SEI 2015 Research Review Artifacts
Presentations and other documents related to the SEI 2015 Research Review
Publisher:
Software Engineering Institute
Abstract
The SEI 2015 Research Review, held in October 2015, afforded the opportunity to
Collection Contents
-
SEI Research Review 2015: CTO Opening Remarks
October 15, 2015 • Presentation
By Kevin Fall
Overview of the intent of the Research Review and the talks included in its sessions
read -
Acquisition & Management Session Opening Remarks
October 16, 2015 • Presentation
By Anita Carleton
Software acquisition & management R&D investigates ways to assure functionality, timely delivery, lowered risk, and affordability.
read -
Agile in Government: Validating Success Enablers and Inhibitors
October 16, 2015 • Presentation
By Mary Ann Lapham, Suzanne Miller
Describes recent developments in a project to provide DoD and government agencies with actionable Agile guidance within the constraints of DoDI 5000.02
read -
Agile in Government Poster (SEI 2015 Research Review)
October 22, 2015 • Poster
By Mary Ann Lapham, Suzanne Miller
Describes challenges and SEI work in aligning Agile practices with governmen requirements
read -
Machine Learning for Big Data Systems Acquisition
October 16, 2015 • Presentation
By John Klein
This presentation tackles the question, "Can we automatically identify relevant document pages that contain the knowledge required for a curator to populate the knowledge base?"
read -
Machine Learning for Big Data System Acquisition Poster (SEI 2015 Research Review)
October 22, 2015 • Poster
By John Klein
This poster tackles the question, "Can we automatically identify relevant document pages that contain the knowledge required for a curator to populate the knowledge base?"
read -
Quantifying Uncertainty for Early Lifecycle Cost Estimation:FY15 Results
October 16, 2015 • Presentation
By Robert W. Stoddard
The QUELCE method continues to be refined. This slide set describes recent developments.
read -
Quantifying Uncertainty in Early Lifecycle Cost Estimation Poster (SEI 2015 Research Review)
October 22, 2015 • Poster
By Robert W. Stoddard
The QUELCE method continues to be refined. This poster describes recent developments.
read -
Improving Software Sustainability Through Data-Driven Technical Debt Management
October 16, 2015 • Presentation
By Ipek Ozkaya, Robert Nord
This work aims to improve sustainment decision making by identifying technical debt indicators and building correlations between them and project measures.
read -
Improving Software Sustainability through Data-Driven Technical Debt Management Poster (SEI 2015 Research Review)
October 22, 2015 • Poster
By Ipek Ozkaya, Robert Nord
This work aims to improve sustainment decision making by identifying technical debt indicators and building correlations between them and project measures.
read -
Assured Design Session Opening Remarks
October 16, 2015 • Presentation
By John B. Goodenough
Explores a definition of assured design as having justified confidence that a (software-reliant) system design has particular properties
read -
Effective Reduction of Avoidable Complexity in Embedded Systems
October 16, 2015 • Presentation
By Julien Delange
Examines the need for software complexity management, in particular ways to detect complexity in models and improve model design
read -
Effective Reduction of Avoidable Complexity in Embedded Systems Poster (SEI 2015 Research Review)
October 22, 2015 • Poster
By Julien Delange
Examines the need for software complexity management, in particular ways to detect complexity in models and improve model design
read -
Open Source AADL Workbench for Virtual System Integration Poster (SEI 2015 Research Review)
October 22, 2015 • Poster
By Peter H. Feiler, Lutz Wrage
Explores a solution for the limitations of traditional system development development lifecycle methods
read -
Open Source AADL Workbench for Virtual System Integration
October 16, 2015 • Presentation
By Peter H. Feiler
The AADL Workbench includes tools for modeling, analysis, and usability capabilities. It also incorporates tools such as Resolute and Ocarina.
read -
Extending AADL for Security Design Assurance of the Internet of Things
October 16, 2015 • Presentation
By Carol Woody, Rick Kazman
This project aims to extend AADL to better address security in the architecture
read -
Extending AADL for Security Design Assurance of the Internet of Things Poster (SEI 2015 Research Review)
October 22, 2015 • Poster
By Rick Kazman, Carol Woody
This poster describes a project that aims to extend AADL to better address security in the architecture
read -
Increase Adoption of Secure Coding Standards
October 16, 2015 • Presentation
By Daniel Plakosh
Recent work to promote adoption of secure coding standards includes a web application to improve analyst productivity and 25 new rules for C++
read -
Increase Adoption of Secure Coding Standards Poster (SEI 2015 Research Review)
October 22, 2015 • Poster
By Daniel Plakosh
Recent work to promote adoption of secure coding standards includes a web application to improve analyst productivity and 25 new rules for C++
read -
Graph Algorithms on Future Architectures
October 16, 2015 • Presentation
By Scott McMillan
Delves into whether primitives and operations can be defined to separate graph analytic application development and complexity of underlying hardware concern
read -
Graph Algorithms on Future Architectures Poster (SEI 2015 Research Review)
October 22, 2015 • Poster
By Scott McMillan
Delves into whether primitives and operations can be defined to separate graph analytic application development and complexity of underlying hardware concern
read -
C4I Session Opening Remarks
October 16, 2015 • Presentation
Better decision making, enhanced productivity, and more innovation are needed to meet today's information handling and security challenges
read -
Edge-Enabled Tactical Systems
October 16, 2015 • Presentation
By Grace Lewis, Jeff Boleng
EETS adapts cutting-edge technologies and builds prototypes of assured, efficient, and rapidly fieldable systems to enhance decision support for tactical users
read -
Edge-Enabled Tactical Systems Poster (SEI 2015 Research Review)
October 22, 2015 • Poster
By Jeff Boleng, Grace Lewis
EETS adapts cutting-edge technologies and builds prototypes of assured, efficient, and rapidly-fieldable systems to enhance decision support for tactical users
read -
Effecting Large-Scale Adaptive Swarms Through Intelligent Collaboration
October 16, 2015 • Presentation
By James Edmondson
The goal of this project is to work toward making the controlling of autonomous systems scalable, effective, and predictable
read -
Effecting Large-Scale Adaptive Swarms through Intelligent Collaboration Poster (SEI 2015 Research Review)
October 22, 2015 • Poster
By James Edmondson
The goal of this project is to work toward making the controlling of autonomous systems scalable, effective, and predictable
read -
Human Factors Session Opening Remarks
October 16, 2015 • Presentation
By Christopher May
Critical issues include mission readiness certification, limitations of capacity to analyze large data sets, leaks of sensitive and classified information
read -
Generalized Automated Cyber-Readiness Evaluator
October 16, 2015 • Presentation
By Rotem D. Guttman
Describes work to enable this approach to cyber-readiness evaluation: train as you fight and evalute at you fight
read -
Generalized Automated Cyber-Readiness Evaluator Poster (SEI 2015 Research Review)
October 22, 2015 • Poster
By Rotem D. Guttman
Describes work to enable this approach to cyber-readiness evaluation: train as you fight and evalute at you fight
read -
Human-Computer Decision Systems
October 16, 2015 • Presentation
By Brian Lindauer
Describes work to use learning theory advances to account for persistent human expert teams and experiments to improve the human-computer decision system
read -
Human-Computer Decision Systems Poster (SEI 2015 Research Review)
October 22, 2015 • Poster
By Brian Lindauer
Describes work to use learning theory advances to account for persistent human expert teams and experiments to improve the human-computer decision syste
read -
Insider Threat Mitigation
October 16, 2015 • Presentation
By William R. Claycomb, Andrew P. Moore
Explores hypothesis that over time, insider social networks exhibit weakening of internal connections and strengthening of external connections to adversaries
read -
Insider Threat Mitigation Posters (SEI 2015 Research Review)
October 21, 2015 • Poster
By William R. Claycomb, Andrew P. Moore
Two posters on insider threat research: Social network dynamics and holes in dynamic networks
read -
Verification and Validation Session Opening Remarks
October 16, 2015 • Presentation
By Linda M. Northrop
This presentation was delivered as the opening remarks for the Verification and Validation session of the 2015 Research Review. It introduces the subjects covered during the session.
read -
Parallel Software Model Checking
October 16, 2015 • Presentation
By Sagar Chaki
In this 2015 Research Review presentation, the author describes his research efforts into scaling up software model checking—a fundamental challenge in the field.
read -
Runtime Assurance for Big Data Systems
October 16, 2015 • Presentation
By John Klein
This 2015 Research Review presentation describes research into the unique assurance requirements and conditions of Big Data systems.
read -
Runtime Assurance for Big Data Systems Poster (SEI 2015 Research Review)
October 22, 2015 • Poster
By John Klein
This 2015 Research Review presentation describes research into the unique assurance requirements and conditions of Big Data systems.
read -
Incremental Lifecycle Assurance of Critical Systems (2015)
October 16, 2015 • Presentation
By Peter H. Feiler
This 2015 Research Review presentation explores the author's research into ways to improve critical system assurance.
read -
Incremental Lifecycle Assurance of Critical Systems Poster (SEI 2015 Research Review)
October 22, 2015 • Poster
By Peter H. Feiler
This poster explores ways to improve critical system assurance.
read -
Verifying Distributed Adaptive Real-Time (DART) Systems
October 16, 2015 • Presentation
By Sagar Chaki, Dionisio de Niz
This 2015 Research Review presentation describes the authors' research efforts in verifying distributed adaptive real-time systems.
read -
Verifying Distributed Adaptive Real-Time (DART) Systems Poster (SEI 2015 Research Review)
October 22, 2015 • Poster
By Sagar Chaki, Dionisio de Niz
This poster describes the authors' research efforts in verifying distributed adaptive real-time systems.
read -
Cybersecurity Session Opening Remarks
October 16, 2015 • Presentation
By Roman Danyliw
This 2015 Research Review presentation opened the program's cybersecurity session, providing an overview of the segment's featured presentations.
read -
Design Pattern Recovery from Malware Binaries
October 16, 2015 • Presentation
By Cory Cohen
This 2015 Research Review presentation explores the challenges posed by automated binary analysis.
read -
Design Pattern Recovery from Malware Binaries Poster (SEI 2015 Research Review)
October 23, 2015 • Poster
By Samuel M. Weber
This poster displays three tools for static analysis.
read -
API Usability and Security
October 16, 2015 • Presentation
By Samuel M. Weber
This 2015 Research Review presentation describes an effort to develop and empirically test API design principles.
read -
API Usability and Security Poster (SEI 2015 Research Review)
October 22, 2015 • Poster
By Samuel M. Weber
This poster describes an effort to develop and empirically test API design principles.
read -
Vulnerability Discovery (2015)
October 16, 2015 • Presentation
By Edward J. Schwartz
A 2015 Research Review presentation on discovering vulnerabilities in software.
read -
Vulnerability Discovery Poster (SEI 2015 Research Review)
October 22, 2015 • Poster
By Edward J. Schwartz
A poster for the 2015 Research Review presentation on discovering vulnerabilities in software.
read -
Cybersecurity via Signaling Games
October 16, 2015 • Presentation
By William Casey
A Research Review 2015 presentation on using signaling games in cybersecurity
read -
Cyber Security via Signaling Games Poster (SEI 2015 Research Review)
October 22, 2015 • Poster
By William Casey
Looks at how we can establish trust, manage risk, and mitigate deceptive cyber-attacks when decision-making is constrained
read