University of Limerick Institutional Repository

LERO - UL authors

DSpace Repository

LERO - UL authors

Browse by

 

Recent Submissions

  • Elrakaiby, Yehia; Ferrari, Alessio; Mylopoulos, John (IEEE Computer Society, 2018)
    The requirements problem consists of transforming stakeholder requirements - however informal, ambiguous, conflicting, unattainable, imprecise and incomplete – into a consistent, complete and realizable specification ...
  • Hutton, Luke; Price, Blaine A.; Kelly, Ryan; McCormick, Ciaran; Bandara, Arosha K.; Hatzakis, Tally; Meadows, Maureen; Nuseibeh, Bashar (JMIR Publications, 2018)
    Background: The recent proliferation of self-tracking technologies has allowed individuals to generate significant quantities of data about their lifestyle. These data can be used to support health interventions and monitor ...
  • Lopez, Tamara; Tun, Thein Than; Bandara, Arosha K.; Levine, Mark; Nuseibeh, Bashar; Sharp, Helen (Association for Computing Machinery, 2018)
    Developers turn to Stack Overflow and other on-line sources to find solutions to security problems, but little is known about how they engage with and guide one another in these environments or the perceptions of software ...
  • Stol, Klaas-Jan; Fitzgerald, Brian (Association for Computing Machinery, 2018)
    A variety of research methods and techniques are available to SE researchers, and while several overviews exist, there is neither consistency in the research methods covered nor in the terminology used. Furthermore, ...
  • Marinho, Marcelo; Luna, Alexandre; Beecham, Sarah (Springer, 2018)
    Drivers for globalization are significant where today's organizations look for cheaper and faster ways to develop software as well as ways to satisfy quality and investment requirements imposed by customers, shareholders, ...
  • Bass, Julian M.; Beecham, Sarah; Noll, John (Association for Computing Machinery, 2018)
    This research comprises a methodological comparison of two independent empirical case studies in industry: Case Study A and Case Study B. Case Study A, is a multiple-case study involving a set of short-duration data ...
  • Bass, Julian M.; Beecham, Sarah; Razzak, Mohammad Abdur; Noll, John (Association for Comuting Machinery, 2018)
    Poor employee retention (high staff turnover) has a negative impact on software development productivity and product quality. Further, offshore outsourcing has a widely held reputation for particularly poor employee ...
  • Tun, Thein Than; Yang, M.; Bandara, Arosha K.; Yu, Y.; Nhlabatsi, A.; Khan, N.; Khan, K.M.; Bashara, Bashar (Association for Computing Machinery, 2018)
    In an adaptive security-critical system, security mechanisms change according to the type of threat posed by the environment. Specifying the behavior of these systems is diicult because conditions of the environment are ...
  • Kowal, Magdalena; Toth, Adam J.; Exton, Chris; Campbell, Mark J. (Elsevier, 2018)
    Playing action video games requires players to develop a cognitive profile that allows them to rapidly monitor and react to fast moving visual and auditory stimuli, and to inhibit erroneous actions. This study investigated ...
  • Tsigkanos, Christos; Pasquale, Liliana; Ghezziy, Carlo; Nuseibeh, Bashar (IEEE Computer Society, 2015)
    This paper presents Ariadne, a tool for engineering topology aware adaptive security for cyber-physical systems. It allows security software engineers to model security requirements together with the topology of the ...
  • Dantas, Rafael; Exton, Chris; Le Gear, Andrew (2018)
    Even with advances in modern GSM technologies there remains situations where increased data compression rates can be valuable (Dantas, Exton, and Le Gear, 2018). While the adoption of 4G networks is increasing, there is ...
  • Ghassemi Toosi, Farshad; Buckley, Jim; Sai, Ashish Rajendra; Le Gear, Andrew (2018)
    Software reverse engineering is the generation of abstracted views of large software systems from detailed implementation artifacts. As such, reverse engineers work towards views obfuscated by the scale, and complexity ...
  • Sai, Ashish Rajendra; Buckley, Jim; Le Gear, Andrew (2018)
    Proof Of Work Blockchains such as Bitcoin and Ethereum exhibit a low Transaction Per Second (TPS) that impacts the scalability of the blockchain. Manipulating the block creation time can yield a higher TPS. A lower block ...
  • Bass, Julian M.; Beecham, Sarah; Razzak, Mohammad Abdur; Nic Canna, Clodagh; Noll, John (Association for Computing Machinery, 2018)
    The Product Owner (PO) is critical for translating business needs into a software implementation by gathering and prioritizing requirements, and assessing whether features have met the definition of “done.” There is a ...
  • Ali, Nour; Baker, Sean; O'Crowley, Ross; Herold, Sebastian; Buckley, Jim (Springer, 2018)
    Architecture Consistency (AC) aims to align implemented systems with their intended architectures. Several AC approaches and tools have been proposed and empirically evaluated, suggesting favourable results. In this ...
  • Peng, Xin; Gu, Jingxiao; Tan, Tian Huat; Yu, Yijun; Nuseibeh, Bashar; Zhao, Wenyun (Association for Computing Machinery, 2018)
    Some user needs can only be met by leveraging the capabilities of others to undertake particular tasks that require intelligence and labor. Crowdsourcing such capabilities is one way to achieve this. But providing a service ...
  • Rafiq, Yasmin; Dickins, Luke; Russo, Alessandra; Bandara, Arosha K.; Yang, Mu; Stuart, Avelie; Levine, Mark; Calikli, Gul; Price, Blaine A.; Nuseibeh, Bashar (Assocation for Computing Machinery, 2017)
    Some online social networks (OSNs) allow users to define friendship-groups as reusable shortcuts for sharing information with multiple contacts. Posting exclusively to a friendship-group gives some privacy control, while ...
  • Qian, Wenyi; Peng, Xin; Sun, Jun; Yu, Yijun; Nuseibeh, Bashar; Zhao, Wenyun (Association for Computing Machinery, 2017)
    In Online-to-Offline (O2O) commerce, customer services may need to be composed from online and offline services. Such composition is challenging, as it requires effective selection of appropriate services that, in turn, ...
  • Price, Blaine A.; Stuart, Avelie; Calikli, Gul; McCormick, Ciaran; Mehta, Vikram; Hutton, Luke; Bandara, Arosha K.; Levine, Mark; Nuseibeh, Bashar (Association for Computing Machinery, 2017)
    Low cost digital cameras in smartphones and wearable devices make it easy for people to automatically capture and share images as a visual lifelog. Having been inspired by a US campus based study that explored individual ...
  • Elrakaiby, Yehia; Ferrari, Alessio; Spoletini, Paola; Gnesi, Stefania; Nuseibeh, Bashar (IEEE Computer Society, 2017)
    The requirements elicitation process often starts with an interview between a customer and a requirements analyst. During these interviews, ambiguities in the dialogic discourse may reveal the presence of tacit knowledge ...

View more