Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type


Publication Date

Showing 1 - 10 of 180 results for Type - Special Report

Special Report | February 2018 - Special Report Cyber Mutual Assistance Workshop Report By Jonathon Monken (PJM Interconnection), Fernando Maymi - PhD (Army Cyber Institute), Dan Bennett - PhD (Army Cyber Institute), Dan Huynh (Army Cyber Institute), Blake Rhoades (Army Cyber Institute), Matt Hutchison (Army Cyber Institute), Judy Esquibel (Army Cyber Institute), Bill Lawrence (North American Electric Reliability Corporation), Katie C. Stewart

The Army Cyber Institute hosted a Cyber Mutual Assistance Workshop to identify challenges in defining cyber requirements for Regional Mutual Assistance Groups.

Special Report | June 2016 - Special Report Report Writer and Security Requirements Finder: User and ... By Nancy R. Mead, Anand Sankalp (Carnegie Mellon University), Gupta Anurag (Carnegie Mellon), Priyam Swati (Carnegie Mellon University), Yaobin Wen (Carnegie Mellon University), Walid El Baroni (Carnegie Mellon University)

This report presents instructions for using the Malware-driven Overlooked Requirements (MORE) website applications.

Special Report | October 2018 - Special Report FedCLASS: A Case Study of Agile and Lean Practices in the ... By Nanette Brown, Jeff Davenport, Linda Parker Gates, Tamara Marshall-Keim

This study reports the successes and challenges of using Agile and Lean methods and cloud-based technologies in a government software development environment.

Special Report | February 2014 - Special Report Wireless Emergency Alerts: Trust Model Technical Report By Robert W. Stoddard, Joseph P. Elm, James McCurley, Sarah Sheard, Tamara Marshall-Keim

This report describes a trust model to enable the Federal Emergency Management Agency to maximize the effectiveness of the Wireless Emergency Alerts (WEA) service and provides guidance for alert originators in using WEA to maximize public safety.

Special Report | June 2013 - Special Report Socio-Adaptive Systems Challenge Problems Workshop ... By Scott Hissam, Mark H. Klein, Timothy Morrow

This report presents a summary of the findings of the Socio-Adaptive Systems Challenge Problem Workshop, held in Pittsburgh, PA, on April 12-13, 2012.

Special Report | August 2002 - Special Report A Report on the May 2002 CMMI Workshop By Michael D. Konrad, Mary Beth Chrissis, Bill Curtis (CAST Research Labs), Mark C. Paulk

This report summarizes the results of the CMMI Workshop held on May 7-8, 2002.

Special Report | July 2000 - Special Report Spiral Development - Building the Culture: A Report on the ... By Fred Hansen, John T. Foreman, David J. Carney, Eileen C. Forrester, Caroline P. Graettinger, William C. Peterson, Patrick R. Place

This report summarizes the CSE/SEI February 2000 SDM workshop and presents its recommendations.

Special Report | October 2003 - Special Report CMMI Interpretive Guidance Project: Preliminary Report By Mary Beth Chrissis, Gian Wemyss, Dennis Goldenson, Michael D. Konrad, Kenneth Smith, Agapi Svolou

The SEI collected data to learn more about how CMMI is being accepted by various organizations. This report describes those activities and includes summaries of the data collected.

Special Report | October 1997 - Special Report Report of the STEP '97 Workshop on Net-Centric Computing By Scott R. Tilley (Florida Institute of Technoloy), Margaret-Anne Storey (University of Victoria)

This 1997 report describes the STEP '97 conference, overviews the Net-Centric Computing workshop, and provides a summary of the invited presentations.

Special Report | January 1997 - Special Report Report to the President's Commission on Critical Infrastructure ... By James Ellis, David Fisher, Thomas A. Longstaff, Linda Pesante, Richard D. Pethia

This 1997 report identifies threats to and vulnerabilities of the Internet and estimates the cascade effect that a successful, sustained attack on the Internet would have on the critical national infrastructures set out in Executive Order 13010.