University of Limerick Institutional Repository

LERO - The Irish Software Research Centre

DSpace Repository

LERO - The Irish Software Research Centre

Browse by

 

Lero is the Irish Software Research Centre

It brings together leading software engineering (SE) teams from Universities and Institutes of Technology in a coordinated centre of research excellence with a strong industry focus. Lero has raised the level and profile of Irish software engineering research with such effect that it is now one of the best known and highly regarded SE research centres in the world.


The centre has the proven capacity to attract and retain global research leaders and to make a substantial contribution both to software engineering research and to the Irish economy. Lero is now ready to take on key challenges of Evolving Critical Systems.


The Lero Centre is supported by a CSET grant from SFI, by other state grants, by industry contributions and by external funding (particularly the EU’s research programmes). Non-SFI funding for the Centre is currently 47% of the total and our sustainability plan places particular emphasis on industry support and EU funding in the years ahead.


Lero interfaces with a wide range of industry, state agencies, educational bodies and international collaborators to deliver on its twin goals of research excellence and social and economic relevance.


For more information visit www.lero.ie

Collections in this community

Recent Submissions

  • Barcomb, Ann; Jullien, Nicolas; Meyer, Patrick; Olteanu, Alexandru-Liviu (Springer, 2018)
    Managers can find it challenging to assess team members consistently and fairly. The ideal composition of qualities possessed by good team members depends on the organization, the team, and the manager. To enable managers ...
  • Mehta, Vikram; Price, Blaine A.; Bandara, Arosha K.; Nuseibeh, Bashar (Association for Computing Machinery, 2016)
    In the age of ubiquitous computing increasing amounts of personal data are being logged and shared, making privacy management a challenging task that must be integrated into our daily lives. In this paper, we explore the ...
  • Mehta, Vikram; Price, Blaine A.; Bandara, Arosha K.; Nuseibeh, Bashar (Association for Computing Machinery, 2016)
    Physical or bodily privacy is an innate need that drives a variety of human behaviours. However, in a highly dynamic, crowded and context dependent world with rapidly changing technology, other humans or technological ...
  • Tun, Thein Than; Price, Blaine A.; Bandara, Arosha K.; Yu, Yijun; Nuseibeh, Bashar (IEEE Computer Society, 2016)
    Abstract—Police investigations involving digital evidence tend to focus on forensic examination of storage units on personal electronic devices (laptops, smartphones, etc). However, a number of factors are making digital ...
  • Lopez, Tamara; Petre, Marian; Nuseibeh, Bashar (IEEE Computer Society, 2016)
    Software rarely works as intended while it is being written. Things go wrong in the midst of everyday practice, and developers are commonly understood to form theories and strategies for dealing with them. Errors in ...
  • Pasquale, Liliana; Ghezzi, Carlo; Pasi, Edoardo; Tsigkanos, Christos; Boubekeur, Menouer; Florentino-Liano, Blanca; Hadzic, Tarik; Nuseibeh, Bashar (IEEE Computer Society, 2017)
    Smart spaces are becoming increasingly vulnerable from the interplay of cyber and physical entities. A representation of the spaces' topology can reveal security-relevant contextual characteristics, and a visualization ...
  • Lopez, Tamara; Tun, Thein Than; Bandara, Arosha K.; Levine, Mark; Nuseibeh, Bashar; Sharp, Helen (Association for Computing Machinery, 2018)
    Developers turn to Stack Overflow and other on-line sources to find solutions to security problems, but little is known about how they engage with and guide one another in these environments or the perceptions of software ...
  • Alrimawi, Faeq; Pasquale, Liliana; Mehta, Deepak; Nuseibeh, Bashar (Association for Computing Machinery, 2018)
    An increasing number of security incidents in cyber-physical systems (CPSs) arise from the exploitation of cyber and physical components of such systems. Knowledge about how such incidents arose is rarely captured and used ...
  • Borda, Aimee; Pasquale, Liliana; Koutavas, Vasileios; Nuseibeh, Bashar (Assocation for Computing Machinery, 2018)
    Cyber-Physical Systems (CPSs) must often self-adapt to respond to changes in their operating environment. However, using formal verification techniques to provide assurances that critical requirements are satisfied can ...
  • Pasquale, Liliana; Alrajeh, Dalal; Peersman, Claudia; Nuseibeh, Bashar; Rashid, Awais (Association for Computing Machinery, 2018)
    As software becomes more ubiquitous, and the risk of cyber-crimes increases, ensuring that software systems are forensic-ready (i.e., capable of supporting potential digital investigations) is critical. However, little ...
  • Tsigkanos, Christos; Pasquale, Liliana; Ghezzi, Carlo; Nuseibeh, Bashar (IEEE Computer Society, 2018)
    Ubiquitous computing is resulting in a proliferation of cyber-physical systems that host or manage valuable physical and digital assets. These assets can be harmed by malicious agents through both cyber-enabled or ...
  • Tun, Thein Than; Yang, Mu; Bandara, Arosha K.; Yu, Yijun; Nhlabatsi, A.; Khan, N.; Khan, K.M.; Nuseibeh, Bashar (Association for Computing Machinery, 2018)
    In an adaptive security-critical system, security mechanisms change according to the type of threat posed by the environment. Specifying the behavior of these systems is diicult because conditions of the environment are ...
  • Bennaceur, Amel; Tun, Thein Than; Bandara, Arosha K.; Yu, Yijun; Nuseibeh, Bashar (Association for Computing Machinery, 2018)
    As the number, complexity, and heterogeneity of connected devices in the Internet of Things (IoT) increase, so does our need to secure these devices, the environment in which they operate, and the assets they manage or ...
  • Elrakaiby, Yehia; Ferrari, Alessio; Mylopoulos, John (IEEE Computer Society, 2018)
    The requirements problem consists of transforming stakeholder requirements - however informal, ambiguous, conflicting, unattainable, imprecise and incomplete – into a consistent, complete and realizable specification ...
  • Hutton, Luke; Price, Blaine A.; Kelly, Ryan; McCormick, Ciaran; Bandara, Arosha K.; Hatzakis, Tally; Meadows, Maureen; Nuseibeh, Bashar (JMIR Publications, 2018)
    Background: The recent proliferation of self-tracking technologies has allowed individuals to generate significant quantities of data about their lifestyle. These data can be used to support health interventions and monitor ...
  • Lopez, Tamara; Tun, Thein Than; Bandara, Arosha K.; Levine, Mark; Nuseibeh, Bashar; Sharp, Helen (Association for Computing Machinery, 2018)
    Developers turn to Stack Overflow and other on-line sources to find solutions to security problems, but little is known about how they engage with and guide one another in these environments or the perceptions of software ...
  • Stol, Klaas-Jan; Fitzgerald, Brian (Association for Computing Machinery, 2018)
    A variety of research methods and techniques are available to SE researchers, and while several overviews exist, there is neither consistency in the research methods covered nor in the terminology used. Furthermore, ...
  • Marinho, Marcelo; Luna, Alexandre; Beecham, Sarah (Springer, 2018)
    Drivers for globalization are significant where today's organizations look for cheaper and faster ways to develop software as well as ways to satisfy quality and investment requirements imposed by customers, shareholders, ...
  • Bass, Julian M.; Beecham, Sarah; Noll, John (Association for Computing Machinery, 2018)
    This research comprises a methodological comparison of two independent empirical case studies in industry: Case Study A and Case Study B. Case Study A, is a multiple-case study involving a set of short-duration data ...
  • Bass, Julian M.; Beecham, Sarah; Razzak, Mohammad Abdur; Noll, John (Association for Comuting Machinery, 2018)
    Poor employee retention (high staff turnover) has a negative impact on software development productivity and product quality. Further, offshore outsourcing has a widely held reputation for particularly poor employee ...

View more