University of Limerick Institutional Repository

Browsing LERO - UL authors by Author "EPSRC"

DSpace Repository

Browsing LERO - UL authors by Author "EPSRC"

Sort by: Order: Results:

  • Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo; Nuseibeh, Bashar (Association for Computing Machinery, 2011)
    Many requirements documents are written in natural language (NL). However, with the flexibility of NL comes the risk of introducing unwanted ambiguities in the requirements and misunderstandings between stakeholders. In ...
  • Yang, Hui; Willis, Alistair; De Roeck, Anne; Nuseibeh, Bashar (Association for Computing Machinery, 2010)
    Natural language is prevalent in requirements documents. However, ambiguity is an intrinsic phenomenon of natural language, and is therefore present in all such documents. Ambiguity occurs when a sentence can be interpreted ...
  • Price, Blaine A.; Mancini, Clara; Rogers, Yvonne; Bandara, Arosha K.; Coe, Tony; Joinson, Adam N.; Lay, Jeffrey; Nuseibeh, Bashar (Association for Computing Machinery, 2010)
    How can we best explore the range of users’ reactions when developing future technologies that may be controversial, such as personal healthcare systems? Our approach in ContraVision uses futuristic videos, or other narrative ...
  • Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo; Willis, Alistair; Nuseibeh, Bashar (IEEE Computer Society, 2010)
    This paper presents an approach to automatically identify potentially nocuous ambiguities, which occur when text is interpreted differently by different readers of requirements written in natural language. We extract a set ...
  • Yang, Hui; Willis, Alistair; De Roeck, Anne; Nuseibeh, Bashar (Libertas Academica, 2012)
    We describe the Open University team’s submission to the 2011 i2b2/VA/Cincinnati Medical Natural Language Processing Challenge, Track 2 Shared Task for sentiment analysis in suicide notes. This Shared Task focused on the ...
  • Mancini, Clara; Rogers, Yvonne; Thomas, Keerthi; Joinson, Adam N.; Price, Blaine A.; Bandara, Arosha K.; Jedrzejczyk, Lukasz; Nuseibeh, Bashar (Association for Computing Machinery, 2011)
    A growing body of research has been exploring the use of control mechanisms to address the privacy concerns raised by location-tracking technology. We report on a qualitative study of two family groups who used a custom-built ...
  • Rafiq, Yasmin; Dickins, Luke; Russo, Alessandra; Bandara, Arosha K.; Yang, Mu; Stuart, Avelie; Levine, Mark; Calikli, Gul; Price, Blaine A.; Nuseibeh, Bashar (Assocation for Computing Machinery, 2017)
    Some online social networks (OSNs) allow users to define friendship-groups as reusable shortcuts for sharing information with multiple contacts. Posting exclusively to a friendship-group gives some privacy control, while ...
  • Price, Blaine A.; Stuart, Avelie; Calikli, Gul; McCormick, Ciaran; Mehta, Vikram; Hutton, Luke; Bandara, Arosha K.; Levine, Mark; Nuseibeh, Bashar (Association for Computing Machinery, 2017)
    Low cost digital cameras in smartphones and wearable devices make it easy for people to automatically capture and share images as a visual lifelog. Having been inspired by a US campus based study that explored individual ...
  • Benats, Guillaume; Bandara, Arosha K.; Yu, Yijun; Colin, Jean-Noel; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    The rapid growth of mobile applications has imposed new threats to privacy: users often nd it challenging to ensure that their privacy policies are consistent with the requirements of a diverse range of of mobile ...
  • Calikli, Gul; Law, Mark; Bandara, Arosha K.; Russo, Alessandra; Dickens, Luke; Price, Blaine A.; Stuart, Avelie; Levine, Mark; Nuseibeh, Bashar (Association for Computing Machinery, 2016)
    Privacy violations in online social networks (OSNs) often arise as a result of users sharing information with unintended audiences. One reason for this is that, although OSN capa- bilities for creating and managing ...
  • Mehta, Vikram; Price, Blaine A.; Bandara, Arosha K.; Nuseibeh, Bashar (Association for Computing Machinery, 2016)
    In the age of ubiquitous computing increasing amounts of personal data are being logged and shared, making privacy management a challenging task that must be integrated into our daily lives. In this paper, we explore the ...
  • Bowes, David; Hall, Tracy; Beecham, Sarah (Association for Computing Machinery, 2012)
    Background: Systematic literature reviews are increasingly used in software engineering. Most systematic literature reviews require several hundred papers to be examined and assessed. This is not a trivial task and can ...
  • Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo; Willis, Alistair; Nuseibeh, Bashar (IEEE Computer Society, 2012)
    Stakeholders frequently use speculative language when they need to convey their requirements with some degree of uncertainty. Due to the intrinsic vagueness of speculative language, speculative requirements risk being ...
  • Pasquale, Liliana; Alrajeh, Dalal; Peersman, Claudia; Nuseibeh, Bashar; Rashid, Awais (Association for Computing Machinery, 2018)
    As software becomes more ubiquitous, and the risk of cyber-crimes increases, ensuring that software systems are forensic-ready (i.e., capable of supporting potential digital investigations) is critical. However, little ...
  • Mehta, Vikram; Price, Blaine A.; Bandara, Arosha K.; Nuseibeh, Bashar (Association for Computing Machinery, 2016)
    Physical or bodily privacy is an innate need that drives a variety of human behaviours. However, in a highly dynamic, crowded and context dependent world with rapidly changing technology, other humans or technological ...

Search ULIR


Browse

My Account

Statistics