University of Limerick Institutional Repository

LERO - UL authors

DSpace Repository

LERO - UL authors

Browse by

 

Recent Submissions

  • Boden, Alexander; Avram, Gabriela; Bannon, Liam J.; Wulf, Volker (2009)
    Software development requires complex context specific knowledge regarding the particularities of different technologies, the potential of existing software and the needs and expectations of the users. Hence, efficient ...
  • Stol, Klaas-Jan; Caglayan, Bora; Fitzgerald, Brian (IEEE Computer Society, 2017)
    Crowdsourcing is emerging as an alternative outsourcing strategy which is gaining increasing attention in the software engineering community. However, crowdsourcing software development involves complex tasks which differ ...
  • Barcomb, Ann; Stol, Klaas-Jan; Riehle, Dirk; Fitzgerald, Brian (IEEE Computer Society, 2019)
    Successful Free/Libre and Open Source Software (FLOSS) projects incorporate both habitual and infrequent, or episodic, contributors. Using the concept of episodic volunteering (EV) from the general volunteering literature, ...
  • Barcomb, Ann; Jullien, Nicolas; Meyer, Patrick; Olteanu, Alexandru-Liviu (Springer, 2018)
    Managers can find it challenging to assess team members consistently and fairly. The ideal composition of qualities possessed by good team members depends on the organization, the team, and the manager. To enable managers ...
  • Mehta, Vikram; Price, Blaine A.; Bandara, Arosha K.; Nuseibeh, Bashar (Association for Computing Machinery, 2016)
    In the age of ubiquitous computing increasing amounts of personal data are being logged and shared, making privacy management a challenging task that must be integrated into our daily lives. In this paper, we explore the ...
  • Mehta, Vikram; Price, Blaine A.; Bandara, Arosha K.; Nuseibeh, Bashar (Association for Computing Machinery, 2016)
    Physical or bodily privacy is an innate need that drives a variety of human behaviours. However, in a highly dynamic, crowded and context dependent world with rapidly changing technology, other humans or technological ...
  • Tun, Thein Than; Price, Blaine A.; Bandara, Arosha K.; Yu, Yijun; Nuseibeh, Bashar (IEEE Computer Society, 2016)
    Abstract—Police investigations involving digital evidence tend to focus on forensic examination of storage units on personal electronic devices (laptops, smartphones, etc). However, a number of factors are making digital ...
  • Lopez, Tamara; Petre, Marian; Nuseibeh, Bashar (IEEE Computer Society, 2016)
    Software rarely works as intended while it is being written. Things go wrong in the midst of everyday practice, and developers are commonly understood to form theories and strategies for dealing with them. Errors in ...
  • Pasquale, Liliana; Ghezzi, Carlo; Pasi, Edoardo; Tsigkanos, Christos; Boubekeur, Menouer; Florentino-Liano, Blanca; Hadzic, Tarik; Nuseibeh, Bashar (IEEE Computer Society, 2017)
    Smart spaces are becoming increasingly vulnerable from the interplay of cyber and physical entities. A representation of the spaces' topology can reveal security-relevant contextual characteristics, and a visualization ...
  • Lopez, Tamara; Tun, Thein Than; Bandara, Arosha K.; Levine, Mark; Nuseibeh, Bashar; Sharp, Helen (Association for Computing Machinery, 2018)
    Developers turn to Stack Overflow and other on-line sources to find solutions to security problems, but little is known about how they engage with and guide one another in these environments or the perceptions of software ...
  • Alrimawi, Faeq; Pasquale, Liliana; Mehta, Deepak; Nuseibeh, Bashar (Association for Computing Machinery, 2018)
    An increasing number of security incidents in cyber-physical systems (CPSs) arise from the exploitation of cyber and physical components of such systems. Knowledge about how such incidents arose is rarely captured and used ...
  • Borda, Aimee; Pasquale, Liliana; Koutavas, Vasileios; Nuseibeh, Bashar (Assocation for Computing Machinery, 2018)
    Cyber-Physical Systems (CPSs) must often self-adapt to respond to changes in their operating environment. However, using formal verification techniques to provide assurances that critical requirements are satisfied can ...
  • Pasquale, Liliana; Alrajeh, Dalal; Peersman, Claudia; Nuseibeh, Bashar; Rashid, Awais (Association for Computing Machinery, 2018)
    As software becomes more ubiquitous, and the risk of cyber-crimes increases, ensuring that software systems are forensic-ready (i.e., capable of supporting potential digital investigations) is critical. However, little ...
  • Tsigkanos, Christos; Pasquale, Liliana; Ghezzi, Carlo; Nuseibeh, Bashar (IEEE Computer Society, 2018)
    Ubiquitous computing is resulting in a proliferation of cyber-physical systems that host or manage valuable physical and digital assets. These assets can be harmed by malicious agents through both cyber-enabled or ...
  • Tun, Thein Than; Yang, Mu; Bandara, Arosha K.; Yu, Yijun; Nhlabatsi, A.; Khan, N.; Khan, K.M.; Nuseibeh, Bashar (Association for Computing Machinery, 2018)
    In an adaptive security-critical system, security mechanisms change according to the type of threat posed by the environment. Specifying the behavior of these systems is diicult because conditions of the environment are ...
  • Bennaceur, Amel; Tun, Thein Than; Bandara, Arosha K.; Yu, Yijun; Nuseibeh, Bashar (Association for Computing Machinery, 2018)
    As the number, complexity, and heterogeneity of connected devices in the Internet of Things (IoT) increase, so does our need to secure these devices, the environment in which they operate, and the assets they manage or ...
  • Elrakaiby, Yehia; Ferrari, Alessio; Mylopoulos, John (IEEE Computer Society, 2018)
    The requirements problem consists of transforming stakeholder requirements - however informal, ambiguous, conflicting, unattainable, imprecise and incomplete – into a consistent, complete and realizable specification ...
  • Hutton, Luke; Price, Blaine A.; Kelly, Ryan; McCormick, Ciaran; Bandara, Arosha K.; Hatzakis, Tally; Meadows, Maureen; Nuseibeh, Bashar (JMIR Publications, 2018)
    Background: The recent proliferation of self-tracking technologies has allowed individuals to generate significant quantities of data about their lifestyle. These data can be used to support health interventions and monitor ...
  • Lopez, Tamara; Tun, Thein Than; Bandara, Arosha K.; Levine, Mark; Nuseibeh, Bashar; Sharp, Helen (Association for Computing Machinery, 2018)
    Developers turn to Stack Overflow and other on-line sources to find solutions to security problems, but little is known about how they engage with and guide one another in these environments or the perceptions of software ...
  • Stol, Klaas-Jan; Fitzgerald, Brian (Association for Computing Machinery, 2018)
    A variety of research methods and techniques are available to SE researchers, and while several overviews exist, there is neither consistency in the research methods covered nor in the terminology used. Furthermore, ...

View more