University of Limerick Institutional Repository

Browsing LERO by Title

DSpace Repository

Browsing LERO by Title

Sort by: Order: Results:

  • Botterweck, Goetz; Pleuss, Andreas (2012)
    S2T2-Configurator is a visual tool for con guration of fea- ture models. In this tool paper, we focus on interactive techniques that support the con guration of large and complex models.
  • Vassev, Emil (Springer, 2016)
    In one aspect of our life or another, today we all live with AI. For example, the mechanisms behind the search engines operating on the Internet do not just retrieve information, but also constantly learn how to respond ...
  • Ghafari, Mohammad; Jamshidi, Pooyan; Shahbazi, Saeed; Haghighi, Hassan (Association for Computing Machinery, 2012)
    Continuous availability of services and low degree of disruption are two inherent necessities for mission-critical software systems. These systems could not be stopped to perform updates because disruption in their ...
  • Bujok, Andrzej Beniamin; MacMahon, Silvana Togneri; Mc Caffery, Fergal; Whelan, Dick; Mulcahy, Bernard; Rickard, William J (Springer, 2016)
    Software is increasingly being used to provide functionality in safety critical domains. The complexity involved in the development of software for these domains can bring challenges concerned with safety and security. ...
  • Butterfield, Andrew (Springer-Verlag, 2010)
    Saoithin is a theorem prover developed to support the Unifying Theories of Programming (UTP) framework. Its primary design goal was to support the higher-order logic, alphabets, equational reasoning and "programs as ...
  • Fitzgerald, Brian; Stol, Klaas-Jan; O'Sullivan, Ryan; O'Brien, Donal (IEEE Computer Society, 2013)
    Agile development methods are growing in popularity with a recent survey reporting that more than 80% of organizations now following an agile approach. Agile methods were seen initially as best suited to small, co-located ...
  • Ali Babar, Muhammad (IEEE Computer Society, 2004)
    Typically, architectural choices determine the achievement of desired goals (such as reusability and maintainability) of product line software development. Several methods have been proposed to design and analyze product ...
  • Healy, Patrick (PATAT 2006, 2006)
    In many funding agencies a model is adopted whereby a fixed panel of evaluators evaluate the set of applications. This is then followed by a general meeting where each proposal is discussed by those evaluators assigned ...
  • Lamprecht, Anna-Lena; Steffen, Bernhard; Margaria, Tiziana (Springer, 2016)
    The jABC is a framework for process modelling and execution according to the XMDD (eXtreme model-driven design) paradigm, which advocates the rigorous use of user-level models in the software development process and software ...
  • Iglesias, Jesus Omana; Thorburn, James; Parsons, Trevor; Murphy, John; O'Sullivan, Patrick (IEEE Computer Society, 2011)
    Understanding system utilization is currently a difficult challenge for industry. Current monitoring tools tend to focus on monitoring critical servers and databases within a narrow technical context, and have not been ...
  • Yilmaz, Murat; O'Connor, Rory V. (Sveuciliste Josipa Jurja Strossmayera u Osijeku * Strojarski Fakultet u Slavanskom Brodu, 2016)
    In recent years, there has been an increasing interest in tailoring agile development methodologies by combining different agile practices. The adoption of such a balancing approach requires a systematic customization of ...
  • Martínez, Yuliana; Galván-López, Edgar (IEEE Computer Society, 2013)
    The objective function is the core element in most search algorithms that are used to solve engineering and scientific problems, referred to as the fitness function in evolutionary computation. Some researchers have ...
  • Pasquale, Liliana; Menghi, Claudio; Salehie, Mazeiar; Cavallaro, Luca; Omoronyia, Inah; Nuseibeh, Bashar (Association for Computing Machinery, 2012)
    This paper presents SecuriTAS, a tool to engineer adap- tive security. It allows software designers to model security concerns together with the requirements of a system. This model is then used at runtime to analyze ...
  • Finngegan, Anita; Mc Caffery, Fergal; Coleman, Gerry (Springer, 2013)
    This paper presents work for the development of a framework to assure the security of networked medical devices being incorporated. The paper focuses on one component of the framework, which addresses system development ...
  • Kearney, Paul J.; Sinclair, David; Wagner, Sebastian (2012)
    This paper describes pattern-related aspects of the prototype Protection and Assessment Workbench developed as part of the MASTER EU 7th Framework collaborative research project. The Workbench supports a model-driven ...
  • Trubin, Ignor A; Ghaith, Shadi (2012)
    Statistical Exception Detection System (SEDS) is one of the variations of learning behavior based performance analysis methodology developed, implemented and published by the Authors. This paper takes the main SEDS tools ...
  • Vassev, Emil; Hinchey, Mike; Quigley, Aaron (2009)
    We address the need to realize a runtime self-modifiable architecture for autonomic systems, specified and generated with the ASSL (Autonomic System Specification Language) framework. This framework generates such systems ...
  • Vassev, Emil; Hinchey, Mike (IEEE Computer Society, 2011)
    NASA is currently exploring swarm-based technologies, targeting the development of prospective exploration missions to explore regions of space, where single large spacecraft would be impractical. Such systems are envisioned ...
  • Mokhov, Serguei A.; Vassev, Emil (IEEE Computer Society, 2009)
    The notion and definition of self-forensics was introduced by Mokhov to encompass software and hardware capabilities for autonomic and other systems to record their own states, events, and others encoded in a forensic ...
  • Shehory, Onn; Martinez, Josu; Andrzejak, Artur; Cappiello, Cinzia; Funika, Wlodzimierz; Kondo, Derrick; Mariani, Leorando; Satzger, Benjamin; Schmid, Markus (eibniz-Zentrum fuer Informatik, Germany, 2009)
    This document summarizes the results of the Working Group 1 - Self- Healing and Recovery - within the Dagstuhl Seminar 09201 Self-Healing and Self-Adaptive Systems (organized by A. Andrzejak, K. Geihs, O. Shehory ...

Search ULIR


Browse

My Account

Statistics