimento s~ao intrinsicamente relacionadas com transfer encia de controle, assim, podendo ser obtidas em termos de caminhos em um grafo de controle de uxo interprocedural, o mesmo n~ao e aplic avel para mudan cas em contextos a pilha. Um framework baseado em interpreta c~ao abstrata e desenvolvido para avaliar contexto baseado no estado da pilha e para derivar m etodos baseado em contextos a chamada de procedimento para uso com contextos baseado no estado da pilha. O metodo proposto n~ao requer o uso expl cito de instru c~oes de chamada e retorno de procedimento, por em depende do...
A code obfuscation intends to confuse a program in order to make it more di cult to understand while preserving its functionality. Programs may be obfuscated to protect intellectual property and to increase security of code. Programs may also be obfuscated to hide malicious behavior and to evade detection by anti-virus scanners. We introduce a method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations. These binaries may use direct stack operators instead of the native call and ret instructions to achieve equivalent behavior. Since de nition of context-sensitivity and algorithms for context-sensitive analysis has thus far been based on the speci c semantics associated to procedure call and return operations, classic interprocedural analyses cannot be used reliably for analyzing programs in which these operations cannot be discerned. A new notion of context-sensitivity is introduced that is based on the state of the stack at any instruction. While changes in calling-context are associated with transfer of control, and hence can be reasoned in terms of paths in an interprocedural control ow graph (ICFG), the same is not true for changes in stackcontext. An abstract interpretation based framework is developed to reason about stackcontext and to derive analogues of call-strings based methods for the context-sensitive analysis using stack-context. This analysis requires the knowledge of how the stack, rather the stack pointer, is represented and on the knowledge of operators that manipulate the stack pointer. The method presented is used to create a context-sensitive version of Venable et al.'s algorithm for detecting obfuscated calls. Experimental results show that the contextsensitive version of the algorithm generates more precise results and is also computationally more e cient than its context-insensitive counterpart.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Boccardo, Davidson Rodrigo. « Context-Sensitive Analysis of x86 Obfuscated Executables ». Ilha Solteira : [s.n.], 2009. http://hdl.handle.net/11449/100286.

Texte intégral
Résumé :
Orientador: Aleardo Manacero Junior
Banca: Sergio Azevedo de Oliveira
Banca: Francisco Villarreal Alvarado
Banca: Rodolfo Jardim Azevedo
Banca: André Luiz Moura dos Santos
Resumo: Ofusca c~ao de c odigo tem por nalidade di cultar a detec c~ao de propriedades intr nsecas de um algoritmo atrav es de altera c~oes em sua sintaxe, entretanto preservando sua sem^antica. Desenvolvedores de software usam ofusca c~ao de c odigo para defender seus programas contra ataques de propriedade intelectual e para aumentar a seguran ca do c odigo. Por outro lado, programadores maliciosos geralmente ofuscam seus c odigos para esconder comportamento malicioso e para evitar detec c~ao pelos anti-v rus. Nesta tese, e introduzido um m etodo para realizar an alise com sensitividade ao contexto em bin arios com ofuscamento de chamada e retorno de procedimento. Para obter sem^antica equivalente, estes bin arios utilizam opera c~oes diretamente na pilha ao inv es de instru c~oes convencionais de chamada e retorno de procedimento. No estado da arte atual, a de ni c~ao de sensitividade ao contexto est a associada com opera c~oes de chamada e retorno de procedimento, assim, an alises interprocedurais cl assicas n~ao s~ao con aveis para analisar bin arios cujas opera c~oes n~ao podem ser determinadas. Uma nova de ni c~ao de sensitividade ao contexto e introduzida, baseada no estado da pilha em qualquer instru c~ao. Enquanto mudan cas em contextos a chamada de procedimento s~ao intrinsicamente relacionadas com transfer^encia de controle, assim, podendo ser obtidas em termos de caminhos em um grafo de controle de uxo interprocedural, o mesmo n~ao e aplic avel para mudan cas em contextos a pilha. Um framework baseado em interpreta c~ao abstrata e desenvolvido para avaliar contexto baseado no estado da pilha e para derivar m etodos baseado em contextos a chamada de procedimento para uso com contextos baseado no estado da pilha. O metodo proposto n~ao requer o uso expl cito de instru c~oes de chamada e retorno de procedimento, por em depende do... (Resumo completo, clicar acesso eletrônico abaixo)
Abstract: A code obfuscation intends to confuse a program in order to make it more di cult to understand while preserving its functionality. Programs may be obfuscated to protect intellectual property and to increase security of code. Programs may also be obfuscated to hide malicious behavior and to evade detection by anti-virus scanners. We introduce a method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations. These binaries may use direct stack operators instead of the native call and ret instructions to achieve equivalent behavior. Since de nition of context-sensitivity and algorithms for context-sensitive analysis has thus far been based on the speci c semantics associated to procedure call and return operations, classic interprocedural analyses cannot be used reliably for analyzing programs in which these operations cannot be discerned. A new notion of context-sensitivity is introduced that is based on the state of the stack at any instruction. While changes in calling-context are associated with transfer of control, and hence can be reasoned in terms of paths in an interprocedural control ow graph (ICFG), the same is not true for changes in stackcontext. An abstract interpretation based framework is developed to reason about stackcontext and to derive analogues of call-strings based methods for the context-sensitive analysis using stack-context. This analysis requires the knowledge of how the stack, rather the stack pointer, is represented and on the knowledge of operators that manipulate the stack pointer. The method presented is used to create a context-sensitive version of Venable et al.'s algorithm for detecting obfuscated calls. Experimental results show that the contextsensitive version of the algorithm generates more precise results and is also computationally more e cient than its context-insensitive counterpart.
Doutor
Styles APA, Harvard, Vancouver, ISO, etc.
10

Gasparini, Luca. « Severity sensitive norm analysis and decision making ». Thesis, University of Aberdeen, 2017. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=231873.

Texte intégral
Résumé :
Normative systems have been proposed as a useful abstraction to represent ideals of behaviour for autonomous agents in a social context. They specify constraints that agents ought to follow, but may sometimes be violated. Norms can increase the predictability of a system and make undesired situations less likely. When designing normative systems, it is important to anticipate the effects of possible violations and understand how robust these systems are to violations. Previous research on robustness analysis of normative systems builds upon simplistic norm formalisms, lacking support for the specification of complex norms that are often found in real world scenarios. Furthermore, existing approaches do not consider the fact that compliance with different norms may be more or less important in preserving some desirable properties of a system; that is, norm violations may vary in severity. In this thesis we propose models and algorithms to represent and reason about complex norms, where their violation may vary in severity. We build upon existing preference-based deontic logics and propose mechanisms to rank the possible states of a system according to what norms they violate, and their severity. Further, we propose mechanisms to analyse the properties of the system under different compliance assumptions, taking into account the severity of norm violations. Our norm formalism supports the specification of norms that regulate temporally extended behaviour and those that regulate situations where other norms have been violated. We then focus on algorithms that allow coalitions of agents to coordinate their actions in order to minimise the risk of severe violations. We propose offline algorithms and heuristics for pre-mission planning in stochastic scenarios where there is uncertainty about the current state of the system. We then develop online algorithms that allow agents to maintain a certain degree of coordination and to use communication to improve their performance.
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Sensitivy analysis"

1

Borgonovo, Emanuele. Sensitivity Analysis. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

D, Roberts Gary, Bowles Kenneth J et United States. National Aeronautics and Space Administration., dir. ICAN sensitivity analysis. [Washington, DC] : National Aeronautics and Space Administration, 1990.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Sensitivity and uncertainty analysis. Boca Raton, Fla : Chapman & Hall/CRC, 2003.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Choi, Kyung K. Structural sensitivity analysis and optimization. New York : Springer Science+Business Media, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Chatterjee, Samprit. Sensitivity analysis in linear regression. New York : Wiley, 1988.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Barrick, Nettie J. OASDI short-range sensitivity analysis. [Washington, D.C.?] : Social Security Administration, Office of the Chief Actuary, 1996.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Deif, Assem. Sensitivity Analysis in Linear Systems. Berlin, Heidelberg : Springer Berlin Heidelberg, 1986. http://dx.doi.org/10.1007/978-3-642-82739-6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Ustinov, Eugene A. Sensitivity Analysis in Remote Sensing. Cham : Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15841-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Yeung, Daniel S., Ian Cloete, Daming Shi et Wing W. Y. Ng. Sensitivity Analysis for Neural Networks. Berlin, Heidelberg : Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-02532-7.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Chatterjee, Samprit, et Ali S. Hadi, dir. Sensitivity Analysis in Linear Regression. Hoboken, NJ, USA : John Wiley & Sons, Inc., 1988. http://dx.doi.org/10.1002/9780470316764.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Sensitivy analysis"

1

Becker, Claudia. « Exploring Sensitive Topics : Sensitivity, Jeopardy, and Cheating ». Dans Studies in Classification, Data Analysis, and Knowledge Organization, 299–305. Berlin, Heidelberg : Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-10745-0_32.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Borgonovo, Emanuele. « Decisions and Sensitivity Analysis ». Dans Sensitivity Analysis, 1–7. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Borgonovo, Emanuele. « What to Use and When ». Dans Sensitivity Analysis, 89–91. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_10.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Borgonovo, Emanuele. « Value of Information ». Dans Sensitivity Analysis, 93–100. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_11.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Borgonovo, Emanuele. « Local Sensitivity Analysis with Constraints ». Dans Sensitivity Analysis, 101–13. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_12.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Borgonovo, Emanuele. « Uncertainty Quantification ». Dans Sensitivity Analysis, 117–27. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_13.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Borgonovo, Emanuele. « Global Sensitivity Analysis ». Dans Sensitivity Analysis, 129–38. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_14.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Borgonovo, Emanuele. « Variance-Based Methods ». Dans Sensitivity Analysis, 139–62. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_15.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Borgonovo, Emanuele. « The $$\delta $$ —Importance Measure ». Dans Sensitivity Analysis, 163–80. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_16.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Borgonovo, Emanuele. « CDF-Based Sensitivity Measures ». Dans Sensitivity Analysis, 181–89. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_17.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Sensitivy analysis"

1

SPENCE, ANNE, et ROBERTO CELI. « EFFICIENT SENSITIVY ANALYSIS FOR ROTARI-WING AEROMECHANICAL PROBLEMS ». Dans 34th Structures, Structural Dynamics and Materials Conference. Reston, Virigina : American Institute of Aeronautics and Astronautics, 1993. http://dx.doi.org/10.2514/6.1993-1648.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

He-yi, Zhang, He Xuehua et Tang Sing Hai. « High Sensitive Laser Spectroscopy For Detect Trace Rare Earth Impurities In YbF3 and CaF 2 : Y b 3 + Crystals ». Dans Laser Applications to Chemical Analysis. Washington, D.C. : Optica Publishing Group, 1990. http://dx.doi.org/10.1364/laca.1990.tuc5.

Texte intégral
Résumé :
The upconversion fluorescence is an interest subject for many applications. But very few papers study the high sensitivity upconversion fluorescence and its application to analytical chemistry. The laser excited high sensitive upconversion fluorescence of YbF3 contain with trace T m 3 + and E r 3 + reported here for first time to our knowledge. Also high sensitive upconversion fluorescence of CaF 2 : Y b 3 + contain with trace T m 3 + and E r 3 + as impurities were studied.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Li, Haofeng, Jie Lu, Haining Meng, Liqing Cao, Yongheng Huang, Lian Li et Lin Gao. « Generic sensitivity : customizing context-sensitive pointer analysis for generics ». Dans ESEC/FSE '22 : 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. New York, NY, USA : ACM, 2022. http://dx.doi.org/10.1145/3540250.3549122.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Veirs, Kirk, Victor K. F. Chia et Gerd M. Rosenblatt. « Application of Position-Sensitive, Photon-Counting Detectors in Raman Spectroscopy ». Dans Laser Applications to Chemical Analysis. Washington, D.C. : Optica Publishing Group, 1987. http://dx.doi.org/10.1364/laca.1987.wa8.

Texte intégral
Résumé :
Raman spectroscopy has benefited from recent advances in the technology of lasers, optics, thin film interference filters and multichannel detectors. A new generation of imaging detectors based upon microchannel plates with position sensitive anodes may increase the sensitivity of Raman spectroscopy. Such detectors would be particularly useful to Raman spectroscopy without surface enhancement. A position-sensitive detector (PSD) with resolution of 70 microns in both the x and y axis on a 1 inch diameter photocathode with a dark count of 30 counts per second (cps) was used. The signal and signal to noise ratio (SNR) of this detector was compared to the standard intensified photodiode array (IPDA) detector using the Raman spectra of the fundamental vibration of O2 in air.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Mohammadi, E., et N. Manavizadeh. « Performance and sensitivity analysis of Dual-gated ion sensitive FET ». Dans 2017 Iranian Conference on Electrical Engineering (ICEE). IEEE, 2017. http://dx.doi.org/10.1109/iraniancee.2017.7985490.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Sounders, George C., Jomes H. Jett, John C. Martin et Richard A. Keller. « Flow Cytometric Ultrasensitive Molecular Quantitation Via Antibody-Antigen Interactions ». Dans Laser Applications to Chemical Analysis. Washington, D.C. : Optica Publishing Group, 1987. http://dx.doi.org/10.1364/laca.1987.ma2.

Texte intégral
Résumé :
The traditional domain of flow cytometry has been the measurement of properties of discrete biological particles - primarily cells or chromosomes. Most flow cytometric fluorescence measurements of cell properties are determinations of the amount of a specific type of molecule in a cell, such as DNA or a cell surface antigen. Since the inception of flow cytometry, there has been a continuing guest for more sensitive instruments and for techniques to detect and quantitate low levels of fluorescence. A generally accepted value for the sensitivity of detection of fluorescein on the surface of a cell is 3 000 to 5 000 molecules.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Vander Wal, R. L., R. L. Farrow et D. J. Rakestraw. « Investigation of Line Intensities and Collisional Effects in Degenerate Four-Wave Mixing in Nitric Oxide ». Dans Laser Applications to Chemical Analysis. Washington, D.C. : Optica Publishing Group, 1992. http://dx.doi.org/10.1364/laca.1992.tua2.

Texte intégral
Résumé :
The potential of resonant degenerate four-wave mixing (DFWM) as a sensitive, coherent diagnostic probe of combustion species has recently been demonstrated.1,2 Similar to coherent anti-Stokes Raman spectroscopy (CARS), DFWM generates a highly collimated, narrow bandwidth signal beam that allows remote detection, requires minimal optical access, and provides excellent immunity to background luminosity. However, since DFWM is typically performed with resonant radiation, it offers much greater sensitivity than CARS, permitting trace-species detection. While DFWM has been extensively studied in the context of phase conjugation,3 comparatively little has been reported on the development of DFWM for quantitative molecular spectroscopy.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Wang, Lan-Wei, Fuqin Li, Imam Alam, David Jupp, Simon Oliver et Medhavy Thankappan. « Analysis Ready Data Sensitivity Analyses ». Dans IGARSS 2019 - 2019 IEEE International Geoscience and Remote Sensing Symposium. IEEE, 2019. http://dx.doi.org/10.1109/igarss.2019.8898667.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Zayhowski, J. J., et Bernadette Johnson. « Passively Q-Switched Microchip Lasers for Environmental Monitoring ». Dans Laser Applications to Chemical and Environmental Analysis. Washington, D.C. : Optica Publishing Group, 1996. http://dx.doi.org/10.1364/lacea.1996.lwc.2.

Texte intégral
Résumé :
The need exists for sensors capable of measuring soil, groundwater, and airborne pollutants without laborious sample collection and analysis. Single-wavelength transmission, differential absorption, laser-induced fluorescence (LIF), stimulated Raman scattering, and laser-induced breakdown spectroscopy (LIBS) are all highly sensitive methods for providing quantitative values of concentrations of chemical species. These optical techniques have been proven to provide high sensitivity and chemical selectivity for a large number of the materials on the EPA’s priority pollutant list.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Marr, Andrew J., Bor-Chen Chang, Gregory E. Hall et Trevor J. Sears. « Near-Infrared Frequency Modulated Detection of Transient Species ». Dans Laser Applications to Chemical and Environmental Analysis. Washington, D.C. : Optica Publishing Group, 1998. http://dx.doi.org/10.1364/lacea.1998.lmc.13.

Texte intégral
Résumé :
Recently, a frequency modulated Ti:sapphire laser was used as a highly sensitive means for detection of transient species (1). In particular it was used to measure spectra of methylene and its halo-derivatives (2,3) and in addition very high signal-to-noise Doppler lineshapes were recorded from which significant dynamical analyses have derived (4). Within the last year we have incorporated the frequency modulation (FM) method into a near-infrared diode laser system which works at wavelengths around 1 μm and this has produced an order of magnitude improvment in signal-to-noise of that system. A further improvement in sensitivity has been achieved by extending the interaction region of the probing laser and the gas sample using a Herriott-type cell. Systems based upon this diode laser spectrometer which is cheap, simple to use and maintain, and relatively compact may provide a sensitive monitor of important gaseous molecules that absorb at similar wavelengths.
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Sensitivy analysis"

1

Ralston-Hooper, Kimberly. Hanford Site Composite Analysis : Dose Sensitivity Analyses. Office of Scientific and Technical Information (OSTI), avril 2022. http://dx.doi.org/10.2172/1861434.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Flach, G. SENSITIVITY ANALYSIS FOR SALTSTONE DISPOSAL UNIT COLUMN DEGRADATION ANALYSES. Office of Scientific and Technical Information (OSTI), octobre 2014. http://dx.doi.org/10.2172/1163502.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Lombardi, D. D2PC sensitivity analysis. Office of Scientific and Technical Information (OSTI), août 1992. http://dx.doi.org/10.2172/7271811.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Van Buren, Rachel. Railcar Sensitivity Analysis. Fort Belvoir, VA : Defense Technical Information Center, novembre 2011. http://dx.doi.org/10.21236/ada565001.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Lehoucq, Richard, Brian Franke, Stephen Bond et Scott McKinley. Particle Sensitivity Analysis. Office of Scientific and Technical Information (OSTI), septembre 2020. http://dx.doi.org/10.2172/1669202.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Lombardi, D. D2PC sensitivity analysis. Office of Scientific and Technical Information (OSTI), août 1992. http://dx.doi.org/10.2172/10174720.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Cheng, J. J., C. Yu et A. J. Zielen. RESRAD parameter sensitivity analysis. Office of Scientific and Technical Information (OSTI), août 1991. http://dx.doi.org/10.2172/6400651.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Friedman-Hill, Ernest J., Edward L. Hoffman, Marcus J. Gibson et Robert L. Clay. Integrated Sensitivity Analysis Workflow. Office of Scientific and Technical Information (OSTI), août 2014. http://dx.doi.org/10.2172/1171554.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Horwedel, J. E., R. Q. Wright et R. E. Maerker. Sensitivity analysis of EQ3. Office of Scientific and Technical Information (OSTI), janvier 1990. http://dx.doi.org/10.2172/7079359.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Keiter, Eric R., Laura Painton Swiler, Thomas V. Russo et Ian Zachary Wilcox. Sensitivity Analysis in Xyce. Office of Scientific and Technical Information (OSTI), septembre 2016. http://dx.doi.org/10.2172/1562422.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie