University of Limerick Institutional Repository

Browsing LERO - UL authors by Title

DSpace Repository

Browsing LERO - UL authors by Title

Sort by: Order: Results:

  • Jedrzejczyk, Lukasz; Price, Blaine A.; Bandara, Arosha K.; Nuseibeh, Bashar (2010)
    Effective privacy management requires that mobile systems' users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work has shown that making such privacy decisions ...
  • Ali Babar, Muhammad; Fitzgerald, Brian; Agerfalk, Par J.; Lundell, Bjorn (2007)
    Software Product Line (SPL) and Open Source Software (OSS) have emerged as successful modes of developing software. Although they appear to differ in terms of development principles and processes, researchers and practitioners ...
  • Tsigkanos, Christos; Pasquale, Liliana; Ghezzi, Carlo; Nuseibeh, Bashar (IEEE Computer Society, 2018)
    Ubiquitous computing is resulting in a proliferation of cyber-physical systems that host or manage valuable physical and digital assets. These assets can be harmed by malicious agents through both cyber-enabled or ...
  • Pasquale, Liliana; Mazeiar, Salehie; Ali, Raian; Omoronyia, Inah; Nuseibeh, Bashar (IEEE Computer Society, 2012)
    Adaptive security aims to protect valuable assets managed by a system, by applying a varying set of security controls. Engineering adaptive security is not an easy task. A set of effective security countermeasures should ...
  • Lane, Michael; Agerfalk, Par J. (IEEE Computer Society, 2008)
    Global software development surfaces various challenges and benefits that are not always present in co-located teams. The purpose of this paper is to explore a set of propositions that address the suitability of four ...
  • Ye, Juan; Clear, Adrian K.; Coyle, Lorcan; Dobson, Simon (Springer-Verlag, 2009)
    Through advances in sensing technology, a huge amount of data is available to context-aware applications. A major challenge is extracting features of this data that correlate to high-level human activities. Time, while ...
  • Yates, Rebecca Yolande (University of Limerick, 2014)
    Many software developers struggle to understand code written by others, leading to increased maintenance costs. Research on program comprehension to date has primarily focused on individual developers attempting to ...
  • Murdoch, Olga; Coyle, Lorcan; Dobson, Simon (19th Irish conference on Artificial Intelligence and Cognitive Science (AICS) 2008, 27-28 August, 2008, Cork, 2008)
    Stock photo libraries are the most common means for publishers and advertisers to find images for their media. Searching for the perfect photo can be a time-consuming and frustrating task. This is because searching is often ...
  • Farfeleder, Stefan; Moser, Thomas; Krall, Andreas; Stalhane, Tor; Omoronyia, Inah; Zojer, Herbert (Association for Computing Machinery, 2011)
    Requirements managers aim at keeping their sets of requirements well-defined, consistent and up to date throughout a project’s life cycle. Semantic web technologies have found many valuable applications in the field of ...
  • Feller, Joseph; Fitzgerald, Brian; Hissam, Scott; Scacchi, Walt (Assocation for Computing Machinery, 2005)
    Building on the success of the first four workshops in the series, which were held at ICSE 2001 (Toronto), ICSE 2002 (Orlando), ICSE 2003 (Portland) and ICSE 2004 (Edinburgh), the 5th Workshop on Open Source Software ...
  • Agerfalk, Par J.; Fitzgerald, Brian; Lings, Brian; O'Brien, Liam; Thiel, Steffen (2006)
  • Sharif, Khaironi Yatim (University of Limerick, 2012)
    Several authors have proposed information seeking as an important perspective for the study of software maintenance and evolution, and have characterized information seeking empirically in commercial software evolution ...
  • Fitzgerald, Brian (IEEE Computer Society, 2011)
    Open source software can elicit strongly contrasting reactions. Advocates claim that OSS is high-quality software produced on a rapid time scale and for free or at very low cost by extremely talented developers. At the ...
  • Agerfalk, Par J.; Fitzgerald, Brian; Holmstrom Olsson, Helena; Ó Conchúir, Eoin (2006)
    This paper presents a psychological contract perspective on the use of open source as an offshore outsourcing strategy – open-sourcing as we term it here. Building on previous research on IS outsourcing, a theoretical ...
  • Agerfalk, Par J.; Fitzgerald, Brian; Holmstrom Olsson, Helena; Ó Conchúir, Eoin (2006)
    This paper presents a psychological contract perspective on the use of open source as an offshore outsourcing strategy – open-sourcing as we term it here. Building on previous research on IS outsourcing, a theoretical ...
  • Shaikh, Maha; Cornford, Tony (2008)
    Open-sourcing is a relatively new term and indicates a less explored theme within the overall perspective of global sourcing. Until recently the term has usually been taken to refer to commercially controlled and created ...
  • Yu, Yijun; Tun, Thein Than; Tedeschi, Alessandra; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    When software systems are verified against security requirements, formal and informal arguments provide a structure for organizing the software artifacts. Our recent work on the evolution of security-critical software ...
  • Sai, Ashish Rajendra; Buckley, Jim; Le Gear, Andrew (2018)
    Proof Of Work Blockchains such as Bitcoin and Ethereum exhibit a low Transaction Per Second (TPS) that impacts the scalability of the blockchain. Manipulating the block creation time can yield a higher TPS. A lower block ...
  • Wang, Xiaofeng; Vidgen, Richard (2007)
    Agile methods have emerged and become popular over last few years as a response to shortcomings of the waterfall process model. However, agile processes are stamped by some as chaotic processes and are placed in opposition ...

Search ULIR


Browse

My Account

Statistics