1. Mikhail Auguston, "Software Architecture Built from Behavior Models", ACM SIGSOFT Software Engineering Notes, Vol. 34, No 5, September 2009 (PDF)
  2. Mikhail Auguston, “Monterey Phoenix, or How to Make Software Architecture Executable”, OOPSLA’09/Onward conference, OOPSLA Companion, October 2009, pp.1031-1038 (PDF)
  3. Mikhail Auguston, Clifford Whitcomb, “System Architecture Specification Based on Behavior Models”, in Proceedings of the 15th ICCRTS Conference (International Command and Control Research and Technology Symposium), Santa Monica, CA, June 22-24, 2010 (PDF)
  4. Mikhail Auguston, Clifford Whitcomb, and Kristin Giammarco, "A New Approach to System and Software Architecture Specification Based on Behavior Models", 3rd International Conference on Model-Based Systems Engineering, IC-MBSE 2010, September 27-28, 2010. George Mason University, Fairfax, Virginia (PDF)
  5. Rivera, J., Auguston, M., Finkbine, R. Applying Architecture Modeling Methodology to the Naval Gunship Software Safety Domain, 23rd Annual Systems & Software Technology Conference (SSTC 2011), Salt Lake City, Utah, 16 - 19 May 2011
  6. Mikhail Auguston, Clifford Whitcomb, "Behavior Models and Composition for Software and Systems Architecture",  ICSSEA 2012, 24th International Conference on SOFTWARE & SYSTEMS ENGINEERING and their APPLICATIONS, Telecom ParisTech, Paris, October 23-25, 2012 (PDF)
  7. Jiexin Zhang, Yang Liu, Mikhail Auguston, Jun Sun and Jin Song Dong, “Using Monterey Phoenix to Formalize and Verify System Architectures”, 19th Asia-Pacific Software Engineering Conference APSEC 2012, December 4 – 7, 2012, Hong Kong (PDF)
  8. Kristin Giammarco, Mikhail Auguston, Well, You didn’t Say not to! A Formal Systems Engineering Approach to Teaching an Unruly Architecture Good Behavior,  Complex Adaptive Systems Conference, November 13 - 15, 2013, Baltimore, MD (link) (PDF)
  9. Monica Farah-Stapleton, Mikhail Auguston, Behavioral Modeling of Software Intensive System Architectures, Complex Adaptive Systems Conference, November 13 - 15, 2013, Baltimore, MD, (link) (PDF)
  10. Songzheng Song,  Jiexin Zhang,  Yang Liu,  Mikhail Auguston,  Jun Sun,  Jin Song Dong,  Tieming Chen,  Formalizing and verifying stochastic system architectures using Monterey Phoenix, Software & Systems Modeling, Springer Berlin Heidelberg,  April 2014, pp.1-19.(link)
  11. Kristin Giammarco, Mikhail Auguston, W. Clifton Baldwin, Ji'on Crump, Monica Farah-Stapleton: Controlling Design Complexity with the Monterey Phoenix Approach. Complex Adaptive Systems Conference, Philadelphia, PA, USA, November 3-5, 2014, pp.204-209. (link) (PDF)

  12. Mikhail Auguston, Behavior models for software architecture, NPS Technical Report NPS-CS-14-003, November 2014 (link)

  13. Whitcomb, Clifford A., Mikhail Auguston, and Kristin Giammarco. "Composition of Behavior Models for Systems Architecture", Chapter 14 in Modeling and Simulation Support for System of Systems Engineering Applications (2015), (Editors: Larry B. Rainey, Andreas Tolk), John Wiley & Sons, pp. 361- 391.
  14. Mikhail Auguston, Kristin Giammarco, W. Clifton Baldwin, Ji’on Crump, Monica Farah-Stapleton, Modeling and Verifying Business Processes with Monterey Phoenix, 2015 Conference on Systems Engineering Research, MARCH 17-19, 2015, STEVENS INSTITUTE OF TECHNOLOGY, HOBOKEN, NJ, USA (link)

Slides of MP briefing

Beta version of new MP editor/trace generator is now available on a public server.
There are several preloaded MP examples under IMPORT menu.

Dr. K.Giammarco’s web site for the MP project at NPS Department of Systems Engineering: (MP wiki site)

last updated June 24, 2015

Notice: The documents contained in these directories and files are included by the contributing authors as a means to ensure timely dissemination of technical work on a non-commercial basis. Copyright and all rights therein are retained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's or owner's copyright. These works may not be reposted without the explicit permission of the copyright holder.