Conferences related to Risk analysis

Back to Top

2013 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII)

This conference provides an idea-exchange and discussion platform for researchers and practitioners interested in information management, innovation management and industrial engineering. The topics will arrange from the technology management theories to the management practice methods and technology.


2013 IEEE Aerospace Conference

The international IEEE Aerospace Conference is organized to promote interdisciplinary understanding of aerospace systems, their underlying science and technology, and their applications to government and commercial endeavors. The annual, weeklong conference, set in a stimulating and thought -provoking environment, is designed for aerospace experts, academics, military personnel, and industry leaders.

  • 2012 IEEE Aerospace Conference

    The international IEEE Aerospace Conference is organized to promote interdisciplinary understanding of aerospace systems, their underlying science and technology, and their applications to government and commercial endeavors. The annual, weeklong conference, set in a stimulating and thought-provoking environment, is designed for aerospace experts, academics, military personnel, and industry leaders.

  • 2011 IEEE Aerospace Conference

    The international IEEE Aerospace Conference is organized to promote interdisciplinary understanding of aerospace systems, their underlying science and technology, and their applications to government and commercial endeavors.

  • 2010 IEEE Aerospace Conference

    The international IEEE Aerospace Conference is organized to promote interdisciplinary understanding of aerospace systems, their underlying science and technology, and their applications to government and commercial endeavors.

  • 2009 IEEE Aerospace Conference

    The international IEEE Aerospace Conference promotes interdisciplinary understanding of aerospace systems, their underlying science and technology, and their applications to government and commercial endeavors. It is an annual, week-long conference designed for aerospace experts, academics, military personnel, and industry leaders and is set in a stimulating, thought-provoking environment.

  • 2008 IEEE Aerospace Conference

    The international IEEE Aerospace Conference is organized to promote interdisciplinary understanding of aerospace systems, their underlying science and technology, and their applications to government and commercial endeavors. It is an annual, week-long conference designed for aerospace experts, academics, military personnel, and industry leaders and is set in a stimulating and thought-provoking environment.

  • 2007 IEEE Aerospace Conference

  • 2006 IEEE Aerospace Conference

  • 2005 IEEE Aerospace Conference


2012 10th World Congress on Intelligent Control and Automation (WCICA 2012)

A. Intelligent Control B. Control Theory and Control Engineering C. Complex Systems and Intelligent Robots D. Others


2012 IEEE 19th International Conference on Industrial Engineering and Engineering Management (IE&EM 2012)

The conference's objective is to gather the wisdom of industrial engineering to promote the innovation and development of manufacturing industry while it's themes are desired to stay close to China's economic construction and cutting edge breakthroughs in IE & EM, with a view of seizing the opportunities of economic development in China and the world.

  • 2011 IEEE 18th International Conference on Industrial Engineering and Engineering Management (IE&EM 2011)

    Advanced Decision Analysis and Methods ,Knowledge Management,Engineering Economy and Cost Analysis,Global celebaration and Communication,Global Information System Integration and Interaction,Global Manufacturing and Management,Information and Product Lifecycle Management,Intelligent Systems,Manufacturing Systems,Operations Research,Production Planning and Control,Quality Control and Management,Reliability and Maintenance Engineering,Safety, Security and Risk Management,Service Management,Systems Modeli

  • 2010 IEEE 17th International Conference on Industrial Engineering and Engineering Management (IE&EM 2010)

    Advanced Decision Analysis and Methods ,Knowledge Management,Engineering Economy and Cost Analysis,Global celebaration and Communication,Global Information System Integration and Interaction,Global Manufacturing and Management,Information and Product Lifecycle Management,Intelligent Systems,Manufacturing Systems,Operations Research,Production Planning and Control,Quality Control and Management,Reliability and Maintenance Engineering,Safety, Security and Risk Management,Service Management,Systems Modeling/S


2012 IEEE 3rd International Conference on Emergency Management and Management Sciences (ICEMMS)

Management Science, Project Management, Urban Management, Emergency Management, Knowledge Management, Decision Support System Innovation, Policy, Managing IT E-Commerce Innovation and Entrepreneurship Process Innovation E-business process Human resources

  • 2011 2nd IEEE International Conference on Emergency Management and Management Sciences (ICEMMS)

    Management Science; Project Management; Urban Management; Emergency Management; Knowledge Management; Decision Support System Innovation; Policy; Managing IT E-Commerce Innovation and Entrepreneurship Process Innovation E-business process Human resources strategy Facilities Planning and Management Global Manufacturing and Management Manufacturing Process and Systems Supply Chain Management Systems Modeling and Simulation Operations Research Production Planning and Control Project Man

  • 2010 IEEE International Conference on Emergency Management and Management Sciences (ICEMMS)

    Methods and Techniques for Software Development, Software Maintenance, Requirements Engineering, Model-driven Architecture and Engineering,Re-engineering and Reverse Engineering, Software Management, Model Engineering ,Software Architectures Design, Frameworks and Design Patterns, Architecture-Centered Development, Component-based Design , Middleware Components, Software Quality, Quality Management and Assurance, Risk Analysis, Program Analysis, Verification and Validation, Testing of Software Systems, Soft


More Conferences

Periodicals related to Risk analysis

Back to Top

Software Engineering, IEEE Transactions on

Specification, development, management, test, maintenance, and documentation of computer software.



Most published Xplore authors for Risk analysis

Back to Top

Xplore Articles related to Risk analysis

Back to Top

A site wide risk assessment at Intel Corporation in New Mexico

J. R. Casciano Semiconductor Manufacturing Conference Proceedings, 1997 IEEE International Symposium on, 1997

Intel New Mexico has received intense public scrutiny since the construction of Fab 11, RR4, RR5, and the supporting Central Utilities buildings. Community concerns about routine emissions of chemicals, and the potential accidental release had been raised individually and in public forums. While Intel has historically incorporated risk assessment and risk management into facility and process design and installation, no ...


Analytical Framework for the Management of Risk in Supply Chains

Roshan S. Gaonkar; N. Viswanadham IEEE Transactions on Automation Science and Engineering, 2007

In this paper, we develop a framework to classify supply chain risk-management problems and approaches for the solution of these problems. We argue that risk-management problems need to be handled at three levels: 1) strategic, 2) operational, and 3) tactical. In addition, risk within the supply chain might manifest itself in the form of deviations, disruptions, and disasters. To handle ...


Principles of trust for MAS: cognitive anatomy, social importance, and quantification

C. Castelfranchi; R. Falcone Multi Agent Systems, 1998. Proceedings. International Conference on, 1998

After arguing about the crucial importance of trust for Agents and MAS, we provide a definition of trust both as a mental state and as a social attitude and relation. We present the mental ingredients of trust: its specific beliefs and goals, with special attention to evaluations and expectations. We show the relation between trust and the mental background of ...


Multiscale hidden Markov model applied to ECG segmentation

S. Graja; J. -M. Boucher Intelligent Signal Processing, 2003 IEEE International Symposium on, 2003

A new electrocardiogram (ECG) segmentation method is proposed, which uses a Wavelet Tree Hidden Markov Model. The principle of this approach is, on one hand, to use wavelet coefficients to characterize the different ECG waves, and on the other hand, to link these coefficients by a tree structure permitting to detect wave changes. By associating this method to a fusion ...


Development of the risk oriented program optimization tool (ROPOT) for orbital space plane design concepts

B. F. Putney; J. R. Fragola Reliability and Maintainability, 2004 Annual Symposium - RAMS, 2004

The preliminary design phase of any program is the key to its eventual successful development. The more advanced a design, the more this tends to be true. For this reason, the preliminary design phase is particularly important in the design of aerospace systems. Errors in preliminary design tend to be fundamental and tend to cause programs to be abandoned, or ...


More Xplore Articles

Educational Resources on Risk analysis

Back to Top

eLearning

A site wide risk assessment at Intel Corporation in New Mexico

J. R. Casciano Semiconductor Manufacturing Conference Proceedings, 1997 IEEE International Symposium on, 1997

Intel New Mexico has received intense public scrutiny since the construction of Fab 11, RR4, RR5, and the supporting Central Utilities buildings. Community concerns about routine emissions of chemicals, and the potential accidental release had been raised individually and in public forums. While Intel has historically incorporated risk assessment and risk management into facility and process design and installation, no ...


Analytical Framework for the Management of Risk in Supply Chains

Roshan S. Gaonkar; N. Viswanadham IEEE Transactions on Automation Science and Engineering, 2007

In this paper, we develop a framework to classify supply chain risk-management problems and approaches for the solution of these problems. We argue that risk-management problems need to be handled at three levels: 1) strategic, 2) operational, and 3) tactical. In addition, risk within the supply chain might manifest itself in the form of deviations, disruptions, and disasters. To handle ...


Principles of trust for MAS: cognitive anatomy, social importance, and quantification

C. Castelfranchi; R. Falcone Multi Agent Systems, 1998. Proceedings. International Conference on, 1998

After arguing about the crucial importance of trust for Agents and MAS, we provide a definition of trust both as a mental state and as a social attitude and relation. We present the mental ingredients of trust: its specific beliefs and goals, with special attention to evaluations and expectations. We show the relation between trust and the mental background of ...


Multiscale hidden Markov model applied to ECG segmentation

S. Graja; J. -M. Boucher Intelligent Signal Processing, 2003 IEEE International Symposium on, 2003

A new electrocardiogram (ECG) segmentation method is proposed, which uses a Wavelet Tree Hidden Markov Model. The principle of this approach is, on one hand, to use wavelet coefficients to characterize the different ECG waves, and on the other hand, to link these coefficients by a tree structure permitting to detect wave changes. By associating this method to a fusion ...


Development of the risk oriented program optimization tool (ROPOT) for orbital space plane design concepts

B. F. Putney; J. R. Fragola Reliability and Maintainability, 2004 Annual Symposium - RAMS, 2004

The preliminary design phase of any program is the key to its eventual successful development. The more advanced a design, the more this tends to be true. For this reason, the preliminary design phase is particularly important in the design of aerospace systems. Errors in preliminary design tend to be fundamental and tend to cause programs to be abandoned, or ...


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Risk analysis"

IEEE-USA E-Books

  • Appendix A: Introduction to Statistics of Simulation

    This appendix contains sections titled: Risk Analysis and Probability Probability Distributions Monte Carlo Analysis Analysis of Simulation Input Experimental Design Analysis of Simulation Output Major References Appendix A Summary Exercises

  • Risk, Reliability, and Testing Case Study

    This chapter contains sections titled: Objectives Overview of the Principles of Risk-Driven Reliability Model and Test Process Model and Process Basics Safety Critical Software Considerations Risk Analysis Reliability Analysis Predictions and Prediction Accuracy Tradeoff between Consumer's Risk and Producer's Risk Example Poisson Process Problem: First and Second Tests NASA Space Shuttle Application NASA Space Shuttle Application Summary This chapter contains sections titled: References

  • No title

    The authors cover two general topics: basic engineering economics and risk analysis in this text. Within the topic of engineering economics are discussions on the time value of money and interest relationships. These interest relationships are used to define certain project criteria that are used by engineers and project managers to select the best economic choice among several alternatives. Projects examined will include both income- and service-producing investments. The effects of escalation, inflation, and taxes on the economic analysis of alternatives are discussed. Risk analysis incorporates the concepts of probability and statistics in the evaluation of alternatives. This allows management to determine the probability of success or failure of the project. Two types of sensitivity analyses are presented. The first is referred to as the range approach while the second uses probabilistic concepts to determine a measure of the risk involved. The authors have designed the text to as ist individuals to prepare to successfully complete the economics portions of the Fundamentals of Engineering Exam. Table of Contents: Introduction / Interest and the Time Value of Money / Project Evaluation Methods / Service Producing Investments / Income Producing Investments / Determination of Project Cash Flow / Financial Leverage / Basic Statistics and Probability / Sensitivity Analysis

  • Back Matter

    Novel technologies and scientific advancements offer not only opportunities but risks. Technological systems are vulnerable to human error and technical malfunctioning that have far-reaching consequences: one flipped switch can cause a cascading power failure across a networked electric grid. Yet, once addressed, vulnerability accompanied by coping mechanisms may yield a more flexible and resilient society. This book investigates vulnerability, in both its negative and positive aspects, in technological cultures. The contributors argue that viewing risk in terms of vulnerability offers a novel approach to understanding the risks and benefits of science and technology. Such an approach broadens conventional risk analysis by connecting to issues of justice, solidarity, and livelihood, and enabling comparisons between the global north and south. The book explores case studies that range from agricultural practices in India to neonatal intensive care medicine in Western hospitals; these cases, spanning the issues addressed in the book, illustrate what vulnerability is and does. The book offers conceptual frameworks for empirical description and analysis of vulnerability that elucidate its ambiguity, context dependence, and constructed nature. Finally, the book addresses the implications of these analyses for the governance of vulnerability, proposing a more reflexive way of dealing with vulnerability in technological cultures.ContributorsMarjolein van Asselt, Martin Boeckhout, Wiebe Bijker, Tessa Fox, Stephen Healy, Anique Hommels, Sheila Jasanoff,Jozef Keulartz, Jessica Mesman, Ger Palmboom, C. Shambu Prasad, Julia Quartz, Johan M. Sanne, Maartje Schermer, Teesta Setelvad, Esha Shah, Andy Stirling, Imrat Verhoeven, Esther Versluis, Shiv Visvanathan, Gerard de Vries, Ger Wa ckers, Dick Willems

  • Framing the Vulnerability Issue

    Novel technologies and scientific advancements offer not only opportunities but risks. Technological systems are vulnerable to human error and technical malfunctioning that have far-reaching consequences: one flipped switch can cause a cascading power failure across a networked electric grid. Yet, once addressed, vulnerability accompanied by coping mechanisms may yield a more flexible and resilient society. This book investigates vulnerability, in both its negative and positive aspects, in technological cultures. The contributors argue that viewing risk in terms of vulnerability offers a novel approach to understanding the risks and benefits of science and technology. Such an approach broadens conventional risk analysis by connecting to issues of justice, solidarity, and livelihood, and enabling comparisons between the global north and south. The book explores case studies that range from agricultural practices in India to neonatal intensive care medicine in Western hospitals; these cases, spanning the issues addressed in the book, illustrate what vulnerability is and does. The book offers conceptual frameworks for empirical description and analysis of vulnerability that elucidate its ambiguity, context dependence, and constructed nature. Finally, the book addresses the implications of these analyses for the governance of vulnerability, proposing a more reflexive way of dealing with vulnerability in technological cultures.ContributorsMarjolein van Asselt, Martin Boeckhout, Wiebe Bijker, Tessa Fox, Stephen Healy, Anique Hommels, Sheila Jasanoff,Jozef Keulartz, Jessica Mesman, Ger Palmboom, C. Shambu Prasad, Julia Quartz, Johan M. Sanne, Maartje Schermer, Teesta Setelvad, Esha Shah, Andy Stirling, Imrat Verhoeven, Esther Versluis, Shiv Visvanathan, Gerard de Vries, Ger Wa ckers, Dick Willems

  • References

    Novel technologies and scientific advancements offer not only opportunities but risks. Technological systems are vulnerable to human error and technical malfunctioning that have far-reaching consequences: one flipped switch can cause a cascading power failure across a networked electric grid. Yet, once addressed, vulnerability accompanied by coping mechanisms may yield a more flexible and resilient society. This book investigates vulnerability, in both its negative and positive aspects, in technological cultures. The contributors argue that viewing risk in terms of vulnerability offers a novel approach to understanding the risks and benefits of science and technology. Such an approach broadens conventional risk analysis by connecting to issues of justice, solidarity, and livelihood, and enabling comparisons between the global north and south. The book explores case studies that range from agricultural practices in India to neonatal intensive care medicine in Western hospitals; these cases, spanning the issues addressed in the book, illustrate what vulnerability is and does. The book offers conceptual frameworks for empirical description and analysis of vulnerability that elucidate its ambiguity, context dependence, and constructed nature. Finally, the book addresses the implications of these analyses for the governance of vulnerability, proposing a more reflexive way of dealing with vulnerability in technological cultures.ContributorsMarjolein van Asselt, Martin Boeckhout, Wiebe Bijker, Tessa Fox, Stephen Healy, Anique Hommels, Sheila Jasanoff,Jozef Keulartz, Jessica Mesman, Ger Palmboom, C. Shambu Prasad, Julia Quartz, Johan M. Sanne, Maartje Schermer, Teesta Setelvad, Esha Shah, Andy Stirling, Imrat Verhoeven, Esther Versluis, Shiv Visvanathan, Gerard de Vries, Ger Wa ckers, Dick Willems

  • The Governance of Vulnerability

    Novel technologies and scientific advancements offer not only opportunities but risks. Technological systems are vulnerable to human error and technical malfunctioning that have far-reaching consequences: one flipped switch can cause a cascading power failure across a networked electric grid. Yet, once addressed, vulnerability accompanied by coping mechanisms may yield a more flexible and resilient society. This book investigates vulnerability, in both its negative and positive aspects, in technological cultures. The contributors argue that viewing risk in terms of vulnerability offers a novel approach to understanding the risks and benefits of science and technology. Such an approach broadens conventional risk analysis by connecting to issues of justice, solidarity, and livelihood, and enabling comparisons between the global north and south. The book explores case studies that range from agricultural practices in India to neonatal intensive care medicine in Western hospitals; these cases, spanning the issues addressed in the book, illustrate what vulnerability is and does. The book offers conceptual frameworks for empirical description and analysis of vulnerability that elucidate its ambiguity, context dependence, and constructed nature. Finally, the book addresses the implications of these analyses for the governance of vulnerability, proposing a more reflexive way of dealing with vulnerability in technological cultures.ContributorsMarjolein van Asselt, Martin Boeckhout, Wiebe Bijker, Tessa Fox, Stephen Healy, Anique Hommels, Sheila Jasanoff,Jozef Keulartz, Jessica Mesman, Ger Palmboom, C. Shambu Prasad, Julia Quartz, Johan M. Sanne, Maartje Schermer, Teesta Setelvad, Esha Shah, Andy Stirling, Imrat Verhoeven, Esther Versluis, Shiv Visvanathan, Gerard de Vries, Ger Wa ckers, Dick Willems

  • Managing Project Risk

    This chapter contains sections titled: Introduction to Managing Project Risk Objectives of This Chapter An Overview of Risk Management for Software Projects Conventional Project Management Techniques Risk Identification Techniques Risk Analysis and Prioritization Risk Mitigation Strategies Top-N Risk Tracking and Risk Registers Controlling the Risk Management Process Crisis Management Risk Management at the Organizational Level Joint Risk Management Key Points of Chapter 9 References Exercises Appendix 9A: Frameworks, Standards, and Guidelines for Risk Management Appendix 9B: Software Risk Management Glossary

  • Exploring the Ambiguity of Vulnerability

    Novel technologies and scientific advancements offer not only opportunities but risks. Technological systems are vulnerable to human error and technical malfunctioning that have far-reaching consequences: one flipped switch can cause a cascading power failure across a networked electric grid. Yet, once addressed, vulnerability accompanied by coping mechanisms may yield a more flexible and resilient society. This book investigates vulnerability, in both its negative and positive aspects, in technological cultures. The contributors argue that viewing risk in terms of vulnerability offers a novel approach to understanding the risks and benefits of science and technology. Such an approach broadens conventional risk analysis by connecting to issues of justice, solidarity, and livelihood, and enabling comparisons between the global north and south. The book explores case studies that range from agricultural practices in India to neonatal intensive care medicine in Western hospitals; these cases, spanning the issues addressed in the book, illustrate what vulnerability is and does. The book offers conceptual frameworks for empirical description and analysis of vulnerability that elucidate its ambiguity, context dependence, and constructed nature. Finally, the book addresses the implications of these analyses for the governance of vulnerability, proposing a more reflexive way of dealing with vulnerability in technological cultures.ContributorsMarjolein van Asselt, Martin Boeckhout, Wiebe Bijker, Tessa Fox, Stephen Healy, Anique Hommels, Sheila Jasanoff,Jozef Keulartz, Jessica Mesman, Ger Palmboom, C. Shambu Prasad, Julia Quartz, Johan M. Sanne, Maartje Schermer, Teesta Setelvad, Esha Shah, Andy Stirling, Imrat Verhoeven, Esther Versluis, Shiv Visvanathan, Gerard de Vries, Ger Wa ckers, Dick Willems

  • Risk Analysis

    This chapter contains sections titled: Compliance Versus Risk Approaches The Classic Risk Analysis Model Newer Risk Models Organizational Risk Cultures Risk Averse, Risk Neutral, and Risk Taking Organizations Strategic Versus Tactical Risk Analysis When Compliance-based Models are Appropriate Risk Mitigation Key Points



Standards related to Risk analysis

Back to Top

No standards are currently tagged "Risk analysis"


Jobs related to Risk analysis

Back to Top