University of Limerick Institutional Repository

Browsing LERO - The Irish Software Research Centre by Title

DSpace Repository

Browsing LERO - The Irish Software Research Centre by Title

Sort by: Order: Results:

  • Vassev, Emil; Hinchey, Mike (2011)
    Building intelligent robotic systems is both stirring and extremely challenging. Researchers have realized that robot intelligence can be achieved with a logical approach, but still AI struggles to connect that abstract ...
  • Vassev, Emil; Hinchey, Mike; Gaudin, Benoit; Nixon, Paddy (Association for Computing Machinery, 2011)
    Autonomic Service-Component Ensembles (ASCENS) is a class of multi-agent systems formed as mobile, intelligent and open-ended swarms of special autonomic service components capable of local and distributed reasoning. Such ...
  • Tun, Thein Than; Yang, Mu; Bandara, Arosha K.; Yu, Yijun; Nhlabatsi, A.; Khan, N.; Khan, K.M.; Nuseibeh, Bashar (Association for Computing Machinery, 2018)
    In an adaptive security-critical system, security mechanisms change according to the type of threat posed by the environment. Specifying the behavior of these systems is diicult because conditions of the environment are ...
  • Tun, Thein Than; Yang, Mu; Bandara, Arosha K.; Yu, Y.; Nhlabatsi, A.; Khan, N.; Khan, K.M.; Bashara, Bashar (Association for Computing Machinery, 2018)
    In an adaptive security-critical system, security mechanisms change according to the type of threat posed by the environment. Specifying the behavior of these systems is diicult because conditions of the environment are ...
  • Noll, John; Liu, Wei-Ming (Association for Computing Machinery, 2010)
    A growing body of empirical research has examined large, successful open source software projects such as the Linux kernel, Apache web server, and Mozilla web browser. Do these results extend to small open source efforts ...
  • Pasquale, Liliana; Spoletini, Paola; Pometto, Dario; Blasi, Francesco; Redaelli, Tiziana (Springer, 2013)
    [Context and motivation] In the last years motion-based games have achieved an increasing success. These games have great potential to support physiotherapeutic programs, as they can guide the patients in performing the ...
  • Ali, Raian; Dalpiaz, Fabiano; Giorgini, Paolo; Souza, Victor E (2011)
    Requirements evolution is a main driver for systems evolution. Traditionally, requirements evolution is associated to changes in the users’ needs and environments. In this paper, we explore another cause for requirements ...
  • Buckley, Jim (IEEE Computer Society, 2009)
    Developing well-formed software visualization tools requires increased empirical study of programmers’ information requirements.
  • Pasquale, Liliana; Yu, Yijun; Mazeiar, Salehie; Cavallaro, Luca; Tun, Thein Than; Nuseibeh, Bashar (IEEE Computer Society, 2013)
    We propose the use of forensic requirements to drive the automation of a digital forensics process. We augment traditional reactive digital forensics processes with proactive evidence collection and analysis activities, ...
  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Ali, Raian; Nuseibeh, Bashar (2012)
    Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets are therefore key activities in any security engineering process – from modeling threats and attacks, discovering ...
  • Mahfouz, Ayman; Barroca, Leonor; Laney, Robin; Nuseibeh, Bashar (Association for Computing Machinery, 2009)
    Evolving business needs call for customizing choreographed interactions. However, conventional choreography description languages provide only a partial view of the interaction. Business goals of each participant and ...
  • Ali, Raian; Dalpiaz, Fabiano; Giorgini, Paolo (Springer, 2014)
    Deployment is a main development phase which configures a software to be ready for use in a certain environment. The ultimate goal of deployment is to enable users to achieve their requirements while using the deployed ...
  • Mahfouz, Ayman; Barroca, Leonor; Laney, Robin; Nuseibeh, Bashar (IEEE Computer Society, 2010)
    Service-oriented architecture (SOA) enables interenterprise service interactions. Services provide platform-independent abstractions around software systems, thereby enabling interoperability between heterogeneous systems. ...
  • Regan, Gilbert; Flood, Derek; Mc Caffery, Fergal (Association for Computing Machinery, 2016)
    Software systems are becoming increasingly complex. Within safety critical domains such as medical device software, this increasing complexity is placing growing demands on manufacturers who must ensure their software not ...
  • Cawley, Ciarán; Healy, Patrick; Botterweck, Goetz; Thiel, Steffen (VAMOS 2010, 2010)
    Configuring a large Software Product Line can be a complex and cognitively challenging task. The numerous relationships that can exist between different system elements such as features and their implementing artefacts can ...
  • Stol, Klaas-Jan; Fitzgerald, Brian (Association for Computing Machinery, 2014)
    Crowdsourcing is an emerging form of ‘outsourcing’ software development. While there has been considerable research in the area of crowdsourcing in general, very little research has focused specifically on how crowdsourcing ...
  • Marinescu, Andrei; Harris, Colin; Dusparic, Ivana; Clarke, Siobhán; Cahill, Vinny (2013)
    Applications such as generator scheduling, household smart device scheduling, transmission line overload management and microgrid islanding autonomy all play key roles in the smart grid ecosystem. Management of these ...
  • Abid, Saad bin (Association for Computing Machinery, 2010)
    Features implementing the functionality in a software product line (SPL) often interact and depend on each other. It is hard to maintain the consistency between feature dependencies on the model level and the actual ...
  • Abid, Saad bin (2009)
    Dealing with traceability management issues during model based product derivation in large complex industrial SPL is error prone due to the lack of tool support. As a result traceability management between connected models ...
  • Taubenberger, Stefan; Jürgens, Jan; Yu, Yijun; Nuseibeh, Bashar (Emerald Group Publishing Ltd, 2013)
    Purpose - In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors - wrongly identified or unidentified ...

Search ULIR


Browse

My Account

Statistics