Monday April 23, 2012

Track 1

  • (A) Integrate Systems Engineering with Earned Value Management
    • Paul J Solomon, Performance-Based Earned Value®

    Available Presentation Files:
    2917PaulSolomon.pdf

  • (I) Object-Oriented Programming for High-Integrity Systems: Pitfalls and How to Avoid Them
    • Dr. Benjamin Brosgol, AdaCore

    Available Presentation Files:
    2984BenjaminBrosgol.pdf

Track 2

  • (B) Agile Software and Systems Engineering: Interactive Workshop
    • Dr. Suzette S Johnson, Northrop Grumman Corp.

    Available Presentation Files:
    2955SuzetteJohnson.pdf

  • (I) Adapting to Change…Mapping a Transition Approach
    • Dr. Suzette S Johnson, Northrop Grumman Corp.

    Available Presentation Files:
    2956SuzetteJohnson.pdf

  • (I) Opportunities for New Acquisition Practices: 804 Responses
    • Mary Ann Lapham, SEI
    • Suzanne M Miller, SEI

    Available Presentation Files:
    2985SuzanneMiller.pdf

Track 3

  • (B) Cybersecurity Fundamentals: What You Must Know
    • Diane G Miller, Northrop Grumman Corp.
    • Dr. Clayton Pullins, Northrop Grumman Corp.

  • (I) Broadening the Ability to Train and Launch Effective Engineering and Service Teams
    • Jeffrey H Schwalb, Naval Air Warfare Center
    • Bradley T Hodgins, NAVAIRWARCENWPNDIV

    Available Presentation Files:
    2954JeffreySchwalb.pdf

  • (I) Engineering a Common Operating Environment for the U.S. Army
    • David Emery, DSCI

    Available Presentation Files:
    2921JoyceTokar.pdf

Track 4

  • (I) Good Design Brings Your Vision to Life!
    • Dr. David A Cook, Stephen F. Austin State University
    • Dr. Joe Hanson, Northrop Grumman Corp.
    • Joe Thiessens, ITT Exelis

    Available Presentation Files:
    2959JoeHanson.pdf

  • (I) How I Learned to Stop Worrying and Love Status Presentations
    • John H Robb, Lockheed Martin Aeronautics

    Available Presentation Files:
    2923JohnRobb.pdf

  • (I) Leading Change Without Authority
    • Michael J Sturgeon, Northrop Grumman Information Systems

    Available Presentation Files:
    2934MichaelSturgeon.pdf

Tuesday April 24, 2012

Track 1

  • (B) Cloud Issues for Leadership & Technologists: Deciding Which IT Systems Should Migrate to Cloud
    • Allan Mink, SRA International

    Available Presentation Files:
    2900AllanMink.pdf

  • (B) Security in the Cloud - Now and Around the Corner
    • Dr. Eugene Bingue, U.S. Navy
    • Dr. David A Cook, Stephen F. Austin State University

    Available Presentation Files:
    2951EugeneBingue.pdf

  • (B) Cloud Computing - Concepts and Cost Considerations
    • Arlene F Minkiewicz, PRICE Systems, LLC

    Available Presentation Files:
    2929ArleneMinkiewicz.pdf

  • (I) Integrating Automation Systems and Enterprise IT in the Cloud
    • Steven Drager, Air Force Research Lab
    • William McKeever, Air Force Research Lab
    • Dr. Nary Subramanian, University of Texas at Tyler
    • Dr. Janusz Zalewski, Florida Gulf Coast University

    Available Presentation Files:
    2980StevenDrager.pdf

  • (I) Empowering Edge Users through Mobile Cloud Computing
    • Darryl Nelson, Raytheon Co.

    Available Presentation Files:
    2977DarrylNelson.pdf

Track 2

  • (B) The New Agile Systems Engineering: Meeting the Challenges of Functionality, Security, and Austerity
    • Dr. Bassam Farroha, DoD

    Available Presentation Files:
    2988BassamFarroha.pdf

  • (I) Agile Development and Architecture: Understanding Scale and Risk
    • Robert L Nord, SEI
    • Ipek Ozkaya, SEI

    Available Presentation Files:
    2915RobertNord.pdf

  • (I) Extreme Agile Development: How to Create a 3D LIDAR Tool on Thin Client to Remote Users Using Standard Web Browser in Two Weeks
    • Phong X Ngo, SAIC

    Available Presentation Files:
    2941PhongNgo.pdf

    Additional Material - 2941PhongNgo_a.mp4

  • (I) Using Agile Surveillance Points Instead of Milestone Reviews
    • Dick Carlson, Boeing Space and Intelligence Systems
    • Philip J Matuzic, Boeing Space and Intelligence Systems

    Available Presentation Files:
    2993DickCarlson.pdf

Track 3

  • (B) What is this System Really Suppose to do?
    • Leslie Dupaix, STSC

    Available Presentation Files:
    3021LeslieDupaix.pdf

  • (B) Software Assurance v. Security Compliance: Why is Compliance Not Enough?
    • Dr. Carol Woody, SEI

    Available Presentation Files:
    2998CarolWoody.pdf

  • (B) Multi-Perspective Application Security Risk Analysis: A Toolbox Approach
    • Sean Barnum, The MITRE Corp.

  • (B) Risk Analysis and Measurement with CWRAF
    • Joe Jarzombek, DHS National Cyber Security Division
    • Robert A Martin, The MITRE Corp.

    Available Presentation Files:
    3016JoeJarzombek.pdf

  • (B) Standards and Guidance for Engineering Secure Systems
    • Paul R Croll, CSC

    Available Presentation Files:
    3017PaulCroll.pdf

Track 4

  • (I) From Stasis to Urgency to Delivery
    • Judy Bamberger, Process Solutions

    Available Presentation Files:
    2911JudyBamberger.pdf

  • (B) Exoskeletons, Robots and System Software: Tools for the Warfighter
    • Nicole Cho, National Defense University
    • Paul H Flanagan, National Defense University
    • Andrew Gravatt, National Defense University College
    • Dr. Russell Mattern, National Defense University College

    Available Presentation Files:
    2968PaulFlanagan.pdf

  • (I) Expectations and Responsibilities: High Quality Teams Delivering High Quality Products
    • Judy Bamberger, Process Solutions

    Available Presentation Files:
    2910JudyBamberger.pdf

  • (I) Android-Based Secure Smartphone Implementation using Commercial & DoD Technology
    • Richard Takahashi, ITT Exelis

    Available Presentation Files:
    3018RichardTakahashi.pdf

  • (I) Sustainable Software - Pay Now or Pay Later!
    • Arlene F Minkiewicz, PRICE Systems, LLC

    Available Presentation Files:
    2928ArleneMinkiewicz.pdf

Wednesday April 25, 2012

Track 1

  • (I) Critical Code: Software Producibility for Defense
    • Dr. William L Scherlis, Carnegie Mellon University

    Available Presentation Files:
    2973WilliamScherlis.pdf

  • (B) It Takes an Ecosystem
    • Dr. Gary J Chastek, SEI

  • (I) Leading Arms Race 2.0
    • David P Taylor, TSA

    Available Presentation Files:
    2991DavidTaylor.pdf

  • (I) The Information Paradox – Why Does Simplicity Cause So Much Complexity?
    • Rob Armstrong, Teradata Corp.

    Available Presentation Files:
    2936RobArmstrong.pdf

  • (I) Service-Oriented Architecture in Embedded Multi-Processor Systems
    • David E Richmond, L-3 Communications

    Available Presentation Files:
    2925DavidRichmond.pdf

  • (B) Just Right Vehicle Network (Data Bus) Protocols
    • Christopher B Mushenski, U.S. Army

Track 2

  • (I) The Army Game Studio's Agile Process: A Retrospective
    • Jay R Olive, Software Engineering Directorate

    Available Presentation Files:
    2952JayOlive.pdf

  • (B) Gamification: Enhancing Software Using Video-Game Techniques
    • Paul H Flanagan, National Defense University
    • Andrew Gravatt, National Defense University College
    • Dr. Russell Mattern, National Defense University College

    Available Presentation Files:
    2964PaulFlanagan.pdf

  • (B) Applying Systems Engineering Principles Towards Developing Defence Capabilities
    • Corné J Smith, Council for Scientific and Industrial Research (CSIR)

    Available Presentation Files:
    3024CornéSmith.pdf

  • (I) Systems Engineering in a Cloud: Retiree Knowledge Capture and Consumption Optimization
    • Kenneth R Shelby , Lockheed Martin’s Space Systems Company

    Available Presentation Files:
    3025KennethShelby.pdf

  • (I) Security Systems Engineering: Towards a Harmonised Taxonomy
    • Dr. Michael J Ryan, University of New South Wales

    Available Presentation Files:
    3022MichaelRyan.pdf

  • (I) Improving Systems Engineering Effectiveness using Kanban-based Scheduling and a Service-oriented Approach
    • Dr. Richard Turner, School of Systems and Enterprises, Stevens Institute of Technology

    Available Presentation Files:
    3026RichardTurner.pdf

Track 3

  • (B) Are You Ready For a Disaster? The Road to Physical Security
    • Dr. David A Cook, Stephen F. Austin State University

    Available Presentation Files:
    2957DavidCook.pdf

  • (A) Engineering a Trustworthy Software System Using the NFR Approach
    • Steven Drager, Air Force Research Lab
    • William McKeever, Air Force Research Lab
    • Dr. Nary Subramanian, University of Texas at Tyler

    Available Presentation Files:
    2947StevenDrager.pdf

  • (I) Information Assurance in the Time of Cyber
    • Dr. Ron Mraz, Owl Computing Technologies, Inc.

    Available Presentation Files:
    2901RonMraz.pdf

  • (A) Cyber Hardening Weapons Systems
    • Ellen M Story, E Maria Enterprises, LLC
    • Dr. Ben Calloni, Lockheed Martin Aeronautics
    • W. Mark Vanfleet, NSA

    Available Presentation Files:
    2927W. MarkVanfleet.pdf

  • (I) Securing Android for the Battle Space
    • Karen Perry, Wind River Systems
    • Tim D Skutt, Wind River

    Available Presentation Files:
    2961KarenPerry.pdf

  • (I) Anticipating and Preventing Cyber Physical Project Failures and Overruns with Performance Engineering
    • Dr. Connie U Smith, L&S Computer Technology, Inc.
    • Amy C Spellmann, Optimal Innovations

    Available Presentation Files:
    2972ConnieSmith.pdf

Track 4

  • (I) Technology & Acquisition Advances Enabling a More Responsive IT/Cyber Acquisition Environment
    • Dr. Kenneth E Nidiffer, SEI

    Available Presentation Files:
    2935KennethNidiffer.pdf

  • (I) Government Beta – The Value of Unscripted Software Testing
    • Greg Dawson, LinQuest Corp.
    • Jonathan Haulund, U.S. Air Force, Space and Missile Center
    • Rocky Khullar, The Aerospace Corp.

    Available Presentation Files:
    2983JonathanHaulund.pdf

  • (I) Software Maintenance and Sustaining Engineering - Measuring the Key Factors that Impact Project and Enterprise Performance
    • John McGarry, U.S. Army Armament Research Development and Engineering Center (ARDEC)
    • Dr. Robert N Charette, Itahbi Corp.
    • Cheryl Jones, U.S. Army

  • (B) Modernizing Tomahawk on the Cheap
    • Robin J Ross, NSWCDD

    Available Presentation Files:
    2969RobinRoss.pdf

  • (I) Reuse and Acquisition of Software Intensive Systems
    • Milton B Smith, CECOM Software Engineering Center
    • Neil P Patterson, Chief Fires Software Engineering Division, CECOM

    Available Presentation Files:
    2903NeilPatterson.pdf

  • (I) Do You Know the Difference Between Process Life Cycle and Life Cycle Process?
    • Dr. Peter Hantos, The Aerospace Corp.

    Available Presentation Files:
    2938PeterHantos.pdf

Thursday April 26, 2012

Track 1

  • (B) Three Quality Journeys - CMMI, Baldrige, and ISO 9000
    • Charlene C Gross, SEI
    • Jon L Gross, SEI

    Available Presentation Files:
    2940CharleneGross.pdf

  • (I) A Tool Set for a Generation of Failure Modes and Effects Analyses from AADL Models
    • Myron Hecht, The Aerospace Corp.

    Available Presentation Files:
    2919MyronHecht.pdf

  • (B) Software Engineering Improvement at NASA: Past, Present, & Future
    • Robert T Crumbley, NASA

    Available Presentation Files:
    2932JohnKelly.pdf

  • (I) Improved Mapping and Modeling of Domain Architectures
    • Benton Bovee, Patterndigm

    Available Presentation Files:
    2933BentonBovee.pdf

Track 2

  • (B) What Code Do You Trust – Static Code Analysis for Software Assurance in the Acquisition Life Cycle
    • Paul R Croll, CSC

    Available Presentation Files:
    3023PaulCroll.pdf

  • (I) A Systems Engineering Body of Knowledge for Software Intensive Systems
    • Dr. Richard E Fairley, Software and Systems Engineering Associates (S2EA)

    Available Presentation Files:
    3013RichardFairley.pdf

  • (A) Principles of System Verification and Validation (V&V), Software V&V, and Hardware V&V
    • Dr. Edward A Addy, Northrop Grumman
    • Kenneth Costello, NASA
    • David H Daniel, Independent Consultant
    • Roger U Fujii, IEEE

    Available Presentation Files:
    3019DavidDaniel.pdf

  • (B) Software Sustainability – Challenges for Acquisition, Engineering, and Capability Delivery in the Face of the Growing Cyber Threat
    • Paul R Croll, CSC

    Available Presentation Files:
    3020PaulCroll.pdf

Track 3

  • (A) Evaluation of Intel Multi-Core Architectures for High Assurance Systems
    • Dr. Jim Alves-Foss, University of Idaho

  • (I) Assessing Security as a System Property via Simulation and Measurement
    • Steven Drager, Air Force Research Lab
    • Dr. Andrew J Kornecki, Embry-Riddle Aeronautical University
    • William McKeever, Air Force Research Lab
    • Dr. Janusz Zalewski, Florida Gulf Coast University

    Available Presentation Files:
    2962StevenDrager.pdf

  • (I) Insider Predictive Analysis Knowledge System
    • Thomas D Bracewell, Concurrent Technologies Corp.

    Available Presentation Files:
    2922ThomasBracewell.pdf

Track 4

  • (I) A Highly Successful Cancelled Project
    • David L Jolley, 309 SMXG

    Available Presentation Files:
    2930DavidJolley.pdf

  • (I) Where Do Early Phase Systems Engineering and Contractor Interests Meet?
    • Dr. Wayne P O'Brien, Raytheon Co.

    Available Presentation Files:
    2967WayneO'Brien.pdf

  • (I) Be Careful What You Pay For: Applying the Fundamentals of Quality to Software Acquisition
    • Rick Spiewak, The MITRE Corp.

    Available Presentation Files:
    2898RickSpiewak.pdf

  • (B) An Overview of the SEI QUELCE Cost Estimation Method
    • Robert W Stoddard, SEI

2013 Sponsors: IEEE and IEEE Computer Society