Scenario Technology for Planning C2 Exercises
|
|
|
- Dwight Booth
- 9 years ago
- Views:
Transcription
1 Scenario Technology for Planning C2 Exercises Carla Burns Air Force Research Laboratory 525 Brooks Rd Rome NY (315) Abstract Over the years, military exercises have proven to increase our country s effectiveness in actual missions. However, the exercise planning process is a time consuming activity that can span anywhere from months to years. Scenarios are often used during C2 exercise planning and execution to portray training tasks in the context of real-world situations. Exercise scenarios typically originate as a few high level paragraphs or pages of textual and/or graphical information and evolve into very detailed events as the exercise planning process progresses. The development of a detailed scenario to support an exercise is a time consuming process that often accounts for a large portion of the exercise planning cycle. Thus, there is a need for technology that enhances the exercise planning process by shortening the amount of time it takes to create and validate detailed exercise scenarios against training tasks and available resources. This paper discusses the capabilities of the Air Defense Exercise Planning Tool (ADEPT). The goal of the ADEPT technology is to shorten the exercise planning cycle by providing automated scenario development, analysis and generation capabilities. In addition, the paper addresses current limitations of existing scenario technology, the results of small pilot project and future capabilities for ADEPT. 1. Introduction As we move into the 21 st century, modern warfare will embody improved intelligence and command and control usage by joint forces. Joint Vision 2010 is a document that provides a conceptual framework for how United States forces will leverage technological opportunities to achieve new levels of effectiveness in joint warfighting [Joint Chiefs of Staff, 1998]. Joint Vision 2010 states that continued mission rehearsal and training are critical to meeting future military objectives. Over the years, evaluated training whether it be in the form of simulation, full blown exercises, or joint coalition training have increased our effectiveness. This training must be sustained to allow our forces to be ready for the diverse types of missions they will encounter in the 21 st century. At the same time, 21 st century forces will strive to dynamically plan and execute missions with fewer personnel over a shorter duration. Thus, there is a need for technology that enhances the exercise planning process by shortening its planning cycle via automated exercise development, analysis and generation capabilities.
2 2. Scenarios and Their Role in the Exercise Planning Process Exercise planning cycles can span anywhere from months to years. The joint exercise planning process begins by determining the tasks the forces will train against given task priorities and available resources. These essential tasks are referred to as the Joint Mission Essential Task List (JMETL) [Joint Chief of Staff, 1995]. The assigned mission, its plan, and joint doctrine are among the factors considered when developing the JMETL. Scenarios are often used during the planning and execution of exercises to portray the JMETL tasks in the context of a real-world situation. In addition, scenarios explore the various options for given situations and scope the training based on the exercise resources available. Exercise scenarios typically originate as a few high level paragraphs or pages of textual and/or graphical information and evolve into very detailed events as the exercise planning process progresses. Such detailed scenarios are often referred to as the Master Sequence of Events List (MSEL). A MSEL provides a specific event(s) at a given time in the exercise along with other informative data. A typical exercise often contains hundreds or thousands of MSELs. The development of such detailed scenarios or MSELs to support an exercise is a time consuming process that often accounts for a large portion of the exercise planning cycle. Figure 1 provides a graphical depiction of how scenarios evolve during the exercise planning process. January 1999 Korean Scenario High Level Scenario 1-2 paragraph/ page scenarios Exercise Planning Cycle January 2000 Available Resources Doctrine MASTER SEQUENCE EVENTS LIST TIME EVENT MASTER SEQUENCE EVENTS LIST 0600 ACTIVITY 1 TIME EVENT MASTER SEQUENCE 0615 EVENTS ACTIVITY LIST ACTIVITY 1 TIME0630 EVENT ACTIVITY 3 MASTER SEQUENCE 0615 EVENTS ACTIVITY LIST ACTIVITY ACTIVITY 1 6 TIME EVENT ACTIVITY... 3 MASTER SEQUENCE 0615 EVENTS ACTIVITY LIST ACTIVITY ACTIVITY 1 6 TIME EVENT ACTIVITY... 3 MASTER SEQUENCE 0615 EVENTS ACTIVITY LIST ACTIVITY ACTIVITY 1 6 TIME EVENT ACTIVITY ACTIVITY ACTIVITY ACTIVITY... ACTIVITY ACTIVITY ACTIVITY ACTIVITY ACTIVITY Detailed Scenario Exploit operational exercise/simulation objectives Figure 1. Scenario Evolution During the Exercise Planning Process.
3 3.0 Current Technology Limitations There are several limitations with existing technology that is used to construct detailed scenarios or MSELs that impact the efficiency of the exercise planning process. First, current MSEL tools provide non-graphical, clumsy user interfaces to input the massive amounts of data required for an exercise. Second, tools often fail to provide mechanisms for reusing detailed scenarios or MSELs and their components. It is often the case that exercises utilize the same types of events or MSELs over and over but vary the data instances to support different circumstances. Examples of event types include a terrorist attack, an unknown track entering airspace, or a security incident. Third, the tools fail to provide traceability from exercise goals to events in the detailed scenarios or MSELs. This capability allows one to more easily identify which training tasks are not covered in the scenario prior to exercise execution or simulation. Large, joint exercises could greatly benefit from such traceability mechanisms. Finally, other than checking for invalid inputs or spelling, today s technology fails to provide automated MSEL analysis or generation capabilities. 4.0 The Air Defense Exercise Planning Tool (ADEPT) Air Force Research Laboratory (AFRL) has developed technology to support detailed scenario or MSEL development that is aimed at shortening the exercise planning cycle. The Air Defense Exercise Planning Tool (ADEPT) prototype provides a drag and drop, mixed media approach for MSEL construction. It supports case-based MSEL development by providing facilities for reusing existing MSEL components to construct new exercises and enhance existing ones. Traceability from scenario events to joint doctrine is supported. The ultimate goal of the AFRL scenario program is unification of the exercise planning products to support automated analysis and generation of skeleton scenarios or MSELs. An underlying scenario representation model is the key aspect of the approach to meeting these objectives. ADEPT is compatible with the Joint Exercise Management Program (JEMP) MSEL construction tool. The ADEPT software runs on a PC/NT or Windows platform and leverages the COTS Microsoft Office product. 4.1 MSEL Construction Using ADEPT An illustrative exercise example containing numerous MSELs captured in ADEPT is depicted in Figure 2. The ADEPT screen is comprised of two primary regions. The left region provides a listing of available events for potential use in an exercise. The right area represents an actual exercise where events are specified to occur at a given time for a specified duration Defining Available Exercise Events Exercise events are created using one of three options. Users may import events or MSELs from either the JEMP tool or other ADEPT exercises. An import exercise operation places the entire contents of the import file into the exercise events list and the exercise workspace. Thus, the MSEL events become part of the actual exercise and contain all of the associated event data that the user can then tailor to meet his/her needs. Figure 3 illustrates all of the event data imported into an exercise for a message event that indicates a C-130 has crashed and requires assistance.
4 Figure 2. An Exercise Represented in ADEPT. Exercise events can also be made available by extracting them from a library. Contrary to the import exercise operation, importing an event from a library places the event and its associated data in the exercise event list NOT in the actual exercise workspace. The user makes events part of an exercise by selecting them from the available event list and dragging them over into the Exercise Workspace. Events in the list that are not part of the exercise are colored coded for the user. Finally, exercise events can be created from scratch. ADEPT classifies all events as one of three types: tracks, messages and message sequences. Track events represent aircraft events. Message events are used for communication activities. Message sequences are normal patterns of messages that typically occur in a given situation. An example of a message sequence would be an equipment failure. The sequence of messages would indicate that a piece of equipment has failed, provide an estimated time for when it might become operational, and notify when the equipment has been fixed.
5 4.1.2 Populating an Exercise Figure 3. Event Data Imported into an Exercise. Exercises are built and/or enhanced using the available exercise event list whereby events can be directly imported into an exercise, selected and moved over into the workspace or defined from scratch. An exercise timeline that reflects the length of the exercise is displayed across the top of the exercise workspace. Specific times for exercise events can be defined and modified simply by moving an event to the desired location on the timeline. Zoom in and zoom out capabilities are provided to better support viewing data on the timeline. In addition, a big picture exercise view that contains all of the exercise events is supported. The ADEPT exercise workspace also provides consistent timeline and table views of exercise data as illustrated in Figure 2. Thus, the user has the choice of using graphical and/or tabular means to build exercises. One of the drawbacks of current record-based MSEL tools used to capture exercise events is that they fail to provide organizational structures to support filtered views of exercise data. For example, users may wish to organize an exercise around all of the events affiliated with a geographical location, mission function or J group. The ADEPT tool provides logical grouping mechanisms called categories to support the grouping of events. Figure 4 portrays an exercise that partitions events based on the geographic locations of Langley Air Force Base, Hurlburt Field, and Fort Drum as indicated on the left side of the screen. Such logical grouping mechanisms can greatly assist the management of large, joint exercises to help insure that everyone involved knows who is working on what exercise event with whom, when in the exercise.
6 Figure 4. Illustration of Event Grouping Mechanisms in ADEPT. 4.2 Relating Exercise Events to Doctrine Another useful tool for planning large, joint exercises is that of providing traceability from mission objectives (JMETL) to those events in the detailed scenarios (MSELs) which satisfy them. This allows one to more easily determine which training tasks in the JMETL are not covered in the exercise scenario prior to the exercise execution or simulation. In addition, one can more readily keep track of tasks that have and have not been trained against over time. Figure 5 illustrates how ADEPT graphically supports the mapping of exercise events to the Joint Mission Essential Tasks. The program s approach of coalescing the exercise planning products (e.g. JMETL, MSEL, Joint Lessons Learned (JULL)) also provides the underlying data framework for automated exercise analysis capabilities. Such analysis capabilities could include the discovery of unmet training objectives based on their absence from detailed scenarios and the identification of timing conflicts within a scenario.
7 5.0 Scenario Representation Model Figure 5 Relating Exercise Events to Doctrine using ADEPT. The ultimate goal of the AFRL scenario program is unification of the exercise planning products to support automated analysis and generation of skeleton scenarios or MSELs. An underlying scenario reference model serves as the heart of the ADEPT tool to support these goals. The scenario reference model merges concepts from three prevalent scenario methods: the Use Case as defined by Jacobsen [Jacobsen, 1992]; a Task Script as defined by Graham [Graham, 1995]; and the Scenario Schematic as defined by Potts [Potts, 1995]. Figure 6 provides a graphical depiction of the scenario reference model that defines the objects and attributes used to represent scenario information in ADEPT. It is important to note that one may still individually capture any of the three methods identified above in the scenario reference model. Each detailed scenario in ADEPT is related to goals or objectives and other scenarios. Components in the model represent entities such as scenario context, initial conditions, measurement attributes, roles and actors, importance criteria, and clarification data items. There is also the capability to relate objects in the model to data dictionaries or conceptual models that ensure the objects are defined within a given domain. A set of Java classes and a relational database schema has been created to represent the semantics of the model. The underlying scenario reference model has been applied across the following domains to validate the relationships within the model and address scalability: exercise planning, modeling & simulation, computer based training, and systems engineering.
8 Problem Domain Space Qualifier Domain Importance Goal Issues Role Event Qualifier Measure Scenario Sub Goal Actor Context Body Initial Condition Paragraph Clarification Data Statement Obstacle Constraints Actor Action Object Acted On Time Usage 6.0 Results of ADEPT Pilot Project Figure 6. The Scenario Reference Model. A small pilot project was conducted using the ADEPT prototype. The application focused on a Northeast Defense Sector (NEADS) portion of a NORAD scenario. It is estimated that NEADS use of ADEPT on the same NORAD scenario would result in a productivity improvement factor of eight over the use of their existing MSEL technology. The MSEL reuse and graphical definition capabilities of ADEPT serve as the basis for the results. 7.0 Future ADEPT Capabilities The ADEPT prototype currently helps reduce the exercise planning process by shortening the amount of time it takes to generate detailed exercise scenarios or MSELs using a graphical and case-based approach to MSEL development. Future work will incorporate automated analysis and generation techniques by leveraging the exercise data represented in the underlying scenario reference model. Several additional capabilities have been identified for ADEPT based on working with end users. Among them include multi-user collaboration capabilities, integration of map facilities, linkage to simulation tools and big screen, dual monitor support for working with large exercises.
9 8.0 Acknowledgements The ADEPT prototype was developed by Modus Operandi, Inc. for Air Force Research Laboratory under Contract Number F C The author would especially like to thank Tony Stirtzinger and Lee Krause for their hard work and contributions to the ADEPT project. In addition, many thanks to all of the end users AFRL felt very fortunate to work with including MSgt Lyle Seelbach and others from the Northeast Air Defense Sector (NEADS), Herb Bruse and the 505th Exercise Support Squadron and Maj Andy Butler of the 152 nd Air Control Group. 9.0 References [Jacobsen, 1992] Jacobsen, Ivor. Object-Oriented Engineering. Addison-Wesley, New York, [Joint Chiefs of Staff, 1998] Joint Chiefs of Staff. D.C., Joint Vision 2010, Pentagon, Washington [Joint Chief of Staff, 1995] Joint Chiefs of Staff. Joint Mission Essential Task List (JMETL) Development Handbook. Pentagon, Washington D.C. December [Graham, 1995] Graham, Ian. Task Scripts, Use Cases and Scenarios with Object-Oriented Analysis. Object Oriented Systems 3, [Potts, 1995] Potts, Colin. Using Schematic Scenarios to Understand User Needs. Symposium on Designing Interactive Systems: Processes, Practices, Methods and Techniques, August 1995.
UML TUTORIALS THE USE CASE MODEL
UML TUTORIALS THE USE CASE MODEL www.sparxsystems.com.au Sparx Systems 2004 Page 1/5 describes the proposed functionality of the new system. A Use Case represents a discrete unit of interaction between
System Development and Life-Cycle Management (SDLCM) Methodology. Approval CISSCO Program Director
System Development and Life-Cycle Management (SDLCM) Methodology Subject Type Standard Approval CISSCO Program Director A. PURPOSE This standard specifies content and format requirements for a Physical
Architecture Centric Development in Software Product Lines
Architecture Centric Development in Software Product Lines Aurangzeb Khan DCE, College of E & ME National University of Science and Technology (NUST), Pakistan Farooque Azam DCE, College of E & ME National
Analysis of the Specifics for a Business Rules Engine Based Projects
Analysis of the Specifics for a Business Rules Engine Based Projects By Dmitri Ilkaev and Dan Meenan Introduction In recent years business rules engines (BRE) have become a key component in almost every
Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects
Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects Abstract: Build a model to investigate system and discovering relations that connect variables in a database
Enterprise Integration: operational models of business processes and workflow systems *
Enterprise Integration: operational models of business processes and workflow systems. 1 Enterprise Integration: operational models of business processes and workflow systems * G.Bruno 1, C.Reyneri 2 and
Rose/Architect: a tool to visualize architecture
Published in the Proceedings of the 32 nd Annual Hawaii International Conference on Systems Sciences (HICSS 99) Rose/Architect: a tool to visualize architecture Alexander Egyed University of Southern California
Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I Systems Integration
Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I s Integration Dr. Timothy D. Kehoe, Irene Chang, Dave Czulada, Howard Kong, Dr. Dino Konstantopoulos
Software Engineering. Software Processes. Based on Software Engineering, 7 th Edition by Ian Sommerville
Software Engineering Software Processes Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To introduce software process models To describe three generic process models and when
Network Mission Assurance
Network Mission Assurance Michael F. Junod, Patrick A. Muckelbauer, PhD, Todd C. Hughes, PhD, Julius M. Etzl, and James E. Denny Lockheed Martin Advanced Technology Laboratories Camden, NJ 08102 {mjunod,pmuckelb,thughes,jetzl,jdenny}@atl.lmco.com
Federated, Generic Configuration Management for Engineering Data
Federated, Generic Configuration Management for Engineering Data Dr. Rainer Romatka Boeing GPDIS_2013.ppt 1 Presentation Outline I Summary Introduction Configuration Management Overview CM System Requirements
Total Exploration & Production: Field Monitoring Case Study
Total Exploration & Production: Field Monitoring Case Study 1 Summary TOTAL S.A. is a word-class energy producer and provider, actually part of the super majors, i.e. the worldwide independent oil companies.
ORACLE OLAP. Oracle OLAP is embedded in the Oracle Database kernel and runs in the same database process
ORACLE OLAP KEY FEATURES AND BENEFITS FAST ANSWERS TO TOUGH QUESTIONS EASILY KEY FEATURES & BENEFITS World class analytic engine Superior query performance Simple SQL access to advanced analytics Enhanced
Oracle Real Time Decisions
A Product Review James Taylor CEO CONTENTS Introducing Decision Management Systems Oracle Real Time Decisions Product Architecture Key Features Availability Conclusion Oracle Real Time Decisions (RTD)
Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise
Department of Defense DIRECTIVE SUBJECT: Management of the Department of Defense Information Enterprise References: See Enclosure 1 NUMBER 8000.01 February 10, 2009 ASD(NII)/DoD CIO 1. PURPOSE. This Directive:
MS-40074: Microsoft SQL Server 2014 for Oracle DBAs
MS-40074: Microsoft SQL Server 2014 for Oracle DBAs Description This four-day instructor-led course provides students with the knowledge and skills to capitalize on their skills and experience as an Oracle
Applying 4+1 View Architecture with UML 2. White Paper
Applying 4+1 View Architecture with UML 2 White Paper Copyright 2007 FCGSS, all rights reserved. www.fcgss.com Introduction Unified Modeling Language (UML) has been available since 1997, and UML 2 was
Simulation and Training Solutions
Simulation and Training Solutions Strong Learning Experiences Available Nowhere Else Advancing Operational Readiness with Leading-Edge Simulation and Training The rapid evolution of military missions,
Toad Data Modeler - Features Matrix
Toad Data Modeler - Features Matrix Functionality Commercial Trial Freeware Notes General Features Physical Model (database specific) Universal Model (generic physical model) Logical Model (support for
Fogbeam Vision Series - The Modern Intranet
Fogbeam Labs Cut Through The Information Fog http://www.fogbeam.com Fogbeam Vision Series - The Modern Intranet Where It All Started Intranets began to appear as a venue for collaboration and knowledge
Example Software Development Process.
Example Software Development Process. The example software development process is shown in Figure A. The boxes represent the software development process kernels. The Software Unit Testing, Software Component
Designing a Customized E-learning Solution for a Worldwide IT Company
Customer Success Stories TEKsystems Global Services Designing a Customized E-learning Solution for a Worldwide IT Company INFORMATION TECHNOLOGY TRAINING AND EDUCATION SERVICES Executive Summary TEKsystems
Data Intensive Science and Computing
DEFENSE LABORATORIES ACADEMIA TRANSFORMATIVE SCIENCE Efficient, effective and agile research system INDUSTRY Data Intensive Science and Computing Advanced Computing & Computational Sciences Division University
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
DoD Architecture Framework Version 1.5
DoD Architecture Framework Version 1.5 Technical Standards View Systems/Services View Operational View All View Core Architecture Data Model Volume II: Product Descriptions 23 April 2007 SECTION TABLE
Chapter 1 Introduction to Enterprise Software
Chapter 1 Introduction to Enterprise Software What Is Enterprise Software? Evolution of Enterprise Software Enterprise Software and Component-Based Software Summary If you have heard of terms such as
REQUIREMENTS SPECIFICATION AND MANAGEMENT. Requirements Analysis and Specification
REQUIREMENTS SPECIFICATION AND MANAGEMENT In this note we give the requirements process in a software organization, a template for the requirements document, and the process to manage changes to the requirements.
COMBATSS-21 Scalable combat management system for the world s navies
COMBATSS-21 Scalable combat management system for the world s navies The COMBATSS-21 total ship combat management system was designed to deliver capability rapidly and affordably. Built on an open architecture,
Chapter 10 Practical Database Design Methodology and Use of UML Diagrams
Chapter 10 Practical Database Design Methodology and Use of UML Diagrams Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 10 Outline The Role of Information Systems in
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Healthcare, transportation,
Smart IT Argus456 Dreamstime.com From Data to Decisions: A Value Chain for Big Data H. Gilbert Miller and Peter Mork, Noblis Healthcare, transportation, finance, energy and resource conservation, environmental
MODELING AND SIMULATION IN DEFENSE AND SECURITY
Author: Editorial Title: Modeling and Simulation in Defense and Security. NATO Context. Year of issuance: 1999 Issue: Information & Security. Volume 3, 1999 Hard copy: ISSN 1311-1493 MODELING AND SIMULATION
RESTRICTION ON DISCLOSURE AND USE OF DATA
RESTRICTION ON DISCLOSURE AND USE OF DATA This document includes data that shall not be disclosed outside the Government and shall not be duplicated, used, or disclosed in whole or in part for any purpose
Microsoft Office Word 2010: Level 1
Microsoft Office Word 2010: Level 1 Workshop Objectives: In this workshop, you will learn fundamental Word 2010 skills. You will start by getting acquainted with the Word user interface, creating a new
To introduce software process models To describe three generic process models and when they may be used
Software Processes Objectives To introduce software process models To describe three generic process models and when they may be used To describe outline process models for requirements engineering, software
SOA Enabled Workflow Modernization
Abstract Vitaly Khusidman Workflow Modernization is a case of Architecture Driven Modernization (ADM) and follows ADM Horseshoe Lifecycle. This paper explains how workflow modernization fits into the ADM
The role of integrated requirements management in software delivery.
Software development White paper October 2007 The role of integrated requirements Jim Heumann, requirements evangelist, IBM Rational 2 Contents 2 Introduction 2 What is integrated requirements management?
A Framework for Adaptive Process Modeling and Execution (FAME)
A Framework for Adaptive Process Modeling and Execution (FAME) Perakath Benjamin [email protected] Madhav Erraguntla [email protected] Richard Mayer [email protected] Abstract This paper describes the
The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.
The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide
Malay A. Dalal Madhav Erraguntla Perakath Benjamin. Knowledge Based Systems, Inc. (KBSI) College Station, TX 77840, U.S.A.
AN INTRODUCTION TO USING PROSIM FOR BUSINESS PROCESS SIMULATION AND ANALYSIS Malay A. Dalal Madhav Erraguntla Perakath Benjamin Knowledge Based Systems, Inc. (KBSI) College Station, TX 77840, U.S.A. ABSTRACT
11 Tips to make the requirements definition process more effective and results more usable
1 11 Tips to make the s definition process more effective and results more usable This article discusses what I believe are the key techniques for making s definition process repeatable from project to
A Short History of Interoperability. Michael Robkin Independent Consultant
A Short History of Interoperability Michael Robkin Independent Consultant FDA-Continua-CIMIT Workshop January 25, 26, & 27, 2010 A Short History of Interoperability Lessons Learned from the history of
Windows 7 Upgrade Risk Mitigation Planning: Ensuring Windows 7 Upgrade Success
November 2010 Windows 7 Upgrade Risk Mitigation Planning: Ensuring Windows 7 Upgrade Success By: Robert Schaper, Laplink Software Enterprise Solutions Contents Introduction 2 Risk and Cost 2 Upgrade Strategies
Multinational Information Sharing and Collaborative Planning Limited Objective Experiments
Multinational Information Sharing and Collaborative Planning Limited Objective Experiments Keith P. Curtis The MITRE Corporation [email protected] [email protected] 2001 The MITRE Corporation. All Rights
Semantic Analysis of Business Process Executions
Semantic Analysis of Business Process Executions Fabio Casati, Ming-Chien Shan Software Technology Laboratory HP Laboratories Palo Alto HPL-2001-328 December 17 th, 2001* E-mail: [casati, shan] @hpl.hp.com
THE SECURITY EXPOSURE
Secunia Whitepaper - February 2010 THE SECURITY EXPOSURE OF SOFTWARE PORTFOLIOS An empirical analysis of the patching challenge faced by the average private user In this paper, we examine the software
Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53
Preface xvi Part I Introduction and System Engineering 1 Chapter 1 Introduction 2 1.1 What Is Software Engineering? 2 1.2 Why Software Engineering? 3 1.3 Software Life-Cycle Activities 4 1.3.1 Software
Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object
Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object Anne Monceaux 1, Joanna Guss 1 1 EADS-CCR, Centreda 1, 4 Avenue Didier Daurat 31700 Blagnac France
Lecture 9: Requirements Modelling
A little refresher: What are we modelling? Lecture 9: Requirements Modelling Requirements; Systems; Systems Thinking Role of Modelling in RE Why modelling is important Limitations of modelling Brief overview
A discussion of information integration solutions November 2005. Deploying a Center of Excellence for data integration.
A discussion of information integration solutions November 2005 Deploying a Center of Excellence for data integration. Page 1 Contents Summary This paper describes: 1 Summary 1 Introduction 2 Mastering
Cisco Data Center Services for OpenStack
Data Sheet Cisco Data Center Services for OpenStack Use Cisco Expertise to Accelerate Deployment of Your OpenStack Cloud Operating Environment Why OpenStack? OpenStack is an open source cloud operating
Technology WHITE PAPER
Technology WHITE PAPER What We Do Neota Logic builds software with which the knowledge of experts can be delivered in an operationally useful form as applications embedded in business systems or consulted
Continuity of Operations (COOP) Plan Template Instructions. Federal Emergency Management Agency 500 C ST, SW Washington, D.C.
Continuity of Operations (COOP) Plan Template Instructions Federal Emergency Management Agency 500 C ST, SW Washington, D.C. 20472 FEMA GUIDE INSTRUCTIONS This guide provides instructions for developing
Five best practices for deploying a successful service-oriented architecture
IBM Global Services April 2008 Five best practices for deploying a successful service-oriented architecture Leveraging lessons learned from the IBM Academy of Technology Executive Summary Today s innovative
TRAC Cable-stayed Bridge Competition Guidelines Grades 11 and 12 2012-2013
TRAC Cable-stayed Bridge Competition Guidelines Grades 11 and 12 2012-2013 The TRAnsportation and Civil Engineering (TRAC) Program THE PURPOSE OF TRAC: The TRAC program is a new and inventive way of introducing
UML-based Test Generation and Execution
UML-based Test Generation and Execution Jean Hartmann, Marlon Vieira, Herb Foster, Axel Ruder Siemens Corporate Research, Inc. 755 College Road East Princeton NJ 08540, USA [email protected] ABSTRACT
Object-Oriented Design Guidelines
Adaptive Software Engineering G22.3033-007 Session 8 Sub-Topic 3 Presentation Object-Oriented Design Guidelines Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute
Automated construction schedule creation using project information model
Automated construction schedule creation using project information model Aleš Mrkela Faculty of civil engineering, University of Maribor, Maribor, Slovenia Danijel Rebolj Faculty of civil engineering,
Business Process Modeling and Standardization
Business Modeling and Standardization Antoine Lonjon Chief Architect MEGA Content Introduction Business : One Word, Multiple Arenas of Application Criteria for a Business Modeling Standard State of the
HL7 V2 Implementation Guide Authoring Tool Proposal
HL7 V2 Authoring Tool Proposal Robert Snelick, NIST National Institute of Standards and Technology May 14 th 2012 Contact: [email protected] NIST and Veterans Administration Joint Project NIST will provide
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense By: Daniel Harkness, Chris Strasburg, and Scott Pinkerton The Challenge The Internet is an integral part of daily
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
The Open Group Architectural Framework
The Open Group Architectural Framework Background TOGAF is a step-by-step method for developing an enterprise architecture, using a set of prescribed tools. It is freely available on the Open Group website
AUTOMATED CONSTRUCTION PLANNING FOR MULTI-STORY BUILDINGS
AUTOMATED CONSTRUCTION PLANNING FOR MULTI-STORY BUILDINGS Tang-Hung Nguyen 1 ABSTRACT This paper outlines a computer-based framework that can assist construction planners and schedulers in automatically
A Symptom Extraction and Classification Method for Self-Management
LANOMS 2005-4th Latin American Network Operations and Management Symposium 201 A Symptom Extraction and Classification Method for Self-Management Marcelo Perazolo Autonomic Computing Architecture IBM Corporation
What s new in Teamcenter Service Pack 10.1.4
Siemens PLM Software What s new in Teamcenter Service Pack 10.1.4 Benefits Streamlined collaboration between mechanical and electronic design teams Improved software, development and delivery with integration
GSAW 2015 Session 11B: Frameworks in Action A Foundation for Service Based Architectures
National Aeronautics and Space Administration GSAW 2015 Session 11B: Frameworks in Action A Foundation for Service Based Architectures s Open Architecture Framework March 4, 2015 Los Angeles, California
www.ducenit.com Self-Service Business Intelligence: The hunt for real insights in hidden knowledge Whitepaper
Self-Service Business Intelligence: The hunt for real insights in hidden knowledge Whitepaper Shift in BI usage In this fast paced business environment, organizations need to make smarter and faster decisions
Flexible, Life-Cycle Support for Unique Mission Requirements
Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics
Department of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
Talend Metadata Manager. Reduce Risk and Friction in your Information Supply Chain
Talend Metadata Manager Reduce Risk and Friction in your Information Supply Chain Talend Metadata Manager Talend Metadata Manager provides a comprehensive set of capabilities for all facets of metadata
Business Process. Automation. Automation. David Chernicoff Susan Perschke. sponsored by
Business Process Automation Managing Cost in Your Automation Enterprise David Chernicoff Susan Perschke sponsored by i Contents Business Process Automation Managing Cost in Your Enterprise Chapter 4: BPA
Service Overview. KANA Express. Introduction. Good experiences. On brand. On budget.
KANA Express Service Overview Introduction KANA Express provides a complete suite of integrated multi channel contact and knowledge management capabilities, proven to enable significant improvements in
PROJECT PLAN TEMPLATE
Treasury Board of Canada Secretariat Secrétariat du Conseil du Trésor du Canada Enhanced Management Framework for Information Management/Information Technology PROJECT PLAN TEMPLATE Document Revision Draft
An Architectural Approach for Command, Coordination, and Communications Capabilities Assessment
An Architectural Approach for Command, Coordination, and Communications Capabilities Assessment Kristin Lee Sheila Cane Salwa Abdul-Rauf Carlos E. Martinez The MITRE Corporation McLean, Virginia March
WMD Incident Management Simulation and Tutor
WMD Incident Management Simulation and Tutor NIEHS 30 March 2007 Presented by: Jim Ong [email protected] 650 931 2710 http://www.stottlerhenke.com Project Team Stottler Henke - Artificial intelligence
Using Peer to Peer Dynamic Querying in Grid Information Services
Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information
Graphical Web based Tool for Generating Query from Star Schema
Graphical Web based Tool for Generating Query from Star Schema Mohammed Anbar a, Ku Ruhana Ku-Mahamud b a College of Arts and Sciences Universiti Utara Malaysia, 0600 Sintok, Kedah, Malaysia Tel: 604-2449604
Model-Based Conceptual Design through to system implementation Lessons from a structured yet agile approach
Model-Based Conceptual Design through to system implementation Lessons from a structured yet agile approach Matthew Wylie Shoal Engineering Pty Ltd [email protected] Dr David Harvey Shoal Engineering
GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate
Providing On-Demand Situational Awareness
ITT Exelis Geospatial Intelligence Solutions Providing On-Demand Situational Awareness Use of U.S. Department of Defense (DoD) and U.S. Army imagery in this brochure does not constitute or imply DoD or
Foundations of Business Intelligence: Databases and Information Management
Foundations of Business Intelligence: Databases and Information Management Problem: HP s numerous systems unable to deliver the information needed for a complete picture of business operations, lack of
Rollins College Strategic Marketing Guidelines
Rollins College Strategic Marketing Guidelines Role of the Strategic Marketing Team The Rollins College Strategic Marketing Initiative was designed to provide a substantial means to increase the visibility
Managing Variability in Software Architectures 1 Felix Bachmann*
Managing Variability in Software Architectures Felix Bachmann* Carnegie Bosch Institute Carnegie Mellon University Pittsburgh, Pa 523, USA [email protected] Len Bass Software Engineering Institute Carnegie
Gian Luca Sacco Marketing Director South & Central Europe. Smarter decisions, better products.
Gian Luca Sacco Marketing Director South & Central Europe Smarter decisions, better products Smarter decisions, better products. Today s Product Challenges are More Difficult Than Ever Before Landing on
A Guide to Open Source Transformation Services. How and Why Organizations are Making the Move to Open Source
A Guide to Open Source Transformation Services How and Why Organizations are Making the Move to Open Source A fter decades of relying on commercial off-the-shelf software (COTS), thousands are moving to
Rational Reporting. Module 3: IBM Rational Insight and IBM Cognos Data Manager
Rational Reporting Module 3: IBM Rational Insight and IBM Cognos Data Manager 1 Copyright IBM Corporation 2012 What s next? Module 1: RRDI and IBM Rational Insight Introduction Module 2: IBM Rational Insight
Oracle Data Integrator 12c: Integration and Administration
Oracle University Contact Us: +33 15 7602 081 Oracle Data Integrator 12c: Integration and Administration Duration: 5 Days What you will learn Oracle Data Integrator is a comprehensive data integration
Meeting Workspace Alternatives
Meeting Workspace Alternatives Three Solutions for SharePoint and SharePoint Online MARK ECKERT AND EARON SOTTO Contents Introduction... 1 Benefits and Configuration Examples of the Meeting Workspace in
Oracle Data Integrator 11g: Integration and Administration
Oracle University Contact Us: Local: 1800 103 4775 Intl: +91 80 4108 4709 Oracle Data Integrator 11g: Integration and Administration Duration: 5 Days What you will learn Oracle Data Integrator is a comprehensive
