Sample records for rsa securid software

  1. U-063: RSA SecurID Software Token for Windows DLL Loading Error...

    Broader source: Energy.gov (indexed) [DOE]

    Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA...

  2. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  3. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Broader source: Energy.gov (indexed) [DOE]

    Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

  4. T-582: RSA systems has resulted in certain information being...

    Broader source: Energy.gov (indexed) [DOE]

    2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being...

  5. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows®...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Bypass Authentication Requirements V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local Users V-195: RSA Authentication Manager Lets Local Users View...

  6. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerability V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local Users...

  7. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideoStrategic|IndustrialCenterMarch 4; RSVP97 WesternTypes ofU PPrivilegesUsers

  8. RSA SecurId Token User's Guide Version 1.0 IT Support

    E-Print Network [OSTI]

    Gesbert, David

    .eurecom.fr) ............................................................................................................................. 7 3 The SSL VPN (https ............................................................................................................................................................ 8 3.2 Accessing the SIFI through the SSL VPN........................................................................................................ 10 3.3 Accessing your homedir and the teaching repository through the SSL VPN

  9. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCode

  10. T-642: RSA SecurID update to Customers | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |Vulnerability |

  11. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: SinceDevelopment | Department of EnergyEnergy 94: IBM MultipleFixation

  12. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Environmental Management (EM)

    to be executed by the target user's browser. The code will originate from the site running the RSA Authentication Manager software and will run in the security context of that...

  13. Another Generalization of Wiener's Attack on RSA

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    Another Generalization of Wiener's Attack on RSA Abderrahmane NITAJ Universit´e de Caen, France Casablanca, June 12, 2008 Abderrahmane NITAJ Another Generalization of Wiener's Attack on RSA #12;RSA and Wiener The new attack Conclusion RSA setting Wiener's attack Generalizations Colour conventions Red

  14. Identity-Based Mediated RSA , Xuhua Ding2

    E-Print Network [OSTI]

    Ding, Xuhua

    certificates. Mediated RSA (mRSA) [4] is a simple and practical method of splitting RSA private keys between signature or decryption must in- volve both parties. mRSA allows fast and fine-grained control (revocation) over users' security privileges. However, mRSA still relies on public key certificates to derive public

  15. A new attack on RSA and CRT-RSA Abderrahmane Nitaj

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    A new attack on RSA and CRT-RSA Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme an attack on CRT-RSA when the CRT-exponents dp and dq are both suitably small. In this paper, we show and ex+y 0 (mod N). As an application of our new attack, we present the cryptanalysis of CRT-RSA if one

  16. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was...

  17. V-174: RSA Authentication Manager Writes Operating System, SNMP...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A...

  18. User Guide Remote Workplace to VDI Using RSA | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    User Guide Remote Workplace to VDI Using RSA User Guide Remote Workplace to VDI Using RSA Last updated on March 17, 2015 This document provides instructions for logging onto Remote...

  19. RSA-Based Secret Handshakes Damien Vergnaud

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    RSA-Based Secret Handshakes Damien Vergnaud Laboratoire de Math´ematiques Nicolas Oresme Universit. A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, Smetters, Staddon and Wong

  20. An Attack on RSA Using LSBs of Multiples of the Prime Factors

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    An Attack on RSA Using LSBs of Multiples of the Prime Factors Abderrahmane Nitaj Laboratoire de attack on RSA with d in polynomial time under special conditions. For example, various partial key exposure attacks on RSA and some

  1. 2012-2013 Keywords: Routing and spectrum allocation (RSA), flexible optical networks

    E-Print Network [OSTI]

    Varvarigo, Emmanouel "Manos"

    , "Conserving Transmission Power in Wireless Ad Hoc Networks" #12;), flexible optical networks WDM (FWDM) . (RSA) (RWA). FWDM Matlab. 2: Keywords: Routing and spectrum allocation (RSA), flexible optical networks

  2. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security...

    Energy Savers [EERE]

    4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September...

  3. CONTINUED FRACTIONS AND RSA WITH SMALL SECRET EXPONENT

    E-Print Network [OSTI]

    Dujella, Andrej

    CONTINUED FRACTIONS AND RSA WITH SMALL SECRET EXPONENT ANDREJ DUJELLA Abstract. Extending of Verheul and van Tilborg variant of Wiener's attack on RSA cryptosystem with small secret exponent. 1 of two large primes p and q. The public exponent e and the secret exponent d are related by ed 1 (mod (n

  4. Parallel FPGA Implementation of RSA with Residue Number Systems

    E-Print Network [OSTI]

    Parallel FPGA Implementation of RSA with Residue Number Systems --- Can side­channel threats Multiplication based on Residue Num­ ber Systems. Thanks to RNS, we develop a design able to perform an RSA signature in parallel on a set of identical and independent copro­ cessors. Of independent interest, we

  5. Parallel FPGA Implementation of RSA with Residue Number Systems

    E-Print Network [OSTI]

    Parallel FPGA Implementation of RSA with Residue Number Systems -- Can side-channel threats Multiplication based on Residue Num- ber Systems. Thanks to RNS, we develop a design able to perform an RSA signature in parallel on a set of identical and independent copro- cessors. Of independent interest, we

  6. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...

    Energy Savers [EERE]

    U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and...

  7. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Broader source: Energy.gov (indexed) [DOE]

    (Patch 26 (P26) for RSA Authentication Manager 7.1 Service Pack 4 (SP4) and Appliance 3.0 SP4; Patch 2 (P2) for RSA Authentication Manager 8.0). Addthis Related Articles T-704:...

  8. U-027: RSA Key Manager Appliance Session Logout Bug Fails to...

    Broader source: Energy.gov (indexed) [DOE]

    the 2.7.1.6 hotfix, since this hotfix addresses security related fixes, hot fix roll ups, and bug fixes. To obtain the latest RSA product downloads, log on at RSA SecurCare....

  9. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...

    Broader source: Energy.gov (indexed) [DOE]

    Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue U-129: RSA...

  10. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Energy Savers [EERE]

    in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613...

  11. T-640: RSA Access Manager Server CVE-2011-0322 Update | Department...

    Broader source: Energy.gov (indexed) [DOE]

    7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server....

  12. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  13. T-659: Update support for RSA Authentication Manager

    Broader source: Energy.gov [DOE]

    RSA posted SP4 Patch 4 of their Authentication Manager product 06/30/2011. There are a few pages of fixes in the README, but the most significant is that Authentication Manager can now be installed on Windows Server 2008 (both 32 and 64bit).

  14. A Faster Hardware Implementation of RSA Ajay C Shantilal

    E-Print Network [OSTI]

    1 A Faster Hardware Implementation of RSA Algorithm Ajay C Shantilal Department of Electrical- cation systems. Central tools for achieving system security are cryptographic algorithms. For performance at the Department of Electrical & Computer Engineering, Oregon State University, Corvallis, Oregon 97331. E

  15. Course: Math 311w-01 Laboratory 6: The RSA cipher and public-key cryptography, part 2

    E-Print Network [OSTI]

    Reluga, Tim

    , change to the Desktop directory if you aren't already there, and start ipython. Type ]: from RSA import

  16. Combined Attack on CRT-RSA Why Public Verification Must Not Be Public?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Combined Attack on CRT-RSA Why Public Verification Must Not Be Public? Guillaume Barbu1 , Alberto introduces a new Combined Attack on a CRT- RSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from ob- taining the signature when

  17. A New Attack on RSA with Two or Three Decryption Exponents

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    A New Attack on RSA with Two or Three Decryption Exponents Abderrahmane Nitaj Laboratoire de Math-size. In this paper, we describe an attack on RSA in the presence of two or three exponents ei with the same modulus N. The new attack is an extension of Guo's continued fraction attack as well as the Bl¨omer and May lattice

  18. A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes

    E-Print Network [OSTI]

    Odlyzko, Andrew M.

    A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt. Odlyzko AT&T Bell Laboratories Murray Hill, NJ 07974, USA ABSTRACT A new attack on the RSA cryptosystem is presented. This attack assumes less than previous chosen ciphertext attacks, since the cryptanalyst has

  19. Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klma

    E-Print Network [OSTI]

    Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klíma , Ondej Pokorný1 and Tomás Rosa2, 1 ICZ on RSA-based sessions in SSL/TLS protocols. These protocols incorporate the PKCS#1 (v. 1.5) encoding- secret can decrypt the whole captured SSL/TLS session. We show that incorporating a version number check

  20. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT:...

  1. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can be exploited by...

  2. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT...

  3. Cryptanalysis of Dual CRT-RSA Santanu Sarkar and Subhamoy Maitra

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Cryptanalysis of Dual CRT-RSA Santanu Sarkar and Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata 700 108, India sarkar.santanu.bir@gmail.com, subho

  4. Security analysis of RSA cryptosystem algorithm and it’s properties

    SciTech Connect (OSTI)

    Liu, Chenglian [School of Mathematics and Computer Science, Long Yan university, Lonyan 364012 (China); Guo, Yongning, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com; Lin, Juan, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com [Department of Mathematics and Computer Science, Fuqing Branch of Fujian Normal University, Fuqing 350300 (China)

    2014-10-06T23:59:59.000Z

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  5. A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption

    E-Print Network [OSTI]

    Pateriya, R K; Shrivastava, S C; Patel, Jaideep

    2009-01-01T23:59:59.000Z

    Today, Internet becomes the essential part of our lives. Over 90 percent of the ecommerce is developed on the Internet. A security algorithm became very necessary for producer client transactions assurance and the financial applications safety. The rsa algorithm applicability derives from algorithm properties like confidentiality, safe authentication, data safety and integrity on the internet. Thus, this kind of networks can have a more easy utilization by practical accessing from short, medium, even long distance and from different public places. Rsa encryption in the client side is relatively cheap, whereas, the corresponding decryption in the server side is expensive because its private exponent is much larger. Thus ssl tls servers become swamped to perform public key decryption operations when the simultaneous requests increase quickly .The batch rsa method is useful for such highly loaded web server .In our proposed algorithm by reducing the response time and clients tolerable waiting time an improvement...

  6. Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack

    E-Print Network [OSTI]

    Chen, Sheng-Wei

    Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack Hung-Min Sun- Factorization is difficult, p and q are simply estimated as N. In the Wiener attack, 2 N is adopted of the Wiener attack can be considered to be brute-guessing for the MSBs of p + q. Comparing with their work

  7. SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM: Software Configuration...

    Broader source: Energy.gov (indexed) [DOE]

    SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM: Software Configuration Management Checklist SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM: Software Configuration Management...

  8. Using Two-Factor RSA Token with WebVPN | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of Energy OfficeFactEnergy Bob UnderYour RSA

  9. SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM: Software Design...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM: Software Design Checklist SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM: Software Design Checklist This checklist is intended to...

  10. Index Calculation Attacks on RSA Signature and Encryption Jean-Sebastien Coron1, Yvo Desmedt2, David Naccache1,

    E-Print Network [OSTI]

    Minnesota, University of

    a twitch in the technique made it effective against two very popular RSA signature standards, namely iso/iec 9796-1 and iso/iec 9796-2. Following the attack iso/iec 9796-1 was withdrawn and iso/iec 9796-2 amended. In this paper, we recall Desmedt and Odlyzko's attack as well as its application to the cryptanalysis of iso/iec

  11. Software Developers

    Broader source: Energy.gov [DOE]

    Because SEED will provide a common, open-source data framework, software developers will be able to write applications that access the data in a consistent way (with proper permissions), or build functionalities onto the SEED platform in a replicable way.

  12. Software Architecture and Software Configuration Bernhard Westfechtel

    E-Print Network [OSTI]

    Westfechtel, Bernhard

    the software life cycle. In addition, it supports system building (creation of derived objects from support for the management of evolving software objects throughout the whole life cycle. Several problems architectures play a central role in the development and maintenance of a software system. A software

  13. Software Engineering School COMSC

    E-Print Network [OSTI]

    Martin, Ralph R.

    management skills and performing key technical tasks in the software development lifecycle. The module and practices that are needed to develop software-intensive systems. Students will work on a software in the software lifecycle, and the pros and cons of different models of software construction to select

  14. Understanding and Improving Software Productivity

    E-Print Network [OSTI]

    Scacchi, Walt

    Understanding and Improving Software Productivity Walt Scacchi Institute for Software Research;2 Introduction · What affects software productivity? ­ Software productivity has been one of the most studied aspects of software engineering ­ Goal: review sample of empirical studies of software productivity

  15. Formal Proof for the Correctness of RSA-PSS Christina Lindenberg, Kai Wirt, and Johannes Buchmann

    E-Print Network [OSTI]

    . Even if programs are very intensively tested they may still contain several more or less severe bugs of a program is This work was partially funded by the German Federal Ministry of Education, Sci- ence, Research to severe security issues as well. Moreover bugs even can have huge impacts if they appear in software used

  16. Designing supportability into software

    E-Print Network [OSTI]

    Shirolkar, Prashant A., 1973-

    2004-01-01T23:59:59.000Z

    Background: Despite the identification of a "software crisis" in the 1960s, large software projects are full of defects even today [19]. These defects cause the software to behave unexpectedly. The cause generally is ...

  17. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  18. Software | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    applications, such as simulation and modeling, computation, internet usage, and more. Argonne has both commercially available software and open-source (free) software. Browse both...

  19. Theory and Software

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Theory and Software Home People Science Highlights Publications Seminars & Meetings Opportunities Advisory Committee Theory and Software Group (X-ray Science Division) The Theory...

  20. Software distribution using xnetlib

    SciTech Connect (OSTI)

    Dongarra, J.J. [Univ. of Tennessee, Knoxville, TN (US). Dept. of Computer Science]|[Oak Ridge National Lab., TN (US); Rowan, T.H. [Oak Ridge National Lab., TN (US); Wade, R.C. [Univ. of Tennessee, Knoxville, TN (US). Dept. of Computer Science

    1993-06-01T23:59:59.000Z

    Xnetlib is a new tool for software distribution. Whereas its predecessor netlib uses e-mail as the user interface to its large collection of public-domain mathematical software, xnetlib uses an X Window interface and socket-based communication. Xnetlib makes it easy to search through a large distributed collection of software and to retrieve requested software in seconds.

  1. Introduction to Software Engineering

    E-Print Network [OSTI]

    ? ) Concept of Operations (CONOPS) Software Requirements Requirements Engineering Processes System Models

  2. SOFTWARE ENGINEERING COMPUTER SCIENCE

    E-Print Network [OSTI]

    Bone, Gary

    SOFTWARE ENGINEERING COMPUTER SCIENCE ... What's the Difference? goeng1@mcmaster.ca www). Software Engineering covers the course content listed under Computer Science, with some additions. Software). Software Engineering students will graduate with a Bachelor of Engineering (B.Eng). Computer Science

  3. User' Software Manual

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MM-Group Home MMG Advisory Committees 4-ID-D Home Recent Publications Beamline Info Optics Instrumentation Software User Info FAQs 4-ID-D Beamline Software Manual Introduction...

  4. SOFTWARE EVOLUTION AND THE STAGED MODEL OF THE SOFTWARE LIFECYCLE

    E-Print Network [OSTI]

    1 SOFTWARE EVOLUTION AND THE STAGED MODEL OF THE SOFTWARE LIFECYCLE K. H. Bennett Research............................................................................................................11 1.5 Iterative software development ...............................................................................................................19 1.10 The stages of the software lifecycle

  5. Agile Development and Software Evolution

    E-Print Network [OSTI]

    Feitelson, Dror

    Agile Development and Software Evolution Dror Feitelson Basic Seminar on Software Engineering Hebrew University 2011 #12;Software Lifecycle Req's Analysis Design Construction Testing Transfer Maintenance Textbook view: #12;Software Lifecycle Req's Analysis Design Construction Testing Transfer

  6. HAZARD ANALYSIS SOFTWARE

    SciTech Connect (OSTI)

    Sommer, S; Tinh Tran, T

    2008-04-08T23:59:59.000Z

    Washington Safety Management Solutions, LLC developed web-based software to improve the efficiency and consistency of hazard identification and analysis, control selection and classification, and to standardize analysis reporting at Savannah River Site. In the new nuclear age, information technology provides methods to improve the efficiency of the documented safety analysis development process which includes hazard analysis activities. This software provides a web interface that interacts with a relational database to support analysis, record data, and to ensure reporting consistency. A team of subject matter experts participated in a series of meetings to review the associated processes and procedures for requirements and standard practices. Through these meetings, a set of software requirements were developed and compiled into a requirements traceability matrix from which software could be developed. The software was tested to ensure compliance with the requirements. Training was provided to the hazard analysis leads. Hazard analysis teams using the software have verified its operability. The software has been classified as NQA-1, Level D, as it supports the analysis team but does not perform the analysis. The software can be transported to other sites with alternate risk schemes. The software is being used to support the development of 14 hazard analyses. User responses have been positive with a number of suggestions for improvement which are being incorporated as time permits. The software has enforced a uniform implementation of the site procedures. The software has significantly improved the efficiency and standardization of the hazard analysis process.

  7. Tax Deduction Qualified Software

    Broader source: Energy.gov [DOE]

    On this page you'll find information about the EnergyGauge Summit version 3.20 (incorporating DOE-2.1E (v120)) qualified computer software (buildings.energy.gov/qualified_software.html), which calculates energy and power cost savings that meet federal tax incentive requirements for commercial buildings.

  8. Tax Deduction Qualified Software

    Broader source: Energy.gov [DOE]

    On this page you'll find information about the EnergyGauge Summit version 3.22 (incorporating DOE-2.1E (v120)) qualified computer software (buildings.energy.gov/qualified_software.html), which calculates energy and power cost savings that meet federal tax incentive requirements for commercial buildings.

  9. Tax Deduction Qualified Software

    Broader source: Energy.gov [DOE]

    On this page you'll find information about the EnergyGauge Summit version 3.21 (incorporating DOE-2.1E (v120)) qualified computer software (buildings.energy.gov/qualified_software.html), which calculates energy and power cost savings that meet federal tax incentive requirements for commercial buildings.

  10. Engineering Careers: Software Engineering

    E-Print Network [OSTI]

    Fenster, Sam

    of others When you screw up, you can do it on a massive scale #12;Totally unlike other engineering electronic device #12;Software tools Software engineers build their own tools The OS on your laptop;Just like other engineering Established body of knowledge Established practices Build on the work

  11. Probabilistic Software Workshop Probabilistic Software Workshop

    E-Print Network [OSTI]

    such identification imply a recommendation or it imply that any of the materials, instruments or equipment identified products. · NIST Disclaimer: Certain commercial equipment, instruments, software programs, and materials the official position of the National Institute of Standards and Technology or the U.S. Department of Justice

  12. Interactive Software Technology 1/24 Interactive Software Technology

    E-Print Network [OSTI]

    Wegner, Peter

    Interactive Software Technology 1/24 Interactive Software Technology Peter Wegner, Brown University Paradigms 2. Models of Interaction 3. Software Engineering, Artificial Intelligence, and Open Systems 4. Object­oriented Design: Sequential Interaction 5. Multiple Interface Models: Concurrent Interaction 6

  13. SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM System Maintenance Checklist SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM More...

  14. Software quality assurance handbook

    SciTech Connect (OSTI)

    Not Available

    1990-09-01T23:59:59.000Z

    There are two important reasons for Software Quality Assurance (SQA) at Allied-Signal Inc., Kansas City Division (KCD): First, the benefits from SQA make good business sense. Second, the Department of Energy has requested SQA. This handbook is one of the first steps in a plant-wide implementation of Software Quality Assurance at KCD. The handbook has two main purposes. The first is to provide information that you will need to perform software quality assurance activities. The second is to provide a common thread to unify the approach to SQA at KCD. 2 figs.

  15. Multiphase flow calculation software

    DOE Patents [OSTI]

    Fincke, James R. (Idaho Falls, ID)

    2003-04-15T23:59:59.000Z

    Multiphase flow calculation software and computer-readable media carrying computer executable instructions for calculating liquid and gas phase mass flow rates of high void fraction multiphase flows. The multiphase flow calculation software employs various given, or experimentally determined, parameters in conjunction with a plurality of pressure differentials of a multiphase flow, preferably supplied by a differential pressure flowmeter or the like, to determine liquid and gas phase mass flow rates of the high void fraction multiphase flows. Embodiments of the multiphase flow calculation software are suitable for use in a variety of applications, including real-time management and control of an object system.

  16. Software Quality Assurance

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-10-02T23:59:59.000Z

    To define requirements and responsibilities for software quality assurance (SQA) within the Department of Energy (DOE). DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01.

  17. Software Quality Assurance

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-10-02T23:59:59.000Z

    DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. To define requirements and responsibilities for software quality assurance (SQA) within the Department of Energy (DOE). Does not cancel other directives.

  18. The Software Patent Debate 

    E-Print Network [OSTI]

    Guadamuz, Andres

    2006-01-01T23:59:59.000Z

    The paper discusses the proposed European Directive on the Patentability of Computer-Implemented Inventions and the subsequent debate that followed. Do software patents - as argued by policymakers' - result in increased ...

  19. Software Talk [Compatibility Mode

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    acquisitionanalysis software for Diffraction Beam Lines at SSRL spec SPECPLOT ICS WxDiff WebSpec First installation on BL 2-1 CSS spec Direct connection (SCSI) 3rd party user...

  20. Software Function Allocation Methodology

    E-Print Network [OSTI]

    O'Neal, Michael Ralph

    1988-01-01T23:59:59.000Z

    Necessary) Rapid Prototypes (Optional) 3. 4. 1 SFAM Step 1 ? Preparation If the Computer System Map (CSM) has not been created for the current overall hardware system, it is completed before the software function allocation process begins.... The methodology begins when the preconditions above have been met and the CSM is completed. The first step is to consult the list of software function allocation parameters provided as part of the methodology. The list of parameters will at first be sufficient...

  1. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    breaches in the operating environment. Security breaches resulting from misuse or tnisconfiguration of the program should not be blamed on the software. T'his is a debatable position. A security breach that results from an unintentional enor... units with public key algorithms, private keys, and certificates. Any attempt to access or modify the data in these devices will render them unusable. The device contains software tools. These devices use the computer they reside on as a general...

  2. Managing a Software Ecosystem Using a Multiple Software Product Line

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Managing a Software Ecosystem Using a Multiple Software Product Line: a Case Study on Digital increases the number of software ecosystems: software platforms developed and maintained in a decentralized YourCast from a single system to a medium- scale ecosystem, we show how organizing it as a multiple

  3. Software Safety Tutorial Status Update 1 Software Safety Tutorial

    E-Print Network [OSTI]

    Tian, Jeff

    Software Safety Tutorial Status Update 1 Software Safety Tutorial (Status Update) Jeff Tian, tian@engr.smu.edu CSE, SMU, Dallas, TX 75275 Topics · Project Overview · Software Safety Overview · Project Tasks competency for real-time software engineers. · Project team: Jeff Tian (SMU): Basics of SSE D.T. Huynh

  4. Software Quality Model Requirements for Software Quality Engineering

    E-Print Network [OSTI]

    Suryn, Witold

    Quality Engineering needs a quality model that is usable throughout the software lifecycle, systematic, disciplined, quantifiable approach to the development and maintenance of quality of softwareSoftware Quality Model Requirements for Software Quality Engineering Marc-Alexis Côté M. Ing (marc

  5. Conserving Software-based Artwork through Software Engineering

    E-Print Network [OSTI]

    Marchese, Francis

    analysis, system and software design, its development, operation, and maintenance [1]. Software engineering role in software development within the aerospace, high technology, and financial service industries products to continue to be used. Maintenance is the longest process in the software engineering lifecycle

  6. The Evolution Matrix: Recovering Software Evolution using Software Visualization Techniques

    E-Print Network [OSTI]

    Nierstrasz, Oscar

    The Evolution Matrix: Recovering Software Evolution using Software Visualization Techniques Michele - ABSTRACT One of the major problems in software evolution is coping with the complexity which stems from and effective way to visualize the evolution of software systems which helps to recover the evolution of object

  7. Common Misconceptions about Software Architecture

    E-Print Network [OSTI]

    van der Hoek, André

    Common Misconceptions about Software Architecture by Philippe Kruchten Rational Fellow Rational Software Canada References to architecture are everywhere: in every article, in every ad. And we take definition of software architecture. Are we all understanding the same thing? We gladly accept that software

  8. Self-assembling software generator

    DOE Patents [OSTI]

    Bouchard, Ann M. (Albuquerque, NM); Osbourn, Gordon C. (Albuquerque, NM)

    2011-11-25T23:59:59.000Z

    A technique to generate an executable task includes inspecting a task specification data structure to determine what software entities are to be generated to create the executable task, inspecting the task specification data structure to determine how the software entities will be linked after generating the software entities, inspecting the task specification data structure to determine logic to be executed by the software entities, and generating the software entities to create the executable task.

  9. Reducing Software Failures: Addressing the Ethical Risks of the Software Development By Don Gotterbarn

    E-Print Network [OSTI]

    De Montfort University

    Reducing Software Failures: Addressing the Ethical Risks of the Software Development Lifecycle by software developers. This process also is incorporated into a software development life cycle. A tool to develop Software Development Impact Statements is also discussed. INTRODUCTION Software developers

  10. Software Engineering Course Notes

    E-Print Network [OSTI]

    Damon, Craig A.

    of too many managers is to chase away good people. 1. These roles may be split between technical with a manager. Managers have three roles in software development1: · people management · productivity management personnel research, Kristiansand, Norway. #12;22 Management Managing people Good people management

  11. Software Carpentry: Lessons Learned

    E-Print Network [OSTI]

    Greg Wilson

    2014-01-29T23:59:59.000Z

    Over the last 15 years, Software Carpentry has evolved from a week-long training course at the US national laboratories into a worldwide volunteer effort to raise standards in scientific computing. This article explains what we have learned along the way the challenges we now face, and our plans for the future.

  12. Software Carpentry: Lessons Learned

    E-Print Network [OSTI]

    Wilson, Greg

    2013-01-01T23:59:59.000Z

    Over the last 15 years, Software Carpentry has evolved from a week-long training course at the US national laboratories into a worldwide volunteer effort to raise standards in scientific computing. This article explains what we have learned along the way the challenges we now face, and our plans for the future.

  13. IBM Software Cross Industries

    E-Print Network [OSTI]

    and minimize cost with our experi- enced onshore and offshore teams. We can deliver the perfect technical of core functionality for Lotus and WebSphere Portal software. Our proof-of-concept solutions provide short, focused engagements to help you explore specific, client defined functionality. Business

  14. JSATS Decoder Software Manual

    SciTech Connect (OSTI)

    Flory, Adam E.; Lamarche, Brian L.; Weiland, Mark A.

    2013-05-01T23:59:59.000Z

    The Juvenile Salmon Acoustic Telemetry System (JSATS) Decoder is a software application that converts a digitized acoustic signal (a waveform stored in the .bwm file format) into a list of potential JSATS Acoustic MicroTransmitter (AMT) tagcodes along with other data about the signal including time of arrival and signal to noise ratios (SNR). This software is capable of decoding single files, directories, and viewing raw acoustic waveforms. When coupled with the JSATS Detector, the Decoder is capable of decoding in ‘real-time’ and can also provide statistical information about acoustic beacons placed within receive range of hydrophones within a JSATS array. This document details the features and functionality of the software. The document begins with software installation instructions (section 2), followed in order by instructions for decoder setup (section 3), decoding process initiation (section 4), then monitoring of beacons (section 5) using real-time decoding features. The last section in the manual describes the beacon, beacon statistics, and the results file formats. This document does not consider the raw binary waveform file format.

  15. IBM Software Providesacomprehensivesolutionfor

    E-Print Network [OSTI]

    , companies must make sure that they're delivering products that meet their customers' requirements while companies address the challenges of embedded software development and delivery-- from initial product products, services and best practices to help companies define and manage their product development

  16. Software Patent Litigation ABA Section of Litigation

    E-Print Network [OSTI]

    Shamos, Michael I.

    1 Software Patent Litigation ABA Section of Litigation Intellectual Property Litigation Committee............................................................ 2 II. Infringement issues specific to software patents Relating to Software Patents.........................................................15 POSSIBLE ISSUES

  17. Mining Test Cases To Improve Software Maintenance

    E-Print Network [OSTI]

    Ziftci, Celal

    also known as software development lifecycle) is a set ofin the Software Development Lifecycle In the lifecycle of apart of the software development lifecycle, has many

  18. Gammasphere software development. Progress report

    SciTech Connect (OSTI)

    Piercey, R.B.

    1994-01-01T23:59:59.000Z

    This report describes the activities of the nuclear physics group at Mississippi State University which were performed during 1993. Significant progress has been made in the focus areas: chairing the Gammasphere Software Working Group (SWG); assisting with the porting and enhancement of the ORNL UPAK histogramming software package; and developing standard formats for Gammasphere data products. In addition, they have established a new public ftp archive to distribute software and software development tools and information.

  19. Software Engineering Craig A. Damon

    E-Print Network [OSTI]

    Damon, Craig A.

    ) greenfield vs. brownfield project features #12;Software EngineeringCIS4150-1 20 many roles contribute to s

  20. Software Verification and Validation Procedure

    SciTech Connect (OSTI)

    Olund, Thomas S.

    2008-09-15T23:59:59.000Z

    This Software Verification and Validation procedure provides the action steps for the Tank Waste Information Network System (TWINS) testing process. The primary objective of the testing process is to provide assurance that the software functions as intended, and meets the requirements specified by the client. Verification and validation establish the primary basis for TWINS software product acceptance.

  1. Internal dosimetry software comparison

    E-Print Network [OSTI]

    Fulmer, Judith Renee

    1992-01-01T23:59:59.000Z

    (ICRP) published in 1979 provided an improved approach for the assessment of internal dose. The ICRP recommendations were implemented in federal regulations promulgated by the Nuclear Regulatory Commission (NRC) in the Code of Federal Regulations (10... in the assessment of internal dose has led to the development of various computer software. In this study, several internal dosimetry codes were examined using a standard set of benchmark problems incorporating authentic exposure data. Personal computer...

  2. SGE: Software Presentation

    E-Print Network [OSTI]

    Nouanegue, H. F.; Daoud, A.; Lavigne, K.; Poulin, A.; Charette, A.; Lahala, S.; Sansregret, S.; Desbiens, G.

    2013-01-01T23:59:59.000Z

    ? Technologie, Hydro-Qu?bec Why SGE software is needed? > Increase energy efficiency in Commercial and Institutional Buildings > Optimize HVAC systems operation (Power demand and energy consumption) > Simplify and assist building operators 4 Groupe... of historical data 10 Groupe ? Technologie, Hydro-Qu?bec > What are operation indicators? ? Value calculated from combination of measurements, set points or others operation indicators ? Comparables values with power units or no unit ? 30 fixed defined...

  3. Hipikat: A Project Memory for Software Development

    E-Print Network [OSTI]

    van der Hoek, André

    Hipikat: A Project Memory for Software Development Davor CCubranicc, Gail C. Murphy, Member, IEEE's usefulness in software modification tasks. One study evaluated the usefulness of Hipikat's recommendations Terms--Software development teams, project memory, software artifacts, recommender system, user studies

  4. Software is Discrete Mathematics University of Oklahoma

    E-Print Network [OSTI]

    Page, Rex L.

    , discrete mathematics, predicate logic, correctness proofs, formal methods, software engineering. 1Software is Discrete Mathematics Rex L Page University of Oklahoma School of Computer Science Descriptors D.2.4 [Software Engineering]: Software/Program Verification ­ correctness proofs, formal methods

  5. SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    PROGRAM SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM Training Checklist SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM More Documents & Publications Quality Assurance Checklist...

  6. Software Quality Assurance Subcommittee : Guidelines for Requirements...

    Broader source: Energy.gov (indexed) [DOE]

    Software Quality Assurance Subcommittee : Guidelines for Requirements Management Software Quality Assurance Subcommittee : Guidelines for Requirements Management Requirements...

  7. Electronic Records Management Software Applications Design Criteria...

    Energy Savers [EERE]

    Electronic Records Management Software Applications Design Criteria Standard Electronic Records Management Software Applications Design Criteria Standard This Standard is reissued...

  8. Sandia Energy - Software

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclear PressLaboratorySoftware Home Climate & Earth Systems

  9. Software Talk [Compatibility Mode]

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz9MorganYou are hereValueacquisition/analysis software

  10. NERSC Software Downloads

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed Key Role in Workflow Software

  11. NERSC Software List

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed Key Role in Workflow Software

  12. Experience with Software Architectures and Configured Software Descriptions

    E-Print Network [OSTI]

    Scacchi, Walt

    our experience in the specification, design, implementation and evolution of software engineering a commercial DBMS). However, experience with the explicit specification of the architctural design of large

  13. SHM Data Sets and Software

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sets and Software Contact Institute Director Charles Farrar (505) 663-5330 Email UCSD EI Director Michael Todd (858) 534-5951 Professional Staff Assistant Jutta Kayser (505)...

  14. Commercial Software | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a variety of applications including simulation, modeling, computation, internet, flexible framework modeling, and more. Commercial software can be licensed directly from...

  15. Inconsistency Management in Software Engineering 1 INCONSISTENCY MANAGEMENT IN SOFTWARE

    E-Print Network [OSTI]

    Spanoudakis, George

    ; do not guarantee some properties of the system, such as safety and reliability; and generateInconsistency Management in Software Engineering 1 INCONSISTENCY MANAGEMENT IN SOFTWARE ENGINEERING difficulties on system maintenance. On the positive side, inconsistencies can facilitate identification of some

  16. Energy Tracking Software Platform

    SciTech Connect (OSTI)

    Ryan Davis; Nathan Bird; Rebecca Birx; Hal Knowles

    2011-04-04T23:59:59.000Z

    Acceleration has created an interactive energy tracking and visualization platform that supports decreasing electric, water, and gas usage. Homeowners have access to tools that allow them to gauge their use and track progress toward a smaller energy footprint. Real estate agents have access to consumption data, allowing for sharing a comparison with potential home buyers. Home builders have the opportunity to compare their neighborhood's energy efficiency with competitors. Home energy raters have a tool for gauging the progress of their clients after efficiency changes. And, social groups are able to help encourage members to reduce their energy bills and help their environment. EnergyIT.com is the business umbrella for all energy tracking solutions and is designed to provide information about our energy tracking software and promote sales. CompareAndConserve.com (Gainesville-Green.com) helps homeowners conserve energy through education and competition. ToolsForTenants.com helps renters factor energy usage into their housing decisions.

  17. Software quality is a crucial issue in a society that vitally depends on software systems. Software quality

    E-Print Network [OSTI]

    Deissenboeck, Florian

    ABSTRACT Software quality is a crucial issue in a society that vitally depends on software systems quality in development. If the top management of software dependent companies does not have effective software quality management. After giving a few examples for software quality in real life

  18. IBM Software IBM Rational Team

    E-Print Network [OSTI]

    IBM Software Data Sheet March 2013 IBM Rational Team Concert Be lean. Be agile. Work together near real-time, contextual collaboration for distributed project teams Improve software quality objectives. Teams are trying to adopt agile practices, but are having difficulty because of several factors

  19. Software measurement 2009. 1. 14

    E-Print Network [OSTI]

    Bae, Doo-Hwan

    Software measurement Tutorial 2009. 1. 14 Yeong-Seok Seo #12; KAIST SE LAB 2009 Contents Introduction Designing a software measurement process Measurement elements Measurement scales Measure for success Conclusion 2/28 #12; KAIST SE LAB 2009 Introduction(1/3) Definition of terminology Measurement[1

  20. Arquitecturas Software Juan Jos Moreno Navarro

    E-Print Network [OSTI]

    Fredlund, Lars-Ã?ke

    Arquitecturas Software Juan José Moreno Navarro (Curso de Software basado en Componentes, junto a Lars-Ake Fredlund) Arquitecturas Software · Motivación: ­ Complejidad creciente de aplicaciones sus propiedades globales. Arquitecturas Software · Características: ­ Parte del diseño de software

  1. The Software Engineering Master's Program 1. Introduction

    E-Print Network [OSTI]

    of Embedded Real-time Systems; ___SW4581 Software Reliability (3-1); ___SW4582 Weapons System Software SafetyThe Software Engineering Master's Program 1. Introduction The Software Engineering program at the U to learn all aspects of software development and the skills needed to efficiently and reliably plan

  2. RELAP-7 SOFTWARE VERIFICATION AND VALIDATION PLAN

    SciTech Connect (OSTI)

    Smith, Curtis L [Idaho National Laboratory; Choi, Yong-Joon [Idaho National Laboratory; Zou, Ling [Idaho National Laboratory

    2014-09-01T23:59:59.000Z

    This INL plan comprehensively describes the software for RELAP-7 and documents the software, interface, and software design requirements for the application. The plan also describes the testing-based software verification and validation (SV&V) process—a set of specially designed software models used to test RELAP-7.

  3. Agile Software Architecture: Why Your Project Needs It

    E-Print Network [OSTI]

    de Weck, Olivier L.

    2/12/2011 1 Agile Software Architecture: Why Your Project Needs It Business meets Implementation Chris Miyachi SDM Entering Class 2000 Presentation Outline · What is Software Architecture · Architecture within the Software Lifecycle · Software Architecture and Lean Software Development · Software

  4. Self-assembled software and method of overriding software execution

    DOE Patents [OSTI]

    Bouchard, Ann M.; Osbourn, Gordon C.

    2013-01-08T23:59:59.000Z

    A computer-implemented software self-assembled system and method for providing an external override and monitoring capability to dynamically self-assembling software containing machines that self-assemble execution sequences and data structures. The method provides an external override machine that can be introduced into a system of self-assembling machines while the machines are executing such that the functionality of the executing software can be changed or paused without stopping the code execution and modifying the existing code. Additionally, a monitoring machine can be introduced without stopping code execution that can monitor specified code execution functions by designated machines and communicate the status to an output device.

  5. The Software Technology of the 21st Century: From Software Reuse to Collaborative Software Design

    E-Print Network [OSTI]

    Fischer, Gerhard

    Gerhard Fischer University of Colorado, Center for LifeLong Learning and Design (L3D) Department supports evolution [Dawkins, 1987]. Various types of software artifacts, such as design knowledge a cognitive and social problem [Fischer, 1987]. Designers must locate reusable software artifacts relevant

  6. CTRLWORK AND MACBREAKZ ERGONOMIC BREAK REMINDER SOFTWARE

    E-Print Network [OSTI]

    California at Santa Barbara, University of

    CTRLWORK AND MACBREAKZ ERGONOMIC BREAK REMINDER SOFTWARE SOFTWARE FEATURES: Analyzes your for installation assistance. 1. Please uninstall the former ergonomic break software, RSIGuard, if currently instructions on the screen. For more information, contact the UCSB Ergonomics Program at Ergonomics

  7. Managing Variability throughout the Software Development Lifecycle

    E-Print Network [OSTI]

    Managing Variability throughout the Software Development Lifecycle Neil Loughran and Awais Rashid levels of the software development lifecycle, especially when new requirements arise. We believe of the software development lifecycle. Moreover, the effects of variability and, in particular, new variabilities

  8. Daylighting Prediction Software: Comparative Analysis and Application

    E-Print Network [OSTI]

    Estes, J. M. Jr.; Schreppler, S.; Newsom, T.

    2004-01-01T23:59:59.000Z

    in selecting a software program are presented. “Radiance”, a reverse ray tracing method software package, was chosen for use in the simulations. An existing school was modeled with the Radiance software and predictions of daylighting contributions were compared...

  9. Software Security Rules, SDLC Perspective

    E-Print Network [OSTI]

    Banerjee, C

    2009-01-01T23:59:59.000Z

    Software has become an integral part of everyday life. Everyday, millions of people perform transaction through internet, ATM, mobile phone, they send email and Egreetings, and use word processing and spreadsheet for various purpose. People use software bearing in mind that it is reliable and can be trust upon and the operation they perform is secured. Now, if these software have exploitable security hole then how can they be safe for use. Security brings value to software in terms of peoples trust. The value provided by secure software is of vital importance because many critical functions are entirely dependent on the software. That is why security is a serious topic which should be given proper attention during the entire SDLC, right from the beginning. For the proper implementation of security in the software, twenty one security rules are proposed in this paper along with validation results. It is found that by applying these rules as per given implementation mechanism, most of the vulnerabilities are el...

  10. SAPHIRE 8 Software Acceptance Test Plan

    SciTech Connect (OSTI)

    Ted S. Wood; Curtis L. Smith

    2009-07-01T23:59:59.000Z

    This document describe & report the overall SAPHIRE 8 Software acceptance test paln to offically release the SAPHIRE version 8 software to the NRC custoer for distribution.

  11. Software Modeling and Verification Professors

    E-Print Network [OSTI]

    Ábrahám, Erika

    Software Modeling and Verification Staff · Professors Prof. Dr. Ir. Joost-Pieter Katoen Prof. em) Mark Timmer (Uni Twente, NL) Dr. Olga Tveretina (Karlsruhe University, D) Ralf Wimmer (Universität

  12. Software Engineering Introduction to SWE

    E-Print Network [OSTI]

    Razak, Saquib

    Unit 23 1 Software Engineering · Introduction to SWE · What is SDLC · Phases of SDLC #12;Unit 23 2 the new house to the customer which is now ready for occupation. #12;Unit 23 4 What is SDLC The SDLC has

  13. Ten Incredibly Dangerous Software Ideas

    E-Print Network [OSTI]

    G. A. Maney

    2006-07-07T23:59:59.000Z

    This is a rough draft synopsis of a book presently in preparation. This book provides a systematic critique of the software industry. This critique is accomplished using classical methods in practical design science.

  14. A Survey on Mining Software Survey Presentation

    E-Print Network [OSTI]

    Bae, Doo-Hwan

    ­ Effort Estimation ­ Mining Aspects · Papers at a glance · Related Workshop · Available Resources of mining software archives to support, ­ the maintenance of software systems, ­ improve software designA Survey on Mining Software Archives Survey Presentation Jin Ung, Oh ­ 2007.07.11 #12;Contents

  15. The ACTS Center for Software Sustainability

    E-Print Network [OSTI]

    Leroy, Drummond-Lewis

    2014-01-01T23:59:59.000Z

    Software Engineering for High Performance Computing Systemwith DOE high performance computing centers like NERSC, and

  16. What is Your Software Worth? Gio Wiederhold

    E-Print Network [OSTI]

    Wiederhold, Gio

    [Boehm:81, 00]. Even software engineering management approaches termed `Earned Value Management' only This article presents a method for valuing software, based on the income that use of that software is expected expectations, software maintenance, product growth, discounting to present value, and the like, always focusing

  17. Light Duty Utility Arm Software Test Plan

    SciTech Connect (OSTI)

    Kiebel, G.R.

    1995-12-18T23:59:59.000Z

    This plan describes how validation testing of the software will be implemented for the integrated control and data acquisition system of the Light Duty Utility Arm System (LDUA). The purpose of LDUA software validation testing is to demonstrate and document that the LDUA software meets its software requirements specification.

  18. Policy-Parametric Software Travis Breaux

    E-Print Network [OSTI]

    Young, R. Michael

    Policy-Parametric Software Travis Breaux Department of Computer Science North Carolina State University tdbreaux@ncsu.edu Abstract Policy-parametric software describes a vision for enterprise software that promotes organizational policy as a computational parameter in future software systems. In the following

  19. Bachelor-Fachprojekt ,,Software im Automobil"

    E-Print Network [OSTI]

    Morik, Katharina

    11 Bachelor-Fachprojekt ,,Software im Automobil" Olaf Spinczyk Arbeitsgruppe Eingebettete.cs.uni-dortmund.de/~spinczyk/ #12;Fachprojekt ,,Software im Automobil" 22 Inhalt Fachprojekte Thema ,,Software im Automobil" Durchführung Generalisierung #12;Fachprojekt ,,Software im Automobil" 33 Fachprojekte ... ... haben stärkeren

  20. User systems guidelines for software projects

    SciTech Connect (OSTI)

    Abrahamson, L. (ed.)

    1986-04-01T23:59:59.000Z

    This manual presents guidelines for software standards which were developed so that software project-development teams and management involved in approving the software could have a generalized view of all phases in the software production procedure and the steps involved in completing each phase. Guidelines are presented for six phases of software development: project definition, building a user interface, designing software, writing code, testing code, and preparing software documentation. The discussions for each phase include examples illustrating the recommended guidelines. 45 refs. (DWL)

  1. Safety critical software development qualification

    SciTech Connect (OSTI)

    Marron, J. E. [Invensys Process Systems, 33 Commercial Street, Foxboro, MA 02035 (United States)

    2006-07-01T23:59:59.000Z

    With the increasing use of digital systems in control applications, customers must acquire appropriate expectations for software development and quality assurance procedures. Purchasers and users of digital systems need to understand the benefits to the supplier of effective quality systems. These systems consist not only of procedures but tools that enable automation. Without the use of automation, quality can not be assured. A software and systems quality program starts with the documents you are very familiar with. But these documents must define more than the final system. They must address specific development environment characteristics and testing capabilities. Starting with the RFP, some of the items that should be introduced are Software Configuration Management, regression testing and defect tracking. The digital system customer is in the best position to enforce the use of software and systems quality programs by including them in project requirements as early as the Purchase Order. The customer's understanding of the full scope and implementation of a software quality program is essential to achieving the quality necessary in nuclear projects, and, incidentally, completing those projects on schedule. (authors)

  2. A Formal Embedded Software Verification using Software Fault Tree Analysis

    E-Print Network [OSTI]

    -mail: jbyoo@konkuk.ac.kr Extended Abstract In developing embedded software such as nuclear reactor protection checking [4]. We used a prototype version of the KNICS RPS [5] in Korean nuclear power plants, but it may also be able to auto-populate address book changes. This is based on the use of an operating

  3. Manual dos Softwares Manuseio do TheSky Astronomy Software

    E-Print Network [OSTI]

    Software Esta é a tela principal. 1- Para você capturar imagens com a Câmera CCD, você precisa conectá imagens. Clique em Chose Folder... e crie os diretórios com os nomes e lugares desejados; 5- Depois de criar os diretórios, selecione o item AutoSave on; 6- Para começar a capturar as imagens, clique em Take

  4. Proceedings of the Fifth Triennial Software Quality Forum 2000, Software for the Next Millennium, Software Quality Forum

    SciTech Connect (OSTI)

    Scientific Software Engineering Group, CIC-12

    2000-04-01T23:59:59.000Z

    The Software Quality Forum is a triennial conference held by the Software Quality Assurance Subcommittee for the Department of Energy's Quality Managers. The forum centers on key issues, information, and technology important in software development for the Nuclear Weapons Complex. This year it will be opened up to include local information technology companies and software vendors presenting their solutions, ideas, and lessons learned. The Software Quality Forum 2000 will take on a more hands-on, instructional tone than those previously held. There will be an emphasis on providing information, tools, and resources to assist developers in their goal of producing next generation software.

  5. Software Process Improvement 98, Monte Carlo, December 1998. 1 Development and Integration Issues about Software Engineering,

    E-Print Network [OSTI]

    Laporte, Claude Y.

    Software Process Improvement 98, Monte Carlo, December 1998. 1 Development and Integration Issues about Software Engineering, Systems Engineering and Project Management Processes Claude Y. Laporte software engineering, systems engineering, supporting processes and project management process over

  6. Institute for Software Technology Wissensverarbeitung

    E-Print Network [OSTI]

    Motivation Example correct behavior battery(c)(ab(c)voltage(c))battery(c)(ab(c)voltage(c)) bulb for Software Technology Motivation Example cont. t t tsystem structure battery(B). bulb(L1). bulb(L2). bulb(L3 the fact that a bulb does not lit if it is broken · solution: model faulty behavior battery

  7. Software Fault Diagnosis Peter Zoeteweij

    E-Print Network [OSTI]

    Zoeteweij, Peter

    Lab, Faculty of Electrical Engineering, Mathematics, and Computer Science, Delft University-to-day basis is constantly growing. Combined with a practically constant rate of faults per line of code in the software development cycle, which aim at exposing such discrepancies. In this context, automated diagnosis

  8. Sandia Software Guidelines, Volume 2. Documentation

    SciTech Connect (OSTI)

    NONE

    1995-09-01T23:59:59.000Z

    This volume is one in a series of Sandia Software Guidelines intended for use in producing quality software within Sandia National Laboratories. In consonance with the IEEE Standards for software documentation, this volume provides guidance in the selection of an adequate document set for a software project and example formats for many types of software documentation. A tutorial on life cycle documentation is also provided. Extended document thematic outlines and working examples of software documents are available on electronic media as an extension of this volume.

  9. Software archeology: a case study in software quality assurance and design

    SciTech Connect (OSTI)

    Macdonald, John M [Los Alamos National Laboratory; Lloyd, Jane A [Los Alamos National Laboratory; Turner, Cameron J [COLORADO SCHOOL OF MINES

    2009-01-01T23:59:59.000Z

    Ideally, quality is designed into software, just as quality is designed into hardware. However, when dealing with legacy systems, demonstrating that the software meets required quality standards may be difficult to achieve. As the need to demonstrate the quality of existing software was recognized at Los Alamos National Laboratory (LANL), an effort was initiated to uncover and demonstrate that legacy software met the required quality standards. This effort led to the development of a reverse engineering approach referred to as software archaeology. This paper documents the software archaeology approaches used at LANL to document legacy software systems. A case study for the Robotic Integrated Packaging System (RIPS) software is included.

  10. Automatische stress tests voor software code werken uitstekend Hoe bepaal ik de kwaliteit van een stuk software? Net zoals bij banken, willen we software

    E-Print Network [OSTI]

    Al Hanbali, Ahmad

    stuk software? Net zoals bij banken, willen we software aan een stress test onderwerpen, en een rating

  11. Software: our quest for excellence. Honoring 50 years of software history, progress, and process

    SciTech Connect (OSTI)

    NONE

    1997-06-01T23:59:59.000Z

    The Software Quality Forum was established by the Software Quality Assurance (SQA) Subcommittee, which serves as a technical advisory group on software engineering and quality initiatives and issues for DOE`s quality managers. The forum serves as an opportunity for all those involved in implementing SQA programs to meet and share ideas and concerns. Participation from managers, quality engineers, and software professionals provides an ideal environment for identifying and discussing issues and concerns. The interaction provided by the forum contributes to the realization of a shared goal--high quality software product. Topics include: testing, software measurement, software surety, software reliability, SQA practices, assessments, software process improvement, certification and licensing of software professionals, CASE tools, software project management, inspections, and management`s role in ensuring SQA. The bulk of this document consists of vugraphs. Selected papers have been indexed separately for inclusion in the Energy Science and Technology Database.

  12. Software Challenges in Achieving Space Safety

    E-Print Network [OSTI]

    Leveson, Nancy G.

    Techniques developed for hardware reliability and safety do not work on software-intensive systems; software does not satisfy the assumptions underlying these techniques. The new problems and why the current approaches are ...

  13. A direct path to dependable software

    E-Print Network [OSTI]

    Jackson, Daniel

    2009-01-01T23:59:59.000Z

    What would it take to make software more dependable? Until now, most approaches have been indirect: some practices – processes, tools or techniques – are used that are believed to yield dependable software, and the argument ...

  14. An overview of software safety standards

    SciTech Connect (OSTI)

    Lawrence, J.D.

    1995-10-01T23:59:59.000Z

    The writing of standards for software safety is an increasingly important activity. This essay briefly describes the two primary standards-writing organizations, IEEE and IEC, and provides a discussion of some of the more interesting software safety standards.

  15. Global expansion strategies for software firms

    E-Print Network [OSTI]

    Yoden, Michihiko

    2014-01-01T23:59:59.000Z

    The business competition in the software industry is increasingly becoming a global competition. In this era with a fast-paced innovative environment, strategy plays an important role for managers in software companies in ...

  16. The Real Cost of Software Errors

    E-Print Network [OSTI]

    Zhivich, Michael A.

    Software is no longer creeping into every aspect of our lives - it's already there. In fact, failing to recognize just how much everything we do depends on software functioning correctly makes modern society vulnerable to ...

  17. TWRS systems engineering software configuration management plan

    SciTech Connect (OSTI)

    Porter, P.E.

    1996-10-09T23:59:59.000Z

    This plan delineates the requirements for control of software developed and supported by the Tank Waste Remediation System (TWRS) Technical Integration organization. The information contained in this plan shall assist employees involved with software modification and configuration control.

  18. Enterprise software : analysis of product strategies

    E-Print Network [OSTI]

    Boppana, Krishna S

    2007-01-01T23:59:59.000Z

    Since the invention of IBM 360, the first computing system about five decades ago, the processing and software capabilities have grown by leaps and have become major components of businesses. The software applications and ...

  19. Product management in software as a service

    E-Print Network [OSTI]

    Rajasekharan, Karthikeyan

    2012-01-01T23:59:59.000Z

    Software product management within Software as a Service is key domain of interest given the recent advances in Cloud Computing. This thesis explores the product management challenges within this domain. It makes a ...

  20. Dealing with software: the research data issues 

    E-Print Network [OSTI]

    Hong, Neil Chue

    2014-08-26T23:59:59.000Z

    Software underpins much of the scientific research undertaken today. As well as the “traditional” use of software for modelling and simulation, it is used to manage and control instruments, and analyse and visualise data. This permeation of the use...

  1. Table of contents 1 What is software architecture? ......................................................................... 1

    E-Print Network [OSTI]

    Dustdar, Schahram

    Table of contents 1 What is software architecture? ......................................................................... 1 1.1 Software architecture as abstraction ............................................................ 2 1.2 Software architecture as blueprint

  2. @ work' video segment features Robotic Software Engineer

    ScienceCinema (OSTI)

    Idaho National Laboratory

    2010-01-08T23:59:59.000Z

    @ work highlights Idaho National Laboratory employees and the jobs they perform.This segment features Robotic Software Engineer Miles Walton.

  3. SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM: Requirements...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Requirements Management Checklist SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM: Requirements Management Checklist The following checklist is intended to provide system owners,...

  4. SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM: Preacceptance...

    Broader source: Energy.gov (indexed) [DOE]

    PROGRAM: Preacceptance Checklist Security Issues SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM: Preacceptance Checklist Security Issues The following checklist is intended to...

  5. Optimization Online - Optimization Software and Modeling Systems ...

    E-Print Network [OSTI]

    Optimization Software and Modeling Systems Submissions - 2009. March 2009. Modeling Languages and Systems A Structure-Conveying Modelling Language ...

  6. Cost Model and Cost Estimating Software

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-28T23:59:59.000Z

    This chapter discusses a formalized methodology is basically a cost model, which forms the basis for estimating software.

  7. VMS software for the Jorway-411 interface

    SciTech Connect (OSTI)

    Dorries, T.; Moore, C.; Pordes, R.; White, V.

    1987-05-01T23:59:59.000Z

    This report describes a Software Package used to access CAMAC through the Jorway-411 Interface, for use on VAX/VMS systems. The software can be used to access parallel and/or serial CAMAC branch highways, and multiple Jorways may be connected to the VAX UNIBUS or MicroVax QBUS. The software available includes a VAX/VMS device driver for the JORWAY-411 and support routines and programs that access the driver. The software is accompanied by extensive documentation.

  8. Software Architecture Evolution Olivier Barais1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Software Architecture Evolution Olivier Barais1 , Anne Franc¸oise Le Meur2 , Laurence Duchien2 and detailed treatment of the var- ious state-of-the-art approaches to evolving software architectures. Furthermore, we discuss one particular framework for software architecture evolution in more detail. 1

  9. University of Paderborn Software Engineering Group

    E-Print Network [OSTI]

    Kindler, Ekkart

    University of Paderborn Software Engineering Group 1 Subversion Configuration with Eclipse Softwaretechnikpraktikum 2006 #12;University of Paderborn Software Engineering Group 2 Installing SubclipseInstalling Subclipse Find and install new feature Use the Subclipse update site #12;University of Paderborn Software

  10. APPLYING HYPERTEXT STRUCTURES TO SOFTWARE DOCUMENTATION

    E-Print Network [OSTI]

    French, James C.

    with automating the management of software documentation to better increase its utility. We describe a prototype system, SLEUTH, currently under investigation as a vehicle for software documentation managementAPPLYING HYPERTEXT STRUCTURES TO SOFTWARE DOCUMENTATION James C. French 1 , John C. Knight, Allison

  11. APPLYING HYPERTEXT STRUCTURES TO SOFTWARE DOCUMENTATION

    E-Print Network [OSTI]

    French, James C.

    the management of software documentation to better increase its utility. We describe a prototype system, SLEUTH, currently under investigation as a vehicle for software documentation management. The prototype maintains & Management," Vol. 33, No. 2, pp. 219-231, 1997. #12;Applying Hypertext Structures to Software Documentation

  12. Logical Structure Extraction from Software Requirements Documents

    E-Print Network [OSTI]

    Czarnecki, Krzysztof

    Documents I. INTRODUCTION Requirements management (RM) tools store and manipu- late software requirementsLogical Structure Extraction from Software Requirements Documents Rehan Rauf, Michal Antkiewicz,mantkiew,kczarnec}@gsd.uwaterloo.ca Abstract--Software requirements documents (SRDs) are often authored in general-purpose rich-text editors

  13. Mathematical Methods System and Software Engineering*

    E-Print Network [OSTI]

    Mathematical Methods in System and Software Engineering* Manfred Broy Institut für Informatik. By this, we demonstrate how software engineering methods can be backed up by mathematics. We discuss the techniques and methods used in practice in software engineering and the formal techniques worked out

  14. IBM Software Thought Leadership White Paper

    E-Print Network [OSTI]

    IBM Software Thought Leadership White Paper August 2011 Transforming software delivery with cloud #12;2 Transforming software delivery with cloud Contents 2 Cloud: An opportunity 2 Increasing pressure and centralizing ALM and developer desktops 5 Concluding thoughts on the cloud Cloud: An opportunity The world

  15. SOFTWARE ENGINEERING January Entry, 120 credit program

    E-Print Network [OSTI]

    Doedel, Eusebius

    to Formal Methods for Software Engineering 3 SOEN 341 Software Process 3 Basic Science Year 3 Fall Course Principles and Economics 3 ENGR 391 Numerical Methods in Engineering 3 Note: A minimum of 7 credits from COENSOFTWARE ENGINEERING January Entry, 120 credit program Real-Time, Embedded, and Avionics Software

  16. SOFTWARE ENGINEERING January Entry, 120 credit program

    E-Print Network [OSTI]

    Doedel, Eusebius

    Methods for Software Engineering 3 SOEN 341 Software Process 3 Basic Science Year 3 Fall Course Number Project 4 ENGR 301 Engineering Management Principles and Economics 3 SOEN 321 Information Systems SecuritySOFTWARE ENGINEERING January Entry, 120 credit program Computer Games Option Last revised: March

  17. CSP 587: Software Quality Management S. Kan, Software Quality engineering, Addison-Wesley.

    E-Print Network [OSTI]

    Heller, Barbara

    hours · Quality Appraisal Programs 5 hours SEI's Capability Maturity Model ISO 9000 Total 45 hours CSPCSP 587: Software Quality Management Texts S. Kan, Software Quality engineering, Addison-Wesley. Objectives Students will learn methods of software quality management. This will include exposure to software

  18. Software

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    improving the KIVA internal combustion engine modeling tool to help automotive engines be more fuel efficient. A free version of KIVA can be downloaded through FCI's...

  19. Software

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebookScholarship Fund3Biology| Nationalof EnergyMitchmaterials

  20. Honeywell Modular Automation System Computer Software Documentation

    SciTech Connect (OSTI)

    STUBBS, A.M.

    2000-12-04T23:59:59.000Z

    The purpose of this Computer Software Document (CSWD) is to provide configuration control of the Honeywell Modular Automation System (MAS) in use at the Plutonium Finishing Plant (PFP). This CSWD describes hardware and PFP developed software for control of stabilization furnaces. The Honeywell software can generate configuration reports for the developed control software. These reports are described in the following section and are attached as addendum's. This plan applies to PFP Engineering Manager, Thermal Stabilization Cognizant Engineers, and the Shift Technical Advisors responsible for the Honeywell MAS software/hardware and administration of the Honeywell System.

  1. The emerging market for Web-based enterprise software

    E-Print Network [OSTI]

    Göldi, Andreas (Andreas Jakob)

    2007-01-01T23:59:59.000Z

    Web-based enterprise software - sometimes referred to as "Software as a Service" (SaaS) or "on demand software" - is a major wave of innovation that introduces a new technical and economic model to enterprise software. The ...

  2. Software reliability models for critical applications

    SciTech Connect (OSTI)

    Pham, H.; Pham, M.

    1991-12-01T23:59:59.000Z

    This report presents the results of the first phase of the ongoing EG G Idaho, Inc. Software Reliability Research Program. The program is studying the existing software reliability models and proposes a state-of-the-art software reliability model that is relevant to the nuclear reactor control environment. This report consists of three parts: (1) summaries of the literature review of existing software reliability and fault tolerant software reliability models and their related issues, (2) proposed technique for software reliability enhancement, and (3) general discussion and future research. The development of this proposed state-of-the-art software reliability model will be performed in the second place. 407 refs., 4 figs., 2 tabs.

  3. Software reliability models for critical applications

    SciTech Connect (OSTI)

    Pham, H.; Pham, M.

    1991-12-01T23:59:59.000Z

    This report presents the results of the first phase of the ongoing EG&G Idaho, Inc. Software Reliability Research Program. The program is studying the existing software reliability models and proposes a state-of-the-art software reliability model that is relevant to the nuclear reactor control environment. This report consists of three parts: (1) summaries of the literature review of existing software reliability and fault tolerant software reliability models and their related issues, (2) proposed technique for software reliability enhancement, and (3) general discussion and future research. The development of this proposed state-of-the-art software reliability model will be performed in the second place. 407 refs., 4 figs., 2 tabs.

  4. The Software Factory: Integrating CASE Technologies to Improve Productivity

    E-Print Network [OSTI]

    Menendez, Jose

    This report addresses the use of computer-aided software engineering (CASE) technology for the development of aircraft software.

  5. Software Evolution: A Road Map Vclav T. Rajlich

    E-Print Network [OSTI]

    of software evolution, and problems of software evolution can be solved by research of software change block of software evolution is software change. The research aiming at individual software change has and prepare for the obvious. In our daily life, we can buy car insurance before a car accident, or we can pack

  6. GENI: Grid Hardware and Software

    SciTech Connect (OSTI)

    None

    2012-01-09T23:59:59.000Z

    GENI Project: The 15 projects in ARPA-E’s GENI program, short for “Green Electricity Network Integration,” aim to modernize the way electricity is transmitted in the U.S. through advances in hardware and software for the electric grid. These advances will improve the efficiency and reliability of electricity transmission, increase the amount of renewable energy the grid can utilize, and provide energy suppliers and consumers with greater control over their power flows in order to better manage peak power demand and cost.

  7. AIRMaster+ Software | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2,AUDITCaliforniaWeifangwiki Home Jweers'sAIRMaster+ Software Jump to:

  8. Aclara Software | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-fTriWildcat 1AMEE Jump to: navigation,Barriers toAclara Software Jump to:

  9. Software | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclearHomelandMultivariateSite Map Main Menu AboutsmrSocialSoftware

  10. Safesky Software | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-f < RAPID‎ |Rippey Jump to:WY) JumpLandSRT JumpSMUDSafesky Software

  11. CIMx Software | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2,AUDIT REPORT Americium/CuriumAguaBBBWind-BrizaHKC Wind PowerCIMx Software

  12. Elite Software | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model,DOEHazel Crest, Illinois:EdinburghEldoradoElectronVault JumpLabs,Elite Software

  13. A software framework for image processing

    SciTech Connect (OSTI)

    Garren, D.A. [Raytheon E-Systems, Garland Operations, TX (United States)

    1996-12-31T23:59:59.000Z

    There exists a great potential for the development of customizable image processing software that accommodates a wide variety of customers and applications. Such software would be able to read and process the many common image file formats, in addition to allowing the incorporation of those that have been custom made. Furthermore, the software would have the ability to handle the infinite variety of accompanying support files, which can contain quite different information for various applications and customers. A software framework designed to read and process this wide variety of input image files and support files would be extremely valuable. This paper develops the foundation of this proposed software architecture by using a composite of several common design patterns. Any similar software framework required to process input information and corresponding algorithms can benefit from the exposition of these composite design structures.

  14. Scientific Software Projects | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    obtain the orientation or strain information within an inhomogeneous material Grains in a polycrystalline sample MIDAS: Microstructural Imaging using Diffraction Analysis Software...

  15. IT Specialist (Systems Analysis/Applications Software)

    Broader source: Energy.gov [DOE]

    The incumbent in this position will serve as a Senior IT Specialist (Systems Analysis/Applications Support) and Technical Lead in the Enterprise Applications Support organization of Software...

  16. Chimera: Hypertext for Heterogeneous Software Environments

    E-Print Network [OSTI]

    Whitehead, James

    Chimera: Hypertext for Heterogeneous Software Environments Kenneth M. Anderson, Richard N. Taylor the approach and presents an architecture which supports it. Experience with the Chimera prototype and its

  17. SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM: Project Tracking...

    Office of Environmental Management (EM)

    Project Tracking Checklist SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM: Project Tracking Checklist The following checklist is intended to provide system owners, project...

  18. SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM: Project Planning...

    Broader source: Energy.gov (indexed) [DOE]

    PROGRAM: Project Planning Checklist SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM: Project Planning Checklist The following checklist is intended to provide system owners, project...

  19. SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM : Acceptance Checklist...

    Broader source: Energy.gov (indexed) [DOE]

    PROGRAM : Acceptance Checklist SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM : Acceptance Checklist The following checklist is intended to provide system owners, project managers,...

  20. Safety Software Quality Assurance Functional Area Qualification...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    72-2011, Safety Software Quality Assurance Functional Area Qualification Standard by Diane Johnson This SSQA FAQS identifies the minimum technical competency requirements for DOE...

  1. Quality Assurance Specialist (Safety Software Qualtiy Assurance)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position performs safety software quality assurance oversight of all activities that support the Waste Isolation Pilot Plant (WIPP) compliance with environmental,...

  2. Software design for panoramic astronomical pipeline processing

    E-Print Network [OSTI]

    Lior Shamir; Robert J. Nemiroff; David O. Torrey; Wellesley E. Pereira

    2005-11-23T23:59:59.000Z

    We describe the software requirement and design specifications for all-sky panoramic astronomical pipelines. The described software aims to meet the specific needs of super-wide angle optics, and includes cosmic-ray hit rejection, image compression, star recognition, sky opacity analysis, transient detection and a web server allowing access to real-time and archived data. The presented software is being regularly used for the pipeline processing of 11 all-sky cameras located in some of the world's premier observatories. We encourage all-sky camera operators to use our software and/or our hosting services and become part of the global Night Sky Live network.

  3. Collaboration Topics - System Software | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    System Software | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  4. Development of a Software SecurityAssessment Instrument to Reduce Software SecurityRisk

    E-Print Network [OSTI]

    Bishop, Matt

    system, has vulnerabilities. (SAT) for use in the software development and maintenance life cycle throughout the sofhvare development and maintenance life cycle. The. security assessment instrument includes security assessment for use in the software development and maintenance life cycle. Currently

  5. Software Studies in action: Open Source and Free Software in Brazil

    E-Print Network [OSTI]

    da Silva, Cicero Inacio; de Almeida, Jane

    2009-01-01T23:59:59.000Z

    Open Source and Free Software in Brazil Cicero Inacio daSilva Software Studies Brazil Avenida Angelica, 1905 SãoPaulo, SP 01227-200, Brazil Jane de Almeida Mackenzie

  6. FLOWTRAN-TF software design

    SciTech Connect (OSTI)

    Aleman, S.E.; Flach, G.P.; Hamm, L.L.; Lee, S.Y.; Smith, F.G. III.

    1993-02-01T23:59:59.000Z

    FLOWTRAN-TF was created to analyze an individual Mk22 fuel assembly during a large break Loss Of Coolant Accident (LOCA) scenario involving the Savannah River Site K-reactor after the initial few seconds of the transient. During the initial few seconds reactor cooling is limited by the static or Ledinegg flow instability phenomenon. The predecessor FLOWTRAN code was developed to analyze this portion of a LOCA. In the several seconds following the break, a significant fraction of the reactor coolant inventory leaks out the break, Emergency Cooling System (ECS) flow is initiated, and air enters the primary coolant circulation loops. Reactor fuel assemblies are cooled by a low flowrate air-water downflow. Existing commercial nuclear industry thermal-hydraulic codes were judged inadequate for detailed modeling of a Mk22 fuel assembly because the application involves a ribbed annular geometry, low pressure, downflow and an air-water mixture. FLOWTRAN-TF is a two-phase thermal-hydraulics code of similar technology to existing commercial codes such as RELAP and TRAC but customized for Savannah River Site applications. The main features and capabilities of FLOWTRAN-TF are detailed Mk22 fuel assembly ribbed annular geometry; conjugate heat transfer; detailed neutronic power distribution; three-dimensional heat conduction in Mk22 fuel and target tubes; two-dimensional coolant flow in channels (axial, azimuthal); single-phase and/or two-phase fluid (gas, liquid and/or gas-liquid); two-component (air, water); constitutive models applicable to low pressure air-water downflow in ribbed annular channels. The design of FLOWTRAN-TF is described in detail in this report which serves as the Software Design Report in accordance with Quality Assurance Procedure IV-4, Rev. 0 Software Design and Implementation'' in the 1Q34 manual.

  7. FLOWTRAN-TF software design

    SciTech Connect (OSTI)

    Aleman, S.E.; Flach, G.P.; Hamm, L.L.; Lee, S.Y.; Smith, F.G. III

    1993-02-01T23:59:59.000Z

    FLOWTRAN-TF was created to analyze an individual Mk22 fuel assembly during a large break Loss Of Coolant Accident (LOCA) scenario involving the Savannah River Site K-reactor after the initial few seconds of the transient. During the initial few seconds reactor cooling is limited by the static or Ledinegg flow instability phenomenon. The predecessor FLOWTRAN code was developed to analyze this portion of a LOCA. In the several seconds following the break, a significant fraction of the reactor coolant inventory leaks out the break, Emergency Cooling System (ECS) flow is initiated, and air enters the primary coolant circulation loops. Reactor fuel assemblies are cooled by a low flowrate air-water downflow. Existing commercial nuclear industry thermal-hydraulic codes were judged inadequate for detailed modeling of a Mk22 fuel assembly because the application involves a ribbed annular geometry, low pressure, downflow and an air-water mixture. FLOWTRAN-TF is a two-phase thermal-hydraulics code of similar technology to existing commercial codes such as RELAP and TRAC but customized for Savannah River Site applications. The main features and capabilities of FLOWTRAN-TF are detailed Mk22 fuel assembly ribbed annular geometry; conjugate heat transfer; detailed neutronic power distribution; three-dimensional heat conduction in Mk22 fuel and target tubes; two-dimensional coolant flow in channels (axial, azimuthal); single-phase and/or two-phase fluid (gas, liquid and/or gas-liquid); two-component (air, water); constitutive models applicable to low pressure air-water downflow in ribbed annular channels. The design of FLOWTRAN-TF is described in detail in this report which serves as the Software Design Report in accordance with Quality Assurance Procedure IV-4, Rev. 0 ``Software Design and Implementation`` in the 1Q34 manual.

  8. 2001-2003 MPI Software Technology, Inc.. MPI Software Technology, Inc.

    E-Print Network [OSTI]

    Kepner, Jeremy

    © 2001-2003 MPI Software Technology, Inc.. MPI Software Technology, Inc. VSIPL for Diverse Architectures (Pentium 4 to DSPs) Anthony Skjellum Brian Chase Wenhao Wu September 23, 2003 #12;© 2001-2003 MPI · Customers have started asking for non-G4/Altivec alternatives! #12;© 2001-2003 MPI Software Technology, Inc

  9. Copyright (c) Cem Kaner, Automated Testing. 1 Software Test Automation:Software Test Automation

    E-Print Network [OSTI]

    Copyright (c) Cem Kaner, Automated Testing. 1 Software Test Automation:Software Test Automation: A RealA Real--World ProblemWorld Problem Cem Kaner, Ph.D., J.D. #12;Copyright (c) Cem Kaner, Automated Testing. 2 This TalkThis Talk The most widely used class of automated testing tools leads senior software

  10. Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 23 Slide 1 Software cost estimation

    E-Print Network [OSTI]

    Scharff, Christelle

    of software costing and pricing l To describe three metrics for software productivity assessment l To explain and pricing l Estimates are made to discover the cost, to the developer, of producing a software system l There is not a simple relationship between the development cost and the price charged to the customer l Broader

  11. USING UML IN A NON-SOFTWARE DESIGN TASK: CREATING AN ELECTRONIC SOFTWARE ENGINEERING HANDBOOK

    E-Print Network [OSTI]

    Dascalu, Sergiu

    USING UML IN A NON-SOFTWARE DESIGN TASK: CREATING AN ELECTRONIC SOFTWARE ENGINEERING HANDBOOK to future developments are also presented in the paper. Keywords: software engineering, electronic handbook & Engineering University of Nevada, Reno, USA {dascalus, muhanna, sreed}@cse.unr.edu 2 Department of Computer

  12. Submitted to IEEE Software 2009 -Special issue on "Software Development for Embedded Systems"

    E-Print Network [OSTI]

    Controller) ESF-CCS #12;Existing Software Development ProcessExisting Software Development Process F M t NPP i K· For Most NPPs in Korea (e.g. Wolsung NPP) 6 #12;Proposed Software Development Process experts ­ 4 constructs · SDT (Structured Decision Table) · FSM (Finite State Machine) · TTS (Timed

  13. Managing Software Development for Global Health

    E-Print Network [OSTI]

    Anderson, Richard

    too much refrigeration. #12;Cold chain description · Storage of vaccines from national level to pointManaging Software Development for Global Health Richard Anderson #12;Outline · PATH · The Cold and was in serious trouble · Applying software industry best practices is leading to a positive outcome 3/10/2010 CSE

  14. Software-Controlled Architectures for Low Energy

    E-Print Network [OSTI]

    Science #12;3/8/1999 SCALE 2 Improve Energy-Efficiency of Programmable Processors by Re-Examining HardwareSCALE: Software-Controlled Architectures for Low Energy Krste Asanovic MIT Laboratory for Computer-Software Interface Energy- Conscious Compilers Energy-Energy- ExposedExposed ArchitecturesArchitectures SCALE Project

  15. Software Analysis for Security Spiros Mancoridis

    E-Print Network [OSTI]

    Mancoridis, Spiros

    of the processes, practices, and technolo- gies that can help software maintenance engineers improve the security of software systems. A particular emphasis is placed on validating security architectures, verifying- erating system mechanisms that impose rules on untrusted programs (e.g., role-based access control), anti

  16. Insulin Pump Software Certification Yihai Chen1,

    E-Print Network [OSTI]

    Lawford, Mark

    Insulin Pump Software Certification Yihai Chen1, , Mark Lawford2, , Hao Wang2, , and Alan Wassyng2 for Software Certification McMaster University, Hamilton, Ontario, Canada Abstract. The insulin pump. Malfunction of the insulin pump will endanger the user's life. All countries impose some regula- tion

  17. Chimera: Hypermedia for Heterogeneous Software Development Environments

    E-Print Network [OSTI]

    Whitehead, James

    1 of 31 Chimera: Hypermedia for Heterogeneous Software Development Environments Abstract Emerging of "Chimera: Hypertext for Heterogeneous Software Environments," which appeared in the proceedings of ECHT'94 the approach employed by the Chimera open hypermedia system to address this research area, and also serves

  18. Intelligent Systems Software for Unmanned Air Vehicles

    E-Print Network [OSTI]

    classes of vehicles including autonomous underwater vehicles, autonomous ground vehicles, and unmanned airIntelligent Systems Software for Unmanned Air Vehicles Gregory L. Sinsley , Lyle N. Long , Albert F describes a software architecture for mission-level control of autonomous unmanned air vehicles (UAVs

  19. Toward Feature Engineering of Software Systems

    E-Print Network [OSTI]

    Wolf, Alexander L.

    the user and the developer perspectives leads to difficulties in producing successful software systems. Developers are focused on the solution domain, where the system's lifecycle artifacts are key. Presently throughout the software lifecycle and across the problem and solution domains. The goal of the paper

  20. Predicting software defects in varying development lifecycles

    E-Print Network [OSTI]

    Bae, Doo-Hwan

    Predicting software defects in varying development lifecycles using Bayesian nets Information and Software Technology (2007) Norman Fenton, Martin Neil, William March, Peter HyeonJeong Kim KAIST SE LAB #12;Contents Introduction Overall approach Analyzing the lifecycle Modeling the defect prediction

  1. Foundations for Feature Engineering of Software Systems

    E-Print Network [OSTI]

    Wolf, Alexander L.

    the user and the developer perspectives leads to difficulties in producing successful software systems. Developers are focused on the solution domain, where the system's lifecycle artifacts are key. Presently the software lifecycle and across the problem and solution domains. We present a model of lifecycle artifacts

  2. SAMPLE: software for VAX FORTRAN execution timing

    SciTech Connect (OSTI)

    Lowe, L.H.

    1983-01-01T23:59:59.000Z

    SAMPLE is a set of subroutines in use at the Los Alamos National Laboratory for collecting CPU timings of various FORTRAN program sections - usually individual subroutines. These measurements have been useful in making programs run faster. The presentation includes a description of the software and examples of its use. The software is available on the directory (SAMPLE) of the VAX SIG tape.

  3. A Foundation for Verified Software Development Systems

    E-Print Network [OSTI]

    Kreitz, Christoph

    engineering techniques cannot provide stringent guarantees on software reliability only very few computer is adopted in safety-critical areas such as aircraft and nuclear reactors. More reliable methods supporting to develop powerful, flexible, and reliable systems for knowledge-based software development. Keywords

  4. Component Metadata for Software Engineering Tasks

    E-Print Network [OSTI]

    Harrold, Mary Jean

    functions. In particular, she has no source code, no reliability or safety information, no in- formationComponent Metadata for Software Engineering Tasks Alessandro Orso1 , Mary Jean Harrold1 , and David of an application developer who wants to perform two different software engineering tasks on her application: gen

  5. Guide to Preventing Computer Software Piracy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12T23:59:59.000Z

    Guide to Preventing Computer Software Piracy It is the intent of the Department of Energy (DOE) to issue guidance in accordance with Federal CIO Council recommendations and in compliance with Executive Order 13103. The guidance in this document is based on the CIO Council's recommendations in reference to computer software piracy, and applies to all DOE elements. Canceled by DOE N 205.18

  6. Software Analytics: Achievements and Challenges Dongmei Zhang

    E-Print Network [OSTI]

    Xie, Tao

    , USA Email: xie@csc.ncsu.edu Abstract--A huge wealth of various data exist in the practice of software insightful and actionable information; such information is used for completing various tasks around software and challenges of research and practice on principles, techniques, and applications of soft- ware analytics

  7. A Product Software Knowledge Infrastructure for

    E-Print Network [OSTI]

    Utrecht, Universiteit

    1 A Product Software Knowledge Infrastructure for Situational Capability Maturation: Vision and Case Studies in Product Management Inge van de Weerd, Johan Versendaal and Sjaak Brinkkemper Department-3275 #12;2 A Product Software Knowledge Infrastructure for Situational Capability Maturation: Vision

  8. SOFTWARE ENGINEERING September Entry, 120 credit program

    E-Print Network [OSTI]

    Doedel, Eusebius

    Capstone Software Engineering Design Project 4 ENGR 301 Engineering Management Principles and Economics 3SOFTWARE ENGINEERING September Entry, 120 credit program General Program Last revised: March 2013 Applications 3 Basic Science Year 2 Fall Course Number Course Name Credit COMP 348 Principles of Programming

  9. SOFTWARE RELATEDSOFTWARE-RELATED MEASUREMENT:MEASUREMENT

    E-Print Network [OSTI]

    SOFTWARE RELATEDSOFTWARE-RELATED MEASUREMENT:MEASUREMENT: RISKS AND OPPORTUNITIES CEM KANER, J and lazy? Most managers who I know have tried at least oney g measurement program--and abandoned them: · Measurement theory and how it applies to software development metrics (which, at their core, are typically

  10. THE SOFTWARE KNOWLEDGE BASE Bertrand Meyer

    E-Print Network [OSTI]

    Meyer, Bertrand

    knowledge base" keeps track of software components and their properties; these properties are described, implementation, testing, project management). The use of the binary relational model for describing the properties of software is hacked by a theoretical study of the relations and constraints which play

  11. The GRAVITY instrument software / High-level software

    E-Print Network [OSTI]

    Burtscher, Leonard; Ott, Thomas; Kok, Yitping; Yazici, Senol; Anugu, Narsireddy; Dembet, Roderick; Fedou, Pierre; Lacour, Sylvestre; Ott, Juergen; Paumard, Thibaut; Lapeyrere, Vincent; Kervella, Pierre; Abuter, Roberto; Pozna, Eszter; Eisenhauer, Frank; Blind, Nicolas; Genzel, Reinhard; Gillessen, Stefan; Hans, Oliver; Haug, Marcus; Haussmann, Frank; Kellner, Stefan; Lippa, Magdalena; Pfuhl, Oliver; Sturm, Eckhard; Weber, Johannes; Amorim, Antonio; Brandner, Wolfgang; Rousselet-Perraut, Karine; Perrin, Guy S; Straubmeier, Christian; Schoeller, Markus

    2015-01-01T23:59:59.000Z

    GRAVITY is the four-beam, near- infrared, AO-assisted, fringe tracking, astrometric and imaging instrument for the Very Large Telescope Interferometer (VLTI). It is requiring the development of one of the most complex instrument software systems ever built for an ESO instrument. Apart from its many interfaces and interdependencies, one of the most challenging aspects is the overall performance and stability of this complex system. The three infrared detectors and the fast reflective memory network (RMN) recorder contribute a total data rate of up to 20 MiB/s accumulating to a maximum of 250 GiB of data per night. The detectors, the two instrument Local Control Units (LCUs) as well as the five LCUs running applications under TAC (Tools for Advanced Control) architecture, are interconnected with fast Ethernet, RMN fibers and dedicated fiber connections as well as signals for the time synchronization. Here we give a simplified overview of all subsystems of GRAVITY and their interfaces and discuss two examples of...

  12. Software engineering practices for control system reliability

    SciTech Connect (OSTI)

    S. K. Schaffner; K. S White

    1999-04-01T23:59:59.000Z

    This paper will discuss software engineering practices used to improve Control System reliability. The authors begin with a brief discussion of the Software Engineering Institute's Capability Maturity Model (CMM) which is a framework for evaluating and improving key practices used to enhance software development and maintenance capabilities. The software engineering processes developed and used by the Controls Group at the Thomas Jefferson National Accelerator Facility (Jefferson Lab), using the Experimental Physics and Industrial Control System (EPICS) for accelerator control, are described. Examples are given of how their procedures have been used to minimized control system downtime and improve reliability. While their examples are primarily drawn from their experience with EPICS, these practices are equally applicable to any control system. Specific issues addressed include resource allocation, developing reliable software lifecycle processes and risk management.

  13. The safety implications of emerging software paradigms

    SciTech Connect (OSTI)

    Suski, G.J.; Persons, W.L.; Johnson, G.L.

    1994-10-01T23:59:59.000Z

    This paper addresses some of the emerging software paradigms that may be used in developing safety-critical software applications. Paradigms considered in this paper include knowledge-based systems, neural networks, genetic algorithms, and fuzzy systems. It presents one view of the software verification and validation activities that should be associated with each paradigm. The paper begins with a discussion of the historical evolution of software verification and validation. Next, a comparison is made between the verification and validation processes used for conventional and emerging software systems. Several verification and validation issues for the emerging paradigms are discussed and some specific research topics are identified. This work is relevant for monitoring and control at nuclear power plants.

  14. SAPHIRE 8 Software Project Plan

    SciTech Connect (OSTI)

    Curtis L.Smith; Ted S. Wood

    2010-03-01T23:59:59.000Z

    This project is being conducted at the request of the DOE and the NRC. The INL has been requested by the NRC to improve and maintain the Systems Analysis Programs for Hands-on Integrated Reliability Evaluation (SAPHIRE) tool set concurrent with the changing needs of the user community as well as staying current with new technologies. Successful completion will be upon NRC approved release of all software and accompanying documentation in a timely fashion. This project will enhance the SAPHIRE tool set for the user community (NRC, Nuclear Power Plant operations, Probabilistic Risk Analysis (PRA) model developers) by providing improved Common Cause Failure (CCF), External Events, Level 2, and Significance Determination Process (SDP) analysis capabilities. The SAPHIRE development team at the Idaho National Laboratory is responsible for successful completion of this project. The project is under the supervision of Curtis L. Smith, PhD, Technical Lead for the SAPHIRE application. All current capabilities from SAPHIRE version 7 will be maintained in SAPHIRE 8. The following additional capabilities will be incorporated: • Incorporation of SPAR models for the SDP interface. • Improved quality assurance activities for PRA calculations of SAPHIRE Version 8. • Continue the current activities for code maintenance, documentation, and user support for the code.

  15. Management information systems software evaluation

    SciTech Connect (OSTI)

    Al-Tunisi, N.; Ghazzawi, A.; Gruyaert, F.; Clarke, D. [Saudi Aramco, Dhahran (Saudi Arabia). Process and Control Systems Dept.

    1995-11-01T23:59:59.000Z

    In November 1993, Saudi Aramco management endorsed a proposal to coordinate the development of the Management Information Systems (MISs) of four concurrent projects for its facilities Controls Modernization Program. The affected projects were the Ras Tanura Refinery Upgrade Project, the Abqaiq Plant Controls Modernization and the Shedgum and Uthmaniyah Gas plants Control Upgrade Projects. All of these projects had a significant requirement of MISs in their scope. Under the leadership of the Process and Control Systems Department, and MIS Coordination Team was formed with representatives of several departments. An MIS Applications Evaluation procedure was developed based on the Kepner Tregoe Decisions Analysis Process and general questionnaires were sent to over a hundred potential Vendors. The applications were divided into several categories, such as: Data Capture and Historization, Human User Interface, Trending, Reporting, Graphic Displays, Data Reconciliation, Statistical Analysis, Expert Systems, Maintenance Applications, Document Management and Operations Planning and Scheduling. For each of the MIS Application areas, detailed follow-up questionnaires were used to short list the candidate products. In May and June 1994, selected Vendors were invited to Saudi Arabia for an Exhibition which was open to all Saudi Aramco employees. In conjunction with this, the Vendors were subjected to a rigorous product testing exercise by independent teams of testers. The paper will describe the methods used and the lessons learned in this extensive software evaluation phase, which was a first for Saudi Aramco.

  16. Software Roadmap to Plug and Play Petaflop/s

    E-Print Network [OSTI]

    2006-01-01T23:59:59.000Z

    1993). LBNL Software Roadmap to Plug and Play Petaflop/s 7.16, 2005. LBNL Software Roadmap to Plug and Play Petaflop/sChombo. LBNL Software Roadmap to Plug and Play Petaflop/s

  17. Master Pump Shutdown MPS Software Quality Assurance Plan (SQAP)

    SciTech Connect (OSTI)

    BEVINS, R.R.

    2000-09-20T23:59:59.000Z

    The MPSS Software Quality Assurance (SQAP) describes the tools and strategy used in the development of the MPSS software. The document also describes the methodology for controlling and managing changes to the software.

  18. Understanding the scientific software ecosystem and its impact

    E-Print Network [OSTI]

    Howison, James

    Understanding the scientific software ecosystem and its impact: current and future measures James the information needs of domain scientists, software component producers, infrastructure providers, and ecosystem conclude with policy recommendations #12;designed to improve insight into the scientific software ecosystem

  19. A Systematic Approach to Creating and Maintaining Software Documentation

    E-Print Network [OSTI]

    French, James C.

    and SODOS integrated database management systems with the software documentation associatedUVA A Systematic Approach to Creating and Maintaining Software Documentation Allison L. Powell CODE INTERFACE BROWSING INTERFACE STATUS FUTURE PLANS WHY SOFTWARE DOCUMENTATION AS AN APPLICATION AREA

  20. An MDA approach to tame component based software development

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    FMCO'03 An MDA approach to tame component based software development Jean-Marc Jézéquel, Olivier- ture (MDA) can be used in relation with component based software engineer- ing. A software component

  1. Alexander Felfernig & Gerald Steinbauer Institute for Software Technology

    E-Print Network [OSTI]

    Felfernig & Gerald Steinbauer Institute for Software Technology 10 Wissensverarbeitung 5 Uniform Cost Search for Software Technology 11 Wissensverarbeitung Generalization of bfs ­ Expand state with lowest related costsAlexander Felfernig & Gerald Steinbauer Institute for Software Technology 1 Wissensverarbeitung

  2. Software Interoperability Tools: Standardized Capability-Profiling Methodology ISO16100

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Software Interoperability Tools: Standardized Capability-Profiling Methodology ISO16100 Michiko, qwang@seu.ac.jp Abstract. The ISO 16100 series has been developed for Manufacturing software for developing general software applications including enterprise applications. In this paper, ISO 16100

  3. VMS software for the Jorway-411 Interface

    SciTech Connect (OSTI)

    Dorries, T.; Moore, C.; Pordes, R.; White, V.

    1987-08-01T23:59:59.000Z

    This reports on a Software Package to access CAMAC through the Jorway-411 Interface, for use on VAX/VMS systems. The software can be used to access parallel and/or serial CAMAC branch highways, and multiple Jorways may be connected to the VAX UNIBUS or Micro Vax QBUS. The software available includes a VAX/VMS device driver for the JORWAY-411 and support routines and programs that access the driver. The software is accompanied by extensive documentation. As discussed below, several of the packages originated from other institutions and have been enhanced by the Data Acquisition Software Group at Fermilab. The software package is in widespread use at Fermilab and over 20 other sites. The software can be run on any of the UNIBUS VAX-11 family of computers using a UNIBUS Jorway-411 to interface to CAMAC, or on a Microvax-II either interfaced to CAMAC through a Q-BUS Jorway-411, or through a Microverter and UNIBUS Jorway. The package includes facilities for performing CAMAC operations remotely. The VAX on which the user runs his or her program need not be directly connected to the Jorway. Server programs allow a VAX connected via DECNET or a PDP-11 connected via a DR11-W link to be the route for accessing the CAMAC hardware.

  4. Open source software development and maintenance: an exploratory analysis

    E-Print Network [OSTI]

    Raja, Uzma

    2009-06-02T23:59:59.000Z

    pervasive, software became commercialized (Feller and Fitzgerald 2002). In order to preserve the commercial value of software, companies started to deliver software as a black box, where the user could only access the output features, but the internal... the Free Software Foundation (http://www.fsf.org/fsf/fsf.html). People of similar interests and ideology started to develop software, which was available to users free of cost and with full access to the source code (MacCormack 2002). The software...

  5. Continuing engineering education for software engineering professionals

    SciTech Connect (OSTI)

    Davis, P.I.

    1992-02-19T23:59:59.000Z

    Designers of software for safety-critical applications are impelled to supplement their education through continuing engineering studies in the areas of requirements analysis, hazard identification, risk analysis, fault tolerance, failure modes, and psychology. Today's complex level of design is contributing to opportunities for catastrophic design errors in computer functions where failure of such functions is capable of causing injury and death. A syllabus of post-graduate, core studies within the curricula of five engineering specialties is suggested. Software Engineers are exhorted to undertake a professional, responsible role in safety-critical software design.

  6. Continuing engineering education for software engineering professionals

    SciTech Connect (OSTI)

    Davis, P.I.

    1992-02-19T23:59:59.000Z

    Designers of software for safety-critical applications are impelled to supplement their education through continuing engineering studies in the areas of requirements analysis, hazard identification, risk analysis, fault tolerance, failure modes, and psychology. Today`s complex level of design is contributing to opportunities for catastrophic design errors in computer functions where failure of such functions is capable of causing injury and death. A syllabus of post-graduate, core studies within the curricula of five engineering specialties is suggested. Software Engineers are exhorted to undertake a professional, responsible role in safety-critical software design.

  7. Nuclear Energy Advanced Modeling and Simulation (NEAMS) Software...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Software Verification and Validation (V&V) Plan Requirements Nuclear Energy Advanced Modeling and Simulation (NEAMS) Software Verification and Validation (V&V) Plan Requirements...

  8. Improving Combustion Software to Solve Detailed Chemical Kinetics...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Combustion Software to Solve Detailed Chemical Kinetics for HECC Improving Combustion Software to Solve Detailed Chemical Kinetics for HECC 2012 DOE Hydrogen and Fuel Cells Program...

  9. NMMSS Software Quality Assurance Plan | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Quality Assurance Plan The Software Quality Assurance Plan (SQAP) for the Nuclear Materials Management and Safeguard System (NMMSS) software upgrade project (an actual DOE...

  10. EPA-GHG Inventory Targeted Data Collection Strategies and Software...

    Open Energy Info (EERE)

    EPA-GHG Inventory Targeted Data Collection Strategies and Software Tools (Redirected from US EPA GHG Inventory Targeted Data Collection Strategies and Software Tools) Jump to:...

  11. avionics software system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Summary: ADAGE is a project to define and realize a domain-specific software architecture (DSSA) technology for assisting the development of avionics software. The central...

  12. Software Quality Assurance Plan Example | Department of Energy

    Energy Savers [EERE]

    Assurance Plan Example Software Quality Assurance Plan Example An example of a software quality assurance plan developed from an actual DOE project SQA plan based on DOE G...

  13. In Silico Identification Software (ISIS): A Machine Learning...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Silico Identification Software (ISIS): A Machine Learning Approach to Tandem Mass Spectral Identification of Lipids. In Silico Identification Software (ISIS): A Machine Learning...

  14. aplicando software educativo: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    instruction- level Pratt, Vaughan 62 Antivirus software Spyware protection Renewable Energy Websites Summary: Antivirus software Spyware protection Web browsers File transfer...

  15. analysis software carimas: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Abhik 22 Towards the Analysis of Transactional Software Nicholas Kidd1 Renewable Energy Websites Summary: Towards the Analysis of Transactional Software Nicholas Kidd1 ,...

  16. Collecting Feedback During Software Engineering Experiments

    E-Print Network [OSTI]

    Karahasanovic, A.; Anda, B.; Arisholm, E.; Hove, S.E.; Jorgensen, M.; Sjoberg, D.; Welland, R.; Empirical Software Engineering 10(2) pp 113-147 Springer [More Details

    Karahasanovic,A. Anda,B. Arisholm,E. Hove,S.E. Jorgensen,M. Sjoberg,D. Welland,R. Empirical Software Engineering 10(2) pp 113-147 Springer

  17. DEVELOPMENT OF A SOFTWARE DESIGN TOOL FOR

    Broader source: Energy.gov [DOE]

    This project focuses on the development of a stand-alone software tool for the design and economic analysis of hybrid geothermal heat pump systems for heating-and cooling dominated buildings using solar collectors in both operating modes.

  18. Building dependability arguments for software intensive systems

    E-Print Network [OSTI]

    Seater, Robert Morrison

    2009-01-01T23:59:59.000Z

    A method is introduced for structuring and guiding the development of end-to-end dependability arguments. The goal is to establish high-level requirements of complex software-intensive systems, especially properties that ...

  19. Maturing Software Engineering Knowledge through Classifications

    E-Print Network [OSTI]

    Basili, Victor R.

    Maturing Software Engineering Knowledge through Classifications: A Case Study on Unit Testing contribution to advancing knowledge in both science and engineering. It is a way of investigating Engineering knowledge, as classifications constitute an organized structure of knowledge items. Till date

  20. CIRES /NGDC Professional Research Assistant Software Engineer

    E-Print Network [OSTI]

    Colorado at Boulder, University of

    of data and integrated models describing the geophysical and solar- terrestrial environments. CIRES has and the ability to conceptualize user requirements into customer-friendly and efficient software applications

  1. Evaluation of Technical Software for Microcomputers

    E-Print Network [OSTI]

    Schmidt, P. S.; Williams, M. A.

    1984-01-01T23:59:59.000Z

    Personal computers offer the potential for significantly easing the tasks of engineers and managers. Effective use of these powerful tools, however, requires good software. This paper describes a number of features affecting the usability...

  2. Software Defined Wireless Networks: Unbridling SDNs

    E-Print Network [OSTI]

    Perkins, Dmitri

    Software Defined Wireless Networks: Unbridling SDNs Salvatore Costanzo, Laura Galluccio, Giacomo at analyzing how SDN can be beneficial in wireless infrastructureless networking environments with special emphasis on wireless personal area networks (WPAN). Furthermore, a possible approach (called SDWN

  3. MIDAS : minor incident decision analysis software

    E-Print Network [OSTI]

    Horng, Tze-Chieh, 1964-

    2004-01-01T23:59:59.000Z

    MIDAS is the minor incident decision analysis software that acts as an advisory tool for plant decision makers and operators to analyze the available decision alternatives for resolving minor incidents. The minor incidents ...

  4. Software communications integrated into refinery system

    SciTech Connect (OSTI)

    Goodpaster, R.; Kennedy, J.P.

    1989-01-16T23:59:59.000Z

    Ashland Oil Co. is integrating software communications, using real-time data, into the computerized information system at its Catlettsburg, Ky., refinery. The Ashland real-time information system (Artis) was designed to improve timeliness and accuracy of yield accounting to the refinery, and to standardize software communications between applications. With the system, real-time data are collected in a central data server and used to feed normal data reconciliation software for validation. This part of the system has been successfully implemented. Standardization of software communications is still under design, but most of the communication paths have been defined because a highly evolved information system already exists at the refinery. And efforts are under way to integrate information from the process to optimization.

  5. Harmonizing Systems and Software Cost Estimation

    E-Print Network [OSTI]

    Wang, Gan

    2009-07-19T23:59:59.000Z

    The objective of this paper is to examine the gaps and overlaps between software and systems engineering cost models with intent to harmonize the estimates in engineering engineering estimation. In particular, we evaluate ...

  6. FAQS Reference Guide – Safety Software Quality Assurance

    Broader source: Energy.gov [DOE]

    This reference guide has been developed to address the competency statements in the (March 2011) edition of DOE-STD-1172-2011, Safety Software Quality Assurance Functional Area Qualification Standard.

  7. Drilling optimization using drilling simulator software

    E-Print Network [OSTI]

    Salas Safe, Jose Gregorio

    2004-09-30T23:59:59.000Z

    the results of using drilling simulator software called Drilling Optimization Simulator (DROPS®) in the evaluation of the Aloctono block, in the Pirital field, eastern Venezuela. This formation is characterized by very complex geology, containing faulted...

  8. View of software for HEP experiments

    SciTech Connect (OSTI)

    Johnstad, H.; Lebrun, P.; Lessner, E.S.; Montgomery, H.E.

    1986-05-01T23:59:59.000Z

    A view of the software structure typical of a High Energy Physics experiment is given and the availability of general software modules in most of the important regions is discussed. The aim is to provide a framework for discussion of capabilities and inadequecies and thereby define areas where effort should be assigned and perhaps also to serve as a useful source document for the newcomer to High Energy Physics. 74 refs.

  9. Logic Programming for Software Engineering: A Second Chance

    E-Print Network [OSTI]

    Lau, Kung-Kiu

    at the heart of the software crisis. So LP would seem to have the potential to make an important contribution, it is instructive to take a brief retrospective look at both SE and LP. 2.1 SE: The Software Crisis SE has been plagued by the software crisis even before the term was coined at the 1968 NATO Conference on Software

  10. On the Evolution of Source Code and Software Defects

    E-Print Network [OSTI]

    Lanza, Michele

    available. In the last two decades, researchers have focused on mining and analyzing this data, residing maintenance claims the most part of a software system's cost. The analysis of software evolution helps in vari- ous software repositories, to understand software evolution and support maintenance activities

  11. THE DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING MS IN SOFTWARE ENGINEERING

    E-Print Network [OSTI]

    Minnesota, University of

    -Engineering and Maintenance · Configuration Management · Internet Commerce · Data Warehousing & Data Mining · Software on faculty availability a

  12. What Should Adaptivity Mean to Interactive Software Programmers?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , responsive design, context- sensitive applications, software architecture, programming, theory of interactive

  13. Sandia software guidelines: Volume 5, Tools, techniques, and methodologies

    SciTech Connect (OSTI)

    Not Available

    1989-07-01T23:59:59.000Z

    This volume is one in a series of Sandia Software Guidelines intended for use in producing quality software within Sandia National Laboratories. This volume describes software tools and methodologies available to Sandia personnel for the development of software, and outlines techniques that have proven useful within the Laboratories and elsewhere. References and evaluations by Sandia personnel are included. 6 figs.

  14. A SOFTWARE PIPELINE FOR PROTEIN STRUCTURE PREDICTION Michael S. Lee

    E-Print Network [OSTI]

    Wilson, and Jaques Reifman DoD Biotechnology High Performance Computing Software Applications Institute U

  15. Software documentation, Page 1, Printed 7/11/01 Documentation

    E-Print Network [OSTI]

    Sommerville, Ian

    Software documentation, Page 1, Printed 7/11/01 Software Documentation Ian Sommerville Lancaster University, UK #12;Software documentation, Page 2, Printed 7/11/01 Introduction All large software development projects, irrespective of application, generate a large amount of associated documentation

  16. Managing the software design documents with XML Junichi Suzuki

    E-Print Network [OSTI]

    Suzuki, Jun

    Managing the software design documents with XML Junichi Suzuki Department of Computer Science, and addresses how we can manage the software design documents for the distributed software development. Introduction It is hard to share and manage the software design models and their documents within a distributed

  17. Research Article Automating Risk Analysis of Software Design Models

    E-Print Network [OSTI]

    Miller, Barton P.

    is the introduction of security activities in the software development lifecycle. This paper describes an approach being introduced into the software development lifecycle to reduce the number of software defects amount of security threats. One of the responses from software developers to these threats

  18. Towards an Automation of Software Evolution Good Practices Chouki Tibermacine

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    that software evolution is an inescapable activity in the software lifecycle. In order to prevent the neg- ative of assistance to software evolution. This assistance makes it possible to guide the developer when applyingTowards an Automation of Software Evolution Good Practices Chouki Tibermacine LIRMM, CNRS

  19. A framework for verifying service-oriented software systems using message sequence charts

    E-Print Network [OSTI]

    Morales-Perea, Ernesto Emiliano

    2007-01-01T23:59:59.000Z

    on during the software development lifecycle. This resultsphase of the software development lifecycle. They capture

  20. Flight Software Group The LASP Flight Software Group has a rich history of

    E-Print Network [OSTI]

    Mojzsis, Stephen J.

    development life-cycle. Software quality assurance engineers ensure compliance and perform audits. LASP uses also develops the GSE software systems necessary to develop, test, and integrate science instruments record and control system. We track requirements and design and test information from development

  1. Sandia software guidelines. Volume 3. Standards, practices, and conventions

    SciTech Connect (OSTI)

    Not Available

    1986-07-01T23:59:59.000Z

    This volume is one in a series of Sandia Software Guidelines intended for use in producing quality software within Sandia National Laboratories. In consonance with the IEEE Standard for Software Quality Assurance Plans, this volume identifies software standards, conventions, and practices. These guidelines are the result of a collective effort within Sandia National Laboratories to define recommended deliverables and to document standards, practices, and conventions which will help ensure quality software. 66 refs., 5 figs., 6 tabs.

  2. Software Reliability Cases: The Bridge Between Hardware, Software and System Safety and Reliability

    SciTech Connect (OSTI)

    Herrmann, D.S.; Peercy, D.E.

    1999-01-08T23:59:59.000Z

    High integrity/high consequence systems must be safe and reliable; hence it is only logical that both software safety and software reliability cases should be developed. Risk assessments in safety cases evaluate the severity of the consequences of a hazard and the likelihood of it occurring. The likelihood is directly related to system and software reliability predictions. Software reliability cases, as promoted by SAE JA 1002 and 1003, provide a practical approach to bridge the gap between hardware reliability, software reliability, and system safety and reliability by using a common methodology and information structure. They also facilitate early insight into whether or not a project is on track for meeting stated safety and reliability goals, while facilitating an informed assessment by regulatory and/or contractual authorities.

  3. Radiobiological modelling with MarCell software

    SciTech Connect (OSTI)

    Hasan, J.S.; Jones, T.D.

    1996-10-01T23:59:59.000Z

    Jones introduced a bone marrow radiation cell kinetics model with great potential for application in the fields of health physics, radiation research, and medicine. However, until recently, only the model developers have been able to apply it because of the complex array of biological and physical assignments needed for evaluation of a particular radiation exposure protocol. The purpose of this article is to illustrate the use of MarCell (MARrow CELL Kinetics) software for MS-DOS, a user-friendly computer implementation of that mathematical model that allows almost anyone with an elementary knowledge of radiation physics and/or medical procedures to apply the model. A hands-on demonstration of the software will be given by guiding the user through evaluation of a medical total body irradiation protocol and a nuclear fallout scenario. A brief overview of the software is given in the Appendix.

  4. Software development methodology for high consequence systems

    SciTech Connect (OSTI)

    Baca, L.S.; Bouchard, J.F.; Collins, E.W.; Eisenhour, M.; Neidigk, D.D.; Shortencarier, M.J.; Trellue, P.A.

    1997-10-01T23:59:59.000Z

    This document describes a Software Development Methodology for High Consequence Systems. A High Consequence System is a system whose failure could lead to serious injury, loss of life, destruction of valuable resources, unauthorized use, damaged reputation or loss of credibility or compromise of protected information. This methodology can be scaled for use in projects of any size and complexity and does not prescribe any specific software engineering technology. Tasks are described that ensure software is developed in a controlled environment. The effort needed to complete the tasks will vary according to the size, complexity, and risks of the project. The emphasis of this methodology is on obtaining the desired attributes for each individual High Consequence System.

  5. Software-defined Quantum Communication Systems

    E-Print Network [OSTI]

    Travis S. Humble; Ronald J. Sadlier

    2014-10-20T23:59:59.000Z

    Quantum communication systems harness modern physics through state-of-the-art optical engineering to provide revolutionary capabilities. An important concern for quantum communication engineering is designing and prototyping these systems to evaluate proposed capabilities. We apply the paradigm of software-defined communication for engineering quantum communication systems to facilitate rapid prototyping and prototype comparisons. We detail how to decompose quantum communication terminals into functional layers defining hardware, software, and middleware concerns, and we describe how each layer behaves. Using the super-dense coding protocol as an example, we describe implementations of both the transmitter and receiver, and we present results from numerical simulations of the behavior. We conclude that software-defined quantum communication provides a robust framework in which to explore the large design space offered by this new regime of communication.

  6. Techniques in Active and Generic Software Libraries

    E-Print Network [OSTI]

    Smith, Jacob N.

    2010-07-14T23:59:59.000Z

    at the end of a multiyear journey into computer science ? especially software engineering and the development of software libraries. I would like to thank my adviser Dr. Jaakko J?arvi first and foremost. Little does he know that it was reading his papers (and... managed to actually work on a project together. Hand-in-hand I would like to thank everyone in Dr. Bjarne Stroustrup?s lab (including Bjarne for being such a good sport): Luke Wagner for helping me to understand logic and language theory; Yuriy Solodkyy...

  7. SWP Prdikatausdrcke Institute for Software Technology

    E-Print Network [OSTI]

    for Software Technology 5 p(t1,..,tn)PL() (Atomformel). Sind p,qPL(), dann auch pq, pq, pq, ¬p. Ist pPL() und v;Definitionen Ist pPL(), so hei�t p gültig in , wenn für alle ENV gilt I(,p)=T. Ist pPL(), so hei�t p erfüllbar in , Institute for Software Technology 11 Ist pPL(), so hei�t p erfüllbar in , wenn es ein ENV gibt mit I

  8. SWP Prdikatausdrcke Institute for Software Technology

    E-Print Network [OSTI]

    for Software Technology 5 p(t1,..,tn)PL() (Atomformel). Sind p,qPL(), dann auch pq, pq, pq, ¬p. Ist pPL() und v Ist pPL(), so hei�t p gültig in , wenn für alle ENV gilt I(,p)=T. Ist pPL(), so hei�t p erfüllbar in , Institute for Software Technology 11 Ist pPL(), so hei�t p erfüllbar in , wenn es ein ENV gibt mit I

  9. SAPHIRE 8 Software Quality Assurance Oversight

    SciTech Connect (OSTI)

    Kurt G. Vedros

    2011-09-01T23:59:59.000Z

    The software quality assurance oversight consists of updating and maintaining revision control of the SAPHIRE 8 quality assurance program documentation and of monitoring revision control of the SAPHIRE 8 source code. This report summarizes the oversight efforts through description of the revision control system (RCS) setup, operation and contents. Documents maintained under revision control include the Acceptance Test Plan (ATP), Configuration Management Plan, Quality Assurance Plan, Software Project Plan, Requirements Traceability Matrix (RTM), System Test Plan, SDP Interface Training Manual, and the SAPHIRE 8, 'New Features and Capabilities Overview'.

  10. Establishing Economic Effectiveness through Software Health-Management

    SciTech Connect (OSTI)

    Pizka, M; Panas, T

    2009-05-27T23:59:59.000Z

    More than two thirds of the annual software budget of large-scale organizations dealing with complex software systems is spent on the perfection, correction, and operation of existing software systems. A significant part of these running costs could be saved if the software systems that need to be constantly extende, maintained and operated were in a better technical condition. This paper proposes Software Health-Checks as a method to assess the technical condition of existing software systems and to deduce measures for improving the health of software in a structured manner. Since 2006 numerous commercial software systems with a total of 30 MLOC, implemented in various technologies, were already checked with this method. The actions suggested as a result of these Software 'Health-Checks', repeatedly yielded dramatic performance improvements, risk reductions and cost savings between 30% and 80%.

  11. Managing Software Development for Global Health

    E-Print Network [OSTI]

    Anderson, Richard

    refrigeration. Cold chain description · Storage of vaccines from national level to point of delivery · Manage · The Cold Chain · National Vaccine Forecasting · CCEM 1.0: In house development · CCEM 2.1: Out sourcing and was in serious trouble · Applying software industry best practices is leading to a positive outcome 3

  12. Energy Monitoring of Software project-team

    E-Print Network [OSTI]

    Lefèvre, Laurent

    Energy Monitoring of Software Systems project-team Romain Rouvoy Aurélien Bourdon Adel Noureddine Lionel Seinturier firstname.lastname@inria.fr #12;ICT & Energy 2% of the global energy consumption in 2007 [1] [1] Gartner #12;ICT & Energy [1] 2008 ICT report, Ecology Ministry 13.5% of the electricity

  13. OFC Review 2013 Software Defined Network (SDN)

    E-Print Network [OSTI]

    California at Davis, University of

    and transmission rate w/o hardware change Dedicated PCE to scale OpenFlow architectutre #12;Network ArchitectureOFC Review 2013 Software Defined Network (SDN) M. Farhan Habib May 10, 2013 Friday Group Meeting Networks Lab @ UCD #12;NTu3F: SDN in Today's Network #12;SDN: What and Why · Traditional distributed

  14. Model Checking for Software Architectures Radu Mateescu

    E-Print Network [OSTI]

    Joseph Fourier Grenoble-I, Université

    ] are essential engineering artifacts used in the de- sign process of complex software systems. They specify alge- bras, the most prominent ones being Wright [2] and Darwin [17]. Wright is based upon Csp, thus (configuration and coordination) and Fsp (a dialect of Csp) to describe the behaviour of individual components

  15. LIRMM UM II Component based Software Architecture

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 LIRMM UM II Component based Software Architecture of Robot Controllers R. Passama, D. Andreu, C component approaches and robot control architectures. This methodology defines a process that guides architecture, useful for analysis and integration, and a dedicated component-based language, focusing

  16. Information Management Software Services IMS Services Overview

    E-Print Network [OSTI]

    Information Management Software Services IMS Services Overview You know how powerful and important performance and available manner. This requires that the IMS systems, applications, databases, and supporting and then create a written report on recommendations to improve setup, procedures and processes associated

  17. CSE 4322: Software Project Management 1 Instructor

    E-Print Network [OSTI]

    Csallner, Christoph

    Software: What Really Works, and Why We Believe It. O'Reilly. 2010. 3. Frederick P. Brooks: The Mythical: Effective Java. 2nd edition. Prentice Hall, 2008. 7. James Gosling, Bill Joy, Guy Steele, and Gilad Bracha (written) · 20% project presentations (oral) 10.1 Grade Distribution A from 85%, B from 70%, C from 60%, D

  18. Software Engineering, an established Accreditable Engineering Discipline

    E-Print Network [OSTI]

    Szabados, Barna

    Software Engineering, an established Accreditable Engineering Discipline By B.Szabados, P.Eng, Mc of the Canadian Engineering Accreditation Board (CEAB), as well as at a workshop at the NCDEAS meeting in September 1997. 1. INTRODUCTION In the late seventies, the discipline of Computer Engineering has evolved

  19. Software Engineering Education Mark A. Ardis

    E-Print Network [OSTI]

    Ardis, Mark

    - plex. Today's top-of-the-line automobiles have hundreds of millions of lines of software, and even low-end cars have tens of millions of lines of code. Of course, predictions are that the size and complexity and control our car remotely over the Internet." The authors of the study were able to disable the brakes

  20. IBM Software Data Sheet IBM adaptive threat

    E-Print Network [OSTI]

    IBM Software Data Sheet IBM adaptive threat protection Stay ahead of security threats with a state-of-the-art network protection engine Highlights Identify high-risk threats and zero-day attacks with protocol-based, behavioral anomaly detection Protect end users against the latest web-based threats, such as SQL injection

  1. Monitoring Software using Sun Spots Corey Andalora

    E-Print Network [OSTI]

    Kaminsky, Alan

    a software application developed for demonstrating a monitoring network for air conditioning units their findings to a central data store. Air conditioning units were the equipment selected for monitoring. Air conditioning units vibrate while operating so they were an obvious choice to use with the accelerometers

  2. Effort estimation for corrective software maintenance

    E-Print Network [OSTI]

    Bae, Doo-Hwan

    Stefanucci Proceedings of the 14th international conference on software engineering and knowledge engineering estimating Size Duration Staff Costs Effort #12;4/20 Introduction (2/2) · Effort estimation ­ Is a valuable asset to maintenance managers in · Planning maintenance · Performing cost/benefits analysis · Approach

  3. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01T23:59:59.000Z

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  4. Combining Software Evidence Arguments and Assurance

    E-Print Network [OSTI]

    Kelly, Tim

    defence, aerospace, nuclear and railways). A safety case consists of three principal elements. This paper introduces an established argumentation notation from the safety critical domain, as well as new applied to the development and certification of safety critical software and it is believed they are both

  5. A Software Engineering Perspective for Services Security

    E-Print Network [OSTI]

    Han, Jun

    A Software Engineering Perspective for Services Security Jun Han School of Information Technology. We have seen much work in the traditional area of information and network security, focusing such as encryption algo- rithms and key exchange protocols has been the main topic of the information security

  6. Influence of release frequency in software development

    E-Print Network [OSTI]

    a six weeks development lifecycle [2]. It's also the case for exploitations systems. Microsoft wants, Canonical may change the release development for a 6 months lifecycle to a 2 years release frequency [4]. B as possible to improve the attractiveness of the product over the completion. Software is going from perpetual

  7. SAPHIRE 8 Software Configuration Management Plan

    SciTech Connect (OSTI)

    Curtis Smith

    2010-01-01T23:59:59.000Z

    The INL software developers use version control for both the formally released SAPHIRE versions, as well as for source code. For each formal release of the software, the developers perform an acceptance test: the software must pass a suite of automated tests prior to official release. Each official release of SAPHIRE is assigned a unique version identifier. The release is bundled into a standard installation package for easy and consistent set-up by individual users. Included in the release is a list of bug fixes and new features for the current release, as well as a history of those items for past releases. Each formal release of SAPHIRE will have passed an acceptance test. In addition to assignment of a unique version identifier for an official software release, each source code file is kept in a controlled library. Source code is a collection of all the computer instructions written by developers to create the finished product. The library is kept on a server, where back-ups are regularly made. This document describes the configuration management approach used as part of the SAPHIRE development.

  8. Honeywell Modular Automation System Computer Software Documentation

    SciTech Connect (OSTI)

    CUNNINGHAM, L.T.

    1999-09-27T23:59:59.000Z

    This document provides a Computer Software Documentation for a new Honeywell Modular Automation System (MAS) being installed in the Plutonium Finishing Plant (PFP). This system will be used to control new thermal stabilization furnaces in HA-211 and vertical denitration calciner in HC-230C-2.

  9. Facilitating performance predictions using software components

    E-Print Network [OSTI]

    Becker, Steffen

    Reussner 1. Introduction Composing software systems of independent building blocks is the central vision based on the properties of its components. In civil and electrical engineering, the early assessment, performance is often mainly considered at the end of the development cycle when the complete system can

  10. IBM Software Solution Brief Safeguarding the cloud

    E-Print Network [OSTI]

    IBM Software Solution Brief Safeguarding the cloud with IBM Security solutions Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Address cloud internal and external users, data, applications and workloads as they move to and from the cloud Regain

  11. Consumer Alert Pirated Software May Contain Malware

    E-Print Network [OSTI]

    Bernstein, Phil

    Consumer Alert Pirated Software May Contain Malware http://www.fbi.gov/news/stories/2013/august. Today, the National Intellectual Property Rights Coordination (IPR) Center - of which the FBI is a key key (often a ploy to disseminate additional malware) Printed with the Permission of FBI #12;And

  12. Systems Engineering Introduction to Software Quality Management

    E-Print Network [OSTI]

    Bryson, Joanna J.

    for quality management ISO 9001:2000 is a generic model of the quality process; ISO 9001:2008 clarifies ISO 9001:2000 ISO 9001:2008 applicable to any organisation that designs, develops and maintains products (or services) ISO 9000-3 interprets 9001 for software dev. 12 Features of ISO 9001:2008 Organisational

  13. Review of Quantitative Software Reliability Methods

    SciTech Connect (OSTI)

    Chu, T.L.; Yue, M.; Martinez-Guridi, M.; Lehner, J.

    2010-09-17T23:59:59.000Z

    The current U.S. Nuclear Regulatory Commission (NRC) licensing process for digital systems rests on deterministic engineering criteria. In its 1995 probabilistic risk assessment (PRA) policy statement, the Commission encouraged the use of PRA technology in all regulatory matters to the extent supported by the state-of-the-art in PRA methods and data. Although many activities have been completed in the area of risk-informed regulation, the risk-informed analysis process for digital systems has not yet been satisfactorily developed. Since digital instrumentation and control (I&C) systems are expected to play an increasingly important role in nuclear power plant (NPP) safety, the NRC established a digital system research plan that defines a coherent set of research programs to support its regulatory needs. One of the research programs included in the NRC's digital system research plan addresses risk assessment methods and data for digital systems. Digital I&C systems have some unique characteristics, such as using software, and may have different failure causes and/or modes than analog I&C systems; hence, their incorporation into NPP PRAs entails special challenges. The objective of the NRC's digital system risk research is to identify and develop methods, analytical tools, and regulatory guidance for (1) including models of digital systems into NPP PRAs, and (2) using information on the risks of digital systems to support the NRC's risk-informed licensing and oversight activities. For several years, Brookhaven National Laboratory (BNL) has worked on NRC projects to investigate methods and tools for the probabilistic modeling of digital systems, as documented mainly in NUREG/CR-6962 and NUREG/CR-6997. However, the scope of this research principally focused on hardware failures, with limited reviews of software failure experience and software reliability methods. NRC also sponsored research at the Ohio State University investigating the modeling of digital systems using dynamic PRA methods. These efforts, documented in NUREG/CR-6901, NUREG/CR-6942, and NUREG/CR-6985, included a functional representation of the system's software but did not explicitly address failure modes caused by software defects or by inadequate design requirements. An important identified research need is to establish a commonly accepted basis for incorporating the behavior of software into digital I&C system reliability models for use in PRAs. To address this need, BNL is exploring the inclusion of software failures into the reliability models of digital I&C systems, such that their contribution to the risk of the associated NPP can be assessed.

  14. Intelligent Software Agents: Sensor Integration and Response

    SciTech Connect (OSTI)

    Kulesz, James J [ORNL; Lee, Ronald W [ORNL

    2013-01-01T23:59:59.000Z

    Abstract In a post Macondo world the buzzwords are Integrity Management and Incident Response Management. The twin processes are not new but the opportunity to link the two is novel. Intelligent software agents can be used with sensor networks in distributed and centralized computing systems to enhance real-time monitoring of system integrity as well as manage the follow-on incident response to changing, and potentially hazardous, environmental conditions. The software components are embedded at the sensor network nodes in surveillance systems used for monitoring unusual events. When an event occurs, the software agents establish a new concept of operation at the sensing node, post the event status to a blackboard for software agents at other nodes to see , and then react quickly and efficiently to monitor the scale of the event. The technology addresses a current challenge in sensor networks that prevents a rapid and efficient response when a sensor measurement indicates that an event has occurred. By using intelligent software agents - which can be stationary or mobile, interact socially, and adapt to changing situations - the technology offers features that are particularly important when systems need to adapt to active circumstances. For example, when a release is detected, the local software agent collaborates with other agents at the node to exercise the appropriate operation, such as: targeted detection, increased detection frequency, decreased detection frequency for other non-alarming sensors, and determination of environmental conditions so that adjacent nodes can be informed that an event is occurring and when it will arrive. The software agents at the nodes can also post the data in a targeted manner, so that agents at other nodes and the command center can exercise appropriate operations to recalibrate the overall sensor network and associated intelligence systems. The paper describes the concepts and provides examples of real-world implementations including the Threat Detection and Analysis System (TDAS) at the International Port of Memphis and the Biological Warning and Incident Characterization System (BWIC) Environmental Monitoring (EM) Component. Technologies developed for these 24/7 operational systems have applications for improved real-time system integrity awareness as well as provide incident response (as needed) for production and field applications.

  15. Software Evaluation of Hotspot and DOE Safety Software Toolbox Recommendation, 3/07

    Broader source: Energy.gov [DOE]

    The intent of the gap analysis is to evaluate Hotspot specified above and recommend to the DOE Officeof Health, Safety and Security (HSS) whether this safety software should be added to the DOE...

  16. Inside a secret software lab: an ethnographic study of a global software package producer 

    E-Print Network [OSTI]

    Grimm, Christine Franziska

    2009-11-26T23:59:59.000Z

    This is an ethnographic study of the creation of a particular type of standard enterprise software package: Enterprise Resource Planning (ERP) systems, which support wide-ranging organisational functions within large ...

  17. "Turn-Key" Open Source Software Solutions for Energy Management...

    Energy Savers [EERE]

    "Turn-Key" Open Source Software Solutions for Energy Management of Small to Medium Sized Buildings (DE-FOA-0000822) "Turn-Key" Open Source Software Solutions for Energy Management...

  18. EECBG Success Story: Software Helps Kentucky County Gauge Energy...

    Broader source: Energy.gov (indexed) [DOE]

    Kentucky invested 140,000 of a 2.7 million Energy Efficiency and Conservation Block Grant (EECBG) to purchase EnergyCAP software. The energy management software will allow the...

  19. 3D Representations for Software Visualization Andrian Marcus

    E-Print Network [OSTI]

    research from software analysis, information visualization, human-computer interaction, and cognitive, texture, abstraction mechanism, and by supporting new manipulation techniques and user interfaces.2 [Information Interfaces and Presentation] User Interfaces Keywords: Software visualization, 3D visualization

  20. An open source software selection process and a case study

    E-Print Network [OSTI]

    He, Guobin

    2009-06-02T23:59:59.000Z

    In this study, I design an empirical open source software selection process, which reuses some ideas from Commercial Off-the-Shelf selection methods and addresses the characteristics of the open source software. Basically, it consists of three basic...

  1. Patent Scope and Innovation in the Software Industry

    E-Print Network [OSTI]

    Shamos, Michael I.

    Patent Scope and Innovation in the Software Industry Julie E. Cohen Mark A. Lemley Table.................................................................................................4 I. Software Patents: History, Practice, and Theory .....................................7 A. History: The Section 101 Patentability Debate..............................8 B. Practice: Anything Goes

  2. META-ENVIRONMENTS FOR SOFTWARE PRODUCTION ANTHONY S. KARRER

    E-Print Network [OSTI]

    Scacchi, Walt

    META-ENVIRONMENTS FOR SOFTWARE PRODUCTION ANTHONY S. KARRER Computer Science Department, Loyola December 1994 Researchers who create software production environments face considerable problems. Soft- ware production environments are large systems that are costly to develop. Furthermore, soft- ware

  3. Strategies for the development of the software industry in Columbia

    E-Print Network [OSTI]

    Cepero, Monica (Cepero Uribe)

    2007-01-01T23:59:59.000Z

    Using Michael Porter's framework for the competitiveness of the nations and Professor Michael Cusumano's theory on the orientation of the software companies toward services, I analyzed the country of Colombia's software ...

  4. Software Roadmap to Plug and Play Petaflop/s

    E-Print Network [OSTI]

    2006-01-01T23:59:59.000Z

    Chem. , 14, 1347–1363 (1993). LBNL Software Roadmap to PlugSpain, Sep. 12–16, 2005. LBNL Software Roadmap to Plug andeffective. ANL, ORNL, and LBNL have expertise here. Memory

  5. Alexander Felfernig & Gerald Steinbauer Institute for Software Technology

    E-Print Network [OSTI]

    Felfernig & Gerald Steinbauer Institute for Software Technology 10 Wissensverarbeitung 5 Uniform Cost Search Technology 11 Wissensverarbeitung Generalization of bfs ­ Expand state with lowest related costsAlexander Felfernig & Gerald Steinbauer Institute for Software Technology 1 Wissensverarbeitung

  6. An open source software selection process and a case study 

    E-Print Network [OSTI]

    He, Guobin

    2009-06-02T23:59:59.000Z

    In this study, I design an empirical open source software selection process, which reuses some ideas from Commercial Off-the-Shelf selection methods and addresses the characteristics of the open source software. Basically, ...

  7. Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software

    SciTech Connect (OSTI)

    Jump, David; Price, Phillip N.; Granderson, Jessica; Sohn, Michael

    2013-09-06T23:59:59.000Z

    This document describes procedures for testing and validating proprietary baseline energy modeling software accuracy in predicting energy use over the period of interest, such as a month or a year. The procedures are designed according to the methodology used for public domain baselining software in another LBNL report that was (like the present report) prepared for Pacific Gas and Electric Company: ?Commercial Building Energy Baseline Modeling Software: Performance Metrics and Method Testing with Open Source Models and Implications for Proprietary Software Testing Protocols? (referred to here as the ?Model Analysis Report?). The test procedure focuses on the quality of the software?s predictions rather than on the specific algorithms used to predict energy use. In this way the software vendor is not required to divulge or share proprietary information about how their software works, while enabling stakeholders to assess its performance.

  8. Improving the distributed evolution of software through heuristic evaluation

    E-Print Network [OSTI]

    Wooten, Amy Jo

    2011-01-01T23:59:59.000Z

    In order to create the increasingly complex software systems needed to deal with today's technological challenges, we must be able to build on previous work. However, existing software solutions are quite often not an exact ...

  9. Distributed lyapunov functions in analysis of graph models of software

    E-Print Network [OSTI]

    Roozbehani, Mardavij

    In previous works, the authors introduced a framework for software analysis, which is based on optimization of Lyapunov invariants. These invariants prove critical software properties such as absence of overflow and ...

  10. Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

    E-Print Network [OSTI]

    Finifter, Matthew Smith

    2013-01-01T23:59:59.000Z

    phase of the software development lifecycle, which beginsphase of the software development lifecycle, which beginsA secure software development lifecycle (SDLC) aims to

  11. automated software engineering: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Genomic Engineering (SAGE) Enabled by Electrowetting-on-Dielectric Digital Microfluidics Materials Science Websites Summary: Software Automated Genomic Engineering (SAGE)...

  12. Designing Internet-Based Software Steven P. Reiss

    E-Print Network [OSTI]

    Reiss, Steven P.

    repertoire of standard parts and relatively limited ways of con- necting them. Software is much more flexible

  13. Tax Deduction Qualified Software Tas version 9.3.1

    Broader source: Energy.gov [DOE]

    Information about the Tas version 9.3.1 qualified computer software and federal tax incentive requirements for commercial buildings.

  14. Surveillance Analysis Computer System (SACS) software design document (SDD)

    SciTech Connect (OSTI)

    Glasscock, J.A.

    1995-09-01T23:59:59.000Z

    This document contains the Software Design Description for Phase II of the SACS project, and Impact Level 3Q system

  15. MONITORING AN ADA SOFTWARE DEVELOPMEN T Victor R. Basili

    E-Print Network [OSTI]

    Basili, Victor R.

    and Elizabeth Kruesi are now with Software Metrics, Inc. Sylvia Sheppard is with Booz, Allen, and Hamilton, Inc

  16. New Directions in Measurement for Software Quality Control

    E-Print Network [OSTI]

    Suryn, Witold

    of statistical data. In total this provides a framework for quality control in software engineering that is freed1 New Directions in Measurement for Software Quality Control Paul Krause, Bernd Freimut and Witold Suryn Abstract--Assessing and controlling software quality is still an immature discipline. One

  17. Institute for Software Technology Ad anced RoboticsAdvanced Robotics

    E-Print Network [OSTI]

    Interaction #12;Institute for Software Technology Application Areas Gerald Steinbauer 3 Advanced RoboticsInstitute for Software Technology Ad anced RoboticsAdvanced Robotics Human Robot Interaction Gerald Steinbauer Institute for Software Technology Gerald Steinbauer 1 Advanced Robotics ­ Human Robot Interaction

  18. Viewpoints in Software Architecture Reconstruction Arie van Deursen

    E-Print Network [OSTI]

    van Deursen, Arie

    Recommended Practice for Architectural Description of Software-intensive Systems [3] give a larger catalogViewpoints in Software Architecture Reconstruction Arie van Deursen CWI & Delft Univ. of Technology, FIN-00045, Helsinki, Finland claudio.riva@nokia.com 1 Introduction Many software engineering tasks

  19. Computer software engineers design, create, and modify computer applications.

    E-Print Network [OSTI]

    Computer software engineers design, create, and modify computer applications. Computer Software Engineers (0*NET 15-1031.00, 15-1032.00) Significant Points Computer software engineers are projected are expected for college graduates with at least a bachelor's degree in computer engineering or computer

  20. On Model Based Synthesis of Embedded Control Software Vadim Alimguzhin

    E-Print Network [OSTI]

    Tronci, Enrico

    Model Based Design approaches for control software. Given the formal model of a plant as a Discrete Time addresses model based synthesis of control software by trading system level non-functional requirementsOn Model Based Synthesis of Embedded Control Software Vadim Alimguzhin Federico Mari Igor Melatti

  1. Software Engineering Students' Cross-site Collaboration: An Experience Report

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    Software Engineering Students' Cross-site Collaboration: An Experience Report Sarah Drummond Dept their site's Software Engineering (SE) modules and provided strategic coupling of cross-site student groups and hence their employability. Keywords Software Engineering, Cross-site collaboration, Video conferencing 1

  2. Towards a Taxonomy of Software Evolution Tom Mens Jim Buckley

    E-Print Network [OSTI]

    Zenger, Matthias

    Towards a Taxonomy of Software Evolution Tom Mens Jim Buckley Vrije Universiteit Brussel Pleinlaan taxonomies of software evolution have focused on the purpose of the change (i.e., the why) rather than the underlying mechanisms. This paper proposes a taxonomy of software evolution based on the characterizing

  3. 3F6 -Software Engineering and Design Concurrent Systems I

    E-Print Network [OSTI]

    Young, Steve

    3F6 - Software Engineering and Design Handout 13 Concurrent Systems I With Markup Steve Young #12 #12;2 Engineering Part IIA: 3F6 - Software Engineering and Design Levels of Concurrency Concurrency should always assume that the concurrency is real! eg Core Duo #12;6 Engineering Part IIA: 3F6 - Software

  4. Examination of Contemporary Electromagnetic Software Capable of Modeling Problems of

    E-Print Network [OSTI]

    Yakovlev, Vadim

    Heating Vadim V. Yakovlev Department of Mathematical Sciences, Worcester Polytechnic Institute, Worcester the database of the modern electromagnetic (EM) software suitable for the modeling of microwave heating. Software Database The database of the EM software available in the market and applicable to the majority

  5. A Systematic Approach to Creating and Maintaining Software Documentation

    E-Print Network [OSTI]

    French, James C.

    & Williamson) ­ Both DIF and SODOS integrated database management systems with the software documentationUVA A Systematic Approach to Creating and Maintaining Software Documentation Allison L. Powell SOURCE CODE INTERFACE BROWSING INTERFACE STATUS FUTURE PLANS WHY SOFTWARE DOCUMENTATION AS AN APPLICATION

  6. A Process-Agent Construction Method for Software Process

    E-Print Network [OSTI]

    Bae, Doo-Hwan

    Library (EL): · Comprise historical data such as Time (T), Human Resource (HR), Cost (C), Quality (Q), etcA Process-Agent Construction Method for Software Process Modeling in SoftPM Prosim 2006 Qing Wang;Introduction Software process is highly dependent on the capabilities of individual software engineers

  7. Software Engineering: A Roadmap Anthony Finkelstein Jeff Kramer

    E-Print Network [OSTI]

    Finkelstein, Anthony

    Software Engineering: A Roadmap Anthony Finkelstein Jeff Kramer Department of Computer Science@doc.ic.ac.uk ABSTRACT This paper provides a roadmap for software engineering. It identifies the principal research specialisations within software engineering. The paper draws heavily on the roadmaps covering specific areas

  8. On Exceptions, Exception Handling, Requirements and Software Lifecycle Alexander Romanovsky

    E-Print Network [OSTI]

    Southampton, University of

    On Exceptions, Exception Handling, Requirements and Software Lifecycle Alexander Romanovsky Notes. 32(2). 2007. [2] R. de Lemos, and A. Romanovsky. Exception handling in the software lifecycle. Castor Filho. Exception handling in the development of dependable component-based systems. Software

  9. Software Group IBM Rational RequisitePro evaluators guide.

    E-Print Network [OSTI]

    set of software tools spanning the entire development lifecycle; and services to help indi- viduals and our product offerings. About IBM Rational software and the full lifecycle solution The IBM Rational. #12;Requirements management overview Application development is a complex undertak- ing. The software

  10. Component-based Specification of Software Architecture Constraints

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    engineering provides for develop- ers the ability to easily reuse and assemble software entities to build phase of the software lifecycle. They propose to de- velopers to explicit, in a structured way, designComponent-based Specification of Software Architecture Constraints Chouki Tibermacine LIRMM, CNRS

  11. Application Driven Software Methodology for Automatic Compiler Generation

    E-Print Network [OSTI]

    Rus, Teodor

    happen in the AD, after the start of the software development lifecycle, modifications to requirements develop software tools that can execute the al- gorithms developed by AD experts without translating them requirements documents based on the customers wants and needs. The development of the software is immediately

  12. Prometheus Reactor I&C Software Development Methodology, for Action

    SciTech Connect (OSTI)

    T. Hamilton

    2005-07-30T23:59:59.000Z

    The purpose of this letter is to submit the Reactor Instrumentation and Control (I&C) software life cycle, development methodology, and programming language selections and rationale for project Prometheus to NR for approval. This letter also provides the draft Reactor I&C Software Development Process Manual and Reactor Module Software Development Plan to NR for information.

  13. IBM Software IBM Security AppScan: Application

    E-Print Network [OSTI]

    in the software development lifecycle, when they are easier and less expensive to correct. IBM research drives IBM by Design integrates security through- out the software development process. To address the wide rangeIBM Software Security June 2012 IBM Security AppScan: Application security and risk management

  14. Representing Exceptional Behaviour at the earlier Phases of Software Development

    E-Print Network [OSTI]

    Kent, University of

    Representing Exceptional Behaviour at the earlier Phases of Software Development Rogério de Lemos. Exception handling has been traditionally associated with the design phase of the software lifecycle, during not received enough attention /Avizienes 97/. Ideally, for each identified phase of the software lifecycle

  15. Demonstration of the APRON Processor Array Simulation Software

    E-Print Network [OSTI]

    Dudek, Piotr

    .barr@postgrad.manchester.ac.uk; p.dudek@manchester.ac.uk Abstract ­ A software tool for the development, prototyping and emulation a software system that can be used at all stages in the lifecycle of a CPA device. APRON (Array ProcessingDemonstration of the APRON Processor Array Simulation Software David R. W. Barr and Piotr Dudek

  16. International Conference on Human-Centered Software Engineering

    E-Print Network [OSTI]

    Noé, Reinhold

    models in HCSE Social and organizational aspects in the software development lifecycle Human-centric software development tools User profiles and mental models User requirements and design constraints UserHCSE 2014 5th International Conference on Human-Centered Software Engineering Paderborn, Germany

  17. Predicting Software Defects in Varying Development Lifecycles using Bayesian Nets

    E-Print Network [OSTI]

    Fenton, Norman

    Predicting Software Defects in Varying Development Lifecycles using Bayesian Nets Norman Fenton, this has required a custom- built BN for each software development lifecycle. We describe a more general BN software development lifecycle ­ to reflect both the differing number of testing stages in the lifecycle

  18. Edinburgh Research Explorer Dealing With Software: the Research Data Issues

    E-Print Network [OSTI]

    Millar, Andrew J.

    as a digital research output through its lifecycle. 2. Software and Research: the Lifecycle We can consider the software lifecycle to have broadly the following stages, which may overlap: · Design: where the implementation of a concept or algorithm, or extension of an existing piece of software is planned · Development

  19. Software Fault Reporting Processes in Business-Critical Systems

    E-Print Network [OSTI]

    Langseth, Helge

    and product quality. Some specific software methods will be adopted from safety-critical software engineering of Computer and Information Science Faculty of Information Technology, Mathematics and Electrical Engineering and software systems. To increase e.g. the reliability and performance of such systems we rely on a plethora

  20. Software Evolution: A Road Map K. H. Bennett

    E-Print Network [OSTI]

    for practitioners. By evolution, we mean a stage of software lifecycle where the software undergoes substantial be termed anticipatory, and is based on the idea that processes and product evolution can both be planned lifecycle and software engineering textbooks. The second is termed reactive, and offers a much more

  1. 15 Software Product Line Engineering with the UML: Deriving Products

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    15 Software Product Line Engineering with the UML: Deriving Products T. Ziadi and J.-M. Jézéquel Abstract Software product line engineering introduces two new dimensions into the traditional engineering of software-based systems: the variability modeling and the product derivation. The variability gathers

  2. A Language for Software Variation Research Martin Erwig

    E-Print Network [OSTI]

    Erwig, Martin

    -oriented programming [3, 18], revision control systems [21], and software configuration management [11]. What this fact erwig@eecs.oregonstate.edu Abstract Managing variation is an important problem in software engineer- ing that takes different forms, ranging from version control and configuration management to software product

  3. An Automated Software FMEA Chris Price and Neal Snooke

    E-Print Network [OSTI]

    Snooke, Neal

    An Automated Software FMEA Chris Price and Neal Snooke Department of Computer Science, Aberystwyth Conference, Singapore, April 2008 Abstract The concept of software failure mode and effects analysis (FMEA its hardware counterpart, software FMEA is immensely tedious for an engineer to perform, as well

  4. Program for implementing software quality metrics

    SciTech Connect (OSTI)

    Yule, H.P.; Riemer, C.A.

    1992-04-01T23:59:59.000Z

    This report describes a program by which the Veterans Benefit Administration (VBA) can implement metrics to measure the performance of automated data systems and demonstrate that they are improving over time. It provides a definition of quality, particularly with regard to software. Requirements for management and staff to achieve a successful metrics program are discussed. It lists the attributes of high-quality software, then describes the metrics or calculations that can be used to measure these attributes in a particular system. Case studies of some successful metrics programs used by business are presented. The report ends with suggestions on which metrics the VBA should use and the order in which they should be implemented.

  5. Timing system control software in the SLC

    SciTech Connect (OSTI)

    Thompson, K.; Phinney, N.

    1985-04-01T23:59:59.000Z

    A new timing system that allows precision (approx.1 to 2 ns) control of the trigger times of klystrons, beam position monitors, and other devices on a pulse-to-pulse basis at up to 360 Hz is in operation in the first third of the SLAC linear accelerator. The control software is divided between a central host VAX and local Intel 8086-based microprocessor clusters. Facilities exist to set up and adjust the timing of devices or groups of devices independently for beam pulses having different destinations and purposes, which are run in an interlaced fashion during normal machine operation. Upgrading of the system is currently underway, using a new version of the Programmable Delay Unit CAMAC module to allow pipelining of timing information for three machine pulses. An overview of the current state of the system is presented in this paper, with an emphasis on software control.

  6. Honeywell modular automation system computer software documentation

    SciTech Connect (OSTI)

    STUBBS, A.M.

    2003-07-02T23:59:59.000Z

    The purpose of this Computer Software Document (CSWD) is to provide configuration control of the Honeywell Modular Automation System (MAS) in use at the Plutonium Finishing Plant (PFP). The Honeywell MAS is used to control the thermal stabilization furnaces in glovebox HA-211. The PFP developed software is being updated to reflect the Polycube Processing and Unwashed Salt Thermal Stabilization program addition. The polycube processing program was installed per HNF-FMP-02-11162-R2. The functional test of the program was performed in JCS work package 22-02-1031, The unwashed salt item program was installed per HNF-FMP-03-16577-RO. The functional test of the program completed in JCS work package 22-03-00654.

  7. NAVIGATION SOFTWARE OF AUTOMATED GUIDED VEHICLE

    E-Print Network [OSTI]

    Magdalena Dobrza?ska; Pawe? Dobrza?ski

    Abstract: In the article it has been presented the structure of the control system and measurement data processing of an automated guided vehicle. The basic navigation technique – odometry, which is applied in the automated guided vehicle, has been described, as well as connected with it errors of position tracing. Next the navigation software was shown which enables to design the trajectory of the vehicle movement as well as the registration and reading of the measurement data from the measurement sensors.

  8. Software for precise tracking of cell proliferation

    SciTech Connect (OSTI)

    Kurokawa, Hiroshi [Brain Science Institute, RIKEN, 2-1 Hirosawa, Wako-city, Saitama 351-0198 (Japan) [Brain Science Institute, RIKEN, 2-1 Hirosawa, Wako-city, Saitama 351-0198 (Japan); School of Life Science, Tokyo University of Pharmacy and Life Science, 1432-1 Horinouchi, Hachioji, Tokyo 192-0392 (Japan); Noda, Hisayori [Brain Science Institute, RIKEN, 2-1 Hirosawa, Wako-city, Saitama 351-0198 (Japan) [Brain Science Institute, RIKEN, 2-1 Hirosawa, Wako-city, Saitama 351-0198 (Japan); Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8550 (Japan); Sugiyama, Mayu [Brain Science Institute, RIKEN, 2-1 Hirosawa, Wako-city, Saitama 351-0198 (Japan) [Brain Science Institute, RIKEN, 2-1 Hirosawa, Wako-city, Saitama 351-0198 (Japan); School of Life Science, Tokyo University of Pharmacy and Life Science, 1432-1 Horinouchi, Hachioji, Tokyo 192-0392 (Japan); Sakaue-Sawano, Asako [Brain Science Institute, RIKEN, 2-1 Hirosawa, Wako-city, Saitama 351-0198 (Japan) [Brain Science Institute, RIKEN, 2-1 Hirosawa, Wako-city, Saitama 351-0198 (Japan); Life Function and Dynamics, ERATO, JST, 2-1 Hirosawa, Wako-city, Saitama 351-0198 (Japan); Fukami, Kiyoko [School of Life Science, Tokyo University of Pharmacy and Life Science, 1432-1 Horinouchi, Hachioji, Tokyo 192-0392 (Japan)] [School of Life Science, Tokyo University of Pharmacy and Life Science, 1432-1 Horinouchi, Hachioji, Tokyo 192-0392 (Japan); Miyawaki, Atsushi, E-mail: matsushi@brain.riken.jp [Brain Science Institute, RIKEN, 2-1 Hirosawa, Wako-city, Saitama 351-0198 (Japan) [Brain Science Institute, RIKEN, 2-1 Hirosawa, Wako-city, Saitama 351-0198 (Japan); Life Function and Dynamics, ERATO, JST, 2-1 Hirosawa, Wako-city, Saitama 351-0198 (Japan)

    2012-01-20T23:59:59.000Z

    Highlights: Black-Right-Pointing-Pointer We developed software for analyzing cultured cells that divide as well as migrate. Black-Right-Pointing-Pointer The active contour model (Snakes) was used as the core algorithm. Black-Right-Pointing-Pointer The time backward analysis was also used for efficient detection of cell division. Black-Right-Pointing-Pointer With user-interactive correction functions, the software enables precise tracking. Black-Right-Pointing-Pointer The software was successfully applied to cells with fluorescently-labeled nuclei. -- Abstract: We have developed a multi-target cell tracking program TADOR, which we applied to a series of fluorescence images. TADOR is based on an active contour model that is modified in order to be free of the problem of locally optimal solutions, and thus is resistant to signal fluctuation and morphological changes. Due to adoption of backward tracing and addition of user-interactive correction functions, TADOR is used in an off-line and semi-automated mode, but enables precise tracking of cell division. By applying TADOR to the analysis of cultured cells whose nuclei had been fluorescently labeled, we tracked cell division and cell-cycle progression on coverslips over an extended period of time.

  9. Software Framework for Advanced Power Plant Simulations

    SciTech Connect (OSTI)

    John Widmann; Sorin Munteanu; Aseem Jain; Pankaj Gupta; Mark Moales; Erik Ferguson; Lewis Collins; David Sloan; Woodrow Fiveland; Yi-dong Lang; Larry Biegler; Michael Locke; Simon Lingard; Jay Yun

    2010-08-01T23:59:59.000Z

    This report summarizes the work accomplished during the Phase II development effort of the Advanced Process Engineering Co-Simulator (APECS). The objective of the project is to develop the tools to efficiently combine high-fidelity computational fluid dynamics (CFD) models with process modeling software. During the course of the project, a robust integration controller was developed that can be used in any CAPE-OPEN compliant process modeling environment. The controller mediates the exchange of information between the process modeling software and the CFD software. Several approaches to reducing the time disparity between CFD simulations and process modeling have been investigated and implemented. These include enabling the CFD models to be run on a remote cluster and enabling multiple CFD models to be run simultaneously. Furthermore, computationally fast reduced-order models (ROMs) have been developed that can be 'trained' using the results from CFD simulations and then used directly within flowsheets. Unit operation models (both CFD and ROMs) can be uploaded to a model database and shared between multiple users.

  10. SFWR ENG 3BB4 --Software Design 3 --Concurrent System Design 1.2 4 Software Design III

    E-Print Network [OSTI]

    Carette, Jacques

    of Engineering McMaster University SFWR ENG 3BB4 -- Software Design 3 -- Concurrent System Design 1.3 5 CourseSFWR ENG 3BB4 -- Software Design 3 -- Concurrent System Design 1.2 4 Software Design III Concurrent Description (Calendar) · Processes, threads, concurrency; · Synchronization mechanisms, resource management

  11. Dannenberg and Thompson, Real-Time Software Synthesis on Superscalar Architectures Real-Time Software Synthesis on Superscalar

    E-Print Network [OSTI]

    Dannenberg, Roger B.

    Dannenberg and Thompson, Real-Time Software Synthesis on Superscalar Architectures 1 Real-Time Software Synthesis on Superscalar Architectures1 Roger B. Dannenberg and Nick Thompson School of Computer: Roger B. Dannenberg and Nick Thompson, "Real-Time Software Synthesis on Superscalar Architectures

  12. Tank monitor and control system (TMACS) software configuration management plan

    SciTech Connect (OSTI)

    GLASSCOCK, J.A.

    1999-05-13T23:59:59.000Z

    This Software Configuration Management Plan (SCMP) describes the methodology for control of computer software developed and supported by the Systems Development and Integration (SD and I) organization of Lockheed Martin Services, Inc. (LMSI) for the Tank Monitor and Control System (TMACS). This plan controls changes to the software and configuration files used by TMACS. The controlled software includes the Gensym software package, Gensym knowledge base files developed for TMACS, C-language programs used by TMACS, the operating system on the production machine, language compilers, and all Windows NT commands and functions which affect the operating environment. The configuration files controlled include the files downloaded to the Acromag and Westronic field instruments.

  13. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J [ORNL; Pleszkoch, Mark G [ORNL; Sayre, Kirk D [ORNL; Linger, Richard C [ORNL

    2012-01-01T23:59:59.000Z

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  14. Object-oriented software development effort prediction using design patterns from object interaction analysis

    E-Print Network [OSTI]

    Adekile, Olusegun

    2009-05-15T23:59:59.000Z

    Software project management is arguably the most important activity in modern software development projects. In the absence of realistic and objective management, the software development process cannot be managed in an effective way. Software...

  15. Optimization of Lyapunov invariants in analysis and implementation of safety-critical software systems

    E-Print Network [OSTI]

    Roozbehani, Mardavij

    2008-01-01T23:59:59.000Z

    This dissertation contributes to two major research areas in safety-critical software systems, namely, software analysis, and software implementation. In reference to the software analysis problem, the main contribution ...

  16. SHMTools: a general-purpose software tool for SHM applications

    SciTech Connect (OSTI)

    Harvey, Dustin [Los Alamos National Laboratory; Farrar, Charles [Los Alamos National Laboratory; Taylor, Stuart [Los Alamos National Laboratory; Park, Gyuhae [Los Alamos National Laboratory; Flynn, Eric B [UCSD; Kpotufe, Samory [UCSD; Dondi, Denis [UCSD; Mollov, Todor [UCSD; Todd, Michael D [UCSD; Rosin, Tajana S [UCSD; Figueiredo, Eloi [UNIV OF PORTO, PORTUGAL

    2010-11-30T23:59:59.000Z

    This paper describes a new software package for various structural health monitoring (SHM) applications. The software is a set of standardized MATLAB routines covering three main stages of SHM: data acquisition, feature extraction, and feature classification for damage identification. A subset of the software in SHMTools is embeddable, which consists of Matlab functions that can be cross-compiled into generic 'C' programs to be run on a target hardware. The software is also designed to accommodate multiple sensing modalities, including piezoelectric active-sensing, which has been widely used in SHM practice. The software package, including standardized datasets, are publicly available for use by the SHM community. The details of this embeddable software will be discussed, along with several example processes that can be used for guidelines for future use of the software.

  17. Compiling software for a hierarchical distributed processing system

    DOE Patents [OSTI]

    Archer, Charles J; Blocksome, Michael A; Ratterman, Joseph D; Smith, Brian E

    2013-12-31T23:59:59.000Z

    Compiling software for a hierarchical distributed processing system including providing to one or more compiling nodes software to be compiled, wherein at least a portion of the software to be compiled is to be executed by one or more nodes; compiling, by the compiling node, the software; maintaining, by the compiling node, any compiled software to be executed on the compiling node; selecting, by the compiling node, one or more nodes in a next tier of the hierarchy of the distributed processing system in dependence upon whether any compiled software is for the selected node or the selected node's descendents; sending to the selected node only the compiled software to be executed by the selected node or selected node's descendent.

  18. --------Original Message --------Subject: [robo-ms] Fwd: Software Engineer for Rotorcraft Robotics and Simulation

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    . Develop real-time software in all phases of Software Development Life Cycle (SDLC); code in C, C++, and C

  19. Institute for Software Technology SWP Prdikatausdrcke

    E-Print Network [OSTI]

    p(t1,..,tn)PL() (p(t1,..,tn) hei�t Atomformel) Sind p,qPL(), dann auch pq, pq, pq, ¬p. Ist pPL() undInstitute for Software Technology Definitionen Ist pPL(), so hei�t p gültig in , wenn für alle ENV gilt I(,p)=T. Ist pPL(), so hei�t p erfüllbar in , wenn es ein ENV gibt mit I(,p)=T. Ist pPL(), so hei�t p

  20. Institute for Software Technology SWP Prdikatausdrcke

    E-Print Network [OSTI]

    , dann ist p(t1,..,tn)PL() (Atomformel). Sind p,qPL(), dann auch pq, pq, pq, ¬pPL(). Ist pPL() und v for Software Technology 11 Definitionen Ist pPL(), so hei�t p gültig in , wenn für alle ENV gilt I(,p)=T. Ist pPL(), so hei�t p erfüllbar in , wenn es ein ENV gibt mit I(,p)=T. Ist pPL(), so hei�t p

  1. Institute for Software Technology SWP Prdikatausdrcke

    E-Print Network [OSTI]

    , dann ist p(t1,..,tn)PL() (Atomformel). ! Sind p,qPL(), dann auch pq, pq, pq, ¬pPL(). ! Ist pPL() und v #12;Institute for Software Technology 11 Definitionen ! Ist pPL(), so hei�t p gültig in , wenn für alle ENV gilt I(,p)=T. ! Ist pPL(), so hei�t p erfüllbar in , wenn es ein ENV gibt mit I(,p)=T. ! Ist pPL

  2. Vertexing and Tracking Software at LHCb

    E-Print Network [OSTI]

    Bowen, Espen Eie

    2015-01-01T23:59:59.000Z

    The LHCb experiment is a dedicated heavy flavour experiment at the LHC. Its primary goal is to search for indirect evidence of New Physics in CP violation and rare decays of beauty and charm hadrons. The detector includes a high granularity silicon-strip vertex detector, a silicon-strip detector upstream of the magnet and three stations of silicon-strip detectors and straw drift tubes downstream of the magnet. The software used to perform the track reconstruction and primary vertex reconstruction is described in detail along with a discussion of its performance.

  3. Quality Classifiers for Open Source Software Repositories

    E-Print Network [OSTI]

    Tsatsaronis, George; Giakoumakis, Emmanouel A

    2009-01-01T23:59:59.000Z

    Open Source Software (OSS) often relies on large repositories, like SourceForge, for initial incubation. The OSS repositories offer a large variety of meta-data providing interesting information about projects and their success. In this paper we propose a data mining approach for training classifiers on the OSS meta-data provided by such data repositories. The classifiers learn to predict the successful continuation of an OSS project. The `successfulness' of projects is defined in terms of the classifier confidence with which it predicts that they could be ported in popular OSS projects (such as FreeBSD, Gentoo Portage).

  4. The QUEST Data Processing Software Pipeline

    E-Print Network [OSTI]

    Peter Andrews; Charles Baltay; Anne Bauer; Nancy Ellman; Jonathan Jerke; Rochelle Lauer; David Rabinowitz; Julia Silge

    2007-03-16T23:59:59.000Z

    A program that we call the QUEST Data Processing Software Pipeline has been written to process the large volumes of data produced by the QUEST camera on the Samuel Oschin Schmidt Telescope at the Palomar Observatory. The program carries out both aperture and PSF photometry, combines data from different repeated observations of the same portion of sky, and produces a Master Object Catalog. A rough calibration of the data is carried out. This program, as well as the calibration procedures and quality checks on the output are described.

  5. New hardware, software boost unit performance

    SciTech Connect (OSTI)

    Not Available

    1990-02-01T23:59:59.000Z

    Hardware and software developed by the Electric Power Research Institute (EPRI) over the last several years can help utilities monitor the performance of fossil-fired powerplants, diagnose and correct operating problems, and detect equipment degradation at an early stage. These products, 19 in all, have been combined at Potomac Electric Power Co's (Pepco) Morgantown Unit 2 to form an integrated performance monitoring system that has already reduced heat rate by 100 Btu/kWh on a unit that historically has been one of the better-performing plants in the nation. Maintenance planning and unit capacity have improved as well. Additional benefits also are likely, according to EPRI.

  6. Open Source Software Update | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked QuestionsDepartmentGas and Oil ResearchEnergyOn OctoberOpen Source Software

  7. AIRMaster+ Software Tool Brochure | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform is always evolving,Response to Smart(RevisionRetrospectiveofSoftware

  8. Software and Data | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz9MorganYou are hereValueacquisition/analysisSoftware

  9. Software Configuration Management Plan | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Site EnvironmentalEnergySafely Delivering DOE'sEnergy3 SGIGof EnergySofiaSoftware

  10. Hara Software Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetec AG| OpenInformation Handbook forHansung A E Jump to:HanwhaSoftware

  11. A Tool to Support Knowledge Based Software Maintenance: The Software Service Jonathan I. Maletic

    E-Print Network [OSTI]

    Maletic, Jonathan I.

    ]: · Corrective · Perfective · Adaptive · Preventive/ Preservation Corrective maintenance is the correction, and corrective were originally used by Swanson [15]. Preventive maintenance is done to improve the future,8,14,12] and preventive maintenance is rarely done. However, it is assumed that a good software development methodology

  12. Testbed Software for NSLU2 The JHU testbed software is developed to help users

    E-Print Network [OSTI]

    Amir, Yair

    testbed 3.0. Conventions The followings are the conventions defined by tos.py. Suppose you want three digits of TCP port implies TOS_NODE_ID of a mote. With the e 2 / 3 #12;Testbed Software for NSLU2 Suppose the mote's TOS_NODE_ID you want to read data from is 3. Then, by executing the following conetwork

  13. Abstract --Developing software for mobile or ad hoc scenarios is very cost intensive. Different software and

    E-Print Network [OSTI]

    Steimann, Friedrich

    for an appropriate development support for devices with short life cycles. Third-party solutions often do not reachAbstract -- Developing software for mobile or ad hoc scenarios is very cost intensive. Different processors and big memories are available in principle, they con- sume a great amount of valuable battery

  14. Ground test accelerator control system software

    SciTech Connect (OSTI)

    Burczyk, L.; Dalesio, R.; Dingler, R.; Hill, J.; Howell, J.A.; Kerstiens, D.; King, R.; Kozubal, A.; Little, C.; Martz, V.; Rothrock, R.; Sutton, J.

    1988-01-01T23:59:59.000Z

    The GTA control system provides an environment in which the automation of a state-of-the-art accelerator can be developed. It makes use of commercially available computers, workstations, computer networks, industrial I/O equipment, and software. This system has built-in supervisory control (like most accelerator control systems), tools to support continuous control (like the process control industry), and sequential control for automatic startup and fault recovery (like few other accelerator control systems). Several software tools support these levels of control: a real-time operating system (VxWorks) with a real-time kernel (VRTX), a configuration database, a sequencer, and a graphics editor. VxWorks supports multitasking, fast context-switching, and preemptive scheduling. VxWorks/VRTX is a network-based development environment specifically designed to work in partnership with the UNIX operating system. A database provides the interface to the accelerator components. It consists of a run time library and a database configuration and editing tool. A sequencer initiates and controls the operation of all sequence programs (expressed as state programs). A graphics editor gives the user the ability to create color graphic displays showing the state of the machine in either text or graphics form. 11 refs., 2 figs.

  15. SUSTAINABLE REMEDIATION SOFTWARE TOOL EXERCISE AND EVALUATION

    SciTech Connect (OSTI)

    Kohn, J.; Nichols, R.; Looney, B.

    2011-05-12T23:59:59.000Z

    The goal of this study was to examine two different software tools designed to account for the environmental impacts of remediation projects. Three case studies from the Savannah River Site (SRS) near Aiken, SC were used to exercise SiteWise (SW) and Sustainable Remediation Tool (SRT) by including both traditional and novel remediation techniques, contaminants, and contaminated media. This study combined retrospective analysis of implemented projects with prospective analysis of options that were not implemented. Input data were derived from engineering plans, project reports, and planning documents with a few factors supplied from calculations based on Life Cycle Assessment (LCA). Conclusions drawn from software output were generally consistent within a tool; both tools identified the same remediation options as the 'best' for a given site. Magnitudes of impacts varied between the two tools, and it was not always possible to identify the source of the disagreement. The tools differed in their quantitative approaches: SRT based impacts on specific contaminants, media, and site geometry and modeled contaminant removal. SW based impacts on processes and equipment instead of chemical modeling. While SW was able to handle greater variety in remediation scenarios, it did not include a measure of the effectiveness of the scenario.

  16. Salvo: Seismic imaging software for complex geologies

    SciTech Connect (OSTI)

    OBER,CURTIS C.; GJERTSEN,ROB; WOMBLE,DAVID E.

    2000-03-01T23:59:59.000Z

    This report describes Salvo, a three-dimensional seismic-imaging software for complex geologies. Regions of complex geology, such as overthrusts and salt structures, can cause difficulties for many seismic-imaging algorithms used in production today. The paraxial wave equation and finite-difference methods used within Salvo can produce high-quality seismic images in these difficult regions. However this approach comes with higher computational costs which have been too expensive for standard production. Salvo uses improved numerical algorithms and methods, along with parallel computing, to produce high-quality images and to reduce the computational and the data input/output (I/O) costs. This report documents the numerical algorithms implemented for the paraxial wave equation, including absorbing boundary conditions, phase corrections, imaging conditions, phase encoding, and reduced-source migration. This report also describes I/O algorithms for large seismic data sets and images and parallelization methods used to obtain high efficiencies for both the computations and the I/O of seismic data sets. Finally, this report describes the required steps to compile, port and optimize the Salvo software, and describes the validation data sets used to help verify a working copy of Salvo.

  17. Wire scanner software and firmware issues

    SciTech Connect (OSTI)

    Gilpatrick, John Doug [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    The Los Alamos Neutron Science Center facility presently has 110 slow wire scanning profile measurement instruments located along its various beam lines. These wire scanners were developed and have been operating for at least 30 years. While the wire scanners solved many problems to operate and have served the facility well they have increasingly suffered from several problems or limitations, such as maintenance and reliability problems, antiquated components, slow data acquisition, and etc. In order to refurbish these devices, these wire scanners will be replaced with newer versions. The replacement will consist of a completely new beam line actuator, new cables, new electronics and brand new software and firmware. This note describes the functions and modes of operation that LabVIEW VI software on the real time controller and FPGA LabVIEW firmware will be required. It will be especially interesting to understand the overall architecture of these LabVIEW VIs. While this note will endeavor to describe all of the requirements and issues for the wire scanners, undoubtedly, there will be missing details that will be added as time progresses.

  18. Sandia National Laboratories Advanced Simulation and Computing (ASC) software quality plan : ASC software quality engineering practices Version 3.0.

    SciTech Connect (OSTI)

    Turgeon, Jennifer L.; Minana, Molly A.; Hackney, Patricia; Pilch, Martin M.

    2009-01-01T23:59:59.000Z

    The purpose of the Sandia National Laboratories (SNL) Advanced Simulation and Computing (ASC) Software Quality Plan is to clearly identify the practices that are the basis for continually improving the quality of ASC software products. Quality is defined in the US Department of Energy/National Nuclear Security Agency (DOE/NNSA) Quality Criteria, Revision 10 (QC-1) as 'conformance to customer requirements and expectations'. This quality plan defines the SNL ASC Program software quality engineering (SQE) practices and provides a mapping of these practices to the SNL Corporate Process Requirement (CPR) 001.3.6; 'Corporate Software Engineering Excellence'. This plan also identifies ASC management's and the software project teams responsibilities in implementing the software quality practices and in assessing progress towards achieving their software quality goals. This SNL ASC Software Quality Plan establishes the signatories commitments to improving software products by applying cost-effective SQE practices. This plan enumerates the SQE practices that comprise the development of SNL ASC's software products and explains the project teams opportunities for tailoring and implementing the practices.

  19. SAPHIRE 8 Software Independent Verification and Validation Plan

    SciTech Connect (OSTI)

    Rae J. Nims

    2009-04-01T23:59:59.000Z

    SAPHIRE 8 is being developed with a phased or cyclic iterative rapid application development methodology. Due to this approach, a similar approach is being taken for the IV&V activities on each vital software object. The IV&V plan is structured around NUREG/BR-0167, “Software Quality Assurance Program and Guidelines,” February 1993. The Nuclear Regulatory Research Office Instruction No.: PRM-12, “Software Quality Assurance for RES Sponsored Codes,” March 26, 2007 specifies that RES-sponsored software is to be evaluated against NUREG/BR-0167. Per the guidance in NUREG/BR-0167, SAPHIRE is classified as “Level 1.” Level 1 software corresponds to technical application software used in a safety decision.

  20. SAPHIRE 8 Software Independent Verification and Validation Plan

    SciTech Connect (OSTI)

    Rae J. Nims; Kent M. Norris

    2010-02-01T23:59:59.000Z

    SAPHIRE 8 is being developed with a phased or cyclic iterative rapid application development methodology. Due to this approach, a similar approach is being taken for the IV&V activities on each vital software object. The IV&V plan is structured around NUREG/BR-0167, “Software Quality Assurance Program and Guidelines,” February 1993. The Nuclear Regulatory Research Office Instruction No.: PRM-12, “Software Quality Assurance for RES Sponsored Codes,” March 26, 2007 specifies that RES-sponsored software is to be evaluated against NUREG/BR-0167. Per the guidance in NUREG/BR-0167, SAPHIRE is classified as “Level 1.” Level 1 software corresponds to technical application software used in a safety decision.

  1. The Hidden Job Requirements for a Software Engineer

    SciTech Connect (OSTI)

    Marinovici, Maria C.; Kirkham, Harold; Glass, Kevin A.

    2014-01-09T23:59:59.000Z

    In a world increasingly operated by computers, where innovation depends on software, the software engineer’s role is changing continuously and gaining new dimensions. In commercial software development as well as scientific research environments, the way software developers are perceived is changing, because they are more important to the business than ever before. Nowadays, their job requires skills extending beyond the regular job description posted by HR, and more is expected. To advance and thrive in their new roles, the software engineers must embrace change, and practice the themes of the new era (integration, collaboration and optimization). The challenges may be somehow intimidating for freshly graduated software engineers. Through this paper the authors hope to set them on a path for success, by helping them relinquish their fear of the unknown.

  2. Cost Model and Cost Estimating Software - DOE Directives, Delegations...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    is basically a cost model, which forms the basis for estimating software. g4301-1chp22.pdf -- PDF Document, 190 KB Writer: John Makepeace Subjects: Administration...

  3. Startups Mexicanas : a guide to software entrepreneurship in Mexico

    E-Print Network [OSTI]

    Guzmán, Jorge (Jorge Arturo)

    2011-01-01T23:59:59.000Z

    This document investigates the possibilities of software entrepreneurship in developing economies, particularly Mexico, from an entrepreneur's perspective. It includes a broad analysis of the entrepreneurial environment ...

  4. applying software reliability: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    12;The US Space Shuttle Feitelson, Dror 6 Aarhus Universitet Reliable Software and Architecture Computer Technologies and Information Sciences Websites Summary: Aarhus Universitet...

  5. Batteries - Simulation software aids design ... | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Batteries - Simulation software aids design ... Designers of safe high-performance batteries for electric vehicles are getting a hand with a new computational toolset created by a...

  6. agile software development: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mark; D'Abrusco, Raffaele; Doe, Stephen; Ebert, Rick; Laurino, Omar; Pevunova, Olga; Refsdal, Brian; Thomas, Brian 2012-01-01 393 Software QA Intern (Paid) Are you...

  7. atlas offline software: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to allow for a larger variety and more sophisticated trigger criteria. In addition, the software controlling the central trigger processor (CTP) has been extended to allow the...

  8. Vehicle Technologies Office: Software Tools | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    National Laboratory. GCtool The General Computational toolkit (GCtool) is a versatile simulation software package for designing, analyzing, and comparing different power-plant...

  9. Sandia National Laboratories ASCI Applications Software Quality Engineering Practices

    SciTech Connect (OSTI)

    ZEPPER, JOHN D.; ARAGON, KATHRYN MARY; ELLIS, MOLLY A.; BYLE, KATHLEEN A.; EATON, DONNA SUE

    2003-04-01T23:59:59.000Z

    This document provides a guide to the deployment of the software verification activities, software engineering practices, and project management principles that guide the development of Accelerated Strategic Computing Initiative (ASCI) applications software at Sandia National Laboratories (Sandia). The goal of this document is to identify practices and activities that will foster the development of reliable and trusted products produced by the ASCI Applications program. Document contents include an explanation of the structure and purpose of the ASCI Quality Management Council, an overview of the software development lifecycle, an outline of the practices and activities that should be followed, and an assessment tool.

  10. Monitoring Software Reliability using Statistical Process control: An MMLE approach

    E-Print Network [OSTI]

    Prasad, R Satya; Kantam, R R L

    2011-01-01T23:59:59.000Z

    This paper consider an MMLE (Modified Maximum Likelihood Estimation) based scheme to estimate software reliability using exponential distribution. The MMLE is one of the generalized frameworks of software reliability models of Non Homogeneous Poisson Processes (NHPPs). The MMLE gives analytical estimators rather than an iterative approximation to estimate the parameters. In this paper we proposed SPC (Statistical Process Control) Charts mechanism to determine the software quality using inter failure times data. The Control charts can be used to measure whether the software process is statistically under control or not.

  11. SWEPP Gamma-Ray Spectrometer System software design description

    SciTech Connect (OSTI)

    Femec, D.A.; Killian, E.W.

    1994-08-01T23:59:59.000Z

    To assist in the characterization of the radiological contents of contract-handled waste containers at the Stored Waste Examination Pilot Plant (SWEPP), the SWEPP Gamma-Ray Spectrometer (SGRS) System has been developed by the Radiation Measurements and Development Unit of the Idaho National Engineering Laboratory. The SGRS system software controls turntable and detector system activities. In addition to determining the concentrations of gamma-ray-emitting radionuclides, this software also calculates attenuation-corrected isotopic mass ratios of-specific interest. This document describes the software design for the data acquisition and analysis software associated with the SGRS system.

  12. asci software quality: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Quality Model Requirements for Software Quality Engineering Computer Technologies and Information Sciences Websites Summary: is an emerging discipline that is concerned with...

  13. asc software quality: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Quality Model Requirements for Software Quality Engineering Computer Technologies and Information Sciences Websites Summary: is an emerging discipline that is concerned with...

  14. HCI AND SOFTWARE ENGINEERING FOR USER INTERFACE PLASTICITY

    E-Print Network [OSTI]

    Boyer, Edmond

    52 HCI AND SOFTWARE ENGINEERING FOR USER INTERFACE PLASTICITY Joëlle analysis are perceived as too demand- ing in terms of time and competence

  15. agent oriented software: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    21 22 23 24 25 Next Page Last Page Topic Index 1 Agent Oriented Software Engineering Computer Technologies and Information Sciences Websites Summary: - velopment. Specifically,...

  16. Software Architecture Decomposition Using Attributes Chung-Horng Lung

    E-Print Network [OSTI]

    Lung, Chung-Horng

    1 Software Architecture Decomposition Using Attributes Chung-Horng Lung Xia Xu Department and Eppinger [29] in other engineering disciplines. Inspired by Alexander, Andreu [2] and Lung,

  17. Performance Engineering Technology for Scientific Component Software

    SciTech Connect (OSTI)

    Malony, Allen D.

    2007-05-08T23:59:59.000Z

    Large-scale, complex scientific applications are beginning to benefit from the use of component software design methodology and technology for software development. Integral to the success of component-based applications is the ability to achieve high-performing code solutions through the use of performance engineering tools for both intra-component and inter-component analysis and optimization. Our work on this project aimed to develop performance engineering technology for scientific component software in association with the DOE CCTTSS SciDAC project (active during the contract period) and the broader Common Component Architecture (CCA) community. Our specific implementation objectives were to extend the TAU performance system and Program Database Toolkit (PDT) to support performance instrumentation, measurement, and analysis of CCA components and frameworks, and to develop performance measurement and monitoring infrastructure that could be integrated in CCA applications. These objectives have been met in the completion of all project milestones and in the transfer of the technology into the continuing CCA activities as part of the DOE TASCS SciDAC2 effort. In addition to these achievements, over the past three years, we have been an active member of the CCA Forum, attending all meetings and serving in several working groups, such as the CCA Toolkit working group, the CQoS working group, and the Tutorial working group. We have contributed significantly to CCA tutorials since SC'04, hosted two CCA meetings, participated in the annual ACTS workshops, and were co-authors on the recent CCA journal paper [24]. There are four main areas where our project has delivered results: component performance instrumentation and measurement, component performance modeling and optimization, performance database and data mining, and online performance monitoring. This final report outlines the achievements in these areas for the entire project period. The submitted progress reports for the first two years describe those year's achievements in detail. We discuss progress in the last project period in this document. Deployment of our work in CCA components, frameworks, and applications is an important metric of success. We also summarize the project's accomplishments in this regard at the end of the report. A list of project publications is also given.

  18. Nonconvex network optimization: Algorithms and software

    SciTech Connect (OSTI)

    Lamar, B.

    1994-12-31T23:59:59.000Z

    Although very efficient solution methods exist for linear and convex network optimization problems, minimum cost network flow problems with concave arc cost functions are challenging because the determination of the optimal solution requires, in the worst case, an evaluation of all the extreme points in the feasible region. Even more challenging, are network flow problems whose arc costs are neither concave nor convex as is the case for problems with price breaks or all-unit discounting. Yet, such situations arise frequently in many real-world problems. In this talk, solution methods for concave cost network flow problems will be reviewed and a computer software package will be presented. In addition, a method for converting networks with arbitrary arc costs into a pure concave cost network will be described.

  19. A Software Architecture for High Level Applications

    SciTech Connect (OSTI)

    Shen,G.

    2009-05-04T23:59:59.000Z

    A modular software platform for high level applications is under development at the National Synchrotron Light Source II project. This platform is based on client-server architecture, and the components of high level applications on this platform will be modular and distributed, and therefore reusable. An online model server is indispensable for model based control. Different accelerator facilities have different requirements for the online simulation. To supply various accelerator simulators, a set of narrow and general application programming interfaces is developed based on Tracy-3 and Elegant. This paper describes the system architecture for the modular high level applications, the design of narrow and general application programming interface for an online model server, and the prototype of online model server.

  20. SAPHIRE 8 Software Quality Assurance Plan

    SciTech Connect (OSTI)

    Curtis Smith

    2010-02-01T23:59:59.000Z

    This Quality Assurance (QA) Plan documents the QA activities that will be managed by the INL related to JCN N6423. The NRC developed the SAPHIRE computer code for performing probabilistic risk assessments (PRAs) using a personal computer (PC) at the Idaho National Laboratory (INL) under Job Code Number (JCN) L1429. SAPHIRE started out as a feasibility study for a PRA code to be run on a desktop personal PC and evolved through several phases into a state-of-the-art PRA code. The developmental activity of SAPHIRE was the result of two concurrent important events: The tremendous expansion of PC software and hardware capability of the 90s and the onset of a risk-informed regulation era.

  1. SIMD studies in the LHCb reconstruction software

    E-Print Network [OSTI]

    Campora Perez, D H

    2015-01-01T23:59:59.000Z

    During the data taking process in the LHC at CERN, millions of collisions are recorded every second by the LHCb Detector. The LHCb Online computing farm, counting around 15000 cores, is dedicated to the reconstruction of the events in real-time, in order to filter those with interesting Physics. The ones kept are later analysed $Offline$ in a more precise fashion on the Grid. This imposes very stringent requirements on the reconstruction software, which has to be as efficient as possible. Modern CPUs support so-called vector-extensions, which extend their Instruction Sets, allowing for concurrent execution across functional units. Several libraries expose the Single Instruction Multiple Data programming paradigm to issue these instructions. The use of vectorisation in our codebase can provide performance boosts, leading ultimately to Physics reconstruction enhancements. In this paper, we present vectorisation studies of significant reconstruction algorithms. A variety of vectorisation libraries are analysed a...

  2. Development of Updated ABsorption SIMulation Software (ABSIM)

    SciTech Connect (OSTI)

    Yang, Zhiyao [Purdue University, West Lafayette, IN; Tang, Xin [Purdue University, West Lafayette, IN; Qu, Ming [Purdue University, West Lafayette, IN; Abdelaziz, Omar [ORNL; Gluesenkamp, Kyle R [ORNL

    2014-01-01T23:59:59.000Z

    ABsorption SIMulation, ABSIM, was developed for the simulation of absorption systems by The Oak Ridge National Laboratory during 1980s and 1990s. ABSIM provides a platform for users to investigate various cycle configurations and working fluids, to calculate their operating parameters, to predict their performance, and to compare them with each other on a uniform basis. ABSIM is indeed a very useful and accurate tool for researchers to investigate various absorption systems. However, it has not been well maintained: it is incompatible with recent operating systems; the interface needs improved user-friendliness, and the system needs better parameter setting and debugging tools to help achieve convergence. Therefore, it is highly needed to update and improve ABSIM. The paper presents recent efforts to improve ABSIM s compatibility with current operating systems, user interface, and analysis capabilities. The paper details the features and functions of the newly updated ABSIM software. The new ABSIM still uses the previously validated calculation engine of the old ABSIM. The new graphic user interfaces (GUI) were developed in Qt, which is an open source license GUI software based on C++. XML was used as the database for data storage in the new ABSIM. The new ABSIM has been designed to be easily learned and used. It has enhanced editing and construction functions, plus enhanced analysis features including parametric tables, plotting, property plots, and master panels for debugging. A single effect water/LiBr absorption system is used as a case study in this paper to illustrate the features, capabilities, and functions of the new ABSIM. This case study was actually an example system available in the old ABSIM. The new version of ABSIM will be continuously developed to include additional subroutines for the components in liquid desiccant systems. The new ABSIM will be available to public for free. The ultimate goal of the new ABSIM is to allow it to become a simulation platform for both absorption heat pump and liquid desiccant systems.

  3. An approach to ensuring quality in environmental software

    SciTech Connect (OSTI)

    Gelston, G.M.; Lundgren, R.E.; McDonald, J.P.; Hoopes, B.L.

    1998-05-01T23:59:59.000Z

    Environmental software is often used to determine impacts to the public, workers, and the environment from environmental contamination. It is vital, therefore, that the modeling results, and the software that provides them, be scientifically defensible and capable of withstanding the most rigorous of technical reviews. The control and assurance of quality is a critical factor for the project team that develops environmental software at the Pacific Northwest National Laboratory. This document describes the philosophy, process, and activities that ensure a quality product throughout the life cycle of requirements analysis, design, programming, modification, testing, and implementation of environmental software. Environmental software developed by the project team is designed using an object-oriented approach. This software offers increased benefits, such as ease of maintenance and retention of the development and testing legacy of individual components, over traditional hard wired software. These benefits allow the design and testing of the models and future additions to be faster and less costly. This software is developed using a modular framework concept that allows a variety of models to work within a single construct. This software has two parts: an overall system framework and a set of modules. Each module has up to three components: a user interface, a scientific model, and pre/post-processors. Each of these pieces has a different set of quality criteria associated with it. However, whatever form this software might take for a particular client, standard processes apply to protect the information from inappropriate use. The information contained within this document can be applied to most environmental software to analyze risk in multiple environmental media.

  4. Enhancing User Customization through Novel Software Architecture for Utility Scale Solar Siting Software

    SciTech Connect (OSTI)

    Brant Peery; Sam Alessi; Randy Lee; Leng Vang; Scott Brown; David Solan; Dan Ames

    2014-06-01T23:59:59.000Z

    There is a need for a spatial decision support application that allows users to create customized metrics for comparing proposed locations of a new solar installation. This document discusses how PVMapper was designed to overcome the customization problem through the development of loosely coupled spatial and decision components in a JavaScript plugin architecture. This allows the user to easily add functionality and data to the system. The paper also explains how PVMapper provides the user with a dynamic and customizable decision tool that enables them to visually modify the formulas that are used in the decision algorithms that convert data to comparable metrics. The technologies that make up the presentation and calculation software stack are outlined. This document also explains the architecture that allows the tool to grow through custom plugins created by the software users. Some discussion is given on the difficulties encountered while designing the system.

  5. Engineering Management Approach to Software Production Plan, based on the Principles of Software Product Lines

    E-Print Network [OSTI]

    Shetty, Rama

    2005-12-16T23:59:59.000Z

    -phased process; inventory can be accumulated at different phases of a Software Development Life Cycle (SDLC), such as analysis, design, code, test etc. Hence, the cost of inventory is averaged over a standard period called ?release?, which could be monthly... examples (and is not a comprehensive list) of different tools that are used during the different phases of SDLC. SDLC Phase Tools Analysis Rational Rose Design Rational Rose, Together J Develop Together J, WSAD, Code Guide Test Win Runner...

  6. Self-adaptive software needs quantitative verification at Radu Calinescu

    E-Print Network [OSTI]

    Oxford, University of

    , performance and operating cost (e.g., energy consumption) of software. These techniques include model checkingSelf-adaptive software needs quantitative verification at runtime Radu Calinescu Department 1: The world and the machine. [19, 30]. In contrast, several mathematically-based modelling

  7. Self-adaptive software needs quantitative verification at Radu Calinescu

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , performance and operating cost (e.g., energy consumption) of software. These techniques include model checkingSelf-adaptive software needs quantitative verification at runtime Radu Calinescu Department"#.&*#.+$ Figure 1: The world and the machine. [19, 30]. In contrast, several mathematically-based modelling

  8. CUNY EXPORT CONTROL PROCEDURES 12. Licensed Software Programs

    E-Print Network [OSTI]

    Rosen, Jay

    CUNY EXPORT CONTROL PROCEDURES 12. Licensed Software Programs This section addresses the export control implications of licensing a software product that has been identified as "export controlled as "export controlled." In such cases and for purposes of understanding access implications for CUNY

  9. Software Platforms for Smart Building Ecosystems: Understanding the

    E-Print Network [OSTI]

    Software Platforms for Smart Building Ecosystems: Understanding the Key Architectural-ready software platform for the smart building domain. We analyzed the type of contributors that may exist in a smart building ecosystem, the quality attributes that those roles are concerned with, and the key

  10. Green Software Services: From Requirements to Business Models

    E-Print Network [OSTI]

    Dustdar, Schahram

    Green Software Services: From Requirements to Business Models Schahram Dustdar, Fei Li, Hong years, green software research is gaining momentum because of the acute need for sustainable develop- ment. Most past research has been focused on the definitions, metrics and technical solutions for green

  11. DesignMinders: Preserving and Sharing Informal Software Design Knowledge

    E-Print Network [OSTI]

    van der Hoek, André

    DesignMinders: Preserving and Sharing Informal Software Design Knowledge Gerald Bortis and André knowledge. For example, knowledge management systems that allow developers to populate and search, andre}@ics.uci.edu Abstract. Software design is a knowledge-intensive activity. Knowledge is both

  12. Seamlessly Integrating Software & Hardware Modelling for Large-Scale Systems

    E-Print Network [OSTI]

    Zhao, Yuxiao

    Engineering, with the math- ematical modelling approach, Modelica, to address the software/hardware integration problem. The environment and hardware components are modelled in Modelica and integrated software-hardware codesign, large-scale sys- tems, Behavior Engineering, Modelica. 1. Introduction

  13. Ideas for Security Assurance in Security Critical Software using Modelica

    E-Print Network [OSTI]

    Zhao, Yuxiao

    Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

  14. Inventory management with dynamic Bayesian network software systems

    E-Print Network [OSTI]

    Barker, Jon

    Inventory management with dynamic Bayesian network software systems Mark Taylor1 and Charles Fox2 1.fox@sheffield.ac.uk Abstract. Inventory management at a single or multiple levels of a supply chain is usually performed-the-shelf graphical software systems. We show how such sys- tems may be deployed to model a simple inventory problem

  15. Software Verification and Testing Lecture Notes: Testing I

    E-Print Network [OSTI]

    Struth, Georg

    of Testing Methods dynamic testing: software component is executed with concrete input values (in a realSoftware Verification and Testing Lecture Notes: Testing I #12;Motivation verification: · powerful · automated techniques rather limited testing: (as "poor man's verification") · can only detect presence

  16. On the Use of Logical Abduction in Software Engineering

    E-Print Network [OSTI]

    Russo, Alessandra

    - 1 - On the Use of Logical Abduction in Software Engineering ALESSANDRA RUSSO and BASHAR NUSEIBEH of abduction as a knowledge-based reasoning technique for analysing software specifications. We present a general overview of logical abduction and describe two abductive reasoning techniques, developed from

  17. Weaving the Software Development Process Between Requirements and Architectures

    E-Print Network [OSTI]

    van der Hoek, André

    step in the development life cycle; or leads to systems artificially constrained by their architecture development life cycle is needed, to reflect both the realities and necessities of modern software development ­ a life cycle that acknowledges the need to develop software architectures that are stable, yet adaptable

  18. Automated Test Coverage Measurement for Reactor Protection System Software

    E-Print Network [OSTI]

    Automated Test Coverage Measurement for Reactor Protection System Software Implemented in Function in implementing safety critical systems such as nuclear reactor protection systems. We have defined new structural- ing a case study using test cases prepared by domain experts for reactor protection system software

  19. A taxonomy for identifying requirement interactions in software systems

    E-Print Network [OSTI]

    Eberlein, Armin

    A taxonomy for identifying requirement interactions in software systems Mohamed Shehata a taxonomy for classifying and identifying requirement interactions in software systems. The proposed taxonomy is in the form of a four-layered pyramid that defines 6 Main Interaction Categories in the first

  20. Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution

    E-Print Network [OSTI]

    Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems Haralambos Mouratidis1 , Michael Weiss2 , and Paolo Giorgini3 1 School Software Engineering and security patterns have been proposed as suitable paradigms for the development

  1. Software Agent Architecture for Consistency Management in Distributed Documents

    E-Print Network [OSTI]

    Finkelstein, Anthony

    Software Agent Architecture for Consistency Management in Distributed Documents Anthony Finkelstein an account of an architecture for management of consistency relations between distributed documents. We of use of this system in a domain of software engineering documents. Keywords Consistency management, XML

  2. Architectural Support for Automated Software Attack Detection, Recovery, and Prevention

    E-Print Network [OSTI]

    Zambreno, Joseph A.

    Architectural Support for Automated Software Attack Detection, Recovery, and Prevention Jesse University Ames, IA 50011, USA Email: {jsathre, abaumgar, zambreno}@iastate.edu Abstract--Attacks on software systems architecture aimed at attack detection. Traditional techniques ignore the arguably more important

  3. The Evolving LawThe Evolving Law of Software Quality

    E-Print Network [OSTI]

    definitive summaries f th C Lof the Common Law · These Principles needed because Congress and stateThe Evolving LawThe Evolving Law of Software Quality Cem Kaner, J.D., Ph.D. Florida Institute on Law and Ethics in Software Engineering." Any opinions, findings and conclusions or recommendations

  4. MOTIVATING STUDENTS IN SOFTWARE ENGINEERING GROUP PROJECTS: AN EXPERIENCE REPORT

    E-Print Network [OSTI]

    Gold, Nicolas

    MOTIVATING STUDENTS IN SOFTWARE ENGINEERING GROUP PROJECTS: AN EXPERIENCE REPORT Nicolas Gold King, particularly in science and engineering. This paper presents experiences gained in introducing robotics as a means to increase engagement with a second-year undergraduate software-engineering group-project module

  5. Machine Learning Approaches to Estimating Software Development Effort

    E-Print Network [OSTI]

    Fisher, Douglas H.

    of software development effort is critical in software engineering. Underestimates lead to time pressures development effort from historical data. Our experiments indicate that these techniques are competitive on which they are trained. This cautionary note applies to any model­ construction strategy that relies

  6. Accuracy of Contemporary Parametric Software Estimation Models: A Comparative Analysis

    E-Print Network [OSTI]

    Tomkins, Andrew

    with delays and being costly and error- prone. Inaccurate estimation of project resources is considered as one the costs, schedule and the resources for IT projects. Software estimation is the process of predicting the effort, duration and cost required to develop a software system [2]. Estimators often rely on one or more

  7. Competition on Software Verification University of Passau, Germany

    E-Print Network [OSTI]

    Beyer, Dirk

    and Analysis of Systems (TACAS). 1 Introduction The area of verification, in particular model checking, has). Several new and powerful software-verification tools became available, but they have not been comparedCompetition on Software Verification (SV-COMP) Dirk Beyer University of Passau, Germany Abstract

  8. Software-Richtlinien fr IEC 61508 Peter Ladkin 2010

    E-Print Network [OSTI]

    Ladkin, Peter B.

    KAPITEL 14 Software-Richtlinien für IEC 61508 Peter Ladkin 2010 14.1 Comments on Part 3, Annexes that IEC 61508 is the IEC's second-biggest-selling document over some period of time and there are lots Software-Richtlinien für IEC 61508 such as the training courses offered by various TÜV organisations

  9. From Local to Global Coordination: Lessons from Software Reuse

    E-Print Network [OSTI]

    Grinter, Rebecca Elizabeth

    From Local to Global Coordination: Lessons from Software Reuse Rebecca E. Grinter Xerox PARC 3333 Coyote Hill Road Palo Alto, CA 94304 USA grinter@parc.xerox.com http://www.parc by making it possible to share code. However, software reuse in practice has proved much harder. This paper

  10. Automated transportation management system (ATMS) software project management plan (SPMP)

    SciTech Connect (OSTI)

    Weidert, R.S., Westinghouse Hanford

    1996-05-20T23:59:59.000Z

    The Automated Transportation Management System (ATMS) Software Project Management plan (SPMP) is the lead planning document governing the life cycle of the ATMS and its integration into the Transportation Information Network (TIN). This SPMP defines the project tasks, deliverables, and high level schedules involved in developing the client/server ATMS software.

  11. DIVERSIFY -Ecology-inspired software evolution for diversity emergence

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    DIVERSIFY - Ecology-inspired software evolution for diversity emergence Benoit Baudry, Martin are essential to provide adaptive capacities to many forms of complex systems, ranging from ecological in software systems. In particular, we are inspired by bipartite ecological relationships to investigate

  12. Model-based Quality Assurance of Automotive Software

    E-Print Network [OSTI]

    Jurjens, Jan

    CASE tool by ETAS · Used in automotive industry · Event-driven operational model #12;Jan Jürjens et alModel-based Quality Assurance of Automotive Software Jan Jürjens1 , Daniel Reiss2 , David (Germany) #12;Jan Jürjens et al.: Model-based Quality Assurance of Automotive Software 2 The Problem (Meta

  13. Cyber Dumpster Diving: Creating New Software Systems for Less

    SciTech Connect (OSTI)

    Gorton, Ian

    2013-02-01T23:59:59.000Z

    Modern scientific software is daunting in its breadth and complexity. From massively parallel simulations running on the world’s largest supercomputers to visualizations and user support environments that manage ever-growing, complex data collections, the challenges for software engineers are plentiful indeed.

  14. Evolution Patterns of Open-Source Software Systems and Communities

    E-Print Network [OSTI]

    Nakakoji, Kumiyo

    Evolution Patterns of Open-Source Software Systems and Communities Kumiyo Nakakoji1,2,3 Yasuhiro product evolution". To understand how this "natural product evolution" happens, we have conducted a case study of four typical OSS projects. Unlike most previous studies on software evolution that focus

  15. Embedded Software Security through Key-Based Control Flow Obfuscation

    E-Print Network [OSTI]

    Bhunia, Swarup

    ], as they are expected to run more computation-intensive software. An example is that cutting-edge cellular devices. The threat is a two-edged sword - on one hand, malicious software installed in an embedded system can harm, and physically the portable embedded sys- tems are often severely constrained by form factor, resulting

  16. Software Engineer RockAuto www.RockAuto.com

    E-Print Network [OSTI]

    Liblit, Ben

    Software Engineer ­ RockAuto www.RockAuto.com Position Description Software is the foundation · Familiarity with open-source development technologies like PHP, Perl, JavaScript and C (Linux system Lane, Madison, WI 53719) Why RockAuto? Strategic and tactical impact. We're an e-commerce company

  17. Architecture-Aware Algorithms and Software for Scalable Performance and

    E-Print Network [OSTI]

    Architecture-Aware Algorithms and Software for Scalable Performance and Resilience on Heterogeneous Architectures Date: January 24, 2011 Time: 1:00 ­ 2:00 pm Location: EMSL Auditorium Contact: Monica Moffett, 509 architectures; automatically tuned application software; exploiting mixed precision for performance

  18. Statistical Disclosure Control: Methods and Software Development in

    E-Print Network [OSTI]

    Jureckova, Jana

    language and runs under all platforms. Turn your ideas into software easily. #12;Using R for SDC Some and statistical computing. ­ is a modern object-oriented high-level programming language and runs under allStatistical Disclosure Control: Methods and Software Development in Matthias Templ Vienna

  19. Copyright 1997 by Rational Software Corporation Analysis and Design

    E-Print Network [OSTI]

    Mylopoulos, John

    Page 1 Copyright © 1997 by Rational Software Corporation Analysis and Design with UML Page 2 Copyright © 1997 by Rational Software Corporation Agenda n Benefits of Visual Modeling n History of the UML n Visual Modeling with UML n The Rational Iterative Development Process #12;Page 3 Copyright © 1997

  20. Programming Language Support for Energy-Aware Software

    E-Print Network [OSTI]

    Mayfield, John

    Programming Language Support for Energy-Aware Software Programming Language Support for Energy-Aware servers are the norm of modern computing infrastructure, energy efficiency is a first-class design goal sustainability. This talk focuses improving energy efficiency through software-centered approaches

  1. Development of Wind Turbines Prototyping Software Under Matlab/Simulink

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    204 1 Development of Wind Turbines Prototyping Software Under Matlab/Simulink® Through present the development of a wind turbine prototyping software under Matlab/Simulink® through and the end of 1999, around 75% of all new grid-connected wind turbines worldwide were installed in Europe [3

  2. Model-Based Quality Assurance of Automotive Software

    E-Print Network [OSTI]

    Jurjens, Jan

    Model-Based Quality Assurance of Automotive Software Jan Jürjens1 , Daniel Reiß2 , and David, Germany Abstract. Software in embedded (e.g. automotive) systems requires a high level of reliability to the automotive sector, characterized by strict safety requirements to com- ponents of a motor vehicle (see [5, 16

  3. SociallyOriented Requirements Engineering Software Engineering Meets Ethnography

    E-Print Network [OSTI]

    Miller, Tim

    SociallyOriented Requirements Engineering Software Engineering Meets Ethnography Sonja Pedell1,3 , Tim Miller2 , Frank Vetere1 , Leon Sterling3 , Steve Howard1 1 Department of Information Systems, The University of Melbourne 2 Department of Computer Science and Software Engineering, The University

  4. accident analysis software: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident analysis software First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 The Role of Software in...

  5. Sandia National Laboratories ASCI Applications Software Quality Engineering Practices

    SciTech Connect (OSTI)

    ZEPPER, JOHN D.; ARAGON, KATHRYN MARY; ELLIS, MOLLY A.; BYLE, KATHLEEN A.; EATON, DONNA SUE

    2002-01-01T23:59:59.000Z

    This document provides a guide to the deployment of the software verification activities, software engineering practices, and project management principles that guide the development of Accelerated Strategic Computing Initiative (ASCI) applications software at Sandia National Laboratories (Sandia). The goal of this document is to identify practices and activities that will foster the development of reliable and trusted products produced by the ASCI Applications program. Document contents include an explanation of the structure and purpose of the ASCI Quality Management Council, an overview of the software development lifecycle, an outline of the practices and activities that should be followed, and an assessment tool. These sections map practices and activities at Sandia to the ASCI Software Quality Engineering: Goals, Principles, and Guidelines, a Department of Energy document.

  6. Software reliability and safety in nuclear reactor protection systems

    SciTech Connect (OSTI)

    Lawrence, J.D. [Lawrence Livermore National Lab., CA (United States)

    1993-11-01T23:59:59.000Z

    Planning the development, use and regulation of computer systems in nuclear reactor protection systems in such a way as to enhance reliability and safety is a complex issue. This report is one of a series of reports from the Computer Safety and Reliability Group, Lawrence Livermore that investigates different aspects of computer software in reactor National Laboratory, that investigates different aspects of computer software in reactor protection systems. There are two central themes in the report, First, software considerations cannot be fully understood in isolation from computer hardware and application considerations. Second, the process of engineering reliability and safety into a computer system requires activities to be carried out throughout the software life cycle. The report discusses the many activities that can be carried out during the software life cycle to improve the safety and reliability of the resulting product. The viewpoint is primarily that of the assessor, or auditor.

  7. Analyses Of Two End-User Software Vulnerability Exposure Metrics

    SciTech Connect (OSTI)

    Jason L. Wright; Miles McQueen; Lawrence Wellman

    2012-08-01T23:59:59.000Z

    The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

  8. Mining Software Usage with the Automatic Library Tracking Database (ALTD)

    SciTech Connect (OSTI)

    Hadri, Bilel [ORNL; Fahey, Mark R [ORNL

    2013-01-01T23:59:59.000Z

    Tracking software usage is important for HPC centers, computer vendors, code developers and funding agencies to provide more efficient and targeted software support, and to forecast needs and guide HPC software effort towards the Exascale era. However, accurately tracking software usage on HPC systems has been a challenging task. In this paper, we present a tool called Automatic Library Tracking Database (ALTD) that has been developed and put in production on several Cray systems. The ALTD infrastructure prototype automatically and transparently stores information about libraries linked into an application at compilation time and also the executables launched in a batch job. We will illustrate the usage of libraries, compilers and third party software applications on a system managed by the National Institute for Computational Sciences.

  9. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, MANUSCRIPT ID 1 Development of a Software Engineering

    E-Print Network [OSTI]

    Sommerville, Ian

    Engineering Ontology for Multi-site Software Development Pornpit Wongthongtham, Elizabeth Chang, Tharam Dillon of software engineering. Index Terms--Software Engineering, Ontology Development, Multi-site SoftwareIEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, MANUSCRIPT ID 1 Development of a Software

  10. Two Case Studies of Open Source Software Development: Apache and Mozilla

    E-Print Network [OSTI]

    Herbsleb, James D.

    , Productivity, Pro- gramming teams, Software process models, Software Quality assurance, Time estimation; D.2 of Mozilla data. We conclude with thoughts about the prospects for high-performance commercial/open source.8 [Software Engineering]-- Process metrics, Product metrics; K.6.3 [Software Management]-- Software

  11. Windows XP VPN Instructions 12. Connect with the VPN and proceed to http://network.software.vt.edu for software.

    E-Print Network [OSTI]

    Virginia Tech

    and proceed to http://network.software.vt.edu for software. 5. For the Company Name use PPTP VT VPN. Click the Virginia Tech Wireless Network Service (http://wireless.cns.vt.edu) or the Virginia Tech Modem Pool (http on to your computer with an account that has administrator privileges. The PPTP VPN service supports 128 bit

  12. Sandia National Laboratories Advanced Simulation and Computing (ASC) software quality plan. Part 1: ASC software quality engineering practices, Version 2.0.

    SciTech Connect (OSTI)

    Sturtevant, Judith E.; Heaphy, Robert; Hodges, Ann Louise; Boucheron, Edward A.; Drake, Richard Roy; Minana, Molly A.; Hackney, Patricia; Forsythe, Christi A.; Schofield, Joseph Richard, Jr. (,; .); Pavlakos, Constantine James; Williamson, Charles Michael; Edwards, Harold Carter

    2006-09-01T23:59:59.000Z

    The purpose of the Sandia National Laboratories Advanced Simulation and Computing (ASC) Software Quality Plan is to clearly identify the practices that are the basis for continually improving the quality of ASC software products. The plan defines the ASC program software quality practices and provides mappings of these practices to Sandia Corporate Requirements CPR 1.3.2 and 1.3.6 and to a Department of Energy document, ASCI Software Quality Engineering: Goals, Principles, and Guidelines. This document also identifies ASC management and software project teams responsibilities in implementing the software quality practices and in assessing progress towards achieving their software quality goals.

  13. Sandia National Laboratories Advanced Simulation and Computing (ASC) software quality plan part 2 mappings for the ASC software quality engineering practices, version 2.0.

    SciTech Connect (OSTI)

    Heaphy, Robert; Sturtevant, Judith E.; Hodges, Ann Louise; Boucheron, Edward A.; Drake, Richard Roy; Minana, Molly A.; Hackney, Patricia; Forsythe, Christi A.; Schofield, Joseph Richard, Jr. (,; .); Pavlakos, Constantine James; Williamson, Charles Michael; Edwards, Harold Carter

    2006-09-01T23:59:59.000Z

    The purpose of the Sandia National Laboratories Advanced Simulation and Computing (ASC) Software Quality Plan is to clearly identify the practices that are the basis for continually improving the quality of ASC software products. The plan defines the ASC program software quality practices and provides mappings of these practices to Sandia Corporate Requirements CPR001.3.2 and CPR001.3.6 and to a Department of Energy document, ''ASCI Software Quality Engineering: Goals, Principles, and Guidelines''. This document also identifies ASC management and software project teams' responsibilities in implementing the software quality practices and in assessing progress towards achieving their software quality goals.

  14. Software Technology Readiness for the Smart Grid

    SciTech Connect (OSTI)

    Tugurlan, Maria C.; Kirkham, Harold; Chassin, David P.

    2011-06-13T23:59:59.000Z

    Abstract Budget and schedule overruns in product development due to the use of immature technologies constitute an important matter for program managers. Moreover, unexpected lack of technology maturity is also a problem for buyers. Both sides of the situation would benefit from an unbiased measure of technology maturity. This paper presents the use of a software maturity metric called Technology Readiness Level (TRL), in the milieu of the smart grid. For most of the time they have been in existence, power utilities have been protected monopolies, guaranteed a return on investment on anything they could justify adding to the rate base. Such a situation did not encourage innovation, and instead led to widespread risk-avoidance behavior in many utilities. The situation changed at the end of the last century, with a series of regulatory measures, beginning with the Public Utility Regulatory Policy Act of 1978. However, some bad experiences have actually served to strengthen the resistance to innovation by some utilities. Some aspects of the smart grid, such as the addition of computer-based control to the power system, face an uphill battle. It is our position that the addition of TRLs to the decision-making process for smart grid power-system projects, will lead to an environment of more confident adoption.

  15. MPS Vax monitor and control software architecture

    SciTech Connect (OSTI)

    Allison, S.; Spencer, N.; Underwood, K.; VanOlst, D.; Zelanzy, M.

    1993-04-01T23:59:59.000Z

    The new Machine Protection System (MPS) now being tested at the SLAC Linear Collider (SLC) includes monitoring and controlling facilities integrated into the existing VAX control system. The actual machine protection is performed by VME micros which control the beam repetition rate on a pulse-by-pulse basis based on measurements from fault detectors. The VAX is used to control and configure the VME micros, configure custom CAMAC modules providing the fault detector inputs, monitor and report faults and system errors, update the SLC database, and interface with the user. The design goals of the VAX software include a database-driven system to allow configuration changes without code changes, use of a standard TCP/IP-based message service for communication, use of existing SLCNET micros for CAMAC configuration, security and verification features to prevent unauthorized access, error and alarm logging and display updates as quickly as possible, and use of touch panels and X-windows displays for the user interface.

  16. Decision support software technology demonstration plan

    SciTech Connect (OSTI)

    SULLIVAN,T.; ARMSTRONG,A.

    1998-09-01T23:59:59.000Z

    The performance evaluation of innovative and alternative environmental technologies is an integral part of the US Environmental Protection Agency's (EPA) mission. Early efforts focused on evaluating technologies that supported the implementation of the Clean Air and Clean Water Acts. In 1986 the Agency began to demonstrate and evaluate the cost and performance of remediation and monitoring technologies under the Superfund Innovative Technology Evaluation (SITE) program (in response to the mandate in the Superfund Amendments and Reauthorization Act of 1986 (SARA)). In 1990, the US Technology Policy was announced. This policy placed a renewed emphasis on making the best use of technology in achieving the national goals of improved quality of life for all Americans, continued economic growth, and national security. In the spirit of the technology policy, the Agency began to direct a portion of its resources toward the promotion, recognition, acceptance, and use of US-developed innovative environmental technologies both domestically and abroad. Decision Support Software (DSS) packages integrate environmental data and simulation models into a framework for making site characterization, monitoring, and cleanup decisions. To limit the scope which will be addressed in this demonstration, three endpoints have been selected for evaluation: Visualization; Sample Optimization; and Cost/Benefit Analysis. Five topics are covered in this report: the objectives of the demonstration; the elements of the demonstration plan; an overview of the Site Characterization and Monitoring Technology Pilot; an overview of the technology verification process; and the purpose of this demonstration plan.

  17. 16.355J / ESD.355J Advanced Software Engineering, Fall 2002

    E-Print Network [OSTI]

    Leveson, Nancy

    A reading and discussion subject on advanced topics in the engineering of software systems. Focus on software development. Topics differ but are chosen from: software process and lifecycle; requirements development, ...

  18. Software Roadmap to Plug and Play Petaflop/s Editor: Bill Kramer (wtkramer@lbl.gov)

    E-Print Network [OSTI]

    Geddes, Cameron Guy Robinson

    LBNL-59999 Software Roadmap to Plug and Play Petaflop/s Editor: Bill Kramer (wtkramer Software Roadmap to Plug and Play Petaflop/s 1 Software Roadmap to Plug and Play Petaflop/s In the next

  19. International Journal of Software Engineering and Knowledge Engineering World Scientific Publishing Company

    E-Print Network [OSTI]

    Xu, Haiping

    International Journal of Software Engineering and Knowledge Engineering © World Scientific Publishing Company 1 FUTURE RESEARCH DIRECTIONS OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING* HAIPING XU) Software Engineering (SE) and Knowledge Engineering (KE) are closely related disciplines with goals

  20. Follow that Sketch: Lifecycles of Diagrams and Sketches in Software Development

    E-Print Network [OSTI]

    Sillito, Jonathan

    Follow that Sketch: Lifecycles of Diagrams and Sketches in Software Development Jagoda Walny. Through a series of interviews with computer science re- searchers who develop software, we probed of sketching and diagramming in software development. I. INTRODUCTION Visualization through sketching

  1. Round-Trip Software Engineering Using UML: From Architecture to Design and Back

    E-Print Network [OSTI]

    Egyed, Alexander

    1 Round-Trip Software Engineering Using UML: From Architecture to Design and Back Abstract A key. 1 Introduction The basic promise of software architecture research is that better software systems

  2. Mesh component design and software integration within SUMAA3d.

    SciTech Connect (OSTI)

    Freitag, L.

    1999-01-13T23:59:59.000Z

    The requirements of distributed-memory applications that use mesh management software tools are diverse, and building software that meets these requirements represents a considerable challenge. In this paper we discuss design requirements for a general, component approach for mesh management for use within the context of solving PDE applications on parallel computers. We describe recent efforts with the SUMAA3d package motivated by a component-based approach and show how these efforts have considerably improved both the flexibility and the usability of this software.

  3. Applying Agile MethodstoWeapon/Weapon-Related Software

    SciTech Connect (OSTI)

    Adams, D; Armendariz, M; Blackledge, M; Campbell, F; Cloninger, M; Cox, L; Davis, J; Elliott, M; Granger, K; Hans, S; Kuhn, C; Lackner, M; Loo, P; Matthews, S; Morrell, K; Owens, C; Peercy, D; Pope, G; Quirk, R; Schilling, D; Stewart, A; Tran, A; Ward, R; Williamson, M

    2007-05-02T23:59:59.000Z

    This white paper provides information and guidance to the Department of Energy (DOE) sites on Agile software development methods and the impact of their application on weapon/weapon-related software development. The purpose of this white paper is to provide an overview of Agile methods, examine the accepted interpretations/uses/practices of these methodologies, and discuss the applicability of Agile methods with respect to Nuclear Weapons Complex (NWC) Technical Business Practices (TBPs). It also provides recommendations on the application of Agile methods to the development of weapon/weapon-related software.

  4. Demonstration of Datacenter Automation Software and Hardware (DASH) at the California Franchise Tax Board

    E-Print Network [OSTI]

    Bell, Geoffrey C.

    2010-01-01T23:59:59.000Z

    of Datacenter Automation Software and Hardware (DASH) at theof Datacenter Automation Software and Hardware (DASH) at theprotocol for building automation and control networks. It is

  5. Parallel I/O Software Infrastructure for Large-Scale Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Parallel IO Software Infrastructure for Large-Scale Systems Parallel IO Software Infrastructure for Large-Scale Systems | Tags: Math & Computer Science Choudhary.png An...

  6. A flight software development and simulation framework for advanced space systems

    E-Print Network [OSTI]

    Enright, John Patrick, 1974-

    2002-01-01T23:59:59.000Z

    Distributed terrestrial computer systems employ middleware software to provide communications abstractions and reduce software interface complexity. Embedded applications are adopting the same approaches, but must make ...

  7. Decon2LS: An Open-Source Software Package for Automated Processing...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Software Package for Automated Processing and Visualization of High Resolution Mass Spectrometry Data. Decon2LS: An Open-Source Software Package for Automated Processing and...

  8. agent-oriented software engineering: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    P. Ciancarini 1999-01-01 2 Agent-Oriented Software Engineering Report on the 4th Computer Technologies and Information Sciences Websites Summary: Agent-Oriented Software...

  9. The Road to Farming Software is Paved with Good Intentions

    E-Print Network [OSTI]

    Easterbrook, Steve

    , the aggregation software, and GPS service contract (a cost starting at $12,000). Farmers must renew their service contract every five years, to have continued access to the GPS satellites. FarmMap was first released

  10. A methodology integrating formal and informal software development

    E-Print Network [OSTI]

    a methodology integrating formal and informal soft- ware development. By distinguishing several dimensions Our methodology covers requirements engineering and logical system design. It is particularly suitedA methodology integrating formal and informal software development Barbara Paech Institut fur

  11. Robust and Efficient Software Management in Sensor Networks

    E-Print Network [OSTI]

    Breu, Ruth

    on the first technique was done mainly based on network-centric reprogramming. For exam- ple, the Deluge system [14] was developed for reprogramming Mica2 motes. Deluge propagates software update over the ad hoc

  12. Developing a comprehensive software environment for passive solar design

    E-Print Network [OSTI]

    Lotz, Steven E

    1985-01-01T23:59:59.000Z

    This thesis is a journal which describes the thoughts and decisions leading up to the final design of a comprehensive software environment for passive solar design. The main purpose of this writing is to convey why a ...

  13. The Icecube Data Acquisition Software: Lessons Learned During Distributed, Collaborative,

    E-Print Network [OSTI]

    Geddes, Cameron Guy Robinson

    The Icecube Data Acquisition Software: Lessons Learned During Distributed, Collaborative, Multi@mail.npxdesigns.com, CPMcParland@lbl.gov, SJPatton@lbl.gov Abstract. In this experiential paper we report on lessons learned

  14. Validation of a Three Dimensional Particle Tracking Velocimetry Software

    E-Print Network [OSTI]

    Goumnerov, Hristo

    2014-08-01T23:59:59.000Z

    In the present research, the three dimensional particle tracking software OpenPTV is validated with synthetic images from the Standard PIV project by the Visualization Society of Japan, and with experimental data from the twin-jet facility...

  15. Knowware: the third star after Hardware and Software

    E-Print Network [OSTI]

    Lu, Ruqian

    2007-01-01T23:59:59.000Z

    This book proposes to separate knowledge from software and to make it a commodity that is called knowware. The architecture, representation and function of Knowware are discussed. The principles of knowware engineering and its three life cycle models: furnace model, crystallization model and spiral model are proposed and analyzed. Techniques of software/knowware co-engineering are introduced. A software component whose knowledge is replaced by knowware is called mixware. An object and component oriented development schema of mixware is introduced. In particular, the tower model and ladder model for mixware development are proposed and discussed. Finally, knowledge service and knowware based Web service are introduced and compared with Web service. In summary, knowware, software and hardware should be considered as three equally important underpinnings of IT industry. Ruqian Lu is a professor of computer science of the Institute of Mathematics, Academy of Mathematics and System Sciences. He is a fellow of Chin...

  16. Applying supply chain methodology to a centralized software licensing strategy

    E-Print Network [OSTI]

    Sheinbein, Rachel Felice, 1975-

    2004-01-01T23:59:59.000Z

    Eleven percent of companies spend between $150K and $200K per year per engineer on software development tools and nine percent spend more than $200K, according to a Silicon Integration Initiative/Gartner/EE Times study ...

  17. Software content delivery in an outsourced manufacturing environment

    E-Print Network [OSTI]

    Hung Shion C. (Shion Chen), 1976-

    2004-01-01T23:59:59.000Z

    The trend towards integrated hardware and software solutions has become prevalent in the corporate server market. At the same time, companies struggle with the apparently conflicting goals of providing customers more ...

  18. Towards An Automated Approach to Hardware/Software Decomposition

    E-Print Network [OSTI]

    Qin, Shengchao

    We propose in this paper an algebraic approach to hard-ware/software partitioning in Verilog Hardware Description Language (HDL). We explore a collection of algebraic laws for Verilog programs, from which we design a set ...

  19. The Evolution of a Modular Software Network Miguel A. Fortuna

    E-Print Network [OSTI]

    Fortuna, Miguel A.

    The Evolution of a Modular Software Network Miguel A. Fortuna , Juan A. Bonachela, and Simon A the website of this journal as a zip folder. To whom correspondence should be addressed. E-mail: fortuna

  20. GE Software Expert Julian Keith Loren Discusses Innovation and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    GE Software Expert Julian Keith Loren Discusses Innovation and the Industrial Internet Click to email this to a friend (Opens in new window) Share on Facebook (Opens in new window)...