Follow

Submissions from 2006

PDF

Adapting CMMI for Acquisition Organizations: A Preliminary Report, Kathryn M. Dodson, Hubert F. Hofmann, Gowri S. Ramani, and Deborah K. Yedlin

PDF

The Architecture Analysis & Design Language (AADL): An Introduction, Peter H. Feiler, David Gluch, and John J. Hudak

PDF

QUASAR: A Method for the Quality Assessment of Software-Intensive System Architectures, Donald Firesmith

PDF

An Emergent Perspective on Interoperation in Systems of Systems, David Fisher

PDF

Proceedings of the First International Research Workshop for Process Improvement in Small Settings, 2005, Suzanne Garcia-Miller, Caroline Graettinger, and Keith Kost

PDF

Detecting Scans at the ISP Level, Carrie Gates, Josh McNutt, Joseph B. Kadane, and Marc Kellner

PDF

Performance Results of CMMI-Based Process Improvement, Diane L. Gibson, Dennis Goldenson, and Keith Kost

PDF

R2PL 2005—Proceedings of the First International Workshop on Reengineering Towards Product Lines, Bas Graaf, Liam O'Brien, and Rafael Capilla

PDF

Systems of Systems: Scaling Up the Development Process, Watts S. Humphrey

PDF

The State of Software Measurement Practice: Results of 2006 Survey, Mark Kasunic

PDF

Specifying Initial Design Review (IDR) and Final Design Review (FDR) Criteria, Mary Ann Lapham

PDF

Sustaining Software-Intensive Systems, Mary Ann Lapham and Carol C. Woody

PDF

Acquiring Evolving Technologies: Web Services Standards, Harry L. Levinson and William O'Brien

PDF

Workshop on Model-Driven Architecture and Program Generation, Grace A. Lewis, B. Craig Meyers, and Kurt C. Wallnau

PDF

Model Problems in Technologies for Interoperability: Web Services, Grace A. Lewis and Lutz Wrage

PDF

Evolutionary Systems Design: Recognizing Changes in Security and Survivability Risks, Howard F. Lipson

PDF

Defense in Depth: Foundations for Secure and Resilient IT Enterprises, Christopher J. May, Joshua Hammerstein, Jeffrey Mattson, and Kristopher Rush

PDF

Model Problems in Technologies for Interoperability: OWL Web Ontology Language for Services (OWL-S), Chris Metcalf and Grace A. Lewis

PDF

Risk Management Considerations for Interoperable Acquisition, B. Craig Meyers

PDF

Schedule Considerations for Interoperable Acquisition, B. Craig Meyers and Carol A. Sledge

PDF

Requirements Management in a System-of-Systems Context: A Workshop, B. Craig Meyers, James Smith II, Peter Capell, and Patrick R. Place

PDF

Creating Custom Containers with Generative Techniques, Gabriel A. Moreno

PDF

System-of-Systems Governance: New Patterns of Thought, Edwin J. Morris, Patrick R. Place, and Dennis B. Smith

PDF

Autonomic Computing, Hausi A. Muller, William O'Brien, Mark H. Klein, and William Wood

PDF

Proceedings of the Second Software Architecture Technology User Network (SATURN) Workshop, Robert Nord

PDF

Appraisal Requirements for CMMI, Version 1.2 (ARC, V1.2), SCAMPI Upgrade Team

PDF

Standard CMMI Appraisal Method for Process Improvement (SCAMPI) A, Version 1.2: Method Definition Document, SCAMPI Upgrade Team

PDF

PROxy Based Estimation (PROBE) for Structured Query Language (SQL), Rob Schoedel

PDF

Assume-Guarantee Reasoning for Deadlock, Nishant Sinha and Sagar Chaki

PDF

Army ASSIP System-of-Systems Test Metrics Task, Carol A. Sledge

PDF

Information Assurance: Building Educational Capacity, Carol A. Sledge

PDF

Topics in Interoperability: Structural Programmatics in a System of Systems, James D. Smith II

PDF

Interoperable Acquisition for Systems of Systems: The Challenges, James Smith II and D. Michael Phillips

PDF

Technology Foundations for Computational Evaluation of Software Security Attributes, Gwendolyn H. Walton, Thomas A. Longstaff, and Richard C. Linger

PDF

Techniques for Developing an Acquisition Strategy by Profiling Software Risks, Mary Catherine Ward, Joseph P. Elm, and Susan Kushner

PDF

On System Scalability, Charles B. Weinstock and John Goodenough

PDF

Attribute-Driven Design (ADD), Version 2.0, Robert Wojcik, Felix Bachmann, Len Bass, Paul C. Clements, Paulo F. Merson, Robert Nord, and William Wood

PDF

Applying OCTAVE: Practitioners Report, Carol C. Woody

Submissions from 2005

PDF

OCTAVE-S Implementation Guide, Version 1, Cecilia Albert, Audrey J. Dorofee, James F. Stevens, and Carol C. Woody

PDF

Mission Assurance Analysis Protocol (MAAP): Assessing Risk in Complex Environments, Christopher J. Alberts and Audrey J. Dorofee

PDF

Governing for Enterprise Security, Julia H. Allen

PDF

Variability in Software Product Lines, Felix Bachmann and Paul C. Clements

PDF

Experience Using the Web-Based Tool Wiki for Architecture Documentation, Felix Bachmann and Paulo F. Merson

PDF

Reasoning Frameworks, Len Bass, James Ivers, Mark H. Klein, and Paulo F. Merson

PDF

Software Architecture in DoD Acquisition: An Approach and Language for a Software Development Plan, John K. Bergey and Paul C. Clements

PDF

Software Architecture in DoD Acquisition: A Reference Standard for a Software Architecture Document, John K. Bergey and Paul C. Clements

PDF

Software Product Lines: Experiences from the Eighth DoD Software Product Line Workshop, John K. Bergey, Sholom Cohen, Patrick Donohoe, and Lawrence G. Jones

PDF

Software Product Lines: Experiences from the Seventh DoD Software Product Line Workshop, John K. Bergey, Sholom Cohen, Patrick Donohoe, and Lawrence G. Jones

PDF

CMMI Acquisition Module (CMMI-AM), Version 1.1, Tom Bernard, Brian Gallagher, Roger Bate, and Hal Wilson

PDF

U.S. Army Acquisition – The Program Executive Officer Perspective, Stephen Blanchette Jr.

PDF

Self Assessment and the CMMI-AM – A Guide for Government Program Managers, Stephen Blanchette Jr. and Kristi L. Keeler

PDF

Using Earned Value Management (EVM) in Spiral Development, Lisa Brownsword and James Smith II

PDF

Some Current Approaches to Interoperability, David Carney, David Fisher, Edwin J. Morris, and Patrick R. Place

PDF

Topics in Interoperability: System-of-Systems Evolution, David Carney, David Fisher, and Patrick R. Place

PDF

Topics in Interoperability: Concepts of Ownership and Their Significance in Systems of Systems, David J. Carney, William B. Anderson, and Patrick R. Place

PDF

Topics in Interoperability: Infrastructure Replacement in a System of Systems, David J. Carney, James Smith II, and Patrick R. Place

PDF

Verification of Evolving Software via Component Substitutability Analysis, Sagar Chaki, Edmund Clarke, Natasha Sharygina, and Nishant Sinha

PDF

Results of SEI Independent Research and Development Projects and Report on Emerging Technologies and Technology Trends, Sagar Chaki, Rosann W. Collins, Peter H. Feiler, John Goodenough, Aaron Greenhouse, Jorgen Hansson, Alan R. Hevner, John J. Hudak, Angel Jordan, Rick Kazman, Richard C. Linger, Mark G. Pleszkoch, Stacy J. Prowell, Natasha Sharygina, Kurt C. Wallnau, Gwendolyn Walton, Charles B. Weinstock, and Lutz Wrage

PDF

SAT-Based Predicate Abstraction of Programs, Edmund Clarke, Daniel Kroening, Natasha Sharygina, and Karen Yorav

PDF

Comparing the SEI’s Views and Beyond Approach for Documenting Software Architectures with ANSI-IEEE 1471-2000, Paul C. Clements

PDF

The U.S. Army’s Common Avionics Architecture System (CAAS) Product Line: A Case Study, Paul C. Clements and John K. Bergey

PDF

Using the SEI Architecture Tradeoff Analysis Method to Evaluate WIN-T: A Case Study, Paul C. Clements, John K. Bergey, and Dave Mason

PDF

The Structured Intuitive Model for Product Line Economics (SIMPLE), Paul C. Clements, John D. McGregor, and Sholom Cohen

PDF

Robustness Testing of Software-Intensive Systems: Explanation and Guide, Julie Cohen, Daniel Plakosh, and Kristi L. Keeler

PDF

The CERT Function Extraction Experiment: Quantifying FX Impact on Software Comprehension and Verification, Roseann W. Collins, Gwendolyn H. Walton, Alan R. Hevner, and Richard C. Linger

PDF

Secure Software Development Life Cycle Processes: A Technology Scouting Report, Noopur Davis

PDF

Designing for Reuse of Configurable Logic, Joseph P. Elm

PDF

A Taxonomy of Operational Risks, Brian P. Gallagher, Pamela J. Case, Rita C. Creel, Susan Kushner, and Ray C. Williams

PDF

System Quality Requirements Engineering (SQUARE): Case Study on Asset Management System, Phase II, Dan Gordon, Ted Stehney, Neha Wattas, and Eugene Yu

PDF

Handbook for Conducting Standard CMMI Appraisal Method for Process Improvement (SCAMPI) B and C Appraisals, Version 1.1, William Hayes, Eugene E. Miluk, Lisa Ming, and Margaret Glover

PDF

The Impact of Function Extraction Technology on Next-Generation Software Engineering, Alan R. Hevner, Richard C. Linger, Rosann W. Collins, Mark G. Pleszkoch, and Gwendolyn H. Walton

PDF

Pin Component Technology (V1.0) and Its C Interface, Scott A. Hissam, James Ivers, Daniel Plakosh, and Kurt C. Wallnau

PDF

Using Containers to Enforce Smart Constraints for Performance in Industrial Systems, Scott A. Hissam, Gabriel A. Moreno, and Kurt C. Wallnau

PDF

Safety-Critical Systems and the TSP, Watts S. Humphrey

PDF

Lessons Learned Model Checking an Industrial Communications Library, James Ivers

PDF

Product Line Adoption in a CMMI Environment, Lawrence G. Jones and Linda Northrop

PDF

Designing an Effective Survey, Mark Kasunic

PDF

Categorizing Business Goals for Software Architectures, Rick Kazman and Len Bass

PDF

U.S. Army Acquisition – The Program Office Perspective, Kristi L. Keeler

PDF

QuARS: A Tool for Analyzing Requirements, Giuseppe Lami

PDF

Elements of a Usability Reasoning Framework, Jinhee Lee and Len Bass

PDF

SMART: The Service-Oriented Migration and Reuse Technique, Grace A. Lewis, Edwin J. Morris, Liam O'Brien, Dennis B. Smith, and Lutz Wrage

PDF

A Process for Context-Based Technology Evaluation, Grace A. Lewis and Lutz Wrage

PDF

Model Problems in Technologies for Interoperability: Model-Driven Architecture, Grace A. Lewis and Lutz Wrage

PDF

Software Vulnerabilities in Java, Frederick W. Long

PDF

Integrated Diagnostics: Operational Missions, Diagnostic Types, Characteristics, and Capability Gaps, Theodore Marz

PDF

Preparing for Automated Derivation of Products in a Software Product Line, John D. McGregor

PDF

Mapping TSP to CMMI, James McHale and Daniel S. Wall

PDF

Security Quality Requirements Engineering (SQUARE) Methodology, Nancy R. Mead, Eric Hough, and Theodore R. Stehney Jr.

PDF

Including Interoperability in the Acquisition Process, B. Craig Meyers, Ira Monarch, Linda Levine, and James Smith II

PDF

Software Process Improvement Journey: IBM Australia Application Management Services, Robyn Nichols and Colin Connaughton

PDF

First Responders Guide to Computer Forensics: Advanced Topics, Richard A. Nolan, Marie Baker, Jake Branson, Joshua Hammerstein, Kristopher Rush, Cal Waits, and Elizabeth Schweinsberg

PDF

First Responders Guide to Computer Forensics, Richard A. Nolan, Colin J. O'Sullivan, Jake Branson, and Cal Waits

PDF

Proceedings of the First Software Architecture Technology User Network (SATURN) Workshop, Robert Nord, Len Bass, Paul C. Clements, Linda Northrop, and James E. Tomayko

PDF

Software Acquisition Planning Guidelines, William E. Novak, Julie Cohen, Anthony Lattanze, Linda Levine, Patrick R. Place, Ray C. Williams, and Carol C. Woody

PDF

Quality Attributes and Service-Oriented Architectures, Liam O'Brien, Len Bass, and Paulo F. Merson

PDF

The Personal Software Process (PSP) Body of Knowledge, Version 1.0, Marsha Pomeroy-Huff, Julia L. Mullaney, Robert Cannon, and Mark Seburn

PDF

Interpreting SCAMPI for a People CMM Appraisal at Tata Consultancy Services, Ron Radice

PDF

Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector, Marisa Reddy Randazzo, Michelle Keeney, Eileen Kowalski, Dawn M. Cappelli, and Andrew P. Moore

PDF

A Structured Approach to Classifying Security Vulnerabilities, Robert C. Seacord and Allen D. Householder