University of Limerick Institutional Repository

Browsing LERO - Project partner authors by Title

DSpace Repository

Browsing LERO - Project partner authors by Title

Sort by: Order: Results:

  • Dobson, Simon (IEEE Computer Society, 2008)
    While it is desirable for all computing and communications systems to have well-defined and verifiable behaviour, autonomic systems must additionally guarantee that their adaptive behaviour is correct, both in the sense ...
  • Campbell, Abey; Collier, Rem W.; Dragone, Mauro; Görgü, Levent; Holz, Thomas; O'Grady, Michael J; O'Hare, G.M.P.; Sassu, Antoella; Stafford, John (Springer, 2012)
    Facilitating intuitive interaction is a prerequisite for the ubiquitous computing paradigm in all its manifestations. How to achieve such interaction in practice remains an open question. Such interfaces must be perceived ...
  • Morgan, Lorraine; Conboy, Kieran (2013)
    While it is widely acknowledged that cloud computing has the potential to transform a large part of the IT industry, issues surrounding the adoption of cloud computing have received relatively little attention. Drawing on ...
  • Li, Xi; Ventresque, Anthony; Murphy, John; Thorburn, James (IEEE Computer Society, 2014)
    Data center optimization, mainly through virtual machine (VM) placement, has received considerable attention in the past years. A lot of heuristics have been proposed to give quick and reasonably good solutions to this ...
  • Djahel, Soufiene; Zhang, Zonghua; Naït-Abdesselam, Farid; Murphy, John (IEEE Computer Society, 2012)
    In this paper, we deal with backoff cheating technique in IEEE802.11 based MANETs and propose a novel scheme, dubbed HsF-MAC (Hash Function based MAC protocol), to cope with it. In contrast to the existing solutions, ...
  • Cleary, Jimmy; Callanan, Owen; Purcell, Mark; Gregg, David (Association for Computing Machinery, 2013)
    For most multi-threaded applications, data structures must be shared between threads. Ensuring thread safety on these data structures incurs overhead in the form of locking and other synchronization mechanisms. Where data ...
  • Kroll, Josiane; Prikladnicki, Rafael; Audy, Jorge L.N.; Carmel, Erran; Fernandez, Jude (2013)
    Follow-the-sun (FTS) is a strategy for Global Software Development (GSD) where you hand off work at the end of every day from one site to the next, many time zones away, in order to speed up product development. Companies ...
  • Dobson, Simon; Bailey, Eoin; Knox, Stephen; Shannon, Ross; Quigley, Aaron; SFI (IEEE Computer Society, 2007)
    Control systems must increasingly be designed to involve collections of hardware and software components, both of which may evolve over the lifetime of the system, and which are expected to provide self-managing, adaptive, ...
  • McHugh, Fearghal; Acton, Thomas (Center for Innovations in Business & Management Practice (CIBMP), 2012)
    The fast, unstructured and turbulent nature of decision making in agile software development (ASD) teams at times necessitates software-based support tools (Dabrowski, Acton, Drury, Conboy, and Dabrowska, 2011). The demands ...
  • Buglione, Luigi; Mc Caffery, Fergal; Hauck, Jean Carlo R.; Gresse von Wangenheim, Christiane (Springer, 2012)
    One of the main challenges for ICT organizations is to initiate a well-structured process improvement program. This is particularly the case when adopting a maturity & capability model (MCM) as it brings with it costs ...
  • Asplund, Mikael; Manzoor, Atif; Bouroche, Mélanie; Clarke, Siobhán; Cahill, Vinny (Springer, 2012)
    Increasing demands on safety and energy e ciency will re- quire higher levels of automation in transportation systems. This in- volves dealing with safety-critical distributed coordination. In this paper we demonstrate ...
  • Bresciani, Riccardo; Butterfield, Andrew (IEEE Computer Society, 2009)
    When some agents want to communicate through a media stream (for example voice or video), the Real Time Protocol (RTP) is used. This protocol does not provide encryption, so it is necessary to use Secure RTP (SRTP) to ...
  • Popescu, Razvan; Staikopoulos, Athanasios; Brogi, Antonio; Liu, Peng; Clarke, Siobhán (Association for Computing Machinery, 2012)
    Advances in pervasive technology have made it possible to consider large-scale application types that potentially span heterogeneous organisations, technologies and device types. This class of application will have a ...
  • Kiniry, Joseph R. (IEEE Computer Society, 2007)
    In this extended abstract we summarize our consulting work, scientific research, and activism in the topic of electronic (computer-based) voting. The Dutch and Irish government’s activities are our particular focus, as ...
  • Ahmad, Aakash; Jamshidi, Pooyan; Pahl, Claus (Association for Computing Machinery, 2013)
    Software systems continuously evolve as a consequence of frequent changes in their functional requirements and the environment surrounding them. Architecture-centric software evolution (ACSE) enables changes in software ...
  • Jamshidi, Pooyan; Ghafari, Mohammad; Ahmad, Aakash; Pahl, Claus (IEEE Computer Society, 2013)
    Context: Software systems are increasingly required to operate in an open world, characterized by continuous changes in the environment and in the prescribed requirements. Architecture-centric software evolution (ACSE) is ...
  • O'Neill, Susan; Conboy, Kieran; Morgan, Lorraine (IEEE Computer Society, 2011)
    The theme of this year’s ICIS conference focuses on connectivity and collaboration. In Information Systems Development (ISD) these concepts are increasingly important as developing effective information systems is rarely ...
  • Finnegan, Anita; Mc Caffery, Fergal; Coleman, Gerry (Springer, 2013)
    This paper introduces an assurance framework for networked medical device development. This work is being conducted to address the everincreasing concerns of medical device security with a specific focus on medical devices ...
  • Bresciani, Riccardo; Butterfield, Andrew (Springer, 2013)
    We have introduced probability in the UTP framework by using functions from the state space to real numbers, which we term distributions, that are embedded in the predicates describing the di er- ent program constructs. ...
  • Mancini, Clara; Thomas, Keerthi; Rogers, Yvonne; Price, Blaine A.; Jedrzejczyk, Lukasz; Bandara, Arosha K.; Joinson, Adam N.; Nuseibeh, Bashar (Association for Computing Machinery, 2009)
    Mobile privacy concerns are central to Ubicomp and yet remain poorly understood. We advocate a diversified approach, enabling the cross-interpretation of data from complementary methods. However, mobility imposes a number ...

Search ULIR


Browse

My Account

Statistics