University of Limerick Institutional Repository

Browsing LERO - Project partner authors by Title

DSpace Repository

Browsing LERO - Project partner authors by Title

Sort by: Order: Results:

  • Bresciani, Riccardo; Butterfield, Andrew (IEEE Computer Society, 2009)
    When some agents want to communicate through a media stream (for example voice or video), the Real Time Protocol (RTP) is used. This protocol does not provide encryption, so it is necessary to use Secure RTP (SRTP) to ...
  • Popescu, Razvan; Staikopoulos, Athanasios; Brogi, Antonio; Liu, Peng; Clarke, Siobhán (Association for Computing Machinery, 2012)
    Advances in pervasive technology have made it possible to consider large-scale application types that potentially span heterogeneous organisations, technologies and device types. This class of application will have a ...
  • Kiniry, Joseph R. (IEEE Computer Society, 2007)
    In this extended abstract we summarize our consulting work, scientific research, and activism in the topic of electronic (computer-based) voting. The Dutch and Irish government’s activities are our particular focus, as ...
  • Ahmad, Aakash; Jamshidi, Pooyan; Pahl, Claus (Association for Computing Machinery, 2013)
    Software systems continuously evolve as a consequence of frequent changes in their functional requirements and the environment surrounding them. Architecture-centric software evolution (ACSE) enables changes in software ...
  • Jamshidi, Pooyan; Ghafari, Mohammad; Ahmad, Aakash; Pahl, Claus (IEEE Computer Society, 2013)
    Context: Software systems are increasingly required to operate in an open world, characterized by continuous changes in the environment and in the prescribed requirements. Architecture-centric software evolution (ACSE) is ...
  • O'Neill, Susan; Conboy, Kieran; Morgan, Lorraine (IEEE Computer Society, 2011)
    The theme of this year’s ICIS conference focuses on connectivity and collaboration. In Information Systems Development (ISD) these concepts are increasingly important as developing effective information systems is rarely ...
  • Finnegan, Anita; Mc Caffery, Fergal; Coleman, Gerry (Springer, 2013)
    This paper introduces an assurance framework for networked medical device development. This work is being conducted to address the everincreasing concerns of medical device security with a specific focus on medical devices ...
  • Bresciani, Riccardo; Butterfield, Andrew (Springer, 2013)
    We have introduced probability in the UTP framework by using functions from the state space to real numbers, which we term distributions, that are embedded in the predicates describing the di er- ent program constructs. ...
  • Mancini, Clara; Thomas, Keerthi; Rogers, Yvonne; Price, Blaine A.; Jedrzejczyk, Lukasz; Bandara, Arosha K.; Joinson, Adam N.; Nuseibeh, Bashar (Association for Computing Machinery, 2009)
    Mobile privacy concerns are central to Ubicomp and yet remain poorly understood. We advocate a diversified approach, enabling the cross-interpretation of data from complementary methods. However, mobility imposes a number ...
  • Quinn, Anthony; Kárný, MIroslav; Guy, Tatiana V (Elsevier, 2016)
    The minimum cross-entropy principle is an established technique for design of an unknown distribution, processing linear functional constraints on the distribution. More generally, fully probabilistic design (FPD) chooses ...
  • Martinez, Josu; Dobson, Simon (2009)
    Autonomic computing aims to provide self-management and adaptation in the implementation of complex (large, heterogeneous, distributed) systems over time. Such adaptations must be stable, in the sense of maintaining the ...
  • Yilmez, Mert; Yilmaz, Murat; O'Connor, Rory V.; Clarke, Paul (Springer, 2016)
    Although there are various kinds of processes designed to manage the complexities of software development, it is still a challenging endeavor. Recently, a significant number of researchers have started to investigate ...
  • Dorling, Alec; Mc Caffery, Fergal (Springer, 2012)
    Abstract. Process Improvement has been used for decades as a means to become better and more efficient. Whilst many organizations have used considerable resources for process improvement, investments in process improvement ...
  • Ngoc-Nha, Vi Tran; McDonagh, Patrick; Murphy, John (2013)
    Acoustic data is a potential source for traffic monitoring due to its low-cost and the ease of deployment. In this paper, a case study of using acoustic monitoring as a source for transportation management purposes is ...
  • Saber, Takfarinas; Ventresque, Anthony; Gandibleux, Xavier; Murphy, Liam (Springer, 2014)
    Data centres are facilities with large amount of machines (i.e., servers) and hosted processes (e.g., virtual machines). Managers of data centres (e.g., operators, capital allocators, CRM) constantly try to optimise ...
  • Hamilton, Geoff W. (EPTCS, 2016)
    Counterexamples explain why a desired temporal logic property fails to hold. The generation of counterexamples is considered to be one of the primary advantages of model checking as a verification technique. Furthermore, ...
  • Buda, Teodora Sandra (Association for Computing Machinery, 2013)
    Populating the testing environment with relevant data represents a great challenge in software validation, generally requiring expert knowledge about the system under development, as its data critically impacts the ...
  • Nedos, Andronikos; Singh, Kulpreet; Cunningham, Raymond; Clarke, Siobhán (IEEE Computer Society, 2007)
    Service discovery in mobile ad hoc networks (MANETs) is an integral part for collective application interoperability. The discovery process must cope not only with transient communication but also with an environment where ...
  • Ahmad, Aakash; Jamshidi, Pooyan; Arshad, Muteer; Pahl, Claus (Association for Computing Machinery, 2012)
    Service architectures continuously evolve as a consequence of frequent business and technical change cycles. Architec- ture change log data represents a source of evolution-centric information in terms of intent, scope ...
  • Ahmad, Aakash; Jamshidi, Pooyan; Pahl, Claus (Springer, 2012)
    Service-based architectures have become commonplace, creating the need to address their systematic maintenance and evolution. We investigate architecture change representation, primarily focusing on the identification ...

Search ULIR


Browse

My Account

Statistics