University of Limerick Institutional Repository

Browsing LERO by Title

DSpace Repository

Browsing LERO by Title

Sort by: Order: Results:

  • Mc Caffery, Fergal; Coleman, Gerry (Praise Worthy Prize S.r.l., 2007)
    Software is becoming an increasingly important aspect of medical devices and medical device regulation. Software enables highly complex systems to be built. However, complexity is the enemy of safety, therefore strict ...
  • Hashmi, Sajid Ibrahim; Haque, Rafiqul; Schmieders, Eric; Richardson, Ita (IEEE Computer Society, 2011)
    Service Based Systems (SBSs) are composed of loosely coupled services. Different stakeholders in these systems, e.g. service providers, service consumers, and business decision makers, have different types of concerns which ...
  • Chen, Huan; Marques-Silva, Joao (Association for Computing Machinery, 2012)
    Boolean function bi-decomposition is pervasive in logic synthesis. Bi-decomposition entails the decomposition of a Boolean function into two other simpler functions connected by a simple two-input gate. Existing solutions ...
  • Lang, Michael; Fitzgerald, Brian (Taylor & Francis Ltd, 2006)
    Despite claims in the literature that "traditional" methods and techniques are inadequate and poorly matched to the demands of the Web design context, the findings from a field survey of Web/hypermedia systems designers ...
  • Shokry, Hesham; El-Boghdadi, Hatem M.; Shaheen, Samir I. (Association for Computing Machinery, 2008)
    Producing efficient and compact code for embedded DSP processors is very important for nowadays faster and smaller size devices. Because such processors have highly irregular data-path, conventional code generation techniques ...
  • Mc Caffery, Fergal; Wilkie, F.G.; McFall, Donald (2004)
    This presentation discusses statistical findings obtained from a survey of the state of software development practices within Northern Ireland (NI). The survey was developed and conducted by staff from the Centre for ...
  • Dobson, Simon; Nixon, Paddy (Trinity College Dublin, Dept. of Computer Science, 1999)
    We are currently witnessing a convergence of several threads of technology and business imperatives. The idea of a virtual enterprise (VE) – a business built from both organizationally and geographically distributed units ...
  • Sharif, Khaironi Yatim; Buckley, Jim (IEEE Computer Society, 2009)
    Several authors have proposed information seeking as an appropriate perspective for studying software evolution, and have characterized information seeking empirically in commercial software evolution settings. However, ...
  • Avram, Gabriela (IEEE Computer Society, 2007)
    As part of a research project dedicated to the Social Organizational and Cultural Aspects of Global Software Development, the author has chosen to focus on collaborative work practices and knowledge management aspects of ...
  • Belov, Anton; Janota, Mikolas; Lynce, Inês; Marques-Silva, Joao (Springer, 2012)
    A propositional formula in Conjunctive Normal Form (CNF) may contain redundant clauses | clauses whose removal from the for- mula does not a ect the set of its models. Identi cation of redundant clauses is important ...
  • Belov, Anton; Ivrii, Alexander; Matsliah, Arie; Marques-Silva, Joao (Springer-Verlag, 2012)
    In this paper we address the following problem: given an unsatisfiable CNF formula F, find a minimal subset of variables of F that constitutes the set of variables in some unsatisfiable core of F. This problem, known as ...
  • Meier, Rene; Cahill, Vinny (IEEE Computer Society, 2010)
    As mobile applications become more widespread, programming paradigms and middleware architectures designed to support their development are becoming increasingly important. The event-based programming paradigm is a strong ...
  • Shokry, Hesham; El-Boghdadi, Hatem M. (Association for Computing Machinery, 2011)
    The increasing demand for more functionality in embedded systems applications nowadays requires efficient generation of compact code for embedded DSP processors. Because such processors have highly irregular datapaths, ...
  • Mora, Manuel; Gelman, Ovsei; O'Connor, Rory V.; Jorge Macias, Francisco Alvarez (2007)
    The general aim of Systems Engineering (SE) and Software Engineering (SwE) is the definition, development and deployment of large-scale cost-effective and trustworthy integrated systems and software-intensive systems ...
  • Shokry, Hesham; Hinchey, Mike (IEEE Computer Society, 2009)
    The automotive industry is, like several other domains, a source of both challenging problems and innovative technologies of various kinds. One interesting phenomenon in this domain is the extensive interdependencies between ...
  • Rohmer, Thibaud; Nafaa, Abdelhamid; Nakib, Amir (IEEE Computer Society, 2012)
    Strong with large pools of set-top-boxes (STB) already deployed and connected to high-capacity networks, broadband operators sit on a major opportunity to introduce P2P-based VOD streaming architectures that scales up ...
  • Bai, Xu; Huang, LiGuo; Zhang, He (Springer-Verlag, 2010)
    Stakeholder and artifact are regarded as two important elements in software engineering processes, but they are rarely systematically investigated in software process modeling and simulation. Inspired by the Workshop of ...
  • Zhang, He; Ali Babar, Muhammad (British Informatics Society Ltd., 2010)
    BACKGROUND: Systematic Literature Review (SLR) has become an important research methodology in software engineering since 2004. One critical step in applying this methodology is to design and execute appropriate and effective ...
  • Vassev, Emil; Hinchey, Mike (IEEE Computer Society, 2013)
    In new space exploration initiatives of NASA and ESA, there is emphasis on both human and robotic exploration. Risk and feasibility are major factors supporting the use of unmanned craft and the use of automation and robotic ...
  • Jedrzejczyk, Lukasz; Price, Blaine A.; Bandara, Arosha K.; Nuseibeh, Bashar (2010)
    Effective privacy management requires that mobile systems' users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work has shown that making such privacy decisions ...

Search DSpace


Browse

My Account

Statistics