University of Limerick Institutional Repository

Browsing LERO - The Irish Software Research Centre by Title

DSpace Repository

Browsing LERO - The Irish Software Research Centre by Title

Sort by: Order: Results:

  • Ul-Haq, Aman; Ali Babar, Muhammad (IEEE Computer Society, 2009)
    Development of large projects is a knowledge intensive task. Applying knowledge management techniques to project activities can enhance productivity and reduce risks of failures. However, it has been observed that ...
  • Pasquale, Liliana; Ghezzi, Carlo; Pasi, Edoardo; Tsigkanos, Christos; Boubekeur, Menouer; Florentino-Liano, Blanca; Hadzic, Tarik; Nuseibeh, Bashar (IEEE Computer Society, 2017)
    Smart spaces are becoming increasingly vulnerable from the interplay of cyber and physical entities. A representation of the spaces' topology can reveal security-relevant contextual characteristics, and a visualization ...
  • Pasquale, Liliana; Ghezzi, Carlo; Menghi, Claudio; Tsigkanos, Christos; Nuseibeh, Bashar (Association for Computing Machinery, 2014)
    Adaptive security systems aim to protect valuable assets in the face of changes in their operational environment. They do so by monitoring and analysing this environment, and deploying security functions that satisfy ...
  • Conboy, Kieran; Fitzgerald, Brian (Association for Computing Machinery, 2004)
    Since the software crisis of the 1960’s, numerous methodologies have been developed to impose a disciplined process upon software development. It is now widely accepted that these methodologies are unsuccessful and ...
  • Haque, Rafiqul; Richardson, Ita; Taher, Yehia; Van den Heuvel, Willem-Jan (2011)
    Processes are the main constituents of public services and as such demand correct and complete execution. Increasingly however, governments feel the pressuring need to deliver public services more quickly and personalized ...
  • Vidgen, Richard; Wang, Xiaofeng (2005)
    New technologies, notably service oriented architectures and Web services, have enabled a third wave of business process management (BPM). Supporters have claimed that BPM is informed by complexity theory with the outcomes ...
  • Vassev, Emil; Hinchey, Mike (IEEE Computer Society, 2011)
    We aim at identifying the content and design principles of KnowLang, a new formal anguage for knowledge representation in a particular class of autonomic systems termed ASCENS. Autonomic Service-Component Ensembles (ASCENS) ...
  • Haque, Rafiqul; Taher, Yehia; Richardson, Ita; Whelan, Eoin; Van den Heuvel, Willem-Jan; Tawbi, Samar (2011)
    Processes are the primary constituents of public services and as such demand the completeness to achieve the goal of services. Ensuring the completeness of processes is a challenging task because, in recent days, they ...
  • Lane, Stephen; Gu, Qing; Lago, Patricia; Richardson, Ita (Springer-Verlag, 2013)
    Service-oriented computing is a promising computing paradigm which facilitates the composition of loosely coupled and adaptable service- based applications. Unfortunately, this new paradigm does not lend itself easily ...
  • Guillot, Laura; Bragard, Quentin; Smith, Ross; Bean, Dan; Ventresque, Anthony (CEUR, 2016)
    Translation of online meetings (e.g., Skype conversations) is a useful feature that can help users to understand each other. However translations can sometimes be inaccurate or they can miss the context of the ...
  • Monasor, Miguel J; Vizcaíno, Aurora; Piattini, Mario; Noll, John; Beecham, Sarah (IEEE Computer Society, 2013)
    Sources of Global Software Development (GSD) information, such as academic literature, often focus on highlevel issues rather than on specific problems. Researchers tend to generalize problems and solutions; however, ...
  • Salehie, Mazeiar; Tahvildari, Ladan (John Wiley & Sons, 2012)
    Self-adaptive software is a closed-loop system, since it continuously monitors its context (i.e. environment) and/or self (i.e. software entities) in order to adapt itself properly to changes. We believe that representi ...
  • Sai, Ashish Rajendra (University of Limerick, 2021)
    The objective of this research is to understand the multidimensional nature of centralization in blockchain and study its implications. Blockchain allows the execution of trustless financial transactions over a peer-to-peer ...
  • Donnellan, Brian; Fitzgerald, Brian (IEEE Computer Society, 2004)
    In today’s competitive and turbulent environment companies engaged in New Product Development (NPD) need tu have a sophisticated understanding of the types of knowledge critical to the each phase of the NPD process. These ...
  • Johansen, Jørn; Colomo-Palacios, Ricardo; O'Connor, Rory V. (Springer, 2016)
    In June 2015 a group of experts in Software Process Improvement (SPI) and Education from all over the world gathered at the 1st International Workshop on Software Process Education, Training and Professionalism held in ...
  • Yilmaz, Murat; O'Connor, Rory V. (2013)
    Myers-Briggs Kisilik Göstergesi (MBKG) yazılım endüstrisinde sık kullanılan ölçüm araçlarından birisidir. Yazılım mühendisligi alanında MBKG kullanılarak bir çok kisilik tipi arastırması ve alan çalısması yapılmıstır. Ancak ...
  • MacMahon, Silvana Togneri; Mc Caffery, Fergal; Keenan, Frank (2013)
    Medical Devices are widely used in patient care for both diagnosis and treatment purposes. Typically, modern medical devices are intended to be networked at their point of use. The incorporation of medical devices opens ...
  • O'Leary, Pádraig; Thiel, Steffen; Botterweck, Goetz; Richardson, Ita (2008)
    Inefficient product derivation practices can greatly diminish the productivity gains expected from a software product line approach. As a foundation for systematic and efficient product derivation a better understanding ...
  • García-Galán, Jesús; Pasquale, Liliana; Grispos, George; Nuseibeh, Bashar (Association for Computer Machinery, 2016)
    Mission critical software is often required to comply with multiple regulations, standards or policies. Recent paradigms, such as cloud computing, also require software to operate in heterogeneous, highly distributed, ...
  • Welsh, Thomas; Alrimawi, Faeq; Farahani, Ali; Hassett, Diane; Zisman, Andrea; Nuseibeh, Bashar (IEEE Computer Society, 2021)
    The effective functioning of society is increasingly reliant on supply chains which are susceptible to fraud, such as the distribution of adulterated products. Inspection is a key tool for mitigating fraud, however it ...

Search ULIR


Browse

My Account

Statistics