This report specifies the principles and high-level concepts used to differentiate Capabilities engineering (CE) from other types of engineering by combining elements of two different perspectives corresponding to the...
详细信息
ISBN:
(纸本)1563478935
This report specifies the principles and high-level concepts used to differentiate Capabilities engineering (CE) from other types of engineering by combining elements of two different perspectives corresponding to the demand (operational) and supply (institutional) sides of the Army. A Capability engineering Framework (CEF) to align and reconcile these perspectives is prototyped on a real-world example - the Warfighter Mission Area Integrated Working Group. Issues and future objectives for CEF adoption are also outlined. CE is concerned with the formulation and development of capabilities into high-quality joint solutions across multiple organizations and disciplines meeting warfighter needs with acquisition incisiveness and efficiency. It is committed to being capabilities and qualities driven in a military arms market that is a bilateral monopoly. It is also committed to being integrated with management processes whose aim is for capabilities to be delivered on time, within budget and according to policy. CE takes a holistic approach to developing and qualifying systems across the capabilities life cycle involving combat, material and product developers in mutual interaction. The CEF guides the incorporation of systems and softwareengineering know-how as five enabling dimensions of CE termed: virtual organization, cross-organizational processes, ontology of quality attributes, capability evaluation and learning organization.
Disaster management information system are essential for handling emergencies and saving lives through swift responses and coordination. This study aims to analyse and design an efficient backend technology for such a...
详细信息
Usability Testing is the extent to which a product can be used by a particular user to achieve a defined target with effectiveness, efficiency and achieve satisfaction of use in a particular context. 5 Criteria posses...
详细信息
This paper describes the research performed jointly by the Pennsylvania State University Nuclear engineering Department and Toden software Incorporation to evaluate the effect of employed neutronics model on coupled t...
详细信息
Determining whether arbitrary files are related to known malicious files is often useful in network and host-based defense. Doing so can give network defenders sufficient exemplars of a particular threat to develop co...
详细信息
ISBN:
(纸本)9781457713750
Determining whether arbitrary files are related to known malicious files is often useful in network and host-based defense. Doing so can give network defenders sufficient exemplars of a particular threat to develop comprehensive signatures and heuristics for identifying the threat, leading to decreased response time and improved prevention of a cyber attack. Identifying these malicious families is a complex process involving the categorization of potentially malicious code into sets that share similar features, while being distinguishable from unrelated threats or non-malicious code. Current methods for automatically or manually describing malware families are typically unable to distinguish between indicators derived from the structure of the malware and indicators derived from the behavior of the malware. Further, attempts to cluster potentially related files by mapping them into alternate domains, including histograms, fuzzy hashes, Bloom filters, and so on often produces clusters of files solely derived from structural information. These similarity measurements are often very effective on crudely similar files, yet they fail to identify files that have similar or identical behavior and semantics. We propose an analytic method, driven largely by human experience and based on objective criteria, for assigning arbitrary files membership in a malicious code family. We describe a process for iteratively refining the criteria used to select a malicious code family, until such criteria described are both necessary and sufficient to distinguish a particular malicious code family. We contrast this process with similar processes, such as antivirus signature generation and automatic and blind classification methods. We formalize this process to describe a roadmap for practitioners of malicious code analysis and to highlight opportunities for improvement and automation of both the process and the observation of relevant criteria. Finally, we provide experimental results of
An insertion is a specific type of the structural variations. The identification of insertions in a human genome is essential for the study of diseases or their functional effects. There are many tools available for i...
详细信息
作者:
EICHMANN, DRepository Based Software
Engineering Program Research Institute for Computing and Information Science University of Houston-Clear Lake 2700 Bay Area Boulevard Houston TX 77058 USA
As the Web continues to evolve, the sophistication of the programs that are employed in interacting with it will also increase in sophistication. Web agents, programs acting autonomously on some task, are already pres...
详细信息
As the Web continues to evolve, the sophistication of the programs that are employed in interacting with it will also increase in sophistication. Web agents, programs acting autonomously on some task, are already present in the form of spiders. Agents offer substantial benefits and hazards, and because of this, their development must involve not only attention to technical details, but also the ethical concerns relating to their resulting impact. These ethical concerns will differ for agents employed in the creation of a service and agents acting on behalf of a specific individual. An ethic is proposed that addresses both of these perspectives. The proposal is predicated on the assumption that agents are a reality on the Web, and that there are no reasonable means of preventing their proliferation.
engineering students, like other students, have different learning styles. Many techniques have been developed in the classroom setting to address these differences, and these approaches have been well documented. One...
详细信息
As part of the requirement for ABET accreditation, an engineeringprogram is expected to have a curriculum culminating in a major design experience, commonly referred to as either a "senior design" or a &quo...
详细信息
暂无评论