LERO

Browse by

 

Lero is the Irish Software Engineering Research Centre

It brings together leading software engineering (SE) teams from Universities and Institutes of Technology in a coordinated centre of research excellence with a strong industry focus. Lero has raised the level and profile of Irish software engineering research with such effect that it is now one of the best known and highly regarded SE research centres in the world.


The centre has the proven capacity to attract and retain global research leaders and to make a substantial contribution both to software engineering research and to the Irish economy. Lero is now ready to take on key challenges of Evolving Critical Systems.


The Lero Centre is supported by a CSET grant from SFI, by other state grants, by industry contributions and by external funding (particularly the EU’s research programmes). Non-SFI funding for the Centre is currently 47% of the total and our sustainability plan places particular emphasis on industry support and EU funding in the years ahead.


Lero interfaces with a wide range of industry, state agencies, educational bodies and international collaborators to deliver on its twin goals of research excellence and social and economic relevance.


For more information visit www.lero.ie

Collections in this community

Recent Submissions

  • Lopez, Tamara; Tun, Thein Than; Bandara, Arosha K.; Levine, Mark; Nuseibeh, Bashar; Sharp, Helen (Association for Computing Machinery, 2018)
    Developers turn to Stack Overflow and other on-line sources to find solutions to security problems, but little is known about how they engage with and guide one another in these environments or the perceptions of software ...
  • Stol, Klaas-Jan; Fitzgerald, Brian (Association for Computing Machinery, 2018)
    A variety of research methods and techniques are available to SE researchers, and while several overviews exist, there is neither consistency in the research methods covered nor in the terminology used. Furthermore, ...
  • Marinho, Marcelo; Luna, Alexandre; Beecham, Sarah (Springer, 2018)
    Drivers for globalization are significant where today's organizations look for cheaper and faster ways to develop software as well as ways to satisfy quality and investment requirements imposed by customers, shareholders, ...
  • Bass, Julian M.; Beecham, Sarah; Noll, John (Association for Computing Machinery, 2018)
    This research comprises a methodological comparison of two independent empirical case studies in industry: Case Study A and Case Study B. Case Study A, is a multiple-case study involving a set of short-duration data ...
  • Bass, Julian M.; Beecham, Sarah; Razzak, Mohammad Abdur; Noll, John (Association for Comuting Machinery, 2018)
    Poor employee retention (high staff turnover) has a negative impact on software development productivity and product quality. Further, offshore outsourcing has a widely held reputation for particularly poor employee ...
  • Tun, Thein Than; Yang, M.; Bandara, Arosha K.; Yu, Y.; Nhlabatsi, A.; Khan, N.; Khan, K.M.; Bashara, Bashar (Association for Computing Machinery, 2018)
    In an adaptive security-critical system, security mechanisms change according to the type of threat posed by the environment. Specifying the behavior of these systems is diicult because conditions of the environment are ...
  • Kowal, Magdalena; Toth, Adam J.; Exton, Chris; Campbell, Mark J. (Elsevier, 2018)
    Playing action video games requires players to develop a cognitive profile that allows them to rapidly monitor and react to fast moving visual and auditory stimuli, and to inhibit erroneous actions. This study investigated ...
  • Tsigkanos, Christos; Pasquale, Liliana; Ghezziy, Carlo; Nuseibeh, Bashar (IEEE Computer Society, 2015)
    This paper presents Ariadne, a tool for engineering topology aware adaptive security for cyber-physical systems. It allows security software engineers to model security requirements together with the topology of the ...
  • Dantas, Rafael; Exton, Chris; Le Gear, Andrew (2018)
    Even with advances in modern GSM technologies there remains situations where increased data compression rates can be valuable (Dantas, Exton, and Le Gear, 2018). While the adoption of 4G networks is increasing, there is ...
  • Ghassemi Toosi, Farshad; Buckley, Jim; Sai, Ashish Rajendra; Le Gear, Andrew (2018)
    Software reverse engineering is the generation of abstracted views of large software systems from detailed implementation artifacts. As such, reverse engineers work towards views obfuscated by the scale, and complexity ...
  • Sai, Ashish Rajendra; Buckley, Jim; Le Gear, Andrew (2018)
    Proof Of Work Blockchains such as Bitcoin and Ethereum exhibit a low Transaction Per Second (TPS) that impacts the scalability of the blockchain. Manipulating the block creation time can yield a higher TPS. A lower block ...
  • Bass, Julian M.; Beecham, Sarah; Razzak, Mohammad Abdur; Nic Canna, Clodagh; Noll, John (Association for Computing Machinery, 2018)
    The Product Owner (PO) is critical for translating business needs into a software implementation by gathering and prioritizing requirements, and assessing whether features have met the definition of “done.” There is a ...
  • Ali, Nour; Baker, Sean; O'Crowley, Ross; Herold, Sebastian; Buckley, Jim (Springer, 2018)
    Architecture Consistency (AC) aims to align implemented systems with their intended architectures. Several AC approaches and tools have been proposed and empirically evaluated, suggesting favourable results. In this ...
  • Peng, Xin; Gu, Jingxiao; Tan, Tian Huat; Yu, Yijun; Nuseibeh, Bashar; Zhao, Wenyun (Association for Computing Machinery, 2018)
    Some user needs can only be met by leveraging the capabilities of others to undertake particular tasks that require intelligence and labor. Crowdsourcing such capabilities is one way to achieve this. But providing a service ...
  • Rafiq, Yasmin; Dickins, Luke; Russo, Alessandra; Bandara, Arosha K.; Yang, Mu; Stuart, Avelie; Levine, Mark; Calikli, Gul; Price, Blaine A.; Nuseibeh, Bashar (Assocation for Computing Machinery, 2017)
    Some online social networks (OSNs) allow users to define friendship-groups as reusable shortcuts for sharing information with multiple contacts. Posting exclusively to a friendship-group gives some privacy control, while ...
  • Qian, Wenyi; Peng, Xin; Sun, Jun; Yu, Yijun; Nuseibeh, Bashar; Zhao, Wenyun (Association for Computing Machinery, 2017)
    In Online-to-Offline (O2O) commerce, customer services may need to be composed from online and offline services. Such composition is challenging, as it requires effective selection of appropriate services that, in turn, ...
  • Price, Blaine A.; Stuart, Avelie; Calikli, Gul; McCormick, Ciaran; Mehta, Vikram; Hutton, Luke; Bandara, Arosha K.; Levine, Mark; Nuseibeh, Bashar (Association for Computing Machinery, 2017)
    Low cost digital cameras in smartphones and wearable devices make it easy for people to automatically capture and share images as a visual lifelog. Having been inspired by a US campus based study that explored individual ...
  • Elrakaiby, Yehia; Ferrari, Alessio; Spoletini, Paola; Gnesi, Stefania; Nuseibeh, Bashar (IEEE Computer Society, 2017)
    The requirements elicitation process often starts with an interview between a customer and a requirements analyst. During these interviews, ambiguities in the dialogic discourse may reveal the presence of tacit knowledge ...
  • Ghassemi Toosi, Farshad (University of Limerick, 2017)
    This thesis presents a new graph drawing approach (the concentric approach) for drawing any undirected graph without taking stress or forces into account, in order to address the trade-off between quality and running ...
  • Chochlov, Muslim (University of Limerick, 2017)
    Feature location is finding the source code that implements specific functionality in software systems. Feature location is a complex activity and, when performed manually, it may require significant developers' effort. ...

View more