University of Limerick Institutional Repository

Browsing LERO - UL authors by Title

DSpace Repository

Browsing LERO - UL authors by Title

Sort by: Order: Results:

  • Conboy, Kieran; Fitzgerald, Brian (Association for Computing Machinery, 2004)
    Since the software crisis of the 1960’s, numerous methodologies have been developed to impose a disciplined process upon software development. It is now widely accepted that these methodologies are unsuccessful and ...
  • Haque, Rafiqul; Richardson, Ita; Taher, Yehia; Van den Heuvel, Willem-Jan (2011)
    Processes are the main constituents of public services and as such demand correct and complete execution. Increasingly however, governments feel the pressuring need to deliver public services more quickly and personalized ...
  • Vassev, Emil; Hinchey, Mike (IEEE Computer Society, 2011)
    We aim at identifying the content and design principles of KnowLang, a new formal anguage for knowledge representation in a particular class of autonomic systems termed ASCENS. Autonomic Service-Component Ensembles (ASCENS) ...
  • Haque, Rafiqul; Taher, Yehia; Richardson, Ita; Whelan, Eoin; Van den Heuvel, Willem-Jan; Tawbi, Samar (2011)
    Processes are the primary constituents of public services and as such demand the completeness to achieve the goal of services. Ensuring the completeness of processes is a challenging task because, in recent days, they ...
  • Lane, Stephen; Gu, Qing; Lago, Patricia; Richardson, Ita (Springer-Verlag, 2013)
    Service-oriented computing is a promising computing paradigm which facilitates the composition of loosely coupled and adaptable service- based applications. Unfortunately, this new paradigm does not lend itself easily ...
  • Monasor, Miguel J; Vizcaíno, Aurora; Piattini, Mario; Noll, John; Beecham, Sarah (IEEE Computer Society, 2013)
    Sources of Global Software Development (GSD) information, such as academic literature, often focus on highlevel issues rather than on specific problems. Researchers tend to generalize problems and solutions; however, ...
  • Salehie, Mazeiar; Tahvildari, Ladan (John Wiley & Sons, 2012)
    Self-adaptive software is a closed-loop system, since it continuously monitors its context (i.e. environment) and/or self (i.e. software entities) in order to adapt itself properly to changes. We believe that representi ...
  • Donnellan, Brian; Fitzgerald, Brian (IEEE Computer Society, 2004)
    In today’s competitive and turbulent environment companies engaged in New Product Development (NPD) need tu have a sophisticated understanding of the types of knowledge critical to the each phase of the NPD process. These ...
  • O'Leary, Pádraig; Thiel, Steffen; Botterweck, Goetz; Richardson, Ita (2008)
    Inefficient product derivation practices can greatly diminish the productivity gains expected from a software product line approach. As a foundation for systematic and efficient product derivation a better understanding ...
  • García-Galán, Jesús; Pasquale, Liliana; Grispos, George; Nuseibeh, Bashar (Association for Computer Machinery, 2016)
    Mission critical software is often required to comply with multiple regulations, standards or policies. Recent paradigms, such as cloud computing, also require software to operate in heterogeneous, highly distributed, ...
  • O'Leary, Pádraig; Mc Caffery, Fergal; Richardson, Ita; Thiel, Steffen (2009)
    Software Product Lines (SPL) and Agile practices have emerged as new paradigms for developing software. Both approaches share common goals; such as improving productivity, reducing time to market, decreasing development ...
  • Chen, Lianping; Ali Babar, Muhammad; Zhang, He (2010)
    Identifying relevant papers from various Electronic Data Sources (EDS) is one of the key activities of conducting these kinds of studies. Hence, the selection of EDS for searching the potentially relevant papers is an ...
  • Shokry, Hesham (Association for Computing Machinery, 2010)
    Early system requirements are often captured by declarative and property-based artifacts, such as scenarios and goals. While such artifacts are intuitive and useful, they are partial and typically lack an overarching ...
  • Agerfalk, Par J. (2006)
    Globally distributed software development (GSD) and agile methods are two current and important trends in software and systems engineering. While agile methods seem to cope well with increasingly changing business environments, ...
  • Rong, Guoping; Boehm, Barry; Kuhrmann, Marco; Tian, Evelyn; Lian, Shijun; Richardson, Ita (Association for Computing Machinery, 2014)
    As an approach to develop suitable development processes for software projects, Software Process Selection, Tailoring and Composition (SP-STC) attract lots of attention from both industry and academia. However, without ...
  • Mair, Matthias; Herold, Sebastian; Rausch, Andreas (Association for Computing Machinery, 2014)
    Uncontrolled software architecture erosion can lead to a de- gradation of the quality of a software system. It is hence of great importance to repair erosion e ciently. Refactor- ings can help to systematically reverse ...
  • Pasquale, Liliana; Alrajeh, Dalal; Peersman, Claudia; Nuseibeh, Bashar; Rashid, Awais (Association for Computing Machinery, 2018)
    As software becomes more ubiquitous, and the risk of cyber-crimes increases, ensuring that software systems are forensic-ready (i.e., capable of supporting potential digital investigations) is critical. However, little ...
  • Butterfield, Andrew; Sanán, David; Hinchey, Mike (2013)
    The best approach to verifying an IMA separation kernel is to use a (fixed) time-space partitioning kernel with a multiple independent levels of separation (MILS) architecture. We describe an activity that explores the ...
  • Vassev, Emil; Hinchey, Mike; Quigley, Aaron (2009)
    Autonomic computing has been recognized as a valid approach to the development of large-scale self-managing complex systems. The Autonomic System Specification Language (ASSL) is an initiative for the development of autonomic ...
  • Derakhshanmanesh, Mahdi; Salehie, Mazeiar; Jürgen, Ebert (Association for Computing Machinery, 2012)
    Access control systems are deployed in organizations to protect critical cyber-physical assets. These systems need to be adjustable to cope with di erent contextual factors like changes in resources or requirements. ...

Search ULIR


Browse

My Account

Statistics