Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,908,124 papers from all fields of science
Search
Sign In
Create Free Account
Event chain methodology
Known as:
Event
, Event chain
Event chain methodology helps to mitigate the effect of motivational and cognitive biases in estimating and scheduling.
Wikipedia
Create Alert
Alert
Related topics
Related topics
7 relations
Critical path method
Event chain diagram
Network theory
Risk management
Expand
Broader (1)
Operations research
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Parallelized event chain algorithm for dense hard sphere and polymer systems
Tobias A. Kampmann
,
Horst-Holger Boltz
,
J. Kierfeld
J. Comput. Phys.
2015
Corpus ID: 8289789
Highly Cited
2012
Highly Cited
2012
A Comprehensive Model to Predict the Timing Resolution of SiPM-Based Scintillation Detectors: Theory and Experimental Validation
S. Seifert
,
H. T. van Dam
,
+4 authors
D. Schaart
IEEE Transactions on Nuclear Science
2012
Corpus ID: 40053722
Silicon photomultipliers (SiPMs) are expected to replace photomultiplier tubes (PMTs) in several applications that require…
Expand
2012
2012
Event Sequence Diagram Based Safety Critical Event Identification and Sensitive Analysis
Y. Hu
,
P. Luo
2012
Corpus ID: 59741655
The evolvement of large complicated system’s accidents can be treated as a chain of events (event chain), they drive the…
Expand
Highly Cited
2011
Highly Cited
2011
Learning the semantics of object–action relations by observation
E. Aksoy
,
A. Abramov
,
Johannes Dörr
,
KeJun Ning
,
B. Dellen
,
F. Wörgötter
Int. J. Robotics Res.
2011
Corpus ID: 2966118
Recognizing manipulations performed by a human and the transfer and execution of this by a robot is a difficult problem. We…
Expand
Highly Cited
2011
Highly Cited
2011
Towards Effective Event Detection, Tracking and Summarization on Microblog Data
Rui Long
,
Haofen Wang
,
Yuqiang Chen
,
Ou Jin
,
Yong Yu
WAIM
2011
Corpus ID: 34778386
Microblogging has become one of the most popular social Web applications in recent years. Posting short messages (i.e., a maximum…
Expand
2009
2009
A novel test process modeling method for automatic test
Shuai Wang
,
Yindong Ji
,
Shiyuan Yang
2nd IEEE International Conference on Computer…
2009
Corpus ID: 14067690
In order to solve the implementation and maintenance problems of automatic test via filling the gap between test requirements and…
Expand
Highly Cited
2008
Highly Cited
2008
Unsupervised Learning of Narrative Event Chains
Nathanael Chambers
,
Dan Jurafsky
ACL
2008
Corpus ID: 529375
Hand-coded scripts were used in the 1970-80s as knowledge backbones that enabled inference and other NLP tasks requiring deep…
Expand
2006
2006
Event sequence mining to develop profiles for computer forensic investigation purposes
Tamas Abraham
ACSW
2006
Corpus ID: 14602342
Developing profiles to describe user or system behaviour is a useful technique employed in Computer Forensic investigations…
Expand
Highly Cited
2005
Highly Cited
2005
Entity and event coercion in a symbolic theory of syntax
Laura A. Michaelis
2005
Corpus ID: 14921367
2003
2003
Dissecting a C# Application: Inside SharpDevelop
C. Holm
,
Bernhard Spuida
,
M. Kruger
2003
Corpus ID: 62089417
From the Publisher: Learn advanced .NET programming techniques by getting an insiders' look at a complete application…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE