SEI Publications Annual Reviews 2024 Research Review Schedule ¦ 2024 Research Review ...
Deploying critical software with certification and frequent updates is a major challenge. Exhaustive testing of safety-critical systems is not possible due to the exponential growth of test cases; ...
CaBSCE introduces a novel method for cost estimation that aligns with modern software practices, where flexibility and speed are paramount. Our tool identifies flows of information that indicate ...
Assuring evolving large-scale systems (i.e., systems with multiple subsystems) can be a bottleneck in deploying capabilities with the speed and confidence needed for current Department of Defense (DoD ...
This project focuses on creating a foundational model for all container reproducibility efforts (open-source, commercial, U.S. Department of Defense (DoD), etc.). The lack of build reproducibility is ...
Detecting malicious code is a challenge, particularly when it’s implanted in otherwise legitimate software. If undetected, malware injected into legitimate software can result in costly compromises of ...
Hardware inefficiencies pose major limitations to U.S. Department of Defense (DoD) applications; current processors simply cannot keep up with the large and complex machine learning (ML) workloads ...
In this webcast, Dr. Wolfgang Maass, Dr. Hyoil Han, and Hasan Yasar discuss key principles of conceptual modeling and explore its significance in various domains and its role in driving successful ...
AI engineering is an emergent discipline focused on developing tools, systems, and processes to enable the application of artificial intelligence in real-world contexts. In contrast to the prevalent ...
Students who wish to purchase the certificate program package (four eLearning courses, certificate exam) will receive a discount from the total cost. CERT Applied Data Science for Cybersecurity ...
The SEI Year in Review spotlights projects and initiatives that demonstrate the SEI's value to its sponsors and customers in government and industry. These projects demonstrate the ways in which the ...
This seven (7) hour online course provides a thorough understanding of the organizational models for an insider threat program, the necessary components to have an effective program, the key ...