search menu icon-carat-right cmu-wordmark

SEI 2015 Research Review Artifacts

Presentations and other documents related to the SEI 2015 Research Review

Publisher:

Software Engineering Institute

The SEI 2015 Research Review, held in October 2015, afforded the opportunity to discuss the outcomes of recent SEI line-funded research projects with the principal investigators and researchers involved.


SEI Research Review 2015: CTO Opening Remarks

October 2015
Author(s): Kevin Fall

Overview of the intent of the Research Review and the talks included in its sessions

Acquisition & Management Session Opening Remarks

October 2015
Author(s): Anita Carleton

Software acquisiton & management R&D investigates ways to assure functionality, timely delivery, lowered risk, and affordability.

Agile in Government: Validating Success Enablers and Inhibitors

October 2015
Author(s): Mary Ann Lapham, Suzanne Miller

Describes recent developments in a project to provide DoD and government agencies with actionable Agile guidance within the constraints of DoDI 5000.02

Agile in Government Poster (SEI 2015 Research Review)

October 2015
Author(s): Mary Ann Lapham, Suzanne Miller

Describes challenges and SEI work in aligning Agile practices with governmen requirements

Machine Learning for Big Data Systems Acquisition

October 2015
Author(s): John Klein

Tackles the question, "Can we automatically identify relevant document pages that contain the knowledge required for a curator to populate the knowledge base?"

Machine Learning for Big Data System Acquisition Poster (SEI 2015 Research Review)

October 2015
Author(s): John Klein

Tackles the question, "Can we automatically identify relevant document pages that contain the knowledge required for a curator to populate the knowledge base?"

Quantifying Uncertainty for Early Lifecycle Cost Estimation:FY15 Results

October 2015
Author(s): Robert W. Stoddard

The QUELCE method continues to be refined. This slide set describes recent developments.

Quantifying Uncertainty in Early Lifecycle Cost Estimation Poster (SEI 2015 Research Review)

October 2015
Author(s): Robert W. Stoddard

The QUELCE method continues to be refined. This poster describes recent developments.

Improving Software Sustainability Through Data-Driven Technical Debt Management

October 2015
Author(s): Ipek Ozkaya, Robert Nord

This work aims to improve sustainment decision making by identifying technical debt indicators and building correlations between them and project measures.

Improving Software Sustainability through Data-Driven Technical Debt Management Poster (SEI 2015 Research Review)

October 2015
Author(s): Ipek Ozkaya, Robert Nord

This work aims to improve sustainment decision making by identifying technical debt indicators and building correlations between them and project measures.

Assured Design Session Opening Remarks

October 2015
Author(s): John B. Goodenough

Explores a definition of assured design as having justified confidence that a (software-reliant) system design has particular properties

Effective Reduction of Avoidable Complexity in Embedded Systems

October 2015
Author(s): Julien Delange

Examines the need for software complexity management, in particular ways to detect complexity in models and improve model design

Effective Reduction of Avoidable Complexity in Embedded Systems Poster (SEI 2015 Research Review)

October 2015
Author(s): Julien Delange

Examines the need for software complexity management, in particular ways to detect complexity in models and improve model design

Open Source AADL Workbench for Virtual System Integration Poster (SEI 2015 Research Review)

October 2015
Author(s): Peter H. Feiler, Lutz Wrage

Explores a solution for the limitations of traditional system development development lifecycle methods

Open Source AADL Workbench for Virtual System Integration

October 2015
Author(s): Peter H. Feiler

The AADL Workbench includes tools for modeling, analysis, and usability capabilities. It also incorporates tools such as Resolute and Ocarina.

Extending AADL for Security Design Assurance of the Internet of Things

October 2015
Author(s): Carol Woody, Rick Kazman

This project aims to extend AADL to better address security in the architecture

Extending AADL for Security Design Assurance of the Internet of Things Poster (SEI 2015 Research Review)

October 2015
Author(s): Rick Kazman, Carol Woody

This poster describes a project that aims to extend AADL to better address security in the architecture

Increase Adoption of Secure Coding Standards

October 2015
Author(s): Daniel Plakosh

Recent work to promote adoption of secure coding standards includes a web application to improve analyst productivity and 25 new rules for C++

Increase Adoption of Secure Coding Standards Poster (SEI 2015 Research Review)

October 2015
Author(s): Daniel Plakosh

Recent work to promote adoption of secure coding standards includes a web application to improve analyst productivity and 25 new rules for C++

Graph Algorithms on Future Architectures

October 2015
Author(s): Scott McMillan

Delves into whether primitives and operations can be defined to separate graph analytic application development and complexity of underlying hardware concern

Graph Algorithms on Future Architectures Poster (SEI 2015 Research Review)

October 2015
Author(s): Scott McMillan

Delves into whether primitives and operations can be defined to separate graph analytic application development and complexity of underlying hardware concern

C4I Session Opening Remarks

October 2015
Author(s):

Better decision making, enhanced productivity, and more innovation are needed to meet today's information handling and security challenges

Edge-Enabled Tactical Systems

October 2015
Author(s): Grace Lewis, Jeff Boleng

EETS adapts cutting-edge technologies and builds prototypes of assured, efficient, and rapidly fieldable systems to enhance decision support for tactical users

Edge-Enabled Tactical Systems Poster (SEI 2015 Research Review)

October 2015
Author(s): Jeff Boleng, Grace Lewis

EETS adapts cutting-edge technologies and builds prototypes of assured, efficient, and rapidly-fieldable systems to enhance decision support for tactical users

Effecting Large-Scale Adaptive Swarms Through Intelligent Collaboration

October 2015
Author(s): James Edmondson

The goal of this project is to work toward making the controlling of autonomous systems scalable, effective, and predictable

Effecting Large-Scale Adaptive Swarms through Intelligent Collaboration Poster (SEI 2015 Research Review)

October 2015
Author(s): James Edmondson

The goal of this project is to work toward making the controlling of autonomous systems scalable, effective, and predictable

Human Factors Session Opening Remarks

October 2015
Author(s): Christopher May

Critical issues include mission readiness certification, limitations of capacity to analyze large data sets, leaks of sensitive and classified information

Generalized Automated Cyber-Readiness Evaluator

October 2015
Author(s): Rotem D. Guttman

Describes work to enable this approach to cyber-readiness evaluation: train as you fight and evalute at you fight

Generalized Automated Cyber-Readiness Evaluator Poster (SEI 2015 Research Review)

October 2015
Author(s): Rotem D. Guttman

Describes work to enable this approach to cyber-readiness evaluation: train as you fight and evalute at you fight

Human-Computer Decision Systems

October 2015
Author(s): Brian Lindauer

Describes work to use learning theory advances to account for persistent human expert teams and experiments to improve the human-computer decision system

Human-Computer Decision Systems Poster (SEI 2015 Research Review)

October 2015
Author(s): Brian Lindauer

Describes work to use learning theory advances to account for persistent human expert teams and experiments to improve the human-computer decision syste

Insider Threat Mitigation

October 2015
Author(s): William R. Claycomb, Andrew P. Moore

Explores hypothesis that over time, insider social networks exhibit weakening of internal connections and strengthening of external connections to adversaries

Insider Threat Mitigation Posters (SEI 2015 Research Review)

October 2015
Author(s): William R. Claycomb, Andrew P. Moore

Two posters on insider threat research: Social network dynamics and holes in dynamic networks

Verification and Validation Session Opening Remarks

October 2015
Author(s): Linda M. Northrop

This presentation was delivered as the opening remarks for the Verification and Validation session of the 2015 Research Review. It introduces the subjects covered during the session.

Parallel Software Model Checking

October 2015
Author(s): Sagar Chaki

In this 2015 Research Review presentation, the author describes his research efforts into scaling up software model checking—a fundamental challenge in the field.

Runtime Assurance for Big Data Systems

October 2015
Author(s): John Klein

This 2015 Research Review presentation describes research into the unique assurance requirements and conditions of Big Data systems.

Runtime Assurance for Big Data Systems Poster (SEI 2015 Research Review)

October 2015
Author(s): John Klein

This 2015 Research Review presentation describes research into the unique assurance requirements and conditions of Big Data systems.

Incremental Lifecycle Assurance of Critical Systems (2015)

October 2015
Author(s): Peter H. Feiler

This 2015 Research Review presentation explores the author's research into ways to improve critical system assurance.

Incremental Lifecycle Assurance of Critical Systems Poster (SEI 2015 Research Review)

October 2015
Author(s): Peter H. Feiler

This poster explores ways to improve critical system assurance.

Verifying Distributed Adaptive Real-Time (DART) Systems

October 2015
Author(s): Sagar Chaki, Dionisio de Niz

This 2015 Research Review presentation describes the authors' research efforts in verifying distributed adaptive real-time systems.

Verifying Distributed Adaptive Real-Time (DART) Systems Poster (SEI 2015 Research Review)

October 2015
Author(s): Sagar Chaki, Dionisio de Niz

This poster describes the authors' research efforts in verifying distributed adaptive real-time systems.

Cybersecurity Session Opening Remarks

October 2015
Author(s): Roman Danyliw

This 2015 Research Review presentation opened the program's cybersecurity session, providing an overview of the segment's featured presentations.

Design Pattern Recovery from Malware Binaries

October 2015
Author(s): Cory Cohen

This 2015 Research Review presentation explores the challenges posed by automated binary analysis.

Design Pattern Recovery from Malware Binaries Poster (SEI 2015 Research Review)

October 2015
Author(s): Samuel M. Weber

This poster displays three tools for static analysis.

API Usability and Security

October 2015
Author(s): Samuel M. Weber

This 2005 Research Review presentation describes an effort to develop and empirically test API design principles.

API Usability and Security Poster (SEI 2015 Research Review)

October 2015
Author(s): Samuel M. Weber

This poster describes an effort to develop and empirically test API design principles.

Vulnerability Discovery (2015)

October 2015
Author(s): Edward J. Schwartz

A 2015 Research Review presentation on discovering vulnerabilities in software.

Vulnerability Discovery Poster (SEI 2015 Research Review)

October 2015
Author(s): Edward J. Schwartz

A poster for the 2015 Research Review presentation on discovering vulnerabilities in software.

Cybersecurity via Signaling Games

October 2015
Author(s): William Casey

A Research Review 2015 presentation on using signaling games in cybersecurity

Cyber Security via Signaling Games Poster (SEI 2015 Research Review)

October 2015
Author(s): William Casey

Looks at how we can establish trust, manage risk, and mitigate deceptive cyber-attacks when decision-making is constrained