|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 6388 occurrences of 3089 keywords
|
|
|
Results
Found 37669 publication records. Showing 37659 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
22 | Münevver Köküer, Raouf N. Gorgui-Naguib, Peter Jancovic, H. B. Younghusband, R. C. Green |
Cancer Risk Analysis in Families With Hereditary Nonpolyposis Colorectal Cancer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Technol. Biomed. ![In: IEEE Trans. Inf. Technol. Biomed. 10(3), pp. 581-587, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Yong Hu 0002, Juhua Chen, Zhenbang Rong, Mei Liu, Kang Xie |
A Neural Networks Approach for Software Risk Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM Workshops ![In: Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 18-22 December 2006, Hong Kong, China, pp. 722-725, 2006, IEEE Computer Society, 0-7695-2702-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Karim Djemame, Iain Gourlay, James Padgett, Georg Birkenheuer, Matthias Hovestadt, Odej Kao, Kerstin Voß |
Introducing Risk Management into the Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Science ![In: Second International Conference on e-Science and Grid Technologies (e-Science 2006), 4-6 December 2006, Amsterdam, The Netherlands, pp. 28, 2006, IEEE Computer Society, 0-7695-2734-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Sabine Delaître |
Risk Management approach on identity theft in biometric systems context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 982, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Ping Li 0037, Hou-Sheng Chen, Guangdong Huang, Xiao-Jun Shi |
On Portfolio's Default-Risk-Adjusted Duration and Value: Model and Algorithm Based on Copulas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WINE ![In: Internet and Network Economics, Second International Workshop, WINE 2006, Patras, Greece, December 15-17, 2006, Proceedings, pp. 214-224, 2006, Springer, 3-540-68138-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Michael B. Gordy, Sandeep Juneja 0001 |
Efficient simulation for risk measurement in portfolio of CDOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the Winter Simulation Conference WSC 2006, Monterey, California, USA, December 3-6, 2006, pp. 749-756, 2006, IEEE Computer Society, 1-4244-0501-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Soumyadip Ghosh, Sandeep Juneja 0001 |
Computing worst-case tail probabilities in credit risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the Winter Simulation Conference WSC 2006, Monterey, California, USA, December 3-6, 2006, pp. 246-254, 2006, IEEE Computer Society, 1-4244-0501-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Selena Davis, Syed Sibte Raza Abidi |
Adaptive Patient Education Framework Featuring Personalized Cardiovascular Risk Management Interventions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AH ![In: Adaptive Hypermedia and Adaptive Web-Based Systems, 4th International Conference, AH 2006, Dublin, Ireland, June 21-23, 2006, Proceedings, pp. 264-268, 2006, Springer, 3-540-34696-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Wei-Hua Chen, Quanyuan Jiang, Yijia Cao |
Low Voltage Risk Assessment in Power System Using Neural Network Ensemble. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28 - June 1, 2006, Proceedings, Part II, pp. 1416-1421, 2006, Springer, 3-540-34437-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Wei Sun, Chenguang Yang |
Credit Risk Assessment in Commercial Banks Based on Multi-layer SVM Classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (2) ![In: Computational Intelligence, International Conference on Intelligent Computing, ICIC 2006, Kunming, China, August 16-19, 2006. Proceedings, Part II, pp. 778-785, 2006, Springer, 3-540-37274-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Zhihong Xu, Xin Zheng 0005, Ping Guo 0002 |
Empirically Validating Software Metrics for Risk Prediction Based on Intelligent Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISDA (1) ![In: Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), October 16-18, 2006, Jinan, China, pp. 1049-1054, 2006, IEEE Computer Society, 0-7695-2528-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Cristine Martins Gomes de Gusmão, Hermano Perrelli de Moura |
Multiple Risk Management Process Supported by Ontology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PROFES ![In: Product-Focused Software Process Improvement, 7th International Conference, PROFES 2006, Amsterdam, The Netherlands, June 12-14, 2006, Proceedings, pp. 462-465, 2006, Springer, 3-540-34682-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Virgilijus Sakalauskas, Dalia Kriksciuniene |
Short-Term Investment Risk Measurement Using VaR and CVaR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (4) ![In: Computational Science - ICCS 2006, 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part IV, pp. 316-323, 2006, Springer, 3-540-34385-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Rashid Hafeez Khokhar, David A. Bell, Jiwen Guan, Qingxiang Wu |
Risk Assessment of E-Commerce Projects Using Evidential Reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD ![In: Fuzzy Systems and Knowledge Discovery, Third International Conference, FSKD 2006, Xi'an, China, September 24-28, 2006, Proceedings, pp. 621-630, 2006, Springer, 3-540-45916-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Financial Engineering, Software Performance Evaluation, Dempster-Shafer Theory, Evidential Reasoning, E-Commerce Application |
22 | Tomohiro Nakagawa, Motoharu Miyake, Yu Inamura, Hiroshi Inamura |
Service Discovery with Denial-of-Service Attack Resistance using Risk Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 138-146, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Anthony Man-Cho So, Jiawei Zhang 0006, Yinyu Ye 0001 |
Stochastic Combinatorial Optimization with Controllable Risk Aversion Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPROX-RANDOM ![In: Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 9th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, APPROX 2006 and 10th International Workshop on Randomization and Computation, RANDOM 2006, Barcelona, Spain, August 28-30 2006, Proceedings, pp. 224-235, 2006, Springer, 3-540-38044-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Kerstin Voß |
Risk-aware Migrations For Prepossessing SLAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: 2006 International Conference on Networking and Services (ICNS 2006), 16-21 July 2006, Silicon Valley, California, USA, pp. 68, 2006, IEEE Computer Society, 0-7695-2622-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Edward M. Hadley, Erika R. E. Denton, Reyer Zwiggelaar |
Mammographic Risk Assessment Based on Anatomical Linear Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Mammography / IWDM ![In: Digital Mammography, 8th International Workshop, IWDM 2006, Manchester, UK, June 18-21, 2006, Proceedings, pp. 626-633, 2006, Springer, 3-540-35625-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Matthias Hovestadt, Odej Kao, Kerstin Voß |
The First Step of Introducing Risk Management for Prepossessing SLAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2006 IEEE International Conference on Services Computing (SCC 2006), 18-22 September 2006, Chicago, Illinois, USA, pp. 36-43, 2006, IEEE Computer Society, 0-7695-2670-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Hans-Jakob Lüthi, Jörg Doege |
Convex risk measures for portfolio optimization and concepts of flexibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Math. Program. ![In: Math. Program. 104(2-3), pp. 541-559, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (1991) 90A46, 52A41, 90A09, 90C25, 90C31 |
22 | Michael Szydlo |
Risk Assurance for Hedge Funds Using Zero Knowledge Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 156-171, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Abdullah J. Al-Shehab, Robert T. Hughes, Graham Winstanley |
Facilitating Organisational Learning Through Causal Mapping Techniques in IS/IT Project Risk Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wissensmanagement (LNCS Volume) ![In: Professional Knowledge Management, Third Biennial Conference, WM 2005, Kaiserslautern, Germany, April 10-13, 2005, Revised Selected Papers, pp. 145-154, 2005, Springer, 3-540-30465-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Shigeaki Harada, Eiji Takimoto, Akira Maruoka |
Online Allocation with Risk Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ALT ![In: Algorithmic Learning Theory, 16th International Conference, ALT 2005, Singapore, October 8-11, 2005, Proceedings, pp. 343-355, 2005, Springer, 3-540-29242-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Takahira Yamaguchi |
Risk Management Systems with Intelligent Data Analysis - Overview. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JSAI Workshops ![In: New Frontiers in Artificial Intelligence, Joint JSAI 2005 Workshop Post-Proceedings, pp. 423-424, 2005, Springer, 3-540-35470-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | William J. Morokoff |
Simulation of risk and return profiles for portfolios of CDO tranches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the 37th Winter Simulation Conference, Orlando, FL, USA, December 4-7, 2005, pp. 1844-1848, 2005, IEEE Computer Society, 0-7803-9519-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Haiquan Li, Jinyan Li 0001, Limsoon Wong, Mengling Feng, Yap-Peng Tan |
Relative risk and odds ratio: a data mining perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 13-15, 2005, Baltimore, Maryland, USA, pp. 368-377, 2005, ACM, 1-59593-062-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Fredrik Vraalsen, Folker den Braber, Mass Soldal Lund, Ketil Stølen |
The CORAS Tool for Security Risk Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings, pp. 402-405, 2005, Springer, 3-540-26042-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Jacek Sliwerski, Thomas Zimmermann 0001, Andreas Zeller |
HATARI: raising risk awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC/SIGSOFT FSE ![In: Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2005, Lisbon, Portugal, September 5-9, 2005, pp. 107-110, 2005, ACM, 1-59593-014-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Zhengqiang Liang, Weisong Shi |
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | David E. Newman, Bertrand Nkei, Benjamin A. Carreras, Ian Dobson, Vickie E. Lynch, Paul Gradney |
Risk Assessment in Complex Interacting Infrastructure Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Grazyna Trzpiot, Alicja Ganczarek |
Value at Risk Using the Principal Components Analysis on the Polish Power Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GfKl ![In: From Data and Information Analysis to Knowledge Engineering, Proceedings of the 29th Annual Conference of the Gesellschaft für Klassifikation e.V., University of Magdeburg, March 9-11, 2005, pp. 550-557, 2005, Springer, 978-3-540-31313-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Vaibhava Goel, Shankar Kumar, William Byrne |
Segmental minimum Bayes-risk decoding for automatic speech recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Speech Audio Process. ![In: IEEE Trans. Speech Audio Process. 12(3), pp. 234-249, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Jyrki Kontio, Jani-Pekka Jokinen, Esa Rosendahl |
Visualizing and Formalizing Risk Information: An Experiment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE METRICS ![In: 10th IEEE International Software Metrics Symposium (METRICS 2004), 11-17 September 2004, Chicago, IL, USA, pp. 196-206, 2004, IEEE Computer Society, 0-7695-2129-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Adrianos Evangelidis, Ann Macintosh, Elisabeth Davenport |
FRAMES Towards Risk Modelling in e-Government Services: A UK Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGOV ![In: Electronic Government: Third International Conference, EGOV 2004, Zaragoza, Spain, August 30 - September 3, 2004, Proceedings, pp. 270-277, 2004, Springer, 3-540-22916-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Mahmoud Shahrokhi, Alain Bernard |
Risk assessment/prevention in industrial design processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (3) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 2592-2598, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Yasuhiko Kitamura, Takuya Murao |
Agent Based Risk Management Methods for Speculative Actions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRIMA ![In: Intelligent Agents and Multi-Agent Systems, 7th Pacific Rim International Workshop on Multi-Agents, PRIMA 2004, Auckland, New Zealand, August 8-13, 2004, Revised Selected Papers, pp. 92-103, 2004, Springer, 3-540-25340-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Christian Locher, Jens Ingo Mehlau, Oliver Wild |
Towards Risk Adjusted Controlling of Strategic IS Projects in Banks in the Light of Basel II. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Lei Xuan, Xin Xu |
Research on a Quantitative Security Risk Assessment Approach in Large-Scale Early Warning System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing - GCC 2004 Workshops: GCC 2004 International Workshops, IGKG, SGT, GISS, AAC-GEVO, and VVS, Wuhan, China, October 21-24, 2004. Proceedings, pp. 490-497, 2004, Springer, 3-540-23578-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Pallab Datta, Arun K. Somani |
Diverse Routing for Shared Risk Resource Groups (SRRG) Failures in WDM Optical Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BROADNETS ![In: 1st International Conference on Broadband Networks (BROADNETS 2004), 25-29 October 2004, San Jose, CA, USA, pp. 120-129, 2004, IEEE Computer Society, 0-7695-2221-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Yasuhiko Kitamura, Takuya Murao |
Risk Management Methods for Speculative Actions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 19-23 August 2004, New York, NY, USA, pp. 1250-1251, 2004, IEEE Computer Society, 1-58113-864-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | David P. Gilliam |
Managing Information Technology Security Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSS ![In: Software Security - Theories and Systems, Second Mext-NSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003, Revised Papers, pp. 296-317, 2003, Springer, 3-540-23635-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Seong-Bae Park, Sohyun Hwang, Byoung-Tak Zhang |
Mining the Risk Types of Human Papillomavirus (HPV) by AdaCost. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 14th International Conference, DEXA 2003, Prague, Czech Republic, September 1-5, 2003, Proceedings, pp. 403-412, 2003, Springer, 3-540-40806-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Joel Ratsaby |
A Stochastic Gradient Descent Algorithm for Structural Risk Minimisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ALT ![In: Algorithmic Learning Theory, 14th International Conference, ALT 2003, Sapporo, Japan, October 17-19, 2003, Proceedings, pp. 205-220, 2003, Springer, 3-540-20291-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Seong-Bae Park, Sohyun Hwang, Byoung-Tak Zhang |
Classification of the Risk Types of Human Papillomavirus by Decision Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning, 4th International Conference, IDEAL 2003, Hong Kong, China, March 21-23, 2003, Revised Papers, pp. 540-544, 2003, Springer, 3-540-40550-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Jason R. W. Merrick, Varun Dinesh, Amita Singh, Johan René van Dorp, Thomas A. Mazzuchi |
Simulation of large networks: propagation of uncertainty in a simulation-based maritime risk assessment model utilizing Bayesian simulation techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the 35th Winter Simulation Conference: Driving Innovation, New Orleans, Louisiana, USA, December 7-10, 2003, pp. 449-455, 2003, IEEE Computer Society, 0-7803-8132-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Azadeh Davoodi, Ankur Srivastava 0001 |
Voltage scheduling under unpredictabilities: a risk management paradigm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISLPED ![In: Proceedings of the 2003 International Symposium on Low Power Electronics and Design, 2003, Seoul, Korea, August 25-27, 2003, pp. 302-305, 2003, ACM, 1-58113-682-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
design closure, voltage scheduling, low power, predictability |
22 | Arie van Deursen, Tobias Kuipers |
Source-Based Software Risk Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 19th International Conference on Software Maintenance (ICSM 2003), The Architecture of Existing Systems, 22-26 September 2003, Amsterdam, The Netherlands, pp. 385-388, 2003, IEEE Computer Society, 0-7695-1905-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Silvio Giove, Claudia Basta |
Environmental Risk and Territorial Compatibility: A Soft Computing Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WIRN ![In: Neural Nets, 14th Italian Workshop on Neural Nets, WIRN VIETRI 2003, Vietri sul Mare, Italy, June 4-7, 2003, Revised Papers, pp. 195-201, 2003, Springer, 3-540-20227-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Adrianos Evangelidis, J. Akomode, A. Taleb-Bendiab, Mark John Taylor |
Risk Assessment & Success Factors for e-Government in a UK Establishment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGOV ![In: Electronic Government, First International Conference, EGOV 2002, Aix-en-Provence, France, September 2-5, 2002, Proceedings, pp. 395-402, 2002, Springer, 3-540-44121-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Péter András 0001, Gilbert Roberts, John Lazarus |
Environmental Risk, Cooperation, and Communication Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adaptive Agents and Multi-Agents Systems ![In: Adaptive Agents and Multi-Agent Systems: Adaptation and Multi-Agent Learning, pp. 49-65, 2002, Springer, 3-540-40068-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Geir J. Husøy, Edgar Karlsen, Arnt Hugo Lund |
Openness and Cross-Functional Risk Reduction - The Key to a Successful Development Project? - "Hindsight in Advance" within and between Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKM ![In: Practical Aspects of Knowledge Management, 4th International Conference, PAKM 2002, Vienna, Austria, December 2-3, 2002, Proceedings, pp. 571-584, 2002, Springer, 3-540-00314-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Richard Thomas 0001 |
Estimated population mixing by country and risk cohort for the HIV/AIDS epidemic in Western Europe. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Geogr. Syst. ![In: J. Geogr. Syst. 3(3), pp. 283-301, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Tim O'Neill, John Leaney |
Risk Management for an Open CBS Project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECBS ![In: 8th IEEE International Conference on Engineering of Computer-Based Systems (ECBS 2001), 17-20 April 2001, Washington, DC, USA, pp. 45-53, 2001, IEEE Computer Society, 0-7695-1086-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Karine Zeitouni, Nadjim Chelghoum |
Spatial Decision Tree-Application to Traffic Risk Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2001 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2001), 26-29 June 2001, Beirut, Lebanon, pp. 203-, 2001, IEEE Computer Society, 0-7695-1165-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Bob Blakley 0001, Ellen McDermott, Daniel E. Geer Jr. |
Information security is information risk management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001, pp. 97-104, 2001, ACM, 1-58113-457-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Ying Dong, Mingshu Li 0001 |
A Risk-Driven Design Model for Embedded System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APAQS ![In: 2nd Asia-Pacific Conference on Quality Software (APAQS 2001), 10-11 December 2001, Hong Kong, China, Proceedings, pp. 204-210, 2001, IEEE Computer Society, 0-7695-1287-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Vittorio Cortellessa, Francesco Quaglia |
Techniques for optimizing model execution I: aggressiveness/risk effects based scheduling in Time Warp. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the 32nd conference on Winter simulation, WSC 2000, Wyndham Palace Resort & Spa, Orlando, FL, USA, December 10-13, 2000, pp. 409-417, 2000, WSC, 0-7803-6582-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
22 | Des Greer, David W. Bustard, T. Sunazuka |
Prioritisation of System Changes using Cost-Benefit and Risk Assessments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE ![In: 4th IEEE International Symposium on Requirements Engineering (RE '99), 7-11 June 1999, Limerick, Ireland, pp. 180-, 1999, IEEE Computer Society, 0-7695-0188-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
22 | Sergio Scandizzo |
A fuzzy clustering approach for the measurement of operational risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES ![In: Third International Conference on Knowledge-Based Intelligent Information Engineering Systems, KES 1999, Adelaide, South Australia, 31 August - 1 September 1999, Proceedings, pp. 324-328, 1999, IEEE, 0-7803-5578-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
22 | Dhiman Chatterjee, V. C. Ramesh |
Real Options for Risk Management in Information Technology Projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), January 5-8, 1999, Maui, Hawaii, USA, 1999, IEEE Computer Society, 0-7695-0001-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
22 | Tullio Tanzi, Sylvie Servigne, Régis Guiol |
Real-Time Information System for Risk Management on Motorways. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAiSE ![In: Advanced Information Systems Engineering, 10th International Conference CAiSE'98, Pisa, Italy, June 8-12, 1998, Proceedings, pp. 325-338, 1998, Springer, 3-540-64556-X. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
22 | Jun Wang 0012, Jianhan Zhu |
Portfolio theory of information retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: Proceedings of the 32nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2009, Boston, MA, USA, July 19-23, 2009, pp. 115-122, 2009, ACM, 978-1-60558-483-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
document ranking under uncertainty, mean-variance analysis, modern portfolio theory, the probability ranking principle, risk management |
22 | Wolfram Wiesemann, Ronald Hochreiter, Daniel Kuhn 0001 |
A Stochastic Programming Approach for QoS-Aware Service Composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France, pp. 226-233, 2008, IEEE Computer Society, 978-0-7695-3156-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Average Value-at-Risk, Quality of Service, Web Service Composition, Stochastic Programming |
22 | Masayuki Nakao, Kensuke Tsuchiya, Yoshiaki Harita, Kenji Iino, Hiroshi Kinukawa, Satoshi Kawagoe, Yuji Koike, Akihiko Takano |
Extracting Failure Knowledge with Associative Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JSAI ![In: New Frontiers in Artificial Intelligence, JSAI 2007 Conference and Workshops, Miyazaki, Japan, June 18-22, 2007, Revised Selected Papers, pp. 269-276, 2007, Springer, 978-3-540-78196-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Failure Knowledge, Risk Management, Associative Search |
22 | Yao-Tien Chen, Din-Chang Tseng |
Medical Image Segmentation Based on the Bayesian Level Set Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIMI ![In: Medical Imaging and Informatics, 2nd International Conference, MIMI 2007, Beijing, China, August 14-16, 2007, Revised Selected Papers, pp. 25-34, 2007, Springer, 978-3-540-79489-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Bayesian risk, image segmentation, level set method, hypothesis test |
22 | Joan Cahill, Gabriel Losa |
Flight crew task performance and the design of cockpit task support tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECCE ![In: Proceedings of the 14th European Conference on Cognitive Ergonomics: invent! explore!, ECCE 2007, London, UK, August 28-31, 2007, pp. 83-87, 2007, ACM, 978-1-84799-849-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cockpit information management, electronic flight bag, flight crew, flight safety, performance evaluation, context, situation awareness, risk, task support |
22 | Tao Chen, Jinlong Zhang, Shan Liu, Benhai Yu |
Fuzzy Real Option Analysis for IT Investment in Nuclear Power Station. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (3) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part III, pp. 953-959, 2007, Springer, 978-3-540-72587-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
real options analysis, nuclear industry, risk assessment, information technology investment |
22 | Kin Keung Lai, Kaijian He, Jerome Yen |
Modeling VaR in Crude Oil Market: A Multi Scale Nonlinear Ensemble Approach Incorporating Wavelet Analysis and ANN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (1) ![In: Computational Science - ICCS 2007, 7th International Conference Beijing, China, May 27-30, 2007, Proceedings, Part I, pp. 554-561, 2007, Springer, 978-3-540-72583-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Nonlinear Ensemble Algorithm, Artificial Neural Network, Wavelet Analysis, Value at Risk |
22 | Yolanta Beres, Adrian Baldwin, Marco Casassa Mont, Simon Shiu |
On identity assurance in the presence of federated identity management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax, VA, USA, November 2, 2007, pp. 27-35, 2007, ACM, 978-1-59593-889-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
models, control, risk, identity, audit, assurance |
22 | Weidong Mao, Shannon Kelly |
An Optimum Random Forest Model for Prediction of Genetic Susceptibility to Complex Diseases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD ![In: Advances in Knowledge Discovery and Data Mining, 11th Pacific-Asia Conference, PAKDD 2007, Nanjing, China, May 22-25, 2007, Proceedings, pp. 193-204, 2007, Springer, 978-3-540-71700-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
association study, complex diseases, prediction, random forest, risk factor, susceptibility |
22 | XuLei Yang, Aize Cao, Qing Song 0001 |
A New Cluster Validity for Data Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Process. Lett. ![In: Neural Process. Lett. 23(3), pp. 325-344, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Vapnik-Chervonenkis-bound, data clustering, cluster validity, deterministic annealing, structural risk minimization |
22 | LiGuo Huang, Barry W. Boehm |
How Much Software Quality Investment Is Enough: A Value-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 23(5), pp. 88-95, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
software risk assessment, software cost/schedule estimation, software testing, software quality, cost-benefit analysis, COCOMO, value-based software engineering, COQUALMO |
22 | Gyrd Brændeland, Ketil Stølen |
Using model-based security analysis in component-oriented system development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006, pp. 11-18, 2006, ACM, 1-59593-553-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security risk analysis, case studies |
22 | Sousuke Amasaki, Yasuhiro Hamano, Osamu Mizuno, Tohru Kikuno |
Characterization of Runaway Software Projects Using Association Rule Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PROFES ![In: Product-Focused Software Process Improvement, 7th International Conference, PROFES 2006, Amsterdam, The Netherlands, June 12-14, 2006, Proceedings, pp. 402-407, 2006, Springer, 3-540-34682-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
project characterization, association rule mining, risk factors |
22 | In-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Eul-Gyu Im, Dongho Won |
Information System Modeling for Analysis of Propagation Effects and Levels of Damage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 54-63, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Damage propagation, Safeguard, Risk analysis, Intrusion, Epidemic |
22 | Anna Oganian, Alan F. Karr |
Combinations of SDC Methods for Microdata Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings, pp. 102-113, 2006, Springer, 3-540-49330-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Statistical disclosure control (SDC), disclosure control methods, data utility, combinations of SDC methods, microdata, disclosure risk |
22 | Ronald Hochreiter, Georg Ch. Pflug, David Wozabal |
Multi-Stage Stochastic Electricity Portfolio Optimization in Liberalized Energy Markets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
System Modelling and Optimization ![In: System Modeling and Optimization, Proceedings of the 22nd IFIP TC7 Conference held from July 18-22, 2005, in Turin, Italy, pp. 219-226, 2005, Springer, 0-387-32774-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Energy Markets, Optimal Electricity Portfolios, Average Value-at-Risk, Stochastic Optimization, Scenario Generation |
22 | David G. Messerschmitt, Clemens A. Szyperski |
Marketplace Issues in Software Planning and Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 21(3), pp. 62-70, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
schedule and organizational issues, standardization, planning, risk management, reusable software |
22 | Daniel Port, Scott Chen |
Assessing COTS Assessment: How Much Is Enough? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCBSS ![In: COTS-Based Software Systems, Third International Conference, ICCBSS 2004, Redondo Beach, CA, USA, February 1-4, 2004, Proceedings, pp. 183-198, 2004, Springer, 3-540-21903-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
COTS assessment, COTS evaluation, COTS, software risk, COTS integration |
22 | Victor Fang, Vincent C. S. Lee |
Credit Risks of Interest Rate Swaps: A Comparative Study of CIR and Monte Carlo Simulation Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning - IDEAL 2004, 5th International Conference, Exeter, UK, August 25-27, 2004, Proceedings, pp. 780-787, 2004, Springer, 3-540-22881-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Credit risk profile, Interest Rate Models, Monte Carlo Method |
22 | Yasuo Narukawa, Toshiaki Murofushi |
Decision Modelling Using the Choquet Integral. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDAI ![In: Modeling Decisions for Artificial Intelligence, First International Conference, MDAI 2004, Barcelona, Spain, August 2-4, 2004, Proceedings, pp. 183-193, 2004, Springer, 3-540-22555-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Non-additive measure, Decision under risk, Choquet integral, Fuzzy measure, Decision under uncertainty |
22 | Krishnamurty Muralidhar, Rathindra Sarathy |
A theoretical basis for perturbation methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Stat. Comput. ![In: Stat. Comput. 13(4), pp. 329-335, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
statistical disclosure limitation, confidentiality, perturbation, disclosure risk, data masking |
22 | Tyrone Grandison, Morris Sloman |
Trust Management Tools for Internet Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, First International Conference, iTrust 2003, Heraklion, Crete, Greece, May 28-30, 2002, Proceedings, pp. 91-107, 2003, Springer, 3-540-40224-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Trust Management Tools, Trust Specification, Trust Analysis, Risk Service, Trust Monitoring Service |
22 | Norman E. Fenton, Paul Krause, Martin Neil |
Software Measurement: Uncertainty and Causal Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 19(4), pp. 116-122, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
software quality estimation, Bayesian networks, risk management, Software measurement, causal modeling |
22 | Julià Urrutia, Enric Ripoll |
Empirical Evidences on Protecting Population Uniqueness at Idescat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inference Control in Statistical Databases ![In: Inference Control in Statistical Databases, From Theory to Practice, pp. 213-230, 2002, Springer, 3-540-43614-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
unique populations, anonymized records, re-identification and subsample methods, information loss, Disclosure risk |
22 | Torsten Grzebiela |
Insurability of Electronic Commerce Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 185, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Internet risks, multilateral security, protection goals, risk management |
22 | Matt Blaze, John Ioannidis, Angelos D. Keromytis |
Offline Micropayments without Trusted Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings, pp. 21-40, 2001, Springer, 3-540-44079-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Microbilling, Risk Management, Trust Management, Payments, Digital Cash |
22 | M. R. Strens, R. C. Sugden |
Change Analysis: A Step towards Meeting the Challenge of Changing Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECBS ![In: IEEE Symposium and Workshop on Engineering of Computer Based Systems (ECBS'96), March 11-15, 1996, Friedrichshafen, Germany., pp. 278-, 1996, IEEE Computer Society, 0-8186-7355-9. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Changing requirements, requirements and design methods, risk, change analysis |
21 | Kamalanathan Kandasamy, Sethuraman Srinivas, Krishnashree Achuthan, P. Venkat Rangan |
IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EURASIP J. Inf. Secur. ![In: EURASIP J. Inf. Secur. 2020, pp. 8, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Abroon Qazi, Pervaiz Akhtar |
Risk matrix driven supply chain risk management: Adapting risk matrix based tools to modelling interdependent risks and risk appetite. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Ind. Eng. ![In: Comput. Ind. Eng. 139, pp. 105351, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Scott DuHadway, Steven Carnovale, Benjamin T. Hazen |
Understanding risk management for intentional supply chain disruptions: risk detection, risk mitigation, and risk recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 283(1-2), pp. 179-198, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Jale Bektas |
Use of data mining techniques to determine presence of coronary artery disease and deriving a risk score by employing risk factors (Veri madenciliği tekniklerinin kullanılarak koroner arter hastalığının varlığının belirlenmesi ve risk faktörlerinin kullanılmasıyla bir risk skor sisteminin oluşturulması) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2017 |
RDF |
|
21 | Douglas L. Van Bossuyt, Chris Hoyle, Irem Y. Tumer, Andy Dong |
Risk attitudes in risk-based design: Considering risk attitude using utility theory in risk-based design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Eng. Des. Anal. Manuf. ![In: Artif. Intell. Eng. Des. Anal. Manuf. 26(4), pp. 393-406, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Huzaifa Al Nahas, Jitender S. Deogun, Eric D. Manley |
Proactive mitigation of impact of wormholes and sinkholes on routing security in energy-efficient wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 15(4), pp. 431-441, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Sensor networks, Energy-efficiency, Secure routing, Wormhole attacks |
21 | Christopher Thorpe, David C. Parkes |
Cryptographic Combinatorial Securities Exchanges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 285-304, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Holger Flier, Thomas Graffagnino, Marc Nunkesser |
Scheduling Additional Trains on Dense Corridors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEA ![In: Experimental Algorithms, 8th International Symposium, SEA 2009, Dortmund, Germany, June 4-6, 2009. Proceedings, pp. 149-160, 2009, Springer, 978-3-642-02010-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Francesco Pappalardo 0001, Alessandro Cincotti, Alfredo Motta, Marzio Pennisi |
Agent Based Modeling of Atherosclerosis: A Concrete Help in Personalized Treatments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (2) ![In: Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, 5th International Conference on Intelligent Computing, ICIC 2009, Ulsan, South Korea, September 16-19, 2009, Proceedings, pp. 386-396, 2009, Springer, 978-3-642-04019-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Yeni Yuqin Li Helgesson |
Managing Risks on Critical IT Systems in Public Service Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 470-475, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Jean-Chrysostome Bolot, Marc Lelarge |
A New Perspective on Internet Security using Insurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 1948-1956, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Changsung Kim, C.-C. Jay Kuo |
Feature-Based Intra-/InterCoding Mode Selection for H.264/AVC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 17(4), pp. 441-453, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
|
|