University of Limerick Institutional Repository

Browsing LERO - UL authors by Title

DSpace Repository

Browsing LERO - UL authors by Title

Sort by: Order: Results:

  • Taubenberger, Stefan; Jürgens, Jan; Yu, Yijun; Nuseibeh, Bashar (Emerald Group Publishing Ltd, 2013)
    Purpose - In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors - wrongly identified or unidentified ...
  • O'Leary, Pádraig; Noll, John; Richardson, Ita (Springer, 2013)
    Attempts to extend process management to support pathways in the health domain have not been as successful as workflow for routine business processes. In part this is due to the dynamic nature of knowledge-intensive work ...
  • Franqueira, Virginia N L; Tun, Thein Than; Yu, Yijun; Wieringa, Roel; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    When showing that a software system meets certain security requirements, it is often necessary to work with formal and informal descriptions of the system behavior, vulnerabilities, and the threats from potential attackers. ...
  • Hossain, Emam; Ali Babar, Muhammad; Paik, Hye-Young; Verner, June (IEEE Computer Society, 2009)
    There is growing interest in applying agile practices in Global Software Development (GSD) projects. But project stakeholder distribution in GSD creates a number of challenges that make it difficult to use some agile ...
  • Mc Caffery, Fergal; Richardson, Ita; Burton, John (Springer Verlag, 2009)
    Failure of medical device (MD) software can have potentially catastrophic effects, leading to injury of patients or even death. Therefore regulators penalise MD manufacturers who do not demonstrate that sufficient attention ...
  • Bjorn, Pernille; Fitzgerald, Brian; Scupola, Ada (2003)
    IT is everywhere and the need for Groupware support of collaborative learning between geographically distributed students working in teams arises. In this paper we focus on the technology acceptance of Groupware in virtual ...
  • Clarke, Siobhán; Fitzgerald, Brian; Nixon, Paddy; Pohl, Klaus; Ryan, Kevin; Sinclair, David; Thiel, Steffen (SAE International, 2008)
    The amount and complexity of software in automotive systems is constantly increasing. Today’s luxury cars include numerous electronic control units. A large part of the functionality of these units is driven by software. In ...
  • O'Shea, Pamela; Exton, Chris (Psychology of Programming Interest Group, 2005)
    This paper investigates the use and type of source code employed during program summaries which describe software maintenance tasks. The data consists of eighty-eight program summaries extracted from online developer ...
  • McLoughlin, Fionbarr (University of Limerick, 2010)
    Part of the maturity process in the fields of software engineering and information technology has involved, and continues to involve, establishing best practices in the various domains that constitute the area. Specifically, ...
  • McLoughlin, Fionbarr; Richardson, Ita (Springer-Verlag, 2010)
    In response to the lack of a business-focused approach to software process improvement (SPI), the Rosetta Stone objective-driven SPI Methodology (RSM) has been developed which allows organizations to undertake SPI based ...
  • McLoughlin, Fionbarr; Richardson, Ita (2010)
    The Rosetta Stone Methodology (RSM) has been developed which allows organizations to undertake Software Process Improvement (SPI) based on business- and organizational-driven goals and objectives. The methodology itself ...
  • Botterweck, Goetz; Pleuss, Andreas (2012)
    S2T2-Configurator is a visual tool for con guration of fea- ture models. In this tool paper, we focus on interactive techniques that support the con guration of large and complex models.
  • Vassev, Emil (Springer, 2016)
    In one aspect of our life or another, today we all live with AI. For example, the mechanisms behind the search engines operating on the Internet do not just retrieve information, but also constantly learn how to respond ...
  • Fitzgerald, Brian; Stol, Klaas-Jan; O'Sullivan, Ryan; O'Brien, Donal (IEEE Computer Society, 2013)
    Agile development methods are growing in popularity with a recent survey reporting that more than 80% of organizations now following an agile approach. Agile methods were seen initially as best suited to small, co-located ...
  • Ali Babar, Muhammad (IEEE Computer Society, 2004)
    Typically, architectural choices determine the achievement of desired goals (such as reusability and maintainability) of product line software development. Several methods have been proposed to design and analyze product ...
  • Healy, Patrick (PATAT 2006, 2006)
    In many funding agencies a model is adopted whereby a fixed panel of evaluators evaluate the set of applications. This is then followed by a general meeting where each proposal is discussed by those evaluators assigned ...
  • Lamprecht, Anna-Lena; Steffen, Bernhard; Margaria, Tiziana (Springer, 2016)
    The jABC is a framework for process modelling and execution according to the XMDD (eXtreme model-driven design) paradigm, which advocates the rigorous use of user-level models in the software development process and software ...
  • Pasquale, Liliana; Menghi, Claudio; Salehie, Mazeiar; Cavallaro, Luca; Omoronyia, Inah; Nuseibeh, Bashar (Association for Computing Machinery, 2012)
    This paper presents SecuriTAS, a tool to engineer adap- tive security. It allows software designers to model security concerns together with the requirements of a system. This model is then used at runtime to analyze ...
  • Vassev, Emil; Hinchey, Mike; Quigley, Aaron (2009)
    We address the need to realize a runtime self-modifiable architecture for autonomic systems, specified and generated with the ASSL (Autonomic System Specification Language) framework. This framework generates such systems ...
  • Vassev, Emil; Hinchey, Mike (IEEE Computer Society, 2011)
    NASA is currently exploring swarm-based technologies, targeting the development of prospective exploration missions to explore regions of space, where single large spacecraft would be impractical. Such systems are envisioned ...

Search ULIR


Browse

My Account

Statistics