The general security analysis calculation problem is considered. In on-line applications, the accuracy of the results obtained from such calculations depend on accuracy of the network model used in the calculations, and inaccuracies of the input data. The ...
1984