skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: System Theoretic Process Analysis.

Abstract

Abstract not provided.

Authors:
;
Publication Date:
Research Org.:
Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Sponsoring Org.:
USDOE National Nuclear Security Administration (NNSA)
OSTI Identifier:
1375580
Report Number(s):
SAND2016-7778C
646535
DOE Contract Number:
AC04-94AL85000
Resource Type:
Conference
Resource Relation:
Conference: Proposed for presentation at the EFCOG NFS Workshop held August 8-12, 2016 in Chicago, IL, US.
Country of Publication:
United States
Language:
English

Citation Formats

Stirrup, Timothy Scott, and Curran, Kelsey Leigh Forde. System Theoretic Process Analysis.. United States: N. p., 2016. Web.
Stirrup, Timothy Scott, & Curran, Kelsey Leigh Forde. System Theoretic Process Analysis.. United States.
Stirrup, Timothy Scott, and Curran, Kelsey Leigh Forde. 2016. "System Theoretic Process Analysis.". United States. doi:. https://www.osti.gov/servlets/purl/1375580.
@article{osti_1375580,
title = {System Theoretic Process Analysis.},
author = {Stirrup, Timothy Scott and Curran, Kelsey Leigh Forde},
abstractNote = {Abstract not provided.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = 2016,
month = 8
}

Conference:
Other availability
Please see Document Availability for additional information on obtaining the full-text document. Library patrons may search WorldCat to identify libraries that hold this conference proceeding.

Save / Share:
  • Abstract not provided.
  • The physical protection system (PPS) of a fictional small modular reactor (SMR) facility have been modeled as a platform for a game theoretic approach to security decision analysis. To demonstrate the game theoretic approach, a rational adversary with complete knowledge of the facility has been modeled attempting a sabotage attack. The adversary adjusts his decisions in response to investments made by the defender to enhance the security measures. This can lead to a conservative physical protection system design. Since defender upgrades were limited by a budget, cost benefit analysis may be conducted upon security upgrades. One approach to cost benefitmore » analysis is the efficient frontier, which depicts the reduction in expected consequence per incremental increase in the security budget.« less
  • Aspects of computer programming activities have been modeled by numerous researchers. The model presented here is based on an information-theoretic description that provides a unified formalization of the programming process from specification through implementation. The concept of an algorithm's problem space is developed, and the complexity of an algorithm is defined in terms of its associated variables and their values. An algorithm's complexity is derived from the declaration section of the resulting program. Because a program's declarations are derivable before the program body is implemented, a program's complexity can be estimated before it is completed. This model provides insight intomore » the comparative complexities of problem spaces and suggests ways of subdividing those problem spaces and their associated programs.« less