Tag #risk management
156 papers:
CIKM-2019-TanMYYDWTYWCCY #named #network #predict- UA-CRNN: Uncertainty-Aware Convolutional Recurrent Neural Network for Mortality Risk Prediction (QT, AJM, MY, BY, HD, VWSW, YKT, TCFY, GLHW, JYLC, FKLC, PCY), pp. 109–118.
ECIR-p2-2019-LosadaCP #detection #internet- Early Detection of Risks on the Internet: An Exploratory Campaign (DEL, FC, JP), pp. 259–266.
ECIR-p2-2019-Masood #adaptation #internet #modelling #predict- Adapting Models for the Case of Early Risk Prediction on the Internet (RM), pp. 353–358.
KDD-2019-ZhangTDZW #health #named #predict- MetaPred: Meta-Learning for Clinical Risk Prediction with Limited Patient Electronic Health Records (XSZ, FT, HHD, JZ, FW), pp. 2487–2495.
ASE-2019-MichaelDDLS #programming #regular expression- Regexes are Hard: Decision-Making, Difficulties, and Risks in Programming Regular Expressions (LGMI, JD, JCD, DL, FS), pp. 415–426.
ESEC-FSE-2019-OlssonF #ecosystem #industrial #mining- Risks and assets: a qualitative study of a software ecosystem in the mining industry (TO, UF), pp. 895–904.
KDD-2018-MaGSYZZ #health #predict- Risk Prediction on Electronic Health Records with Prior Medical Knowledge (FM, JG0, QS, QY, JZ, AZ), pp. 1910–1919.
KDD-2018-WaliaHCCLKNBAM #pipes and filters #predict- A Dynamic Pipeline for Spatio-Temporal Fire Risk Prediction (BSW, QH, JC, FC, JL, NK, PN, JB, GA, MM), pp. 764–773.
- ICSE-2018-LabunetsMPMO #assessment #comparison #comprehension #empirical #security #visual notation
- Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations (KL, FM, FP, SM, FMdO), p. 395.
VS-Games-2017-EllmersYP #game studies- Integratingfall-risk assessments within a simple balance exergame (TJE, WRY, ITP), pp. 245–248.
CIKM-2016-Grushka-CohenSB #assessment #database #elicitation #named #security- CyberRank: Knowledge Elicitation for Risk Assessment of Database Security (HGC, OS, OB, BS, LR), pp. 2009–2012.
KDD-2016-SalehiRLP #approach #predict #robust- Dynamic and Robust Wildfire Risk Prediction System: An Unsupervised Approach (MS, LIR, TML, AP), pp. 245–254.
MSR-2015-ChoetkiertikulD #predict- Characterization and Prediction of Issue-Related Risks in Software Projects (MC, HKD, TT, AG), pp. 280–291.
SANER-2015-KnodelNBV - Software risk management in practice: Shed light on your software product (JK, MN, EB, JV), pp. 592–594.
DHM-HM-2015-KlugeKZ #energy- Inside the User’s Mind — Perception of Risks and Benefits of Unknown Technologies, Exemplified by Geothermal Energy (JK, SK, MZ), pp. 324–334.
DUXU-DD-2015-FanHV #big data- Supply Chain Risk Management in the Era of Big Data (YF, LH, SV), pp. 283–294.
DUXU-IXD-2015-Celi #experience #learning #modelling #user interface- Application of Dashboards and Scorecards for Learning Models IT Risk Management: A User Experience (EC), pp. 153–165.
HCI-UC-2015-FukuzawaSU #overview #security- Survey on Risk Management Based on Information Security Psychology (YF, MS, HU), pp. 396–408.
SCSM-2015-BeldadK #facebook- It’s Not About the Risks, I’m just Used to Doing It: Disclosure of Personal Information on Facebook Among Adolescent Dutch Users (ADB, RK), pp. 185–195.
ICEIS-v1-2015-AbakumovAV #information management #integration- Risk Management in Project of Information Systems Integration During Merger of Companies (EMA, DMA, AV), pp. 221–227.
ICEIS-v3-2015-ProencaNBB #approach- Digital Curation Costs — A Risk Management Approach Supported by the Business Model Canvas (DP, AN, RB, JLB), pp. 299–306.
KDD-2015-DhurandharGRME #big data- Big Data System for Analyzing Risky Procurement Entities (AD, BG, RKR, GM, ME), pp. 1741–1750.
KDD-2015-SunWH #approach #named #predict- LINKAGE: An Approach for Comprehensive Risk Prediction for Care Management (ZS, FW, JH), pp. 1145–1154.
SEKE-2015-BarchetSF #analysis #collaboration #dependence- Analysis of Risk Dependencies in Collaborative Risk Management (CB, LAdLS, LMF), pp. 314–319.
REFSQ-2015-GramaticaLMPT #assessment #empirical #security- The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals (MdG, KL, FM, FP, AT), pp. 98–114.
REFSQ-2015-VriezekolkEW #assessment #validation- Experimental Validation of a Risk Assessment Method (EV, SE, RW), pp. 1–16.
ESEC-FSE-2015-RosenGS #commit #predict- Commit guru: analytics and risk prediction of software commits (CR, BG, ES), pp. 966–969.
SAC-2015-ShahriarH #approach #assessment #metric #security #web- Security assessment of clickjacking risks in web applications: metrics based approach (HS, HMH), pp. 791–797.
JCDL-2014-FerreiraVB #data transformation- The value of risk management for data management in science and engineering (FF, RV, JLB), pp. 439–440.
CSEET-2014-Koolmanojwong #re-engineering- Top-10 risks in real-client software engineering class projects (SK), pp. 201–202.
CSMR-WCRE-2014-AntinyanSMOWWHH #agile #case study #development #experience #identification #industrial- Identifying risky areas of software code in Agile/Lean software development: An industrial experience report (VA, MS, WM, PÖ, EW, JW, AH, JH), pp. 154–163.
DUXU-TMT-2014-CorreiaSCBS #design #safety- Design as a Tool for Managing Risks and Vulnerabilities Regarding Artifacts of Public Safety (WC, SXdS, FC, MLNB, MMS), pp. 437–444.
CAiSE-2014-StulpnagelOS #logic #markov #network- IT Risk Management with Markov Logic Networks (JvS, JO, JS), pp. 301–315.
EDOC-2014-KormanSHBE #assessment #enterprise #overview #security- Overview of Enterprise Information Needs in Information Security Risk Assessment (MK, TS, JH, JEB, ME), pp. 42–51.
ICEIS-v3-2014-BenaijaK - Trade off Between Risk Management, Value Creation and Strategic Alignment in Project Portfolio Management (KB, LK), pp. 447–452.
ICPR-2014-WangWH #framework #learning #multi #predict- A Multi-task Learning Framework for Joint Disease Risk Prediction and Comorbidity Discovery (XW, FW, JH), pp. 220–225.
KDD-2014-TamhaneISDA #analysis #predict #student- Predicting student risks through longitudinal analysis (AT, SI, BS, MD, JA), pp. 1544–1552.
KDD-2014-WangZQWD #multi #predict- Clinical risk prediction with multilinear sparse logistic regression (FW, PZ, BQ, XW, ID), pp. 145–154.
SEKE-2014-DegrossiAFM #approach- Flood Citizen Observatory: a crowdsourcing-based approach for flood risk management in Brazil (LCD, JPdA, MCF, EMM), pp. 570–575.
SEKE-2014-MachadoSFC #collaboration #reasoning- Case-based Reasoning for Experience-based Collaborative Risk Management (NLRM, LAdLS, LMF, JAC), pp. 262–267.
SEKE-2014-OdzalyGS #agile #lightweight- Lightweight Risk Management in Agile Projects (EEO, DG, DS), pp. 576–581.
SIGIR-2014-LeeTC #behaviour #multi- Characterizing multi-click search behavior and the risks and opportunities of changing results during use (CJL, JT, SdlC), pp. 515–524.
RE-2014-Ionita #evaluation #identification #information management #security- Context-sensitive Information security Risk identification and evaluation techniques (DI), pp. 485–488.
SAC-2014-ShahriarH #assessment #fuzzy #injection #using- Risk assessment of code injection vulnerabilities using fuzzy logic-based system (HS, HH), pp. 1164–1170.
CSEET-2013-KoolmanojwongB #re-engineering- A look at software engineering risks in a team project course (SK, BWB), pp. 21–30.
GT-VMT-2013-MicallefC #case study #detection #modelling #visual notation- A Case Study on Graphically Modelling and Detecting Knowledge Mobility Risks (MM, CC).
DHM-HB-2013-Hedge - Evaluating Ergonomics Risks for Digital Radiologists (AH), pp. 50–58.
DHM-SET-2013-BrixeyT - Homecare Risk Management: Nursing Issues Related to Technology (JJB, JPT), pp. 157–162.
DHM-SET-2013-KongZC #behaviour #predict- Personality and Attitudes as Predictors of Risky Driving Behavior: Evidence from Beijing Drivers (JK, KZ, XC), pp. 38–44.
DUXU-CXC-2013-PlogmannJJR #development #evaluation #knowledge-based #using- Development and Evaluation of a Knowledge-Based Method for the Treatment of Use-Oriented and Technical Risks Using the Example of Medical Devices (SP, AJ, AJT, KR), pp. 452–461.
EDOC-2013-BraunE #concept #network #online #overview #social #towards- Towards a Conceptualization of Corporate Risks in Online Social Networks: A Literature Based Overview of Risks (RB, WE), pp. 267–274.
EDOC-2013-SousaMGM #approach #architecture #data type #enterprise #using- Assessing Risks and Opportunities in Enterprise Architecture Using an Extended ADT Approach (SS, DM, KG, NM), pp. 81–90.
ICEIS-J-2013-LiuDH13a - Business Intelligence for Improving Supply Chain Risk Management (LL, HAMD, WH), pp. 190–205.
ICEIS-v1-2013-LiuDH #assessment #detection #exception- Detecting and Explaining Business Exceptions for Risk Assessment (LL, HAMD, WH), pp. 530–535.
KDD-2013-TranPLHBV #framework #predict- An integrated framework for suicide risk prediction (TT, DQP, WL, RH, MB, SV), pp. 1410–1418.
KDIR-KMIS-2013-Ibarra-SanchezPO #analysis #case study #using- Hospital Risk Management using Healthcare Failure Mode and Effects Analysis — A Case Study on Ventilators Whithin an Intensive Care Unit (MAIS, ABPA, MROP), pp. 328–335.
RecSys-2013-ZhangWCZ #personalisation #perspective- To personalize or not: a risk management perspective (WZ, JW, BC, XZ), pp. 229–236.
SEKE-2013-SeveroFS #approach #collaboration #game studies- A Dialogue Game Approach to Collaborative Risk Management (FS, LMF, LAdLS), pp. 548–551.
RE-2013-ZarghamiVESW #identification- Assumption-based risk identification method (ARM) in dynamic service provisioning (AZ, EV, MZE, MvS, RW), pp. 175–184.
REFSQ-2013-CallelePW #identification #interface #requirements- Risk Identification at the Interface between Business Case and Requirements (DC, BP, KW), pp. 253–268.
ASE-2013-NejatiABHBC #cpu #embedded- Minimizing CPU time shortage risks in integrated embedded software (SN, MA, LCB, JH, JB, YC), pp. 529–539.
ESEC-FSE-2013-MockusHP #approach #quality- Risky files: an approach to focus quality improvement effort (AM, RLH, JDP), pp. 691–694.
CASE-2013-GohWYFPLL #monitoring #named #realtime #visualisation- RiskVis: Supply chain visualization with risk management and real-time monitoring (RSMG, ZW, XY, XF, LP, SL, XL), pp. 207–212.
SIGITE-2012-KercherR #student #using- Risks, rewards and raising awareness: training a cyber workforce using student red teams (KEK, DCR), pp. 75–80.
CHI-2012-GulottaFM #image #online- Curation, provocation, and digital identity: risks and motivations for sharing provocative images online (RG, HF, JM), pp. 387–390.
SEKE-2012-LobatoMNAM #synthesis- Synthesizing Evidence on Risk Management: A Narrative Synthesis of two Mapping Studies (LLL, IdCM, PAdMSN, ESdA, SRdLM), pp. 641–646.
REFSQ-2012-ChowdhuryMSK #diagrams #requirements #security- Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions (MJMC, RM, GS, PK), pp. 132–139.
CHI-2011-RaijGKS #mobile #privacy #smarttech- Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment (AR, AG, SK, MBS), pp. 11–20.
DUXU-v2-2011-InversiniCB #analysis #assessment #case study #experience #usability #user interface- Connecting Usages with Usability Analysis through the User Experience Risk Assessment Model: A Case Study in the Tourism Domain (AI, LC, DB), pp. 283–293.
HCI-MIIE-2011-HondaSN #process #recognition- Activity Recognition for Risk Management with Installed Sensor in Smart and Cell Phone (DH, NS, SN), pp. 230–239.
ICEIS-v1-2011-AsghariNAA #approach #enterprise #fuzzy #implementation #resource management #using- Risk Management in Enterprise Resource Planning Implementation using a Fuzzy Approach (HAA, MN, FA, FA), pp. 290–294.
ICEIS-v1-2011-SchrodlGLT #assessment #framework #hybrid #network- Risk Management in Supply Networks for Hybrid Value Bundles — A Risk Assessment Framework (HS, MG, LL, KT), pp. 157–162.
ICEIS-v2-2011-LiW #enterprise #research- Research on Integrated Management and Control System in Enterprises based on Project Risks (YL, YW), pp. 318–322.
ICEIS-v2-2011-YangJ #implementation #research- Research on Critical Chain Management and Risk Management in Project Implementation Management (ZY, JJ), pp. 351–356.
ICEIS-v2-2011-ZhuXM #assessment #network #using- Operational Hazard Risk Assessment using Bayesian Networks (ZJZ, YX, EM), pp. 135–139.
ICEIS-v3-2011-QuG #analysis #identification #outsourcing- The Analysis of IT Outsourcing Risk Identification on Principal-agent Theory (LQ, ZG), pp. 488–491.
SEKE-2011-FuginiRIRC #monitoring #simulation- Simulations of Risks for Monitoring and Prevention (MGF, FR, RI, CR, OC), pp. 602–607.
SEKE-2011-GregoriadesLP11a #calculus #using- Project Risk Management Using Event Calculus(S) (AG, VPL, PP), pp. 335–338.
SPLC-2011-QuiltyC #case study #development #experience #product line- Experiences with Software Product Line Development in Risk Management Software (GQ, MÓC), pp. 251–260.
ICSE-2011-GodeK #clone tracking- Frequency and risks of changes to clones (NG, RK), pp. 311–320.
ASE-2010-KessentiniVS #identification- Deviance from perfection is a better criterion than closeness to evil when identifying risky code (MK, SV, HAS), pp. 113–122.
ICSE-2010-Lima #assessment #distributed- Risk assessment on distributed software projects (AML), pp. 349–350.
ICST-2010-Bubevski #assessment #simulation #testing- An Application of Six Sigma and Simulation in Software Testing Risk Assessment (VB), pp. 295–302.
CSEET-2009-AhteeP #student- Risks in Students’ Software Projects (TA, TP), pp. 154–157.
SIGITE-2009-PakC #assessment #markov #modelling #using- Asset priority risk assessment using hidden markov models (CP, JC), pp. 65–73.
ICSM-2009-BettenburgSH #empirical #off the shelf #using- An empirical study on the risks of using off-the-shelf techniques for processing mailing list data (NB, ES, AEH), pp. 539–542.
DHM-2009-FallonCP #assessment #learning- Learning from Risk Assessment in Radiotherapy (EFF, LC, WJvdP), pp. 502–511.
HCI-VAD-2009-KandoganHBM #collaboration #delivery- Studying Reactive, Risky, Complex, Long-Spanning, and Collaborative Work: The Case of IT Service Delivery (EK, EMH, JHB, PPM), pp. 504–513.
SEKE-2009-GaoSSVPDB #assessment #estimation #problem- Systematic Risk Assessment and Cost Estimation for Software Problems (JG, MS, MS, DV, PP, KD, EB), pp. 103–109.
SEKE-2009-WilliamsR #statistics #using- Accelerated Risk Management using Statistical Triggers (RW, KR), pp. 643–648.
SIGIR-2009-ZhuWCT #information retrieval #modelling #nondeterminism- Risky business: modeling and exploiting uncertainty in information retrieval (JZ, JW, IJC, MJT), pp. 99–106.
RE-2009-FailyF #requirements- Context-Sensitive Requirements and Risk Management with IRIS (SF, IF), pp. 379–380.
DAC-2009-Anderson #complexity #design- Beyond innovation: dealing with the risks and complexity of processor design in 22nm (CJA), p. 103.
CSEET-2008-MeyerP #case study #development #distributed #experience #re-engineering- The Allure and Risks of a Deployable Software Engineering Project: Experiences with Both Local and Distributed Development (BM, MP), pp. 3–16.
SIGITE-2008-Pak #assessment #realtime #statistics- The near real time statistical asset priority driven (nrtsapd) risk assessment methodology (CP), pp. 105–112.
CAiSE-2008-MatuleviciusMMDHG #adaptation #development #information management #security- Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development (RM, NM, HM, ED, PH, NG), pp. 541–555.
SEKE-2008-FontouraP #approach #process- Systematic Approach to Risk Management in Software Projects through Process Tailoring (LMF, RTP), pp. 179–184.
CSEET-2007-Taran #education #game studies #re-engineering #using- Using Games in Software Engineering Education to Teach Risk Management (GT), pp. 211–220.
RE-2007-GandhiL #assessment #certification #comprehension #correlation #multi #requirements- Discovering and Understanding Multi-dimensional Correlations among Certification Requirements with application to Risk Assessment (RAG, SWL), pp. 231–240.
SAC-2007-HostL #assessment #concept- Different conceptions in software project risk assessment (MH, CL), pp. 1422–1426.
CASE-2007-MishraV #framework- A CBR-based Decision Support System Framework for Construction Supply Chain Risk Management (VKM, NV), pp. 980–985.
CHI-2006-BenfordCRSDFD #case study #design #experience #staging- Designing for the opportunities and risks of staging digital experiences in public settings (SB, AC, SR, JGS, AJD, MF, AD), pp. 427–436.
ICEIS-AIDSS-2006-ThuD #predict #using- Predicting Cardiovascular Risks — Using POSSUM, PPOSSUM and Neural Net Techniques (TNTT, DND), pp. 230–234.
SIGIR-2006-FrankowskiCSTR #privacy #what- You are what you say: privacy risks of public mentions (DF, DC, SS, LGT, JR), pp. 565–572.
MoDELS-2006-HogganvikS #approach #empirical #identification #motivation #visual notation- A Graphical Approach to Risk Identification, Motivated by Empirical Investigations (IH, KS), pp. 574–588.
MoDELS-2006-HogganvikS #approach #empirical #identification #motivation #visual notation- A Graphical Approach to Risk Identification, Motivated by Empirical Investigations (IH, KS), pp. 574–588.
RE-2006-PichlerRW #agile #case study #requirements #social- Agile Requirements Engineering for a Social Insurance for Occupational Risks Organization: A Case Study (MP, HR, WW), pp. 246–251.
ITiCSE-2005-ArmenM #education- Teaching about the risks of electronic voting technology (CA, RM), pp. 227–231.
CIKM-2005-LorenzGLTH - Situation-aware risk management in autonomous agents (ML, JDG, HL, IJT, JH), pp. 363–364.
RE-2005-ChisanD #requirements- Exploring the role of requirements engineering in improving risk management (JC, DD), pp. 481–482.
ASE-2005-HeartyFNC #assessment #automation #modelling- Automated population of causal models for improved software risk assessment (PH, NEF, MN, PC), pp. 433–434.
SAC-2005-WongQC #source code- Source code-based software risk assessing (WEW, YQ, KMLC), pp. 1485–1490.
CSEET-2004-SeidmanF #re-engineering #source code- Software Offshoring ?^(a) Risks and Opportunities for Software Engineering Programs (SBS, LF), p. 153.
SIGITE-2004-Dark #assessment #learning #performance #security #student- Assessing student performance outcomes in an information security risk assessment, service learning course (MJD), pp. 73–78.
LSO-2004-FalboRBT #how #learning #using- Learning How to Manage Risks Using Organizational Knowledge (RdAF, FBR, GB, DFT), pp. 7–18.
SEKE-2004-CostaBT #evaluation- Software Project Risk Evaluation based on Specific and Systemic Risks (HRC, MdOB, GHT), pp. 282–287.
SEKE-2004-RayKDS #assessment #automation- Automated Risk Assessment for Managing Software Projects (BKR, TK, RD, PS), pp. 372–377.
ICSE-2004-KontioHRA #agile #challenge #development #distributed- Managing Commitments and Risks: Challenges in Distributed Agile Development (JK, MH, JR, PA), pp. 732–733.
ICSM-2003-DeursenK #assessment- Source-Based Software Risk Assessment (AvD, TK), pp. 385–388.
VISSOFT-2003-RodriguezK #visualisation- Visualization for Software Risk Assessments (JVR, TK), pp. 87–91.
ICEIS-v2-2003-CanforaT #assessment- Dealing with the “Don’t Know” Answer in Risk Assessment (GC, LT), pp. 229–237.
SEKE-2003-Ochs #assessment #off the shelf #requirements #using- Using Software Risk Management for Deriving Method Requirements for Risk Mitigation in COTS Assessment and Selection (MO), pp. 639–646.
ICSE-2003-WangHGAGA #architecture #assessment #specification #uml- Architectural Level Risk Assessment Tool Based on UML Specifications (TW, AEH, AG, WA, KGP, HHA), pp. 808–809.
CSEET-2002-FullerCD #approach #case study #education- A New Approach to Teaching Software Risk Management with Case Studies (AF, PRC, LD), p. 215–?.
EDOC-2002-AagedalBDGRS #assessment #enterprise #modelling #security- Model-Based Risk Assessment to Improve Enterprise Security (JØA, FdB, TD, BAG, DR, KS), p. 51–?.
RE-2002-Doernemann - Tool-Based Risk Management Made Practical (HD), p. 192.
RE-2002-Kozaczynski #architecture #requirements- Requirements, Architectures and Risks (WK), pp. 6–7.
RE-2002-Schoenthaler - Risk Management in Challenging Business Software Projects (FS), pp. 8–12.
WCRE-2001-Deursen #comprehension #programming- Program Comprehension Risks and Opportunities in Extreme Programming (AvD), p. 176–?.
EDOC-2001-WangC #distributed #enterprise- A Method to Reduce Risks in Building Distributed Enterprise Systems (GW, GC), pp. 164–168.
ESEC-FSE-2001-FreimutHKKK #case study #implementation #industrial- An industrial case study of implementing software risk management (BGF, SH, PK, JK, WK), pp. 277–287.
AdaEurope-2000-WielandHS - Enhancements in Software Project Risk Management (PW, FH, KS), pp. 161–172.
ICRE-2000-Neumann - Requirements-Related Risks in Critical Systems (PGN), p. 3–?.
ASE-2000-FeatherCL #tool support- Combining the Best Attributes of Qualitative and Quantitative Risk Management Tool Support (MSF, SLC, TWL), pp. 309–312.
ASE-2000-MenziesS #assessment #case study #query #scalability- Practical Large Scale What-If Queries: Case Studies with Software Risk Assessment (TM, ES), p. 165–?.
ICSE-2000-MizunoKTS #evaluation- Characterization of risky projects based on project managers’ evaluation (OM, TK, YT, KS), pp. 387–395.
ITiCSE-1999-ParkerH #industrial- Campus-based industrial software projects: risks and rewards (HP, MH), p. 189.
WCRE-1999-Sneed #re-engineering- Risks Involved in Reengineering Projects (HMS), pp. 204–211.
CAiSE-1999-VerhoefF #in the large- Risk Management for IT in the Large (DV, MF), pp. 57–72.
MLDM-1999-Scaringella #data mining #mining #monitoring- A Data Mining Application for Monitoring Environmental Risks (AS), pp. 209–215.
RE-1999-GreerBS #using- Prioritisation of System Changes using Cost-Benefit and Risk Assessments (DG, DWB, TS), p. 180–?.
ICSE-1999-BenlarbiM #metric #morphism #polymorphism #predict- Polymorphism Measures for Early Risk Prediction (SB, WLM), pp. 334–344.
ICSE-1999-Kontio #development #overview- Risk Management in Software Development: A Technology Overview and the Riskit Method (JK), pp. 679–680.
SAC-1999-FinkH #assessment #multi- The Disease Progression Explorer: Risk Assessment Support in Chronic, Multifactorial Diseases (PKF, LTH), pp. 46–51.
CSEET-1998-Hall - Training Risk Management: Bridge over Troubled Waters (EMH), pp. 36–39.
CAiSE-1998-TanziSG #information management #realtime- Real-Time Information System for Risk Management on Motorways (TT, SS, RG), pp. 325–338.
FSE-1998-KontioGL #case study #concept #experience #process #using- Experiences in Improving Risk Management Processes Using the Concepts of the Riskit Method (JK, GG, DL), pp. 163–172.
ICSE-1998-BriandEB #assessment #benchmark #estimation #hybrid #metric #named- COBRA: A Hybrid Method for Software Cost Estimation, Benchmarking, and Risk Assessment (LCB, KEE, FB), pp. 390–399.
ICML-1996-EzawaSN #learning #network- Learning Goal Oriented Bayesian Networks for Telecommunications Risk Management (KJE, MS, SWN), pp. 139–147.
KBSE-1994-Madachy #assessment #estimation #knowledge-based- Knowledge-Based Risk Assessment and Cost Estimation (RJM), pp. 172–178.
KBSE-1994-Toth - Software Technology Risk Advisor (GAT), pp. 179–188.
PDP-1994-GulleyCW #parallel #performance- Controlling Parallel Software Performance Risks With VPB (JWG, PJCC, SRW), pp. 366–371.
CSM-1993-HinleyB - Reducing the Risks in Software Improvement Through Process-Orientated Management (DSH, KHB), pp. 319–328.
SEKE-1993-Paul #maturity #metric- Software Maturity Measurement for Software Risk Management (RAP), pp. 641–648.
ESEC-1989-Boehm - Software Risk Management (BWB), pp. 1–19.
SOSP-1989-LomasGSN - Reducing Risks from Poorly Chosen Keys (TMAL, LG, JHS, RMN), pp. 14–18.