SEI 2015 Research Review Artifacts
• Collection
Publisher
Software Engineering Institute
Abstract
The SEI 2015 Research Review, held in October 2015, afforded the opportunity to
Collection Items
SEI Research Review 2015: CTO Opening Remarks
• Presentation
By Kevin Fall
Overview of the intent of the Research Review and the talks included in its sessions
Learn MoreAcquisition & Management Session Opening Remarks
• Presentation
By Anita Carleton
Software acquisition & management R&D investigates ways to assure functionality, timely delivery, lowered risk, and affordability.
Learn MoreAgile in Government: Validating Success Enablers and Inhibitors
• Presentation
By Mary Ann Lapham, Suzanne Miller
Describes recent developments in a project to provide DoD and government agencies with actionable Agile guidance within the constraints of DoDI 5000.02
Learn MoreAgile in Government Poster (SEI 2015 Research Review)
• Poster
By Mary Ann Lapham, Suzanne Miller
This poster illustrates challenges and SEI work in aligning Agile practices with government requirements.
DownloadMachine Learning for Big Data Systems Acquisition
• Presentation
By John Klein
This presentation tackles the question, "Can we automatically identify relevant document pages that contain the knowledge required for a curator to populate the knowledge base?"
Learn MoreMachine Learning for Big Data System Acquisition Poster (SEI 2015 Research Review)
• Poster
By John Klein
This poster tackles the question, "Can we automatically identify relevant document pages that contain the knowledge required for a curator to populate the knowledge base?"
DownloadQuantifying Uncertainty for Early Lifecycle Cost Estimation:FY15 Results
• Presentation
By Robert W. Stoddard
The QUELCE method continues to be refined. This slide set describes recent developments.
Learn MoreQuantifying Uncertainty in Early Lifecycle Cost Estimation Poster (SEI 2015 Research Review)
• Poster
By Robert W. Stoddard
The QUELCE method continues to be refined. This poster describes recent developments.
DownloadImproving Software Sustainability Through Data-Driven Technical Debt Management
• Presentation
By Ipek Ozkaya, Robert Nord
This work aims to improve sustainment decision making by identifying technical debt indicators and building correlations between them and project measures.
Learn MoreImproving Software Sustainability through Data-Driven Technical Debt Management Poster (SEI 2015 Research Review)
• Poster
By Ipek Ozkaya, Robert Nord
This work aims to improve sustainment decision making by identifying technical debt indicators and building correlations between them and project measures.
DownloadAssured Design Session Opening Remarks
• Presentation
By John B. Goodenough
Explores a definition of assured design as having justified confidence that a (software-reliant) system design has particular properties
Learn MoreEffective Reduction of Avoidable Complexity in Embedded Systems
• Presentation
By Julien Delange
Examines the need for software complexity management, in particular ways to detect complexity in models and improve model design
Learn MoreEffective Reduction of Avoidable Complexity in Embedded Systems Poster (SEI 2015 Research Review)
• Poster
By Julien Delange
Examines the need for software complexity management, in particular ways to detect complexity in models and improve model design.
DownloadOpen Source AADL Workbench for Virtual System Integration Poster (SEI 2015 Research Review)
• Poster
By Peter H. Feiler, Lutz Wrage
Explores a solution for the limitations of traditional system development development lifecycle methods.
DownloadOpen Source AADL Workbench for Virtual System Integration
• Presentation
By Peter H. Feiler
The AADL Workbench includes tools for modeling, analysis, and usability capabilities. It also incorporates tools such as Resolute and Ocarina.
Learn MoreExtending AADL for Security Design Assurance of the Internet of Things
• Presentation
By Carol Woody, Rick Kazman
This project aims to extend AADL to address security in architecture better.
Learn MoreExtending AADL for Security Design Assurance of the Internet of Things Poster (SEI 2015 Research Review)
• Poster
By Rick Kazman, Carol Woody
This poster describes a project that aims to extend AADL to better address security in the architecture
DownloadIncrease Adoption of Secure Coding Standards
• Presentation
By Daniel Plakosh
Recent work to promote adoption of secure coding standards includes a web application to improve analyst productivity and 25 new rules for C++
Learn MoreIncrease Adoption of Secure Coding Standards Poster (SEI 2015 Research Review)
• Poster
By Daniel Plakosh
Recent work to promote adoption of secure coding standards includes a web application to improve analyst productivity and 25 new rules for C++
DownloadGraph Algorithms on Future Architectures
• Presentation
By Scott McMillan
Delves into whether primitives and operations can be defined to separate graph analytic application development and complexity of underlying hardware concern
Learn MoreGraph Algorithms on Future Architectures Poster (SEI 2015 Research Review)
• Poster
By Scott McMillan
Delves into whether primitives and operations can be defined to separate graph analytic application development and complexity of underlying hardware concerns.
DownloadC4I Session Opening Remarks
• Presentation
By Software Engineering Institute
Better decision making, enhanced productivity, and more innovation are needed to meet today's information handling and security challenges
Learn MoreEdge-Enabled Tactical Systems
• Presentation
By Grace Lewis, Jeff Boleng
EETS adapts cutting-edge technologies and builds prototypes of assured, efficient, and rapidly fieldable systems to enhance decision support for tactical users
Learn MoreEdge-Enabled Tactical Systems Poster (SEI 2015 Research Review)
• Poster
By Jeff Boleng, Grace Lewis
EETS adapts cutting-edge technologies and builds prototypes of assured, efficient, and rapidly-fieldable systems to enhance decision support for tactical users
DownloadEffecting Large-Scale Adaptive Swarms Through Intelligent Collaboration
• Presentation
By James Edmondson
The goal of this project is to work toward making the controlling of autonomous systems scalable, effective, and predictable
Learn MoreEffecting Large-Scale Adaptive Swarms through Intelligent Collaboration Poster (SEI 2015 Research Review)
• Poster
By James Edmondson
The goal of this project is to work toward making the controlling of autonomous systems scalable, effective, and predictable
DownloadHuman Factors Session Opening Remarks
• Presentation
By Christopher May
Critical issues include mission readiness certification, limitations of capacity to analyze large data sets, leaks of sensitive and classified information
Learn MoreGeneralized Automated Cyber-Readiness Evaluator
• Presentation
By Rotem D. Guttman
Describes work to enable this approach to cyber-readiness evaluation: train as you fight and evaluate as you fight.
Learn MoreGeneralized Automated Cyber-Readiness Evaluator Poster (SEI 2015 Research Review)
• Poster
By Rotem D. Guttman
Describes work to enable this approach to cyber-readiness evaluation: train as you fight and evaluate as you fight.
DownloadHuman-Computer Decision Systems
• Presentation
By Brian Lindauer
Describes work to use learning theory advances to account for persistent human expert teams and experiments to improve the human-computer decision system
Learn MoreHuman-Computer Decision Systems Poster (SEI 2015 Research Review)
• Poster
By Brian Lindauer
Describes work to use learning theory advances to account for persistent human expert teams and experiments to improve the human-computer decision systems.
DownloadInsider Threat Mitigation
• Presentation
By William R. Claycomb, Andrew P. Moore
Explores hypothesis that over time, insider social networks exhibit weakening of internal connections and strengthening of external connections to adversaries.
Learn MoreInsider Threat Mitigation Posters (SEI 2015 Research Review)
• Poster
By William R. Claycomb, Andrew P. Moore
Two posters on insider threat research: Social network dynamics and holes in dynamic networks
DownloadVerification and Validation Session Opening Remarks
• Presentation
By Linda M. Northrop
This presentation was delivered as the opening remarks for the Verification and Validation session of the 2015 Research Review.
Learn MoreParallel Software Model Checking
• Presentation
By Sagar Chaki
In this 2015 Research Review presentation, the author describes his research efforts into scaling up software model checking—a fundamental challenge in the field.
Learn MoreRuntime Assurance for Big Data Systems
• Presentation
By John Klein
This 2015 Research Review presentation describes research into the unique assurance requirements and conditions of Big Data systems.
Learn MoreRuntime Assurance for Big Data Systems Poster (SEI 2015 Research Review)
• Poster
By John Klein
This 2015 Research Review presentation describes research into the unique assurance requirements and conditions of Big Data systems.
DownloadIncremental Lifecycle Assurance of Critical Systems (2015)
• Presentation
By Peter H. Feiler
This 2015 Research Review presentation explores the author's research into ways to improve critical system assurance.
Learn MoreIncremental Lifecycle Assurance of Critical Systems Poster (SEI 2015 Research Review)
• Poster
By Peter H. Feiler
This poster explores ways to improve critical system assurance.
DownloadVerifying Distributed Adaptive Real-Time (DART) Systems
• Presentation
By Sagar Chaki, Dionisio de Niz
This 2015 Research Review presentation describes the authors' research efforts in verifying distributed adaptive real-time systems.
Learn MoreVerifying Distributed Adaptive Real-Time (DART) Systems Poster (SEI 2015 Research Review)
• Poster
By Sagar Chaki, Dionisio de Niz
This poster describes the authors' research efforts in verifying distributed adaptive real-time systems.
DownloadCybersecurity Session Opening Remarks
• Presentation
By Roman Danyliw
This 2015 Research Review presentation opened the program's cybersecurity session, providing an overview of the segment's featured presentations.
Learn MoreDesign Pattern Recovery from Malware Binaries
• Presentation
By Cory Cohen
This 2015 Research Review presentation explores the challenges posed by automated binary analysis.
Learn MoreDesign Pattern Recovery from Malware Binaries Poster (SEI 2015 Research Review)
• Poster
By Sam Weber
This poster by Sam Weber illustrates three tools for static analysis.
DownloadAPI Usability and Security
• Presentation
By Sam Weber
This 2015 Research Review presentation describes an effort to develop and empirically test API design principles.
Learn MoreAPI Usability and Security Poster (SEI 2015 Research Review)
• Poster
By Sam Weber
This poster describes an effort to develop and empirically test API design principles.
DownloadVulnerability Discovery (2015)
• Presentation
By Edward J. Schwartz
A 2015 Research Review presentation on discovering vulnerabilities in software.
Learn MoreVulnerability Discovery Poster (SEI 2015 Research Review)
• Poster
By Edward J. Schwartz
A poster for the 2015 Research Review presentation on discovering vulnerabilities in software.
DownloadCybersecurity via Signaling Games
• Presentation
By William Casey
This presentation, delivered at Research Review 2015, discusses using signaling games in cybersecurity.
Learn MoreCyber Security via Signaling Games Poster (SEI 2015 Research Review)
• Poster
By William Casey
Looks at how we can establish trust, manage risk, and mitigate deceptive cyber-attacks when decision-making is constrained
Download