University of Limerick Institutional Repository

Browsing LERO - UL authors by Title

DSpace Repository

Browsing LERO - UL authors by Title

Sort by: Order: Results:

  • Vassev, Emil; Hinchey, Mike; Gaudin, Benoit; Nixon, Paddy (Association for Computing Machinery, 2011)
    Autonomic Service-Component Ensembles (ASCENS) is a class of multi-agent systems formed as mobile, intelligent and open-ended swarms of special autonomic service components capable of local and distributed reasoning. Such ...
  • Tun, Thein Than; Yang, Mu; Bandara, Arosha K.; Yu, Yijun; Nhlabatsi, A.; Khan, N.; Khan, K.M.; Nuseibeh, Bashar (Association for Computing Machinery, 2018)
    In an adaptive security-critical system, security mechanisms change according to the type of threat posed by the environment. Specifying the behavior of these systems is diicult because conditions of the environment are ...
  • Tun, Thein Than; Yang, Mu; Bandara, Arosha K.; Yu, Y.; Nhlabatsi, A.; Khan, N.; Khan, K.M.; Bashara, Bashar (Association for Computing Machinery, 2018)
    In an adaptive security-critical system, security mechanisms change according to the type of threat posed by the environment. Specifying the behavior of these systems is diicult because conditions of the environment are ...
  • Noll, John; Liu, Wei-Ming (Association for Computing Machinery, 2010)
    A growing body of empirical research has examined large, successful open source software projects such as the Linux kernel, Apache web server, and Mozilla web browser. Do these results extend to small open source efforts ...
  • Pasquale, Liliana; Spoletini, Paola; Pometto, Dario; Blasi, Francesco; Redaelli, Tiziana (Springer, 2013)
    [Context and motivation] In the last years motion-based games have achieved an increasing success. These games have great potential to support physiotherapeutic programs, as they can guide the patients in performing the ...
  • Ali, Raian; Dalpiaz, Fabiano; Giorgini, Paolo; Souza, Victor E (2011)
    Requirements evolution is a main driver for systems evolution. Traditionally, requirements evolution is associated to changes in the users’ needs and environments. In this paper, we explore another cause for requirements ...
  • Buckley, Jim (IEEE Computer Society, 2009)
    Developing well-formed software visualization tools requires increased empirical study of programmers’ information requirements.
  • Pasquale, Liliana; Yu, Yijun; Mazeiar, Salehie; Cavallaro, Luca; Tun, Thein Than; Nuseibeh, Bashar (IEEE Computer Society, 2013)
    We propose the use of forensic requirements to drive the automation of a digital forensics process. We augment traditional reactive digital forensics processes with proactive evidence collection and analysis activities, ...
  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Ali, Raian; Nuseibeh, Bashar (2012)
    Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets are therefore key activities in any security engineering process – from modeling threats and attacks, discovering ...
  • Mahfouz, Ayman; Barroca, Leonor; Laney, Robin; Nuseibeh, Bashar (Association for Computing Machinery, 2009)
    Evolving business needs call for customizing choreographed interactions. However, conventional choreography description languages provide only a partial view of the interaction. Business goals of each participant and ...
  • Mahfouz, Ayman; Barroca, Leonor; Laney, Robin; Nuseibeh, Bashar (IEEE Computer Society, 2010)
    Service-oriented architecture (SOA) enables interenterprise service interactions. Services provide platform-independent abstractions around software systems, thereby enabling interoperability between heterogeneous systems. ...
  • Cawley, Ciarán; Healy, Patrick; Botterweck, Goetz; Thiel, Steffen (VAMOS 2010, 2010)
    Configuring a large Software Product Line can be a complex and cognitively challenging task. The numerous relationships that can exist between different system elements such as features and their implementing artefacts can ...
  • Stol, Klaas-Jan; Fitzgerald, Brian (Association for Computing Machinery, 2014)
    Crowdsourcing is an emerging form of ‘outsourcing’ software development. While there has been considerable research in the area of crowdsourcing in general, very little research has focused specifically on how crowdsourcing ...
  • Abid, Saad bin (Association for Computing Machinery, 2010)
    Features implementing the functionality in a software product line (SPL) often interact and depend on each other. It is hard to maintain the consistency between feature dependencies on the model level and the actual ...
  • Abid, Saad bin (2009)
    Dealing with traceability management issues during model based product derivation in large complex industrial SPL is error prone due to the lack of tool support. As a result traceability management between connected models ...
  • Taubenberger, Stefan; Jürgens, Jan; Yu, Yijun; Nuseibeh, Bashar (Emerald Group Publishing Ltd, 2013)
    Purpose - In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors - wrongly identified or unidentified ...
  • O'Leary, Pádraig; Noll, John; Richardson, Ita (Springer, 2013)
    Attempts to extend process management to support pathways in the health domain have not been as successful as workflow for routine business processes. In part this is due to the dynamic nature of knowledge-intensive work ...
  • Ghassemi Toosi, Farshad; Buckley, Jim; Sai, Ashish Rajendra; Le Gear, Andrew (2018)
    Software reverse engineering is the generation of abstracted views of large software systems from detailed implementation artifacts. As such, reverse engineers work towards views obfuscated by the scale, and complexity ...
  • Franqueira, Virginia N.L.; Tun, Thein Than; Yu, Yijun; Wieringa, Roel J.; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    When showing that a software system meets certain security requirements, it is often necessary to work with formal and informal descriptions of the system behavior, vulnerabilities, and the threats from potential attackers. ...
  • Hossain, Emam; Ali Babar, Muhammad; Paik, Hye-Young; Verner, June (IEEE Computer Society, 2009)
    There is growing interest in applying agile practices in Global Software Development (GSD) projects. But project stakeholder distribution in GSD creates a number of challenges that make it difficult to use some agile ...

Search ULIR


Browse

My Account

Statistics