Sciweavers

2588 search results - page 21 / 518
» Project risk management
Sort
View
KDD
2005
ACM
89views Data Mining» more  KDD 2005»
14 years 8 months ago
Mining risk patterns in medical data
In this paper, we discuss a problem of finding risk patterns in medical data. We define risk patterns by a statistical metric, relative risk, which has been widely used in epidemi...
Jiuyong Li, Ada Wai-Chee Fu, Hongxing He, Jie Chen...
EDOC
2002
IEEE
14 years 14 days ago
Model-Based Risk Assessment to Improve Enterprise Security
The main objective of the CORAS project is to provide methods and tools for precise, unambiguous, and efficient risk assessment of security critical systems. To this end, we advoc...
Jan Øyvind Aagedal, Folker den Braber, Theo...
ICECCS
2000
IEEE
126views Hardware» more  ICECCS 2000»
13 years 12 months ago
Domain Modeling of Software Process Models
This paper presents a novel application involving two important Software Engineering research areas: process modeling and software reuse. The Spiral Model is a risk-driven process...
Hassan Gomaa, Larry Kerschberg, Ghulam A. Farrukh
ECBS
2008
IEEE
121views Hardware» more  ECBS 2008»
14 years 2 months ago
Agile Release Planning: Dealing with Uncertainty in Development Time and Business Value
Release planning is a critical activity in the software development process. The creation of a clear and realistic plan is extremely difficult, as key factors such as time and cos...
Kevin Logue, Kevin McDaid
SEC
2007
13 years 9 months ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin