Monday May 1, 2006

Track 1

  • (I) Systems Engineering and Software Engineering Processes, Products, and People From a Standards Perspective (Subtitle: Stand on the Standards)
    • John Clark, Northrop Grumman Corp.

    Available Presentation Files:
    JC1244.pdf

  • (I) Why Is It That Every Time I Play Chess the Pieces Keep Getting In the Way?
    • Dr. Neal Mackertich, Raytheon Co.

    Available Presentation Files:
    NM1500.pdf

  • (I) Tackling Cost Challenges of System of Systems
    • Ms. Arlene F Minkiewicz, PRICE Systems, LLC

    Available Presentation Files:
    AM1299.pdf

  • (I) Validation's Role in Mission Assurance
    • Steven K Hall, Raytheon

    Available Presentation Files:
    SH1341.pdf

Track 2

  • (I) New Processes and Estimation Methods for Acquiring 21st Century Software-Intensive Systems of Systems (SISOS)
    • Dr. Barry Boehm,
    • Jo Ann Lane, USC Center for Systems and Software Engineering

    Available Presentation Files:
    BB1281.pdf

    Additional Material - BB1281notes.pdf

  • (I) Experiences With Disciplined Agility
    • Dr. Richard Turner, School of Systems and Enterprises, Stevens Institute of Technology

    Available Presentation Files:
    RT1302.pdf

  • (A) Lessons Learned Using Agile Methods on Large Defense Contracts
    • Paul E McMahon, PEM Systems

    Available Presentation Files:
    PM1264.pdf

    Additional Material - PM1264notes.pdf

  • (B) Requirements Management for Projects Utilizing Iterative Development Life-Cycle Models
    • R. Dennis Gibbs, Electronic Data Systems Corp.

    Available Presentation Files:
    DG1383.pdf

Track 3

  • (I) Naval Open Architecture Program
    • Mike Rice, PEO IWS

    Available Presentation Files:
    MR1564.pdf

  • (I) Naval OA Enterprise Standards Alignment
    • David Marlow, NSWC-DD

    Available Presentation Files:
    DM1565.pdf

  • (I) Naval Open Architecture: OA/FN Experimentation Initiative
    • Huong Q Pham, PEO IWS

    Available Presentation Files:
    HP1566.pdf

Track 4

  • (I) CMMI V1.2 – What is Changing?
    • Mike Phillips, SEI

    Available Presentation Files:
    MP1533.pdf

  • (I) Use of CMMI in Acquisition Organizations
    • Brian P Gallagher, SEI

    Available Presentation Files:
    BG1462.pdf

  • (I) Key Challenges and Important Solutions Facing IT Professionals
    • MG Richard Wirt, Intel Corp.

  • (I) Enterprise Software: Windfalls, Pitfalls, Pratfalls
    • Gary Wetterhall, PEO EIS

  • (B) Mapping SA CMM to CMMI-AM
    • Barbara K Hilden, Process Improvement for the 21st Century, Inc.

    Available Presentation Files:
    BH1477.pdf

  • (B) Transforming a Software Development Organization Into a Software Acquisition One: A Case Study in Success
    • Lynne Hamilton, DFSG-PNP
    • Ms. Patricia Oberndorf, SEI
    • Marie Sorrell, DFSG-PN

    Available Presentation Files:
    PO1405.pdf

Track 5

  • (I) Integrating Systems Engineering with Earned Value Management
    • Paul J Solomon, Performance-Based Earned Value®

    Available Presentation Files:
    PS1250.pdf

  • (I) NCES Program Overview
    • Jeffrey Morse , The MITRE Corp.

  • (I) NCES/SOAF
    • Dan Lewis , NCES

  • (I) DISA Assured Computing
    • Col James J Tschudy, DISA Computing Services

    Available Presentation Files:
    JT1575.pdf

Track 6

  • (I) How to Protect Critical Software Assets From Tampering and Reverse-Engineering
    • Eric D Bryant, Arxan Defense Systems
    • Richard Krinsky, Arxan Technologies, Inc.
    • Michael J Mehlberg, Arxan Technologies, Inc.
    • W.R. (Rob) Wroblewski, Arxan Research, Inc.

  • (I) Wireless Security for Mobile Technology

  • (I) CMMI Process Improvement: It’s Not a Technical Problem, It’s a People Problem!
    • Rolf W Reitzig, cognence, inc.

    Available Presentation Files:
    RR1593.pdf

  • (I) Your Data in Transit: Building Network Interoperability and Information Assurance Into Your Application’s Data Communications
    • David R Basel, Center for Network Services, GIG Combat Support Directorate
    • D. Cragin Shelton, The MITRE Corp.
    • SMSgt Josh Walker, AFCA/EVPI

    Available Presentation Files:
    CS1413.pdf

    Additional Material - DB1413.pdf

  • (B) The Next Generation Theater Geospatial Database: A PACOM & U.S. Army Pacific Geospatial Enterprise Solution
    • Dr. Eugene Bingue, US Navy

    Available Presentation Files:
    EB1504.pdf

Track 7

  • (I) Requirements Engineering Workshop: A Practical Approach to Modeling and Managing Requirements
    • Robert Bamford,
    • Bill Deibler, Software Systems Quality Consulting

  • (I) Smart Push, Smart Pull, Sensor to Shooter in a Multi-Level Secure/Safe (MLS) Infrastructure
    • Gordon M Uchenick, Coverity
    • W. Mark Vanfleet, National Security Agency

    Available Presentation Files:
    MV1301.pdf

  • (I) Requirements Engineering Workshop: A Practical Approach to Modeling and Managing Requirements
    • Robert Bamford,
    • Bill Deibler, Software Systems Quality Consulting

  • (I) Service–Oriented Architecture: Bringing Dynamic Agility to the Warfighter
    • Umesh Vemuri, BEA Systems, Inc.

    Available Presentation Files:
    UV1249.pdf

  • (B) Aegis Open Architecture - Transformation of a Naval Surface Combatant Weapon System
    • Frank Boyle, Lockheed Martin Maritime Systems and Sensors - Surface Systems

    Available Presentation Files:
    FB1338.pdf

  • (I) Aligning (not Integrating) Enterprise Architectures
    • David W Bailey, Enterprise Integration Inc.

    Available Presentation Files:
    BG1275.pdf

Tuesday May 2, 2006

Track 1

  • (I) Technical Planning
    • Col Warren M Anderson, OUSD (AT&L) Defense Systems

    Available Presentation Files:
    WA1586.pdf

  • (I) Interoperability - The Net Ready KPP
    • COL Brian P Hamilton , Joint Staff, J6

  • (I) Program Support: Perspectives and Systemic Issues
    • David R Castellano, OUSD (AT&L)

    Available Presentation Files:
    DC1541.pdf

  • (I) Navy Systems Engineering
    • Carl R Siel, Jr., ASN (RD&A)

Track 2

  • (I) DoD Software Assurance Strategy
    • Kristen J Baldwin, OUSD (AT&L)
    • Mitchell Komaroff, OASD (NII)

    Available Presentation Files:
    KB1557.pdf

  • (I) Software Assurance: DHS Strategic Initiative for Advancing the National Strategy to Secure Cyberspace
    • Joe Jarzombek, DHS National Cyber Security Division

  • (I) TBD

  • (I) Software Assurance Government/Industry Panel

Track 3

  • (I) Real Time Java
    • En-Kuang Lung, Raytheon Co.

  • (I) Bridging Between Real-Time Combat and Net-Centric Command & Control Systems
    • Michael Weisskopf, Raytheon Co.

  • (I) Integration of Software Safety Into the Systems Engineering Process - DD(X), A Case Study
    • Richard (Dick) Church, Raytheon Co.

    Available Presentation Files:
    DC1569.pdf

    Additional Material - RC1569.pdf

  • (I) Research for Advancing Software-Intensive Systems Productibility
    • Grady H Campbell, SEI
    • Robert A Gold, DDR&S/DUSD (S&T)

    Available Presentation Files:
    GC1588.pdf

    Additional Material - RG1588.pdf

Track 4

  • (I) How High Maturity Projects Fail
    • Dr. Rick Hefner, Northrop Grumman Corp.

    Available Presentation Files:
    RH1501.pdf

  • (I) Automating Measurement for CMMI® Compliance
    • Dr. Richard Hayden, pragma SYSTEMS Corp.

  • (A) The New Emerging Online Threat: The Insider – What You Don’t Know
    • Dan Miller, Vontu

    Available Presentation Files:
    KR1283.pdf

  • (I) Message Over the Medium: Communication Loops in the CMMI
    • Shawn P Presson, Apogen Technologies, Inc.

    Available Presentation Files:
    SP1433.pdf

    Additional Material - SP1433notes.pdf

  • (B) Internet Protocol Version 6 (IPv6) An Overview: What is it and Where is it Going
    • Edward A Kierman, CE-LCMC SEC

    Available Presentation Files:
    EK1594.pdf

Track 5

  • (I) JC2 Overview
    • MAJ Susan M Grosenheider, Defense Information Systems Agency

    Available Presentation Files:
    SG1576.pdf

  • (I) Behaving Badly: How to Stop Nasty Trojans From Stealing Your Customers
    • Matthew Williamson, Sana Security

  • (A) Performance-Based Earned Value
    • Paul J Solomon, Performance-Based Earned Value®

    Available Presentation Files:
    PS1243.pdf

  • (I) Implementation of Policy Requiring Systems Engineering Plans for Air Force Programs – Results and Implications
    • Kevin J Kemper, Air Force Materiel Command

    Available Presentation Files:
    KK1537.pdf

Track 6

  • (I) Evolutionary Acquisition and Spiral Development Revisited
    • Dr. Peter Hantos, The Aerospace Corporation

    Available Presentation Files:
    PH1256.pdf

  • (I) Acquisition Metrics: Creating Acquisition Insight Through Measurement
    • Richard Adams,
    • Suellen Eslinger, The Aerospace Corp.

    Available Presentation Files:
    SE1351.pdf

  • (I) Integrating Warfighter-Driven System of System Innovation Into the Acquisition Life-Cycle
    • James T Wessel, SEI
    • Ira A Monarch, Software Engineering Institute

    Available Presentation Files:
    IM1496.pdf

  • (I) Using System Archetypes to Identify Failure Patterns in Acquisition
    • Mr. William E. Novak, Software Engineering Institute
    • Diane L Gibson, SEI

    Available Presentation Files:
    DG1424.pdf

Track 7

  • (I) Using the SAE Architecture Analysis and Description Language (AADL) Standard in the Analysis and Development of Mission Critical Embedded Systems
    • Dr. Joyce L Tokar, Pyrrhus Software

    Available Presentation Files:
    JT1393.pdf

  • (I) What Question Are You Trying to Answer? Choosing the Right Architecture Products for an SE Effort.
    • Michael S Russell, Anteon Corp.

  • (A) Next Generation Air Transportation System (NGATS)—Lessons-Learned Applying DoDAF on Multi-Agency Architectures
    • John A Anderson, The MITRE Corp.

    Available Presentation Files:
    JA1443.pdf

  • (I) Using Ontologies to Harmonize Warfighter Data Exchanges
    • Michael J McMahon, CACI Technologies, Inc.

    Available Presentation Files:
    MM1274.pdf

Track 8

  • (I) Partitioning Communications System: Transparent High Robustness Security for CORBA, DDS, and Web Services
    • R. William Beckwith, Objective Interface Systems, Inc

Wednesday May 3, 2006

Track 1

  • (I) Air Force Vision for SE
    • Col Charles Bailey,

    Available Presentation Files:
    CB1551.pdf

  • (I) USAF Center for SE
    • Lt Col Brian Hermann, Air Force Center for Systems Engineering

    Available Presentation Files:
    BH1545.pdf

  • (I) Systems Engineering of Capabilities
    • Kristen J Baldwin, OUSD (AT&L)
    • Dr. Judith S Dahmann, The MITRE Corp.

    Available Presentation Files:
    KB1544.pdf

  • (I) Cyber Threat: What You Should Know
    • Donavan Lewis , DIA/CCO-5

    Available Presentation Files:
    DL1550.pdf

  • (I) CMMI for Acquisition
    • Kristen J Baldwin, OUSD (AT&L)

    Available Presentation Files:
    KB1549.pdf

Track 2

  • (I) Harmonization of Systems and Software Engineering Processes
    • James W Moore, The MITRE Corporation

    Available Presentation Files:
    JM1563.pdf

  • (I) Lessons Learned From the DHS/DoD Software Assurance Forum – Processes and Practices
    • Paul Croll, Computer Sciences Corp.

  • (I) Using IEEE Software Engineering Standards to Support America’s Army Gaming Development
    • Susan K. (Kathy) Land, The MITRE Corp.
    • MAJ Bret Wilson, Office of Economic & Manpower Analysis (OEMA), United States Military Academy

    Available Presentation Files:
    SL1562.pdf

  • (I) Standards Used and Needed for Modeling and Simulation
    • Dennis A Ludwig, ASC/XRA

    Available Presentation Files:
    DL1507.pdf

  • (I) Estimating and Managing the Risk of Software Size Growth
    • Daniel Galorath, Galorath Incorporated

  • (I) Security in a COTS-Based Software System
    • Ms. Arlene F Minkiewicz, PRICE Systems, LLC

    Available Presentation Files:
    AM1297.pdf

Track 3

  • (I) Independent Software Quality Assessment—Makes Dollars and Sense
    • Edward Dlugosz, C-E LCMC Software Engineering Center

    Available Presentation Files:
    ED1590.pdf

  • (I) Independent Software Quality Assessment—Tools and Case Studies
    • Edward Dlugosz, C-E LCMC Software Engineering Center

    Available Presentation Files:
    ED1591.pdf

  • (I) Top 10 Signs You're Ready (or Not) for an Appraisal
    • Gary Natwick, Harris Corporation

    Available Presentation Files:
    GN1257.pdf

  • (I) Sustaining High Maturity

  • (I) Avoiding Wasted Days and Wasted Nights - Automatically Tailoring Your Organization's Set of Standard Processes
    • Dr. Kenneth E Nidiffer, Systems and Software Consortium, Inc.

    Available Presentation Files:
    KN1263.pdf

  • (I) The Art of Supplier Management and Outsourcing – Managing Suppliers 'Outside' My Project’s Boundaries
    • Tim Kasse, Kasse Initiatives LLC

    Available Presentation Files:
    TK1523.pdf

Track 4

  • (I) Right Data, Right Warfighter, Right Time – Implications for Software and Systems
    • Ms. Patricia Oberndorf, SEI

    Available Presentation Files:
    DS1402.pdf

  • (I) Why Topology Is Important in a Network-Centric Battlespace
    • Josef Schaff, AMEWAS, Inc.

    Available Presentation Files:
    JS1428.pdf

  • (I) Net-Centric Readiness for DoD Critical Mission Execution
    • George (Chip) E Raymond, C-E LCMC
    • Debra C Tang, C-E LCMC

    Available Presentation Files:
    DT1334.pdf

    Additional Material - DT1334notes.pdf

  • (A) Net-Centric Conversations: The Unit of Work in the Enterprise
    • Harvey G Reed, The MITRE Corp.
    • Fred Stein, The MITRE Corp.

    Available Presentation Files:
    HR1386.pdf

  • (I) Enterprise Content Management Strategies for DoD
    • Patrick M Ryan, IBM Federal Software Group

    Available Presentation Files:
    PR1469.pdf

Track 5

  • (I) Best Practices for Software Management
    • Cheryl K Andrew, U.S. Government Accountability Office
    • Carol T Mebane, U.S. Government Accountability Office

    Available Presentation Files:
    CA1577.pdf

  • (I) Best Practices for Program Management
    • Cristina Chaplain, U.S. Government Accountability Office
    • Carol T Mebane, U.S. Government Accountability Office
    • Michael Sullivan, U.S. Government Accountability Office

    Available Presentation Files:
    CB1578.pdf

  • (I) Leadership, Communications, and Conflict
    • Dr. Randall W Jensen, STSC
    • Kasey Thompson, Software Technology Support Center

    Available Presentation Files:
    RJ1579.pdf

  • (I) Ask the Experts: Helping Organizations Transform...
    • Dan Bennett, STSC
    • Leslie Dupaix, STSC
    • Thayne Hill, STSC
    • Larry Smith, STSC
    • Jim Belford , STSC

  • (I) TBD

Track 6

  • (I) Challenges in Integrating Contractual and Technical Acquisition Practices
    • Dr. Barry Boehm,
    • Jo Ann Lane, USC Center for Systems and Software Engineering

    Available Presentation Files:
    BB1280.pdf

  • (I) Turning Portfolio Management Into Decisions
    • Elliot Chikofsky, Engineering Management & Integration

    Available Presentation Files:
    EC1439.pdf

  • (B) Autonomous Robot Swarms for Operations in Hazardous Environments
    • Daniel P Stormont, 520 SMXS/MXDEA

    Available Presentation Files:
    DS1456.pdf

  • (B) Minding the Store When the CMMI’s Your Neighbor (Why the CMMI Isn't Lean, and How You Can Still Be)
    • James M Sutton, Lockheed Martin Aero

  • (B) Toward a New Understanding of Interoperability – An Emergent Approach
    • Dr. David A Fisher, SEI

  • (I) Semantics of Security
    • Paul M Shaw, SPAWAR

    Available Presentation Files:
    PS1345.pdf

Track 7

  • (A) Commercial-Off-the-Shelf (COTS) Value Management and Lessons Learned: Intensive Combat Systems for U.S. Submarines
    • CAPT Gib Kerr, Germane Systems, LC

  • (I) What CMMI Can Learn From the PMBOK
    • Sandy Thrasher, Anteon Corp.
    • Wayne Sherer, ARDEC

    Available Presentation Files:
    WS1278.pdf

  • (I) Securing the Front Lines – Advancing the Security Uses of Biometrics for DoD
    • David Phares, Computer Sciences Corp.

  • (I) Measurement Estimation & Control: The Intelligence Behind Successful Software Projects
    • Lawrence H Putnam, QSM, Inc.

    Available Presentation Files:
    LP1247.pdf

    Additional Material - LP1247notes.pdf

  • (I) Getting the Most Out of Your Measurement Data: Approaches for Using Software Metrics
    • Linda J Esker, Fraunhofer Center Maryland
    • Kathleen C Dangle, Fraunhofer Center Maryland
    • Dr. David Zubrow, Software Engineering Institute

Thursday May 4, 2006

Track 1

  • (I) Transforming the Way DoD Manages Data
    • Dean M Carsello, OASD/NII

    Available Presentation Files:
    DC1592.pdf

  • (I) Army Systems Engineering
    • Richard Adams,
    • David Edmiston,

  • (I) Net Centric Operations
    • Jack Zavin , OASD (NII)

    Available Presentation Files:
    JZ1553.pdf

  • (I) Program Support: Perspectives and Systemic Issues

  • (I) TBD

  • (B) Bringing Standards to Software Source Code Security Assessment
    • Robert A Martin, The MITRE Corp.

    Available Presentation Files:
    RM1291.pdf

  • (I) Making Vulnerability Management Operational
    • Robert A Martin, The MITRE Corp.

    Available Presentation Files:
    RM1290.pdf

  • (I) TBD

Track 2

  • (I) Object-Oriented Technology and Safety Certification: A Language Comparison
    • Dr. Benjamin M Brosgol, AdaCore

    Available Presentation Files:
    BB1292.pdf

  • (I) Cost-Effective Verification and Validation of Modeling and Simulation
    • Dr. David A Cook, Stephen F. Austin State University

    Available Presentation Files:
    DC1252.pdf

  • (I) Application of DoD Architectural Framework to Generalized Software
    • Jeremy Asbill, Engineering and Software System Solutions, Inc.

    Available Presentation Files:
    JA1412.pdf

  • (I) The Merger of Imaging and Nanotechnology in Threat Reduction, Security, and Antiterrorism
    • R. Glenn Wright, GMA Industries, Inc.

  • (I) Software Size Inference Based on Data Structures
    • Lee Fischman, Galorath, Inc.

  • (I) Designing Effects-Based Operational Metrics for the Decision-Making Warfighter
    • Dr. Mary Ann Malloy, The MITRE Corp.

    Available Presentation Files:
    MM1470.pdf

Track 3

  • (I) Agents Everywhere: A Vision of the Future
    • Dr. Steven Hofmeyr , Sana Security

  • (I) Using TSPSM Principles to Plan and Track Process Improvement
    • Daniel M Roy, STPP, Inc.

  • (B) NAVAIR TSPSM Experiences Using the Excel Workbook and Team Dashboard
    • Bradley Hodgins, NAVAIRWARCENWPNDIV

    Available Presentation Files:
    BH1538.pdf

  • (I) Experiences Building Multi-Level Secure Web Services-Based Components for the GIG
    • Dr. Dylan J McNamee, Galois Connections, Inc.

  • (I) Government-Wide Process Improvement
    • Dr. Linda Ibrahim, Federal Aviation Administration

  • (I) Unintended Consequences of Presenting 'Objective' Data to Key Decision Makers
    • Glyn Davies, BAE Systems

    Available Presentation Files:
    GD1449.pdf

  • (B) What Makes an SEPG Effective?
    • Ron Radice, Software Technology Transition

  • (I) Using Multiple Independent Levels of Security to Meet Security and Safety Requirements in Cross Domain Solutions
    • W. Mark Vanfleet, National Security Agency
    • Gordon M Uchenick, Coverity

  • (I) Communication Skills for Engineers and Technical Professionals
    • Carol Dekkers, Quality Plus Technologies, Inc.

Track 4

  • (A) Programming Next Generation User Interfaces Using Windows Presentation Foundation
    • Marc Schweigert, Microsoft Federal Application Platform and Developer Team

    Available Presentation Files:
    MS1395.pdf

  • (A) Organizational Maturity: When Does it Ensure Program Performance?
    • Dr. Dennis R Goldenson, SEI

  • (A) Testing Critical Interfaces in a Net-Centric Enterprise
    • MAJ Bernie Koelsch, Joint Staff J2

  • (I) Network-Centric Operations: Defense and Transportation Synergy
    • Dr. Kenneth L Alford, Colonel, U.S. Army (Ret.), Brigham Young University

  • (B) Common Criteria Certification at Multi-EAL Levels: Can It Be Done?
    • Carol S Taylor, University of Idaho

    Available Presentation Files:
    CT1516.pdf

  • (I) Transforming Data Distribution to the Warfighter Through the Use of Service-Based Architecture (SBA) Technology
    • Randy Bell, General Dynamics
    • Bernardo F Perez, US Army - CERDEC SED

    Available Presentation Files:
    BP1347.pdf

Track 5

  • (I) Proper Preparation for an Appraisal
    • James T Belford, OO-ALC/ENS
    • Danny Bennett, STSC
    • Thayne Hill, STSC

  • (A) Patterns in System-of-Systems Interoperability
    • Dr. B. Craig Meyers, SEI
    • James Smith, II, SEI

    Available Presentation Files:
    JS1489.pdf

  • (I) Disruptive Innovation in Defense and Intelligence Technology
    • Dr. Rudy S Spraycar, TASC, Inc.

  • (I) Uniting Three Families of Risk Management-- Complexity of Implementation x 3
    • Dr. Thomas H Holzer, National Geospatial-Intelligence Agency

    Available Presentation Files:
    TH1319.pdf

  • (I) Transforming Business Processes in Support of the Warfighter
    • Liza Y Weissler, C-E LCMC

    Available Presentation Files:
    LW1272.pdf

  • (I) Code Coverage Analysis: Past Luxury, Future Security Requirement
    • Mr. Mark L Sadler, US Army

    Available Presentation Files:
    MS1587.pdf

Track 6

  • (I) The Domain-Specific Approach to High Assurance Development
    • Dr. Andrew Adams-Moran, Galois Connections, Inc.

    Available Presentation Files:
    AA1414.pdf

  • (I) Can You Trust Your Data: A Measurement System Diagnostic
    • Dr. David Zubrow, Software Engineering Institute

    Available Presentation Files:
    DZ1436.pdf

  • (I) Model-Based Development Using Visual Studio 2005 for Software Architects
    • Ken Garove, Microsoft Government

    Available Presentation Files:
    KG1583.pdf

  • (I) Programming Services-Oriented Applications Using Windows Communication Foundation
    • Marc Schweigert, Microsoft Federal Application Platform and Developer Team

    Available Presentation Files:
    MS1584.pdf

  • (I) Programming Workflow Applications Using Windows Workflow Foundation
    • David M Brown, Microsoft Corp.

    Available Presentation Files:
    DB1585.pdf

  • (I) How to Define Lean Processes and Procedures
    • Tim Olsen, Quality Improvement Consultants, Inc.

Track 7

  • (I) Army Simulation Program Balances Agile and Traditional Methods With Success
    • Doug Parsons, PEO Simulation Training and Instrumentation

    Available Presentation Files:
    DP1323.pdf

  • (I) Enabling Mission Assurance Through Predictive Defect Modeling
    • James B Stubbe, Raytheon Co.

    Available Presentation Files:
    JS1468.pdf

  • (B) Common Criteria and the Practicalities of High-Assurance Development
    • David Burke, Galois Connections, Inc.

    Available Presentation Files:
    DB1415.pdf

  • (B) Transformation – Journey from Concept to Reality
    • Dr. Mary A McCully, National Defense University

2013 Sponsors: IEEE and IEEE Computer Society