BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
risk management
Google risk management

Tag #risk management

156 papers:

CIKMCIKM-2019-TanMYYDWTYWCCY #named #network #predict
UA-CRNN: Uncertainty-Aware Convolutional Recurrent Neural Network for Mortality Risk Prediction (QT, AJM, MY, BY, HD, VWSW, YKT, TCFY, GLHW, JYLC, FKLC, PCY), pp. 109–118.
ECIRECIR-p2-2019-LosadaCP #detection #internet
Early Detection of Risks on the Internet: An Exploratory Campaign (DEL, FC, JP), pp. 259–266.
ECIRECIR-p2-2019-Masood #adaptation #internet #modelling #predict
Adapting Models for the Case of Early Risk Prediction on the Internet (RM), pp. 353–358.
KDDKDD-2019-ZhangTDZW #health #named #predict
MetaPred: Meta-Learning for Clinical Risk Prediction with Limited Patient Electronic Health Records (XSZ, FT, HHD, JZ, FW), pp. 2487–2495.
ASEASE-2019-MichaelDDLS #programming #regular expression
Regexes are Hard: Decision-Making, Difficulties, and Risks in Programming Regular Expressions (LGMI, JD, JCD, DL, FS), pp. 415–426.
ESEC-FSEESEC-FSE-2019-OlssonF #ecosystem #industrial #mining
Risks and assets: a qualitative study of a software ecosystem in the mining industry (TO, UF), pp. 895–904.
KDDKDD-2018-MaGSYZZ #health #predict
Risk Prediction on Electronic Health Records with Prior Medical Knowledge (FM, JG0, QS, QY, JZ, AZ), pp. 1910–1919.
KDDKDD-2018-WaliaHCCLKNBAM #pipes and filters #predict
A Dynamic Pipeline for Spatio-Temporal Fire Risk Prediction (BSW, QH, JC, FC, JL, NK, PN, JB, GA, MM), pp. 764–773.
ICSE-2018-LabunetsMPMO #assessment #comparison #comprehension #empirical #security #visual notation
Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations (KL, FM, FP, SM, FMdO), p. 395.
CoGVS-Games-2017-EllmersYP #game studies
Integratingfall-risk assessments within a simple balance exergame (TJE, WRY, ITP), pp. 245–248.
CIKMCIKM-2016-Grushka-CohenSB #assessment #database #elicitation #named #security
CyberRank: Knowledge Elicitation for Risk Assessment of Database Security (HGC, OS, OB, BS, LR), pp. 2009–2012.
KDDKDD-2016-SalehiRLP #approach #predict #robust
Dynamic and Robust Wildfire Risk Prediction System: An Unsupervised Approach (MS, LIR, TML, AP), pp. 245–254.
MSRMSR-2015-ChoetkiertikulD #predict
Characterization and Prediction of Issue-Related Risks in Software Projects (MC, HKD, TT, AG), pp. 280–291.
SANERSANER-2015-KnodelNBV
Software risk management in practice: Shed light on your software product (JK, MN, EB, JV), pp. 592–594.
HCIDHM-HM-2015-KlugeKZ #energy
Inside the User’s Mind — Perception of Risks and Benefits of Unknown Technologies, Exemplified by Geothermal Energy (JK, SK, MZ), pp. 324–334.
HCIDUXU-DD-2015-FanHV #big data
Supply Chain Risk Management in the Era of Big Data (YF, LH, SV), pp. 283–294.
HCIDUXU-IXD-2015-Celi #experience #learning #modelling #user interface
Application of Dashboards and Scorecards for Learning Models IT Risk Management: A User Experience (EC), pp. 153–165.
HCIHCI-UC-2015-FukuzawaSU #overview #security
Survey on Risk Management Based on Information Security Psychology (YF, MS, HU), pp. 396–408.
HCISCSM-2015-BeldadK #facebook
It’s Not About the Risks, I’m just Used to Doing It: Disclosure of Personal Information on Facebook Among Adolescent Dutch Users (ADB, RK), pp. 185–195.
ICEISICEIS-v1-2015-AbakumovAV #information management #integration
Risk Management in Project of Information Systems Integration During Merger of Companies (EMA, DMA, AV), pp. 221–227.
ICEISICEIS-v3-2015-ProencaNBB #approach
Digital Curation Costs — A Risk Management Approach Supported by the Business Model Canvas (DP, AN, RB, JLB), pp. 299–306.
KDDKDD-2015-DhurandharGRME #big data
Big Data System for Analyzing Risky Procurement Entities (AD, BG, RKR, GM, ME), pp. 1741–1750.
KDDKDD-2015-SunWH #approach #named #predict
LINKAGE: An Approach for Comprehensive Risk Prediction for Care Management (ZS, FW, JH), pp. 1145–1154.
SEKESEKE-2015-BarchetSF #analysis #collaboration #dependence
Analysis of Risk Dependencies in Collaborative Risk Management (CB, LAdLS, LMF), pp. 314–319.
REFSQREFSQ-2015-GramaticaLMPT #assessment #empirical #security
The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals (MdG, KL, FM, FP, AT), pp. 98–114.
REFSQREFSQ-2015-VriezekolkEW #assessment #validation
Experimental Validation of a Risk Assessment Method (EV, SE, RW), pp. 1–16.
ESEC-FSEESEC-FSE-2015-RosenGS #commit #predict
Commit guru: analytics and risk prediction of software commits (CR, BG, ES), pp. 966–969.
SACSAC-2015-ShahriarH #approach #assessment #metric #security #web
Security assessment of clickjacking risks in web applications: metrics based approach (HS, HMH), pp. 791–797.
JCDLJCDL-2014-FerreiraVB #data transformation
The value of risk management for data management in science and engineering (FF, RV, JLB), pp. 439–440.
CSEETCSEET-2014-Koolmanojwong #re-engineering
Top-10 risks in real-client software engineering class projects (SK), pp. 201–202.
SANERCSMR-WCRE-2014-AntinyanSMOWWHH #agile #case study #development #experience #identification #industrial
Identifying risky areas of software code in Agile/Lean software development: An industrial experience report (VA, MS, WM, , EW, JW, AH, JH), pp. 154–163.
HCIDUXU-TMT-2014-CorreiaSCBS #design #safety
Design as a Tool for Managing Risks and Vulnerabilities Regarding Artifacts of Public Safety (WC, SXdS, FC, MLNB, MMS), pp. 437–444.
CAiSECAiSE-2014-StulpnagelOS #logic #markov #network
IT Risk Management with Markov Logic Networks (JvS, JO, JS), pp. 301–315.
EDOCEDOC-2014-KormanSHBE #assessment #enterprise #overview #security
Overview of Enterprise Information Needs in Information Security Risk Assessment (MK, TS, JH, JEB, ME), pp. 42–51.
ICEISICEIS-v3-2014-BenaijaK
Trade off Between Risk Management, Value Creation and Strategic Alignment in Project Portfolio Management (KB, LK), pp. 447–452.
ICPRICPR-2014-WangWH #framework #learning #multi #predict
A Multi-task Learning Framework for Joint Disease Risk Prediction and Comorbidity Discovery (XW, FW, JH), pp. 220–225.
KDDKDD-2014-TamhaneISDA #analysis #predict #student
Predicting student risks through longitudinal analysis (AT, SI, BS, MD, JA), pp. 1544–1552.
KDDKDD-2014-WangZQWD #multi #predict
Clinical risk prediction with multilinear sparse logistic regression (FW, PZ, BQ, XW, ID), pp. 145–154.
SEKESEKE-2014-DegrossiAFM #approach
Flood Citizen Observatory: a crowdsourcing-based approach for flood risk management in Brazil (LCD, JPdA, MCF, EMM), pp. 570–575.
SEKESEKE-2014-MachadoSFC #collaboration #reasoning
Case-based Reasoning for Experience-based Collaborative Risk Management (NLRM, LAdLS, LMF, JAC), pp. 262–267.
SEKESEKE-2014-OdzalyGS #agile #lightweight
Lightweight Risk Management in Agile Projects (EEO, DG, DS), pp. 576–581.
SIGIRSIGIR-2014-LeeTC #behaviour #multi
Characterizing multi-click search behavior and the risks and opportunities of changing results during use (CJL, JT, SdlC), pp. 515–524.
RERE-2014-Ionita #evaluation #identification #information management #security
Context-sensitive Information security Risk identification and evaluation techniques (DI), pp. 485–488.
SACSAC-2014-ShahriarH #assessment #fuzzy #injection #using
Risk assessment of code injection vulnerabilities using fuzzy logic-based system (HS, HH), pp. 1164–1170.
CSEETCSEET-2013-KoolmanojwongB #re-engineering
A look at software engineering risks in a team project course (SK, BWB), pp. 21–30.
GT-VMTGT-VMT-2013-MicallefC #case study #detection #modelling #visual notation
A Case Study on Graphically Modelling and Detecting Knowledge Mobility Risks (MM, CC).
HCIDHM-HB-2013-Hedge
Evaluating Ergonomics Risks for Digital Radiologists (AH), pp. 50–58.
HCIDHM-SET-2013-BrixeyT
Homecare Risk Management: Nursing Issues Related to Technology (JJB, JPT), pp. 157–162.
HCIDHM-SET-2013-KongZC #behaviour #predict
Personality and Attitudes as Predictors of Risky Driving Behavior: Evidence from Beijing Drivers (JK, KZ, XC), pp. 38–44.
HCIDUXU-CXC-2013-PlogmannJJR #development #evaluation #knowledge-based #using
Development and Evaluation of a Knowledge-Based Method for the Treatment of Use-Oriented and Technical Risks Using the Example of Medical Devices (SP, AJ, AJT, KR), pp. 452–461.
EDOCEDOC-2013-BraunE #concept #network #online #overview #social #towards
Towards a Conceptualization of Corporate Risks in Online Social Networks: A Literature Based Overview of Risks (RB, WE), pp. 267–274.
EDOCEDOC-2013-SousaMGM #approach #architecture #data type #enterprise #using
Assessing Risks and Opportunities in Enterprise Architecture Using an Extended ADT Approach (SS, DM, KG, NM), pp. 81–90.
ICEISICEIS-J-2013-LiuDH13a
Business Intelligence for Improving Supply Chain Risk Management (LL, HAMD, WH), pp. 190–205.
ICEISICEIS-v1-2013-LiuDH #assessment #detection #exception
Detecting and Explaining Business Exceptions for Risk Assessment (LL, HAMD, WH), pp. 530–535.
KDDKDD-2013-TranPLHBV #framework #predict
An integrated framework for suicide risk prediction (TT, DQP, WL, RH, MB, SV), pp. 1410–1418.
KDIRKDIR-KMIS-2013-Ibarra-SanchezPO #analysis #case study #using
Hospital Risk Management using Healthcare Failure Mode and Effects Analysis — A Case Study on Ventilators Whithin an Intensive Care Unit (MAIS, ABPA, MROP), pp. 328–335.
RecSysRecSys-2013-ZhangWCZ #personalisation #perspective
To personalize or not: a risk management perspective (WZ, JW, BC, XZ), pp. 229–236.
SEKESEKE-2013-SeveroFS #approach #collaboration #game studies
A Dialogue Game Approach to Collaborative Risk Management (FS, LMF, LAdLS), pp. 548–551.
RERE-2013-ZarghamiVESW #identification
Assumption-based risk identification method (ARM) in dynamic service provisioning (AZ, EV, MZE, MvS, RW), pp. 175–184.
REFSQREFSQ-2013-CallelePW #identification #interface #requirements
Risk Identification at the Interface between Business Case and Requirements (DC, BP, KW), pp. 253–268.
ASEASE-2013-NejatiABHBC #cpu #embedded
Minimizing CPU time shortage risks in integrated embedded software (SN, MA, LCB, JH, JB, YC), pp. 529–539.
ESEC-FSEESEC-FSE-2013-MockusHP #approach #quality
Risky files: an approach to focus quality improvement effort (AM, RLH, JDP), pp. 691–694.
CASECASE-2013-GohWYFPLL #monitoring #named #realtime #visualisation
RiskVis: Supply chain visualization with risk management and real-time monitoring (RSMG, ZW, XY, XF, LP, SL, XL), pp. 207–212.
SIGITESIGITE-2012-KercherR #student #using
Risks, rewards and raising awareness: training a cyber workforce using student red teams (KEK, DCR), pp. 75–80.
CHICHI-2012-GulottaFM #image #online
Curation, provocation, and digital identity: risks and motivations for sharing provocative images online (RG, HF, JM), pp. 387–390.
SEKESEKE-2012-LobatoMNAM #synthesis
Synthesizing Evidence on Risk Management: A Narrative Synthesis of two Mapping Studies (LLL, IdCM, PAdMSN, ESdA, SRdLM), pp. 641–646.
REFSQREFSQ-2012-ChowdhuryMSK #diagrams #requirements #security
Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions (MJMC, RM, GS, PK), pp. 132–139.
CHICHI-2011-RaijGKS #mobile #privacy #smarttech
Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment (AR, AG, SK, MBS), pp. 11–20.
HCIDUXU-v2-2011-InversiniCB #analysis #assessment #case study #experience #usability #user interface
Connecting Usages with Usability Analysis through the User Experience Risk Assessment Model: A Case Study in the Tourism Domain (AI, LC, DB), pp. 283–293.
HCIHCI-MIIE-2011-HondaSN #process #recognition
Activity Recognition for Risk Management with Installed Sensor in Smart and Cell Phone (DH, NS, SN), pp. 230–239.
ICEISICEIS-v1-2011-AsghariNAA #approach #enterprise #fuzzy #implementation #resource management #using
Risk Management in Enterprise Resource Planning Implementation using a Fuzzy Approach (HAA, MN, FA, FA), pp. 290–294.
ICEISICEIS-v1-2011-SchrodlGLT #assessment #framework #hybrid #network
Risk Management in Supply Networks for Hybrid Value Bundles — A Risk Assessment Framework (HS, MG, LL, KT), pp. 157–162.
ICEISICEIS-v2-2011-LiW #enterprise #research
Research on Integrated Management and Control System in Enterprises based on Project Risks (YL, YW), pp. 318–322.
ICEISICEIS-v2-2011-YangJ #implementation #research
Research on Critical Chain Management and Risk Management in Project Implementation Management (ZY, JJ), pp. 351–356.
ICEISICEIS-v2-2011-ZhuXM #assessment #network #using
Operational Hazard Risk Assessment using Bayesian Networks (ZJZ, YX, EM), pp. 135–139.
ICEISICEIS-v3-2011-QuG #analysis #identification #outsourcing
The Analysis of IT Outsourcing Risk Identification on Principal-agent Theory (LQ, ZG), pp. 488–491.
SEKESEKE-2011-FuginiRIRC #monitoring #simulation
Simulations of Risks for Monitoring and Prevention (MGF, FR, RI, CR, OC), pp. 602–607.
SEKESEKE-2011-GregoriadesLP11a #calculus #using
Project Risk Management Using Event Calculus(S) (AG, VPL, PP), pp. 335–338.
SPLCSPLC-2011-QuiltyC #case study #development #experience #product line
Experiences with Software Product Line Development in Risk Management Software (GQ, MÓC), pp. 251–260.
ICSEICSE-2011-GodeK #clone tracking
Frequency and risks of changes to clones (NG, RK), pp. 311–320.
ASEASE-2010-KessentiniVS #identification
Deviance from perfection is a better criterion than closeness to evil when identifying risky code (MK, SV, HAS), pp. 113–122.
ICSEICSE-2010-Lima #assessment #distributed
Risk assessment on distributed software projects (AML), pp. 349–350.
ICSTICST-2010-Bubevski #assessment #simulation #testing
An Application of Six Sigma and Simulation in Software Testing Risk Assessment (VB), pp. 295–302.
CSEETCSEET-2009-AhteeP #student
Risks in Students’ Software Projects (TA, TP), pp. 154–157.
SIGITESIGITE-2009-PakC #assessment #markov #modelling #using
Asset priority risk assessment using hidden markov models (CP, JC), pp. 65–73.
ICSMEICSM-2009-BettenburgSH #empirical #off the shelf #using
An empirical study on the risks of using off-the-shelf techniques for processing mailing list data (NB, ES, AEH), pp. 539–542.
HCIDHM-2009-FallonCP #assessment #learning
Learning from Risk Assessment in Radiotherapy (EFF, LC, WJvdP), pp. 502–511.
HCIHCI-VAD-2009-KandoganHBM #collaboration #delivery
Studying Reactive, Risky, Complex, Long-Spanning, and Collaborative Work: The Case of IT Service Delivery (EK, EMH, JHB, PPM), pp. 504–513.
SEKESEKE-2009-GaoSSVPDB #assessment #estimation #problem
Systematic Risk Assessment and Cost Estimation for Software Problems (JG, MS, MS, DV, PP, KD, EB), pp. 103–109.
SEKESEKE-2009-WilliamsR #statistics #using
Accelerated Risk Management using Statistical Triggers (RW, KR), pp. 643–648.
SIGIRSIGIR-2009-ZhuWCT #information retrieval #modelling #nondeterminism
Risky business: modeling and exploiting uncertainty in information retrieval (JZ, JW, IJC, MJT), pp. 99–106.
RERE-2009-FailyF #requirements
Context-Sensitive Requirements and Risk Management with IRIS (SF, IF), pp. 379–380.
DACDAC-2009-Anderson #complexity #design
Beyond innovation: dealing with the risks and complexity of processor design in 22nm (CJA), p. 103.
CSEETCSEET-2008-MeyerP #case study #development #distributed #experience #re-engineering
The Allure and Risks of a Deployable Software Engineering Project: Experiences with Both Local and Distributed Development (BM, MP), pp. 3–16.
SIGITESIGITE-2008-Pak #assessment #realtime #statistics
The near real time statistical asset priority driven (nrtsapd) risk assessment methodology (CP), pp. 105–112.
CAiSECAiSE-2008-MatuleviciusMMDHG #adaptation #development #information management #security
Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development (RM, NM, HM, ED, PH, NG), pp. 541–555.
SEKESEKE-2008-FontouraP #approach #process
Systematic Approach to Risk Management in Software Projects through Process Tailoring (LMF, RTP), pp. 179–184.
CSEETCSEET-2007-Taran #education #game studies #re-engineering #using
Using Games in Software Engineering Education to Teach Risk Management (GT), pp. 211–220.
RERE-2007-GandhiL #assessment #certification #comprehension #correlation #multi #requirements
Discovering and Understanding Multi-dimensional Correlations among Certification Requirements with application to Risk Assessment (RAG, SWL), pp. 231–240.
SACSAC-2007-HostL #assessment #concept
Different conceptions in software project risk assessment (MH, CL), pp. 1422–1426.
CASECASE-2007-MishraV #framework
A CBR-based Decision Support System Framework for Construction Supply Chain Risk Management (VKM, NV), pp. 980–985.
CHICHI-2006-BenfordCRSDFD #case study #design #experience #staging
Designing for the opportunities and risks of staging digital experiences in public settings (SB, AC, SR, JGS, AJD, MF, AD), pp. 427–436.
ICEISICEIS-AIDSS-2006-ThuD #predict #using
Predicting Cardiovascular Risks — Using POSSUM, PPOSSUM and Neural Net Techniques (TNTT, DND), pp. 230–234.
SIGIRSIGIR-2006-FrankowskiCSTR #privacy #what
You are what you say: privacy risks of public mentions (DF, DC, SS, LGT, JR), pp. 565–572.
MODELSMoDELS-2006-HogganvikS #approach #empirical #identification #motivation #visual notation
A Graphical Approach to Risk Identification, Motivated by Empirical Investigations (IH, KS), pp. 574–588.
MODELSMoDELS-2006-HogganvikS #approach #empirical #identification #motivation #visual notation
A Graphical Approach to Risk Identification, Motivated by Empirical Investigations (IH, KS), pp. 574–588.
RERE-2006-PichlerRW #agile #case study #requirements #social
Agile Requirements Engineering for a Social Insurance for Occupational Risks Organization: A Case Study (MP, HR, WW), pp. 246–251.
ITiCSEITiCSE-2005-ArmenM #education
Teaching about the risks of electronic voting technology (CA, RM), pp. 227–231.
CIKMCIKM-2005-LorenzGLTH
Situation-aware risk management in autonomous agents (ML, JDG, HL, IJT, JH), pp. 363–364.
RERE-2005-ChisanD #requirements
Exploring the role of requirements engineering in improving risk management (JC, DD), pp. 481–482.
ASEASE-2005-HeartyFNC #assessment #automation #modelling
Automated population of causal models for improved software risk assessment (PH, NEF, MN, PC), pp. 433–434.
SACSAC-2005-WongQC #source code
Source code-based software risk assessing (WEW, YQ, KMLC), pp. 1485–1490.
CSEETCSEET-2004-SeidmanF #re-engineering #source code
Software Offshoring ?^(a) Risks and Opportunities for Software Engineering Programs (SBS, LF), p. 153.
SIGITESIGITE-2004-Dark #assessment #learning #performance #security #student
Assessing student performance outcomes in an information security risk assessment, service learning course (MJD), pp. 73–78.
LSOLSO-2004-FalboRBT #how #learning #using
Learning How to Manage Risks Using Organizational Knowledge (RdAF, FBR, GB, DFT), pp. 7–18.
SEKESEKE-2004-CostaBT #evaluation
Software Project Risk Evaluation based on Specific and Systemic Risks (HRC, MdOB, GHT), pp. 282–287.
SEKESEKE-2004-RayKDS #assessment #automation
Automated Risk Assessment for Managing Software Projects (BKR, TK, RD, PS), pp. 372–377.
ICSEICSE-2004-KontioHRA #agile #challenge #development #distributed
Managing Commitments and Risks: Challenges in Distributed Agile Development (JK, MH, JR, PA), pp. 732–733.
ICSMEICSM-2003-DeursenK #assessment
Source-Based Software Risk Assessment (AvD, TK), pp. 385–388.
VISSOFTVISSOFT-2003-RodriguezK #visualisation
Visualization for Software Risk Assessments (JVR, TK), pp. 87–91.
ICEISICEIS-v2-2003-CanforaT #assessment
Dealing with the “Don’t Know” Answer in Risk Assessment (GC, LT), pp. 229–237.
SEKESEKE-2003-Ochs #assessment #off the shelf #requirements #using
Using Software Risk Management for Deriving Method Requirements for Risk Mitigation in COTS Assessment and Selection (MO), pp. 639–646.
ICSEICSE-2003-WangHGAGA #architecture #assessment #specification #uml
Architectural Level Risk Assessment Tool Based on UML Specifications (TW, AEH, AG, WA, KGP, HHA), pp. 808–809.
CSEETCSEET-2002-FullerCD #approach #case study #education
A New Approach to Teaching Software Risk Management with Case Studies (AF, PRC, LD), p. 215–?.
EDOCEDOC-2002-AagedalBDGRS #assessment #enterprise #modelling #security
Model-Based Risk Assessment to Improve Enterprise Security (JØA, FdB, TD, BAG, DR, KS), p. 51–?.
RERE-2002-Doernemann
Tool-Based Risk Management Made Practical (HD), p. 192.
RERE-2002-Kozaczynski #architecture #requirements
Requirements, Architectures and Risks (WK), pp. 6–7.
RERE-2002-Schoenthaler
Risk Management in Challenging Business Software Projects (FS), pp. 8–12.
WCREWCRE-2001-Deursen #comprehension #programming
Program Comprehension Risks and Opportunities in Extreme Programming (AvD), p. 176–?.
EDOCEDOC-2001-WangC #distributed #enterprise
A Method to Reduce Risks in Building Distributed Enterprise Systems (GW, GC), pp. 164–168.
FSEESEC-FSE-2001-FreimutHKKK #case study #implementation #industrial
An industrial case study of implementing software risk management (BGF, SH, PK, JK, WK), pp. 277–287.
AdaEuropeAdaEurope-2000-WielandHS
Enhancements in Software Project Risk Management (PW, FH, KS), pp. 161–172.
REICRE-2000-Neumann
Requirements-Related Risks in Critical Systems (PGN), p. 3–?.
ASEASE-2000-FeatherCL #tool support
Combining the Best Attributes of Qualitative and Quantitative Risk Management Tool Support (MSF, SLC, TWL), pp. 309–312.
ASEASE-2000-MenziesS #assessment #case study #query #scalability
Practical Large Scale What-If Queries: Case Studies with Software Risk Assessment (TM, ES), p. 165–?.
ICSEICSE-2000-MizunoKTS #evaluation
Characterization of risky projects based on project managers’ evaluation (OM, TK, YT, KS), pp. 387–395.
ITiCSEITiCSE-1999-ParkerH #industrial
Campus-based industrial software projects: risks and rewards (HP, MH), p. 189.
WCREWCRE-1999-Sneed #re-engineering
Risks Involved in Reengineering Projects (HMS), pp. 204–211.
CAiSECAiSE-1999-VerhoefF #in the large
Risk Management for IT in the Large (DV, MF), pp. 57–72.
MLDMMLDM-1999-Scaringella #data mining #mining #monitoring
A Data Mining Application for Monitoring Environmental Risks (AS), pp. 209–215.
RERE-1999-GreerBS #using
Prioritisation of System Changes using Cost-Benefit and Risk Assessments (DG, DWB, TS), p. 180–?.
ICSEICSE-1999-BenlarbiM #metric #morphism #polymorphism #predict
Polymorphism Measures for Early Risk Prediction (SB, WLM), pp. 334–344.
ICSEICSE-1999-Kontio #development #overview
Risk Management in Software Development: A Technology Overview and the Riskit Method (JK), pp. 679–680.
SACSAC-1999-FinkH #assessment #multi
The Disease Progression Explorer: Risk Assessment Support in Chronic, Multifactorial Diseases (PKF, LTH), pp. 46–51.
CSEETCSEET-1998-Hall
Training Risk Management: Bridge over Troubled Waters (EMH), pp. 36–39.
CAiSECAiSE-1998-TanziSG #information management #realtime
Real-Time Information System for Risk Management on Motorways (TT, SS, RG), pp. 325–338.
FSEFSE-1998-KontioGL #case study #concept #experience #process #using
Experiences in Improving Risk Management Processes Using the Concepts of the Riskit Method (JK, GG, DL), pp. 163–172.
ICSEICSE-1998-BriandEB #assessment #benchmark #estimation #hybrid #metric #named
COBRA: A Hybrid Method for Software Cost Estimation, Benchmarking, and Risk Assessment (LCB, KEE, FB), pp. 390–399.
ICMLICML-1996-EzawaSN #learning #network
Learning Goal Oriented Bayesian Networks for Telecommunications Risk Management (KJE, MS, SWN), pp. 139–147.
ASEKBSE-1994-Madachy #assessment #estimation #knowledge-based
Knowledge-Based Risk Assessment and Cost Estimation (RJM), pp. 172–178.
ASEKBSE-1994-Toth
Software Technology Risk Advisor (GAT), pp. 179–188.
PDPPDP-1994-GulleyCW #parallel #performance
Controlling Parallel Software Performance Risks With VPB (JWG, PJCC, SRW), pp. 366–371.
ICSMECSM-1993-HinleyB
Reducing the Risks in Software Improvement Through Process-Orientated Management (DSH, KHB), pp. 319–328.
SEKESEKE-1993-Paul #maturity #metric
Software Maturity Measurement for Software Risk Management (RAP), pp. 641–648.
ESECESEC-1989-Boehm
Software Risk Management (BWB), pp. 1–19.
SOSPSOSP-1989-LomasGSN
Reducing Risks from Poorly Chosen Keys (TMAL, LG, JHS, RMN), pp. 14–18.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.