Now showing items 1-20 of 52

    • Analysis of free haven anonymous storage and publication system 

      Mirembe, Drake Patrick; Otto, Francis (Fountain publishers, Kampala, 2007)
      In this paper we evaluate the design of a distributed anonymous storage and publication system that is meant to resist even attacks of most powerful adversaries like the government. We present a discussion of whether the ...
    • A Comparison of Service Oriented Architecture with other advances in Software Architectures 

      Kanagwa, Benjamin; Mugisa, Ezra K. (Fountain Publishers Kampala, 2007)
      Service Oriented Architecture (SOA) allows software systems to possess desirable architecture attributes such as loose coupling, platform independence, inter-operability, reusability, agility and so on. Despite its wide ...
    • Complexity and Risk in IS Projects 

      Ssemaluulu, Paul; Ddembe, Williams (Fountain Publishers Kampala, 2007)
      Fountain Publishers Kampala Abstract: In spite of ongoing research on IS risks and the increased sophistication of the tools and techniques developed, IS risks continue to be a challenge to IS professionals and managers. ...
    • Computational analysis of Kinyarwanda morphology : the morphological alternations. 

      Muhirwe, Jackson (Fountain Publishers kampala, 2007)
      For more than 30 years, there have been renewed interests in computational morphology resulting in numerous morphological tools. However the interest has always been on the politically and economically interesting languages ...
    • Computational Identification of Transposable Elements in the Mouse Genome 

      Jjingo, Daudi; Makalowski, Wojciech (Fountain Publisher Kampala, 2007)
      Repeat sequences cover about 39 percent of the mouse genome and completion of sequencing of the mouse genome [1] has enabled extensive research on the role of repeat sequences in mammalian genomics. This research covers ...
    • Computational resource optimization in Ugandan Tertiary Institutions 

      Ssekibuule, Richard; Lakuma, Joel; Ngubiri, John (Fountain Publishers, 2007)
      Insufficient computational power, caused by limited budgets is a big challenge to high quality research and education in developing countries. Some institutions suffer acute shortages while others enjoy comparatively more ...
    • Computational resource optimization in Ugandan tertiary institutions 

      Ssekibuule, Richard; Lakuma, Joel; Ngubiri, John (Fountain Publishers Kampala, 2007)
      Insufficient computational power, caused by limited budgets is a big challenge to high quality research and education in developing countries. Some institutions suffer severe shortages while others enjoy comparatively ...
    • Conceptual ICT tool for Sustainable development :The Community development Index (CDI) 

      Wafula, Joseph Muliaro; Rodrigues, Anthony J; Wanjohi, Nick G (Fountain Publishers Kampala, 2007)
      As part of the shift from society to the community as the object of rule, disembodiment of expertise knowledge especially into ICT tools is crucial in empowering people to manage their lives. It also enables people to adopt ...
    • Decision support systems 

      Wanyama, Tom; Lumala, Agnes F. N. (Fountain Publishers Kampala, 2007)
      Commercial-Off-The-Shelf (COTS)-Based Software Development (CBSD) has the potential to reduce time and resources required to develop software. However, In order to realize the benefits, which COTS bring to software ...
    • The Deployment of an e-commerce platform and related rrojects in a rural area in South Africa 

      Dalvit, Lorenzo; Muyingi, Hyppolite; Terzoli, Alfredo; Thinyane, Mamello (Fountain Publishers Kampala, 2007)
      In our paper we describe the development and deployment of an eCommerce platform in Dwesa, a rural area in the former homeland of Transkei in South Africa. The system is designed to promote tourism and advertise local ...
    • Design space exploration of network on chip:a system level approach 

      Mahanti*, P.; Jana**, Rabindra Ku (Fountain Publishers Kampala, 2007)
      In this paper, we have proposed a model for design space exploration of a mesh based Network on Chip architecture at system level. The main aim of the paper is, to find the topological mapping of intellectual properties ...
    • The diminishing private network security perimeter defense 

      Kizza, Prof. Joseph M. (Fountain publishers kampala, 2007)
      It is difficult to believe that just a few years ago, no one would worry about the security of a computer or a computer network for that matter. Computer security literally meant protecting your computer from thieves. Then ...
    • Does interactive learning enhance education: for whom, in what ways and in which contexts? 

      Rodrigues, Anthony J. (Fountain Publishers, Kampala, 2007)
      To get a balanced view, we review the body of research during the past three decades that has investigated interactive learning in a variety of forms ranging from the earliest days of mainframe-based computer-assisted ...
    • E-government for Uganda: challenges and opportunities 

      Rwangoga, Narcis T.; Baryayetunga, Asiime Patience (Fountain Publishers kampala, 2007)
      The government of Uganda drew an e-government strategy aimed at changing the design operation and culture of the public sector to better respond to the needs of Ugandans. Some flagship programmes were included in the ...
    • The educational use of mobile communication devices 

      Muyinda, Paul Birevu; Mugisa, Ezra; Lynch, Kathy (Fountain Publishers Kampala, 2007)
      This is a position paper which explores the use of mobile communication devices in teaching and learning. We especially undertake a crosswalk around the fast evolving field of mobile learning with a view of positioning it ...
    • The effect of information literacy on the utilization of electronic information resources in selected academic and research institutions in Uganda 

      Kinengyere, Alison Annet (Emerald, 2007)
      Purpose – Uganda has gone a step forward in ensuring that information resources available for researchers and students are maximally utilized. Academic and research libraries are participating in supporting and achieving ...
    • Efficient IP lookup algorithm 

      Poornaselvan1, K.J.; Suresh, S; Preya, C.Divya; Gayathri, C.G. (Fountain Publishers Kampala, 2007)
      The rapid growth of traffic in the Internet, backbone links of several gigabits per second are commonly deployed. To handle gigabit-per-second traffic rates, the backbone routers must be able to forward millions of ...
    • Enhancing immunisation healthcare delivery through the use of Information communication technologies 

      Rwashana, Agnes Semwanga; Williams, Ddembe Willeese (Fountain publishers kampala, 2007)
      The role that Information Communication Technologies plays in improving the efficiencies and effectiveness of healthcare delivery and particularly immunization coverage through the use of information and communications ...
    • An Evaluation Study of Data Transport Protocols for e-VLBI 

      Sansa, Julianne (Fountain publishers kampala, 2007)
      This paper compares TCP-like data transport algorithms in the light of e-VLBI requirements and proposes HTCP with bandwidth estimation (HTCP-BE) as a suitable candidate by simulating its behaviour in comparison with seven ...
    • Extraction of interesting association rules using genetic algorithms 

      Wakabi-Waiswa, Peter P.; Baryamureeba, Venansius (Fountain Publishers, Kampala, 2007)
      The process of discovering interesting and unexpected rules from large data sets is known as association rule mining. The typical approach is to make strong simplifying assumptions about the form of the rules, and limit ...