Research on software service risk uncertainty calculation method based on information entropy
Abstract
References
Recommendations
An Approach to Measuring Software Development Risk Based on Information Entropy
CINC '09: Proceedings of the 2009 International Conference on Computational Intelligence and Natural Computing - Volume 02Software development risk always influence the success of software project,even determine a enterprise surviving or perishment. Consequently, there are some significant meaning for software company and software engineering field to measure effectively ...
Risk based safety assurance: towards a defensible and practical methodology
ASSC '12: Proceedings of the Australian System Safety Conference - Volume 145The estimation of safety assurance for complex systems using risk based methodologies requires ranking of accident risk and (implicitly) the estimation of acceptable residual risk following system deployment. The paper describes a methodology for ...
Research on Calculation Method of Software Service Risk Occurrence Probability Based on Markov Chain Theory
AISS '21: Proceedings of the 3rd International Conference on Advanced Information Science and SystemThe new computing models represented by cloud computing, Internet of things, big data and artificial intelligence put forward higher requirements for the trustworthiness of software services. Software service risk occurrence probability is one of the ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
- National Natural Science Foundation of China
- Yunnan Fundamental Research Projects
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 25Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format