University of Limerick Institutional Repository

Browsing LERO - UL authors by Title

DSpace Repository

Browsing LERO - UL authors by Title

Sort by: Order: Results:

  • Feller, Joseph; Fitzgerald, Brian; Hissam, Scott; Scacchi, Walt (Assocation for Computing Machinery, 2005)
    Building on the success of the first four workshops in the series, which were held at ICSE 2001 (Toronto), ICSE 2002 (Orlando), ICSE 2003 (Portland) and ICSE 2004 (Edinburgh), the 5th Workshop on Open Source Software ...
  • Agerfalk, Par J.; Fitzgerald, Brian; Lings, Brian; O'Brien, Liam; Thiel, Steffen (2006)
  • Sharif, Khaironi Yatim (University of Limerick, 2012)
    Several authors have proposed information seeking as an important perspective for the study of software maintenance and evolution, and have characterized information seeking empirically in commercial software evolution ...
  • Fitzgerald, Brian (IEEE Computer Society, 2011)
    Open source software can elicit strongly contrasting reactions. Advocates claim that OSS is high-quality software produced on a rapid time scale and for free or at very low cost by extremely talented developers. At the ...
  • Agerfalk, Par J.; Fitzgerald, Brian; Holmstrom Olsson, Helena; Ó Conchúir, Eoin (2006)
    This paper presents a psychological contract perspective on the use of open source as an offshore outsourcing strategy – open-sourcing as we term it here. Building on previous research on IS outsourcing, a theoretical ...
  • Agerfalk, Par J.; Fitzgerald, Brian; Holmstrom Olsson, Helena; Ó Conchúir, Eoin (2006)
    This paper presents a psychological contract perspective on the use of open source as an offshore outsourcing strategy – open-sourcing as we term it here. Building on previous research on IS outsourcing, a theoretical ...
  • Shaikh, Maha; Cornford, Tony (2008)
    Open-sourcing is a relatively new term and indicates a less explored theme within the overall perspective of global sourcing. Until recently the term has usually been taken to refer to commercially controlled and created ...
  • Yu, Yijun; Tun, Thein Than; Tedeschi, Alessandra; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    When software systems are verified against security requirements, formal and informal arguments provide a structure for organizing the software artifacts. Our recent work on the evolution of security-critical software ...
  • Sai, Ashish Rajendra; Buckley, Jim; Le Gear, Andrew (2018)
    Proof Of Work Blockchains such as Bitcoin and Ethereum exhibit a low Transaction Per Second (TPS) that impacts the scalability of the blockchain. Manipulating the block creation time can yield a higher TPS. A lower block ...
  • Wang, Xiaofeng; Vidgen, Richard (2007)
    Agile methods have emerged and become popular over last few years as a response to shortcomings of the waterfall process model. However, agile processes are stamped by some as chaotic processes and are placed in opposition ...
  • O'Leary, Pádraig (2013-09-10)
    Increasingly organisations adopt software product lines to enable extensive reuse and deliver a multitude of benefits. Compared to the vast amounts of research on developing product lines and approaches to deriving products ...
  • Vidgen, Richard; Wang, Xiaofeng (2006)
    Agile software development has caught the attention of both practitioners and academics in recent years. In spite of many anecdotes and papers describing lessons learnt the theoretical foundation of agile software development ...
  • Casey, Valentine; Deshpande, Sadhana; Richardson, Ita (Submitted to the Second Information Systems Workshop on Global Sourcing: Services, Knowledge and Innovation, 2010)
    Purpose: Our research rather than focusing on the requirements of Western based organisations outsourcing or offshoring software development considers the factors that are relevant for the recipients of this work and in ...
  • Cfarku, Denada; Taher, Yehia; Haque, Rafiqul; Van den Heuvel, Willem-Jan; Papazoglou, Michael P (Springer, 2012)
    The increasing complexity of the business transaction results in a higher potential risk in terms of SLA violation. The fulfillment of the QoS constraints specified in global SLA can be threatened at any time by ...
  • Wang, Xiaofeng; Ó Conchúir, Eoin; Vidgen, Richard (2008)
    An ongoing debate on agile methods focuses on the contradictions in software development, especially responding to change vs. following a plan, and people vs. processes. Unlike the ‘either-or’ perspective adopted in the ...
  • Conboy, Kieran; Coyle, Sharon; Wang, Xiaofeng; Pikkarainen, Minna (2011)
    There is a common perception that, while there may be some ‘teething’ problems experienced during the initial transition to agile, people are much happier, engaged and ultimately more productive in these environments. This ...
  • Doyle, Timothy; Exton, Chris (PPIG (Psychology of Programming Interest Group), 2004)
    Bluetooth (Bluetooth SIG 2003, Haartsen 1998, Johansson, et al. 2002, Morrow 2002) is a recently conceived universal communication standard that allows wireless connectivity among numerous portable electronic devices ...
  • Bass, Julian M.; Beecham, Sarah; Razzak, Mohammad Abdur; Nic Canna, Clodagh; Noll, John (Association for Computing Machinery, 2018)
    The Product Owner (PO) is critical for translating business needs into a software implementation by gathering and prioritizing requirements, and assessing whether features have met the definition of “done.” There is a ...
  • Casey, Valentine; Richardson, Ita (2004)
    Given the current popularity of Global Software Development (GSD) increasing numbers of organisations are taking the opportunity offered to set up virtual software teams. This approach allows companies to partner experienced ...

Search ULIR


Browse

My Account

Statistics