University of Limerick Institutional Repository

Browsing LERO by Title

DSpace/Manakin Repository

Browsing LERO by Title

Sort by: Order: Results:

  • Mc Hugh, Martin; Mc Caffery, Fergal; Fitzgerald, Brian; Stol, Klaas-Jan; Casey, Valentine; Coady, Garret (Springer, 2013)
    Agile development techniques are becoming increasingly popular in the generic software development industry as they appear to offer solutions to the problems associated with following a plan-driven Software Development ...
  • Mc Hugh, Martin; Mc Caffery, Fergal; Casey, Valentine (Springer Verlag, 2012)
    Agile methodologies such as XP and Scrum are founded upon the four values and twelve principles of agile software development. A software development project is only considered to be truly agile if these values and principles ...
  • Regan, Gilbert; Mc Caffery, Fergal; Mc Daid, Kevin; Flood, Derek (2012)
    Traceability of software artifacts, from requirements to design and through implementation and quality assurance, has long been promoted by the research and expert practitioner communities. However, evidence indicates ...
  • Mc Hugh, Martin; Mc Caffery, Fergal; Casey, Valentine (Euro SPI, 2012)
    Non-safety critical software developers have been reaping the benefits of adopting agile practices for a number of years. However, developers of safety critical software often have concerns about adopting Agile practices. ...
  • Domijan, Katarina; Wilson, Simon P (Springer-Verlag, 2011)
    A Bayesian multi-category kernel classi cation method is proposed. The algorithm performs the classi cation of the projections of the data to the principal axes of the feature space. The advantage of this approach is ...
  • Morgan, Lorraine; Finnegan, Patrick (Springer, 2007)
    Much of the assessment of OSS benefits and drawbacks has been based on anecdotal evidence appearing in practitioner publications, white papers, web articles etc. To a greater extent this research has tended to concentrate ...
  • de Graaf, Daan; Shosha, Ahmed F; Gladyshev, Pavel (2012)
    A recent emerging trend in the underground economy is malware dissemination as a service. Complex botnet infrastructures are developed to spread and install malware for third-party customers. In this research work, ...
  • Cahill, Vinny; Baker, Sean; Nixon, Paddy (IEEE Computer Society, 1997)
    peer-reviewed applications that cross the boundaries of different computing machines, operating systems, and programming languages are increasingly the norm. As a result, the need for what might be called “bridging ...
  • Griffin, Joe; Ryan, Kevin (IEEE Computer Society, 2010)
    Professional Issues in Software Engineering (PISE) has been taught as part of the computer systems undergraduate degree programme at the University of Limerick using a multiinstitutional collaborative pedagogy. PISE considers ...
  • Costello, Gabriel J.; Conboy, Kieran; Donnellan, Brian; Rochford, Colm (Springer-Verlag, 2007)
    This paper addresses a “challenge in practice” by describing the initial stage of an information systems development (ISD) project to support the management of innovation within a subsidiary of APC-MGE. To begin with, a ...
  • Gresse von Wangenheim, Christiane; Hauck, Jean Carlo R.; Buglione, Luigi; Mc Caffery, Fergal; Cardoso Lacerda, Thaisa; Vieira da Cruz, Ronny (Association for Computing Machinery, 2011)
    A complicated and time-consuming phase in the development of Maturity/Capability Models (MCMs) is the identification of existing relevant source models as, currently, information on existing MCMs is provided in very ...
  • Vassev, Emil (Edinburgh Napier University School of Computing, 2012)
    Awareness for computerized systems is possible by chaining functions in a control loop that monitors sensors, recognizes objects, predicts problems and, ultimately, learns.
  • Gacitua-Decar, Veronica; Pahl, Claus (2008)
    Increasingly, organisations are using Service-Oriented Architecture (SOA) as an approach to Enterprise Application Integration (EAI), which is required for the automation of business processes. This paper presents an ...
  • Jamshidi, Pooyan; Pahl, Claus (IEEE Computer Society, 2012)
    Software systems are subject to change. To embrace change, the systems should be equipped with automated mechanisms. Business process and software architecture models are two artifacts that are subject to change in an ...
  • Clarke, Paul; O'Connor, Rory V. (Springer, 2012)
    There is presently insufficient data regarding the relationship between software process improvement (SPI) and business success, a fact which may reduce process prioritisation in software development in practice. To assist ...
  • Deverell, Andrea; Agerfalk, Par J. (Asociacion de Tecnicos de Informatica, 2005)
    CALIBRE (Co-ordination Action for Libre Software)l, a EUR I.S million EU-funded project which aims to revolutionise how European industry leverages software and services, was officially launched on Friday 10 September 2004 ...
  • Noll, John; Seichter, Dominik; Beecham, Sarah (IEEE Computer Society, 2013)
    Content analysis is a useful approach for analyzing unstructured software project data, but it is labor-intensive and slow. Can automated text classification (using supervised machine learning) be used to reduce the ...
  • McElligott, Pat; Mjeda, Anila; Thiel, Steffen (SAE International, 2008)
    Legislative bodies are directing that automotive products comply with stringent safety levels. The liability for the safety of passengers in an automobile has traditionally been quite complex. Other transport sectors are ...
  • Blowers, Rosario; Richardson, Ita (2005)
    The Irish Software Industry is undergoing rapid change due to increased competition from low cost global software service providers. Prior to this, Ireland had emerged as one of the leading low cost software exporters ...
  • Omoronyia, Inah; Pasquale, Liliana; Salehie, Mazeiar; Cavallaro, Luca; Doherty, Gavin; Nuseibeh, Bashar (Association for Computing Machinery, 2012)
    In a dynamic environment where context changes frequently, users’ privacy requirements can also change. To satisfy such changing requirements, there is a need for continuous analysis to discover new threats and possible ...

Search DSpace


Advanced Search

Browse

My Account