Search Results

There are 10718 results for: content related to: Characterizing the Performance of the Conway-Maxwell Poisson Generalized Linear Model

  1. Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome

    Risk Analysis

    Volume 32, Issue 2, February 2012, Pages: 304–318, Gregory Levitin and Kjell Hausken

    Article first published online : 30 JUL 2011, DOI: 10.1111/j.1539-6924.2011.01657.x

  2. The Development of Posterior Probability Models in Risk-Based Integrity Modeling

    Risk Analysis

    Volume 30, Issue 3, March 2010, Pages: 400–420, Premkumar N. Thodi, Faisal I. Khan and Mahmoud R. Haddara

    Article first published online : 15 FEB 2010, DOI: 10.1111/j.1539-6924.2009.01352.x

  3. Adversarial Risk Analysis for Counterterrorism Modeling

    Risk Analysis

    Volume 32, Issue 5, May 2012, Pages: 894–915, Jesus Rios and David Rios Insua

    Article first published online : 8 DEC 2011, DOI: 10.1111/j.1539-6924.2011.01713.x

  4. Moment Independent Importance Measures: New Results and Analytical Test Cases

    Risk Analysis

    Volume 31, Issue 3, March 2011, Pages: 404–428, Emanuele Borgonovo, William Castaings and Stefano Tarantola

    Article first published online : 10 NOV 2010, DOI: 10.1111/j.1539-6924.2010.01519.x

  5. Failure Probability Under Parameter Uncertainty

    Risk Analysis

    Volume 31, Issue 5, May 2011, Pages: 727–744, R. Gerrard and A. Tsanakas

    Article first published online : 22 DEC 2010, DOI: 10.1111/j.1539-6924.2010.01549.x

  6. Roy’s Safety-First Portfolio Principle in Financial Risk Management of Disastrous Events

    Risk Analysis

    Volume 32, Issue 11, November 2012, Pages: 1856–1872, Mei Choi Chiu, Hoi Ying Wong and Duan Li

    Article first published online : 10 FEB 2012, DOI: 10.1111/j.1539-6924.2011.01751.x

  7. Bayesian Methodology for Model Uncertainty Using Model Performance Data

    Risk Analysis

    Volume 28, Issue 5, October 2008, Pages: 1457–1476, Enrique López Droguett and Ali Mosleh

    Article first published online : 12 SEP 2008, DOI: 10.1111/j.1539-6924.2008.01117.x

  8. Modeling Arbitrary Layers of Continuous-Level Defenses in Facing with Strategic Attackers

    Risk Analysis

    Volume 31, Issue 4, April 2011, Pages: 533–547, Mohsen Golalikhani and Jun Zhuang

    Article first published online : 24 NOV 2010, DOI: 10.1111/j.1539-6924.2010.01531.x

  9. Estimating the Probability of Rare Events: Addressing Zero Failure Data

    Risk Analysis

    Volume 31, Issue 7, July 2011, Pages: 1120–1132, John Quigley and Matthew Revie

    Article first published online : 14 JAN 2011, DOI: 10.1111/j.1539-6924.2010.01568.x

  10. Risk Finance for Catastrophe Losses with Pareto-Calibrated Lévy-Stable Severities

    Risk Analysis

    Volume 32, Issue 11, November 2012, Pages: 1967–1977, Michael R. Powers, Thomas Y. Powers and Siwei Gao

    Article first published online : 18 OCT 2012, DOI: 10.1111/j.1539-6924.2012.01906.x

  11. A Comparison Between Probabilistic and Dempster-Shafer Theory Approaches to Model Uncertainty Analysis in the Performance Assessment of Radioactive Waste Repositories

    Risk Analysis

    Volume 30, Issue 7, July 2010, Pages: 1139–1156, Piero Baraldi and Enrico Zio

    Article first published online : 20 APR 2010, DOI: 10.1111/j.1539-6924.2010.01416.x

  12. International Trade Inoperability Input-Output Model (IT-IIM): Theory and Application

    Risk Analysis

    Volume 29, Issue 1, January 2009, Pages: 137–154, Jeesang Jung, Joost R. Santos and Yacov Y. Haimes

    Article first published online : 19 SEP 2008, DOI: 10.1111/j.1539-6924.2008.01126.x

  13. Sensitivity Analysis of Model Output with Input Constraints: A Generalized Rationale for Local Methods

    Risk Analysis

    Volume 28, Issue 3, June 2008, Pages: 667–680, Emanuele Borgonovo

    Article first published online : 28 JUN 2008, DOI: 10.1111/j.1539-6924.2008.01052.x

  14. Cyber Security Risk Management: Public Policy Implications of Correlated Risk, Imperfect Ability to Prove Loss, and Observability of Self-Protection

    Risk Analysis

    Volume 31, Issue 3, March 2011, Pages: 497–512, Hulisi Öğüt, Srinivasan Raghunathan and Nirup Menon

    Article first published online : 30 AUG 2010, DOI: 10.1111/j.1539-6924.2010.01478.x

  15. Shortcuts in Complex Engineering Systems: A Principal-Agent Approach to Risk Management

    Risk Analysis

    Volume 32, Issue 5, May 2012, Pages: 836–854, Russ Garber and Elisabeth Paté-Cornell

    Article first published online : 29 DEC 2011, DOI: 10.1111/j.1539-6924.2011.01736.x

  16. Cost-Benefit Analysis of Passive Fire Protections in Road LPG Transportation

    Risk Analysis

    Volume 32, Issue 2, February 2012, Pages: 200–219, Nicola Paltrinieri, Sarah Bonvicini, Gigliola Spadoni and Valerio Cozzani

    Article first published online : 18 JUL 2011, DOI: 10.1111/j.1539-6924.2011.01654.x

  17. Event-Tree Analysis with Imprecise Probabilities

    Risk Analysis

    Volume 32, Issue 2, February 2012, Pages: 330–344, Xiaomin You and Fulvio Tonon

    Article first published online : 6 NOV 2011, DOI: 10.1111/j.1539-6924.2011.01721.x

  18. Risk Assessment for Hospital-Acquired Diseases: A Risk-Theory Approach

    Risk Analysis

    Volume 29, Issue 4, April 2009, Pages: 565–575, Mathieu Emily, Pierre Casez and Olivier François

    Article first published online : 23 DEC 2008, DOI: 10.1111/j.1539-6924.2008.01176.x

  19. Decision Making Under Uncertainty—An Example for Seismic Risk Management

    Risk Analysis

    Volume 30, Issue 1, January 2010, Pages: 78–94, Solomon Tesfamariam, Rehan Sadiq and Homayoun Najjaran

    Article first published online : 28 DEC 2009, DOI: 10.1111/j.1539-6924.2009.01331.x

  20. Testing Branching Process Estimators of Cascading Failure with Data from a Simulation of Transmission Line Outages

    Risk Analysis

    Volume 30, Issue 4, April 2010, Pages: 650–662, Ian Dobson, Janghoon Kim and Kevin R. Wierzbicki

    Article first published online : 25 FEB 2010, DOI: 10.1111/j.1539-6924.2010.01369.x