Showing 1 - 10 of 227 results for the Publish Year - 2005
In this presentation, the authors discuss using FloVis to perform network data analysis.
This 2005 technical note provides guidance and procedures for performing robustness testing as part of DoD or federal acquisition programs that have a software component.
This presentation shares lessons learned from various software projects and process improvement activities.
This 2005 report examines some of the complexities of interoperability and some recent research approaches to achieving it.
In this 2005 report, Julia Allen examines governance thinking, principles, and approaches and applies them to the subject of enterprise security.
presentation at SATURN 2005, April 6-7, 2005 in Pittsburgh, PA
This presentation – on methodically designing software architecture using ArchE, an architecture design assistant – was presented by Felix Bachmann and Mark H. Klein in 2005.
This 2005 report explores achieving interoperability in the acquisition process.
Phishing Reports using the INCH Format by Pat Cain from The Cooper-Cain Group at IETF #62 in 2009.
This report documents acquisition practices that should be performed by government acquisition projects acquiring systems or services.