Follow

Submissions from 2007

PDF

A Survey of Systems Engineering Effectiveness: Initial Results, Joseph P. Elm, Dennis Goldenson, Khaled El Emam, Nicole Donatelli, Angelica Neisa, and NDIA SE Effectiveness Committee

PDF

Modeling of System Families, Peter H. Feiler

PDF

Dependability Modeling with the Architecture Analysis & Design Language (AADL), Peter H. Feiler and Ana Rugina

PDF

Conditions for Achieving Network-Centric Operations in Systems of Systems, David Fisher, B. Craig Meyers, and Patrick R. Place

PDF

Ranged Integers for the C Programming Language, Jeff Gennari, Shaun Hedrick, Frederick W. Long, Justin Pincar, and Robert C. Seacord

PDF

Developing AADL Models for Control Systems: A Practitioner’s Guide, John J. Hudak and Peter H. Feiler

PDF

Case Study of the NENE Code Project, Richard Kendall, Douglass Post, and Andrew Mark

PDF

A Proposed Taxonomy for Software Development Risks for High-Performance Computing (HPC) Scientific/Engineering Applications, Richard P. Kendall, Douglass E. Post, Jeffrey C. Carver, Dale B. Henderson, and David Fisher

PDF

SCAMPI Lead Appraiser Body of Knowledge (SLA BOK), Stephen M. Masters, Sandra G. Behrens, Judah Mogilensky, and Charlie Ryan

PDF

How To Compare the Security Quality Requirements Engineering (SQUARE) Method with Other Methods, Nancy R. Mead

PDF

Using Aspect-Oriented Programming to Enforce Architecture, Paulo F. Merson

PDF

Programmatic Interoperability, B. Craig Meyers and James D. Smith II

PDF

Modeling and Analysis of Information Technology Change and Access Controls in the Business Context, Andrew P. Moore and Rohit S. Antao

PDF

Quality-Attribute-Based Economic Valuation of Architectural Patterns, Ipek Ozkaya, Rick Kazman, and Mark H. Klein

PDF

T-Check for Technologies for Interoperability: Open Grid Services Architecture (OGSA): Part 1, Soumya Simanta, Grace A. Lewis, and Lutz Wrage

PDF

Case Study: Accelerating Process Improvement by Integrating the TSP and CMMI, Daniel S. Wall, James McHale, and Marsha Pomeroy-Huff

PDF

Governing for Enterprise Security (GES) Implementation Guide, Jody R. Westby and Julia H. Allen

PDF

A Practical Example of Applying Attribute-Driven Design (ADD), Version 2.0, William Wood

PDF

Process Improvement Should Link to Security: SEPG 2007 Security Track Recap, Carol C. Woody

Submissions from 2006

PDF

Common Elements of Risk, Christopher J. Alberts

PDF

An Examination of a Structural Modeling Risk Probe Technique, William B. Anderson, Phillip Boxer, and Lisa Brownsword

PDF

Joint Capabilities and System-of-Systems Solutions: A Case for Crossing Solution Domains, William B. Anderson, Mary Maureen Brown, and Robert M. Flowe

PDF

Quantitative Methods for Software Selection and Evaluation, Michael S. Bandor

PDF

Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis, Stephen R. Band, Dawn M. Cappelli, Lynn F. Fischer, Andrew P. Moore, Eric D. Shaw, and Randall F. Trzeciak

PDF

A Comparison of Requirements Specification Methods from a Software Architecture Perspective, Len Bass, John K. Bergey, Paul C. Clements, Paulo F. Merson, Ipek Ozkaya, and Raghvinder Sangwan

PDF

Risk Themes Discovered Through Architecture Evaluations, Len Bass, Robert Nord, William Wood, and David Zubrow

PDF

Product Line Acquisition in a DoD Organization—Guidance for Decision Makers, John K. Bergey and Sholom Cohen

PDF

System-of-Systems Navigator: An Approach for Managing System-of-Systems Interoperability, Lisa Brownsword, David Fisher, Edwin J. Morris, James Smith II, and Patrick Kirwan

PDF

Sustaining Operational Resiliency: A Process Improvement Approach to Security Management, Richard Caralli

PDF

SAT-Based Software Certification, Sagar Chaki

PDF

Certifying the Absence of Buffer Overflows, Sagar Chaki and Scott A. Hissam

PDF

Toward Measures for Software Architectures, Gary J. Chastek and Robert W. Ferguson

PDF

Security Quality Requirements Engineering (SQUARE): Case Study Phase III, Lydia Chung, Frank Hung, Eric Hough, and Don Ojoko-Adams

PDF

CMMI for Development, Version 1.2, CMMI Product Team

PDF

Adapting CMMI for Acquisition Organizations: A Preliminary Report, Kathryn M. Dodson, Hubert F. Hofmann, Gowri S. Ramani, and Deborah K. Yedlin

PDF

The Architecture Analysis & Design Language (AADL): An Introduction, Peter H. Feiler, David Gluch, and John J. Hudak

PDF

QUASAR: A Method for the Quality Assessment of Software-Intensive System Architectures, Donald Firesmith

PDF

An Emergent Perspective on Interoperation in Systems of Systems, David Fisher

PDF

Proceedings of the First International Research Workshop for Process Improvement in Small Settings, 2005, Suzanne Garcia-Miller, Caroline Graettinger, and Keith Kost

PDF

Detecting Scans at the ISP Level, Carrie Gates, Josh McNutt, Joseph B. Kadane, and Marc Kellner

PDF

Performance Results of CMMI-Based Process Improvement, Diane L. Gibson, Dennis Goldenson, and Keith Kost

PDF

R2PL 2005—Proceedings of the First International Workshop on Reengineering Towards Product Lines, Bas Graaf, Liam O'Brien, and Rafael Capilla

PDF

Systems of Systems: Scaling Up the Development Process, Watts S. Humphrey

PDF

The State of Software Measurement Practice: Results of 2006 Survey, Mark Kasunic

PDF

Specifying Initial Design Review (IDR) and Final Design Review (FDR) Criteria, Mary Ann Lapham

PDF

Sustaining Software-Intensive Systems, Mary Ann Lapham and Carol C. Woody

PDF

Acquiring Evolving Technologies: Web Services Standards, Harry L. Levinson and William O'Brien

PDF

Workshop on Model-Driven Architecture and Program Generation, Grace A. Lewis, B. Craig Meyers, and Kurt C. Wallnau

PDF

Model Problems in Technologies for Interoperability: Web Services, Grace A. Lewis and Lutz Wrage

PDF

Evolutionary Systems Design: Recognizing Changes in Security and Survivability Risks, Howard F. Lipson

PDF

Defense in Depth: Foundations for Secure and Resilient IT Enterprises, Christopher J. May, Joshua Hammerstein, Jeffrey Mattson, and Kristopher Rush

PDF

Model Problems in Technologies for Interoperability: OWL Web Ontology Language for Services (OWL-S), Chris Metcalf and Grace A. Lewis

PDF

Risk Management Considerations for Interoperable Acquisition, B. Craig Meyers

PDF

Schedule Considerations for Interoperable Acquisition, B. Craig Meyers and Carol A. Sledge

PDF

Requirements Management in a System-of-Systems Context: A Workshop, B. Craig Meyers, James Smith II, Peter Capell, and Patrick R. Place

PDF

Creating Custom Containers with Generative Techniques, Gabriel A. Moreno

PDF

System-of-Systems Governance: New Patterns of Thought, Edwin J. Morris, Patrick R. Place, and Dennis B. Smith

PDF

Autonomic Computing, Hausi A. Muller, William O'Brien, Mark H. Klein, and William Wood

PDF

Proceedings of the Second Software Architecture Technology User Network (SATURN) Workshop, Robert Nord

PDF

Appraisal Requirements for CMMI, Version 1.2 (ARC, V1.2), SCAMPI Upgrade Team

PDF

Standard CMMI Appraisal Method for Process Improvement (SCAMPI) A, Version 1.2: Method Definition Document, SCAMPI Upgrade Team

PDF

PROxy Based Estimation (PROBE) for Structured Query Language (SQL), Rob Schoedel

PDF

Assume-Guarantee Reasoning for Deadlock, Nishant Sinha and Sagar Chaki

PDF

Army ASSIP System-of-Systems Test Metrics Task, Carol A. Sledge

PDF

Information Assurance: Building Educational Capacity, Carol A. Sledge

PDF

Topics in Interoperability: Structural Programmatics in a System of Systems, James D. Smith II

PDF

Interoperable Acquisition for Systems of Systems: The Challenges, James Smith II and D. Michael Phillips

PDF

Technology Foundations for Computational Evaluation of Software Security Attributes, Gwendolyn H. Walton, Thomas A. Longstaff, and Richard C. Linger

PDF

Techniques for Developing an Acquisition Strategy by Profiling Software Risks, Mary Catherine Ward, Joseph P. Elm, and Susan Kushner

PDF

On System Scalability, Charles B. Weinstock and John Goodenough

PDF

Attribute-Driven Design (ADD), Version 2.0, Robert Wojcik, Felix Bachmann, Len Bass, Paul C. Clements, Paulo F. Merson, Robert Nord, and William Wood

PDF

Applying OCTAVE: Practitioners Report, Carol C. Woody

Submissions from 2005

PDF

OCTAVE-S Implementation Guide, Version 1, Cecilia Albert, Audrey J. Dorofee, James F. Stevens, and Carol C. Woody

PDF

Mission Assurance Analysis Protocol (MAAP): Assessing Risk in Complex Environments, Christopher J. Alberts and Audrey J. Dorofee

PDF

Governing for Enterprise Security, Julia H. Allen

PDF

Variability in Software Product Lines, Felix Bachmann and Paul C. Clements

PDF

Experience Using the Web-Based Tool Wiki for Architecture Documentation, Felix Bachmann and Paulo F. Merson

PDF

Reasoning Frameworks, Len Bass, James Ivers, Mark H. Klein, and Paulo F. Merson

PDF

Software Architecture in DoD Acquisition: An Approach and Language for a Software Development Plan, John K. Bergey and Paul C. Clements

PDF

Software Architecture in DoD Acquisition: A Reference Standard for a Software Architecture Document, John K. Bergey and Paul C. Clements

PDF

Software Product Lines: Experiences from the Eighth DoD Software Product Line Workshop, John K. Bergey, Sholom Cohen, Patrick Donohoe, and Lawrence G. Jones

PDF

Software Product Lines: Experiences from the Seventh DoD Software Product Line Workshop, John K. Bergey, Sholom Cohen, Patrick Donohoe, and Lawrence G. Jones

PDF

CMMI Acquisition Module (CMMI-AM), Version 1.1, Tom Bernard, Brian Gallagher, Roger Bate, and Hal Wilson

PDF

U.S. Army Acquisition – The Program Executive Officer Perspective, Stephen Blanchette Jr.

PDF

Self Assessment and the CMMI-AM – A Guide for Government Program Managers, Stephen Blanchette Jr. and Kristi L. Keeler

PDF

Using Earned Value Management (EVM) in Spiral Development, Lisa Brownsword and James Smith II

PDF

Some Current Approaches to Interoperability, David Carney, David Fisher, Edwin J. Morris, and Patrick R. Place

PDF

Topics in Interoperability: System-of-Systems Evolution, David Carney, David Fisher, and Patrick R. Place

PDF

Topics in Interoperability: Concepts of Ownership and Their Significance in Systems of Systems, David J. Carney, William B. Anderson, and Patrick R. Place

PDF

Topics in Interoperability: Infrastructure Replacement in a System of Systems, David J. Carney, James Smith II, and Patrick R. Place

PDF

Verification of Evolving Software via Component Substitutability Analysis, Sagar Chaki, Edmund Clarke, Natasha Sharygina, and Nishant Sinha

PDF

Results of SEI Independent Research and Development Projects and Report on Emerging Technologies and Technology Trends, Sagar Chaki, Rosann W. Collins, Peter H. Feiler, John Goodenough, Aaron Greenhouse, Jorgen Hansson, Alan R. Hevner, John J. Hudak, Angel Jordan, Rick Kazman, Richard C. Linger, Mark G. Pleszkoch, Stacy J. Prowell, Natasha Sharygina, Kurt C. Wallnau, Gwendolyn Walton, Charles B. Weinstock, and Lutz Wrage

PDF

SAT-Based Predicate Abstraction of Programs, Edmund Clarke, Daniel Kroening, Natasha Sharygina, and Karen Yorav

PDF

Comparing the SEI’s Views and Beyond Approach for Documenting Software Architectures with ANSI-IEEE 1471-2000, Paul C. Clements

PDF

The U.S. Army’s Common Avionics Architecture System (CAAS) Product Line: A Case Study, Paul C. Clements and John K. Bergey

PDF

Using the SEI Architecture Tradeoff Analysis Method to Evaluate WIN-T: A Case Study, Paul C. Clements, John K. Bergey, and Dave Mason

PDF

The Structured Intuitive Model for Product Line Economics (SIMPLE), Paul C. Clements, John D. McGregor, and Sholom Cohen

PDF

Robustness Testing of Software-Intensive Systems: Explanation and Guide, Julie Cohen, Daniel Plakosh, and Kristi L. Keeler

PDF

The CERT Function Extraction Experiment: Quantifying FX Impact on Software Comprehension and Verification, Roseann W. Collins, Gwendolyn H. Walton, Alan R. Hevner, and Richard C. Linger

PDF

Secure Software Development Life Cycle Processes: A Technology Scouting Report, Noopur Davis