University of Limerick Institutional Repository

Browsing Faculty of Science and Engineering by Author "Ali, Raian"

DSpace Repository

Browsing Faculty of Science and Engineering by Author "Ali, Raian"

Sort by: Order: Results:

  • Dalpiaz, Fabiano; Ali, Raian; Giorgini, Paolo (2012)
    An important activity to maximize Business/IT alignment is selecting a software con guration that ts a given context. Feature models represent the space of software con gurations in terms of distin- guished characteristics ...
  • Omoronyia, Inah; Salehie, Mazeiar; Ali, Raian; Kaiya, Haruhiko; Nuseibeh, Bashar (2011)
  • Pasquale, Liliana; Mazeiar, Salehie; Ali, Raian; Omoronyia, Inah; Nuseibeh, Bashar (IEEE Computer Society, 2012)
    Adaptive security aims to protect valuable assets managed by a system, by applying a varying set of security controls. Engineering adaptive security is not an easy task. A set of effective security countermeasures should ...
  • Ali, Raian; Griggio, Alberto; Franzén, Anders; Dalpiaz, Fabiano; Giorgini, Paolo (2012)
    Monitoring the system environment is a key functionality of a self- adaptive system. Monitoring requirements denote the information a self-adaptive system has to capture at runtime to decide upon whether an adaptation ...
  • Ali, Raian; Dalpiaz, Fabiano; Giorgini, Paolo (Elsevier, 2013)
    CONTEXT. The environment in which the system operates, its context, is variable. The autonomous ability of a software to adapt to context has to be planned since the requirements analysis stage as a strong mutual ...
  • Ali, Raian; Dalpiaz, Fabiano; Giorgini, Paolo; Souza, Victor E (2011)
    Requirements evolution is a main driver for systems evolution. Traditionally, requirements evolution is associated to changes in the users’ needs and environments. In this paper, we explore another cause for requirements ...
  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Ali, Raian; Nuseibeh, Bashar (2012)
    Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets are therefore key activities in any security engineering process – from modeling threats and attacks, discovering ...
  • Ali, Raian; Solis, Carlos; Omoronyia, Inah; Salehie, Mazeiar; Nuseibeh, Bashar (2012)
    Adaptive systems are characterized by the ability to monitor changes in their volatile world and react to monitored changes when needed. The ultimate goal of adaptation is that users’ requirements are always met correctly ...
  • Ali, Raian; Solis, Carlos; Salehie, Mazeiar; Omoronyia, Inah; Nuseibeh, Bashar; Maalej, Walid (Association for Computing Machinery, 2011)
    Adaptation requires a system to monitor its operational context to ensure that when changes occur, a suitable adaptation action is planned and taken at runtime. The ultimate goal of adaptation is that users get their dynamic ...
  • Ali, Raian; Solis, Carlos; Dalpiaz, Fabiano; Maalej, Walid; Giorgini, Paolo; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    Software product lines are an engineering paradigm meant to systematically configure software products of reusable assets so that development effort and time are minimized. Config-uring a high-quality product is a challenging ...

Search DSpace


Browse

My Account

Statistics