中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 会议论文
Title:
Search based risk mitigation planning in project portfolio management
Author: Xiao, Junchao (1) ; Osterweil, Leon J. (2) ; Chen, Jie (1) ; Wang, Qing (1) ; Li, Mingshu (1)
Conference Name: 2013 International Conference on Software and Systems Process, ICSSP 2013
Conference Date: May 18, 2013 - May 19, 2013
Issued Date: 2013
Conference Place: San Francisco, CA, United states
Publish Place: Association for Computing Machinery, General Post Office, P.O. Box 30777, NY 10087-0777, United States
Indexed Type: EI
ISBN: 9781450320627
Department: (1) Laboratory for Internet Software Technologies, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China; (2) Department of Computer Science, University of Massachusetts, Amherst, MA 01003-9264, United States; (3) State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
Abstract: Software projects are always facing various risks. These risks should be identified, analyzed, prioritized, mitigated, monitored and controlled. After risks are identified and analyzed, resources must then be devoted to mitigation. However, risk prioritization and mitigation planning are complicated problems. Especially in project portfolio management (PPM), resource contention among projects leads to difficulty in choosing and executing mitigation actions. This paper introduces a search based risk mitigation planning method that is useful in PPM. It integrates the analysis of risks, consideration of available resources, and evaluation of possible effects when taking risk mitigation actions. The method uses a genetic algorithm to search for the risk mitigation plan of optimal value. A case study shows how this method can identify effective risk mitigation plans, thus providing useful decision support for managers. Copyright 2013 ACM.
English Abstract: Software projects are always facing various risks. These risks should be identified, analyzed, prioritized, mitigated, monitored and controlled. After risks are identified and analyzed, resources must then be devoted to mitigation. However, risk prioritization and mitigation planning are complicated problems. Especially in project portfolio management (PPM), resource contention among projects leads to difficulty in choosing and executing mitigation actions. This paper introduces a search based risk mitigation planning method that is useful in PPM. It integrates the analysis of risks, consideration of available resources, and evaluation of possible effects when taking risk mitigation actions. The method uses a genetic algorithm to search for the risk mitigation plan of optimal value. A case study shows how this method can identify effective risk mitigation plans, thus providing useful decision support for managers. Copyright 2013 ACM.
Language: 英语
Content Type: 会议论文
URI: http://ir.iscas.ac.cn/handle/311060/16658
Appears in Collections:软件所图书馆_会议论文

Files in This Item:

There are no files associated with this item.


Recommended Citation:
Xiao, Junchao ,Osterweil, Leon J. ,Chen, Jie ,et al. Search based risk mitigation planning in project portfolio management[C]. 见:2013 International Conference on Software and Systems Process, ICSSP 2013. San Francisco, CA, United states. May 18, 2013 - May 19, 2013.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Xiao, Junchao (1)]'s Articles
[Osterweil, Leon J. (2)]'s Articles
[Chen, Jie (1)]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Xiao, Junchao (1)]‘s Articles
[Osterweil, Leon J. (2)]‘s Articles
[Chen, Jie (1)]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace