3 Editorial. CEPIS UPGRADE: A Proud Farewell — Nello Scarabottolo, President of CEPIS
暂无分享,去创建一个
Darren Dalcher | Nello Scarabottolo | Martin Neil | Norman Fenton | Dídac López-Viñas | Former President | N. Fenton | M. Neil | D. Dalcher | N. Scarabottolo | Former President | Dídac López-Viñas
[1] Norman Fenton,et al. Risk Assessment and Decision Analysis with Bayesian Networks , 2012 .
[2] David Cleden,et al. Managing Project Uncertainty , 2012 .
[3] S. Anand. Enterprise Risk Management-Integrated Framework , 2012 .
[4] David T. Hulett,et al. Integrated Cost-Schedule Risk Analysis , 2011 .
[5] Prodromos D. Chatzoglou,et al. Software Development Project Risk Management: A New Conceptual Framework , 2011, J. Softw. Eng. Appl..
[6] R. Shankar,et al. Principles of Quantum Mechanics , 2010 .
[7] Elaine Harris,et al. Strategic Project Risk Appraisal and Management , 2009 .
[8] David Hillson,et al. Managing Risk in Projects , 2009 .
[9] David Hulett,et al. Practical Schedule Risk Analysis , 2009 .
[10] Gary Klein,et al. The relation of requirements uncertainty and stakeholder perception gaps to project management performance , 2009, J. Syst. Softw..
[11] Matej Kristan,et al. Closed-world tracking of multiple interacting targets for indoor-sports applications , 2009, Comput. Vis. Image Underst..
[12] Joseph R. Wirthlin,et al. Identifying enterprise leverage points in Defense Acquisition Program performance , 2009 .
[13] Rainer Herpers,et al. Event detection for video surveillance using an expert system , 2008, AREA '08.
[14] Rodica Holonec,et al. An Automated Sorting System Based on Virtual Instrumentation Techniques , 2008, Int. J. Online Eng..
[15] Sun-Jen Huang,et al. Exploring the relationship between software project duration and risk exposure: A cluster analysis , 2008, Inf. Manag..
[16] George Westerman,et al. IT Risk: Turning Business Threats into Competitive Advantage , 2007 .
[17] John D. W. Morecroft,et al. Strategic Modelling and Business Dynamics: A Feedback Systems Approach , 2007 .
[18] Nassim Nicholas Taleb,et al. The Black Swan: The Impact of the Highly Improbable , 2007 .
[19] E. B. Manoukian,et al. Quantum Theory: A Wide Spectrum , 2006 .
[20] Bent Flyvbjerg,et al. From Nobel Prize to Project Management: Getting Risks Right , 2006, ArXiv.
[21] Chris Chapman,et al. Key points of contention in framing assumptions for risk and uncertainty management , 2006 .
[22] M. Tuchler,et al. Accuracy of a commercial UWB 3D location/tracking system and its impact on LT application scenarios , 2005, 2005 IEEE International Conference on Ultra-Wideband.
[23] Mark Keil,et al. Understanding software project risk: a cluster analysis , 2004, Inf. Manag..
[24] Gonzalo R. Arce,et al. Nonlinear Signal Processing - A Statistical Approach , 2004 .
[25] Blaz Zupan,et al. Orange: From Experimental Machine Learning to Interactive Data Mining , 2004, PKDD.
[26] Terry Williams,et al. Why Monte Carlo Simulations of Project Networks Can Mislead , 2004 .
[27] Christoph Meinel,et al. Tele-Lab "IT-Security" on CD: portable, reliable and safe IT security training , 2004, Comput. Secur..
[28] Søren L. Buhl,et al. What Causes Cost Overrun in Transport Infrastructure Projects? , 2004, 1304.4476.
[29] John C. Goodpasture. Quantitative Methods in Project Management , 2003 .
[30] F. Michael Dedolph,et al. The neglected management activity: Software risk management , 2003, Bell Labs Technical Journal.
[31] D. Kahneman,et al. Delusions of success. How optimism undermines executives' decisions. , 2003, Harvard business review.
[32] Martin Fowler,et al. Patterns of Enterprise Application Architecture , 2002 .
[33] Michael T. Pich,et al. Managing project uncertainty: from variation to chaos , 2002, IEEE Engineering Management Review.
[34] Robert C. Martin. Agile Software Development, Principles, Patterns, and Practices , 2002 .
[35] R. Stallman,et al. Free Software, Free Society , 2002 .
[36] Guy M. Merritt. Proactive Risk Management: Controlling Uncertainty in Product Development , 2002 .
[37] Søren L. Buhl,et al. Underestimating Costs in Public Works Projects: Error or Lie? , 2002, 1303.6604.
[38] John D. Sterman,et al. System Dynamics: Systems Thinking and Modeling for a Complex World , 2002 .
[39] Russell L. Purvis,et al. Project Management under Uncertainty: The Impact of Heuristics and Biases , 2002 .
[40] John R. Schuyler,et al. Risk and Decision Analysis in Projects , 2001 .
[41] Kalle Lyytinen,et al. Identifying Software Project Risks: An International Delphi Study , 2001, J. Manag. Inf. Syst..
[42] Steven Pender,et al. Managing incomplete knowledge: Why risk management is not sufficient , 2001 .
[43] Yacov Y. Haimes,et al. Are we forgetting the risks of information technology? , 2000, Computer.
[44] S. Pfleeger. Risky business , 2000, Nature Medicine.
[45] Mark Keil,et al. An investigation of risk perception and risk propensity on the decision to continue a software development project , 2000, J. Syst. Softw..
[46] Ian Witten,et al. Data Mining , 2000 .
[47] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[48] Robert K. Wysocki,et al. Effective Project Management: Traditional, Adaptive, Extreme , 2000 .
[49] Kalle Lyytinen,et al. Components of Software Development Risk: How to Address Them? A Project Manager Survey , 2000, IEEE Trans. Software Eng..
[50] Gary Klein,et al. Risks to different aspects of system success , 1999, Inf. Manag..
[51] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .
[52] S. R. Jammalamadaka,et al. Against the Gods: The Remarkable Story of Risk , 1999 .
[53] Ivar Jacobson,et al. The Unified Modeling Language User Guide , 1998, J. Database Manag..
[54] Terry Williams,et al. System dynamics in project management: assessing the impacts of client behaviour on project performance , 1998, J. Oper. Res. Soc..
[55] John Bowers,et al. The role of system dynamics in project management , 1996 .
[56] Lotfi A. Zadeh,et al. Fuzzy Sets , 1996, Inf. Control..
[57] R. Buehler,et al. Exploring the "planning fallacy": Why people underestimate their task completion times. , 1994 .
[58] S. Plous. The psychology of judgment and decision making , 1994 .
[59] Richard E. Fairley,et al. Risk management for software projects , 1994, IEEE Software.
[60] Barry W. Boehm,et al. Software Risk Management , 1989, ESEC.
[61] Robert N. Charette,et al. Software Engineering Risk Analysis and Management , 1989 .
[62] D. Cervone,et al. Anchoring, Efficacy and Action: The Influence of Judgmental Heuristics on Self-Efficacy Judgments a , 1986 .
[63] P. Pollard,et al. On the conflict between logic and belief in syllogistic reasoning , 1983, Memory & cognition.
[64] G. W. Hill. Group versus individual performance: are n + 1 heads better than one?" psychological bulletin , 1982 .
[65] A. Tversky,et al. Judgment under Uncertainty: Heuristics and Biases , 1974, Science.
[66] Daniel Kahneman,et al. Availability: A heuristic for judging frequency and probability , 1973 .
[67] Rudolf Bayer,et al. Symmetric binary B-Trees: Data structure and maintenance algorithms , 1972, Acta Informatica.
[68] A. Tversky,et al. BELIEF IN THE LAW OF SMALL NUMBERS , 1971, Pediatrics.
[69] P. Wason. On the Failure to Eliminate Hypotheses in a Conceptual Task , 1960 .
[70] R. E. Kalman,et al. A New Approach to Linear Filtering and Prediction Problems , 2002 .
[71] P. Dirac. Principles of Quantum Mechanics , 1982 .
[72] Nolberto Munier,et al. A Strategy for Using Multicriteria Analysis in Decision-Making , 2011 .
[73] David Mallon,et al. Learning Management Systems 2009 , 2009 .
[74] Alain Bensoussan,et al. Risk and Decision Analysis , 2009, Risk Decis. Anal..
[75] Mira Kajko-Mattsson,et al. State of Software Risk Management Practice , 2008 .
[76] Kim Wikström,et al. Defining uncertainty in projects – a new perspective , 2008 .
[77] Christoph Meinel,et al. Awareness Creation mit Tele-Lab IT-Security: Praktisches Sicherheitstraining im virtuellen Labor am Beispiel Trojanischer Pferde , 2008, Sicherheit.
[78] Matjaz Gams,et al. Intelligent High-Security Access Control , 2007, Informatica.
[79] Bryan Johnson,et al. Project Risk Forecasting Method , 2005 .
[80] Simon Rogerson,et al. RESPONSIBLE RISK ANALYSIS FOR SOFTWARE DEVELOPMENT: CREATING THE SOFTWARE DEVELOPMENT IMPACT STATEMENT , 2005 .
[81] Christoph Meinel,et al. A Tutoring System for IT Security , 2003, World Conference on Information Security Education.
[82] Jim Arlow,et al. Enterprise Patterns and MDA: Building Better Software with Archetype Patterns and UML , 2003 .
[83] David Hillson,et al. Use a Risk Breakdown Structure (RBS) to Understand Your Risks , 2002 .
[84] Alexandre G. Rodrigues,et al. Managing and Modelling Project Risk Dynamics A System Dynamics-based Framework , 2001 .
[85] Sophie Engle,et al. AN INTRODUCTION TO ARP SPOOFING , 2001 .
[86] William Yurcik,et al. Different Approaches in the Teaching of Information Systems Security , 2001 .
[87] Alexandre G. Rodrigues,et al. The application of system dynamics to project management : an integrated methodology , 2000 .
[88] A. J. Guimarães Rodrigues. Finding a Common Language for Global Software Projects , 1999 .
[89] Martyn A. Ould,et al. Managing Software Quality and Business Risk , 1999 .
[90] Capers Jones,et al. Assessment and control of software risks , 1994, Yourdon Press Computing Series.
[91] J. Carroll. The Effect of Imagining an Event on Expectations for the Event: An Interpretation in Terms of the Availability Heuristic. , 1978 .