Tag #risk management
156 papers:
- CIKM-2019-TanMYYDWTYWCCY #named #network #predict
- UA-CRNN: Uncertainty-Aware Convolutional Recurrent Neural Network for Mortality Risk Prediction (QT, AJM, MY, BY, HD, VWSW, YKT, TCFY, GLHW, JYLC, FKLC, PCY), pp. 109–118.
- ECIR-p2-2019-LosadaCP #detection #internet
- Early Detection of Risks on the Internet: An Exploratory Campaign (DEL, FC, JP), pp. 259–266.
- ECIR-p2-2019-Masood #adaptation #internet #modelling #predict
- Adapting Models for the Case of Early Risk Prediction on the Internet (RM), pp. 353–358.
- KDD-2019-ZhangTDZW #health #named #predict
- MetaPred: Meta-Learning for Clinical Risk Prediction with Limited Patient Electronic Health Records (XSZ, FT, HHD, JZ, FW), pp. 2487–2495.
- ASE-2019-MichaelDDLS #programming #regular expression
- Regexes are Hard: Decision-Making, Difficulties, and Risks in Programming Regular Expressions (LGMI, JD, JCD, DL, FS), pp. 415–426.
- ESEC-FSE-2019-OlssonF #ecosystem #industrial #mining
- Risks and assets: a qualitative study of a software ecosystem in the mining industry (TO, UF), pp. 895–904.
- KDD-2018-MaGSYZZ #health #predict
- Risk Prediction on Electronic Health Records with Prior Medical Knowledge (FM, JG0, QS, QY, JZ, AZ), pp. 1910–1919.
- KDD-2018-WaliaHCCLKNBAM #pipes and filters #predict
- A Dynamic Pipeline for Spatio-Temporal Fire Risk Prediction (BSW, QH, JC, FC, JL, NK, PN, JB, GA, MM), pp. 764–773.
- ICSE-2018-LabunetsMPMO #assessment #comparison #comprehension #empirical #security #visual notation
- Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations (KL, FM, FP, SM, FMdO), p. 395.
- VS-Games-2017-EllmersYP #game studies
- Integratingfall-risk assessments within a simple balance exergame (TJE, WRY, ITP), pp. 245–248.
- CIKM-2016-Grushka-CohenSB #assessment #database #elicitation #named #security
- CyberRank: Knowledge Elicitation for Risk Assessment of Database Security (HGC, OS, OB, BS, LR), pp. 2009–2012.
- KDD-2016-SalehiRLP #approach #predict #robust
- Dynamic and Robust Wildfire Risk Prediction System: An Unsupervised Approach (MS, LIR, TML, AP), pp. 245–254.
- MSR-2015-ChoetkiertikulD #predict
- Characterization and Prediction of Issue-Related Risks in Software Projects (MC, HKD, TT, AG), pp. 280–291.
- SANER-2015-KnodelNBV
- Software risk management in practice: Shed light on your software product (JK, MN, EB, JV), pp. 592–594.
- DHM-HM-2015-KlugeKZ #energy
- Inside the User’s Mind — Perception of Risks and Benefits of Unknown Technologies, Exemplified by Geothermal Energy (JK, SK, MZ), pp. 324–334.
- DUXU-DD-2015-FanHV #big data
- Supply Chain Risk Management in the Era of Big Data (YF, LH, SV), pp. 283–294.
- DUXU-IXD-2015-Celi #experience #learning #modelling #user interface
- Application of Dashboards and Scorecards for Learning Models IT Risk Management: A User Experience (EC), pp. 153–165.
- HCI-UC-2015-FukuzawaSU #overview #security
- Survey on Risk Management Based on Information Security Psychology (YF, MS, HU), pp. 396–408.
- SCSM-2015-BeldadK #facebook
- It’s Not About the Risks, I’m just Used to Doing It: Disclosure of Personal Information on Facebook Among Adolescent Dutch Users (ADB, RK), pp. 185–195.
- ICEIS-v1-2015-AbakumovAV #information management #integration
- Risk Management in Project of Information Systems Integration During Merger of Companies (EMA, DMA, AV), pp. 221–227.
- ICEIS-v3-2015-ProencaNBB #approach
- Digital Curation Costs — A Risk Management Approach Supported by the Business Model Canvas (DP, AN, RB, JLB), pp. 299–306.
- KDD-2015-DhurandharGRME #big data
- Big Data System for Analyzing Risky Procurement Entities (AD, BG, RKR, GM, ME), pp. 1741–1750.
- KDD-2015-SunWH #approach #named #predict
- LINKAGE: An Approach for Comprehensive Risk Prediction for Care Management (ZS, FW, JH), pp. 1145–1154.
- SEKE-2015-BarchetSF #analysis #collaboration #dependence
- Analysis of Risk Dependencies in Collaborative Risk Management (CB, LAdLS, LMF), pp. 314–319.
- REFSQ-2015-GramaticaLMPT #assessment #empirical #security
- The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals (MdG, KL, FM, FP, AT), pp. 98–114.
- REFSQ-2015-VriezekolkEW #assessment #validation
- Experimental Validation of a Risk Assessment Method (EV, SE, RW), pp. 1–16.
- ESEC-FSE-2015-RosenGS #commit #predict
- Commit guru: analytics and risk prediction of software commits (CR, BG, ES), pp. 966–969.
- SAC-2015-ShahriarH #approach #assessment #metric #security #web
- Security assessment of clickjacking risks in web applications: metrics based approach (HS, HMH), pp. 791–797.
- JCDL-2014-FerreiraVB #data transformation
- The value of risk management for data management in science and engineering (FF, RV, JLB), pp. 439–440.
- CSEET-2014-Koolmanojwong #re-engineering
- Top-10 risks in real-client software engineering class projects (SK), pp. 201–202.
- CSMR-WCRE-2014-AntinyanSMOWWHH #agile #case study #development #experience #identification #industrial
- Identifying risky areas of software code in Agile/Lean software development: An industrial experience report (VA, MS, WM, PÖ, EW, JW, AH, JH), pp. 154–163.
- DUXU-TMT-2014-CorreiaSCBS #design #safety
- Design as a Tool for Managing Risks and Vulnerabilities Regarding Artifacts of Public Safety (WC, SXdS, FC, MLNB, MMS), pp. 437–444.
- CAiSE-2014-StulpnagelOS #logic #markov #network
- IT Risk Management with Markov Logic Networks (JvS, JO, JS), pp. 301–315.
- EDOC-2014-KormanSHBE #assessment #enterprise #overview #security
- Overview of Enterprise Information Needs in Information Security Risk Assessment (MK, TS, JH, JEB, ME), pp. 42–51.
- ICEIS-v3-2014-BenaijaK
- Trade off Between Risk Management, Value Creation and Strategic Alignment in Project Portfolio Management (KB, LK), pp. 447–452.
- ICPR-2014-WangWH #framework #learning #multi #predict
- A Multi-task Learning Framework for Joint Disease Risk Prediction and Comorbidity Discovery (XW, FW, JH), pp. 220–225.
- KDD-2014-TamhaneISDA #analysis #predict #student
- Predicting student risks through longitudinal analysis (AT, SI, BS, MD, JA), pp. 1544–1552.
- KDD-2014-WangZQWD #multi #predict
- Clinical risk prediction with multilinear sparse logistic regression (FW, PZ, BQ, XW, ID), pp. 145–154.
- SEKE-2014-DegrossiAFM #approach
- Flood Citizen Observatory: a crowdsourcing-based approach for flood risk management in Brazil (LCD, JPdA, MCF, EMM), pp. 570–575.
- SEKE-2014-MachadoSFC #collaboration #reasoning
- Case-based Reasoning for Experience-based Collaborative Risk Management (NLRM, LAdLS, LMF, JAC), pp. 262–267.
- SEKE-2014-OdzalyGS #agile #lightweight
- Lightweight Risk Management in Agile Projects (EEO, DG, DS), pp. 576–581.
- SIGIR-2014-LeeTC #behaviour #multi
- Characterizing multi-click search behavior and the risks and opportunities of changing results during use (CJL, JT, SdlC), pp. 515–524.
- RE-2014-Ionita #evaluation #identification #information management #security
- Context-sensitive Information security Risk identification and evaluation techniques (DI), pp. 485–488.
- SAC-2014-ShahriarH #assessment #fuzzy #injection #using
- Risk assessment of code injection vulnerabilities using fuzzy logic-based system (HS, HH), pp. 1164–1170.
- CSEET-2013-KoolmanojwongB #re-engineering
- A look at software engineering risks in a team project course (SK, BWB), pp. 21–30.
- GT-VMT-2013-MicallefC #case study #detection #modelling #visual notation
- A Case Study on Graphically Modelling and Detecting Knowledge Mobility Risks (MM, CC).
- DHM-HB-2013-Hedge
- Evaluating Ergonomics Risks for Digital Radiologists (AH), pp. 50–58.
- DHM-SET-2013-BrixeyT
- Homecare Risk Management: Nursing Issues Related to Technology (JJB, JPT), pp. 157–162.
- DHM-SET-2013-KongZC #behaviour #predict
- Personality and Attitudes as Predictors of Risky Driving Behavior: Evidence from Beijing Drivers (JK, KZ, XC), pp. 38–44.
- DUXU-CXC-2013-PlogmannJJR #development #evaluation #knowledge-based #using
- Development and Evaluation of a Knowledge-Based Method for the Treatment of Use-Oriented and Technical Risks Using the Example of Medical Devices (SP, AJ, AJT, KR), pp. 452–461.
- EDOC-2013-BraunE #concept #network #online #overview #social #towards
- Towards a Conceptualization of Corporate Risks in Online Social Networks: A Literature Based Overview of Risks (RB, WE), pp. 267–274.
- EDOC-2013-SousaMGM #approach #architecture #data type #enterprise #using
- Assessing Risks and Opportunities in Enterprise Architecture Using an Extended ADT Approach (SS, DM, KG, NM), pp. 81–90.
- ICEIS-J-2013-LiuDH13a
- Business Intelligence for Improving Supply Chain Risk Management (LL, HAMD, WH), pp. 190–205.
- ICEIS-v1-2013-LiuDH #assessment #detection #exception
- Detecting and Explaining Business Exceptions for Risk Assessment (LL, HAMD, WH), pp. 530–535.
- KDD-2013-TranPLHBV #framework #predict
- An integrated framework for suicide risk prediction (TT, DQP, WL, RH, MB, SV), pp. 1410–1418.
- KDIR-KMIS-2013-Ibarra-SanchezPO #analysis #case study #using
- Hospital Risk Management using Healthcare Failure Mode and Effects Analysis — A Case Study on Ventilators Whithin an Intensive Care Unit (MAIS, ABPA, MROP), pp. 328–335.
- RecSys-2013-ZhangWCZ #personalisation #perspective
- To personalize or not: a risk management perspective (WZ, JW, BC, XZ), pp. 229–236.
- SEKE-2013-SeveroFS #approach #collaboration #game studies
- A Dialogue Game Approach to Collaborative Risk Management (FS, LMF, LAdLS), pp. 548–551.
- RE-2013-ZarghamiVESW #identification
- Assumption-based risk identification method (ARM) in dynamic service provisioning (AZ, EV, MZE, MvS, RW), pp. 175–184.
- REFSQ-2013-CallelePW #identification #interface #requirements
- Risk Identification at the Interface between Business Case and Requirements (DC, BP, KW), pp. 253–268.
- ASE-2013-NejatiABHBC #cpu #embedded
- Minimizing CPU time shortage risks in integrated embedded software (SN, MA, LCB, JH, JB, YC), pp. 529–539.
- ESEC-FSE-2013-MockusHP #approach #quality
- Risky files: an approach to focus quality improvement effort (AM, RLH, JDP), pp. 691–694.
- CASE-2013-GohWYFPLL #monitoring #named #realtime #visualisation
- RiskVis: Supply chain visualization with risk management and real-time monitoring (RSMG, ZW, XY, XF, LP, SL, XL), pp. 207–212.
- SIGITE-2012-KercherR #student #using
- Risks, rewards and raising awareness: training a cyber workforce using student red teams (KEK, DCR), pp. 75–80.
- CHI-2012-GulottaFM #image #online
- Curation, provocation, and digital identity: risks and motivations for sharing provocative images online (RG, HF, JM), pp. 387–390.
- SEKE-2012-LobatoMNAM #synthesis
- Synthesizing Evidence on Risk Management: A Narrative Synthesis of two Mapping Studies (LLL, IdCM, PAdMSN, ESdA, SRdLM), pp. 641–646.
- REFSQ-2012-ChowdhuryMSK #diagrams #requirements #security
- Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions (MJMC, RM, GS, PK), pp. 132–139.
- CHI-2011-RaijGKS #mobile #privacy #smarttech
- Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment (AR, AG, SK, MBS), pp. 11–20.
- DUXU-v2-2011-InversiniCB #analysis #assessment #case study #experience #usability #user interface
- Connecting Usages with Usability Analysis through the User Experience Risk Assessment Model: A Case Study in the Tourism Domain (AI, LC, DB), pp. 283–293.
- HCI-MIIE-2011-HondaSN #process #recognition
- Activity Recognition for Risk Management with Installed Sensor in Smart and Cell Phone (DH, NS, SN), pp. 230–239.
- ICEIS-v1-2011-AsghariNAA #approach #enterprise #fuzzy #implementation #resource management #using
- Risk Management in Enterprise Resource Planning Implementation using a Fuzzy Approach (HAA, MN, FA, FA), pp. 290–294.
- ICEIS-v1-2011-SchrodlGLT #assessment #framework #hybrid #network
- Risk Management in Supply Networks for Hybrid Value Bundles — A Risk Assessment Framework (HS, MG, LL, KT), pp. 157–162.
- ICEIS-v2-2011-LiW #enterprise #research
- Research on Integrated Management and Control System in Enterprises based on Project Risks (YL, YW), pp. 318–322.
- ICEIS-v2-2011-YangJ #implementation #research
- Research on Critical Chain Management and Risk Management in Project Implementation Management (ZY, JJ), pp. 351–356.
- ICEIS-v2-2011-ZhuXM #assessment #network #using
- Operational Hazard Risk Assessment using Bayesian Networks (ZJZ, YX, EM), pp. 135–139.
- ICEIS-v3-2011-QuG #analysis #identification #outsourcing
- The Analysis of IT Outsourcing Risk Identification on Principal-agent Theory (LQ, ZG), pp. 488–491.
- SEKE-2011-FuginiRIRC #monitoring #simulation
- Simulations of Risks for Monitoring and Prevention (MGF, FR, RI, CR, OC), pp. 602–607.
- SEKE-2011-GregoriadesLP11a #calculus #using
- Project Risk Management Using Event Calculus(S) (AG, VPL, PP), pp. 335–338.
- SPLC-2011-QuiltyC #case study #development #experience #product line
- Experiences with Software Product Line Development in Risk Management Software (GQ, MÓC), pp. 251–260.
- ICSE-2011-GodeK #clone tracking
- Frequency and risks of changes to clones (NG, RK), pp. 311–320.
- ASE-2010-KessentiniVS #identification
- Deviance from perfection is a better criterion than closeness to evil when identifying risky code (MK, SV, HAS), pp. 113–122.
- ICSE-2010-Lima #assessment #distributed
- Risk assessment on distributed software projects (AML), pp. 349–350.
- ICST-2010-Bubevski #assessment #simulation #testing
- An Application of Six Sigma and Simulation in Software Testing Risk Assessment (VB), pp. 295–302.
- CSEET-2009-AhteeP #student
- Risks in Students’ Software Projects (TA, TP), pp. 154–157.
- SIGITE-2009-PakC #assessment #markov #modelling #using
- Asset priority risk assessment using hidden markov models (CP, JC), pp. 65–73.
- ICSM-2009-BettenburgSH #empirical #off the shelf #using
- An empirical study on the risks of using off-the-shelf techniques for processing mailing list data (NB, ES, AEH), pp. 539–542.
- DHM-2009-FallonCP #assessment #learning
- Learning from Risk Assessment in Radiotherapy (EFF, LC, WJvdP), pp. 502–511.
- HCI-VAD-2009-KandoganHBM #collaboration #delivery
- Studying Reactive, Risky, Complex, Long-Spanning, and Collaborative Work: The Case of IT Service Delivery (EK, EMH, JHB, PPM), pp. 504–513.
- SEKE-2009-GaoSSVPDB #assessment #estimation #problem
- Systematic Risk Assessment and Cost Estimation for Software Problems (JG, MS, MS, DV, PP, KD, EB), pp. 103–109.
- SEKE-2009-WilliamsR #statistics #using
- Accelerated Risk Management using Statistical Triggers (RW, KR), pp. 643–648.
- SIGIR-2009-ZhuWCT #information retrieval #modelling #nondeterminism
- Risky business: modeling and exploiting uncertainty in information retrieval (JZ, JW, IJC, MJT), pp. 99–106.
- RE-2009-FailyF #requirements
- Context-Sensitive Requirements and Risk Management with IRIS (SF, IF), pp. 379–380.
- DAC-2009-Anderson #complexity #design
- Beyond innovation: dealing with the risks and complexity of processor design in 22nm (CJA), p. 103.
- CSEET-2008-MeyerP #case study #development #distributed #experience #re-engineering
- The Allure and Risks of a Deployable Software Engineering Project: Experiences with Both Local and Distributed Development (BM, MP), pp. 3–16.
- SIGITE-2008-Pak #assessment #realtime #statistics
- The near real time statistical asset priority driven (nrtsapd) risk assessment methodology (CP), pp. 105–112.
- CAiSE-2008-MatuleviciusMMDHG #adaptation #development #information management #security
- Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development (RM, NM, HM, ED, PH, NG), pp. 541–555.
- SEKE-2008-FontouraP #approach #process
- Systematic Approach to Risk Management in Software Projects through Process Tailoring (LMF, RTP), pp. 179–184.
- CSEET-2007-Taran #education #game studies #re-engineering #using
- Using Games in Software Engineering Education to Teach Risk Management (GT), pp. 211–220.
- RE-2007-GandhiL #assessment #certification #comprehension #correlation #multi #requirements
- Discovering and Understanding Multi-dimensional Correlations among Certification Requirements with application to Risk Assessment (RAG, SWL), pp. 231–240.
- SAC-2007-HostL #assessment #concept
- Different conceptions in software project risk assessment (MH, CL), pp. 1422–1426.
- CASE-2007-MishraV #framework
- A CBR-based Decision Support System Framework for Construction Supply Chain Risk Management (VKM, NV), pp. 980–985.
- CHI-2006-BenfordCRSDFD #case study #design #experience #staging
- Designing for the opportunities and risks of staging digital experiences in public settings (SB, AC, SR, JGS, AJD, MF, AD), pp. 427–436.
- ICEIS-AIDSS-2006-ThuD #predict #using
- Predicting Cardiovascular Risks — Using POSSUM, PPOSSUM and Neural Net Techniques (TNTT, DND), pp. 230–234.
- SIGIR-2006-FrankowskiCSTR #privacy #what
- You are what you say: privacy risks of public mentions (DF, DC, SS, LGT, JR), pp. 565–572.
- MoDELS-2006-HogganvikS #approach #empirical #identification #motivation #visual notation
- A Graphical Approach to Risk Identification, Motivated by Empirical Investigations (IH, KS), pp. 574–588.
- MoDELS-2006-HogganvikS #approach #empirical #identification #motivation #visual notation
- A Graphical Approach to Risk Identification, Motivated by Empirical Investigations (IH, KS), pp. 574–588.
- RE-2006-PichlerRW #agile #case study #requirements #social
- Agile Requirements Engineering for a Social Insurance for Occupational Risks Organization: A Case Study (MP, HR, WW), pp. 246–251.
- ITiCSE-2005-ArmenM #education
- Teaching about the risks of electronic voting technology (CA, RM), pp. 227–231.
- CIKM-2005-LorenzGLTH
- Situation-aware risk management in autonomous agents (ML, JDG, HL, IJT, JH), pp. 363–364.
- RE-2005-ChisanD #requirements
- Exploring the role of requirements engineering in improving risk management (JC, DD), pp. 481–482.
- ASE-2005-HeartyFNC #assessment #automation #modelling
- Automated population of causal models for improved software risk assessment (PH, NEF, MN, PC), pp. 433–434.
- SAC-2005-WongQC #source code
- Source code-based software risk assessing (WEW, YQ, KMLC), pp. 1485–1490.
- CSEET-2004-SeidmanF #re-engineering #source code
- Software Offshoring ?^(a) Risks and Opportunities for Software Engineering Programs (SBS, LF), p. 153.
- SIGITE-2004-Dark #assessment #learning #performance #security #student
- Assessing student performance outcomes in an information security risk assessment, service learning course (MJD), pp. 73–78.
- LSO-2004-FalboRBT #how #learning #using
- Learning How to Manage Risks Using Organizational Knowledge (RdAF, FBR, GB, DFT), pp. 7–18.
- SEKE-2004-CostaBT #evaluation
- Software Project Risk Evaluation based on Specific and Systemic Risks (HRC, MdOB, GHT), pp. 282–287.
- SEKE-2004-RayKDS #assessment #automation
- Automated Risk Assessment for Managing Software Projects (BKR, TK, RD, PS), pp. 372–377.
- ICSE-2004-KontioHRA #agile #challenge #development #distributed
- Managing Commitments and Risks: Challenges in Distributed Agile Development (JK, MH, JR, PA), pp. 732–733.
- ICSM-2003-DeursenK #assessment
- Source-Based Software Risk Assessment (AvD, TK), pp. 385–388.
- VISSOFT-2003-RodriguezK #visualisation
- Visualization for Software Risk Assessments (JVR, TK), pp. 87–91.
- ICEIS-v2-2003-CanforaT #assessment
- Dealing with the “Don’t Know” Answer in Risk Assessment (GC, LT), pp. 229–237.
- SEKE-2003-Ochs #assessment #off the shelf #requirements #using
- Using Software Risk Management for Deriving Method Requirements for Risk Mitigation in COTS Assessment and Selection (MO), pp. 639–646.
- ICSE-2003-WangHGAGA #architecture #assessment #specification #uml
- Architectural Level Risk Assessment Tool Based on UML Specifications (TW, AEH, AG, WA, KGP, HHA), pp. 808–809.
- CSEET-2002-FullerCD #approach #case study #education
- A New Approach to Teaching Software Risk Management with Case Studies (AF, PRC, LD), p. 215–?.
- EDOC-2002-AagedalBDGRS #assessment #enterprise #modelling #security
- Model-Based Risk Assessment to Improve Enterprise Security (JØA, FdB, TD, BAG, DR, KS), p. 51–?.
- RE-2002-Doernemann
- Tool-Based Risk Management Made Practical (HD), p. 192.
- RE-2002-Kozaczynski #architecture #requirements
- Requirements, Architectures and Risks (WK), pp. 6–7.
- RE-2002-Schoenthaler
- Risk Management in Challenging Business Software Projects (FS), pp. 8–12.
- WCRE-2001-Deursen #comprehension #programming
- Program Comprehension Risks and Opportunities in Extreme Programming (AvD), p. 176–?.
- EDOC-2001-WangC #distributed #enterprise
- A Method to Reduce Risks in Building Distributed Enterprise Systems (GW, GC), pp. 164–168.
- ESEC-FSE-2001-FreimutHKKK #case study #implementation #industrial
- An industrial case study of implementing software risk management (BGF, SH, PK, JK, WK), pp. 277–287.
- AdaEurope-2000-WielandHS
- Enhancements in Software Project Risk Management (PW, FH, KS), pp. 161–172.
- ICRE-2000-Neumann
- Requirements-Related Risks in Critical Systems (PGN), p. 3–?.
- ASE-2000-FeatherCL #tool support
- Combining the Best Attributes of Qualitative and Quantitative Risk Management Tool Support (MSF, SLC, TWL), pp. 309–312.
- ASE-2000-MenziesS #assessment #case study #query #scalability
- Practical Large Scale What-If Queries: Case Studies with Software Risk Assessment (TM, ES), p. 165–?.
- ICSE-2000-MizunoKTS #evaluation
- Characterization of risky projects based on project managers’ evaluation (OM, TK, YT, KS), pp. 387–395.
- ITiCSE-1999-ParkerH #industrial
- Campus-based industrial software projects: risks and rewards (HP, MH), p. 189.
- WCRE-1999-Sneed #re-engineering
- Risks Involved in Reengineering Projects (HMS), pp. 204–211.
- CAiSE-1999-VerhoefF #in the large
- Risk Management for IT in the Large (DV, MF), pp. 57–72.
- MLDM-1999-Scaringella #data mining #mining #monitoring
- A Data Mining Application for Monitoring Environmental Risks (AS), pp. 209–215.
- RE-1999-GreerBS #using
- Prioritisation of System Changes using Cost-Benefit and Risk Assessments (DG, DWB, TS), p. 180–?.
- ICSE-1999-BenlarbiM #metric #morphism #polymorphism #predict
- Polymorphism Measures for Early Risk Prediction (SB, WLM), pp. 334–344.
- ICSE-1999-Kontio #development #overview
- Risk Management in Software Development: A Technology Overview and the Riskit Method (JK), pp. 679–680.
- SAC-1999-FinkH #assessment #multi
- The Disease Progression Explorer: Risk Assessment Support in Chronic, Multifactorial Diseases (PKF, LTH), pp. 46–51.
- CSEET-1998-Hall
- Training Risk Management: Bridge over Troubled Waters (EMH), pp. 36–39.
- CAiSE-1998-TanziSG #information management #realtime
- Real-Time Information System for Risk Management on Motorways (TT, SS, RG), pp. 325–338.
- FSE-1998-KontioGL #case study #concept #experience #process #using
- Experiences in Improving Risk Management Processes Using the Concepts of the Riskit Method (JK, GG, DL), pp. 163–172.
- ICSE-1998-BriandEB #assessment #benchmark #estimation #hybrid #metric #named
- COBRA: A Hybrid Method for Software Cost Estimation, Benchmarking, and Risk Assessment (LCB, KEE, FB), pp. 390–399.
- ICML-1996-EzawaSN #learning #network
- Learning Goal Oriented Bayesian Networks for Telecommunications Risk Management (KJE, MS, SWN), pp. 139–147.
- KBSE-1994-Madachy #assessment #estimation #knowledge-based
- Knowledge-Based Risk Assessment and Cost Estimation (RJM), pp. 172–178.
- KBSE-1994-Toth
- Software Technology Risk Advisor (GAT), pp. 179–188.
- PDP-1994-GulleyCW #parallel #performance
- Controlling Parallel Software Performance Risks With VPB (JWG, PJCC, SRW), pp. 366–371.
- CSM-1993-HinleyB
- Reducing the Risks in Software Improvement Through Process-Orientated Management (DSH, KHB), pp. 319–328.
- SEKE-1993-Paul #maturity #metric
- Software Maturity Measurement for Software Risk Management (RAP), pp. 641–648.
- ESEC-1989-Boehm
- Software Risk Management (BWB), pp. 1–19.
- SOSP-1989-LomasGSN
- Reducing Risks from Poorly Chosen Keys (TMAL, LG, JHS, RMN), pp. 14–18.