(.mil/.gov ONLY) Provides an assessment of the state-of-the-art in data embedding technology and its application to IA. It is particularly relevant to: information “providers” concerned about intellectual property protection and access control; information “consumers” who are concerned about the security and validation of critical information; and law enforcement, military, and corporate organizations concerned about efforts
CSIAC reports offer timely cutting-edge information to address the needs of our user community. CSIAC provides a variety of products developed by our subject matter experts (SMEs) in response to gap analyses and specific DoD stakeholder requirements related to our technical focus areas. Here you will find a variety of document types including State-Of-The-Art Reports (SOARs), technical study results, CSIAC Podcast papers, Quick-to-Community (QTC) reports, process documents, and guidelines. CSIAC's goal is to provide relevant products to meet your cybersecurity, software development, information management and modeling & simulation needs.
This report reviews the state of the art of Object-Oriented Database Management Systems (OODBMS). The objective of this report is to provide the reader with an understanding of the issues relevant to OODBMS technology and to describe where commercial products stand on these issues. A further objective is to describe the current state of commercial
Defect tracking is a critical component to a successful software quality effort. In fact, Robert Grady of Hewlett-Packard stated in 1996 that “software defect data is [the] most important available management information source for software process improvement decisions,” and that “ignoring defect data can lead to serious consequences for an organization’s business” [Grady96]. However, classifying
This State-of-the-Art-Report summarizes the history of software engineering technology transfer and suggests ways to help us understand how to shorten the time between innovation and effective practice. It begins by examining earlier efforts to understand software-related technology transfer. Then we discuss the process of creating, evaluating, packaging and diffusing technology. Next, this report considers each
Cost models were derived from the collection and analysis of large collections of project data. Modelers would fit a curve to the data and analyze those parameters that affected the curve. Early models applied to custom-developed software systems. New software development philosophies and technologies have emerged in the 1980s and 1990s to reduce development costs
This paper compares and contrasts the strengths and weaknesses of the Vienna Development Method (VDM) and Z in the software design life cycle phase, and compares and contrasts VDM and Z to other formal models. Tool support, lessons learned, and technical and achieved business benefits are emphasized. Based on available data, this paper analyzes the
This report summarizes basic interoperability principles and the different approaches that researchers have taken to provide Software Interoperability. In addition to surveying these methodologies, the report concludes with an outlook on the future of Software Interoperability and a novel means of integrating applications in an industrial environment.
This document describes software measurement activities conducted by Rome Laboratory (RL) from the early seventies to the present (measurement is a key element of the supporting technology required to implement a disciplined engineering approach to software development). This history is based mainly on the written record as reflected in RL Technical Reports, Data & Analysis
The purpose of this report is to provide baseline information about a selected set of metrics, specifically productivity, complexity, and reliability. It is not a comprehensive treatment of metrics; indeed, that subject is treated in a number of texts and DoD initiatives. Some of these initiatives include the Joint Logistics Commanders’ Practical Software Measurement (PSM)
This paper describes how the Data & Analysis Center for Software (DACS), which has since been consolidated into the Cyber Security and Information Systems Information Analysis Center (CSIAC), uses the World Wide Web and other Internet tools to acquire and disseminate scientific and technical information. Using the Internet enables us to acquire more data and