University of Limerick Institutional Repository

Browsing LERO - UL authors by Title

DSpace Repository

Browsing LERO - UL authors by Title

Sort by: Order: Results:

  • Lopez, Tamara; Thun, Thein T.; Bandara, Arosha; Levine, Mark; Nuseibeh, Bashar; Sharp, Helen (IEEE Computer Society, 2020)
    Integrating security into software development involves more than learning principles or applying techniques. Security can be integrated into software development practice by following a middle path, through which developers ...
  • Feller, Joseph; Fitzgerald, Brian; van der Hoek, A (IEEE Computer Society, 2002)
  • Kolovos, Dimitrios S.; Rose, Louis M.; Abid, Saad bin; Paige, Richard F.; Polack, Fiona A.C.; Botterweck, Goetz (Springer-Verlag, 2010)
    EMF and GMF are powerful frameworks for implementing tool support for modelling languages in Eclipse. However, with power comes complexity; implementing a graphical editor for a modelling language using EMF and GMF requires ...
  • Sai, Ashish Rajendra; Buckley, Jim; Fitzgerald, Brian; Le Gear, Andrew (Elsevier, 2021)
    Bitcoin introduced delegation of control over a monetary system from a select few to all who participate in that system. This delegation is known as the decentralization of controlling power and is a powerful security ...
  • Noll, John; Butterfield, Andrew (IEEE Computer Society, 2016)
    In order to be prepared for careers in todays global economy, software engineering students need to understand the issues, methods, and practices associated with Global Software Development (GSD). One approach to teaching ...
  • Kutay, Cat; Ali Babar, Muhammad (IEEE Computer Society, 2005)
    This paper presents our experiences gained in teaching software quality to undergraduate computer science and engineering students at The University of New South Wales. We argue that increasing demand of high quality ...
  • Lings, Brian; Lundell, Bjorn; Agerfalk, Par J.; Fitzgerald, Brian (2006)
    This paper presents an overview of the field of distributed development of software systems and applications (DD). Based on an analysis of the published literature, including its use in different industrial contexts, we ...
  • Peters, Fayola; Tun, Thein Than; Yu, Yijun; Nuseibeh, Bashar (IEEE Computer Society, 2019)
    Security bug reports can describe security critical vulnerabilities in software products. Bug tracking systems may contain thousands of bug reports, where relatively few of them are security related. Therefore finding ...
  • Stol, Klaas-Jan; Fitzgerald, Brian (Elsevier, 2015)
    There has been a growing interest in the role of theory within Software Engineering (SE) research. For several decades, researchers within the SE research community have argued that, to become a ‘real’ engineering science, ...
  • McCarthy, Eoin; Exton, Chris (Association for Computing Machinery, 2004)
    Many attempts have been made to construct tools that aid a programmers understand- ing of source code and system structure. Syntactic highlighting and tabbed interfaces can only be useful to a degree; greater steps need ...
  • Lopez, Tamara; Petre, Marian; Nuseibeh, Bashar (Psychology of Programming Interest Group (PPIG), 2012)
    Software engineering research into error commonly examines how developers pass judgement: to isolate faults, establish their causes and remove them. By contrast this research examines how developers experience and learn ...
  • Krafft, Martin F. (2008)
  • Ali Babar, Muhammad; Gorton, Ian (IEEE Computer Society, 2007)
    This paper describes a tool for managing architectural knowledge and rationale. The tool has been developed to support a framework for capturing and using architectural knowledge to improve the architecture process. ...
  • Ul-Haq, Aman; Ali Babar, Muhammad (IEEE Computer Society, 2009)
    Development of large projects is a knowledge intensive task. Applying knowledge management techniques to project activities can enhance productivity and reduce risks of failures. However, it has been observed that ...
  • Pasquale, Liliana; Ghezzi, Carlo; Pasi, Edoardo; Tsigkanos, Christos; Boubekeur, Menouer; Florentino-Liano, Blanca; Hadzic, Tarik; Nuseibeh, Bashar (IEEE Computer Society, 2017)
    Smart spaces are becoming increasingly vulnerable from the interplay of cyber and physical entities. A representation of the spaces' topology can reveal security-relevant contextual characteristics, and a visualization ...
  • Pasquale, Liliana; Ghezzi, Carlo; Menghi, Claudio; Tsigkanos, Christos; Nuseibeh, Bashar (Association for Computing Machinery, 2014)
    Adaptive security systems aim to protect valuable assets in the face of changes in their operational environment. They do so by monitoring and analysing this environment, and deploying security functions that satisfy ...
  • Conboy, Kieran; Fitzgerald, Brian (Association for Computing Machinery, 2004)
    Since the software crisis of the 1960’s, numerous methodologies have been developed to impose a disciplined process upon software development. It is now widely accepted that these methodologies are unsuccessful and ...
  • Haque, Rafiqul; Richardson, Ita; Taher, Yehia; Van den Heuvel, Willem-Jan (2011)
    Processes are the main constituents of public services and as such demand correct and complete execution. Increasingly however, governments feel the pressuring need to deliver public services more quickly and personalized ...
  • Vassev, Emil; Hinchey, Mike (IEEE Computer Society, 2011)
    We aim at identifying the content and design principles of KnowLang, a new formal anguage for knowledge representation in a particular class of autonomic systems termed ASCENS. Autonomic Service-Component Ensembles (ASCENS) ...
  • Haque, Rafiqul; Taher, Yehia; Richardson, Ita; Whelan, Eoin; Van den Heuvel, Willem-Jan; Tawbi, Samar (2011)
    Processes are the primary constituents of public services and as such demand the completeness to achieve the goal of services. Ensuring the completeness of processes is a challenging task because, in recent days, they ...

Search ULIR


Browse

My Account

Statistics