University of Limerick Institutional Repository

Browsing by Subject "adaptation"

DSpace/Manakin Repository

Browsing by Subject "adaptation"

Sort by: Order: Results:

  • Omoronyia, Inah; Cavallaro, Luca; Salehie, Mazeiar; Pasquale, Liliana; Nuseibeh, Bashar (Association for Computing Machinery, 2013)
    Applications that continuously gather and disclose personal information about users are increasingly common. While disclosing this information may be essential for these applications to function, it may also raise privacy ...
  • Liu, Yu; Meier, Rene (University of Oslo, 2008)
    Feature interaction describes a situation where the combination of two or more services that individually perform correctly results in unexpected and possibly adverse behaviour. Such feature interaction issues have first ...
  • Karlsson, Fredrik; Agerfalk, Par J. (2005)
    Method engineering approaches are often based on the assumption that method users are able to explicitly express their situational method requirements. However, similar to software requirements,situational method requirements ...
  • Staikopoulos, Athanasios; Saudrais, Sebastien; Clarke, Siobhán; Padget, Julian; Cliffe, Owen; DeVos, Marina (2008)
    In complex service-oriented systems, a number of layers of abstraction may be considered, in particular the models of the organisations involved, how interactions are coordinated and the services which are used and made ...
  • Ali, Raian; Griggio, Alberto; Franzén, Anders; Dalpiaz, Fabiano; Giorgini, Paolo (2012)
    Monitoring the system environment is a key functionality of a self- adaptive system. Monitoring requirements denote the information a self-adaptive system has to capture at runtime to decide upon whether an adaptation ...
  • Pasquale, Liliana; Yu, Yijun; Mazeiar, Salehie; Cavallaro, Luca; Tun, Thein Than; Nuseibeh, Bashar (IEEE Computer Society, 2013)
    We propose the use of forensic requirements to drive the automation of a digital forensics process. We augment traditional reactive digital forensics processes with proactive evidence collection and analysis activities, ...
  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Ali, Raian; Nuseibeh, Bashar (2012)
    Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets are therefore key activities in any security engineering process – from modeling threats and attacks, discovering ...
  • Lane, Stephen (University of Limerick, 2012)
    Context: The loose coupling of services and Service-Based Applications (SBAs) have made them the ideal platform for context-based run-time adaptation. There has been a lot of research into implementation techniques for ...

Search DSpace

Browse

My Account