Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type


Publication Date

Showing 1 - 10 of 176 results for the Type - Special Report

Special Report | June 2016 - Special Report Report Writer and Security Requirements Finder: User and ... By Nancy R. Mead, Anand Sankalp (Carnegie Mellon University), Gupta Anurag (Carnegie Mellon), Priyam Swati (Carnegie Mellon University), Yaobin Wen (Carnegie Mellon University), Walid El Baroni (Carnegie Mellon University)

This report presents instructions for using the Malware-driven Overlooked Requirements (MORE) website applications.

Special Report | February 2014 - Special Report Wireless Emergency Alerts: Trust Model Technical Report By Robert W. Stoddard, Joseph P. Elm, James McCurley, Sarah Sheard, Tamara Marshall-Keim

This report describes a trust model to enable the Federal Emergency Management Agency to maximize the effectiveness of the Wireless Emergency Alerts (WEA) service and provides guidance for alert originators in using WEA to maximize public safety.

Special Report | June 2013 - Special Report Socio-Adaptive Systems Challenge Problems Workshop ... By Scott Hissam, Mark H. Klein, Timothy Morrow

This report presents a summary of the findings of the Socio-Adaptive Systems Challenge Problem Workshop, held in Pittsburgh, PA, on April 12-13, 2012.

Special Report | August 2002 - Special Report A Report on the May 2002 CMMI Workshop By Michael D. Konrad, Mary Beth Chrissis, Bill Curtis (CAST Research Labs), Mark C. Paulk

This report summarizes the results of the CMMI Workshop held May 7-8, 2002.

Special Report | October 2003 - Special Report CMMI Interpretive Guidance Project: Preliminary Report By Mary Beth Chrissis, Gian Wemyss, Dennis Goldenson, Michael D. Konrad, Kenneth Smith, Agapi Svolou

The SEI collected data to learn more about how CMMI is being accepted by various organizations. This report describes those activities and includes summaries of the data collected.

Special Report | July 2000 - Special Report Spiral Development - Building the Culture: A Report on the ... By Fred Hansen, John T. Foreman, David J. Carney, Eileen C. Forrester, Caroline P. Graettinger, William C. Peterson, Patrick R. Place

This report summarizes the CSE/SEI February 2000 SDM workshop and presents its recommendations.

Special Report | July 2017 - Special Report Systemic Vulnerabilities in Customer-Premises Equipment ... By Joel Land

This report describes a test framework that the CERT/CC developed to identify systemic and other vulnerabilities in CPE routers.

Special Report | January 1997 - Special Report Report to the President's Commission on Critical Infrastructure ... By James Ellis, David Fisher, Thomas A. Longstaff, Linda Pesante, Richard D. Pethia

This 1997 report identifies threats to and vulnerabilities of the Internet and estimates the cascade effect that a successful, sustained attack on the Internet would have on the critical national infrastructures set out in Executive Order 13010.

Special Report | June 2006 - Special Report Adapting CMMI for Acquisition Organizations: A Preliminary ... By Hubert F. Hofmann (General Motors), Gowri S. Ramani (Hewlett Packard), Deborah K. Yedlin (General Motors), Kathryn M. Dodson (EDS)

This 2006 document presents the initial draft CMMI-ACQ, which adapts CMMI for acquisition organizations.

Special Report | June 2005 - Special Report Report on Annual Regional Information Assurance Symposia By Carol A. Sledge

In this report, Carol Sledge explains why the annual Regional Information Assurance Symposia is a key transition component of Regional Collaborative Clusters.