Match!
Jie Wan
Chinese Academy of Sciences
3Publications
1H-index
3Citations
Publications 3
Newest
#1Chunbing BaoH-Index: 3
#2Jie WanH-Index: 1
Last.Jianping LiXiaoleiH-Index: 19
view all 4 authors...
AbstractRisk matrices have been proven as useful risk management tools, especially in the cases where data are not sufficient. Current usage of risk matrices in both literature and practice is related to single risk assessment. However, sometimes the decision makers care more about the overall risk consisting of several of single risks, which is in the scope of the aggregation of single risks measured by risk matrices. Unfortunately, two notions, namely, incomparability of different qualitative ...
#1Dengsheng Wu (CAS: Chinese Academy of Sciences)H-Index: 10
#2Xiaoqian Zhu (CAS: Chinese Academy of Sciences)H-Index: 7
Last.Jianping LiXiaolei (CAS: Chinese Academy of Sciences)H-Index: 19
view all 5 authors...
Studies on software risk response theories and methods play an important role in improving the success rate of software project. With the requirement of software risk management, the existing single-objective risk response strategies section model is difficult to manage software risks effectively. This paper regards software risk response cost and software risk exposure as optimization objectives and proposes a multiobjective risk response strategies optimization model for software project. Furt...
#1Chunbing Bao (CAS: Chinese Academy of Sciences)H-Index: 3
#2Dengsheng Wu (CAS: Chinese Academy of Sciences)H-Index: 10
Last.Jianming Chen (CAS: Chinese Academy of Sciences)H-Index: 6
view all 5 authors...
Abstract The design of risk matrices is a topic that has not reached a consensus, although risk matrices are widely used in practice. Several methods have been proposed to help design risk matrices. However, all the methods seem to have their own advantages, and it is difficult for the decision makers to choose one. In this paper, we compare two different risk matrix design methods from the perspective of applicability. Specifically, we give three detailed scenarios where different settings of t...
1