Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ed Morris is active.

Publication


Featured researches published by Ed Morris.


ieee systems conference | 2008

Engineering Systems of Systems

Grace A. Lewis; Ed Morris; Patrick R. H. Place; Soumya Simanta; Dennis B. Smith; Lutz Wrage

Over the past decade, the focus of much effort in systems development has evolved from the development of individual self- contained systems to the integration of large-scale systems of systems (SoS) that are constantly evolving to address new user needs. Because these types of systems of systems no longer have a single controlling authority, have components that are developed and evolve independently, and as a result cannot be specified by a top-down set of requirements, the methods for engineering them need to be modified from the methods for engineering traditional systems. This paper identifies the characteristics of SoS, proposes a SoS life cycle, and identifies some considerations for requirements engineering in an SoS environment.


ieee systems conference | 2009

Identity management and its impact on federation in a system-of-systems context

Sriram Balasubramaniam; Grace A. Lewis; Ed Morris; Soumya Simanta; Dennis B. Smith

In its simplest form, identity management deals with how users are identified and authorized across networks. In the case of federated identity management, these networks cross system and organizational boundaries. To manage identity in this context, a cooperative contract is set up between multiple identity providers, using a decentralized approach. Establishing an identity management strategy within a single entity is straightforward. However, implementing identity management in a system of systems context presents unique challenges. This paper explains identity management in a federated context, presents the challenges of federated identity management, and provides some guidelines for successful federated identity management.


ieee systems conference | 2009

Information assurance challenges and strategies for securing SOA environments and web services

Soumya Simanta; Ed Morris; Sriram Balasubramaniam; Jeff Davenport; Dennis B. Smith

The potential benefits of business agility, flexibility, and reuse associated with SOA are well known today. However, these benefits do not come without a cost of their own, particularly regarding security. The primary goal to make web services widely accessible can also make them vulnerable. This paper examines the key challenges for securing service-oriented environments and identifies the important information assurance strategies that are necessary to mitigate and manage the security risks in an SOA environment.


2011 IEEE International Systems Conference | 2011

Web services for handheld tactical systems

Soumya Simanta; Daniel Plakosh; Ed Morris

Service-Oriented Architecture (SOA) is an architectural pattern for constructing and deploying systems characterized by components called services that can be composed into applications using standard interface formats. While service orientation can reduce integration cost and enhance agility in response to changing situations, it has not been widely applied to support mobile users in ad hoc, wireless computing environments common to tactical military situations and first responders to humanitarian disasters. These environments are impoverished in terms of computational resources and network characteristics. This paper describes a set of prototypes that demonstrate the use of SOA in tactical environments in which users are employing handheld devices to obtain situational awareness data.


Lecture Notes in Computer Science | 2003

COTS-Based Development: Taking the Pulse of a Project

Ed Morris; Cecilia Albert; Lisa Brownsword

Commercial-off-the-shelf (COTS)-based systems demand new indicators for determining a projects progress and its potential for success. Research by the COTS-based system (CBS) Initiative at the Software Engineering Institute (SEI) has shown that organizations building, acquiring, or supporting systems that rely on COTS products experience a consistent set, or pattern, of problems. These patterns provide the foundation for SEI seminars and workshops that present high-level keys to success along with activities or artifacts to look for in successful COTS-based system projects. These same patterns underlie the SEI COTS usage risk evaluation (CURE) technique for conducting a detailed risk analysis of the use of COTS products within an ongoing project. This paper reports on work that expands these efforts to provide an easily used mechanism to help organizations avoid inadequate practices and employ improved ones--in effect, to allow program managers to take the pulse of their COTS-based projects.


2013 1st International Workshop on the Engineering of Mobile-Enabled Systems (MOBS) | 2013

eMontage: An architecture for rapid integration of situational awareness data at the edge

Soumya Simanta; Gene M. Cahill; Ed Morris

This paper presents an architecture for rapid integration of situational awareness data on mobile handheld devices in resource-constrained, hostile environments. This capability will give users in crisis environments access to relevant data presented on a single screen with a consistent user interface. The framework and architecture discussed here enable the rapid addition of both publicly available and domain-specific data sources. This solution enables users to construct geospatial data mashups. Our architecture for accessing and filtering data from multiple sources provides benefits such as combining data from real-time and historical sources, operating in connected or disconnected modes, supporting individual selection and filtering of data, and integrating data from multiple sources.


Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR IX | 2018

Applying video summarization to aerial surveillance

K. Pitstick; J. Hansen; Mark H. Klein; Ed Morris; J. Vazquez-Trejo

The US increasingly relies on surveillance video to determine when activities of interest occur in a surveilled location. The growth in video volume places a difficult burden on the analyst workforce charged with evaluating streaming video or performing forensic analysis on archived video. This paper presents a video summarization pipeline that attempts to reduce the volume of video analysts must watch by summarizing the video into shorter, presumably important clips. The pipeline incorporates object recognition and tracking to generate clips composed of bounding boxes for objects across time, segments these clips into unique trajectories, trains a stacked sparse autoencoder, then generates a summary based on reconstruction error within the autoencoder, where high error indicates a unique (relative to previous) object trajectory. The paper then compares performance of the summarization pipeline applied to research datasets to performance on more realistic DoD surveillance datasets.


Archive | 1997

Workshop on COTS-Based Systems

Patricia A. Oberndorf; Lisa Brownsword; Ed Morris; Carol A. Sledge


Archive | 2004

SOSI: System of Systems Interoperability

B. C. Meyers; Linda Levine; Ed Morris; Patrick R. Place; Daniel Plakosh


Archive | 2010

Testing in Service-Oriented Environments

Ed Morris; William B. Anderson; Sriram Bala; David J. Carney; John Morley; Patrick R. Place; Soumya Simanta

Collaboration


Dive into the Ed Morris's collaboration.

Top Co-Authors

Avatar

Soumya Simanta

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Dennis B. Smith

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Daniel Plakosh

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Patrick R. Place

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Grace A. Lewis

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

David J. Carney

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Lisa Brownsword

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Lutz Wrage

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Sriram Balasubramaniam

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

B. Craig Meyers

Carnegie Mellon University

View shared research outputs
Researchain Logo
Decentralizing Knowledge