Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type


Publication Date

Showing 1 - 10 of 176 results for the Type - Special Report

Special Report | June 2016 - Special Report Report Writer and Security Requirements Finder: User and ... By Nancy R. Mead, Anand Sankalp (Carnegie Mellon University), Gupta Anurag (Carnegie Mellon), Priyam Swati (Carnegie Mellon University), Yaobin Wen (Carnegie Mellon University), Walid El Baroni (Carnegie Mellon University)

This report presents instructions for using the Malware-driven Overlooked Requirements (MORE) website applications.

Special Report | December 2015 - Special Report Intelligence Preparation for Operational Resilience (IPOR) By Douglas Gray

The author describes Intelligence Preparation for Operational Resilience (IPOR), a framework for preparing intelligence that complements commonly used intelligence frameworks such as Intelligence Preparation of the Battlefield (IPB).

Special Report | July 2017 - Special Report Systemic Vulnerabilities in Customer-Premises Equipment ... By Joel Land

This report describes a test framework that the CERT/CC developed to identify systemic and other vulnerabilities in CPE routers.

Special Report | February 2014 - Special Report Wireless Emergency Alerts: Trust Model Technical Report By Robert W. Stoddard, Joseph P. Elm, James McCurley, Sarah Sheard, Tamara Marshall-Keim

This report describes a trust model to enable the Federal Emergency Management Agency to maximize the effectiveness of the Wireless Emergency Alerts (WEA) service and provides guidance for alert originators in using WEA to maximize public safety.

Special Report | November 2012 - Special Report The Business Case for Systems Engineering Study: Results of ... By Joseph P. Elm, Dennis Goldenson

This report summarizes the results of a survey that had the goal of quantifying the connection between the application of systems engineering (SE) best practices to projects and programs and the performance of those projects and programs.

Special Report | June 2013 - Special Report Socio-Adaptive Systems Challenge Problems Workshop ... By Scott Hissam, Mark H. Klein, Timothy Morrow

This report presents a summary of the findings of the Socio-Adaptive Systems Challenge Problem Workshop, held in Pittsburgh, PA, on April 12-13, 2012.

Special Report | December 2016 - Special Report RFP Patterns and Techniques for Successful Agile ... By Mary Ann Lapham, Larri Ann Rosser (Raytheon Intelligence Information and Services), Steven Martin (Space and Missile Systems Center), Thomas E. Friend (Agile On Target), Peter Capell, Keith Korzec, Greg Howard (MITRE), Michael Ryan (BTAS), John H. Norton III (Raytheon Integrated Defense Systems)

This report discusses request-for-proposal patterns and techniques for successfully contracting a federal Agile project.

Special Report | January 1997 - Special Report Report to the President's Commission on Critical Infrastructure ... By James Ellis, David Fisher, Thomas A. Longstaff, Linda Pesante, Richard D. Pethia

This 1997 report identifies threats to and vulnerabilities of the Internet and estimates the cascade effect that a successful, sustained attack on the Internet would have on the critical national infrastructures set out in Executive Order 13010.

Special Report | October 2003 - Special Report CMMI Interpretive Guidance Project: Preliminary Report By Mary Beth Chrissis, Gian Wemyss, Dennis Goldenson, Michael D. Konrad, Kenneth Smith, Agapi Svolou

The SEI collected data to learn more about how CMMI is being accepted by various organizations. This report describes those activities and includes summaries of the data collected.

Special Report | January 2017 - Special Report A Technical History of the SEI By Larry Druffel

This report chronicles the technical accomplishments of the Software Engineering Institute and its impact on the Department of Defense software community, as well as on the broader software engineering community.