2,258 research outputs found

    System Qualities Ontology, Tradespace and Affordability (SQOTA) Project – Phase 4

    Get PDF
    This task was proposed and established as a result of a pair of 2012 workshops sponsored by the DoD Engineered Resilient Systems technology priority area and by the SERC. The workshops focused on how best to strengthen DoD’s capabilities in dealing with its systems’ non-functional requirements, often also called system qualities, properties, levels of service, and –ilities. The term –ilities was often used during the workshops, and became the title of the resulting SERC research task: “ilities Tradespace and Affordability Project (iTAP).” As the project progressed, the term “ilities” often became a source of confusion, as in “Do your results include considerations of safety, security, resilience, etc., which don’t have “ility” in their names?” Also, as our ontology, methods, processes, and tools became of interest across the DoD and across international and standards communities, we found that the term “System Qualities” was most often used. As a result, we are changing the name of the project to “System Qualities Ontology, Tradespace, and Affordability (SQOTA).” Some of this year’s university reports still refer to the project as “iTAP.”This material is based upon work supported, in whole or in part, by the U.S. Department of Defense through the Office of the Assistant of Defense for Research and Engineering (ASD(R&E)) under Contract HQ0034-13-D-0004.This material is based upon work supported, in whole or in part, by the U.S. Department of Defense through the Office of the Assistant of Defense for Research and Engineering (ASD(R&E)) under Contract HQ0034-13-D-0004

    High Dependability Computing Program: Evolving a Dependability Requirements Elicitation and Modeling Framework Based on Use

    Get PDF
    Correctly identifying and expressing dependability requirements for software systems has wide-ranging consequences for planning and conducting software development as well as for the final system success. Yet crucial difficulties exist, many stemming from the fact that definitions of “dependable” will vary not only from system to system, but will be perceived differently by different stakeholders of the same system. UMD is a requirements engineering framework for eliciting and modeling dependability requirements that has been devised, to mitigate such difficulties. In this report, we introduce UMD and describe an empirical study designed to shed some light on the feasibility of the ideas behind UMD and to identify which aspects of the framework could be improved, in the perspective that software technology transfer from research to industrial use should proceed iteratively and empirically. Subjects in the study consisted of 7 students in a graduate-level class. Empirical qualitative and quantitative results show that the UMD approach is feasible but also allowed us to identify important missing aspects, confirming our assumption that it was not yet mature enough for a rigorous industrial study. The contributions of this study have been twofold: Demonstrating the usefulness of the tech transfer approach which we have followed as well as the feasibility of the UMD approach

    Fundamental concepts in management research and ensuring research quality : focusing on case study method

    Get PDF
    This paper discusses fundamental concepts in management research and ensuring research quality. It was presented at the European Academy of Management annual conference in 2008

    -ilities Tradespace and Affordability Project – Phase 3

    Get PDF
    One of the key elements of the SERC’s research strategy is transforming the practice of systems engineering and associated management practices – “SE and Management Transformation (SEMT).” The Grand Challenge goal for SEMT is to transform the DoD community’s current systems engineering and management methods, processes, and tools (MPTs) and practices away from sequential, single stovepipe system, hardware-first, document-driven, point- solution, acquisition-oriented approaches; and toward concurrent, portfolio and enterprise- oriented, hardware-software-human engineered, model-driven, set-based, full life cycle approaches.This material is based upon work supported, in whole or in part, by the U.S. Department of Defense through the Office of the Assistant Secretary of Defense for Research and Engineering (ASD(R&E)) under Contract H98230-08- D-0171 (Task Order 0031, RT 046).This material is based upon work supported, in whole or in part, by the U.S. Department of Defense through the Office of the Assistant Secretary of Defense for Research and Engineering (ASD(R&E)) under Contract H98230-08- D-0171 (Task Order 0031, RT 046)

    Engineering secure systems: Models, patterns and empirical validation

    Get PDF
    Several development approaches have been proposed to handle the growing complexity of software system design. The most popular methods use models as the main artifacts to construct and maintain. The desired role of such models is to facilitate, systematize and standardize the construction of software-based systems. In our work, we propose a model-driven engineering (MDE) methodological approach associated with a pattern-based approach to support the development of secure software systems. We address the idea of using patterns to describe solutions for security as recurring security problems in specific design contexts and present a well-proven generic scheme for their solutions. The proposed approach is based on metamodeling and model transformation techniques to define patterns at different levels of abstraction and generate different representations according to the target domain concerns, respectively. Moreover, we describe an operational architecture for development tools to support the approach. Finally, an empirical evaluation of the proposed approach is presented through a practical application to a use case in the metrology domain with strong security requirements, which is followed by a description of a survey performed among domain experts to better understand their perceptions regarding our approach

    Hazard Contribution Modes of Machine Learning Components

    Get PDF
    Amongst the essential steps to be taken towards developing and deploying safe systems with embedded learning-enabled components (LECs) i.e., software components that use ma- chine learning (ML)are to analyze and understand the con- tribution of the constituent LECs to safety, and to assure that those contributions have been appropriately managed. This paper addresses both steps by, first, introducing the notion of hazard contribution modes (HCMs) a categorization of the ways in which the ML elements of LECs can contribute to hazardous system states; and, second, describing how argumentation patterns can capture the reasoning that can be used to assure HCM mitigation. Our framework is generic in the sense that the categories of HCMs developed i) can admit different learning schemes, i.e., supervised, unsupervised, and reinforcement learning, and ii) are not dependent on the type of system in which the LECs are embedded, i.e., both cyber and cyber-physical systems. One of the goals of this work is to serve a starting point for systematizing L analysis towards eventually automating it in a tool

    IT jigyo bun\u27ya ni okeru mondai purojekuto hassei boshi ni kansuru kenkyu

    Get PDF
    制度:新 ; 報告番号:甲3286号 ; 学位の種類:博士(工学) ; 授与年月日:2011/3/15 ; 早大学位記番号:新559

    Towards an Innovative Validation-Driven Approach to Lean Product Development

    Get PDF
    Many software products contain unnecessary functionality. Industrial reports show 45% of the features in analyzed software products are never used. \ Software-centric organizations have been trying to sustain their competitive advantage by re-defining their product development strategy. Recent attempts to re-strategize the product development process tend towards customer-centric approaches. We propose a validation-driven model based around proven lean principles, agile methods, and value-driven design. To increase the model’s likelihood of success, the study discusses suitable guidelines and deployment protocols that have been evolved in industrial settings.
    corecore