Skip to main content

Research Repository

Advanced Search

Outputs (26)

Using extreme characters to teach requirements engineering. (2017)
Conference Proceeding
IACOB, C. and FAILY, S. 2017. Using extreme characters to teach requirements engineering. In Washizaki, H. and Mead, N. (eds.) Proceedings of the 30th IEEE conference on software engineering education and training (CSEET 2017), 7-9 November 2017, Savannah, USA. Los Alamitos: IEEE Computer Society [online], pages 107-111. Available from: https://doi.org/10.1109/CSEET.2017.25

One of the main challenges in teaching Software Engineering as an undergraduate course is making the need for software processes and documentation obvious. Armed with some knowledge of programming, students may feel inclined to skip any development p... Read More about Using extreme characters to teach requirements engineering..

Predicting service levels using neural networks. (2017)
Conference Proceeding
AINSLIE, R., MCCALL, J., SHAKYA, S. and OWUSU, G. 2017. Predicting service levels using neural networks. In Bramer, M. and Petridis, M. (eds.) Artificial intelliegence XXXIV: proceedings of the 37th SGAI International innovative techniques and applications of artifical intelligence conference 2017 (AI 2017), 12-14 December 2017, Cambridge, UK. Lecture notes in computer science, 10630. Cham: Springer [online], pages 411-416. Available from: https://doi.org/10.1007/978-3-319-71078-5_35

In this paper we present a method to predict service levels in utility companies, giving them advanced visibility of expected service outcomes and helping them to ensure adherence to service level agreements made to their clients. Service level adher... Read More about Predicting service levels using neural networks..

Towards computational dialogue types for BIM collaborative design: an initial study. (2017)
Conference Proceeding
TONIOLO, A. and LEON, M. 2017. Towards computational dialogue types for BIM collaborative design: an initial study. In Bistarelli, S., Giacomin, M. and Pazienza, A. (eds.) Proceedings of the 1st Workshop on advances in argumentation in artificial intelligence (AI^3 2017), 16-17 November 2017, Bari, Italy. CEUR workshop proceedings, 2012. Aachen: CEUR-WS [online], session 3: dialogues, real world arguments and applications, pages 79-84. Available from: http://ceur-ws.org/Vol-2012/AI3-2017_paper_8.pdf

Collaborative design is an iterative process of selecting and evaluating solutions under potentially conflicting requirements, a concept central to Building Information Modelling (BIM) implementation. Previous research has shown that design can be be... Read More about Towards computational dialogue types for BIM collaborative design: an initial study..

Goal models for acceptance requirements analysis and gamification design. (2017)
Conference Proceeding
PIRAS, L., PAJA, E., GIORGINI, P. and MYLOPOULOS, J. 2017. Goal models for acceptance requirements analysis and gamification design. In Mayr, H.C., Guizzardi, G., Ma, H. and Pastor, O. (eds.) Conceptual modeling: proceedings of 36th Conceptual modeling international conference 2017 (ER 2017), 6-9 November 2017, Valencia, Spain. Lecture notes in computer science, 10650. Cham: Springer [online], pages 223-230. Available from: https://doi.org/10.1007/978-3-319-69904-2_18

The success of software systems highly depends on user engagement. Thus, to deliver engaging systems, software has to be designed carefully taking into account Acceptance Requirements, such as '70% of users will use the system', and the psychological... Read More about Goal models for acceptance requirements analysis and gamification design..

Design as code: facilitating collaboration between usability and security engineers using CAIRIS. (2017)
Conference Proceeding
FAILY, S. and IACOB, C. 2017. Design as code: facilitating collaboration between usability and security engineers using CAIRIS. In Proceedings of the 4th Workshop on evolving security and privacy requirements engineering (ESPRE 2017), part of the 25th IEEE international requirements engineering conference workshops (REW 2017), 4-8 September 2017, Lisbon, Portugal. Los Alamitos: IEEE Computer Society [online], pages 76-82. Available from: https://doi.org/10.1109/REW.2017.23

Designing usable and secure software is hard without tool-support. Given the importance of requirements, CAIRIS was designed to illustrate the form tool-support for specifying usable and secure systems might take. While CAIRIS supports a broad range... Read More about Design as code: facilitating collaboration between usability and security engineers using CAIRIS..

From requirements to operation: components for risk assessment in a pervasive system of systems. (2017)
Conference Proceeding
KI-ARIES, D., DOGAN, H., FAILY, S., WHITTINGTON, P. and WILLIAMS, C. 2017. From requirements to operation: components for risk assessment in a pervasive system of systems. In Proceedings of the 4th Workshop on evolving security and privacy requirements engineering (ESPRE 2017), part of the 25th IEEE international requirements engineering conference workshops (REW 2017), 4-8 September 2017, Lisbon, Portugal. Los Alamitos: IEEE Computer Society [online], pages 83-89. Available from: https://doi.org/10.1109/REW.2017.36

Framing Internet of Things (IoT) applications as a System of Systems (SoS) can help us make sense of complexity associated with interoperability and emergence. However, assessing the risk of SoSs is a challenge due to the independence of component sy... Read More about From requirements to operation: components for risk assessment in a pervasive system of systems..

Managing information security risk using integrated governance risk and compliance. (2017)
Conference Proceeding
NICHO, M., KHAN, S. and RAHMAN, M.S.M.K. 2017. Managing information security risk using integrated governance risk and compliance. In Proceedings of the 2017 International conference on computer and applications (ICCA 2017), 6-7 September 2017, Dubai, UAE. New York: IEEE [online], article number pages 8079741, 56-66. Available from: https://doi.org/10.1109/COMAPP.2017.8079741

This paper aims to demonstrate the building blocks of an IT Governance Risk and Compliance (IT GRC) model as well the phased stages of the optimal integration of IT GRC frameworks, standards and model through a longitudinal study. A qualitative longi... Read More about Managing information security risk using integrated governance risk and compliance..

Taxonomic corpus-based concept summary generation for document annotation. (2017)
Conference Proceeding
NKISI-ORJI, I., WIRATUNGA, N., HUI, K.-Y., HEAVEN, R. and MASSIE, S. 2017. Taxonomic corpus-based concept summary generation for document annotation. In Kampus, J., Tsakonas, G., Manolopoulos, Y., Iliadis, L. and Karydis, I. (eds.) Proceedings of the 21st International conference on theory and practice of digital libraries (TPDL 2017): research and advanced technology for digital libraries, 18-21 September 2017, Thessaloniki, Greece. Lecture notes in computer science, 10450. Cham: Springer [online], pages 49-60. Available from: https://doi.org/10.1007/978-3-319-67008-9_5

Semantic annotation is an enabling technology which links documents to concepts that unambiguously describe their content. Annotation improves access to document contents for both humans and software agents. However, the annotation process is a chall... Read More about Taxonomic corpus-based concept summary generation for document annotation..

Lexicon induction for interpretable text classification. (2017)
Conference Proceeding
CLOS, J. and WIRATUNGA, N. 2017. Lexicon induction for interpretable text classification. In Kampus, J., Tsakonas, G., Manolopoulos, Y., Iliadis, L. and Karydis, I. (eds.) Proceedings of the 21st International conference on theory and practice of digital libraries (TPDL 2017): research and advanced technology for digital libraries, 18-21 September 2017, Thessaloniki, Greece. Lecture notes in computer science, 10450. Cham: Springer [online], pages 498-510. Available from: https://doi.org/10.1007/978-3-319-67008-9_39

The automated classification of text documents is an active research challenge in document-oriented information systems, helping users browse massive amounts of data, detecting likely authors of unsigned work, or analyzing large corpora along predefi... Read More about Lexicon induction for interpretable text classification..

Quick response code secure: a cryptographically secure anti-phishing tool for QR code attacks. (2017)
Conference Proceeding
MAVROEIDIS, V. and NICHO, M. 2017. Quick response code secure: a cryptographically secure anti-phishing tool for QR code attacks. In Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V. and Szczypiorski, K. (eds.) Computer network security: Proceedings of the 7th International Mathematical methods, models and architectures for computer network security conference (MMM-ACNS 2017), 28-30 August 2017, Warsaw, Poland. Lecture notes in computer science, 10466. Cham: Springer [online], pages 313-324. Available from: https://doi.org/10.1007/978-3-319-65127-9_25

The two-dimensional quick response (QR) codes can be misleading due to the difficulty in differentiating a genuine QR code from a malicious one. Since, the vulnerability is practically part of their design, scanning a malicious QR code can direct the... Read More about Quick response code secure: a cryptographically secure anti-phishing tool for QR code attacks..