Carnegie Mellon University

Displaying 241-280 of 530 results

  • White Papers // Jan 2011

    Feasibility, Efficiency, and Effectiveness of Self-Optimizing Storage Systems

    Recent work has proposed making intelligent use of data access patterns for building self-optimizing storage systems. However, despite the continued increase in the CPU-I/O performance gap, such systems are far from wide adoption. The authors argue that the key reason for the lack of real systems adopting this novel idea...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Performance Analysis of IPSec and IKE for Mobile IP on Wireless Environments

    The Mobile IP protocol enables a node to change its point of attachment to an internet without changing its IP address. Mobile users are likely to take advantage of this protocol to obtain the services as if they were connected to their home network. In many cases these users will...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    A Protocol Family Approach to Survivable Storage Infrastructures

    A protocol family supports a variety of fault models with a single client-server protocol and a single server implementation. Protocol families shift the decision of which types of faults to tolerate from system design time to data creation time. With a protocol family based on a common survivable storage infrastructure,...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Optimal Pricing for Integrated-Services Networks With Guaranteed Quality of Service

    Integrating multiple services into a single network is becoming increasingly common in today's telecommunications industry. Driven by the emergence of new applications, many of these services will be offered with guaranteed quality of service. While there are extensive studies of the engineering problems of designing integrated services networks with guaranteed...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Mmdump: A Tool for Monitoring Internet Multimedia Traffic

    Internet multimedia traffic is increasing as applications like streaming media and packet telephony grow in popularity. It is important to monitor the volume and characteristics of this traffic, particularly because its behavior in the face of network congestion differs from that of the currently dominant TCP traffic. In order to...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense

    Today's Internet hosts are threatened by large scale Distributed Denial-of-Service (DDoS) attacks. The Path Identification (Pi) DDoS defense scheme has been recently proposed as a deterministic packet marking scheme that allows a DDoS victim to filter out attack packets on a per packet basis with high accuracy after only a...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Voice Over Sensor Networks

    Wireless sensor networks have traditionally focused on low duty-cycle applications where sensor data are reported periodically in the order of seconds or even longer. This is due to typically slow changes in physical variables, the need to keep node costs low and the goal of extending battery lifetime. However, there...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Early Experience With an Internet Broadcast System Based on Overlay Multicast

    In this paper, the authors report on experience in building and deploying an operational Internet broadcast system based on Overlay Multicast. In over a year, the system has been providing a cost-effective alternative for Internet broadcast, used by over 3600 users spread across multiple continents in home, academic and commercial...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    R-MAT: A Recursive Model for Graph Mining

    The goal of this paper was to create a simple, parsimonious graph model to describe real graphs. The R-MAT model is exactly a step in this direction: the authors illustrate experimentally that several, diverse real graphs can be well approximated by an R-MAT model with the appropriate choice of parameters....

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Efficient Security Mechanisms for Routing Protocols

    As the economy and critical infrastructure increasingly rely on the Internet, securing routing protocols becomes of critical importance. In this paper, the authors present four new mechanisms as tools for securing distance vector and path vector routing protocols. For securing distance vector protocols, the hash tree chain mechanism forces a...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Understanding Route Redistribution

    Route Redistribution (RR) has become an integral part of IP network design as the result of a growing need for disseminating certain routes across routing protocol boundaries. While RR is widely used and resembles BGP in several nontrivial aspects, surprisingly, the safety of RR has not been systematically studied by...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    On Static Reachability Analysis of IP Networks

    The primary purpose of a network is to provide reachability between applications running on end hosts. This paper describes how to compute the reachability a network provides from a snapshot of the configuration state from each of the routers. The primary contribution is the precise definition of the potential reachability...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Enforcing Context-Sensitive Policies in Collaborative Business Environments

    As enterprises seek to engage in increasingly rich and agile forms of collaboration, they are turning towards service-oriented architectures that enable them to selectively expose different levels of functionality to both existing and prospective business partners. This includes enforcing access control policies whose elements are tied to changing contractual relationships...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    On the Benefits of Work Stealing in Shared-Memory Multiprocessors

    Load balancing is one of the key techniques exploited to improve the performance of parallel programs. However, load balancing is a difficult task for the programmer. Work stealing is an architectural mechanism that provides improved performance by instantaneously balancing the load among processors in a multiprocessor system. In this work,...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    SAAR: A Shared Control Plane for Overlay Multicast

    Many cooperative overlay multicast systems of diverse designs have been implemented and deployed. In this paper, the authors explore a new architecture for overlay multicast: they factor out the control plane into a separate overlay that provides a single primitive: a configurable anycast for peer selection. This separation of control...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Self-Management in Chaotic Wireless Deployments

    Over the past few years, wireless networking technologies have made vast forays into the daily lives. Today, one can find 802.11 hardware and other personal wireless technology employed at homes, shopping malls, coffee shops and airports. Present-day wireless network deployments bear two important properties: they are unplanned, with most Access...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Automation Without Predictability Is a Recipe for Failure

    Automated management seems a must, as distributed systems and datacenters continue to grow in scale and complexity. But, automation of performance problem diagnosis and tuning relies upon predictability, which in turn relies upon low variance - most automation tools aren't effective when variance is regularly high. This paper argues that,...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    SCI-FI: Domain-Based Scalability, Control and Isolation for the Future Internet

    This paper presents the first Internet architecture designed for control and isolation. The authors of this paper propose to separate ASes into groups of independent routing sub-planes which then in-terconnect to form complete routes. The architecture, SCI-FI, provides superior resilience and security proper-ties as an intrinsic consequence of good design...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    On Adversary Models and Compositional Security

    The authors present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interfere with such systems. They describe logic-based methods to reason about security properties of a system as a composition of properties of its components,...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    CHIPPER: A Low-Complexity Bufferless Deflection Router

    As Chip Multi-Processors (CMPs) scale to tens or hundreds of nodes, the interconnect becomes a significant factor in cost, energy consumption and performance. Recent work has explored many design tradeoffs for Networks-on-Chip (NoCs) with novel router architectures to reduce hardware cost. In particular, recent work proposes bufferless deflection routing to...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    Cuckoo Directory: A Scalable Directory for Many-Core Systems

    Growing core counts have highlighted the need for scalable on-chip coherence mechanisms. The increase in the number of on-chip cores exposes the energy and area costs of scaling the directories. Duplicate-tag based directories require highly associative structures that grow with core count, precluding scalability due to prohibitive power consumption. Sparse...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    Thread Cluster Memory Scheduling: Exploiting Differences in Memory Access Behavior

    In a modern Chip Multi-Processor (CMP) system, memory is a shared resource among multiple concurrently executing threads. The memory scheduling algorithm should resolve memory contention by arbitrating memory access in such a way that competing threads progress at a relatively fast and even pace, resulting in high system throughput and...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    TIE: Principled Reverse Engineering of Types in Binary Programs

    A recurring problem in security is reverse engineering binary code to recover high-level language data abstractions and types. High-level programming languages have data abstractions such as buffers, structures, and local variables that all help programmers and program analyses reason about programs in a scalable manner. During compilation, these abstractions are...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    DTA++: Dynamic Taint Analysis With Targeted Control-Flow Propagation

    Dynamic Taint Analysis (DTA) is a powerful technique for, among other things, tracking the flow of sensitive information. However, it is vulnerable to false negative errors caused by implicit flows, situations in which tainted data values affect control flow, which in turn affects other data. The authors propose DTA++, an...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    A Taxonomy of Operational Cyber Security Risks

    This paper presents a taxonomy of operational cyber security risks that attempts to identify and organize the sources of operational cyber security risk into four classes: actions of people, systems and technology failures, failed internal processes, and external events. Each class is broken down into subclasses, which are described by...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    Adaptive Flow Control for Enabling Quality of Service in Tactical Ad Hoc Wireless Networks

    Many visions for the future involve pervasive computing technology that links people and devices together to solve complex problems. The Global Information Grid (GIG), for example, as well as the TeraGrid and the Smart Grid, are large-scale endeavors in which computing resources are increasingly interconnected by wired, high bandwidth networks....

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    Source Code Analysis Laboratory (SCALe) for Energy Delivery Systems

    The Source Code Analysis Laboratory (SCALe) is an operational capability that tests software applications for conformance to one of the CERT secure coding standards. CERT secure coding standards provide a detailed enumeration of coding errors that have resulted in vulnerabilities for commonly used software development languages. The SCALe team at...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    The CERT Approach to Cybersecurity Workforce Development

    For a cybersecurity workforce to be effective, its members must possess the knowledge, skills, and experience required to perform their job duties. Proficiency and relevance are key factors in determining the effectiveness of each of these components. Proficiency refers to how well someone understands a subject matter or can apply...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    Combining Architecture-Centric Engineering With the Team Software Process

    This paper contains a description of an architecture-centric life-cycle model that uses the Carnegie Mellon Software Engineering Institute's Architecture-Centric Engineering (ACE) methods embedded in a Team Software Process (TSP) framework and of the experience in piloting the approach in an actual development effort. Combining ACE and TSP provides an iterative...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2010

    An Experiment Towards Adaptive Quality of Service in Mobile Ad Hoc Wireless Networks

    In high criticality crisis scenarios, such as disaster management, mobile ad hoc wireless networks are quickly assembled in the field to support decision makers through situational awareness using messaging-, voice-, and video-based applications. These applications cannot afford the luxury of stalling or failing due to overwhelming bandwidth demand on these...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2010

    Sensor Selection for Event Detection in Wireless Sensor Networks

    The authors consider the problem of sensor selection for event detection in Wireless Sensor Networks (WSNs). They want to choose a subset of p out of n sensors that yields the best detection performance. As the sensor selection optimality criteria, they propose the Kullback-Leibler and Chernoff distances between the distributions...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2010

    A Comparative Usability Evaluation of Traditional Password Managers

    Proposed in response to the growing number of passwords users have to memorize, password managers allow to store one's credentials, either on a third-party server (online password manager), or on a portable device (portable password manager) such as a mobile phone or a USB key. In this paper, the authors...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2010

    Needed Foundations for Assuring the Desirable Behavior of Software-Reliant Systems

    Future trends and current limitations presage a need for interdisciplinary foundations for designing, constructing, maintaining, adapting, and rapidly deploying software-reliant systems with assured system capabilities at all scales. In general, the ability to rapidly develop and field software-reliant capability is deficient. Part of this deficiency can be attributed to business...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2010

    QMAS: Querying, Mining and Summarization of Multi-Modal Databases

    Given a large collection of images, very few of which have labels given a priori, how can the authors automatically assign the labels of the remaining majority, and make suggestion for images that may need brand new labels distinct from existing ones? Popular automatic labeling techniques usually scale super linearly...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2010

    CMMI for Development, Version 1.3

    CMMI (Capability Maturity Model Integration) models are collections of best practices that help organizations to improve their processes. These models are developed by product teams with members from industry, government, and the Software Engineering Institute (SEI). This model, called CMMI for Development (CMMI-DEV), provides a comprehensive integrated set of guidelines...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2010

    Performance Analysis of WS-Security Mechanisms in SOAP-Based Web Services

    Identity Management (IdM) solutions in web services environments are often compared on the levels of performance and security they provide. Selecting the appropriate IdM solution for a given system or application often requires making tradeoffs between security and performance, while also considering the system's contextual and environmental requirements and constraints....

    Provided By Carnegie Mellon University

  • White Papers // Nov 2010

    A Workshop on Analysis and Evaluation of Enterprise Architectures

    This paper summarizes a workshop on analysis and evaluation of enterprise architectures that was held at the Carnegie Mellon Software Engineering Institute (SEI). The SEI invited accomplished practitioners from government and industry to discuss key issues in analyzing and evaluating enterprise architectures. After several opening talks by individuals who presented...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2010

    Panel Discussion of the Master of Science in Information Technology-Software Engineering Management

    In today's complex and changing world, the interdependence of business and technology is prevalent throughout all government, non-profit, and commercial sectors. The Master of Science in Information Technology - Software Engineering Management (MSIT-SEM) degree program prepares professionals to manage within this dynamic environment.

    Provided By Carnegie Mellon University

  • Podcasts // Nov 2010

    Virtual Integration Demonstration

    In this podcast, the speaker going to show how an approach called virtual integration has been applied to the development of systems in the aerospace industry. Virtual integration enables architecture-centric system development practice that is model-based, component-based, and proof-based. This approach has been shown to support the early validation of...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Energy-Aware Partitioned Fixed-Priority Scheduling for Multi-Core Processors

    Energy management is becoming an increasingly important problem in application domains ranging from embedded devices to data centers. In many such systems, multi-core processors are projected as a promising technology to achieve improved performance with a lower power envelope. Managing the application power consumption under timing constraints poses significant challenges...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2009

    Engineering Robust Next-Generation Networks

    Next-Generation Networks (NGNs) employ the Internet Protocol (IP) over a wide variety of packet-switching technologies, which often lack in fault resilience enabling features. An overlay MPLS infrastructure with its fast-reroute mechanisms can be deployed to overcome such an issue. Addressing NGNs robust to single link and node failures, an offline...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2009

    CHARQ: Cooperative Hybrid ARQ for Wireless Video Streaming

    Forward Error Correction (FEC) coding and Automatic Repeat reQuest (ARQ) are two commonly used techniques to tackle packet erasures in wireless video streaming. To preserve flexibility while reducing end-to-end latency, Hybird ARQ (HARQ) has been proposed as an alternative that combines the advantages of FEC and ARQ. This paper presents...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2009

    Classification-Based Relay Selection for Video Streaming Over Wireless Multihop Networks

    Real-time streaming of audiovisual content over wireless networks is emerging as an important technology in multimedia communication. In this paper, the authors present a classification-based method to select appropriate relays in support of their prior work on Time-aware Opportunistic Relaying for video streaming over wireless mesh networks. The proposed scheme...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Towards Secure Multi-Path Routing for Wireless Mobile Ad-Hoc Networks: A Cross-Layer Strategy

    Multi-path routing establishes multiple paths between a source and destination node in a network. This helps in achieving reliability in Mobile Ad-hoc NETworks (MANETs). To achieve efficient, secure and reliable multi-path routing for MANETs, the authors propose a routing mechanism that uses cross-layer strategies. The cross-layer strategy involves incorporating feedback...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Digital Filter Design for Jamming Mitigation in 802.15.4 Communication

    Jamming attackers can dramatically increase attack efficiency and stealth by randomly or periodically cycling the jamming transmission on and off, attacks respectively known as random and periodic jamming. In this paper, the authors analyze the impact of such attacks on the IEEE 802.15.4 communication protocol, commonly used in wireless sensor...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Anubis: An Attestation Protocol for Distributed Context-Aware Applications

    Sharing sensitive context information among multiple distributed components in mobile environments introduces major security concerns. The distributed sensing, processing and actuating components of these applications can be compromised and modified or impersonated to extract private and confidential information or to inject false information. In this paper, the authors present the...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2010

    Improving Anti-Jamming Capability and Increasing Jamming Impact With Mobility Control

    The impact of a jamming attack on wireless communication depends on a number of physical characteristics and network protocol parameters. In particular, it depends on the relative geometries of the adversarial network of jammers and the network under attack. Hence, changes in network geometry achieved through node and jammer mobility...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2011

    Social-Based Trust Mechanisms in Mobile Opportunistic Networks

    The fundamental challenge in opportunistic networking, regardless of the application, is enabling node cooperation to forward a message. While node cooperation is considered as a fundamental property in such networks, ensuring such a property between two devices in mobile opportunistic networks remains largely unexplored. In this paper, the authors investigate...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2011

    FOG: Fairness in Mobile Opportunistic Networking

    The fundamental challenge in opportunistic networking, regardless of the application, is when and how to forward a message. Rank-based forwarding techniques currently represent one of the most promising methods for addressing this message forwarding challenge. While these techniques have demonstrated great efficiency in performance, they do not address the rising...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    SCION: Scalability, Control, and Isolation on Next-Generation Networks

    The authors present the first Internet architecture designed to provide route control, failure isolation, and explicit trust information for end-to-end communications. SCION separates ASes into groups of independent routing sub-planes, called trust domains, which then interconnect to form complete routes. Trust domains provide natural isolation of routing failures and human...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2011

    Predicting Handoffs in 3G Networks

    Cellular data networks have recently seen an explosion in their usage due to the widespread deployment of 3G technologies and the rapid proliferation of smartphones. People are increasingly using their smartphones on the go and expect always-on, high quality connectivity at all times. A key network primitive that enables continuous...

    Provided By Carnegie Mellon University

  • Webcasts // Mar 2011

    Empower Your Smart Grid Transformation

    Around the globe, progressive utilities see the inevitability of adopting a smart grid that uses digital technology to modernize the power grid. More than meters and mobility, the smart grid represents a whole new framework for improved management of electricity generation, transmission and distribution. Embarking on a smart grid journey...

    Provided By Carnegie Mellon University

  • Webcasts // Mar 2010

    Emerging Technologies for Software-Reliant Systems

    Software-reliant Systems of Systems (SoS) now tend to be highly distributed software systems, formed from constituent software systems that are operated and managed by different organizations. These SoS are moving from a directed management structure (in which constituent systems are integrated and built for a specific purpose) to a virtual...

    Provided By Carnegie Mellon University

  • Webcasts // Feb 2011

    Architectural Knowledge Management: Decision Guidance in Service-Oriented Architecture Design

    Architectural decisions are design decisions that are hard to make and costly to change. Hence, mature software engineering and architecture design methods emphasize the importance of architectural decision making and capturing. However, inhibitors such as a lack of immediate benefits often prevent decisions from being captured.

    Provided By Carnegie Mellon University

  • Webcasts // Jan 2011

    Capability Maturity Model Integration V1.3 and Architecture-Centric Engineering

    Architecture modeling is an established practice for the realization of high-quality software. A significant change to the CMMI V1.3 models is the new emphasis on the role of architecture in the design process. This webinar will address the basics of architecture-centric engineering, and where and how these practices are now...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2010

    Panel Discussion of the Master of Science in Information Technology-Software Engineering Management

    In today's complex and changing world, the interdependence of business and technology is prevalent throughout all government, non-profit, and commercial sectors. The Master of Science in Information Technology - Software Engineering Management (MSIT-SEM) degree program prepares professionals to manage within this dynamic environment.

    Provided By Carnegie Mellon University

  • Webcasts // Oct 2010

    Improving Customer Satisfaction: A People CMM Perspective

    Every year organizations in the service industry spend the same amount of money trying to replace one lost customer as they do trying to keep five existing ones. However, many of these organizations focus little time, attention, or money on developing their workforce who are a key contributor to customer...

    Provided By Carnegie Mellon University

  • Webcasts // Oct 2010

    Securing Information in the Health-Care Industry: Network Security, Incident Management, and Insider Threat

    Many experts in the health-care industry believe that the key success factor in reducing health-care costs, while at the same time improving quality, is the availability of useful medical information. In fact, the Health Information Technology for Economic Clinical Health Act (HITECH), a component of the American Recovery and Reinvestment...

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2010

    The Next Generation of Process Evolution

    To thrive in today's economy, organizations need high-performance software engineering practices that reduce costs and improve productivity. The challenge is to implement practices that lead to consistent, cost-effective performance while demonstrating rapid benefits and paybacks.

    Provided By Carnegie Mellon University

  • Webcasts // Jul 2010

    Software Architecture Fundamentals: Technical, Business, and Social Influences

    In this webcast, the presenter will attend to these questions by discussing the nature of software architecture in terms of architectural structures, the role that software architecture plays in an organization, the technical, business, and social influences on software architectures, and the role of quality attribute requirements in architectural design.

    Provided By Carnegie Mellon University

  • Webcasts // Jun 2010

    Securing Global Software Supply Chains

    The increasingly global nature of software development has raised concerns that global supply chains could be compromised, allowing malicious code to be inserted into a delivered software product during development, or enabling a compromised product to be substituted during delivery or installation. However, the intentional exploitation of software vulnerabilities inadvertently...

    Provided By Carnegie Mellon University

  • Webcasts // May 2010

    Engineering Improvement in Software Assurance: A Landscape Framework

    Many organizations are associated with producing, using, or funding technologies, practices, and policies purported to address assurance a justified level of confidence that systems (and systems of systems) will function as intended within their operational environment. Understanding the value these solutions provide to assurance is often indirect and unclear.

    Provided By Carnegie Mellon University

  • Webcasts // Apr 2011

    Agile Development & Software Architecture - Crossing the Great Divide

    Agile development and software architecture are frequently seen as two divergent schools of thought or "Camps". Agile developers often refer to architecture as Big Design Upfront (BDUF) and may regard the architect's major output as merely shelf-ware. Proponents of architecture-centric software development may see Agilists as undisciplined or short-sighted, engaged...

    Provided By Carnegie Mellon University

  • Webcasts // Jan 2010

    SoS Architecture Evaluation and Quality Attribute Specification

    A System of Systems (SoS) can experience costly rework, schedule overruns, and the failure to achieve performance goals-from problems that surface late in the development life cycle or after the SoS is in operation. One prominent reason for these severe integration and operational problems is inconsistency, ambiguity, and omission in...

    Provided By Carnegie Mellon University

  • Webcasts // Sep 2009

    How to Effectively Evaluate Software Architecture and Identify Risks

    Software architecture is critical for business success. Think about it. Solid architecture prevents defects and system failures. It saves money and gets quality products to the market faster. Most software-reliant systems are required to be modifiable and reliable. They may also need to be secure, interoperable, and portable.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2009

    Secure Coding

    It is a frequent yet unintended mistake among software developers. In copying a string in memory, they unwittingly create a vulnerability that can be used to execute malicious code by an attacker. The malicious code may be used to spread a worm, or insert a back door on a machine,...

    Provided By Carnegie Mellon University

  • Webcasts // Jun 2009

    A Practical Approach for Managing Risk

    Although most programs and organizations implement some type of risk management approach, preventable failures continue to occur. Many of these approaches tend to be bureaucratic and time-intensive, which can consume valuable program resources. Most programs would benefit by improving, or in some cases replacing, their current risk management practices.

    Provided By Carnegie Mellon University

  • Webcasts // May 2009

    SQUARE Up Your Security Requirements Engineering with SQUARE

    It is well recognized in industry that requirements engineering is critical to the success of any major development project. Security requirements, if they are specified at all, tend to be developed independently of the rest of the requirements engineering activity.

    Provided By Carnegie Mellon University

  • Webcasts // Mar 2009

    SMART: Analyzing the Feasibility of Migrating Legacy Systems to SOA Environments

    Service-Oriented Architecture (SOA) has become an increasingly popular mechanism for achieving interoperability between systems. Because it has characteristics of loose coupling, published interfaces, and a standard communication model, SOA enables existing legacy systems to expose their functionality as services, presumably without making significant changes to the legacy systems. Migration of...

    Provided By Carnegie Mellon University

  • Webcasts // Mar 2009

    Method Framework for Engineering System Architectures

    To be successful, every system needs a good architecture and that requires the use of a good architecture engineering method. However, systems vary greatly in size, complexity, criticality, domain, operational dependence on other systems, the technology used and its diversity, requirements volatility, required quality characteristics and attributes, and volatility of...

    Provided By Carnegie Mellon University

  • Webcasts // Feb 2009

    Recursion and Iteration of CMMI Project Management Practices

    Recursion occurs when a process is applied to successive levels within a structure. When the presenter talks about engineering practices in CMMI, they expect recursion (e.g., requirements must be managed for the product, product component, subcomponents, etc). Although not directly stated in the model, the same expectation should be made...

    Provided By Carnegie Mellon University

  • Webcasts // Jan 2009

    Exploring Enterprise, System of Systems, and System and Software Architectures

    As systems grow in complexity in today's software-intensive world, architecture's role becomes crucial at enterprise, system, and software levels. The theme of the SATURN 2009 conference is "Architecture at all scales" exploring the boundary between software, systems, and enterprise architectures. The theme highlights the growing importance of architecture in driving...

    Provided By Carnegie Mellon University

  • Webcasts // Dec 2008

    Identifying Program Risks

    It doesn't matter what guide or model one are using for one program's risk management process CMMI RSKM, the Risk Management Guide for DoD Acquisitions, PMI PMBoK, or some other if one don't identify the right risks, everything else one do in risk management is just a waste of time...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2008

    Using the Team Software Process to Improve Performance

    Most process improvement initiatives fail. What makes the Team Software Process (TSP) different? In this web cast, Tim explains what TSP is and how it can relate to CMMI. He will show quantitative results he and others have seen through the use of TSP. Tim will also discuss the people...

    Provided By Carnegie Mellon University

  • Webcasts // Oct 2009

    The Survivability Analysis Framework (SAF)

    This webinar was developed to address the following research questions: How can mission survivability be maintained as interoperability of systems increases? How can operational impacts (such as information security) are tied to technology changes in operational mission execution.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2010

    Transforming Your Operational Resilience Management Capabilities: CERT's Resilience Management Model

    Organizations can't plan for every disruption. They need to be able to handle stressors in their risk environment at a moment's notice and with a predictable level of performance. Resilience management is a process that helps organizations establish, improve, and sustain the maturity of their operational resilience management system and...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2009

    Computational Processes and Incompleteness

    The authors introduce a formal definition of Wolfram's notion of computational process based on cellular automata, a physics-like model of computation. There is a natural classification of these processes into decidable, intermediate and complete. It is shown that in the context of standard finite injury priority arguments one cannot establish...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2009

    Weight Optimization for Consensus Algorithms With Correlated Switching Topology

    The authors design the weights in consensus algorithms with spatially correlated random topologies. These arise with: Networks with spatially correlated random link failures and networks with randomized averaging protocols. They show that the weight optimization problem is convex for both symmetric and asymmetric random graphs. With symmetric random networks, they...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Self-Tuned Remote Execution for Pervasive Computing

    Pervasive computing creates environments saturated with computing and communication capability, yet gracefully integrated with human users. Remote execution has a natural role to play in such environments, since it lets applications simultaneously leverage the mobility of small devices and the greater resources of large devices. In this paper, the authors...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2011

    Diagnosing Performance Changes by Comparing Request Flows

    The causes of performance changes in a distributed system often elude even its developers. This paper develops a new technique for gaining insight into such changes: comparing request flows from two executions (e.g., of two system versions or time periods). Building on end-to-end request-flow tracing within and across components, algorithms...

    Provided By Carnegie Mellon University