{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T02:20:20Z","timestamp":1767925220554,"version":"3.49.0"},"reference-count":45,"publisher":"American Society of Civil Engineers (ASCE)","issue":"4","content-domain":{"domain":["ascelibrary.org"],"crossmark-restriction":true},"short-container-title":["J. Comput. Civ. Eng."],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1061\/(asce)cp.1943-5487.0000233","type":"journal-article","created":{"date-parts":[[2012,5,20]],"date-time":"2012-05-20T11:57:40Z","timestamp":1337515060000},"page":"407-418","update-policy":"https:\/\/doi.org\/10.1061\/do.news.20190416.0001","source":"Crossref","is-referenced-by-count":33,"title":["Error and Uncertainty Analysis of Inexact and Imprecise Computer Models"],"prefix":"10.1061","volume":"27","author":[{"given":"Ismail","family":"Farajpour","sequence":"first","affiliation":[{"name":"Ph.D. Candidate, Structural Engineering, Civil Engineering Dept., Clemson Univ., Clemson, SC 29634."}]},{"given":"Sez","family":"Atamturktur","sequence":"additional","affiliation":[{"name":"Assistant Professor, Civil Engineering, Civil Engineering Dept., Clemson Univ., Clemson, SC 29634 (corresponding author)."}]}],"member":"30","reference":[{"key":"e_1_3_2_2_1","unstructured":"American Institute of Aeronautics and Astronautics (AIAA). (1998). \u201cGuide for the verification and validation of computational fluid dynamics simulations.\u201d AIAA-G-077-1998 Reston VA."},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compstruc.2011.06.010"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1198\/004017007000000092"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2005.11.032"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2010.04.014"},{"key":"e_1_3_2_7_1","doi-asserted-by":"crossref","unstructured":"Chow L. F. Zhao F. Shen L. D. Chi H. Liu X. and Shan J. (2006). \u201c3D traffic simulation for intermodal safety and security.\u201d Proc. 9th Int. Conf. on Applications of Advanced Technology in Transportation ASCE Reston VA 269\u2013274.","DOI":"10.1061\/40799(213)44"},{"key":"e_1_3_2_8_1","first-page":"6","article-title":"Error analysis and simulations of complex phenomena","volume":"29","author":"Christie M. A.","year":"2005","journal-title":"Los Alamos Sci."},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1162\/106454699568728"},{"issue":"1","key":"e_1_3_2_10_1","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1111\/j.2517-6161.1995.tb02015.x","article-title":"Assessment and propagation of model uncertainty","volume":"57","author":"Draper D.","year":"1995","journal-title":"J. R. Stat. Soc. Ser. B"},{"key":"e_1_3_2_11_1","doi-asserted-by":"crossref","unstructured":"Eberhart R. C. and Kennedy J. (1995). \u201cA new optimizer using particle swarm theory.\u201d Proc. 6th Int. Symp. on Micro Machine and Human Science IEEE New Brunswick NJ 39\u201343.","DOI":"10.1109\/MHS.1995.494215"},{"key":"e_1_3_2_12_1","doi-asserted-by":"crossref","unstructured":"Eberhart R. C. and Shi Y. (2001). \u201cParticle swarm optimization: Developments applications and resources.\u201d Proc. Int. Congress on Evolutionary Computation Vol.\u00a01 IEEE New Brunswick NJ 81\u201386.","DOI":"10.1109\/CEC.2001.934374"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1039\/b9ay00250b"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/003754970107600201"},{"key":"e_1_3_2_15_1","volume-title":"Genetic algorithms in search, operation and machine learning","author":"Goldberg D. E.","year":"1989"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)EM.1943-7889.0000253"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.biosystems.2004.08.003"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compstruc.2010.01.005"},{"key":"e_1_3_2_19_1","unstructured":"Hemez F. M. and Ben-Haim Y. (2004). \u201cThe good the bad and the ugly of predictive science.\u201d K. M. Hanson and F. M. Hemez eds. 4th Int. Conf. on Sensitivity of Model Output Los Alamos National Laboratory Los Alamos NM 181\u2013193."},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77362-7_10"},{"key":"e_1_3_2_21_1","volume-title":"Bayesian statistics","author":"Higdon D.","year":"2007"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1137\/S1064827503426693"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cma.2007.05.031"},{"key":"e_1_3_2_24_1","volume-title":"Introduction to mathematical statistics","author":"Hogg R. V.","year":"1978","edition":"4"},{"key":"e_1_3_2_25_1","unstructured":"Hood S. and Swayne D. (2010). \u201cA novel model calibration technique through application of machine learning association rules.\u201d D. A. Swayne W. Yang A. A. Voinov A. Rizzoli and T. Filatova eds. Proc. of Int. Environmental Modelling and Software Society (iEMSs) Int. Congress on Environmental Modeling and Software Modeling for Environment\u2019s Sake Fifth Biennial Meeting Ottawa Canada."},{"key":"e_1_3_2_26_1","doi-asserted-by":"crossref","unstructured":"Johnson C. W. and McLean K. (2008). \u201cTools for local critical infrastructure protection: computational support for identifying safety and security interdependencies between local critical infrastructures.\u201d Proc. 3rd Int. Conf. on System Safety Institution of Engineering and Technology (IET) Birmingham UK.","DOI":"10.1049\/cp:20080736"},{"key":"e_1_3_2_27_1","unstructured":"Jung B. (2011). \u201cA hierarchical framework for statistical model validation of engineered systems.\u201d Dissertation Digital Repository at the Univ. of Maryland Dept. of Mechanical Engineering Univ. of Maryland Baltimore 53\u201361."},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9868.00294"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0657-9_11"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.220.4598.671"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compstruc.2004.01.002"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11814-011-0178-2"},{"key":"e_1_3_2_33_1","unstructured":"Ma T. and Abdulhai B. (2001). \u201cGenetic algorithm-based combinatorial parametric optimization for the calibration of microscopic traffic simulation models.\u201d Intelligent Transportation Systems Conf. Proc. IEEE New Brunswick NJ 848\u2013853."},{"key":"e_1_3_2_34_1","unstructured":"Markow M. J. (1984). \u201cComputer simulation to address issues of public policy.\u201d Proc. 3rd Conf. Computing in Civil Engineering ASCE Reston VA 523\u2013532."},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2006.12.019"},{"issue":"1","key":"e_1_3_2_36_1","first-page":"48","article-title":"A hybrid particle swarm-gradient algorithm for global structural optimization","volume":"26","author":"Plevris V.","year":"2011","journal-title":"Comput. Aided Civ. Infrastruct. Eng."},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1995.0007"},{"key":"e_1_3_2_38_1","doi-asserted-by":"crossref","unstructured":"Roy C. J. and Oberkampf W. L. (2010). \u201cA complete framework for verification validation and uncertainty quantification in scientific computing \u201d 48th AIAA Aerospace Sciences Meeting Including the New Horizons Forum and Aerospace Exposition AIAA Reston VA.","DOI":"10.2514\/6.2010-124"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0611677104"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2005.11.031"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2010.04.011"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-7744-1_5"},{"key":"e_1_3_2_43_1","doi-asserted-by":"crossref","unstructured":"Wang K. et al. (2008). \u201cParticle swarm optimization for calibrating stream water quality model.\u201d Proc. 2nd Int. Symp. on Intelligent Information Technology Application (IITA\u201908) IEEE Shanghai China 682\u2013686.","DOI":"10.1109\/IITA.2008.555"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.3923\/jas.2008.3703.3708"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1002\/hyp.7152"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compgeo.2008.09.005"}],"container-title":["Journal of Computing in Civil Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ascelibrary.org\/doi\/pdf\/10.1061\/%28ASCE%29CP.1943-5487.0000233","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T17:36:36Z","timestamp":1713980196000},"score":1,"resource":{"primary":{"URL":"https:\/\/ascelibrary.org\/doi\/10.1061\/%28ASCE%29CP.1943-5487.0000233"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,7]]}},"alternative-id":["10.1061\/(ASCE)CP.1943-5487.0000233"],"URL":"https:\/\/doi.org\/10.1061\/(asce)cp.1943-5487.0000233","relation":{},"ISSN":["0887-3801","1943-5487"],"issn-type":[{"value":"0887-3801","type":"print"},{"value":"1943-5487","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7]]},"assertion":[{"value":"2012-01-03","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-05-16","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}