University of Limerick Institutional Repository

Browsing LERO - UL authors by Author "ERC"

DSpace Repository

Browsing LERO - UL authors by Author "ERC"

Sort by: Order: Results:

  • Pasquale, Liliana; Hanvey, Sorren; Mcgloin, Mark; Nuseibeh, Bashar (Elsevier, 2016)
    The increase in crimes targeting the cloud is increasing the amount of data that must be analysed during a digital forensic investigation, exacerbating the problem of processing such data in a timely manner. Since collecting ...
  • Holmstrom Olsson, Helena; Fitzgerald, Brian; Agerfalk, Par J.; Ó Conchúir, Eoin (Taylor & Francis, 2006)
    This article explores how agile practices can reduce three kinds of “distance” — temporal, geographical,and sociocultural — in global software development (GSD). On the basis of two indepth case studies, specific Scrum and ...
  • Salifu, Mohammed; Yu, Yijun; Bandara, Arosha K.; Nuseibeh, Bashar (Elsevier, 2012)
    In the field of pervasive and ubiquitous computing, context-aware adaptive systems need to monitor changes in their environment in order to detect violations of requirements and switch their behaviour in order to continue ...
  • Carroll, Noel; Whelan, Eoin; Richardson, Ita (Robert Chi, 2010)
    The literature indicates that there is urgent need to address the significant gap in our ability to value the contributory interaction of service networks in organisational performance. This paper is primarily concerned ...
  • Carroll, Noel; Richardson, Ita; Whelan, Eoin (2010)
    The unprecedented growth in service-based business processes over a short period of time has underscored the need for understanding the mechanisms and theorising the business models and business process management adopted ...
  • Grispos, George; Garcia-Galan, Jesus; Pasquale, Liliana; Nuseibeh, Bashar (IEEE Computer Society, 2017)
    As security incidents continue to impact organisations, there is a growing demand for systems to be 'forensic-ready’ – to maximise the potential use of evidence whilst minimising the costs of an investigation. Researchers ...
  • Tsigkanos, Christos; Pasquale, Liliana; Ghezzi, Carlo; Nuseibeh, Bashar (IEEE Computer Society, 2015)
    This paper presents Ariadne, a tool for engineering topology aware adaptive security for cyber-physical systems. It allows security software engineers to model security requirements together with the topology of the ...
  • Hutton, Luke; Price, Blaine A.; Kelly, Ryan; McCormick, Ciaran; Bandara, Arosha K.; Hatzakis, Tally; Meadows, Maureen; Nuseibeh, Bashar (JMIR Publications, 2018)
    Background: The recent proliferation of self-tracking technologies has allowed individuals to generate significant quantities of data about their lifestyle. These data can be used to support health interventions and monitor ...
  • Yu, Yijun; Franqueira, Virginia N.L.; Tun, Thein Than; Wieringa, Roel J.; Nuseibeh, Bashar (Elsevier, 2015)
    Computer-based systems are increasingly being exposed to evolving security threats, which often reveal new vulnerabilities. A formal analysis of the evolving threats is difficult due to a number of practical considerations ...
  • Vassev, Emil; Hinchey, Mike (IEEE Computer Society, 2013)
    Contemporary robotics relies on the most recent advances in automation and robotic technologies to promote autonomy and autonomic computing principles to robotized systems. However, it appears that the design and implementation ...
  • Omoronyia, Inah; Pasquale, Liliana; Salehie, Mazeiar; Cavallaro, Luca; Doherty, Gavin; Nuseibeh, Bashar (Association for Computing Machinery, 2012)
    In a dynamic environment where context changes frequently, users’ privacy requirements can also change. To satisfy such changing requirements, there is a need for continuous analysis to discover new threats and possible ...
  • Vassev, Emil; Hinchey, Mike (Springer, 2016)
    Along with the traditional requirements, requirements engineering for autonomous and self-adaptive systems needs to address requirements related to adaptation issues, in particular: 1) what adaptations are possible; 2) ...
  • Elrakaiby, Yehia; Ferrari, Alessio; Mylopoulos, John (IEEE Computer Society, 2018)
    The requirements problem consists of transforming stakeholder requirements - however informal, ambiguous, conflicting, unattainable, imprecise and incomplete – into a consistent, complete and realizable specification ...
  • Chen, Lianping; Babar, Muhmmad Ali; Nuseibeh, Bashar (IEEE Computer Society, 2013)
    At the heart of any engineering discipline is the interplay between problem and solution development. In software engineering, the effectiveness of a software solution is determined with respect to a problem, yet the nature ...
  • Hashmi, Sajid Ibrahim; Richardson, Ita (2013)
    Outsourcing is an essential part of global software development and entails software development distributed across geographical borders. More specifically, it deals with software development teams dispersed across multiple ...
  • Hashmi, Sajid Ibrahim; Lane, Stephen; Karastoyanova, Dimka; Richardson, Ita (2010)
    Service Based Applications (SBAs) have highlighted new challenges related to Configuration Management (CM). This is an important process for the assurance of end to end quality in software systems. As far as the quality ...
  • Hashmi, Sajid Ibrahim; Ishikawa, Fuyuki; Richardson, Ita (Association for Computing Machinery, 2013)
    Globally distributed software development teams face problems with software development life cycle phases, as the distributed nature of each of these phases make it even more challenging to communicate between the stakeholders. ...
  • Borda, Aimee; Pasquale, Liliana; Koutavas, Vasileios; Nuseibeh, Bashar (Assocation for Computing Machinery, 2018)
    Cyber-Physical Systems (CPSs) must often self-adapt to respond to changes in their operating environment. However, using formal verification techniques to provide assurances that critical requirements are satisfied can ...
  • Peng, Xin; Gu, Jingxiao; Tan, Tian Huat; Yu, Yijun; Nuseibeh, Bashar; Zhao, Wenyun (Association for Computing Machinery, 2018)
    Some user needs can only be met by leveraging the capabilities of others to undertake particular tasks that require intelligence and labor. Crowdsourcing such capabilities is one way to achieve this. But providing a service ...
  • Peng, Xin; Gu, Jingxiao; Tan, Tian Huat; Sun, Jun; Ju, Yijun; Nuseibeh, Bashar; Zhao, Wenyun (IEEE Computer Society, 2016)
    Some user needs in real life can only be accomplished by lever-aging the intelligence and labor of other people via crowdsourcing tasks. For example, one may want to confirm the validity of the description of a secondhand ...

Search ULIR


Browse

My Account

Statistics