|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 6388 occurrences of 3089 keywords
|
|
|
Results
Found 37669 publication records. Showing 37659 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
114 | Sherif M. Yacoub, Hany H. Ammar |
A Methodology for Architecture-Level Reliability Risk Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 28(6), pp. 529-547, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Reliability risk analysis, component-dependency graphs, severity measures and dynamic metrics, software architecture, risk assessment, risk modeling |
89 | Sherif M. Yacoub, Hany H. Ammar, Tom Robinson |
A Methodology for Architectural-Level Risk Assessment Using Dynamic Metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 11th International Symposium on Software Reliability Engineering (ISSRE 2000), 8-11 October 2000, San Jose, CA, USA, pp. 210-221, 2000, IEEE Computer Society, 0-7695-0807-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
component-dependency graphs and dynamic metrics, risk assessment, Risk analysis, risk modeling |
83 | Susan A. Sherer |
The three dimensions of software risk: technical, organizational, and environmental. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (3) ![In: 28th Annual Hawaii International Conference on System Sciences (HICSS-28), January 3-6, 1995, Kihei, Maui, Hawaii, USA, pp. 369-378, 1995, IEEE Computer Society, 0-8186-6945-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
technical risk, organizational risk, environmental risk, poor communication, risk management procedures, culture changes, new information systems, software vendors, information alliances, information systems, software developers, software reliability, risk management, software development management, business data processing, management of change, software risk |
82 | Jinyan Li 0001, Qiang Yang 0001 |
Strong Compound-Risk Factors: Efficient Discovery Through Emerging Patterns and Contrast Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Technol. Biomed. ![In: IEEE Trans. Inf. Technol. Biomed. 11(5), pp. 544-552, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
76 | Silvia Polettini, Julian Stander |
A Bayesian Hierarchical Model Approach to Risk Estimation in Statistical Disclosure Limitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases: CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004. Proceedings, pp. 247-261, 2004, Springer, 3-540-22118-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
empiricalBayes, individual risk, social survey data, summarising posterior distributions, risk assessment, Mathematica, disclosure risk, Hypergeometric function, Bayesian hierarchical model |
72 | Arjen K. Lenstra, Tim Voss |
Information Security Risk Assessment, Aggregation, and Mitigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 391-401, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
risk aggregation, risk mitigation, Basel 2, multiple-choice knapsack problem, Risk management, risk assessment |
72 | SangCheol Hwang, Namhoon Lee, Kouichi Sakurai, Joong Gil Park, Jaecheol Ryou 0001 |
The Improved Risk Analysis Mechanism in the Practical Risk Analysis System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Convergence in Broadband and Mobile Networking, International Conference, ICOIN 2005, Jeju Island, Korea, January 31- February 2, 2005, Proceedings, pp. 835-842, 2005, Springer, 3-540-24467-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
praha, risk management, risk analysis |
71 | Janne Ropponen, Kalle Lyytinen |
Components of Software Development Risk: How to Address Them? A Project Manager Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 26(2), pp. 98-112, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
software development, project management, risk management, process improvement, Software risk, system failures |
70 | Ye Yang, Barry W. Boehm, Betsy Clark |
Assessing COTS integration risk using cost estimation inputs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 28th International Conference on Software Engineering (ICSE 2006), Shanghai, China, May 20-28, 2006, pp. 431-438, 2006, ACM, 1-59593-375-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
COCOTS, risk assessment, cost driver |
67 | Cunbin Li, Jianjun Wang 0002 |
The Research on Generic Project Risk Element Network Transmission Parallel Computing Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISICA ![In: Advances in Computation and Intelligence, Second International Symposium, ISICA 2007, Wuhan, China, September 21-23, 2007, Proceedings, pp. 539-546, 2007, Springer, 978-3-540-74580-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
risk element, risk element transmission, project risk management, parallel computing, network computing |
66 | Yi Peng 0001, Gang Kou, Yong Shi 0001 |
Knowledge-Rich Data Mining in Financial Risk Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCS (2) ![In: Computational Science - ICCS 2009, 9th International Conference, Baton Rouge, LA, USA, May 25-27, 2009, Proceedings, Part II, pp. 534-542, 2009, Springer, 978-3-642-01972-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
knowledge-rich data mining, financial risk detection, classification, risk analysis, chance discovery |
66 | Martin S. Feather |
Towards a Unified Approach to the Representation of, and Reasoning with, Probabilistic Risk Information about Software and Its System Interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 15th International Symposium on Software Reliability Engineering (ISSRE 2004), 2-5 November 2004, Saint-Malo, Bretagne, France, pp. 391-402, 2004, IEEE Computer Society, 0-7695-2215-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
FMECA, SFMECA, FTA, PRA, Risk-informed decision-making, Cost-benefit tradeoffs, Probabilistic Risk Reduction, FMEA, Failure Modes |
64 | Geoffrey G. Roy, Terence L. Woodings |
A framework for risk analysis in software engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSEC ![In: 7th Asia-Pacific Software Engineering Conference (APSEC 2000), 5-8 December 2000, Singapore, pp. 441-, 2000, IEEE Computer Society, 0-7695-0915-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
project management process quality, risk mitigation strategies, ProRisk, risk management tool, software engineering, software development, project management, risk management, software development management, risk analysis, project plan |
63 | Louis Marinos |
Risk Management and Risk Assessment at ENISA: Issues and Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 2-3, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Interoperability of methods, Comparability of methods, Emerging Risks, Risk Management, Risk Assessment |
62 | Markus Ruch, Stefan Sackmann |
Customer-Specific Transaction Risk Management in E-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMCIS/SIGeBIZ ![In: Value Creation in E-Business Management. 15th Americas Conference on Information Systems, AMCIS 2009, SIGeBIZ track, San Francisco, CA, USA, August 6-9, 2009. Selected Papers, pp. 68-79, 2009, Springer, 978-3-642-03131-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
customer risk, e-commerce, Risk management, payment, customer value, online retailer |
62 | Omar Khadeer Hussain, Elizabeth Chang 0001, Farookh Khadeer Hussain, Tharam S. Dillon, Ben Soh |
Risk in Trusted Decentralized Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 21st International Conference on Data Engineering Workshops, ICDE 2005, 5-8 April 2005, Tokyo, Japan, pp. 1198, 2005, IEEE Computer Society, 0-7695-2657-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Decentralized Peer-to-peer Communications, Riskiness, Risk Indicator, Trust, e-Business, Risk |
61 | Katerina Goseva-Popstojanova, Ahmed E. Hassan, Ajith Guedem, Walid Abdelmoez, Diaa Eldin M. Nassar, Hany H. Ammar, Ali Mili 0001 |
Architectural-Level Risk Analysis Using UML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 29(10), pp. 946-960, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
dynamic complexity, dynamic coupling, severity of failure, software architecture, Markov model, Risk assessment, UML specification |
61 | Tobias Rieke, Axel Winkelmann |
Modellierung und Management von Risiken. Ein prozessorientierter Risikomanagement-Ansatz zur Identifikation und Behandlung von Risiken in Geschäftsprozessen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirtschaftsinf. ![In: Wirtschaftsinf. 50(5), pp. 346-356, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
] Basel II, corporate governance codex, KonTraG, multi-purpose risk, Sarbanes-Oxley Act, Solvency II, conceptual modeling, meta modeling, IT-governance, EPC, risk modeling, corporate governance |
58 | Xiankun Zhang, Minghu Ha 0001, Jing Wu, Chao Wang 0034 |
The Bounds on the Rate of Uniform Convergence of Learning Process on Uncertainty Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (1) ![In: Advances in Neural Networks - ISNN 2009, 6th International Symposium on Neural Networks, ISNN 2009, Wuhan, China, May 26-29, 2009, Proceedings, Part I, pp. 110-117, 2009, Springer, 978-3-642-01506-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Uncertain measure, Expected risk functional, Empirical risk functional, Empirical risk minimization principle, Bounds of the rate of uniform convergence |
57 | Rui Zheng, Kan Shi, Shu Li 0001 |
The Influence Factors and Mechanism of Societal Risk Perception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex (2) ![In: Complex Sciences, First International Conference, Complex 2009, Shanghai, China, February 23-25, 2009. Revised Papers, Part 2, pp. 2266-2275, 2009, Springer, 978-3-642-02468-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Societal risk perception, psychometric paradigm, Social justice, Government Trust |
57 | Hui Li 0024, Maryellen L. Giger, Olufunmilayo I. Olopade, Michael R. Chinander |
Power Spectral Analysis of Mammographic Parenchymal Patterns for Breast Cancer Risk Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 21(2), pp. 145-152, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Mammographic parenchymal patterns, computerized texture analysis, breast cancer risk, power spectral analysis, image analysis |
57 | Traian Marius Truta, Farshad Fotouhi, Daniel C. Barth-Jones |
Disclosure risk measures for the sampling disclosure control method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 301-306, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
disclosure risk and sampling, data privacy, microdata, statistical disclosure |
57 | Traian Marius Truta, Farshad Fotouhi, Daniel C. Barth-Jones |
Privacy and confidentiality management for the microaggregation disclosure control method: disclosure risk and information loss measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003, pp. 21-30, 2003, ACM, 1-58113-776-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
information loss and microaggregation, data privacy, microdata, disclosure risk, statistical disclosure |
57 | Anne Fuller, Peter R. Croll, Limei Di |
A New Approach to Teaching Software Risk Management with Case Studies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSEE&T ![In: 15th Conference on Software Engineering Education and Training (CSEET'02), 25-27 February 2002, Covington, Kentucky, USA, pp. 215-, 2002, IEEE Computer Society, 0-7695-1515-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Software engineering, Risk management, Software engineering education |
55 | R. Tyrrell Rockafellar, Stan Uryasev, Michael Zabarankin |
Generalized deviations in risk analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Finance Stochastics ![In: Finance Stochastics 10(1), pp. 51-74, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
deviation measures, coherent risk measures, Risk management, portfolio optimization, value-at-risk, convex analysis, conditional value-at-risk |
55 | Richard E. Fairley |
Risk Management for Software Projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 11(3), pp. 57-67, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
contingency planning, crisis avoidance, risk factor identification, risk probability calculation, software engineering, probability, project management, risk management, risk management, software project management, DP management |
55 | Harmen Wigert Boschloo, Thanh Mung Lam, Max Mulder, René van Paassen |
Collision avoidance for a remotely-operated helicopter using haptic feedback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (1) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 229-235, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
55 | Tianxiong Xue, Ernest S. Kuh, Dongsheng Wang 0012 |
Post global routing crosstalk synthesis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 16(12), pp. 1418-1430, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
55 | Eric K. Clemons, Michael C. Row, Matt E. Thatcher |
An integrative framework for identifying and managing risks associated with large scale reengineering efforts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (4) ![In: 28th Annual Hawaii International Conference on System Sciences (HICSS-28), January 3-6, 1995, Kihei, Maui, Hawaii, USA, pp. 960-969, 1995, IEEE Computer Society, 0-8186-6945-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
large scale reengineering efforts, functionality risk, political risk, uncertain future strategic needs, information systems, risk management, risk management, economics, failure, business data processing, systems re-engineering, organizational change, management information systems, strategic planning, management of change, integrative framework, commerce, risk identification |
55 | Sen Qin |
Log-optimal portfolio models with risk control of VaR and CVaR using genetic algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GEC Summit ![In: Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, GEC Summit 2009, Shanghai, China, June 12-14, 2009, pp. 941-944, 2009, ACM, 978-1-60558-326-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
log-optimal portfolio model, genetic algorithm, value-at-risk, conditional value-at-risk, risk control |
54 | Chun-Pin Tseng, Cheng-Wu Chen, Ken Yeh, Wei-Ling Chiang |
Intelligent Financial Decision Model of Natural Disasters Risk Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, Third International Conference on Intelligent Computing, ICIC 2007, Qingdao, China, August 21-24, 2007, Proceedings, pp. 46-55, 2007, Springer, 978-3-540-74170-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
exceeding probability (EP) curve, risk reduction, Risk control |
54 | Luisa Franconi, Silvia Polettini |
Individual Risk Estimation in µ-Argus: A Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases: CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004. Proceedings, pp. 262-272, 2004, Springer, 3-540-22118-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Argus software, global risk, individual risk, household data, local suppression, re-identification disclosure, threshold setting, unsafe combinations, data protection |
54 | Nimal Nissanke, Hamdan Dammag |
Risk Ordering of States in Safecharts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability and Security, 19th International Conference, SAFECOMP 2000, Rotterdam, The Netherlands, October 24-27, 2000, Proceedings, pp. 395-405, 2000, Springer, 3-540-41186-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
risk ordering, nuclear safety, Safety, Statecharts, risk assessment, failures |
53 | Shabbir Ahmed 0001 |
Convexity and decomposition of mean-risk stochastic programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Math. Program. ![In: Math. Program. 106(3), pp. 433-446, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Mean-risk objectives, Computational complexity, Decomposition, Stochastic programming, Cutting plane algorithms |
53 | Vikas Kumar 0004, Marta Schuhmacher, Miriam García |
Integrated Fuzzy Approach for System Modeling and Risk Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDAI ![In: Modeling Decisions for Artificial Intelligence, Third International Conference, MDAI 2006, Tarragona, Spain, April 3-5, 2006, Proceedings, pp. 227-238, 2006, Springer, 3-540-32780-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
risk analysis, Fuzzy modeling, uncertainty analysis |
52 | Amril Syalim, Yoshiaki Hori, Kouichi Sakurai |
Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 726-731, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Reiko Ann Miura-Ko, Nicholas Bambos |
Dynamic Risk Mitigation in Computing Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 325-328, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Loredana Di Consiglio, Silvia Polettini |
Improving Individual Risk Estimators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings, pp. 243-256, 2006, Springer, 3-540-49330-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Frank Schlottmann, Andreas Mitschele, Detlef Seese |
A Multi-objective Approach to Integrated Risk Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMO ![In: Evolutionary Multi-Criterion Optimization, Third International Conference, EMO 2005, Guanajuato, Mexico, March 9-11, 2005, Proceedings, pp. 692-706, 2005, Springer, 3-540-24983-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Hany H. Ammar, Tooraj Nikzadeh, Joanne Bechta Dugan |
A Methodology For Risk Assessment Of Functional Specification Of Software Systems Using Colored Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE METRICS ![In: 4th IEEE International Software Metrics Symposium (METRICS 1997), November 5-7, 1997, Albuquerque, NM, USA, pp. 108-, 1997, IEEE Computer Society, 0-8186-8093-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
software systems analysis, complex real time software systems, analysis/design phase, heuristic risk assessment technique, severity measures, heuristic risk factor, software functional specifications, dynamic complexity measures, concurrency complexity, severity analysis, failure mode and effect analysis, software metrics, software components, risk assessment, colored Petri nets, functional specification, complexity metrics, large scale software system |
49 | Katerina Papadaki 0002, Despina Polemi |
Collaboration and Knowledge Sharing Platform for Supporting a Risk Management Network of Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIW ![In: Third International Conference on Internet and Web Applications and Services, ICIW 2008, 8-13 June 2008, Athens, Greece, pp. 239-244, 2008, IEEE Computer Society, 978-0-7695-3163-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
collaboration and knowledge sharing platform, information security risk management, risk management meta-process, network of practice |
49 | W. Eric Wong, Yu Qi, Kendra M. L. Cooper |
Source code-based software risk assessing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 1485-1490, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
dynamic test coverage, static code complexity, software quality, risk assess, risk model |
49 | Jiuyong Li, Ada Wai-Chee Fu, Hongxing He, Jie Chen 0004, Huidong Jin 0001, Damien McAullay, Graham J. Williams, Ross Sparks, Chris Kelman |
Mining risk patterns in medical data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, Illinois, USA, August 21-24, 2005, pp. 770-775, 2005, ACM, 1-59593-135-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
optimal risk pattern set, relative risk, rule, medical application |
49 | Kunsoo Han, Robert J. Kauffman, Barrie R. Nault |
Innovator or Owner? Information Sharing, Incomplete Contracts and Governance in Financial Risk Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
financial risk management, interorganizational IS, information systems, information sharing, ownership, value-at-risk, Economic theory, incomplete contracts |
49 | Bo-chiuan Su |
Risk behavior of Internet shopping: comparison of college students' versus non-student adults'. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 5th International Conference on Electronic Commerce, ICEC 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003, pp. 181-185, 2003, ACM, 1-58113-788-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
risk attitudes, risk behavior, electronic commerce |
49 | Tianxiong Xue, Ernest S. Kuh, Dongsheng Wang 0012 |
Post global routing crosstalk risk estimation and reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: Proceedings of the 1996 IEEE/ACM International Conference on Computer-Aided Design, ICCAD 1996, San Jose, CA, USA, November 10-14, 1996, pp. 302-309, 1996, IEEE Computer Society / ACM, 0-8186-7597-7. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
risk tolerance bound, net sensitivity, ripping-up and rerouting, partitioning, global routing, crosstalk noise, risk estimation |
49 | Idongesit Mkpong-Ruffin, David A. Umphress, John Hamilton, Juan E. Gilbert |
Quantitative software security risk assessment model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 31-33, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
quantitative risk assessment, empirical software engineering, software security |
49 | Young-Hwan Bang, Yoon-Jung Jung, In-Jung Kim, Namhoon Lee, Gang-Soo Lee |
The Design and Development for Risk Analysis Automatic Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 491-499, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Safeguard, Vulnerability, Risk Analysis, Interview, Threat, Asset, Inquiry |
48 | Arunabha Mukhopadhyay, Samir Chatterjee, Rahul Roy, Debashis Saha, Ambuj Mahanti, Samir K. Sadhukhan |
Insuring Big Losses Due to Security Breaches through Insurance: A Business Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 158, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
e-risk, E-risk insurance, cyber-insurance, re-insurance, e-commerce, security breach |
48 | Nimal Nissanke, Hamdan Dammag |
Risk Bands - A Novel Feature of Safecharts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 11th International Symposium on Software Reliability Engineering (ISSRE 2000), 8-11 October 2000, San Jose, CA, USA, pp. 293-303, 2000, IEEE Computer Society, 0-7695-0807-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
47 | Alexander Holland 0001, Madjid Fathi |
Quantitative and qualitativerisk in IT portfolio management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Montréal, Canada, 7-10 October 2007, pp. 3840-3847, 2007, IEEE, 978-1-4244-0990-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Norman F. Schneidewind |
Predicting risk as a function of risk factors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Innov. Syst. Softw. Eng. ![In: Innov. Syst. Softw. Eng. 1(1), pp. 63-70, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
risk assessment, risk factors, Reliability prediction |
45 | Konstantina Georgieva, Ayaz Farooq, Reiner R. Dumke |
Analysis of the Risk Assessment Methods - A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSM/Mensura ![In: Software Process and Product Measurement, International Conferences IWSM 2009 and Mensura 2009, Amsterdam, The Netherlands, November 4-6, 2009. Proceedings, pp. 76-86, 2009, Springer, 978-3-642-05414-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
risk assessment methods, risk management, software project management |
45 | Yumiko Nara |
A Cross-Cultural Study on Attitudes toward Risk, Safety and Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part II, pp. 734-741, 2008, Springer, 978-3-540-85564-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
risk image, the United States, security, safety, risk, China, questionnaire, comparative study, Japan |
45 | Renata Mansini, Wlodzimierz Ogryczak, Maria Grazia Speranza |
Conditional value at risk and related linear programming models for portfolio optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 152(1), pp. 227-256, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Mean-risk models, Gini’s mean difference, Linear programming, Portfolio optimization, Conditional Value at Risk, Stochastic dominance |
45 | Benoit Aubert, Michel Patry, Suzanne Rivard |
A framework for information technology outsourcing risk management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Base ![In: Data Base 36(4), pp. 9-28, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
contract design, information system, risk management, outsourcing, risk |
45 | Ryôichi Sasaki, Saneyuki Ishii, Yuu Hidaka, Hiroshi Yajima, Hiroshi Yoshiura, Yuko Murayama |
Development Concept for and Trial Application of a "Mulutiplex Risk Communicator". ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E ![In: Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government, 5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E'2OO5), October 28-30, 2005, Poznan, Poland, pp. 607-621, 2005, Springer, 978-0-387-28753-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, privacy, risk, discrete optimization, risk communication |
45 | Peter Wieland, Frode Høgberg, Kristin Strømseng |
Enhancements in Software Project Risk Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ada-Europe ![In: Reliable Software Technologies - Ada-Europe 2000, 5th Ada-Europe International Conference, Potsdam, Germany, June 26-30, 2000, Proceedings, pp. 161-172, 2000, Springer, 3-540-67669-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Project Risk Management, Software Engineering, Software Quality, Project management, Risk Analysis |
45 | Stephen D. Kleban, Scott H. Clearwater |
Computation-at-Risk: Assessing Job Portfolio Management Risk on Clusters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), CD-ROM / Abstracts Proceedings, 26-30 April 2004, Santa Fe, New Mexico, USA, 2004, IEEE Computer Society, 0-7695-2132-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Liu Bin, Cui Wentian, Xin Chunlin |
Cash Management and Its Risk Control under No-Stationary Uncertain Demand. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 577-581, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Cash balance problem, Online Algorithm with Risk-reward, Competitive Ratio |
44 | Charles Pak |
The near real time statistical asset priority driven (nrtsapd) risk assessment methodology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 9th Conference on Information Technology Education, SIGITE 2008, Cincinnati, OH, USA, October 16-18, 2008, pp. 105-112, 2008, ACM, 978-1-60558-329-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
risk assessment, asset management |
44 | Erik McDermott, Shigeru Katagiri |
Discriminative training via minimization of risk estimates based on Parzen smoothing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 25(1), pp. 37-57, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Speech recognition, Discriminative training, Risk estimation |
44 | Masamitsu Moriyama, Kentaro Takemoto, Takio Shimosakon |
Risk management for electronic commerce between Japan and China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 6th International Conference on Electronic Commerce, ICEC 2004, Delft, The Netherlands, October 25-27, 2004, pp. 213-218, 2004, ACM, 1-58113-930-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
electronic commerce (EC), trade guarantee, risk management |
44 | Sabah al-Binali |
A Risk-Reward Framework for the Competitive Analysis of Financial Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Algorithmica ![In: Algorithmica 25(1), pp. 99-115, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Adaptive trading strategies, Forecast, Competitive analysis, Risk, On-line algorithms, Reward |
44 | Merrill Warkentin, Robert S. Moore, Ernst Bekkering, Allen C. Johnston |
Analysis of systems development project risks: an integrative framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Base ![In: Data Base 40(2), pp. 8-27, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
project risk, success, software, organization, failure, systems development, risk factors |
44 | Shu-Fang Zhao, Li-Chao Chen |
The BP neural networks applications in bank credit risk management system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE ICCI ![In: Proceedings of the 8th IEEE International Conference on Cognitive Informatics, ICCI 2009, June 15-17, 2009, Hong Kong, China, pp. 527-532, 2009, IEEE Computer Society, 978-1-4244-4642-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Junxiang Zhang, Chongfu Huang |
Cartographic Representation of the Uncertainty Related to Natural Disaster Risk: Overview and State of the Art. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASDMKM ![In: Data Mining and Knowledge Management, Chinese Academy of Sciences Symposium, CASDMKM 2004, Beijing, China, July 12-14, 2004, Revised Papers, pp. 213-220, 2004, Springer, 3-540-23987-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
44 | D. Harrison McKnight, Chuck Kacmar, Vivek Choudhury |
Whoops...Did I Use the Wrong Concept to Predict E-Commerce Trust? Modeling the Risk-Related Effects of Trust versus Distrust Concepts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 36th Hawaii International Conference on System Sciences (HICSS-36 2003), CD-ROM / Abstracts Proceedings, January 6-9, 2003, Big Island, HI, USA, pp. 182, 2003, IEEE Computer Society, 0-7695-1874-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
44 | Jason R. W. Merrick, Johan René van Dorp, Thomas A. Mazzuchi, John R. Harrald |
Modeling risk in the dynamic environment of maritime transportation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the 33nd conference on Winter simulation, WSC 2001, Arlington, VA, USA, December 9-12, 2001, pp. 1090-1098, 2001, WSC, 0-7803-7309-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
43 | Jianhan Zhu, Jun Wang 0012, Ingemar J. Cox, Michael J. Taylor 0001 |
Risky business: modeling and exploiting uncertainty in information retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: Proceedings of the 32nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2009, Boston, MA, USA, July 19-23, 2009, pp. 99-106, 2009, ACM, 978-1-60558-483-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
probabilistic retrieval models, risk adjustment, language models, loss functions, probability ranking principle |
42 | Simon Tjoa, Stefan Jakoubi, Gerald Quirchmayr |
Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 179-186, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
risk-aware business process simulation, business continuity planning, business impact analysis, risk assessment |
42 | John C. Beachboard, Alma Cole, Mike Mellor, Steven Hernandez, Kregg Aytes, Nelson Massad |
A tentative proposal: improving information assurance risk analysis models for small- and medium-sized enterprises through adoption of an open development model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 194-196, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
risk management, risk assessment, risk analysis |
41 | Juha Sääskilahti, Mikko Särelä |
Risk analysis of host identity protocol: using risk Identification Method based on Value Chain Dynamics Toolkit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECSA Companion Volume ![In: Software Architecture, 4th European Conference, ECSA 2010, Copenhagen, Denmark, August 23-26, 2010. Companion Volume, pp. 213-220, 2010, ACM, 978-1-4503-0179-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
HIP, risk identification |
41 | Hanif D. Sherali, J. Cole Smith |
Two-stage stochastic hierarchical multiple risk problems: models and algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Math. Program. ![In: Math. Program. 120(2), pp. 403-427, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Risk threshold, Benders’ partitioning, Risk management, Reformulation-linearization technique (RLT) |
41 | Yegor Bugayenko 0001 |
Competitive Risk Identification Method for Distributed Teams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEAFOOD ![In: Software Engineering Approaches for Offshore and Outsourced Development - 3rd International Conference, SEAFOOD@TOOLS 2009, Zurich, Switzerland, July 2-3, 2009. Proceedings, pp. 96-101, 2009, Springer, 978-3-642-02986-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Risk Management, Distributed Team, Distributed Meetings, Risk Identification |
41 | Yudistira Asnar, Nicola Zannone |
Perceived risk assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008, pp. 59-64, 2008, ACM, 978-1-60558-321-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
subjective input, risk assessment, perceived risk |
41 | Wlodzimierz Ogryczak, M. Opolska-Rutkowska |
SSD Consistent Criteria and Coherent Risk Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
System Modelling and Optimization ![In: System Modeling and Optimization, Proceedings of the 22nd IFIP TC7 Conference held from July 18-22, 2005, in Turin, Italy, pp. 227-237, 2005, Springer, 0-387-32774-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
decisions under risk, mean-risk, stochastic dominance |
41 | James W. Freeman, T. C. Darr, Richard B. Neely |
Risk Assessment for Large Heterogeneous Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 44-53, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
security risk assessment process, large heterogeneous systems, C/sup 4/I systems, weapon systems, subsystem-level approaches, risk assessment resource allocation, hybrid top-down system-wide approach, guided top-down approach, approval-to-operate decision, security of data, decision makers |
41 | Frederick D. Garber, Abdelhamid Djouadi |
Bounds on the Bayes Classification Error Based on Pairwise Risk Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 10(2), pp. 281-288, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
Bayes classification error, pairwise risk functions, composite-hypothesis classification, pairwise Bayes risk, pattern recognition, pattern recognition, lower bounds, upper bounds, decision theory, Bayes methods, error statistics |
41 | Shujing Yan, Minghu Ha 0001, Xiankun Zhang, Chao Wang 0034 |
The Key Theorem of Learning Theory on Uncertainty Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (1) ![In: Advances in Neural Networks - ISNN 2009, 6th International Symposium on Neural Networks, ISNN 2009, Wuhan, China, May 26-29, 2009, Proceedings, Part I, pp. 699-706, 2009, Springer, 978-3-642-01506-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Uncertain measure, Expected risk functional, Empirical risk functional, Empirical risk minimization principle, the key theorem |
40 | Ka-man Lam, Ho-fung Leung |
Formalizing Risk Strategies and Risk Strategy Equilibrium in Agent Interactions Modeled as Infinitely Repeated Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRIMA ![In: Agent Computing and Multi-Agent Systems, 9th Pacific Rim International Workshop on Multi-Agents, PRIMA 2006, Guilin, China, August 7-8, 2006, Proceedings, pp. 138-149, 2006, Springer, 3-540-36707-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Martin Bouzaima, Thomas Burkhardt |
On the Notions and Properties of Risk and Risk Aversion in the Time Optimal Approach to Decision Making. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GfKl ![In: Advances in Data Analysis, Proceedings of the 30th Annual Conference of the Gesellschaft für Klassifikation e.V., Freie Universität Berlin, March 8-10, 2006, pp. 507-514, 2006, Springer, 978-3-540-70980-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Adam Krzemienowski |
Risk preference modeling with conditional average: an application to portfolio optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 165(1), pp. 67-95, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Quantile risk measures, Portfolio optimization, Preference modeling, Experimental analysis, Stochastic dominance |
40 | Hsin-Min Lu, Nina WanHsin Huang, Zhu Zhang, Tsai-Jyh Chen |
Identifying Firm-Specific Risk Statements in News Articles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings, pp. 42-53, 2009, Springer, 978-3-642-01392-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
epistemic modality, evidentiality, machine learning, Risk management |
40 | Lean Yu, Kin Keung Lai, Shouyang Wang |
An Evolutionary Programming Based Knowledge Ensemble Model for Business Risk Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Computing Applications in Business ![In: Soft Computing Applications in Business, pp. 57-72, 2008, Springer, 978-3-540-79004-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Business risk identification, knowledge ensemble, multivariate discriminant analysis, logit regression analysis, data mining, support vector machines, artificial neural network, soft computing, evolutionary programming |
40 | Janice Hill, Daniel Victor |
The Product Engineering Class in the Software Safety Risk Taxonomy for Building Safety-Critical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Software Engineering Conference ![In: 19th Australian Software Engineering Conference (ASWEC 2008), March 25-28, 2008, Perth, Australia, pp. 617-626, 2008, IEEE Computer Society, 978-0-7695-3100-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
software safety requirements, software safety risk taxonomy, legacy systems, safety-critical, safety case |
40 | Heinz Lothar Grob, Gereon Strauch, Christian Buddendick |
Applications for IT-Risk Management - Requirements and Practical Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 758-764, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
software market analysis, information security management, IT-Compliance, IT-risk management |
40 | Paul L. Bannerman |
Software Project Risk in the Public Sector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASWEC ![In: 18th Australian Software Engineering Conference (ASWEC 2007), April 10-13, 2007, Melbourne, Australia, pp. 389-398, 2007, IEEE Computer Society, 0-7695-2778-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
system development process, project management, methodology, risk management, Software projects |
40 | Kaiquan Shi, Bingxue Yao |
Function S-Rough Sets and Recognition of Financial Risk Laws. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RSKT ![In: Rough Sets and Knowledge Technology, First International Conference, RSKT 2006, Chongqing, China, July 24-26, 2006, Proceedings, pp. 247-253, 2006, Springer, 3-540-36297-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Function one direction S-rough set, financial risk law, law recognition model, law heredity, law mining, applications |
40 | Gyrd Brændeland, Ketil Stølen |
A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers, pp. 31-46, 2006, Springer, 978-3-540-75226-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, formal specification, component, risk analysis |
40 | Angel M. Gento-Municio, Maria Dolores Minambres, Alfonso Redondo, Maria Elena Perez |
QFD application in a service environment: A new approach in risk management in an university. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Oper. Res. ![In: Oper. Res. 1(2), pp. 115-132, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Design, Risk management, Service quality, QFD |
40 | Gencer Erdogan, Aida Omerovic, Marit K. Natvig, Isabelle C. R. Tardy |
Towards Transparent Real-Time Privacy Risk Assessment of Intelligent Transport Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![In: Risk Assessment and Risk-Driven Quality Assurance - 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, pp. 11-18, 2016, 978-3-319-57857-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
40 | Johannes Viehmann |
Business Driven ICT Risk Management in the Banking Domain with RACOMAT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![In: Risk Assessment and Risk-Driven Quality Assurance - 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, pp. 3-10, 2016, 978-3-319-57857-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
40 | Rudolf Ramler, Michael Felderer, Matthias Leitner |
A Lightweight Approach for Estimating Probability in Risk-Based Software Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![In: Risk Assessment and Risk-Driven Quality Assurance - 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, pp. 115-128, 2016, 978-3-319-57857-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
40 | Daniel Angermeier, Alexander Nieding, Jörn Eichler |
Supporting Risk Assessment with the Systematic Identification, Merging, and Validation of Security Goals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![In: Risk Assessment and Risk-Driven Quality Assurance - 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, pp. 82-95, 2016, 978-3-319-57857-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
40 | Gencer Erdogan, Ketil Stølen |
Design Decisions in the Development of a Graphical Language for Risk-Driven Security Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![In: Risk Assessment and Risk-Driven Quality Assurance - 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, pp. 99-114, 2016, 978-3-319-57857-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
40 | Pontus Johnson, Alexandre Vernotte, Dan Gorton, Mathias Ekstedt, Robert Lagerström |
Quantitative Information Security Risk Estimation Using Probabilistic Attack Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![In: Risk Assessment and Risk-Driven Quality Assurance - 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, pp. 37-52, 2016, 978-3-319-57857-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
40 | Michael Felderer, Florian Auer, Johannes Bergsmann |
Risk Management During Software Development: Results of a Survey in Software Houses from Germany, Austria and Switzerland. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![In: Risk Assessment and Risk-Driven Quality Assurance - 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, pp. 143-155, 2016, 978-3-319-57857-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
40 | Janno von Stülpnagel, Willy Chen |
Validation of IT Risk Assessments with Markov Logic Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![In: Risk Assessment and Risk-Driven Testing - Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers, pp. 34-48, 2015, Springer, 978-3-319-26415-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
40 | Johannes Viehmann, Frank Werner 0001 |
Risk Assessment and Security Testing of Large Scale Networked Systems with RACOMAT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![In: Risk Assessment and Risk-Driven Testing - Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers, pp. 3-17, 2015, Springer, 978-3-319-26415-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 37659 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|