BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
manag (73)
softwar (59)
base (41)
use (35)
assess (33)

Stem risk$ (all stems)

319 papers:

DATEDATE-2015-MacherSBAK #analysis #named
SAHARA: a security-aware hazard and risk analysis method (GM, HS, RB, EA, CK), pp. 621–624.
MSRMSR-2015-ChoetkiertikulD #predict #risk management
Characterization and Prediction of Issue-Related Risks in Software Projects (MC, HKD, TT, AG), pp. 280–291.
SANERSANER-2015-KnodelNBV #risk management
Software risk management in practice: Shed light on your software product (JK, MN, EB, JV), pp. 592–594.
CHICHI-2015-WisniewskiJWZXR #internet #online
Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk Exposure (PJW, HJ, NW, SZ, HX, MBR, JMC), pp. 4029–4038.
CSCWCSCW-2015-JiaWXRC #behaviour #learning #online #privacy #process
Risk-taking as a Learning Process for Shaping Teen’s Online Information Privacy Behaviors (HJ, PJW, HX, MBR, JMC), pp. 583–599.
CSCWCSCW-2015-ZhaoFZZD #online #social
To Risk or Not to Risk?: Improving Financial Risk Taking of Older Adults by Online Social Information (JCZ, WTF, HZ, SZ, HBLD), pp. 95–104.
HCIDHM-HM-2015-KlugeKZ #energy #risk management
Inside the User’s Mind — Perception of Risks and Benefits of Unknown Technologies, Exemplified by Geothermal Energy (JK, SK, MZ), pp. 324–334.
HCIDUXU-DD-2015-FanHV #big data #risk management
Supply Chain Risk Management in the Era of Big Data (YF, LH, SV), pp. 283–294.
HCIDUXU-IXD-2015-Celi #experience #learning #modelling #risk management #user interface
Application of Dashboards and Scorecards for Learning Models IT Risk Management: A User Experience (EC), pp. 153–165.
HCIHCI-UC-2015-FukuzawaSU #bibliography #risk management #security
Survey on Risk Management Based on Information Security Psychology (YF, MS, HU), pp. 396–408.
HCIHCI-UC-2015-Ujita #analysis #reliability #using
Accident Analysis by Using Methodology of Resilience Engineering, High Reliability Organization, and Risk Literacy (HU), pp. 358–369.
HCIHIMI-IKC-2015-SotokawaMNSI #detection #evaluation
Driving Evaluation of Mild Unilateral Spatial Neglect Patients-Three High-Risk Cases Undetected by BIT After Recovery (TS, TM, JN, YS, MI), pp. 253–261.
HCISCSM-2015-BeldadK #facebook #risk management
It’s Not About the Risks, I’m just Used to Doing It: Disclosure of Personal Information on Facebook Among Adolescent Dutch Users (ADB, RK), pp. 185–195.
ICEISICEIS-v1-2015-AbakumovAV #information management #integration #risk management
Risk Management in Project of Information Systems Integration During Merger of Companies (EMA, DMA, AV), pp. 221–227.
ICEISICEIS-v3-2015-ProencaNBB #approach #risk management
Digital Curation Costs — A Risk Management Approach Supported by the Business Model Canvas (DP, AN, RB, JLB), pp. 299–306.
ICMLICML-2015-FrostigGKS #algorithm #approximate #empirical #named #performance #probability
Un-regularizing: approximate proximal point and faster stochastic algorithms for empirical risk minimization (RF, RG, SK, AS), pp. 2540–2548.
ICMLICML-2015-HugginsT
Risk and Regret of Hierarchical Bayesian Learners (JH, JT), pp. 1442–1451.
ICMLICML-2015-SwaminathanJ #feedback #learning
Counterfactual Risk Minimization: Learning from Logged Bandit Feedback (AS, TJ), pp. 814–823.
ICMLICML-2015-ZhangL #coordination #empirical #probability
Stochastic Primal-Dual Coordinate Method for Regularized Empirical Risk Minimization (YZ, XL), pp. 353–361.
KDDKDD-2015-CaruanaLGKSE #modelling #predict
Intelligible Models for HealthCare: Predicting Pneumonia Risk and Hospital 30-day Readmission (RC, YL, JG, PK, MS, NE), pp. 1721–1730.
KDDKDD-2015-GongSRG #modelling
Instance Weighting for Patient-Specific Risk Stratification Models (JJG, TMS, JDR, JVG), pp. 369–378.
KDDKDD-2015-LakkarajuASMBGA #framework #identification #machine learning #student
A Machine Learning Framework to Identify Students at Risk of Adverse Academic Outcomes (HL, EA, CS, DM, NB, RG, KLA), pp. 1909–1918.
KDDKDD-2015-RoyTZLHNM #classification
Dynamic Hierarchical Classification for Patient Risk-of-Readmission (SBR, AT, KZ, RL, DH, SN, AM), pp. 1691–1700.
KDDKDD-2015-SunWH #approach #named #predict #risk management
LINKAGE: An Approach for Comprehensive Risk Prediction for Care Management (ZS, FW, JH), pp. 1145–1154.
RecSysRecSys-2015-ZhaoZ0 #recommendation
Risk-Hedged Venture Capital Investment Recommendation (XZ, WZ, JW), pp. 75–82.
SEKESEKE-2015-BarchetSF #analysis #collaboration #dependence #risk management
Analysis of Risk Dependencies in Collaborative Risk Management (CB, LAdLS, LMF), pp. 314–319.
OOPSLAOOPSLA-2015-MastrangeloPMLH #api #java
Use at your own risk: the Java unsafe API in the wild (LM, LP, AM, ML, MH, NN), pp. 695–710.
REFSQREFSQ-2015-GramaticaLMPT #assessment #empirical #risk management #security
The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals (MdG, KL, FM, FP, AT), pp. 98–114.
REFSQREFSQ-2015-RempelM #agile #development #implementation #metric #requirements #traceability
Estimating the Implementation Risk of Requirements in Agile Software Development Projects with Traceability Metrics (PR, PM), pp. 81–97.
REFSQREFSQ-2015-VriezekolkEW #assessment #risk management #validation
Experimental Validation of a Risk Assessment Method (EV, SE, RW), pp. 1–16.
SACSAC-2015-OjameruayeB #analysis #framework
A risk — aware framework for compliance goal-obstacle analysis (BO, RB), pp. 1401–1402.
SACSAC-2015-ShahriarH #approach #assessment #metric #risk management #security #web
Security assessment of clickjacking risks in web applications: metrics based approach (HS, HMH), pp. 791–797.
ESEC-FSEESEC-FSE-2015-RosenGS #commit #predict #risk management
Commit guru: analytics and risk prediction of software commits (CR, BG, ES), pp. 966–969.
CASECASE-2014-ChuKS #dependence #energy #grid #integration
Optimal integration of alternative energy sources in production systems for minimum grid dependency and outage risk (KCC, KK, KS), pp. 640–645.
CASECASE-2014-FeyzabadiC #markov #process #using
Risk-aware path planning using hirerachical constrained Markov Decision Processes (SF, SC), pp. 297–303.
CASECASE-2014-HoussemanDRP #reduction
Smart dynamic sampling for wafer at risk reduction in semiconductor manufacturing (SH, SDP, GRV, JP), pp. 780–785.
CASECASE-2014-ShamsAY #modelling #predict
Predicting patient risk of readmission with frailty models in the Department of Veteran Affairs (IS, SA, KY), pp. 576–581.
CSEETCSEET-2014-Koolmanojwong #re-engineering #risk management
Top-10 risks in real-client software engineering class projects (SK), pp. 201–202.
SANERCSMR-WCRE-2014-KnodelN #architecture #industrial
Mitigating the Risk of software change in practice: Retrospective on more than 50 architecture evaluations in industry (Keynote paper) (JK, MN), pp. 2–17.
CHICHI-2014-HarbachHWS #communication #privacy #security #using
Using personal examples to improve risk communication for security & privacy decisions (MH, MH, SW, MS), pp. 2647–2656.
HCIDUXU-TMT-2014-CorreiaSCBS #design #risk management #safety
Design as a Tool for Managing Risks and Vulnerabilities Regarding Artifacts of Public Safety (WC, SXdS, FC, MLNB, MMS), pp. 437–444.
HCIHCI-TMT-2014-YajimaTS #collaboration #learning
Proposal of Collaborative Learning Support Method in Risk Communications (HY, NT, RS), pp. 457–465.
CAiSECAiSE-2014-StulpnagelOS #logic #markov #network #risk management
IT Risk Management with Markov Logic Networks (JvS, JO, JS), pp. 301–315.
CAiSECAiSE-2014-WalleC #information management
Risk Accelerators in Disasters — Insights from the Typhoon Haiyan Response on Humanitarian Information Management and Decision Support (BVdW, TC), pp. 12–23.
EDOCEDOC-2014-KormanSHBE #assessment #bibliography #enterprise #risk management #security
Overview of Enterprise Information Needs in Information Security Risk Assessment (MK, TS, JH, JEB, ME), pp. 42–51.
ICEISICEIS-v1-2014-TimoteoVF #analysis #case study #dataset #network #project management
Evaluating Artificial Neural Networks and Traditional Approaches for Risk Analysis in Software Project Management — A Case Study with PERIL Dataset (CT, MV, SF), pp. 472–479.
ICEISICEIS-v2-2014-BeenK #analysis #approach #internet #online #people
Finding You on the Internet — An Approach for Finding On-line Presences of People for Fraud Risk Analysis (HB, MvK), pp. 697–706.
ICEISICEIS-v2-2014-Hauer #state of the art
Data Leakage Prevention — A Position to State-of-the-Art Capabilities and Remaining Risk (BH), pp. 361–367.
ICEISICEIS-v2-2014-VieiraJF #analysis #network
A Risk Analysis Method for Selecting Service Providers in P2P Service Overlay Networks (RGV, OCAJ, AF), pp. 477–488.
ICEISICEIS-v3-2014-BenaijaK #risk management
Trade off Between Risk Management, Value Creation and Strategic Alignment in Project Portfolio Management (KB, LK), pp. 447–452.
ECIRECIR-2014-DincerOM #evaluation #retrieval
Tackling Biased Baselines in the Risk-Sensitive Evaluation of Retrieval Systems (BTD, IO, CM), pp. 26–38.
ICMLICML-c1-2014-JainT #bound #independence #learning
(Near) Dimension Independent Risk Bounds for Differentially Private Learning (PJ, AGT), pp. 476–484.
ICPRICPR-2014-WangWH #framework #learning #multi #predict #risk management
A Multi-task Learning Framework for Joint Disease Risk Prediction and Comorbidity Discovery (XW, FW, JH), pp. 220–225.
KDDKDD-2014-RamakrishnanW #privacy #question #social
Does social good justify risking personal privacy? (RR, GIW), p. 1965.
KDDKDD-2014-TamhaneISDA #analysis #predict #risk management #student
Predicting student risks through longitudinal analysis (AT, SI, BS, MD, JA), pp. 1544–1552.
KDDKDD-2014-WangZQWD #multi #predict #risk management
Clinical risk prediction with multilinear sparse logistic regression (FW, PZ, BQ, XW, ID), pp. 145–154.
SEKESEKE-2014-DegrossiAFM #approach #risk management
Flood Citizen Observatory: a crowdsourcing-based approach for flood risk management in Brazil (LCD, JPdA, MCF, EMM), pp. 570–575.
SEKESEKE-2014-LeungLZ #process #scheduling
Snowball Effects on Risk Mitigation Scheduling: Process and Tool (HKNL, KML, PZ), pp. 582–585.
SEKESEKE-2014-MachadoSFC #collaboration #reasoning #risk management
Case-based Reasoning for Experience-based Collaborative Risk Management (NLRM, LAdLS, LMF, JAC), pp. 262–267.
SEKESEKE-2014-OdzalyGS #agile #lightweight #risk management
Lightweight Risk Management in Agile Projects (EEO, DG, DS), pp. 576–581.
SIGIRSIGIR-2014-DincerMO #evaluation #retrieval #testing
Hypothesis testing for the risk-sensitive evaluation of retrieval systems (BTD, CM, IO), pp. 23–32.
SIGIRSIGIR-2014-LeeTC #behaviour #multi #risk management
Characterizing multi-click search behavior and the risks and opportunities of changing results during use (CJL, JT, SdlC), pp. 515–524.
RERE-2014-Ionita #evaluation #identification #information management #risk management #security
Context-sensitive Information security Risk identification and evaluation techniques (DI), pp. 485–488.
SACSAC-2014-AlnajemZ #evaluation #mobile
A copula-based risk evaluation method (C-REM) in a corporate mobile banking context (AAIA, NZ), pp. 1455–1462.
SACSAC-2014-FlemingWWS #monitoring
Monitoring water scarcity risk in Africa (KF, KW, HW, OS), pp. 567–568.
SACSAC-2014-ShahriarH #assessment #fuzzy #injection #risk management #using
Risk assessment of code injection vulnerabilities using fuzzy logic-based system (HS, HH), pp. 1164–1170.
SACSAC-2014-ShoshitaishviliIDV #analysis #scalability #security #trade-off
Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security (YS, LI, AD, GV), pp. 1649–1656.
ICSEICSE-2014-HuangMSZ #analysis #performance #testing
Performance regression testing target prioritization via performance risk analysis (PH, XM, DS, YZ), pp. 60–71.
ICSEICSE-2014-LetierSB #architecture #nondeterminism #requirements
Uncertainty, risk, and information value in software requirements and architecture (EL, DS, ETB), pp. 883–894.
SPLCSPLC-2014-HartmannLB #product line #testing
Risk based testing for software product line engineering (HH, FvdL, JB), pp. 227–231.
HPCAHPCA-2014-GuevaraLL #design
Strategies for anticipating risk in heterogeneous system design (MG, BL, BCL), pp. 154–164.
ASEASE-2013-NejatiABHBC #cpu #embedded #risk management
Minimizing CPU time shortage risks in integrated embedded software (SN, MA, LCB, JH, JB, YC), pp. 529–539.
CASECASE-2013-GohWYFPLL #monitoring #named #realtime #risk management #visualisation
RiskVis: Supply chain visualization with risk management and real-time monitoring (RSMG, ZW, XY, XF, LP, SL, XL), pp. 207–212.
DATEDATE-2013-MohanramWI #certification #compilation #memory management #named #order #reduction
Mempack: an order of magnitude reduction in the cost, risk, and time for memory compiler certification (KM, MW, SI), pp. 1490–1493.
ICDARICDAR-2013-ZhouTLW #markov #random #recognition #using
Minimum Risk Training for Handwritten Chinese/Japanese Text Recognition Using Semi-Markov Conditional Random Fields (XDZ, FT, CLL, HW), pp. 940–944.
CSEETCSEET-2013-KoolmanojwongB #re-engineering #risk management
A look at software engineering risks in a team project course (SK, BWB), pp. 21–30.
ICALPICALP-v1-2013-GilbertNPRS
ℓ2/ℓ2-Foreach Sparse Recovery with Low Risk (ACG, HQN, EP, AR, MJS), pp. 461–472.
GT-VMTGT-VMT-2013-MicallefC #case study #detection #modelling #risk management #visual notation
A Case Study on Graphically Modelling and Detecting Knowledge Mobility Risks (MM, CC).
HCIDHM-HB-2013-Hedge #risk management
Evaluating Ergonomics Risks for Digital Radiologists (AH), pp. 50–58.
HCIDHM-SET-2013-BrixeyT #risk management
Homecare Risk Management: Nursing Issues Related to Technology (JJB, JPT), pp. 157–162.
HCIDHM-SET-2013-LungLJ
Plantar Pressure Gradient Angles to Evaluate Risk of Diabetic Foot Ulcer (CWL, BYL, YKJ), pp. 240–247.
HCIDUXU-CXC-2013-HassB #testing #usability
Usability Testing Medical Devices: A Practical Guide to Minimizing Risk and Maximizing Success (CH, DB), pp. 407–416.
HCIDUXU-CXC-2013-PlogmannJJR #development #evaluation #knowledge-based #risk management #using
Development and Evaluation of a Knowledge-Based Method for the Treatment of Use-Oriented and Technical Risks Using the Example of Medical Devices (SP, AJ, AJT, KR), pp. 452–461.
HCIOCSC-2013-ShabgahiSC #bibliography #comparative #education #microblog #research
A Comparative Review of Research Literature on Microblogging Use and Risk in Organizational and Educational Settings (SLS, NAKS, AMC), pp. 174–181.
CAiSECAiSE-2013-ConfortiLRA #execution #process
Supporting Risk-Informed Decisions during Business Process Execution (RC, MdL, MLR, WMPvdA), pp. 116–132.
CAiSECAiSE-2013-LiverK #information management #scalability
Integrity in Very Large Information Systems — Dealing with Information Risk Black Swans (BL, HK), pp. 641–656.
CAiSECAiSE-2013-PikaAFHW #process #profiling
Profiling Event Logs to Configure Risk Indicators for Process Delays (AP, WMPvdA, CJF, AHMtH, MTW), pp. 465–481.
EDOCEDOC-2013-BraunE #bibliography #concept #network #online #risk management #social #towards
Towards a Conceptualization of Corporate Risks in Online Social Networks: A Literature Based Overview of Risks (RB, WE), pp. 267–274.
EDOCEDOC-2013-SousaMGM #approach #architecture #data type #enterprise #risk management #using
Assessing Risks and Opportunities in Enterprise Architecture Using an Extended ADT Approach (SS, DM, KG, NM), pp. 81–90.
ICEISICEIS-J-2013-LiuDH13a #risk management
Business Intelligence for Improving Supply Chain Risk Management (LL, HAMD, WH), pp. 190–205.
ICEISICEIS-v1-2013-LiuDH #assessment #detection #exception #risk management
Detecting and Explaining Business Exceptions for Risk Assessment (LL, HAMD, WH), pp. 530–535.
ECIRECIR-2013-TsaiW #ranking
Risk Ranking from Financial Reports (MFT, CJW), pp. 804–807.
ICMLICML-c1-2013-GiguereLMS #algorithm #approach #bound #learning #predict
Risk Bounds and Learning Algorithms for the Regression Approach to Structured Output Prediction (SG, FL, MM, KS), pp. 107–114.
ICMLICML-c3-2013-PiresSG #bound #classification #multi
Cost-sensitive Multiclass Classification Risk Bounds (BAP, CS, MG), pp. 1391–1399.
ICMLICML-c3-2013-ShenderL #trade-off
Computation-Risk Tradeoffs for Covariance-Thresholded Regression (DS, JDL), pp. 756–764.
KDDKDD-2013-EmersonWN #data mining #mining #profiling
A data mining driven risk profiling method for road asset management (DE, JW, RN), pp. 1267–1275.
KDDKDD-2013-TranPLHBV #framework #predict #risk management
An integrated framework for suicide risk prediction (TT, DQP, WL, RH, MB, SV), pp. 1410–1418.
KDDKDD-2013-ZolfagharASCRV #named
Risk-O-Meter: an intelligent clinical risk calculator (KZ, JA, DS, SCC, SBR, NV), pp. 1518–1521.
KDIRKDIR-KMIS-2013-Ibarra-SanchezPO #analysis #case study #risk management #using
Hospital Risk Management using Healthcare Failure Mode and Effects Analysis — A Case Study on Ventilators Whithin an Intensive Care Unit (MAIS, ABPA, MROP), pp. 328–335.
KDIRKDIR-KMIS-2013-PereiraTBW #enterprise
A Risk Diagnosing Methodology Web-based Tool for SME’s and Start-up Enterprises (LP, AT, JB, JW), pp. 308–317.
RecSysRecSys-2013-ZhangWCZ #personalisation #perspective #risk management
To personalize or not: a risk management perspective (WZ, JW, BC, XZ), pp. 229–236.
SEKESEKE-2013-SeveroFS #approach #collaboration #game studies #risk management
A Dialogue Game Approach to Collaborative Risk Management (S) (FS, LMF, LAdLS), pp. 548–551.
RERE-2013-ZarghamiVESW #identification #risk management
Assumption-based risk identification method (ARM) in dynamic service provisioning (AZ, EV, MZE, MvS, RW), pp. 175–184.
REFSQREFSQ-2013-CallelePW #identification #interface #requirements #risk management
Risk Identification at the Interface between Business Case and Requirements (DC, BP, KW), pp. 253–268.
SACSAC-2013-LarrosaR #bound #constraints #distributed #optimisation
Risk-neutral bounded max-sum for distributed constraint optimization (JL, ER), pp. 92–97.
ICSEICSE-2013-AlmorsyGI #analysis #architecture #automation #security #using
Automated software architecture security risk analysis using formalized signatures (MA, JG, ASI), pp. 662–671.
CASECASE-2012-Rodriguez-VerjanTPDT
Dispatching of lots to dynamically reduce the wafers at risk in semiconductor manufacturing (GRV, ET, JP, SDP, AT), pp. 920–923.
CHICHI-2012-GulottaFM #image #online #risk management
Curation, provocation, and digital identity: risks and motivations for sharing provocative images online (RG, HF, JM), pp. 387–390.
CIKMCIKM-2012-ZhouCLJ
Evaluating reward and risk for vertical selection (KZ, RC, ML, JMJ), pp. 2631–2634.
ICMLICML-2012-CastroTM #policy
Policy Gradients with Variance Related Risk Criteria (DDC, AT, SM), p. 215.
ICPRICPR-2012-ErYAK #analysis #modelling
Traffic accident risk analysis based on relation of Common Route Models (UE, SY, OA, MEK), pp. 2561–2564.
KEODKEOD-2012-PereiraS #approach #design #information management #ontology #security
An Ontology Approach in Designing Security Information Systems to Support Organizational Security Risk Knowledge (TSMP, HMDS), pp. 461–466.
KMISKMIS-2012-EmmeneggerLT #semantics
Improving Supply-Chain-Management based on Semantically Enriched Risk Descriptions (SE, EL, BT), pp. 70–80.
SEKESEKE-2012-LiuMLS #analysis #non-functional #specification
Risk-driven Non-functional Requirement Analysis and Specification (YL, ZM, HL, WS), pp. 55–60.
SEKESEKE-2012-LobatoMNAM #risk management #synthesis
Synthesizing Evidence on Risk Management: A Narrative Synthesis of two Mapping Studies (LLL, IdCM, PAdMSN, ESdA, SRdLM), pp. 641–646.
SIGIRSIGIR-2012-WangBC #modelling #optimisation #ranking #robust
Robust ranking models via risk-sensitive optimization (LW, PNB, KCT), pp. 761–770.
RERE-2012-CailliauL #analysis #framework #probability
A probabilistic framework for goal-oriented risk analysis (AC, AvL), pp. 201–210.
REFSQREFSQ-2012-ChowdhuryMSK #diagrams #requirements #risk management #security
Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions (MJMC, RM, GS, PK), pp. 132–139.
FSEFSE-2012-ShihabHAJ #industrial
An industrial study on the risk of software changes (ES, AEH, BA, ZMJ), p. 62.
PLEASEPLEASE-2012-AnnosiPT #component
Managing and assessing the risk of component upgrades (MCA, MDP, GT), pp. 9–12.
WICSAWICSA-2011-PoortV #architecture
Architecting as a Risk- and Cost Management Discipline (ERP, HvV), pp. 2–11.
CSEETCSEET-2011-RizviHMLJ
A new CS0 course for at-risk majors (MER, TH, DM, HL, MJ), pp. 314–323.
ICSMEICSM-2011-MirakhorliC #architecture #information management #maintenance #modelling #traceability #using
Using tactic traceability information models to reduce the risk of architectural degradation during system maintenance (MM, JCH), pp. 123–132.
CHICHI-2011-RaijGKS #mobile #privacy #risk management #smarttech
Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment (AR, AG, SK, MBS), pp. 11–20.
CSCWCSCW-2011-LiuHTCGPH #communication #mobile #social
Improving communication and social support for caregivers of high-risk infants through mobile technologies (LSL, SHH, MT, KGC, SG, SYP, GRH), pp. 475–484.
CSCWCSCW-2011-McGillCJCBL #elicitation #game studies #online
Eliciting risk perceptions with an online game: preliminary results (WLM, YC, MJ, JJC, SB, GL), pp. 681–684.
HCIDUXU-v2-2011-InversiniCB #analysis #assessment #case study #experience #risk management #usability #user interface
Connecting Usages with Usability Analysis through the User Experience Risk Assessment Model: A Case Study in the Tourism Domain (AI, LC, DB), pp. 283–293.
HCIHCI-MIIE-2011-HondaSN #process #recognition #risk management
Activity Recognition for Risk Management with Installed Sensor in Smart and Cell Phone (DH, NS, SN), pp. 230–239.
HCIHCI-UA-2011-YajimaT #collaboration #learning
Proposal of Collaborative Learning Support Method in Risk Communications (HY, NT), pp. 113–120.
CAiSECAiSE-2011-VicenteS #concept
A Conceptual Model for Integrated Governance, Risk and Compliance (PV, MMdS), pp. 199–213.
ICEISICEIS-v1-2011-AsghariNAA #approach #enterprise #fuzzy #implementation #resource management #risk management #using
Risk Management in Enterprise Resource Planning Implementation using a Fuzzy Approach (HAA, MN, FA, FA), pp. 290–294.
ICEISICEIS-v1-2011-SchrodlGLT #assessment #framework #hybrid #network #risk management
Risk Management in Supply Networks for Hybrid Value Bundles — A Risk Assessment Framework (HS, MG, LL, KT), pp. 157–162.
ICEISICEIS-v1-2011-Zenglian #research
Research of Credit Risk of Commercial Bank Personal Loan based on Association Rule (ZZ), pp. 129–134.
ICEISICEIS-v1-2011-ZhaoL
Model of the Emergencies Risk Transmission in Price-driven Supply Chain (YZ, JL), pp. 405–411.
ICEISICEIS-v2-2011-LiW #enterprise #research #risk management
Research on Integrated Management and Control System in Enterprises based on Project Risks (YL, YW), pp. 318–322.
ICEISICEIS-v2-2011-YangJ #implementation #research #risk management
Research on Critical Chain Management and Risk Management in Project Implementation Management (ZY, JJ), pp. 351–356.
ICEISICEIS-v2-2011-ZhuXM #assessment #network #risk management #using
Operational Hazard Risk Assessment using Bayesian Networks (ZJZ, YX, EM), pp. 135–139.
ICEISICEIS-v3-2011-QuG #analysis #identification #outsourcing #risk management
The Analysis of IT Outsourcing Risk Identification on Principal-agent Theory (LQ, ZG), pp. 488–491.
ICEISICEIS-v3-2011-WangRL
The Pricing Mechanism of Suppliers in Risk-sharing in External Financing (ZW, YR, HL), pp. 145–149.
ICEISICEIS-v3-2011-YangF
Mitigate Supply Risk in Supply Chain (XY, SF), pp. 544–549.
ICEISICEIS-v3-2011-ZhouL #analysis #metric
A New Method and Metric for Quantitative Risk Analysis (PZ, HL), pp. 25–33.
ICMLICML-2011-Garcia-GarciaLS
Risk-Based Generalizations of f-divergences (DGG, UvL, RSR), pp. 417–424.
KDDKDD-2011-Hsu #realtime
Real-time risk control system for CNP (card not present) (TH), p. 783.
KDDKDD-2011-NeuvirthOHLKER #case study #personalisation #towards
Toward personalized care management of patients at risk: the diabetes case study (HN, MOF, JH, JL, MSK, SE, MRZ), pp. 395–403.
SEKESEKE-2011-FuginiRIRC #monitoring #risk management #simulation
Simulations of Risks for Monitoring and Prevention (MGF, FR, RI, CR, OC), pp. 602–607.
SEKESEKE-2011-GregoriadesLP11a #calculus #risk management #using
Project Risk Management Using Event Calculus(S) (AG, VPL, PP), pp. 335–338.
RERE-2011-FranqueiraTYWN #security
Risk and argument: A risk-based argumentation method for practical security (VNLF, TTT, YY, RW, BN), pp. 239–248.
ICSEICSE-2011-Davies #reuse #security
Measuring subversions: security and legal risk in reused software artifacts (JD), pp. 1149–1151.
ICSEICSE-2011-GodeK #clone tracking #risk management
Frequency and risks of changes to clones (NG, RK), pp. 311–320.
ICSEICSE-2011-LaymanBZF #case study #process #safety
A case study of measuring process risk for early insights into software safety (LL, VRB, MVZ, KLF), pp. 623–632.
SPLCSPLC-2011-QuiltyC #case study #development #experience #product line #risk management
Experiences with Software Product Line Development in Risk Management Software (GQ, MÓC), pp. 251–260.
ICSTICST-2011-Zech #in the cloud #security #testing
Risk-Based Security Testing in Cloud Computing Environments (PZ), pp. 411–414.
ASEASE-2010-HuangPWXM #assurance #mining
Text mining in supporting software systems risk assurance (LH, DP, LW, TX, TM), pp. 163–166.
CASECASE-2010-KimHS #outsourcing
Risk-averse outsourcing strategies for optimal intellectual property protection (BK, KH, KS), pp. 978–983.
VLDBVLDB-2010-CanimKHM #database #query #relational
Building Disclosure Risk Aware Query Optimizers for Relational Databases (MC, MK, BH, SM), pp. 13–24.
VLDBVLDB-2010-HaasJAXPJ #analysis #database #named
MCDB-R: Risk Analysis in the Database (SA, RJ, LLP, FX, CMJ, PJH), pp. 782–793.
ICALPICALP-v2-2010-McIverMM #composition #probability
Compositional Closure for Bayes Risk in Probabilistic Noninterference (AM, LM, CM), pp. 223–235.
ICEISICEIS-ISAS-2010-HulstijnG #analysis
Risk Analysis for Inter-organizational Controls (JH, JG), pp. 314–320.
ICMLICML-2010-Masnadi-ShiraziV #elicitation #probability
Risk minimization, probability elicitation, and cost-sensitive SVMs (HMS, NV), pp. 759–766.
ICMLICML-2010-SawadeLBS #estimation
Active Risk Estimation (CS, NL, SB, TS), pp. 951–958.
ICMLICML-2010-SyedR #dataset #identification
Unsupervised Risk Stratification in Clinical Datasets: Identifying Patients at Risk of Rare Outcomes (ZS, IR), pp. 1023–1030.
KEODKEOD-2010-MazakSL #approximate #heuristic #ontology
align++ — A Heuristic-based Method for Approximating the Mismatch-at-Risk in Schema-based Ontology Alignment (AM, BS, ML), pp. 17–26.
SEKESEKE-2010-YinZZ #reliability #transaction #web #web service
Reliable Web Service Selection based on Transactional Risk (YY, XZ, BZ), pp. 231–234.
RERE-2010-MoraliW #outsourcing #requirements #specification
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems (AM, RW), pp. 199–208.
SACSAC-2010-ClaycombS #analysis #framework #security
A framework for risk analysis in virtual directory security (WC, DS), pp. 1881–1882.
ICSEICSE-2010-Lima #assessment #distributed #risk management
Risk assessment on distributed software projects (AML), pp. 349–350.
ICSTICST-2010-Bubevski #assessment #risk management #simulation #testing
An Application of Six Sigma and Simulation in Software Testing Risk Assessment (VB), pp. 295–302.
DACDAC-2009-Anderson #complexity #design #risk management
Beyond innovation: dealing with the risks and complexity of processor design in 22nm (CJA), p. 103.
CSEETCSEET-2009-AhteeP #risk management #student
Risks in Students’ Software Projects (TA, TP), pp. 154–157.
CSEETCSEET-2009-SkevoulisCHVT #health #industrial
Engineering a Software Supported Health Risk Appraisal Method: A Joint Effort between Academia and Health Care Industry (SS, JC, KH, JV, ST), pp. 113–116.
ICSMEICSM-2009-BettenburgSH #empirical #off the shelf #risk management #using
An empirical study on the risks of using off-the-shelf techniques for processing mailing list data (NB, ES, AEH), pp. 539–542.
HCIDHM-2009-FallonCP #assessment #learning #risk management
Learning from Risk Assessment in Radiotherapy (EFF, LC, WJvdP), pp. 502–511.
ICEISICEIS-DISI-2009-Damiani #collaboration #process
Risk-aware Collaborative Processes (ED), p. 29.
ICEISICEIS-AIDSS-2009-Damiani #collaboration #process
Risk-aware Collaborative Processes (ED), p. 29.
ICEISICEIS-AIDSS-2009-TamargoGABQ #classification
Decision Support System for Classification of Natural Risk in Maritime Construction (MAGT, ASAG, VCA, ABT, AAQ), pp. 138–143.
ICEISICEIS-DISI-2009-Damiani #collaboration #process
Risk-aware Collaborative Processes (ED), p. 29.
ICEISICEIS-HCI-2009-Damiani #collaboration #process
Risk-aware Collaborative Processes (ED), p. 29.
ICEISICEIS-ISAS-2009-Damiani #collaboration #process
Risk-aware Collaborative Processes (ED), p. 29.
ICEISICEIS-SAIC-2009-Damiani #collaboration #process
Risk-aware Collaborative Processes (ED), p. 29.
ICEISICEIS-SAIC-2009-SammourDVW #email
Identiying Homogenous Customer Segments for Low Risk Email Marketing Experiments (GNS, BD, KV, GW), pp. 89–94.
CIKMCIKM-2009-Collins-Thompson #optimisation #query #robust
Reducing the risk of query expansion via robust constrained optimization (KCT), pp. 837–846.
CIKMCIKM-2009-LongLVZT #adaptation #framework
A risk minimization framework for domain adaptation (BL, SL, SV, YZ, BLT), pp. 1347–1356.
ECIRECIR-2009-ZhuWTC #information retrieval
Risk-Aware Information Retrieval (JZ, JW, MJT, IJC), pp. 17–28.
KDDKDD-2009-Macskassy #empirical #graph #learning #metric #using
Using graph-based metrics with empirical risk minimization to speed up active learning on networked data (SAM), pp. 597–606.
KDDKDD-2009-McGlohonBASF #detection #graph #named
SNARE: a link analytic system for graph labeling and risk detection (MM, SB, MGA, DMS, CF), pp. 1265–1274.
MLDMMLDM-2009-DereliogluGO #analysis #approach
A Neural Approach for SME’s Credit Risk Analysis in Turkey (GD, FSG, NO), pp. 749–759.
SEKESEKE-2009-GaoSSVPDB #assessment #estimation #problem #risk management
Systematic Risk Assessment and Cost Estimation for Software Problems (JG, MS, MS, DV, PP, KD, EB), pp. 103–109.
SEKESEKE-2009-WilliamsR #risk management #statistics #using
Accelerated Risk Management using Statistical Triggers (RW, KR), pp. 643–648.
SIGIRSIGIR-2009-SavalM #information management #monitoring #named
Agate: information gathering for risk monitoring (AS, YM), p. 842.
RERE-2009-FailyF #requirements #risk management
Context-Sensitive Requirements and Risk Management with IRIS (SF, IF), pp. 379–380.
REFSQREFSQ-2009-Dzamashvili-FogelstromBAH #requirements
When Product Managers Gamble with Requirements: Attitudes to Value and Risk (NDF, SB, AA, AH), pp. 1–15.
SACSAC-2009-SchneidewindH #approach #reliability #testing
A consumer/producer approach to risk-driven software reliability and testing (NFS, MH), pp. 537–538.
CASECASE-2008-StirlingN #coordination #nash
Rational coordination under risk: Coherence and the Nash bargain (WCS, MSN), pp. 122–127.
CSEETCSEET-2008-MeyerP #case study #development #distributed #experience #re-engineering #risk management
The Allure and Risks of a Deployable Software Engineering Project: Experiences with Both Local and Distributed Development (BM, MP), pp. 3–16.
CAiSECAiSE-2008-MatuleviciusMMDHG #adaptation #development #information management #risk management #security
Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development (RM, NM, HM, ED, PH, NG), pp. 541–555.
ICEISICEIS-AIDSS-2008-JansLV #case study #data mining #mining #reduction
Internal Fraud Risk Reduction — Results of a Data Mining Case Study (MJ, NL, KV), pp. 161–166.
CIKMCIKM-2008-DavisCBCB #predict
Predicting individual disease risk based on medical history (DAD, NVC, NB, NAC, ALB), pp. 769–778.
ICMLICML-2008-DoshiPR #learning #using
Reinforcement learning with limited reinforcement: using Bayes risk for active learning in POMDPs (FD, JP, NR), pp. 256–263.
ICMLICML-2008-TakedaS
nu-support vector machine as conditional value-at-risk minimization (AT, MS), pp. 1056–1063.
SEKESEKE-2008-FontouraP #approach #process #risk management
Systematic Approach to Risk Management in Software Projects through Process Tailoring (LMF, RTP), pp. 179–184.
ICLPICLP-2008-MileoMB #approach #logic programming #monitoring
A Logic Programming Approach to Home Monitoring for Risk Prevention in Assisted Living (AM, DM, RB), pp. 145–159.
WICSAWICSA-2007-BassNWZ #architecture
Risk Themes Discovered through Architecture Evaluations (LB, RLN, WW, DZ), p. 1.
CASECASE-2007-MishraV #framework #risk management
A CBR-based Decision Support System Framework for Construction Supply Chain Risk Management (VKM, NV), pp. 980–985.
CSEETCSEET-2007-GrothH #case study #how #student
How Students Perceive Risk: A Study of Senior Capstone Project Teams (DPG, MPH), pp. 45–54.
CSEETCSEET-2007-Taran #education #game studies #re-engineering #risk management #using
Using Games in Software Engineering Education to Teach Risk Management (GT), pp. 211–220.
MSRMSR-2007-Masticola #development #lightweight #mining #repository #using
Lightweight Risk Mitigation for Software Development Projects Using Repository Mining (SPM), p. 13.
HCIHIMI-IIE-2007-LiuYCL #estimation #health #modelling #using
Health Risk Estimation of Dichlorobenzene Exposure Workers by Using Computer Models (PSL, RMY, YMC, CYL), pp. 1060–1066.
HCIHIMI-IIE-2007-YajimaWS #evaluation #information management #multi
Evaluation of the Participant-Support Method for Information Acquisition in the “Multiplex Risk Communicator” (HY, TW, RS), pp. 195–203.
ICEISICEIS-EIS-2007-Custers #problem #profiling
Risk Profiling of Money Laundering and Terrorism Funding — Practical Problems of Current Information Strategies (BHMC), pp. 90–94.
KDDKDD-2007-TeoSVL #composition #scalability
A scalable modular convex solver for regularized risk minimization (CHT, AJS, SVNV, QVL), pp. 727–736.
RERE-2007-GandhiL #assessment #certification #comprehension #correlation #multi #requirements #risk management
Discovering and Understanding Multi-dimensional Correlations among Certification Requirements with application to Risk Assessment (RAG, SWL), pp. 231–240.
SACSAC-2007-HostL #assessment #concept #risk management
Different conceptions in software project risk assessment (MH, CL), pp. 1422–1426.
HPDCHPDC-2007-SandholmL #approach #statistics
A statistical approach to risk mitigation in computational markets (TS, KL), pp. 85–96.
CASECASE-2006-RenWJXY #analysis #fault
A Methodology to Model Human and Organisational Errors on Offshore Risk Analysis (JR, JW, IJ, DLX, JBY), pp. 144–149.
MSRMSR-2006-WalkerHHKS #approach #estimation #impact analysis #lightweight #probability
A lightweight approach to technical risk estimation via probabilistic impact analysis (RJW, RH, IH, PK, AS), pp. 98–104.
CHICHI-2006-BenfordCRSDFD #case study #design #experience #risk management #staging
Designing for the opportunities and risks of staging digital experiences in public settings (SB, AC, SR, JGS, AJD, MF, AD), pp. 427–436.
ICEISICEIS-AIDSS-2006-ThuD #predict #risk management #using
Predicting Cardiovascular Risks — Using POSSUM, PPOSSUM and Neural Net Techniques (TNTT, DND), pp. 230–234.
ICPRICPR-v3-2006-LiGYCG #feature model
Facial Feature Selection Based on SVMs by Regularized Risk Minimization (WL, WG, LY, WC, XG), pp. 540–543.
SIGIRSIGIR-2006-FrankowskiCSTR #privacy #risk management #what
You are what you say: privacy risks of public mentions (DF, DC, SS, LGT, JR), pp. 565–572.
MODELSMoDELS-2006-HogganvikS #approach #empirical #identification #motivation #risk management #visual notation
A Graphical Approach to Risk Identification, Motivated by Empirical Investigations (IH, KS), pp. 574–588.
MODELSMoDELS-2006-HogganvikS #approach #empirical #identification #motivation #risk management #visual notation
A Graphical Approach to Risk Identification, Motivated by Empirical Investigations (IH, KS), pp. 574–588.
RERE-2006-PichlerRW #agile #case study #requirements #risk management #social
Agile Requirements Engineering for a Social Insurance for Occupational Risks Organization: A Case Study (MP, HR, WW), pp. 246–251.
ICSEICSE-2006-LiHSL #programming #release planning
A risk-driven method for eXtreme programming release planning (ML, MH, FS, JL), pp. 423–430.
ICSEICSE-2006-YangBC #estimation #integration #off the shelf #using
Assessing COTS integration risk using cost estimation inputs (YY, BWB, BC), pp. 431–438.
ASEASE-2005-HeartyFNC #assessment #automation #modelling #risk management
Automated population of causal models for improved software risk assessment (PH, NEF, MN, PC), pp. 433–434.
PODSPODS-2005-LiLWFT #data mining #mining #perspective
Relative risk and odds ratio: a data mining perspective (HL, JL, LW, MF, YPT), pp. 368–377.
ITiCSEITiCSE-2005-ArmenM #education #risk management
Teaching about the risks of electronic voting technology (CA, RM), pp. 227–231.
ICSMEICSM-2005-WebsterOA #maintenance #taxonomy
A Risk Taxonomy Proposal for Software Maintenance (KPBW, KMdO, NA), pp. 453–461.
IWPCIWPC-2005-HogganvikS #comprehension #on the #security
On the Comprehension of Security Risk Scenarios (IH, KS), pp. 115–124.
ICEISICEIS-v2-2005-ClemmonsH #enterprise #hybrid
Reducing Risk in the Enterprise: Proposal for a Hybrid Audit Expert System (SC, KH), pp. 260–266.
ICEISICEIS-v3-2005-MisraKK #analysis #modelling
Modeling Strategic Actor Relationships to Support Risk Analysis and Control in Software Projects (SCM, VK, UK), pp. 288–293.
CIKMCIKM-2005-LorenzGLTH #risk management
Situation-aware risk management in autonomous agents (ML, JDG, HL, IJT, JH), pp. 363–364.
ICMLICML-2005-LavioletteM #bound #classification
PAC-Bayes risk bounds for sample-compressed Gibbs classifiers (FL, MM), pp. 481–488.
KDDKDD-2005-LiFHCJMWSK #mining
Mining risk patterns in medical data (JL, AWCF, HH, JC, HJ, DM, GJW, RS, CK), pp. 770–775.
RERE-2005-ChisanD #requirements #risk management
Exploring the role of requirements engineering in improving risk management (JC, DD), pp. 481–482.
RERE-2005-CoheneE #analysis #design
Contextual Risk Analysis for Interview Design (TC, SME), pp. 95–104.
RERE-2005-MiranskyyaMDR #modelling #requirements
Modelling Assumptions and Requirements in the Context of Project Risk (AVM, NHM, MD, MR), pp. 471–472.
RERE-2005-RobinsonWW #analysis #design #probability #requirements #using
Risk Mitigation of Design Requirements Using a Probabilistic Analysis (MCR, SEW, DCW), pp. 231–239.
SACSAC-2005-WongQC #risk management #source code
Source code-based software risk assessing (WEW, YQ, KMLC), pp. 1485–1490.
ESEC-FSEESEC-FSE-2005-SliwerskiZZ #named
HATARI: raising risk awareness (, TZ, AZ), pp. 107–110.
WICSAWICSA-2004-IonitaAHOT #approach #architecture #cost analysis
A Scenario-Driven Approach for Value, Risk, and Cost Analysis in System Architecting for Innovation (MTI, PA, DKH, JHO, JJMT), pp. 277–280.
CSEETCSEET-2004-SeidmanF #re-engineering #risk management #source code
Software Offshoring ?^(a) Risks and Opportunities for Software Engineering Programs (SBS, LF), p. 153.
ICPRICPR-v2-2004-GutierrezRA #identification
Weighted Loss Functions to Make Risk-based Language Identification Fused Decisions (JG, JLR, RAO), pp. 863–866.
KDDKDD-2004-VogelW #modelling
1-dimensional splines as building blocks for improving accuracy of risk outcomes models (DSV, MCW), pp. 841–846.
LSOLSO-2004-FalboRBT #how #learning #risk management #using
Learning How to Manage Risks Using Organizational Knowledge (RdAF, FBR, GB, DFT), pp. 7–18.
SEKESEKE-2004-CostaBT #evaluation #risk management
Software Project Risk Evaluation based on Specific and Systemic Risks (HRC, MdOB, GHT), pp. 282–287.
SEKESEKE-2004-RayKDS #assessment #automation #risk management
Automated Risk Assessment for Managing Software Projects (BKR, TK, RD, PS), pp. 372–377.
SACSAC-2004-TrutaFB #metric
Disclosure risk measures for the sampling disclosure control method (TMT, FF, DCBJ), pp. 301–306.
ICSEICSE-2004-KontioHRA #agile #challenge #development #distributed #risk management
Managing Commitments and Risks: Challenges in Distributed Agile Development (JK, MH, JR, PA), pp. 732–733.
HPDCHPDC-2004-IrwinGC
Balancing Risk and Reward in a Market-Based Task Service (DEI, LEG, JSC), pp. 160–169.
CSMRCSMR-2003-MerloAB #analysis #fuzzy #performance
Fast Flow Analysis to Compute Fuzzy Estimates of Risk Levels (EM, GA, PLB), p. 351–?.
ICSMEICSM-2003-DeursenK #assessment #risk management
Source-Based Software Risk Assessment (AvD, TK), pp. 385–388.
VISSOFTVISSOFT-2003-RodriguezK #risk management #visualisation
Visualization for Software Risk Assessments (JVR, TK), pp. 87–91.
ICEISICEIS-v2-2003-CanforaT #assessment #risk management
Dealing with the “Don’t Know” Answer in Risk Assessment (GC, LT), pp. 229–237.
MLDMMLDM-2003-Nedelko #empirical #quality
Estimating a Quality of Decision Function by Empirical Risk (VMN), pp. 182–187.
SEKESEKE-2003-Ochs #assessment #off the shelf #requirements #risk management #using
Using Software Risk Management for Deriving Method Requirements for Risk Mitigation in COTS Assessment and Selection (MO), pp. 639–646.
ICSEICSE-2003-WangHGAGA #architecture #assessment #risk management #specification #uml
Architectural Level Risk Assessment Tool Based on UML Specifications (TW, AEH, AG, WA, KGP, HHA), pp. 808–809.
CSEETCSEET-2002-FullerCD #approach #case study #education #risk management
A New Approach to Teaching Software Risk Management with Case Studies (AF, PRC, LD), p. 215–?.
EDOCEDOC-2002-AagedalBDGRS #assessment #enterprise #modelling #risk management #security
Model-Based Risk Assessment to Improve Enterprise Security (JØA, FdB, TD, BAG, DR, KS), p. 51–?.
ICEISICEIS-2002-AlcalaCHZ #fuzzy #modelling #rule-based
Insurance Market Risk Modeling with Hierarchical Fuzzy Rule Based Systems (RA, OC, FH, IZ), pp. 325–333.
ICEISICEIS-2002-Carballo #estimation
Risk Managment in the New Economy: Estimation and Control of Projects for E-Business and Start-Ups (RC), p. 35.
RERE-2002-Doernemann #risk management
Tool-Based Risk Management Made Practical (HD), p. 192.
RERE-2002-Kozaczynski #architecture #requirements #risk management
Requirements, Architectures and Risks (WK), pp. 6–7.
RERE-2002-Schoenthaler #risk management
Risk Management in Challenging Business Software Projects (FS), pp. 8–12.
SACSAC-2002-NevesBR #classification #game studies #learning
Learning the risk board game with classifier systems (AN, OB, ACR), pp. 585–589.
ICSMEICSM-2001-Schneidewind #maintenance #reliability #requirements
Investigation of the Risk to Software Reliability and Maintainability of Requirements Changes (NFS), p. 127–?.
WCREWCRE-2001-Deursen #comprehension #programming #risk management
Program Comprehension Risks and Opportunities in Extreme Programming (AvD), p. 176–?.
EDOCEDOC-2001-WangC #distributed #enterprise #risk management
A Method to Reduce Risks in Building Distributed Enterprise Systems (GW, GC), pp. 164–168.
ICEISICEIS-v2-2001-VassiliadisTGLBGP #enterprise
Managing Risk in Extended Enterprises (BV, AKT, KG, SL, NB, PG, KP), pp. 799–806.
ICMLICML-2001-Geibel #bound #learning
Reinforcement Learning with Bounded Risk (PG), pp. 162–169.
SEKESEKE-2001-BarrosWT #analysis #process #project management #reuse
Scenario Oriented Project Management Knowledge Reuse within a Risk Analysis Process (MdOB, CMLW, GHT), pp. 37–44.
SIGIRSIGIR-2001-LaffertyZ #documentation #information retrieval #modelling #query
Document Language Models, Query Models, and Risk Minimization for Information Retrieval (JDL, CZ), pp. 111–119.
RERE-2001-CarterAWD #evolution #prototype #requirements
Evolving Beyond Requirements Creep: A Risk-Based Evolutionary Prototyping Model (RAC, AIA, LAW, AD), pp. 94–101.
RERE-2001-Feather #detection #fault #reduction #using
Risk Reduction Using DDP (Defect Detection and Prevention): Software Support and Software Applications (MSF), p. 288.
FSEESEC-FSE-2001-FreimutHKKK #case study #implementation #industrial #risk management
An industrial case study of implementing software risk management (BGF, SH, PK, JK, WK), pp. 277–287.
ICSEICSE-2001-BoehmP #re-engineering #student
Educating Software Engineering Students to Manage Risk (BWB, DP), pp. 591–600.
ICSEICSE-2001-Fruhauf #project management
The Intertwining Between Risk and Project Management (KF), pp. 707–708.
ASEASE-2000-FeatherCL #risk management #tool support
Combining the Best Attributes of Qualitative and Quantitative Risk Management Tool Support (MSF, SLC, TWL), pp. 309–312.
ASEASE-2000-MenziesS #assessment #case study #query #risk management #scalability
Practical Large Scale What-If Queries: Case Studies with Software Risk Assessment (TM, ES), p. 165–?.
DATEDATE-2000-GoodbyO #fault #quality
Test Quality and Fault Risk in Digital Filter Datapath BIST (LG, AO), pp. 468–475.
STOCSTOC-2000-KaoNT #optimisation #problem
The risk profile problem for stock portfolio optimization (extended abstract) (MYK, AN, SRT), pp. 228–234.
AdaEuropeAdaEurope-2000-WielandHS #risk management
Enhancements in Software Project Risk Management (PW, FH, KS), pp. 161–172.
REICRE-2000-Neumann #risk management
Requirements-Related Risks in Critical Systems (PGN), p. 3–?.
ITiCSEITiCSE-1999-ParkerH #industrial #risk management
Campus-based industrial software projects: risks and rewards (HP, MH), p. 189.
WCREWCRE-1999-Sneed #re-engineering #risk management
Risks Involved in Reengineering Projects (HMS), pp. 204–211.
CAiSECAiSE-1999-VerhoefF #in the large #risk management
Risk Management for IT in the Large (DV, MF), pp. 57–72.
ICMLICML-1999-BlanzieriR #classification #metric #nearest neighbour
A Minimum Risk Metric for Nearest Neighbor Classification (EB, FR), pp. 22–31.
MLDMMLDM-1999-Scaringella #data mining #mining #monitoring #risk management
A Data Mining Application for Monitoring Environmental Risks (AS), pp. 209–215.
TOOLSTOOLS-ASIA-1999-Zhou #analysis #assessment #object-oriented #using
Risk Analysis and Assessment Using Object-Oriented Techniques (BZ), pp. 142–145.
RERE-1999-GreerBS #risk management #using
Prioritisation of System Changes using Cost-Benefit and Risk Assessments (DG, DWB, TS), p. 180–?.
SACSAC-1999-FinkH #assessment #multi #risk management
The Disease Progression Explorer: Risk Assessment Support in Chronic, Multifactorial Diseases (PKF, LTH), pp. 46–51.
SACSAC-1999-PittsC #simulation #visualisation
Peripherality Based Level of Detail Switching as a Visualization Enhancement of High-Risk Simulations (GP, DC), pp. 98–104.
ICSEICSE-1999-BenlarbiM #metric #morphism #polymorphism #predict #risk management
Polymorphism Measures for Early Risk Prediction (SB, WLM), pp. 334–344.
ICSEICSE-1999-Kontio #bibliography #development #risk management
Risk Management in Software Development: A Technology Overview and the Riskit Method (JK), pp. 679–680.
CSEETCSEET-1998-Hall #risk management
Training Risk Management: Bridge over Troubled Waters (EMH), pp. 36–39.
CAiSECAiSE-1998-TanziSG #information management #realtime #risk management
Real-Time Information System for Risk Management on Motorways (TT, SS, RG), pp. 325–338.
FSEFSE-1998-KontioGL #case study #concept #experience #process #risk management #using
Experiences in Improving Risk Management Processes Using the Concepts of the Riskit Method (JK, GG, DL), pp. 163–172.
ICSEICSE-1998-BriandEB #assessment #benchmark #estimation #hybrid #metric #named #risk management
COBRA: A Hybrid Method for Software Cost Estimation, Benchmarking, and Risk Assessment (LCB, KEE, FB), pp. 390–399.
ICSMEICSM-2000-Schneidewind #maintenance #metric #process #reliability #using
Measuring and evaluating maintenance process using reliability, risk, and test metrics (NFS), p. 232–?.
HCIHCI-CC-1997-SuhCSS
Perceived Work-Related Risk in Stress and Musculoskeletal Discomfort (HS, PC, FS, MJS), pp. 517–519.
ICMLICML-1996-EzawaSN #learning #network #risk management
Learning Goal Oriented Bayesian Networks for Telecommunications Risk Management (KJE, MS, SWN), pp. 139–147.
KRKR-1996-Tennenholtz #equilibrium #on the #social
On Stable Social Laws and Qualitative Equilibrium for Risk-Averse Agents (MT), pp. 553–561.
HPDCHPDC-1996-SolimanE #adaptation #clustering #distributed #performance #simulation
An Efficient Clustered Adaptive-Risk Technique for Distributed Simulation (HMS, ASE), pp. 383–391.
ASEKBSE-1994-Madachy #assessment #estimation #knowledge-based #risk management
Knowledge-Based Risk Assessment and Cost Estimation (RJM), pp. 172–178.
ASEKBSE-1994-Toth #risk management
Software Technology Risk Advisor (GAT), pp. 179–188.
ICMLICML-1994-Heger #learning
Consideration of Risk in Reinformance Learning (MH), pp. 105–111.
KDDKDD-1994-Siebes #database #scalability
Homogeneous Discoveries Contain No Surprises: Inferring Risk Profiles from Large Databases (AS), pp. 97–108.
KRKR-1994-KoenigS #graph #probability
Risk-Sensitive Planning with Probabilistic Decision Graphs (SK, RGS), pp. 363–373.
ICSMECSM-1993-HinleyB #risk management
Reducing the Risks in Software Improvement Through Process-Orientated Management (DSH, KHB), pp. 319–328.
HCIHCI-ACS-1993-DoosB #development #human-computer #interactive #safety
Disturbances in Production — A Safety Risk or a Chance for Development in the Human-Computer Interaction Context (MD, TB), pp. 809–814.
HCIHCI-ACS-1993-Franco #approach #hypermedia
From Risk to Disease: Capturing Knowledge by a Hypertext Approach (GF), pp. 438–443.
HCIHCI-ACS-1993-LimC #approach #cumulative
An Integrated Approach to Cumulative Trauma Disorders in Computerized Offices: The Role of Psychosocial Work Factors, Psychological Stress and Ergonomic Risk Factors (SYL, PC), pp. 880–885.
HCIHCI-ACS-1993-Martin
Of Mice and Pens: Low Risk Healthy Postures for Modern Computing (MGM), pp. 791–796.
SEKESEKE-1993-Paul #maturity #metric #risk management
Software Maturity Measurement for Software Risk Management (RAP), pp. 641–648.
ICSEICSE-1993-BriandTH #development #modelling
Modeling and Managing Risk Early in Software Development (LCB, WMT, CJH), pp. 55–65.
ESECESEC-1989-Boehm #risk management
Software Risk Management (BWB), pp. 1–19.
SOSPSOSP-1989-LomasGSN #risk management
Reducing Risks from Poorly Chosen Keys (TMAL, LG, JHS, RMN), pp. 14–18.
HCIHCI-CE-1987-Zimolong #flexibility #simulation
Decision Aids and Risk Taking in Flexible Manufacturing Systems: A Simulation Study (BZ), pp. 265–272.
HCIHCI-SES-1987-JenkinsG #development #evaluation #interactive
Development and Evaluation of a Risk Based Interactive Decision Aid (JPJ, JCG), pp. 173–180.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.