University of Limerick Institutional Repository

LERO - UL authors

DSpace Repository

LERO - UL authors

Browse by

 

Recent Submissions

  • Bass, Julian M.; Beecham, Sarah; Noll, John (Association for Computing Machinery, 2018)
    This research comprises a methodological comparison of two independent empirical case studies in industry: Case Study A and Case Study B. Case Study A, is a multiple-case study involving a set of short-duration data ...
  • Bass, Julian M.; Beecham, Sarah; Razzak, Mohammad Abdur; Noll, John (Association for Comuting Machinery, 2018)
    Poor employee retention (high staff turnover) has a negative impact on software development productivity and product quality. Further, offshore outsourcing has a widely held reputation for particularly poor employee ...
  • Tun, Thein Than; Yang, M.; Bandara, Arosha K.; Yu, Y.; Nhlabatsi, A.; Khan, N.; Khan, K.M.; Bashara, Bashar (Association for Computing Machinery, 2018)
    In an adaptive security-critical system, security mechanisms change according to the type of threat posed by the environment. Specifying the behavior of these systems is diicult because conditions of the environment are ...
  • Kowal, Magdalena; Toth, Adam J.; Exton, Chris; Campbell, Mark J. (Elsevier, 2018)
    Playing action video games requires players to develop a cognitive profile that allows them to rapidly monitor and react to fast moving visual and auditory stimuli, and to inhibit erroneous actions. This study investigated ...
  • Tsigkanos, Christos; Pasquale, Liliana; Ghezziy, Carlo; Nuseibeh, Bashar (IEEE Computer Society, 2015)
    This paper presents Ariadne, a tool for engineering topology aware adaptive security for cyber-physical systems. It allows security software engineers to model security requirements together with the topology of the ...
  • Dantas, Rafael; Exton, Chris; Le Gear, Andrew (2018)
    Even with advances in modern GSM technologies there remains situations where increased data compression rates can be valuable (Dantas, Exton, and Le Gear, 2018). While the adoption of 4G networks is increasing, there is ...
  • Ali, Nour; Baker, Sean; O’Crowley, Ross; Herold, Sebastian; Buckley, Jim (Springer Verlag, 2018)
    Architecture Consistency (AC) aims to align implemented systems with their intended architectures. Several AC approaches and tools have been proposed and empirically evaluated, suggesting favourable results. In this ...
  • Ghassemi Toosi, Farshad; Buckley, Jim; Sai, Ashish Rajendra; Le Gear, Andrew (2018)
    Software reverse engineering is the generation of abstracted views of large software systems from detailed implementation artifacts. As such, reverse engineers work towards views obfuscated by the scale, and complexity ...
  • Sai, Ashish Rajendra; Buckley, Jim; Le Gear, Andrew (2018)
    Proof Of Work Blockchains such as Bitcoin and Ethereum exhibit a low Transaction Per Second (TPS) that impacts the scalability of the blockchain. Manipulating the block creation time can yield a higher TPS. A lower block ...
  • Bass, Julian M.; Beecham, Sarah; Razzak, Mohammad Abdur; Nic Canna, Clodagh; Noll, John (Association for Computing Machinery, 2018)
    The Product Owner (PO) is critical for translating business needs into a software implementation by gathering and prioritizing requirements, and assessing whether features have met the definition of “done.” There is a ...
  • Ali, Nour; Baker, Sean; O'Crowley, Ross; Herold, Sebastian; Buckley, Jim (Springer, 2017)
    Architecture Consistency (AC) aims to align implemented systems with their intended architectures. Several AC approaches and tools have been proposed and empirically evaluated, suggesting favourable results. In this ...
  • Peng, Xin; Gu, Jingxiao; Tan, Tian Huat; Yu, Yijun; Nuseibeh, Bashar; Zhao, Wenyun (Association for Computing Machinery, 2018)
    Some user needs can only be met by leveraging the capabilities of others to undertake particular tasks that require intelligence and labor. Crowdsourcing such capabilities is one way to achieve this. But providing a service ...
  • Rafiq, Yasmin; Dickins, Luke; Russo, Alessandra; Bandara, Arosha K.; Yang, Mu; Stuart, Avelie; Levine, Mark; Calikli, Gul; Price, Blaine A.; Nuseibeh, Bashar (Assocation for Computing Machinery, 2017)
    Some online social networks (OSNs) allow users to define friendship-groups as reusable shortcuts for sharing information with multiple contacts. Posting exclusively to a friendship-group gives some privacy control, while ...
  • Qian, Wenyi; Peng, Xin; Sun, Jun; Yu, Yijun; Nuseibeh, Bashar; Zhao, Wenyun (Association for Computing Machinery, 2017)
    In Online-to-Offline (O2O) commerce, customer services may need to be composed from online and offline services. Such composition is challenging, as it requires effective selection of appropriate services that, in turn, ...
  • Price, Blaine A.; Stuart, Avelie; Calikli, Gul; McCormick, Ciaran; Mehta, Vikram; Hutton, Luke; Bandara, Arosha K.; Levine, Mark; Nuseibeh, Bashar (Association for Computing Machinery, 2017)
    Low cost digital cameras in smartphones and wearable devices make it easy for people to automatically capture and share images as a visual lifelog. Having been inspired by a US campus based study that explored individual ...
  • Elrakaiby, Yehia; Ferrari, Alessio; Spoletini, Paola; Gnesi, Stefania; Nuseibeh, Bashar (IEEE Computer Society, 2017)
    The requirements elicitation process often starts with an interview between a customer and a requirements analyst. During these interviews, ambiguities in the dialogic discourse may reveal the presence of tacit knowledge ...
  • Ghassemi Toosi, Farshad (University of Limerick, 2017)
    This thesis presents a new graph drawing approach (the concentric approach) for drawing any undirected graph without taking stress or forces into account, in order to address the trade-off between quality and running ...
  • Chochlov, Muslim (University of Limerick, 2017)
    Feature location is finding the source code that implements specific functionality in software systems. Feature location is a complex activity and, when performed manually, it may require significant developers' effort. ...
  • Yeomans, Caithriona; Kenny, Ian C.; Cahalan, Róisin Máire; Warrington, Giles D.; Harrison, Andrew J.; Hayes, Kevin; Lyons, Mark; Campbell, Mark J.; Comyns, Thomas M. (Springer, 2018)
    Background Rugby union is a physically demanding, fullcontact team sport that has gained worldwide popularity. The incidence of injury in rugby union has been widely reported in the literature. While comprehensive injury ...
  • Carroll, Noel; Richardson, Ita (HEALTHINF, 2017)
    Despite the potential of innovation-driven healthcare technology services to increase the quality, accessibility and quality of care, the realization and success of such promise has yet to be achieved. This prompted us to ...

View more