University of Limerick Institutional Repository

Browsing by Title

DSpace Repository

Browsing by Title

Sort by: Order: Results:

  • Coffey, Gerard (Thomson Reuters (Professional) Limited, 2008)
    With the continued expansion of the European Union and the free movement of persons, there is potential for increased cross-border crime and the associated difficulties with concurrent prosecutorial jurisdictions for the ...
  • Marron, Aileen; Joyce, Ann Marie; Carr, James; Devereux, Eoin; Breen, Michael; Power, Martin J.; Haynes, Amanda (Rowman and Littlefield International, 2016)
    On October 16th 2013 Police carried out a raid on a Roma camp in Farsala in Central Greece. They rescued ‘Maria’, a four year old child who was presumed to be the victim of child abduction (Okely 2014). Blonde, with fair ...
  • Salehie, Mazeiar; Li, Sen; Tahvildari, Ladan; Dara, Rozita; Moore, Mark (IEEE Computer Society, 2011)
    Any changes for maintenance or evolution purposes may break existing working features, or may violate the requirements established in the previous software releases. Regression testing is essential to avoid these problems, ...
  • Tun, Thein Than; Bandara, Arosha K.; Price, Blaine A.; Yu, Yijun; Haley, Charles; Omoronyia, Inah; Nuseibeh, Bashar (IEEE Computer Society, 2012)
    Privacy requirements for mobile applications offer a distinct set of challenges for requirements engineering. First, they are highly dynamic, changing over time and locations, and across the different roles of ...
  • Calikli, Gul; Law, Mark; Bandara, Arosha K.; Russo, Alessandra; Dickens, Luke; Price, Blaine A.; Stuart, Avelie; Levine, Mark; Nuseibeh, Bashar (Association for Computing Machinery, 2016)
    Privacy violations in online social networks (OSNs) often arise as a result of users sharing information with unintended audiences. One reason for this is that, although OSN capa- bilities for creating and managing ...
  • Radics, Peter J; Gracanin, Denis (Assocation for Computing Machinery, 2011)
    While there is a growing body of research on privacy,most of the work puts the focus on information privacy. Physical and psychological privacy issues receive little to no attention. However, the introduction of technology ...
  • Mehta, Vikram; Price, Blaine A.; Bandara, Arosha K.; Nuseibeh, Bashar (Association for Computing Machinery, 2016)
    In the age of ubiquitous computing increasing amounts of personal data are being logged and shared, making privacy management a challenging task that must be integrated into our daily lives. In this paper, we explore the ...
  • Jedrzejczyk, Lukasz; Price, Blaine A.; Bandara, Arosha K.; Nuseibeh, Bashar (Association for Computing Machinery, 2010)
    We describe the “Privacy-Shake”, a novel interface for managing coarse grained privacy settings. We built a prototype that enables users of Buddy Tracker, an example location sharing application, to change their privacy ...
  • O'Connor, Pat (Manchester University Press, 2006)
    In contemporary Irish Society there is considerable uneasiness about both the existence of and threats to the ‘patriarchal dividend’ (O’Connell, 1995a:82). It is suggested that this wider social and cultural context, ...
  • O'Connor, Pat (Department of Sociology, University of Limerick, 2005)
    Introduction: When I first read, with great excitement, The Sociological Imagination in the late 1960s, I was an 18 year old University student, in a society that was beginning to wake from its cultural torpor. A reluctant ...
  • Kilcommins, Shane; Leahy, Susan; Ryan, Andrea (2017)
    •The communications must originate in a confidence that they will not be disclosed •This element of confidentiality must be essential to the full and satisfactory maintenance of the relation •The relation must be one ...
  • O'Leary, Pádraig; Santana de Almeida, Eduardo; Richardson, Ita (Elsevier, 2012)
    Background: The derivation of products from a software product line is a time consuming and expensive activity. Despite recognition that an effective process could alleviate many of the difficulties associated with product ...
  • Clarke, Siobhán; Cunningham, Raymond; Nedos, Andronikos; Singh, Kulpreet (IEEE Computer Society, 2008)
    Mobile ad hoc networks rely on the opportunistic interaction of autonomous nodes to form networks without the use of infrastructure. Given the radically decentralised nature of such networks, their potential for autonomous ...
  • Bresciani, Riccardo; Butterfield, Andrew (2012)
    We present a theory of designs based on functions from the state space to real numbers, which we term distributions. This theory uses predicates, in the style of UTP, based on homogeneous relations between distributions, ...
  • Zeglinski, Jacek; Kuhs, Manuel; Devi, Renuka K.; Khamar, Dikshitkumar; Hegarty, Avril C.; Thompson, Damien; Rasmuson, Åke C. (American Chemical Society, 2019)
    Induction time experiments, spectroscopic and calorimetric analysis, and molecular modelling were used to probe the influence of solvent on the crystal nucleation of fenoxycarb (FC), a medium-sized, flexible organic ...
  • Field, Catherine Anne; Klimas, Jan; Barry, Joseph; Bury, Gerard; Keenan, Eamon; Smyth, Bobby P.; Cullen, Walter (BioMed Central, 2013)
    Background: Problem alcohol use is common and associated with considerable adverse outcomes among patients who attend primary care in Ireland and other European countries for opiate substitution treatment. This paper ...
  • Richardson, Ita; Delaney, Yvonne (IEEE Computer Society, 2009)
    Software engineering lecturers are faced with the teaching of concepts which sometimes are not easy for inexperienced students to understand. Therefore, it can be useful to consider and use non-traditional teaching methods ...
  • Rolland, Knut H; Fitzgerald, Brian; Dingsøyr, Torgeir; Stol, Klaas-Jan (2016)
    In this paper we critically examine the underlying assumptions in existing studies of large-scale agile software development. We use Alvesson and Sandberg’s problematization methodology and find that existing studies of ...
  • Lane, Diarmaid; Lynch, Raymond; McGarr, Oliver (Springer, 2018)
    Contemporary research is considering new forms of literacy that extend beyond the skills required to process alphanumeric data. The skills involved in visualising, reasoning, and communicating about 2D and 3D spatial ...
  • Patten, James Vincent; Ryan, Conor (Nova Science Pub Inc;, 2014)
    The benefits of using some type of automation to reduce the time and cost of software development is generally accepted in most domains, video games1 included. While there are a wide variety of automation techniques ...