Computer Science ›› 2014, Vol. 41 ›› Issue (4): 21-23.

Previous Articles     Next Articles

Architecture Reliability Analysis Based on Extended Influence Diagram

ZHANG Meng-meng,LUO Ai-min,YANG Wei-sheng and ZHANG Xiao-kang   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Extended influence diagram is a graph model to solve complex decision problems based on uncertain information indicates,which extends from influence diagram.Architecture reliability analysis is one of the main contents for the quality measurement of architecture.This paper introduced the basic idea of extended influence diagram,developed extended influence diagram of architecture reliability with the defense graph,then combining with architecture data model,evaluated the utility value of the target node finally.The experimental result suggests the feasibility of architecture reliability analysis with extended influence diagram.

Key words: Architecture,Extended influence diagram,Defense graph,Reliability

[1] Johnson P,Lagerstrm R, Nrman P,et al.Enterprise Architecture Analysis with Extended Influence Diagrams[J].Information Systems Frontiers,2007,9(2/3):163-180
[2] Nrman P,Schnherr M,Johnson P,et al.Using Enterprise Architecture Models for System Quality Analysis[C]∥200812th International IEEE Enterprise Distributed Object Computing Conference.2008:14-23
[3] Johnson P,Lagerstrm R,Nrman P,et al.Extended Influence Diagrams for System Quality Analysis[J].Journal of Software,2007,3(2):30-42
[4] Lagerstrm R.Analyzing System Maintainability Using Enterprise Architecture Models[J].Journal of Enterprise Architecture,2007,3:33-42
[5] Lagerstrm R,Johnson1P,Nrman1P.Extended Influence Diagram Generation[C]∥Proceedings of the Interoperability for Enterprise Software and Applications Conference.2007
[6] Sommestad T,Ekstedt M,Johnson P.Combining defense graphs and enterprise architecture models for security analysis[C]∥12th International IEEE Enterprise Distributed Object Computing Conference.2012
[7] Sommestad T,Ekstedt M,Johnson P.Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Mo-dels[C]∥Proceedings of the 42nd Hawaii International Confe-rence on System Sciences.2009
[8] Franke U,Sommestad T,Ekstedt M,et al.Defense Graphs and Enterprise Architecture for Information Assurance Analysis[C]∥26th Army Conference.Orlando,2008
[9] Druzdzel M J,van der Gaag L C.Building Probabilistic Net-works:“Where Do the Numbers Come From?”Guest Editors' Introduction[J].IEEE Transactions On Knowledge and Data Engineering,2000,12(4):481-486
[10] Druzdzel M J,van der Gaag L C.Elicitation of Probabilities for Belief Networks:Combining Qualitative and Quantitative Information[C]∥UAI’95Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence.USA,1995:141-148
[11] 郭浩,刘俊先.基于体系结构的C4ISR系统可靠性指标体系[J].火力与指挥控制,2010,5(7):36-42
[12] 吴兴波.对武器装备可靠性指标体系的探讨[J].火炮发射与控制学报,1997(4):53-56
[13] 任建军,张喜斌,张恒喜.基于AHP的可靠性指标确定方法研究[J].装备指挥技术学院学报,2004(1):59-63
[14] 李根成,姜同敏.空空导弹可靠性指标体系研究[J].中国惯性技术学报,2006(8):88-92
[15] 赵建立,高会生,赵生岗.贝叶斯网络在可靠性评估中的应用[J].电力科学与工程,2008,24(2):51-53

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!