[Ellison 2005]Ellison, R. Trustworthy Integration: Challenges for the Practitioner(CMU/SEI-2005-TN-026, ADA441241). Pittsburgh, PA (USA):<strong>Software</strong> <strong>Engineering</strong> <strong>Institute</strong>, Carnegie Mellon University, 2005.http://www.sei.cmu.edu/publications/documents/05.reports/05tn026.html.[Fuggetta 2000]Fuggetta, A. “<strong>Software</strong> <strong>Process</strong>: A Roadmap,” 25–34. Proceedings ofthe 22nd International Conference on <strong>Software</strong> <strong>Engineering</strong> (ICSE2000). Limerick, Ireland, June 4–11, 2000. New York, NY: ACM Press,2000. http://www.softwaresystems.org/process.html.[Kazman 1998]Kazman, R., et. al. “The Architecture Tradeoff Analysis Method,”68–78. Proceedings of the Fourth IEEE International Conference on<strong>Engineering</strong> of Complex Computer Systems (ICECCS 1998). Monterey,CA (USA), August 10–14, 1998. Los Alamitos, CA (USA): IEEEComputer Society, 1998. http://www.sei.cmu.edu/ata/iceccs.pdf.[Krogstie 1995]Krogstie, J.; Lindland, O. I.; & Sindre, G. “Towards a DeeperUnderstanding of Quality in Requirements <strong>Engineering</strong>,” 82–95.Proceedings of the Seventh International CAiSE Conference(Lecture Notes in Computer Science, Volume 932). Jyväskylä, Finland, June 12–16, 1995. Berlin, Germany: Springer-Verlag, 1995(ISBN 3-540-59498-1).[Liu 2005]Liu, Y.; Fekete, A.; & Gorton, I. “Design-Level Performance Predictionof Component-Based Applications.” IEEE Transactions on <strong>Software</strong><strong>Engineering</strong> 31, 11 (2005): 928–941.[Ohlsson 2001]Ohlsson, M. C.; Andrews, A. Amschler; & Wohlin, C. “ModellingFault-Proneness Statistically Over a Sequence of Releases: A CaseStudy.” Journal of <strong>Software</strong> Maintenance 13, 3 (2001): 167–199.[Svahnberg 2003]Svahnberg, M.; Wohlin, C.; Lundberg, L.; & Mattsson, M. “A Quality-Driven Decision Support Method for Identifying <strong>Software</strong> ArchitectureCandidates.” International Journal of <strong>Software</strong> <strong>Engineering</strong> andKnowledge Management 13, 5 (2003): 547–573.[Voas 2004]Voas, J. “<strong>Software</strong>’s Secret Sauce: The ‘-ilities.’” IEEE <strong>Software</strong> 21, 6(November/December 2004): 14–15.132 Further Reading and References | IPRC <strong>Framework</strong>
[Wang 1999]Wang, W.; Pan, D.; & Chen, M. “Architecture-Based<strong>Software</strong> Reliability Modeling,” 143–150. Proceedings of the 1999Pacific Rim International Symposium on Dependable Computing.Hong Kong, December 16–17, 1999.http://csdl2.computer.org/persagen/DLAbsToc.jsp?resourcePath=/dl/proceedings/&toc=comp/proceedings/prdc/1999/0371/00/0371toc.xml.[Weaver 2005]Weaver, R.; Despotou, G.; Kelle, T.; & McDermid, J. “Combining<strong>Software</strong> Evidence – Arguments and Assurance,” 1–7. Proceedings ofthe 2005 Workshop on Realising Evidence-Based <strong>Software</strong> <strong>Engineering</strong>(REBSE Workshop at the 27th International Conference on <strong>Software</strong><strong>Engineering</strong>). St. Louis, MS (USA), May 15–21, 2005. New York, NY:ACM Press, 2005.Theme E: <strong>Process</strong> <strong>Engineering</strong> (Section 4)<strong>Software</strong> <strong>Process</strong> Adaptation[Coelho 2005]Coelho, R.; Brasileiro, E.; & von Staa, A. “Not So eXtremeProgramming: Agile Practices for R&D Projects,” 130–131.Proceedings of the 20th annual ACM SIGPLAN Conference onObject-Oriented Programming, Systems, Languages, and Applications(OOPSLA ’05). San Diego, CA (USA), October 16–20, 2005. NewYork, NY: ACM Press, 2005 (ISBN 1-59593-193-7).[Gnatz 2003]Gnatz, M.; Marschall, F.; Popp, G.; Rausch, A.; & Schwerin, W.Enabling a Living <strong>Software</strong> Development <strong>Process</strong> with <strong>Process</strong> Patterns(TUM-INFO-07-I0310-0/1.-FI). München, Germany: Institut fürInformatik, Technische Universität München, 2003.http://www4.informatik.tu-muenchen.de/publ/papers/TUM-I0310.pdf.[Henderson-Sellers 2005]Henderson-Sellers, B. & Serour, M. K. “Creating a Dual AgilityMethod: The Value of Method <strong>Engineering</strong>.” Journal of DatabaseManagement 16, 4 (2005): 1–23.[Henninger 2002]Henninger, S. Tool Support for Iterative, Adaptable and Agile<strong>Software</strong> Development Methodologies (2002).http://cse.unl.edu/~scotth/papers/Henninger_Agile-Adaptive-02.pdf.IPRC <strong>Framework</strong> | Further Reading and References 133
- Page 1:
A ProcessResearchFrameworkThe Inter
- Page 4:
This report was prepared for theSEI
- Page 8:
viIPRC Framework
- Page 11 and 12:
Executive SummaryThe discipline of
- Page 13 and 14:
Forces Driving Process Research Fra
- Page 15 and 16:
Process Research FrameworkThis docu
- Page 17 and 18:
MembersTwenty-seven leaders in indu
- Page 19 and 20:
A colleague from SAIC, Ms. Mary Ann
- Page 21 and 22:
1Introductionto the Framework
- Page 23 and 24:
As the work of the IPRC developed,
- Page 25 and 26:
1. The Relationships Between Proces
- Page 27 and 28:
2Architecture of theResearch Themes
- Page 29 and 30:
Managing Project Processes (Section
- Page 31 and 32:
2.2 Instantiating the Core ProcessR
- Page 33 and 34:
The product, process, people, and p
- Page 35 and 36:
2. These advances will be followed
- Page 37 and 38:
2.4 How Each Theme Presentation isS
- Page 39 and 40:
3Theme Q:The RelationshipsBetween P
- Page 41 and 42:
• security• usability (human-ma
- Page 43 and 44:
plan to address the underlying issu
- Page 45 and 46:
In addition, processes are effectiv
- Page 47 and 48:
Q-13 How do we make well-informed d
- Page 49 and 50:
4Theme E: ProcessEngineeringThis th
- Page 51 and 52:
create defined 8 processes for spec
- Page 53 and 54:
Mechanisms for SpecificationE-5 How
- Page 55 and 56:
Research questions associated with
- Page 57 and 58:
Research questions associated with
- Page 59 and 60:
5Theme P: ManagingProject Processes
- Page 61 and 62:
Developing software across borders
- Page 63 and 64:
Where higher levels of integration
- Page 65 and 66:
5.5.1 Research Node P.1: Operating
- Page 67 and 68:
P-6 How do we capture and share exp
- Page 69 and 70:
5.5.2 Research Node P.2: Managing T
- Page 71 and 72:
P-27 Do locations need a primary an
- Page 73 and 74:
6Theme D:Process DeploymentThis the
- Page 75 and 76:
Readers need to recognize the criti
- Page 77 and 78:
Accordingly, processes will be depl
- Page 79 and 80:
D-6 What is the quantitative relati
- Page 81 and 82:
The “assess” activity identifie
- Page 83 and 84:
Research questions associated with
- Page 85 and 86:
The objective of process research u
- Page 87 and 88:
7 Process Effects ofEmerging Techno
- Page 89 and 90:
If this sounds like Fred Brooks Jr.
- Page 91 and 92:
Figure 5 provides a framing of thre
- Page 93 and 94:
Process ChallengesIntegrated OrHete
- Page 95 and 96:
and management of stakeholder expec
- Page 97 and 98:
T-18 What replaces “quality = con
- Page 99 and 100:
have a comfort level with uncertain
- Page 101 and 102: When trying to integrate in a conte
- Page 103 and 104: T-49 How do we analyze the communic
- Page 105 and 106: 8Scenarios
- Page 107 and 108: Jurassic Park(Reconfigurable packs
- Page 109 and 110: Pandemic Triggers Global Instabilit
- Page 111 and 112: Embedded Software Rules(Rapid co-de
- Page 113 and 114: 9Sponsor Statements
- Page 115 and 116: We also monitor and evaluate the bu
- Page 117 and 118: Lockheed Martin Corporation IS&S(Pr
- Page 119 and 120: The SEI, with its reputation as a
- Page 121 and 122: As a sponsor, TCS has introduced th
- Page 123 and 124: A passion for innovation lies at th
- Page 125 and 126: Appendix
- Page 127 and 128: Research Node S.2: Establishing the
- Page 129 and 130: Research Node S.6: Usable SecurityT
- Page 131 and 132: Q-16 When composing systems of indi
- Page 133 and 134: E-22 How can we define the scope of
- Page 135 and 136: E-55 What level of statistical anal
- Page 137 and 138: P-10 How do we handle different tim
- Page 139 and 140: P-24 How do we identify suitable pa
- Page 141 and 142: D-16 What organization-based confid
- Page 143 and 144: D-43 What lessons can be learned fr
- Page 145 and 146: T-14 How do you sustain and evolve
- Page 147 and 148: T-46 How do you analyze data collec
- Page 149 and 150: Further Readingand References
- Page 151: [Boegh 1999]Boegh, J.; Depanfilis,
- Page 155 and 156: [Yoon 2001]Yoon, I.-C.; Min, S.-Y.;
- Page 157 and 158: [Kaba 1995]Kaba, A. B. & Derniame,
- Page 159 and 160: [Becker-Kornstaedt 2002]Becker-Korn
- Page 161 and 162: [Prikladnicki 2003]Prikladnicki, R.
- Page 163 and 164: [Smite 2004]Smite, D. “Global Sof
- Page 165 and 166: [Smith 1996]Smith, M. A.; Mitra, S.
- Page 167 and 168: [Weisbord 1987]Weisbord, M. Product
- Page 169 and 170: Appendix[Beznosov 2005]Beznosov, K.
- Page 172: Julia AllenVic BasiliBarry BoehmGon