Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Event chain methodology

Known as: Event, Event chain 
Event chain methodology helps to mitigate the effect of motivational and cognitive biases in estimating and scheduling.
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
There has been a recent line of work automatically learning scripts from unstructured texts, by modeling narrative event chains… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Silicon photomultipliers (SiPMs) are expected to replace photomultiplier tubes (PMTs) in several applications that require… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Recognizing manipulations performed by a human and the transfer and execution of this by a robot is a difficult problem. We… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Microblogging has become one of the most popular social Web applications in recent years. Posting short messages (i.e., a maximum… Expand
Is this relevant?
2011
2011
CEPIS UPGRADE is the anchor point for UPENET (UPGRADE European NETwork), the network of CEPIS member societies’ publications… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 5
Is this relevant?
2009
2009
In order to solve the implementation and maintenance problems of automatic test via filling the gap between test requirements and… Expand
  • figure 1
  • figure 3
  • figure 2
  • table II
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Hand-coded scripts were used in the 1970-80s as knowledge backbones that enabled inference and other NLP tasks requiring deep… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
Developing profiles to describe user or system behaviour is a useful technique employed in Computer Forensic investigations… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
 
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2003
2003
From the Publisher: Learn advanced .NET programming techniques by getting an insiders' look at a complete application… Expand
Is this relevant?