Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 523-526.
• Interdiscipline & Application • Previous Articles Next Articles
YAN Gong-da, DONG Peng, WEN Hao-lin
CLC Number:
[1]ASSAF S A,AL-HEJJI S.Causes of delay in large construction projects[J].International Journal of Project Management,2006,24(4):349-357. [2]LUU V T,KIM S Y,TUAN N V,et al.Ogunlana.Quantifying schedule risk in construction projects using Bayesian belief networks[J].International Journal of Project Management,2009,27(1):39-50. [3]ÖKMEN Ö,ÖZTAS A.Construction project network evaluation with correlated schedule risk analysis model[J].Journal of Construction Engineering and Management,2008,134(1):49-63. [4]JALILI Y,FORDA D N.Quantifying the impacts of rework,schedule pressure,and ripple effect loops on project schedule performance[J].Systerm Dynamics Review,2016,32(1):82-96. [5]陈悦华,杨旭,杜厚磊.基于关键链的PERT项目群进度风险控制方法改进[J].施工技术,2015,44(6):71-74. [6]徐霄枭.建设项目施工阶段工期风险分析[D].深圳:深圳大学,2016. [7]李存斌,陆龚曙,李鹏,等.建设项目进度风险管理的系统动力学模型[J].华东电力,2012,40(2):178-182. [8]柴国荣,许阳.进度视角下地铁项目施工安全风险的系统动力学分析[J].科技管理研究,2016,36(21):85-90. [9]李杨,徐峰,谢光强,等.多智能体技术发展及其应用综述[J].计算机工程与应用,2018,54(9):13-21. [10]刘志强.ZB船装备系统中修项目进度控制研究[D].广州:华南理工大学,2011. |
[1] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[2] | YONG Qi, JIANG Wei-na, LUO Yu-ze. Trial Risk Assessment System Based on Fuzzy Number Similarity [J]. Computer Science, 2021, 48(5): 209-216. |
[3] | WANG Xiao-xiao, WANG Ting-wen, MA Yu-ling, FAN Jia-yi, CUI Chao-ran. Credit Risk Assessment Method of P2P Online Loan Borrowers Based on Deep Forest [J]. Computer Science, 2021, 48(11A): 429-434. |
[4] | LIU Shan-shan, ZHU Hai-long, HAN Xiao-xia, MU Quan-qi, HE Wei. Enterprise Risk Assessment Model Based on Principal Component Regression and HierarchicalBelief Rule Base [J]. Computer Science, 2021, 48(11A): 570-575. |
[5] | YE Zi-wei, GUO Yuan-bo, LI Tao, JU An-kang. Extended Attack Graph Generation Method Based on Knowledge Graph [J]. Computer Science, 2019, 46(12): 165-173. |
[6] | ZHAN Xiong, GUO Hao, HE Xiao-yun, LIU Zhou-bin, SUN Xue-jie, CHEN Hong-song. Research on Security Risk Assessment Method of State Grid Edge Computing Information System [J]. Computer Science, 2019, 46(11A): 428-432. |
[7] | YANG De-jie, ZHANG Ning, YUAN Ji, BAI Lu. Individual Credit Risk Assessment Based on Stacked Denoising Autoencoder Networks [J]. Computer Science, 2019, 46(10): 7-13. |
[8] | LIN Xiao-hua and JIA Wen-hua. FMEA Method Combining OWA Operator and Fuzzy DEMATEL [J]. Computer Science, 2016, 43(Z11): 362-367. |
[9] | TANG Cheng-hua, TIAN Ji-long, TANG Shen-sheng, ZHANG Xin and WANG Lu. Risk Assessment of Software Vulnerability Based on GA-FAHP [J]. Computer Science, 2015, 42(9): 134-138. |
[10] | LU Zhi-gang,LIU Jun-rong and LIU Bao-xu. Risk Assessment Methods of Complex Network Based on GTST-MLD [J]. Computer Science, 2014, 41(7): 194-199. |
[11] | LIU Jin-hang and XIA Hong-xia. New Methods of Software Requirements Risk Assessment Using UML [J]. Computer Science, 2014, 41(6): 131-135. |
[12] | . Distributed Network Risk Assessment Method Based on Attack Graph [J]. Computer Science, 2013, 40(2): 139-144. |
[13] | . Multi-Agents Network Security Risk Evaluation Model Based on Attack Graph [J]. Computer Science, 2013, 40(2): 148-152. |
[14] | . Combat Super Network Multi Agent Model [J]. Computer Science, 2012, 39(7): 44-47. |
[15] | HE Jian-hong,BAI Xiao-ying,HU Lin-ping. Quantitative Risk Analysis of Software Project Schedule Management [J]. Computer Science, 2011, 38(4): 164-169. |
|