Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 619 results for the Type - Technical Report

Technical Report | April 2017 - Technical Report IEEE Computer Society/Software Engineering Institute Watts S ... By Neal Mackertich (Raytheon), Peter Kraus (Raytheon), Kurt Mittelstaedt (Raytheon), Brian Foley (Raytheon), Dan Bardsley (Raytheon), Kelli Grimes (Raytheon), Mike Nolan (Raytheon)

The Raytheon Integrated Defense Systems DFSS team has been recognized with the 2016 Watts Humphrey Software Process Achievement Award.

Technical Report | April 2017 - Technical Report IEEE Computer Society/Software Engineering Institute Watts S ... By Will J.M. Pohlman (Nationwide IT)

This report describes the 10-year history of Nationwide's software process improvement journey. Nationwide received the 2016 Watts Humphrey Software Process Achievement Award from the SEI and IEEE.

Technical Report | December 2016 - Technical Report Architecture-Led Safety Process By Peter H. Feiler, Julien Delange, David P. Gluch, John McGregor

Architecture-Led Safety Analysis (ALSA) is a safety analysis method that uses early architecture knowledge to supplement traditional safety analysis techniques to identify faults as early as possible.

Technical Report | December 2016 - Technical Report Common Sense Guide to Mitigating Insider Threats, 5th ... By Matthew L. Collins, Michael C. Theis, Randall F. Trzeciak, Jeremy R. Strozer, Jason W. Clark, Daniel L. Costa, Tracy Cassidy, Michael J. Albrethsen, Andrew P. Moore

Presents recommendations for mitigating insider threat based on CERT's continued research and analysis of over 1,000 cases.

Technical Report | December 2016 - Technical Report The Critical Role of Positive Incentives for Reducing Insider ... By Andrew P. Moore, Jeff Savinda, Elizabeth A. Monaco, Jamie L. Moyes, Denise M. Rousseau (Carnegie Mellon University), Samuel J. Perl, Jennifer Cowley, Matthew L. Collins, Tracy Cassidy, Nathan VanHoudnos, Palma Buttles-Valdez, Daniel Bauer, Allison Parshall

This report describes how positive incentives complement traditional practices to provide a better balance for organizations’ insider threat programs.

Technical Report | October 2016 - Technical Report Definition and Measurement of Complexity in the Context of ... By Sarah Sheard, Michael D. Konrad, Charles B. Weinstock, William Nichols

This report describes research to define complexity measures for avionics systems to help the FAA identify when systems are too complex to assure their safety.

Technical Report | August 2016 - Technical Report Segment-Fixed Priority Scheduling for Self-Suspending Real ... By Junsung Kim, Björn Andersson (Carnegie Mellon University), Dionisio de Niz, Ragunathan (Raj) Rajkumar, Jian-Jia Chen, Wen-Hung Huang, Geoffrey Nelissen

This report describes schedulability analyses and proposes segment-fixed priority scheduling for self-suspending tasks.

Technical Report | June 2016 - Technical Report Architecture Fault Modeling and Analysis with the Error Model ... By Peter H. Feiler, John J. Hudak, Julien Delange, David P. Gluch

This report describes the Error Model Annex, Version 2 (EMV2), notation for architecture fault modeling, which supports safety, reliability, and security analyses.

Technical Report | June 2016 - Technical Report A Requirement Specification Language for AADL By Peter H. Feiler, Julien Delange, Lutz Wrage

This report describes a textual requirement specification language, called ReqSpec, for the Architecture Analysis & Design Language (AADL) and demonstrates its use.

Technical Report | June 2016 - Technical Report DMPL: Programming and Verifying Distributed Mixed ... By Sagar Chaki, David Kyle

DMPL is a language for programming distributed real-time, mixed-criticality software. It supports distributed systems in which each node executes a set of periodic real-time threads that are scheduled by priority and criticality.

Refine