Search Results

There are 27458 results for: content related to: Shortcuts in Complex Engineering Systems: A Principal-Agent Approach to Risk Management

  1. The Development of Posterior Probability Models in Risk-Based Integrity Modeling

    Risk Analysis

    Volume 30, Issue 3, March 2010, Pages: 400–420, Premkumar N. Thodi, Faisal I. Khan and Mahmoud R. Haddara

    Version of Record online : 15 FEB 2010, DOI: 10.1111/j.1539-6924.2009.01352.x

  2. Moment Independent Importance Measures: New Results and Analytical Test Cases

    Risk Analysis

    Volume 31, Issue 3, March 2011, Pages: 404–428, Emanuele Borgonovo, William Castaings and Stefano Tarantola

    Version of Record online : 10 NOV 2010, DOI: 10.1111/j.1539-6924.2010.01519.x

  3. Fuzzy Risks and an Updating Algorithm with New Observations

    Risk Analysis

    Volume 28, Issue 3, June 2008, Pages: 681–694, Chongfu Huang and Da Ruan

    Version of Record online : 28 JUN 2008, DOI: 10.1111/j.1539-6924.2008.01057.x

  4. Setting Risk-Informed Environmental Standards for Bacillus Anthracis Spores

    Risk Analysis

    Volume 30, Issue 10, October 2010, Pages: 1602–1622, Tao Hong, Patrick L. Gurian and Nicholas F. Dudley Ward

    Version of Record online : 12 JUL 2010, DOI: 10.1111/j.1539-6924.2010.01443.x

  5. Failure Probability Under Parameter Uncertainty

    Risk Analysis

    Volume 31, Issue 5, May 2011, Pages: 727–744, R. Gerrard and A. Tsanakas

    Version of Record online : 22 DEC 2010, DOI: 10.1111/j.1539-6924.2010.01549.x

  6. Roy’s Safety-First Portfolio Principle in Financial Risk Management of Disastrous Events

    Risk Analysis

    Volume 32, Issue 11, November 2012, Pages: 1856–1872, Mei Choi Chiu, Hoi Ying Wong and Duan Li

    Version of Record online : 10 FEB 2012, DOI: 10.1111/j.1539-6924.2011.01751.x

  7. Subsea Release of Oil from a Riser: An Ecological Risk Assessment

    Risk Analysis

    Volume 28, Issue 5, October 2008, Pages: 1173–1196, Muddassir Nazir, Faisal Khan, Paul Amyotte and Rehan Sadiq

    Version of Record online : 20 SEP 2008, DOI: 10.1111/j.1539-6924.2008.01136.x

  8. Sensitivity Analysis of Model Output with Input Constraints: A Generalized Rationale for Local Methods

    Risk Analysis

    Volume 28, Issue 3, June 2008, Pages: 667–680, Emanuele Borgonovo

    Version of Record online : 28 JUN 2008, DOI: 10.1111/j.1539-6924.2008.01052.x

  9. Enabling a Powerful Marine and Offshore Decision-Support Solution Through Bayesian Network Technique

    Risk Analysis

    Volume 26, Issue 3, June 2006, Pages: 695–721, A. G. Eleye-Datubo, A. Wall, A. Saajedi and J. Wang

    Version of Record online : 21 JUN 2006, DOI: 10.1111/j.1539-6924.2006.00775.x

  10. Methodology for Setting Risk-Based Concentrations of Contaminants in Soil and Groundwater and Application to a Model Contaminated Site

    Risk Analysis

    Volume 32, Issue 1, January 2012, Pages: 122–137, Aiichiro Fujinaga, Iwao Uchiyama, Shinsuke Morisawa, Minoru Yoneda and Yuzuru Sasamoto

    Version of Record online : 6 OCT 2011, DOI: 10.1111/j.1539-6924.2011.01677.x

  11. Adversarial Risk Analysis for Counterterrorism Modeling

    Risk Analysis

    Volume 32, Issue 5, May 2012, Pages: 894–915, Jesus Rios and David Rios Insua

    Version of Record online : 8 DEC 2011, DOI: 10.1111/j.1539-6924.2011.01713.x

  12. Bayesian Methodology for Model Uncertainty Using Model Performance Data

    Risk Analysis

    Volume 28, Issue 5, October 2008, Pages: 1457–1476, Enrique López Droguett and Ali Mosleh

    Version of Record online : 12 SEP 2008, DOI: 10.1111/j.1539-6924.2008.01117.x

  13. International Trade Inoperability Input-Output Model (IT-IIM): Theory and Application

    Risk Analysis

    Volume 29, Issue 1, January 2009, Pages: 137–154, Jeesang Jung, Joost R. Santos and Yacov Y. Haimes

    Version of Record online : 19 SEP 2008, DOI: 10.1111/j.1539-6924.2008.01126.x

  14. Modeling Arbitrary Layers of Continuous-Level Defenses in Facing with Strategic Attackers

    Risk Analysis

    Volume 31, Issue 4, April 2011, Pages: 533–547, Mohsen Golalikhani and Jun Zhuang

    Version of Record online : 24 NOV 2010, DOI: 10.1111/j.1539-6924.2010.01531.x

  15. Optimal Stopping Analysis of a Radiation Detection System to Protect Cities from a Nuclear Terrorist Attack

    Risk Analysis

    Volume 28, Issue 2, April 2008, Pages: 353–371, Michael P. Atkinson, Zheng Cao and Lawrence M. Wein

    Version of Record online : 16 APR 2008, DOI: 10.1111/j.1539-6924.2008.01023.x

  16. Methodology for the Calculation of Annualized Incremental Risks in Systems of Dams

    Risk Analysis

    Volume 31, Issue 6, June 2011, Pages: 1000–1015, Armando Serrano-Lombillo, Ignacio Escuder-Bueno, Manuel G. de Membrillera-Ortuño and Luis Altarejos-García

    Version of Record online : 22 DEC 2010, DOI: 10.1111/j.1539-6924.2010.01547.x

  17. Influence of Routine Slaughtering on the Evolution of BSE: Example of British and French Slaughterings

    Risk Analysis

    Volume 27, Issue 5, October 2007, Pages: 1151–1167, Christine Jacob and Pierre Magal

    Version of Record online : 7 DEC 2007, DOI: 10.1111/j.1539-6924.2007.00951.x

  18. An Overview of Maritime Waterway Quantitative Risk Assessment Models

    Risk Analysis

    Volume 32, Issue 3, March 2012, Pages: 496–512, Suyi Li, Qiang Meng and Xiaobo Qu

    Version of Record online : 28 OCT 2011, DOI: 10.1111/j.1539-6924.2011.01697.x

  19. A Comparison Between Probabilistic and Dempster-Shafer Theory Approaches to Model Uncertainty Analysis in the Performance Assessment of Radioactive Waste Repositories

    Risk Analysis

    Volume 30, Issue 7, July 2010, Pages: 1139–1156, Piero Baraldi and Enrico Zio

    Version of Record online : 20 APR 2010, DOI: 10.1111/j.1539-6924.2010.01416.x

  20. Competing Failure Risk Analysis Using Evidence Theory

    Risk Analysis

    Volume 25, Issue 4, August 2005, Pages: 973–995, Jon C. Helton, William L. Oberkampf and Jay D. Johnson

    Version of Record online : 16 AUG 2005, DOI: 10.1111/j.1539-6924.2005.00644.x