SEI 2015 Research Review Artifacts
• Collection
Publisher
Software Engineering Institute
Abstract
The SEI 2015 Research Review, held in October 2015, afforded the opportunity to
Collection Items
![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
SEI Research Review 2015: CTO Opening Remarks
• Presentation
By Kevin Fall
Overview of the intent of the Research Review and the talks included in its sessions
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Acquisition & Management Session Opening Remarks
• Presentation
By Anita Carleton
Software acquisition & management R&D investigates ways to assure functionality, timely delivery, lowered risk, and affordability.
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Agile in Government: Validating Success Enablers and Inhibitors
• Presentation
By Mary Ann Lapham, Suzanne Miller
Describes recent developments in a project to provide DoD and government agencies with actionable Agile guidance within the constraints of DoDI 5000.02
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Agile in Government Poster (SEI 2015 Research Review)
• Poster
By Mary Ann Lapham, Suzanne Miller
This poster illustrates challenges and SEI work in aligning Agile practices with government requirements.
Download![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Machine Learning for Big Data Systems Acquisition
• Presentation
By John Klein
This presentation tackles the question, "Can we automatically identify relevant document pages that contain the knowledge required for a curator to populate the knowledge base?"
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Machine Learning for Big Data System Acquisition Poster (SEI 2015 Research Review)
• Poster
By John Klein
This poster tackles the question, "Can we automatically identify relevant document pages that contain the knowledge required for a curator to populate the knowledge base?"
Download![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Quantifying Uncertainty for Early Lifecycle Cost Estimation:FY15 Results
• Presentation
By Robert W. Stoddard
The QUELCE method continues to be refined. This slide set describes recent developments.
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Quantifying Uncertainty in Early Lifecycle Cost Estimation Poster (SEI 2015 Research Review)
• Poster
By Robert W. Stoddard
The QUELCE method continues to be refined. This poster describes recent developments.
Download![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Improving Software Sustainability Through Data-Driven Technical Debt Management
• Presentation
By Ipek Ozkaya, Robert Nord
This work aims to improve sustainment decision making by identifying technical debt indicators and building correlations between them and project measures.
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Improving Software Sustainability through Data-Driven Technical Debt Management Poster (SEI 2015 Research Review)
• Poster
By Ipek Ozkaya, Robert Nord
This work aims to improve sustainment decision making by identifying technical debt indicators and building correlations between them and project measures.
Download![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Assured Design Session Opening Remarks
• Presentation
By John B. Goodenough
Explores a definition of assured design as having justified confidence that a (software-reliant) system design has particular properties
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Effective Reduction of Avoidable Complexity in Embedded Systems
• Presentation
By Julien Delange
Examines the need for software complexity management, in particular ways to detect complexity in models and improve model design
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Effective Reduction of Avoidable Complexity in Embedded Systems Poster (SEI 2015 Research Review)
• Poster
By Julien Delange
Examines the need for software complexity management, in particular ways to detect complexity in models and improve model design.
Download![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Open Source AADL Workbench for Virtual System Integration Poster (SEI 2015 Research Review)
• Poster
By Peter H. Feiler, Lutz Wrage
Explores a solution for the limitations of traditional system development development lifecycle methods.
Download![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Open Source AADL Workbench for Virtual System Integration
• Presentation
By Peter H. Feiler
The AADL Workbench includes tools for modeling, analysis, and usability capabilities. It also incorporates tools such as Resolute and Ocarina.
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Extending AADL for Security Design Assurance of the Internet of Things
• Presentation
By Carol Woody, Rick Kazman
This project aims to extend AADL to better address security in the architecture
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Extending AADL for Security Design Assurance of the Internet of Things Poster (SEI 2015 Research Review)
• Poster
By Rick Kazman, Carol Woody
This poster describes a project that aims to extend AADL to better address security in the architecture
Download![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Increase Adoption of Secure Coding Standards
• Presentation
By Daniel Plakosh
Recent work to promote adoption of secure coding standards includes a web application to improve analyst productivity and 25 new rules for C++
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Increase Adoption of Secure Coding Standards Poster (SEI 2015 Research Review)
• Poster
By Daniel Plakosh
Recent work to promote adoption of secure coding standards includes a web application to improve analyst productivity and 25 new rules for C++
Download![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Graph Algorithms on Future Architectures
• Presentation
By Scott McMillan
Delves into whether primitives and operations can be defined to separate graph analytic application development and complexity of underlying hardware concern
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Graph Algorithms on Future Architectures Poster (SEI 2015 Research Review)
• Poster
By Scott McMillan
Delves into whether primitives and operations can be defined to separate graph analytic application development and complexity of underlying hardware concerns.
Download![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
C4I Session Opening Remarks
• Presentation
By Software Engineering Institute
Better decision making, enhanced productivity, and more innovation are needed to meet today's information handling and security challenges
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Edge-Enabled Tactical Systems
• Presentation
By Grace Lewis, Jeff Boleng
EETS adapts cutting-edge technologies and builds prototypes of assured, efficient, and rapidly fieldable systems to enhance decision support for tactical users
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Edge-Enabled Tactical Systems Poster (SEI 2015 Research Review)
• Poster
By Jeff Boleng, Grace Lewis
EETS adapts cutting-edge technologies and builds prototypes of assured, efficient, and rapidly-fieldable systems to enhance decision support for tactical users
Download![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Effecting Large-Scale Adaptive Swarms Through Intelligent Collaboration
• Presentation
By James Edmondson
The goal of this project is to work toward making the controlling of autonomous systems scalable, effective, and predictable
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Effecting Large-Scale Adaptive Swarms through Intelligent Collaboration Poster (SEI 2015 Research Review)
• Poster
By James Edmondson
The goal of this project is to work toward making the controlling of autonomous systems scalable, effective, and predictable
Download![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Human Factors Session Opening Remarks
• Presentation
By Christopher May
Critical issues include mission readiness certification, limitations of capacity to analyze large data sets, leaks of sensitive and classified information
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Generalized Automated Cyber-Readiness Evaluator
• Presentation
By Rotem D. Guttman
Describes work to enable this approach to cyber-readiness evaluation: train as you fight and evaluate as you fight.
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Generalized Automated Cyber-Readiness Evaluator Poster (SEI 2015 Research Review)
• Poster
By Rotem D. Guttman
Describes work to enable this approach to cyber-readiness evaluation: train as you fight and evaluate as you fight.
Download![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Human-Computer Decision Systems
• Presentation
By Brian Lindauer
Describes work to use learning theory advances to account for persistent human expert teams and experiments to improve the human-computer decision system
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Human-Computer Decision Systems Poster (SEI 2015 Research Review)
• Poster
By Brian Lindauer
Describes work to use learning theory advances to account for persistent human expert teams and experiments to improve the human-computer decision systems.
Download![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Insider Threat Mitigation
• Presentation
By William R. Claycomb, Andrew P. Moore
Explores hypothesis that over time, insider social networks exhibit weakening of internal connections and strengthening of external connections to adversaries.
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Insider Threat Mitigation Posters (SEI 2015 Research Review)
• Poster
By William R. Claycomb, Andrew P. Moore
Two posters on insider threat research: Social network dynamics and holes in dynamic networks
Download![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Verification and Validation Session Opening Remarks
• Presentation
By Linda M. Northrop
This presentation was delivered as the opening remarks for the Verification and Validation session of the 2015 Research Review.
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Parallel Software Model Checking
• Presentation
By Sagar Chaki
In this 2015 Research Review presentation, the author describes his research efforts into scaling up software model checking—a fundamental challenge in the field.
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Runtime Assurance for Big Data Systems
• Presentation
By John Klein
This 2015 Research Review presentation describes research into the unique assurance requirements and conditions of Big Data systems.
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Runtime Assurance for Big Data Systems Poster (SEI 2015 Research Review)
• Poster
By John Klein
This 2015 Research Review presentation describes research into the unique assurance requirements and conditions of Big Data systems.
Download![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Incremental Lifecycle Assurance of Critical Systems (2015)
• Presentation
By Peter H. Feiler
This 2015 Research Review presentation explores the author's research into ways to improve critical system assurance.
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Incremental Lifecycle Assurance of Critical Systems Poster (SEI 2015 Research Review)
• Poster
By Peter H. Feiler
This poster explores ways to improve critical system assurance.
Download![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Verifying Distributed Adaptive Real-Time (DART) Systems
• Presentation
By Sagar Chaki, Dionisio de Niz
This 2015 Research Review presentation describes the authors' research efforts in verifying distributed adaptive real-time systems.
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Verifying Distributed Adaptive Real-Time (DART) Systems Poster (SEI 2015 Research Review)
• Poster
By Sagar Chaki, Dionisio de Niz
This poster describes the authors' research efforts in verifying distributed adaptive real-time systems.
Download![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Cybersecurity Session Opening Remarks
• Presentation
By Roman Danyliw
This 2015 Research Review presentation opened the program's cybersecurity session, providing an overview of the segment's featured presentations.
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Design Pattern Recovery from Malware Binaries
• Presentation
By Cory Cohen
This 2015 Research Review presentation explores the challenges posed by automated binary analysis.
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Design Pattern Recovery from Malware Binaries Poster (SEI 2015 Research Review)
• Poster
By Sam Weber
This poster by Sam Weber illustrates three tools for static analysis.
Download![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
API Usability and Security
• Presentation
By Sam Weber
This 2015 Research Review presentation describes an effort to develop and empirically test API design principles.
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
API Usability and Security Poster (SEI 2015 Research Review)
• Poster
By Sam Weber
This poster describes an effort to develop and empirically test API design principles.
Download![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Vulnerability Discovery (2015)
• Presentation
By Edward J. Schwartz
A 2015 Research Review presentation on discovering vulnerabilities in software.
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Vulnerability Discovery Poster (SEI 2015 Research Review)
• Poster
By Edward J. Schwartz
A poster for the 2015 Research Review presentation on discovering vulnerabilities in software.
Download![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Cybersecurity via Signaling Games
• Presentation
By William Casey
This presentation, delivered at Research Review 2015, discusses using signaling games in cybersecurity.
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Cyber Security via Signaling Games Poster (SEI 2015 Research Review)
• Poster
By William Casey
Looks at how we can establish trust, manage risk, and mitigate deceptive cyber-attacks when decision-making is constrained
Download