The SEI helps advance software engineering principles and practices and serves as a national resource in software engineering, computer security, and process improvement. The SEI works closely with defense and government organizations, industry, and academia to continually improve software-intensive systems. Its core purpose is to help organizations improve their software engineering capabilities and develop or acquire the right software, defect free, within budget and on time, every time.
Presentations and other documents related to the SEI 2015 Research Review
Publisher: Software Engineering Institute
The SEI 2015 Research Review, held in October 2015, afforded the opportunity to discuss the outcomes of recent SEI line-funded research projects with the
principal investigators and researchers involved.
Assured Design Session Opening RemarksOctober 2015
Author(s): John B. Goodenough
Explores a definition of assured design as having justified confidence that a (software-reliant) system design has particular properties
Increase Adoption of Secure Coding StandardsOctober 2015
Author(s): Daniel Plakosh
Recent work to promote adoption of secure coding standards includes a web application to improve analyst productivity and 25 new rules for C++
Graph Algorithms on Future ArchitecturesOctober 2015
Author(s): Scott McMillan
Delves into whether primitives and operations can be defined to separate graph analytic application development and complexity of underlying hardware concern
C4I Session Opening RemarksOctober 2015
Better decision making, enhanced productivity, and more innovation are needed to meet today's information handling and security challenges
Edge-Enabled Tactical SystemsOctober 2015
Author(s): Grace Lewis, Jeff Boleng
EETS adapts cutting-edge technologies and builds prototypes of assured, efficient, and rapidly fieldable systems to enhance decision support for tactical users
Human Factors Session Opening RemarksOctober 2015
Author(s): Christopher May
Critical issues include mission readiness certification, limitations of capacity to analyze large data sets, leaks of sensitive and classified information
Human-Computer Decision SystemsOctober 2015
Author(s): Brian Lindauer
Describes work to use learning theory advances to account for persistent human expert teams and experiments to improve the human-computer decision system
Insider Threat MitigationOctober 2015
Author(s): William R. Claycomb, Andrew P. Moore
Explores hypothesis that over time, insider social networks exhibit weakening of internal connections and strengthening of external connections to adversaries
Verification and Validation Session Opening RemarksOctober 2015
Author(s): Linda M. Northrop
This presentation was delivered as the opening remarks for the Verification and Validation session of the 2015 Research Review. It introduces the subjects covered during the session.
Parallel Software Model CheckingOctober 2015
Author(s): Sagar Chaki
In this 2015 Research Review presentation, the author describes his research efforts into scaling up software model checking—a fundamental challenge in the field.
Runtime Assurance for Big Data SystemsOctober 2015
Author(s): John Klein
This 2015 Research Review presentation describes research into the unique assurance requirements and conditions of Big Data systems.
Cybersecurity Session Opening RemarksOctober 2015
Author(s): Roman Danyliw
This 2015 Research Review presentation opened the program's cybersecurity session, providing an overview of the segment's featured presentations.