|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 6388 occurrences of 3089 keywords
|
|
|
Results
Found 37669 publication records. Showing 37659 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
27 | Tsutomu Kojima, Toru Hasegawa, Munechika Misumi, Tsuyoshi Nakamura |
Risk analysis of software process measurements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Qual. J. ![In: Softw. Qual. J. 16(3), pp. 361-376, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Yore, Temodori, Statistical analysis, Software process, Risk assessment, Logistic model |
27 | Rajendra P. Srivastava, Glenn R. Shafer |
Belief-Function Formulas for Audit Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Classic Works of the Dempster-Shafer Theory of Belief Functions ![In: Classic Works of the Dempster-Shafer Theory of Belief Functions, pp. 577-618, 2008, Springer, 978-3-540-25381-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Audit risk, Planning model, Belief functions, Evaluation model |
27 | Valerio Grossi, Andrea Romei, Salvatore Ruggieri |
A Case Study in Sequential Pattern Mining for IT-Operational Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECML/PKDD (1) ![In: Machine Learning and Knowledge Discovery in Databases, European Conference, ECML/PKDD 2008, Antwerp, Belgium, September 15-19, 2008, Proceedings, Part I, pp. 424-439, 2008, Springer, 978-3-540-87478-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
pre and post-processing, operational risk, sequential pattern |
27 | Yasunobu Kino, Kazuhiko Tsuda, Tadashi Tsukahara |
Extraction of the Project Risk Knowledge on the Basis of a Project Plan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part II, pp. 1018-1025, 2008, Springer, 978-3-540-85564-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Assumption Analysis, Project Management, Risk Management, Project Planning |
27 | Kaijian He, Chi Xie, Kin Keung Lai |
Estimating Real Estate Value-at-Risk Using Wavelet Denoising and Time Series Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCS (2) ![In: Computational Science - ICCS 2008, 8th International Conference, Kraków, Poland, June 23-25, 2008, Proceedings, Part II, pp. 494-503, 2008, Springer, 978-3-540-69386-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Real Estate Market, ARMA-GARCH Model, Wavelet Analysis, Value at Risk |
27 | Kayo Sakamoto, Masanori Nakagawa |
A Computational Model of Risk-Context-Dependent Inductive Reasoning Based on a Support Vector Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LKR ![In: Large-Scale Knowledge Resources. Construction and Application, Third International Conference on Large-Scale Knowledge Resources, LKR 2008, Tokyo, Japan, March 3-5, 2008, Proceedings, pp. 295-309, 2008, Springer, 978-3-540-78158-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
corpus-based conceptual clustering, Support Vector Machines, context, natural language processing, risk, inductive reasoning |
27 | Chengpo Mu, X. J. Li, Houkuan Huang, Shengfeng Tian |
Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 35-48, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Online Risk Assessment, Alert Processing, Intrusion Response, Intrusion detection, D-S Evidence Theory |
27 | Athanasios N. Yannacopoulos, Costas Lambrinoudakis, Stefanos Gritzalis, Stylianos Z. Xanthopoulos, Sokratis K. Katsikas |
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 207-222, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Random Utility Models, Privacy, Risk Modeling, Insurance |
27 | Subhagata Chattopadhyay, P. Ray, H. S. Chen, M. B. Lee, H. C. Chiang |
Suicidal Risk Evaluation Using a Similarity-Based Classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADMA ![In: Advanced Data Mining and Applications, 4th International Conference, ADMA 2008, Chengdu, China, October 8-10, 2008. Proceedings, pp. 51-61, 2008, Springer, 978-3-540-88191-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Suicidality, Pierce’s Suicidal Intent Scale (SIS), Suicide risk assessment, Similarity-based approach, JAVA platform |
27 | Michael Doumpos, Constantin Zopounidis |
Model combination for credit risk assessment: A stacked generalization approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 151(1), pp. 289-306, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Classification, Model combination, Stacked generalization, Credit risk assessment |
27 | Akinori Abe, Hiromi Itoh Ozaku, Noriaki Kuwahara, Kiyoshi Kogure |
Scenario Violation in Nursing Activities: Nursing Risk Management from the Viewpoint of Chance Discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 11(8), pp. 799-809, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Nursing risk management, Scenario violation, Scenario, Abduction, Chance Discovery |
27 | Shi-Jay Chen, Shyi-Ming Chen |
Fuzzy risk analysis based on the ranking of generalized trapezoidal fuzzy numbers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 26(1), pp. 1-11, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Ranking methods, Distance method, Centroid points, Fuzzy risk analysis, Standard deviations |
27 | Mauricio Concha, Marcello Visconti, Hernán Astudillo |
Agile Commitments: Enhancing Business Risk Management in Agile Development Projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
XP ![In: Agile Processes in Software Engineering and Extreme Programming, 8th International Conference, XP 2007, Como, Italy, June 18-22, 2007, Proceedings, pp. 149-152, 2007, Springer, 978-3-540-73100-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
commitment management, risk management, Agile development |
27 | Beom Suk Jin, Sang Min Ko, Jae Seung Mun, Yong Gu Ji |
A Study for Usability Risk Level in Physical User Interface of Mobile Phone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (10) ![In: Usability and Internationalization. HCI and Culture, Second International Conference on Usability and Internationalization, UI-HCII 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part I, pp. 327-335, 2007, Springer, 978-3-540-73286-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Risk Level, Mobile Phone, Physical User Interface |
27 | Zhongqi Sheng, Masayuki Nakano, Shingo Kubo, Hiroshi Tsuji |
Risk Bias Externalization for Offshore Software Outsourcing by Conjoint Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JSAI ![In: New Frontiers in Artificial Intelligence, JSAI 2007 Conference and Workshops, Miyazaki, Japan, June 18-22, 2007, Revised Selected Papers, pp. 255-268, 2007, Springer, 978-3-540-78196-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Risk Bias, Conjoint Analysis, Offshore Outsourcing |
27 | Feng Wang, Xiaoshuan Zhang, Cheng Tan, Chuanli Zhuang, Zetian Fu |
Decision Support System for Risk Management in Aquatic Products Export Trade, China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCTA ![In: Computer And Computing Technologies In Agriculture, Volume I, First IFIP TC 12 International Conference on Computer and Computing Technologies in Agriculture (CCTA 2007), Wuyishan, China, August 18-20, 2007, pp. 371-378, 2007, Springer, 978-0-387-77250-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
aquatic products, export trade, decision support system, risk management, China |
27 | Piotr Lipinski, Katarzyna Winczura, Joanna Wojcik |
Building Risk-Optimal Portfolio Using Evolutionary Strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EvoWorkshops ![In: Applications of Evolutinary Computing, EvoWorkshops 2007: EvoCoMnet, EvoFIN, EvoIASP,EvoINTERACTION, EvoMUSART, EvoSTOC and EvoTransLog, Valencia, Spain, April11-13, 2007, Proceedings., pp. 208-217, 2007, Springer, 978-3-540-71804-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Risk Measures, Warsaw Stock Exchange, Evolutionary Computation, Evolution Strategies, Portfolio Optimization, Financial Time Series |
27 | Kayo Sakamoto, Masanori Nakagawa |
Risk Context Effects in Inductive Reasoning: An Experimental and Computational Modeling Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONTEXT ![In: Modeling and Using Context, 6th International and Interdisciplinary Conference, CONTEXT 2007, Roskilde, Denmark, August 20-24, 2007, Proceedings, pp. 425-438, 2007, Springer, 978-3-540-74254-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
corpus-based conceptual clustering, Support Vector Machines, natural language processing, categorization, risk, inductive reasoning |
27 | Guoqiang Liu, Zongfang Zhou, Xinmin Song, Yong Shi 0001 |
A Fuzzy Comprehensive Evaluation Method on Firms' Credit Sale Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (3) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part III, pp. 1062-1068, 2007, Springer, 978-3-540-72587-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Credit sale risk, FCEM, credit sale grades |
27 | Chang Yi, Chongfu Huang, Yaozhong Pan |
Flood Disaster Risk Analysis for Songhua River Basin Based on Theory of Information Diffusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (3) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part III, pp. 1069-1076, 2007, Springer, 978-3-540-72587-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Flood Disaster, Songhua River Basin, Risk Analysis, Information Diffusion |
27 | Arunabha Mukhopadhyay, Binay Bhushan, Debashis Saha, Ambuj Mahanti |
E-Risk Management through Self Insurance: An Option Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 158, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
e-risk, option model, self-insurance, e-commerce, security breach |
27 | Suleyman Kondakci |
A Remote IT Security Evaluation Scheme: A Proactive Approach to Risk Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 93-102, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Proactive IA, remote assessment, risk analysis and security management, Verification and validation of security, security protocol, security evaluation |
27 | Yaqin Wu, Kai Wang, Maoguang Wang |
Study on Compound Genetic and Back Propagation Algorithm for Prediction of Coal and Gas Outburst Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Information Processing ![In: Intelligent Information Processing III, IFIP TC12 International Conference on Intelligent Information Processing (IIP 2006), September 20-23, Adelaide, Australia, pp. 233-241, 2006, Springer, 978-0-387-44639-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
outburst risk prediction, compound GA-BP algorithm, artificial neural network |
27 | Mahdi Seify |
New Method for Risk Management in CRM Security Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA, pp. 440-445, 2006, IEEE Computer Society, 0-7695-2497-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Information Security Management System (ISMS), Data management, Risk Management, Customer Relationship Management (CRM) |
27 | Howard Chivers |
Information Modeling for Automated Risk Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, pp. 228-239, 2006, Springer, 3-540-47820-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, model, communication, information, risk, service-oriented, threat |
27 | Kohl Witmer, Rhoda Baggs Koss, Tamas Kasza |
A method for risk mitigation during the requirements phase for multimedia software systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGDOC ![In: Proceedings of the 24th Annual International Conference on Design of Communication, SIGDOC 2006, Myrtle Beach, SC, USA, October 18-20, 2006, pp. 19-22, 2006, ACM, 1-59593-523-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
multimedia requirements, risk mitigation |
27 | Robert J. Walker, Reid Holmes, Ian Hedgeland, Puneet Kapur, Andrew Smith |
A lightweight approach to technical risk estimation via probabilistic impact analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSR ![In: Proceedings of the 2006 International Workshop on Mining Software Repositories, MSR 2006, Shanghai, China, May 22-23, 2006, pp. 98-104, 2006, ACM, 1-59593-397-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
probabilistic impact analysis, technical risk estimation, decision support, revision history |
27 | Mehmet Sahinoglu |
Security Meter: A Practical Decision-Tree Model to Quantify Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(3), pp. 18-24, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
measuring risk, qualitative design, security meter, threats, quantify |
27 | Sunder Kekre, Uday S. Rao, Samarth Sarthi, Jinxin Yi |
Risk-Based Integration of Strategic and Tactical Capacity Planning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 132(1-4), pp. 85-108, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
profit-risk frontier, capacity, production planning |
27 | Traian Marius Truta, Farshad Fotouhi, Daniel C. Barth-Jones |
Assessing global disclosure risk in masked microdata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004, pp. 85-93, 2004, ACM, 1-58113-968-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
information loss and microaggregation, data privacy, microdata, disclosure risk, statistical disclosure |
27 | Min Jiang, Zhiqing Meng, Qiying Hu |
A Neural Network Model on Solving Multiobjective Conditional Value-at-Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2004, International Symposium on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings, Part II, pp. 1000-1006, 2004, Springer, 3-540-22843-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
CVaR, Pareto efficient solutions, Loss functions, Credit risk |
27 | Jason I. Hong, Jennifer D. Ng, Scott Lederer, James A. Landay |
Privacy risk models for designing privacy-sensitive ubiquitous computing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Conference on Designing Interactive Systems ![In: Proceedings of the Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, Cambridge, MA, USA, August 1-4, 2004, pp. 91-100, 2004, ACM, 1-58113-787-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy risk model, privacy, ubiquitous computing |
27 | Sergio Scandizzo |
Connectivity and the measurement of operational risk: an input-output approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 7(8), pp. 516-525, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Input-output models, Operational risk measurement, Complexity, Connectivity |
27 | Francesc Sebé, Josep Domingo-Ferrer, Josep Maria Mateo-Sanz, Vicenç Torra |
Post-Masking Optimization of the Tradeoff between Information Loss and Disclosure Risk in Masked Microdata Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inference Control in Statistical Databases ![In: Inference Control in Statistical Databases, From Theory to Practice, pp. 163-171, 2002, Springer, 3-540-43614-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Microdata masking, Post-masking optimization, Synthetic microdata generation, Information loss, Disclosure risk |
27 | Mark Elliot |
Integrating File and Record Level Disclosure Risk Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inference Control in Statistical Databases ![In: Inference Control in Statistical Databases, From Theory to Practice, pp. 126-134, 2002, Springer, 3-540-43614-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Disclosure Risk Assessment, Data Intrusion Simulation, Special Uniques, Microdata |
27 | Josep Domingo-Ferrer, Anna Oganian, Vicenç Torra |
Information-Theoretic Disclosure Risk Measures in Statistical Disclosure Control of Tabular Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSDBM ![In: Proceedings of the 14th International Conference on Scientific and Statistical Database Management, July 24-26, 2002, Edinburgh, Scotland, UK, pp. 227-231, 2002, IEEE Computer Society, 0-7695-1632-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Tabular data protection, Information theory, Disclosure risk, Statistical database protection |
27 | Kok Lay Teo, X. Q. Yang |
Portfolio Selection Problem with Minimax Type Risk Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 101(1-4), pp. 333-349, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
minimax risk measure, bi-criteria program, capital asset pricing model, portfolio optimization |
27 | Kenji Itoh, Toshinori Yamaguchi, John Paulin Hansen, Finn R. Nielsen |
Risk Analysis of Ship Navigation by Use of Cognitive Simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Technol. Work. ![In: Cogn. Technol. Work. 3(1), pp. 4-21, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Cognitive simulation, Ship navigation, Cognitive modelling, Risk analysis, Human error, Cognitive task analysis |
27 | Elaine J. Weyuker |
Difficulties Measuring Software Risk in an Industrial Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 1-4 July 2001, Göteborg, Sweden, Proceedings, pp. 15-24, 2001, IEEE Computer Society, 0-7695-1101-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
cost of failure, software testing, operational profile, Software risk |
27 | Norman F. Schneidewind |
Investigation of the Risk to Software Reliability and Maintainability of Requirements Changes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 2001 International Conference on Software Maintenance, ICSM 2001, Florence, Italy, November 6-10, 2001, pp. 127-, 2001, IEEE Computer Society, 0-7695-1189-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
reliability, risk assessment, maintainability |
27 | Norman F. Schneidewind |
Measuring and Evaluating Maintenance Process Using Reliability, Risk, and Test Metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 25(6), pp. 769-781, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Maintenance process stability, product and process integration, reliability risk |
27 | M. Jayakumar 0001, Ravi N. Banavar |
Risk-Sensitive Filters for Recursive Estimation of Motion From Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 20(6), pp. 659-666, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Risk-sensitive estimation, vision, motion parameters |
27 | Norman F. Schneidewind |
Measuring and evaluating maintenance process using reliability, risk, and test metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 1997 International Conference on Software Maintenance (ICSM '97), 1-3 October 1997, Bari, Italy, Proceedings, pp. 232-, 1997, IEEE Computer Society, 0-8186-8013-X. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
maintenance process measurement, deployment risk, unified approach, maintenance actions, national visibility, NASA Space Shuttle, software maintenance, safety critical application, test metrics, test effort |
27 | Martin Gfeller |
A Risk Management Prototype Using Object-Oriented APL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APL ![In: Proceedings of the International Conference on APL 1994: The Language and Its Applications, Antwerp, Belgium, September 11-15, 1994., pp. 57-67, 1994, ACM, 0-89791-675-1. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
OO analysis and design (OOA/OOD), OO/APL, dyalog APL, financial risk management, object-oriented technologies (OOT), APL, application frameworks, OO programming (OOP) |
27 | Kaijian He, Kin Keung Lai, Sy-Ming Guu, Jinlong Zhang |
A Wavelet Based Multi Scale VaR Model for Agricultural Market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MCO ![In: Modelling, Computation and Optimization in Information Systems and Management Sciences, Second International Conference, MCO 2008, Metz, France - Luxembourg, September 8-10, 2008. Proceedings, pp. 429-438, 2008, Springer, 978-3-540-87476-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
financial, wavelets and fractals, risk management, time series analysis, Value at Risk |
27 | Jibin Ma, Huiling Gu, Yonghao Sun, Xujie Hu |
Risk Assessment Model on the Internal Corporate Governance Based on the SPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 272-276, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | M. M. Zahidul Islam, Moshiur Bhuiyan, Aneesh Krishna, Aditya Ghose |
An Integrated Approach to Managing Business Process Risk Using Rich Organizational Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (1) ![In: On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I, pp. 273-285, 2009, Springer, 978-3-642-05147-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Mira Kajko-Mattsson, Jan Lundholm, Jonas Norrby |
Industrial Opinion on the Effectiveness of Risk Management Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 1, pp. 642-643, 2009, IEEE Computer Society, 978-0-7695-3726-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Xiaoying Bai, Ron S. Kenett |
Risk-Based Adaptive Group Testing of Semantic Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2, pp. 485-490, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Qian Chen, Jinlin Li, Lun Ran |
A Frame of Operational Risk Management System Based on Case-Based Reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, Moscow, Russia, 23-25 January 2009, pp. 549-553, 2009, IEEE Computer Society, 978-0-7695-3543-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Shaomei Yang, Junyan Zhao |
Study on Commercial Banks Credit Risk Based on AGA and Camel Rating System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, Moscow, Russia, 23-25 January 2009, pp. 562-565, 2009, IEEE Computer Society, 978-0-7695-3543-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mohamed Ismail, Quentin Jones |
Social Inference Risk Modeling in Mobile and Social Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 125-132, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Vladimir Blagojevic, Wim Codenie, Jessie Dedecker, Nicolás González-Deleito, Jeroen Deleu, Nick Boucart |
Murphy: A Web 2.0 approach for proactive risk management in hardware/software co-design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE Companion ![In: 31st International Conference on Software Engineering, ICSE 2009, May 16-24, 2009, Vancouver, Canada, Companion Volume, pp. 191-194, 2009, IEEE, 978-1-4244-3494-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Minas A. Karaolis, Joseph A. Moutiris, Constantinos S. Pattichis |
Assessment of the risk of coronary heart event based on data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIBE ![In: Proceedings of the 8th IEEE International Conference on Bioinformatics and Bioengineering, BIBE 2008, October 8-10, 2008, Athens, Greece, pp. 1-5, 2008, IEEE, 978-1-4244-2845-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Ajith Abraham |
Nature Inspired Online Real Risk Assessment Models for Security Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroISI ![In: Intelligence and Security Informatics, First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings, pp. 3, 2008, Springer, 978-3-540-89899-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Kjetil Haslum, Ajith Abraham, Svein J. Knapskog |
HiNFRA: Hierarchical Neuro-Fuzzy Learning for Online Risk Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia International Conference on Modelling and Simulation ![In: Second Asia International Conference on Modelling and Simulation, AMS 2008, Kuala Lumpur, Malaysia, May 13-15, 2008, pp. 631-636, 2008, IEEE Computer Society, 978-0-7695-3136-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Dah-Chuan Gong, Wei-Cheng Hsiao, Pei-Shun Ho |
Information Integration Architecture of Risk Management for RoHS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (2) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 2: Software Engineering, December 12-14, 2008, Wuhan, China, pp. 512-515, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | He Qi-zhi |
Risk Measure of Shibor Based on VAR and EGARCH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (5) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 5: E-learning and Knowledge Management / Socially Informed and Instructinal Design / Learning Systems Platforms and Architectures / Modeling and Representation / Other Applications , December 12-14, 2008, Wuhan, China, pp. 1333-1336, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Simone Westerfeld, Hans-Dieter Zimmermann |
E-Business Tools for Active Credit Risk Management - A Market Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 301, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Simon Tjoa, Thomas Mück |
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 377, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Yanwen Liu, Qian Sun |
The Evaluation and Forecasting of Investment Risk of High-Tech SME Based on Fuzzy Comprehensive Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (3) ![In: Fifth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 18-20 October 2008, Jinan, Shandong, China, Proceedings, Volume 3, pp. 654-658, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Ping Zhuang, Yanxi Li 0002, Haiyan Hou, Tianpeng Qu |
Visualization of Current Core Research Groups of Enterprise Risk Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (4) ![In: Fifth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 18-20 October 2008, Jinan, Shandong, China, Proceedings, Volume 4, pp. 310-314, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Wael Sharmak, Sven-Eric Schapke, Raimar J. Scherer |
Risk Treatment Templates for Configurable Reference Modeling in the Construction Industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Virtual Enterprises and Collaborative Networks ![In: Pervasive Collaborative Networks, IFIP TC 5 WG 5.5 Ninth Working Conference on Virtual Enterprises, September 8-10, 2008, Poznan, Poland, pp. 233-240, 2008, Springer, 978-0-387-84836-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Luís M. Silva, Mark J. Embrechts, Jorge M. Santos, Joaquim Marques de Sá |
The Influence of the Risk Functional in Data Classification with MLPs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICANN (1) ![In: Artificial Neural Networks - ICANN 2008 , 18th International Conference, Prague, Czech Republic, September 3-6, 2008, Proceedings, Part I, pp. 185-194, 2008, Springer, 978-3-540-87535-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Lizzie Coles-Kemp, Richard E. Overill |
On the role of the Facilitator in information security risk assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(2), pp. 143-148, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Xujin Chen, Jie Hu 0009, Xiaodong Hu 0001 |
On the Minimum Risk-Sum Path Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESCAPE ![In: Combinatorics, Algorithms, Probabilistic and Experimental Methodologies, First International Symposium, ESCAPE 2007, Hangzhou, China, April 7-9, 2007, Revised Selected Papers, pp. 175-185, 2007, Springer, 978-3-540-74449-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Len Bass, Robert L. Nord, William Wood, David Zubrow |
Risk Themes Discovered through Architecture Evaluations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WICSA ![In: Sixth Working IEEE / IFIP Conference on Software Architecture (WICSA 2007), 6-9 January 2005, Mumbai, Maharashtra, India, pp. 1, 2007, IEEE Computer Society, 978-0-7695-2744-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Gang Liu, Jiao Zhang, Wangmin Zhang, Xian Zhou |
Risk Assessment of Virtual Enterprise Based on the Fuzzy Comprehensive Evaluation Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E (1) ![In: Integration and Innovation Orient to E-Society, Volume 1, Seventh IFIP International Conference on e-Business, e-Services, and e-Society (I3E2007), October 10-12, Wuhan, China, pp. 58-66, 2007, Springer, 978-0-387-75465-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Jayson P. Vucovich, Robert B. Stone, Xiaoqing Frank Liu, Irem Y. Tumer |
Risk Assessment in Early Software Design Based on the Software Function-Failure Design Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, Beijing, China, July 24-27, 2007. Volume 1, pp. 405-412, 2007, IEEE Computer Society, 978-0-7695-2870-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Dennis P. Groth, Matthew P. Hottell |
How Students Perceive Risk: A Study of Senior Capstone Project Teams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSEE&T ![In: 20th Conference on Software Engineering Education and Training (CSEE&T 2007), 3-5 July 2007, Dublin, Ireland, pp. 45-54, 2007, IEEE Computer Society, 0-7695-2893-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Yuming Zhu, Keith W. Hipel |
Life span risk management in brownfield redevelopment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Montréal, Canada, 7-10 October 2007, pp. 4052-4056, 2007, IEEE, 978-1-4244-0990-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Zhuo Tang, Ruixuan Li 0001, Zhengding Lu, Zhumu Wen |
Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, pp. 277-290, 2007, Springer, 978-3-540-77534-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Zhen Cao, Zhi Guan, Zhong Chen 0001, Jian-bin Hu, Liyong Tang |
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, pp. 129-144, 2007, Springer, 978-3-540-72159-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Ram Dantu, Prakash Kolan, Robert Akl, Kall Loper |
Classification of Attributes and Behavior in Risk Management Using Bayesian Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings, pp. 71-74, 2007, IEEE, 1-4244-1329-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Ye Yang, Barry W. Boehm, Dan Wu |
COCOTS Risk Analyzer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCBSS ![In: Fifth International Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems, ICCBSS 2006, 13-16 February 2006, Orlando, Florida, USA, Proceedings, pp. 144-151, 2006, IEEE Computer Society, 0-7695-2515-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Ching Lin, Vijay Varadharajan |
Trust Based Risk Management for Distributed System Security - A New Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 6-13, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Eyal Even-Dar, Michael J. Kearns, Jennifer Wortman |
Risk-Sensitive Online Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ALT ![In: Algorithmic Learning Theory, 17th International Conference, ALT 2006, Barcelona, Spain, October 7-10, 2006, Proceedings, pp. 199-213, 2006, Springer, 3-540-46649-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | M. S. Camara, Lyes Kermad, Abderrahman El Mhamedi |
Risk Prediction in ERP Projects: Classification of Reengineered Business Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIMCA/IAWTIC ![In: 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November - 1 December 2006, Sydney, Australia, pp. 213, 2006, IEEE Computer Society, 0-7695-2731-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Shi An, Jian Sun 0004, Yan Wang |
Discrete-Time Risk Measures on General Probability Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICIC (2) ![In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August - 1 September 2006, Beijing, China, pp. 490-493, 2006, IEEE Computer Society, 0-7695-2616-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Wei-Hua Chen, Quanyuan Jiang, Zhiyong Wang, Yijia Cao |
Risk Assessment of Cascading Outages in Power Systems Using Fuzzy Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28 - June 1, 2006, Proceedings, Part II, pp. 1422-1427, 2006, Springer, 3-540-34437-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Ida Hogganvik, Ketil Stølen |
A Graphical Approach to Risk Identification, Motivated by Empirical Investigations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoDELS ![In: Model Driven Engineering Languages and Systems, 9th International Conference, MoDELS 2006, Genova, Italy, October 1-6, 2006, Proceedings, pp. 574-588, 2006, Springer, 3-540-45772-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Kin Keung Lai, Lean Yu, Shouyang Wang, Ligang Zhou |
Credit Risk Analysis Using a Reliability-Based Neural Network Ensemble Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICANN (2) ![In: Artificial Neural Networks - ICANN 2006, 16th International Conference, Athens, Greece, September 10-14, 2006. Proceedings, Part II, pp. 682-690, 2006, Springer, 3-540-38871-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Colin Atkinson 0001, Christian Cuske, Tilo Dickopp |
Concepts for an Ontology-centric Technology Risk Management Architecture in the Banking Industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC Workshops ![In: Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 16-20 October 2006, Hong Kong, China, Workshops, pp. 21, 2006, IEEE Computer Society, 0-7695-2743-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | James W. Phegley, Kyle Perkins, Lalit Gupta, L. F. Hughes |
Multicategory Prediction of Multifactorial Diseases Through Risk Factor Fusion and Rank-Sum Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part A ![In: IEEE Trans. Syst. Man Cybern. Part A 35(5), pp. 718-726, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Peter C. Chapin, Christian Skalka, Xiaoyang Sean Wang |
Risk assessment in distributed authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005, pp. 33-42, 2005, ACM, 1-59593-231-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
trust management logic, distributed authorization |
27 | Hamed Nejad |
Scenario planning for simulation-based probabilistic risk assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the 37th Winter Simulation Conference, Orlando, FL, USA, December 4-7, 2005, pp. 3, 2005, IEEE Computer Society, 0-7803-9519-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
27 | Petr Berka, Vladimír Las, Marie Tomecková |
AtherEx: An Expert System for Atherosclerosis Risk Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIME ![In: Artificial Intelligence in Medicine, 10th Conference on Artificial Intelligence in Medicine, AIME 2005, Aberdeen, UK, July 23-27, 2005, Proceedings, pp. 79-88, 2005, Springer, 3-540-27831-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | In-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Dongho Won |
A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 92-101, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Lee, Hoh Peter In |
Security Risk Vector for Quantitative Asset Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 274-283, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Roshan S. Gaonkar, Nukala Viswanadham |
A Conceptual and Analytical Framework for the Management of Risk in Supply Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: Proceedings of the 2004 IEEE International Conference on Robotics and Automation, ICRA 2004, April 26 - May 1, 2004, New Orleans, LA, USA, pp. 2699-2704, 2004, IEEE. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Bjørn Axel Gran, Rune Fredriksen, Atoosa P.-J. Thunem |
An Approach for Model-Based Risk Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 23rd International Conference, SAFECOMP 2004, Potsdam, Germany, September 21-24, 2004, Proceedings, pp. 311-324, 2004, Springer, 3-540-23176-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo Moon, Yoon-Jung Jung, In-Jung Kim |
A Security Risk Analysis Model for Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaSim ![In: Systems Modeling and Simulation: Theory and Applications, Third Asian Simulation Conference, AsiaSim 2004, Jeju Island, Korea, October 4-6, 2004, Revised Selected Papers, pp. 505-513, 2004, Springer, 3-540-24477-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Mauricio Featherman, John D. Wells |
The Intangibility of E-Services: Effects on Artificiality, Perceived Risk, and Adoption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Susan A. Sherer |
Managing Risk beyond the Control of IS Managers: The Role of Business Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Jae-Hong Eom, Seong-Bae Park, Byoung-Tak Zhang |
Genetic Mining of DNA Sequence Structures for Effective Classification of the Risk Types of Human Papillomavirus (HPV). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONIP ![In: Neural Information Processing, 11th International Conference, ICONIP 2004, Calcutta, India, November 22-25, 2004, Proceedings, pp. 1334-1343, 2004, Springer, 3-540-23931-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Fred J. Heemstra, Rob J. Kusters, Huibert de Man |
Guidelines for Managing Bias in Project Risk Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISESE ![In: 2003 International Symposium on Empirical Software Engineering (ISESE 2003), 30 September - 1 October 2003. Rome, Italy, pp. 272-280, 2003, IEEE Computer Society, 0-7695-2002-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Tianjian Wang, Ahmed E. Hassan, Ajith Guedem, Walid Abdelmoez, Katerina Goseva-Popstojanova, Hany H. Ammar |
Architectural Level Risk Assessment Tool Based on UML Specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: Proceedings of the 25th International Conference on Software Engineering, May 3-10, 2003, Portland, Oregon, USA, pp. 808-809, 2003, IEEE Computer Society, 0-7695-1877-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Traian Marius Truta, Farshad Fotouhi, Daniel C. Barth-Jones |
Disclosure Risk Measures for Microdata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSDBM ![In: Proceedings of the 15th International Conference on Scientific and Statistical Database Management (SSDBM 2003), 9-11 July 2003, Cambridge, MA, USA, pp. 15-22, 2003, IEEE Computer Society, 0-7695-1964-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Peter T. L. Popkowski Leszczyc, Harry J. P. Timmermans |
Unconditional and conditional competing risk models of activity duration and activity sequencing decisions: An empirical comparison. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Geogr. Syst. ![In: J. Geogr. Syst. 4(2), pp. 157-170, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Holger Doernemann |
Tool-Based Risk Management Made Practical. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE ![In: 10th Anniversary IEEE Joint International Conference on Requirements Engineering (RE 2002), 9-13 September 2002, Essen, Germany, pp. 192, 2002, IEEE Computer Society, 0-7695-1465-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 37659 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|