Methodologies in Analyzing the Root Causes of Nunn-McCurdy Breaches
暂无分享,去创建一个
Jerry M. Sollinger | Carolyn Wong | Charles Nemfakos | Irv Blickstein | Jeffrey A. Drezner | Megan McKernan | Brian McInnis
[1] Benjamin D. Forest. An analysis of military use of commercial satellite communications , 2008 .
[2] H. Goldstein,et al. Who killed the virtual case file? [case management software] , 2005, IEEE Spectrum.
[3] Jeffrey A Drezner. The Nature and Role of Prototyping in Weapon System Development , 1992 .
[4] Jerry M. Sollinger,et al. Root Cause Analyses of Nunn-McCurdy Breaches, Volume 2 , 2011 .
[5] David L. McNicol. Joint Acquisition: Implications from Experience with Fixed-Wing Tactical Aircraft , 2005 .
[6] Ronald O'Rourke,et al. Navy DDG-51 and DDG-1000 Destroyer Programs: Background and Issues for Congress , 2012 .
[7] Jeremiah J. Gertler. F-35 Alternate Engine Program: Background and Issues for Congress , 2012 .
[8] Ronald O'Rourke. F-35 Joint Strike Fighter (JSF) Program: Background and Issues for Congress , 2009 .
[9] Jeremiah J. Gertler. F-35 Joint Strike Fighter (JSF) Program: Background and Issues for Congress , 2009 .
[10] Levent Ozdemir. Analyzing the multi-national cooperative acquisition aspect of the Joint Strike Fighter (JSF) Program , 2009 .
[11] John Birkler,et al. Assessing Competitive Strategies for the Joint Strike Fighter: Opportunities and Options , 2001 .
[12] Christopher Bolkcom,et al. Joint Strike Fighter (JSF) Program: Background, Status, and Issues , 2002 .
[13] Robert L. Glass. Software Runaways: Monumental Software Disasters , 1997 .