University of Limerick Institutional Repository

Browsing LERO - UL authors by Title

DSpace Repository

Browsing LERO - UL authors by Title

Sort by: Order: Results:

  • Baresi, Luciano; Pasquale, Liliana (2011)
    Requirements elicitation is an important phase of the software life-cycle, since it helps to reduce the software development time and costs. Unfortunately, existing tools for software design are mainly focused on building ...
  • McKeogh, John; Exton, Chris (Association for Computing Machinery, 2004)
    Comprehending and maintaining software is one of the core software engineering activities from early implementation to long-term software evolution. This paper describes an Eclipse based tool, which provides ...
  • Richardson, Ita; Reid, Louise; Seidman, Stephen B; Pattinson, Bob; Delaney, Yvonne (IEEE Computer Society, 2011)
    Software Engineering graduates are expected to enter the workforce with both technical and soft skills. In addition, software quality is a topic that is becoming increasingly important both because of educational and ...
  • Vassev, Emil; Hinchey, Mike (Springer, 2012)
    Modern reasoning is based on inference techniques such as induction, deduction, abduction, subsumption, classification and recognition. These inference techniques are very inefficient when applied to large amounts of ...
  • Vassev, Emil; Hinchey, Mike (Springer, 2012)
    Autonomous behavior and onboard decision making is the backbone of robotic space exploration. The enormous distance and communication latency make such missions hardly controllable from Earth and external decision making ...
  • Fitzgerald, Brian (Elsevier Science, 1998)
    A postal survey was conducted to determine the following: the extent to which systems development methodologies are used in practice; the rating of their contribution to the development process; and the future trend in ...
  • English, Michael; Buckley, Jim; Cahill, Tony (IEEE Computer Society, 2005)
    A commonly held belief is that the friend construct in C++ is a violation of encapsulation. However, little empirical analysis of its use has taken place to provide evidence to support this claim. This paper presents a ...
  • Buckley, Jim; O'Brien, Michael P.; Power, Norah (2006)
    Several authors have proposed information seeking as an appropriate perspective for studying software maintenance activities. However, there is little research in the literature describing holistic information-seeking ...
  • O'Brien, Michael P.; Buckley, Jim; Exton, Chris (IEEE Computer Society, 2005)
    It is the view of many computer scientists that the standard of empirical software engineering research leaves scope for improvement. However, there is also an increasing awareness in the software engineering community ...
  • Power, Ken; Morgan, Lorraine; Conboy, Kieran (XP2010, 2010)
    In much the same way that XP and agile development radically changed the software development landscape, Open Innovation is transforming how organizations manage their innovation processes. In a traditional ‘closed innovation’ ...
  • Karakehayov, Z.; Vassev, Emil (IEEE Computer Society, 2011)
    Reducing power consumption is an important design objective in energy-constrained embedded and mobile systems. Such systems must be designed to meet functional and often timing requirements facing the challenge of energy ...
  • Omoronyia, Inah; Cavallaro, Luca; Salehie, Mazeiar; Pasquale, Liliana; Nuseibeh, Bashar (Association for Computing Machinery, 2013)
    Applications that continuously gather and disclose personal information about users are increasingly common. While disclosing this information may be essential for these applications to function, it may also raise privacy ...
  • Ryan, Kevin (IEEE Computer Society, 2008)
    Information and communication technologies, particularly software, play a crucial role in the Republic of Ireland's remarkable economic growth. Successful globalization has posed many challenges and fostered a major strategic ...
  • Galvin, Seamus; Collins, J.J.; Exton, Chris; McGurren, Finbar (Springer, 2004)
    One of the key reasons why ADLs are yet to be adopted commercially on a large scale is due to shortcomings in their ability to describe adequate interface specifications. An interface specification that is vague, lacking ...
  • Hynes, Briga; Richardson, Ita (Emerald, 2007)
    This paper considers the requirements for an industry sector approach to entrepreneurship education – The Information and Communications Technology (ICT) Sector. We present a modified Process Framework for Entrepreneurship ...
  • Buckley, Jim; Exton, Chris; Quigley, Aaron; LeGear, Andrew (2007)
    This paper introduces, and provides a cognitive basis for, a prototype meta-modeling process called ESCAPE. This process involves users explicitly stating their own model of an entity of interest, CAPturing an alternative ...
  • Ali Babar, Muhammad; Winkler, Dietmar; Biffl, Stefan (IEEE Computer Society, 2007)
    We have developed a framework for groupware tool support for the software architecture evaluation process in the context of global software development. We have empirically assessed the effectiveness of the groupwares ...
  • Fitzgerald, Brian; Musial, Mariusz; Stol, Klaas-Jan (Association for Computing Machinery, 2014)
    Many professions evolve from their origins as a creative craft process to a more product-centered industrial process. Software development is on such an evolutionary trajectory. A major step in this evolution is the ...
  • Botterweck, Goetz; Pleuss, Andreas; Dhungana, Deepak; Polzer, Andreas; Kowalewski, Stefan (Association for Computing Machinery, 2010)
    Companies successfully applying product line approaches often follow a long-term strategy and need to plan product portfolios years ahead. For instance in the automotive industry, managers constantly make decisions about ...
  • Hinchey, Mike; Coyle, Lorcan (IEEE Computer Society, 2010)
    Increasingly software can be considered to be critical,due to the business or other functionality which it supports. Upgrades or changes to such software are expensive and risky, primarily because the software has not ...

Search DSpace


Browse

My Account

Statistics