University of Limerick Institutional Repository

Browsing LERO - UL authors by Title

DSpace Repository

Browsing LERO - UL authors by Title

Sort by: Order: Results:

  • Ali, Raian; Dalpiaz, Fabiano; Giorgini, Paolo; Souza, Victor E (2011)
    Requirements evolution is a main driver for systems evolution. Traditionally, requirements evolution is associated to changes in the users’ needs and environments. In this paper, we explore another cause for requirements ...
  • Buckley, Jim (IEEE Computer Society, 2009)
    Developing well-formed software visualization tools requires increased empirical study of programmers’ information requirements.
  • Pasquale, Liliana; Yu, Yijun; Mazeiar, Salehie; Cavallaro, Luca; Tun, Thein Than; Nuseibeh, Bashar (IEEE Computer Society, 2013)
    We propose the use of forensic requirements to drive the automation of a digital forensics process. We augment traditional reactive digital forensics processes with proactive evidence collection and analysis activities, ...
  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Ali, Raian; Nuseibeh, Bashar (2012)
    Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets are therefore key activities in any security engineering process – from modeling threats and attacks, discovering ...
  • Mahfouz, Ayman; Barroca, Leonor; Laney, Robin; Nuseibeh, Bashar (Association for Computing Machinery, 2009)
    Evolving business needs call for customizing choreographed interactions. However, conventional choreography description languages provide only a partial view of the interaction. Business goals of each participant and ...
  • Mahfouz, Ayman; Barroca, Leonor; Laney, Robin; Nuseibeh, Bashar (IEEE Computer Society, 2010)
    Service-oriented architecture (SOA) enables interenterprise service interactions. Services provide platform-independent abstractions around software systems, thereby enabling interoperability between heterogeneous systems. ...
  • Cawley, Ciarán; Healy, Patrick; Botterweck, Goetz; Thiel, Steffen (VAMOS 2010, 2010)
    Configuring a large Software Product Line can be a complex and cognitively challenging task. The numerous relationships that can exist between different system elements such as features and their implementing artefacts can ...
  • Stol, Klaas-Jan; Fitzgerald, Brian (Association for Computing Machinery, 2014)
    Crowdsourcing is an emerging form of ‘outsourcing’ software development. While there has been considerable research in the area of crowdsourcing in general, very little research has focused specifically on how crowdsourcing ...
  • Abid, Saad bin (Association for Computing Machinery, 2010)
    Features implementing the functionality in a software product line (SPL) often interact and depend on each other. It is hard to maintain the consistency between feature dependencies on the model level and the actual ...
  • Abid, Saad bin (2009)
    Dealing with traceability management issues during model based product derivation in large complex industrial SPL is error prone due to the lack of tool support. As a result traceability management between connected models ...
  • Taubenberger, Stefan; Jürgens, Jan; Yu, Yijun; Nuseibeh, Bashar (Emerald Group Publishing Ltd, 2013)
    Purpose - In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors - wrongly identified or unidentified ...
  • O'Leary, Pádraig; Noll, John; Richardson, Ita (Springer, 2013)
    Attempts to extend process management to support pathways in the health domain have not been as successful as workflow for routine business processes. In part this is due to the dynamic nature of knowledge-intensive work ...
  • Franqueira, Virginia N L; Tun, Thein Than; Yu, Yijun; Wieringa, Roel; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    When showing that a software system meets certain security requirements, it is often necessary to work with formal and informal descriptions of the system behavior, vulnerabilities, and the threats from potential attackers. ...
  • Hossain, Emam; Ali Babar, Muhammad; Paik, Hye-Young; Verner, June (IEEE Computer Society, 2009)
    There is growing interest in applying agile practices in Global Software Development (GSD) projects. But project stakeholder distribution in GSD creates a number of challenges that make it difficult to use some agile ...
  • Mc Caffery, Fergal; Richardson, Ita; Burton, John (Springer Verlag, 2009)
    Failure of medical device (MD) software can have potentially catastrophic effects, leading to injury of patients or even death. Therefore regulators penalise MD manufacturers who do not demonstrate that sufficient attention ...
  • Bjorn, Pernille; Fitzgerald, Brian; Scupola, Ada (2003)
    IT is everywhere and the need for Groupware support of collaborative learning between geographically distributed students working in teams arises. In this paper we focus on the technology acceptance of Groupware in virtual ...
  • Clarke, Siobhán; Fitzgerald, Brian; Nixon, Paddy; Pohl, Klaus; Ryan, Kevin; Sinclair, David; Thiel, Steffen (SAE International, 2008)
    The amount and complexity of software in automotive systems is constantly increasing. Today’s luxury cars include numerous electronic control units. A large part of the functionality of these units is driven by software. In ...
  • O'Shea, Pamela; Exton, Chris (Psychology of Programming Interest Group, 2005)
    This paper investigates the use and type of source code employed during program summaries which describe software maintenance tasks. The data consists of eighty-eight program summaries extracted from online developer ...
  • McLoughlin, Fionbarr (University of Limerick, 2010)
    Part of the maturity process in the fields of software engineering and information technology has involved, and continues to involve, establishing best practices in the various domains that constitute the area. Specifically, ...
  • McLoughlin, Fionbarr; Richardson, Ita (Springer-Verlag, 2010)
    In response to the lack of a business-focused approach to software process improvement (SPI), the Rosetta Stone objective-driven SPI Methodology (RSM) has been developed which allows organizations to undertake SPI based ...

Search ULIR


Browse

My Account

Statistics