University of Limerick Institutional Repository

Browsing LERO - UL authors by Title

DSpace Repository

Browsing LERO - UL authors by Title

Sort by: Order: Results:

  • Hashmi, Sajid Ibrahim; Haque, Rafiqul; Schmieders, Eric; Richardson, Ita (IEEE Computer Society, 2011)
    Service Based Systems (SBSs) are composed of loosely coupled services. Different stakeholders in these systems, e.g. service providers, service consumers, and business decision makers, have different types of concerns which ...
  • Lang, Michael; Fitzgerald, Brian (Taylor & Francis Ltd, 2006)
    Despite claims in the literature that "traditional" methods and techniques are inadequate and poorly matched to the demands of the Web design context, the findings from a field survey of Web/hypermedia systems designers ...
  • Shokry, Hesham; El-Boghdadi, Hatem M.; Shaheen, Samir I. (Association for Computing Machinery, 2008)
    Producing efficient and compact code for embedded DSP processors is very important for nowadays faster and smaller size devices. Because such processors have highly irregular data-path, conventional code generation techniques ...
  • Ghassemi Toosi, Farshad (University of Limerick, 2017)
    This thesis presents a new graph drawing approach (the concentric approach) for drawing any undirected graph without taking stress or forces into account, in order to address the trade-off between quality and running ...
  • Shams, Armin; Sharif, Hossein; Helfert, Markus (2021)
    A Cloud Computing system is a complex system. The existing metric systems are inadequate for providing a high-fidelity picture of what is going on in the complex cloud and do not facilitate all the assessments needed ...
  • Qian, Wenyi; Peng, Xin; Sun, Jun; Yu, Yijun; Nuseibeh, Bashar; Zhao, Wenyun (Association for Computing Machinery, 2017)
    In Online-to-Offline (O2O) commerce, customer services may need to be composed from online and offline services. Such composition is challenging, as it requires effective selection of appropriate services that, in turn, ...
  • Tun, Thein Than; Bennaceur, Amel; Nuseibeh, Bashar (IEEE Computer Society, 2020)
    Security-critical systems typically place some requirements on the behaviour of their users, obliging them to follow certain instructions when using those systems. Security vulnerabilities can arise when users do not ...
  • Sharif, Khaironi Yatim; Buckley, Jim (IEEE Computer Society, 2009)
    Several authors have proposed information seeking as an appropriate perspective for studying software evolution, and have characterized information seeking empirically in commercial software evolution settings. However, ...
  • Avram, Gabriela (IEEE Computer Society, 2007)
    As part of a research project dedicated to the Social Organizational and Cultural Aspects of Global Software Development, the author has chosen to focus on collaborative work practices and knowledge management aspects of ...
  • Ahmad, Bilal; Richardson, Ita; McLoughlin, Simon; Beecham, Sarah (2018)
    Mobile Devices can be beneficial for older adults (OAs) if used effectively. Yet current research suggests a low level of take-up. We investigated the extent to which OAs use mobile devices to identify their likes, dislikes ...
  • Shokry, Hesham; El-Boghdadi, Hatem M. (Association for Computing Machinery, 2011)
    The increasing demand for more functionality in embedded systems applications nowadays requires efficient generation of compact code for embedded DSP processors. Because such processors have highly irregular datapaths, ...
  • Shokry, Hesham; Hinchey, Mike (IEEE Computer Society, 2009)
    The automotive industry is, like several other domains, a source of both challenging problems and innovative technologies of various kinds. One interesting phenomenon in this domain is the extensive interdependencies between ...
  • Welsh, Thomas; Benkhelifa, Elhadj (Association for Computing Machinery, 2020)
    Cloud infrastructures are highly favoured as a computing delivery model worldwide, creating a strong societal dependence. It is therefore vital to enhance their resilience, providing persistent service delivery under a ...
  • Rohmer, Thibaud; Nafaa, Abdelhamid; Nakib, Amir (IEEE Computer Society, 2012)
    Strong with large pools of set-top-boxes (STB) already deployed and connected to high-capacity networks, broadband operators sit on a major opportunity to introduce P2P-based VOD streaming architectures that scales up ...
  • Bai, Xu; Huang, LiGuo; Zhang, He (Springer-Verlag, 2010)
    Stakeholder and artifact are regarded as two important elements in software engineering processes, but they are rarely systematically investigated in software process modeling and simulation. Inspired by the Workshop of ...
  • Zhang, He; Ali Babar, Muhammad (British Informatics Society Ltd., 2010)
    BACKGROUND: Systematic Literature Review (SLR) has become an important research methodology in software engineering since 2004. One critical step in applying this methodology is to design and execute appropriate and effective ...
  • Vassev, Emil; Hinchey, Mike (IEEE Computer Society, 2013)
    In new space exploration initiatives of NASA and ESA, there is emphasis on both human and robotic exploration. Risk and feasibility are major factors supporting the use of unmanned craft and the use of automation and robotic ...
  • Jedrzejczyk, Lukasz; Price, Blaine A.; Bandara, Arosha K.; Nuseibeh, Bashar (2010)
    Effective privacy management requires that mobile systems' users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work has shown that making such privacy decisions ...
  • Ali Babar, Muhammad; Fitzgerald, Brian; Agerfalk, Par J.; Lundell, Bjorn (2007)
    Software Product Line (SPL) and Open Source Software (OSS) have emerged as successful modes of developing software. Although they appear to differ in terms of development principles and processes, researchers and practitioners ...
  • Tsigkanos, Christos; Pasquale, Liliana; Ghezzi, Carlo; Nuseibeh, Bashar (IEEE Computer Society, 2018)
    Ubiquitous computing is resulting in a proliferation of cyber-physical systems that host or manage valuable physical and digital assets. These assets can be harmed by malicious agents through both cyber-enabled or ...

Search ULIR


Browse

My Account

Statistics