Franco Raffaele Cotugno's scientific contributions
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (4)
This chapter describes our experience of adopting agile
project management
in a software development project in the defense context. Adopting an agile approach for both software development and the management of the consequent project is becoming increasingly more relevant in many domains, and the defense domain is no exception. However, this relev...
Agile methods are now a mainstream production process and their proponents are no longer considered hackers or cowboy coders. Still, in embedded and safety critical domains there is somehow the expectation that the approach be "more" plan-based; at least, many of the current normatives seem to lean toward such approach. A definite change in attitud...
The innovations introduced in the Italian Army in Software (SW) Development Methodologies in the context of the “ITA ARMY AGILE” (IAA) initiative require attentive and tailored governance with regard to the growth of the enterprise complexity and the future requirements related to the development of Command and Control systems. Starting from a limi...
Many software-related technologies, including software development methodologies, quality models, etc. have been developed due to the huge software needs of the Department of Defense (DoD) of the United States. Therefore, it is not surprising that the DoD is promoting open source software and agile approaches into the development processes of the d...
Citations
... Since the main characteristic features of the projects are unforeseen, complexity, limited resources (e.g., time, budget, and material), changes, and high risks, the Agile Project Management (APM) concept was introduced to bring solutions to these issues. Therefore, different applications of APM can be seen in diverse industries such as automotive [14], defense [15], healthcare [16], and manufacturing [17]. ...
... Setiap Sprint memiliki pertemuan harian dengan setiap anggota tim mempresentasikan apa yang telah dilakukan pada hari sebelumnya, apa yang akan dilakukan hingga keesokan harinya, dan apakah ada hambatan untuk melanjutkan kegiatan pengembangan [12]. Di akhir setiap Sprint terdapat demo produk atau Review Sprint, dan setelah setiap Sprint Review ada sesi pembelajaran atau Retrospektif Sprint [13]. ...
... It developed mission-specific services called Functional Area Services (FAS). At an organizational level, they deployed a kind of Scrum of Scrums development method [19,85], where one or more Agile teams were committed to developing one FAS. This tailored Scrum approach was designed to have Sprints of five weeks, four for the development and one for security certifications. ...
... iAgile is a model for empirical project management of software developments. Inspired by the Agile Manifesto, it has been derived from Scrum, and has been especially tailored for Command and Control (C2) critical systems in the military domain [23]. A C2 system in this domain includes functional military areas to cope with humanitarian assistance, stability operations, counterinsurgency operations, and combat operations [25]. ...