|
Monday, October 12, 2015
|
7:00 AM - 8:00 AM
|
Buffet Breakfast for Tutorial Participants
[International II]
|
|
8:00 AM - 9:45 AM
|
TBD
|
Managing Technical Debt for Software and Systems Projects
Dick Fairley
Mary Jane Willshire
|
Balancing Systems and Software Qualities
Barry Boehm
|
Practical Guide to Using SFIA
Matthew Burrows
|
9:45 AM - 10:15 AM
|
|
10:15 AM - 11:45 AM
|
TBD
|
(cont.)
Managing Technical Debt for Software and Systems Projects
Dick Fairley
Mary Jane Willshire
|
(cont.)
Balancing Systems and Software Qualities
Barry Boehm
|
(cont.)
Practical Guide to Using SFIA
Matthew Burrows
|
11:45 AM - 1:15 PM
|
Networking Lunch for Tutorial Participants
[International II]
|
|
1:15 PM - 3:00 PM
|
TBD
|
Systems Engineering for Software Engineers
Dick Fairley
Massood Towhidnejad
|
Secure data collection with the open source OpenDOF technology
Bryant Eastham
|
(cont.)
Practical Guide to Using SFIA
Matthew Burrows
|
3:00 PM - 3:30 PM
|
|
3:30 PM - 5:00 PM
|
TBD
|
(cont.)
Systems Engineering for Software Engineers
Dick Fairley
Massood Towhidnejad
|
(cont.)
Secure data collection with the open source OpenDOF technology
Bryant Eastham
|
(cont.)
Practical Guide to Using SFIA
Matthew Burrows
|
5:00 PM - 7:00 PM
|
Welcome Social
[Promenade]
|
|
Tuesday, October 13, 2015
|
7:00 AM - 8:00 AM
|
Breakfast
[International IV-V]
|
|
8:00 AM - 9:30 AM
|
|
9:30 AM - 10:00 AM
|
|
10:00 AM - 10:45 AM
|
Systems vs. Software Engineering skills – a Gap Analysis
David Cook
Eugene Bingue
|
Why Are Estimates Always Wrong: Estimation Bias and Strategic Misestimation
Dan Galorath
|
Informal Discussion and Networking..
|
Trust but Manage; Real-Life Lessons in Controlling Supply Chain Risk
John Haller
Matthew Butkovic
|
10:45 AM - 11:30 AM
|
Struggles at the Frontiers: Achieving Software Assurance for Software-Reliant Systems
Kenneth Nidiffer
|
Improving Productivity for Projects with High Turnover
Anandi Hira
|
Mobile Privacy: Analyzing Application Requested Permissions and Privacy Policies
Paige Selby
|
The Cyber Supply Chain: Strategies for Managing the Risks and Challenges
Russell Mattern
Michael Donohoe
|
11:30 AM - 1:15 PM
|
|
1:15 PM - 2:00 PM
|
Using Operational Risk Management to increase Systems Engineering Effectiveness
Brian Gallagher
Kenneth Nidiffer
|
Informal Discussion and Networking
|
Securing integrations in cloud, mobile and enterprise
Ashwani Singh
Vivek Varma
|
Do you have the right practices in your Cyber Supply Chain Tool Box?
Michele Moss
|
2:00 PM - 2:45 PM
|
Model-Driven Engineering - A Framework for Owning the Technical Baseline
David Campbell
Garrett Wampole
|
How does software maintainability vary by domain and programming language?
Celia Chen
Lin Shi
Kamonphop Srisopha
|
(cont.)
Informal Discussion and Networking..
|
Supply Chain Risk Management
Phydeli Binemon Bossala
|
2:45 PM - 3:15 PM
|
|
3:15 PM - 4:00 PM
|
Putting the Engineering back in Software Engineering
David Cook
Eugene Bingue
|
Achieving Better Buying Power through Acquisition of Open Architecture Software Systems for Web and Mobile Devices
Walt Scacchi
|
Connected Teams, Connected Code, and the Connected Device: The Complexities of IoT Development
Prathap Dendi
Anders Wallgren
|
Secure Coding Frameworks
Tim Kertis
|
4:00 PM - 4:45 PM
|
SFIA V6: Using Skills to leverage your biggest asset – People
Matthew Burrows
|
(cont.)
Informal Discussion and Networking
|
PERECO - Personalized Emergency Response Ecosystem
Satyanarayana Srinivas
Aditya Dalwani
Chiraag Sumanth
Arvind Srikantan
|
Finding and Fixing the Architectural Roots of Bugginess
Rick Kazman
|
Wednesday, October 14, 2015
|
8:00 AM - 9:30 AM
|
|
9:30 AM - 10:00 AM
|
|
10:00 AM - 10:45 AM
|
Real Life Risk Based Project Management for LEAN and Agile Development
David Clark
John Krumm
Avery Morris
Kelly Snodgrass
Sheryl Moen
|
Value Visualization Framework
Michael Harris
|
A Scorecard for Cyber Resilience: What We have Observed
Philip Scolieri
Robert Vrtis
|
A Real World Software Assurance Test Suite
Charles Oliveira
|
10:45 AM - 11:30 AM
|
EVM for Agile Projects
Jim Duffy
|
Learning in Rule-based Recommendation Systems
Arvind Hudli
Shrinidhi Hudli
|
Taking Apart Industry Jargon and Getting to the Root of Cybersecurity
John Kurdziel
Ben Collar
|
Informal Discussion and Networking.
|
11:30 AM - 1:15 PM
|
Networking Lunch
[International IV-V]
|
|
1:15 PM - 2:00 PM
|
Avoiding the Time Trap
Timothy Chick
|
Achieving Collaboration, Transferring Domain Expertise to Expert Systems
Gene Oates
John Sheppard
|
Lessons Learned for Implementing Affordable Cybersecurity within a Hosted Cloud Environment
Dan Kahn
|
Static Analysis Security Testing - Current state and future direction
Aravind Venkataraman
|
2:00 PM - 2:45 PM
|
Agile is a Quality Anti-Pattern
David Gelperin
|
A Framework to Maintain Data Relevance in a Data Lake.
Tejas Dharamsi
Satyanarayana Srinivas
Sadiur Rahman
Rupam Rai
|
Putting Security back into the Code: experiences in teaching secure coding
David Cook
Eugene Bingue
|
Hybrid Verification in SPARK 2014: Combining Formal Methods with Testing
Stephen Baird
|
2:45 PM - 3:15 PM
|
|
3:15 PM - 4:00 PM
|
The Technical Debt Metaphor: Principles, Practical Considerations, Tool Support, and Research Directions
Davide Falessi
|
A Data-Driven Approach to Analyze the Spatial and Temporal Variations in the Power Distribution Grid
Qiwei Zheng
Peng Xiao
|
Automatic Quantification and Minimization of Attack Surfaces
Borislava Simidchieva
Nathaniel Soule
Michael Atighetchi
Fusun Yaman
Ronald Watro
Joseph Loyall
David Last
David Myers
Capt. Bridget Flatley
|
Operational Control of Creative 3D Assembly Using Crisp and Fuzzy Rules
Sanguk Noh
|
4:00 PM - 4:45 PM
|
Collaboration between system stakeholders through Cucumber
Roger Jones
|
High-performance data search in systems with heterogeneous architectures. Software platform VAR.
Nikolay Vasilyev
|
The Other Guys | Vulnerability Research in Alternative Android Web Browsers
Benjamin Watson
|
(cont.)
Informal Discussion and Networking.
|
4:45 PM - 5:30 PM
|
|
5:30 PM - 8:00 PM
|
|
Thursday, October 15, 2015
|
7:00 AM - 8:00 AM
|
Buffet Breakfast
[International III]
|
|
8:00 AM - 8:45 AM
|
.Informal Discussion and Networking.
|
Increasing Market Share with Open Source Solutions
Marcus Edwards
|
Increase software security and safety by enabling C++ deterministic memory control
Thomas Bettens
|
SWECOM and SWECAT: Assessing Software Engineering Competencies
Dick Fairley
Massood Towhidnejad
|
8:45 AM - 9:30 AM
|
DevOps for Federal Acquisition
Richard Cagle
Tim Rice
Michael Kristan
|
Quantitative risk assessment for Open Source Software components integration
Celia Chen
Lin Shi
Kamonphop Srisopha
|
Benefits of Deploying Inherently Secure Nodes Within a Distributed System
Howard Reubenstein
Joseph Fahey
Gregory Sullivan
David Wittenberg
|
Better LATE than NEVER; educating the non-IT executives on THEIR cyber security responsibilities
Michael Donohoe
Russell Mattern
|
9:30 AM - 10:00 AM
|
|
10:00 AM - 11:30 AM
|
|