University of Limerick Institutional Repository

Browsing Faculty of Science and Engineering by Subject "adaptation"

DSpace Repository

Browsing Faculty of Science and Engineering by Subject "adaptation"

Sort by: Order: Results:

  • Omoronyia, Inah; Cavallaro, Luca; Salehie, Mazeiar; Pasquale, Liliana; Nuseibeh, Bashar (Association for Computing Machinery, 2013)
    Applications that continuously gather and disclose personal information about users are increasingly common. While disclosing this information may be essential for these applications to function, it may also raise privacy ...
  • Liu, Yu; Meier, Rene (University of Oslo, 2008)
    Feature interaction describes a situation where the combination of two or more services that individually perform correctly results in unexpected and possibly adverse behaviour. Such feature interaction issues have first ...
  • Karlsson, Fredrik; Agerfalk, Par J. (2005)
    Method engineering approaches are often based on the assumption that method users are able to explicitly express their situational method requirements. However, similar to software requirements,situational method requirements ...
  • Staikopoulos, Athanasios; Saudrais, Sebastien; Clarke, Siobhán; Padget, Julian; Cliffe, Owen; DeVos, Marina (2008)
    In complex service-oriented systems, a number of layers of abstraction may be considered, in particular the models of the organisations involved, how interactions are coordinated and the services which are used and made ...
  • Ali, Raian; Griggio, Alberto; Franzén, Anders; Dalpiaz, Fabiano; Giorgini, Paolo (2012)
    Monitoring the system environment is a key functionality of a self- adaptive system. Monitoring requirements denote the information a self-adaptive system has to capture at runtime to decide upon whether an adaptation ...
  • Pasquale, Liliana; Yu, Yijun; Mazeiar, Salehie; Cavallaro, Luca; Tun, Thein Than; Nuseibeh, Bashar (IEEE Computer Society, 2013)
    We propose the use of forensic requirements to drive the automation of a digital forensics process. We augment traditional reactive digital forensics processes with proactive evidence collection and analysis activities, ...
  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Ali, Raian; Nuseibeh, Bashar (2012)
    Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets are therefore key activities in any security engineering process – from modeling threats and attacks, discovering ...
  • Lane, Stephen (University of Limerick, 2012)
    Context: The loose coupling of services and Service-Based Applications (SBAs) have made them the ideal platform for context-based run-time adaptation. There has been a lot of research into implementation techniques for ...
  • Pasquale, Liliana; Ghezzi, Carlo; Menghi, Claudio; Tsigkanos, Christos; Nuseibeh, Bashar (Association for Computing Machinery, 2014)
    Adaptive security systems aim to protect valuable assets in the face of changes in their operational environment. They do so by monitoring and analysing this environment, and deploying security functions that satisfy ...

Search DSpace


Browse

My Account

Statistics