Now showing items 41-60 of 64

    • Code Authorship and Fault-proneness of Open-Source Android Applications : An Empirical Study 

      Businge, John; Kawuma, Simon; Bainomugisha, Engineer (International Conference on Predictive Models and Data Analytics in Software Engineering, 2020-08-28)
      Context: In recent years, many research studies have shown how human factors play a significant role in the quality of software components. Code authorship metrics have been introduced to establish a chain of responsibility ...
    • Eclipse API usage: the good and the bad 

      Businge, John; Serebrenik, Alexander; Brand, Mark G. J. van den (Software Quality Journal, 2013-10-01)
      Today, when constructing software systems, many developers build their systems on top of frameworks. Eclipse is such a framework that has been in existence for over a decade. Like many other evolving software systems, the ...
    • How Stable Are Eclipse Application Framework Internal Interfaces? 

      Businge, John; Kawuma, Simon; Openja, Moses; Bainomugisha, Engineer; Serebrenik, Alexander (In 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER) (pp. 117-127). IEEE., 2019)
      Eclipse framework provides two interfaces: stable interfaces (APIs) and unstable interfaces (non-APIs). Despite the non-APIs being discouraged and unsupported, their usage is not uncommon. Previous studies showed that ...
    • Survival of Eclipse Third-party Plug-ins 

      Businge, John; Serebrenik, Alexander; Brand, Mark van den (International Conference on Software Maintenance (ICSM), 2012)
      Today numerous software systems are being developed on top of frameworks. In this study, we analyzed the survival of 467 Eclipse third-party plug-ins altogether having 1,447 versions. We classify these plug-ins into two ...
    • Combined Feature Level and Score Level Fusion Gabor Filter-Based Multiple Enrollment Fingerprint Recognition 

      Kaggwa, Fred; Ngubiri, John; Tushabe, Florence (International conference on Signal Processing, Communication, Power and Embedded System, 2016)
      Minutiae-based fingerprint matching methods suffer difficulty in automatically extracting all minutiae points due to failure to detect the complete ridge structures of a fingerprint, as well as describing all the local ...
    • An Empirical Study of the Evolution of Eclipse Third-party Plug-ins 

      Businge, John; Serebrenik, Alexander; Brand, Mark van den (International Workshop on Principles of Software Evolution (IWPSE), 2010-09)
      Since the inception of Lehman's software evolution laws in the early 1970s, they have attracted significant attention from the research community. However, to our knowledge, no study of applicability of these laws on the ...
    • A review of privacy and usability issues in mobile health systems: Role of external factors 

      Katusiime, Jane; Pinkwart, Niels (Health Informatics Journal, 2019)
      The increased penetration of mobile devices has created opportunities in the health sector and led to emerging of mobile health systems. As much as the mobile health systems have registered tremendous progress, they have ...
    • Survey of Crowd Detection Algorithms using Wireless Sensor Networks: A Case of People Crowds 

      Aggrey, Obbo; Evarist, Nabaasa (International Journal of Computer Applications, 2019-01)
      In this paper a survey is carried out on crowd detection algorithms, highlighting challenges and gaps vis-a-avis people crowd detection. The research identifies some of the key capabilities considered invaluable in effective ...
    • Types and priorities of multi-agent system interactions 

      Ngobye, Martin; Groot, Wouter T. de; Weide, Theo P. van der (Interdisciplinary Description of Complex Systems, 2010-06-30)
      Multi-Agent Systems may be classified as containing No Direct Interactions, Simple Interactions or Complex, Conditional Interactions between agents. This paper argues and illustrates that models with simple interactions, ...
    • Tools, Architectures and Techniques for Monitoring Energy Efficiency in Computer Networks: State of the Art Survey 

      Businge, John; Mugonza, Robert; Mwavu, Rogers (International Journal of Computer Applications, 2016)
      Energy efficiency in data center networks is increasingly becoming a gold standard for implementers. Energy costs are becoming high while performance is highly demanded. And while efforts are directed to the design of ...
    • Organisational Factors and Adoption of the Unified Identification System (UIDS) Among Government Ministries, Departments and Agencies (MDAs) In Uganda. 

      Mpangwire, Violah; Ejiri, Annabella Habinka; Kaggwa, Fred (American Journal of Information, Data and Knowledge Management, 2020)
      Purpose: The study aimed at establishing the relationship between organizational factors and UID system's adoption among MDAs in Uganda. Methodology: A positivist paradigm and cross-section design were adopted with a ...
    • Investigating the Adoption of an Integrated Hospital Information System in Rural Uganda: A Case of Kisiizi Hospital 

      Baryashaba, Amos; Musimenta, Angella; Mugisha, Samuel; Binamungu, Leonard Peter (IFIP International Federation for Information Processing, 2019)
      Electronic Medical Records (EMRs) have been proposed to improve the quality of services in healthcare organisations. However, sometimes, the design contexts of these systems tend to be different from the use contexts. This ...
    • Identification of promoted eclipse Unstable interfaces using clone Detection technique 

      Kawuma, Simon; Nabaasa, Evarist (International Journal of Software Engineering & Applications (IJSEA), 2018-09)
      The Eclipse framework is a popular and widely used framework that has been evolving for over a decade. The framework provides both stable interfaces (APIs) and unstable interfaces (non-APIs). Despite being discouraged by ...
    • Gabor Filter-based Multiple Enrollment Fingerprint Recognition 

      Kaggwa, Fred; Ngubiri, John; Tushabe, Florence (International Journal of Computer Applications, 2016-04)
      Minutiae-based matching techniques have been widely used in the implementation of multiple enrollment fingerprint recognition systems. However, these techniques suffer the difficulty of automatically extracting all minutiae ...
    • Evaluation of Multiple Enrollment for Fingerprint Recognition. 

      Kaggwa, Fred; Ngubiri, John; Tushabe, Florence (Global Summit on Computer & Information Technology, 2014)
      Abstract— Fusion of multiple impressions resulting from multiple fingerprint enrollments is one of the ways often used to improve fingerprint recognition performance. In this research, we perform an evaluation of the ...
    • An Approach for Agent-Based Modeling Using AiC+ 

      Ngobye, Martin; Kanagwa, Benjamin; WEIDE, THEO VAN DER; Groot, Wouter T. DE (International Journal of Computing and ICT Research., 2011-12)
      In this paper, we present AiC+, an extension of the AiC framework designed for the explanation of human actions especially in the environmental field. We use first order logics to describe the semantics used to explain the ...
    • A Survey on Algorithms for Limited Resources Optimization and Utilization by Games on Smartphones. 

      Natumanya, Deborah; Evarist, Nabaasa; Robert, Mugonza (International Journal of Computer Applications, 2016-06)
      Smartphones have been characterized by their limited computational resources such as battery life, processor performance and storage capacity. The above mentioned limitations can be overcome by utilizing mobile cloud ...
    • A health research collaboration cloud Architecture. 

      Robert, Mugonza; Annabella, Basaza-Ejiri. H. (International Journal on Cloud Computing: Services and Architecture., 2018-10-21)
      Cloud computing platforms used for research collaborations within public health domains are limited in terms of how service components are organized and provisioned. This challenge is intensified by platform level challenges ...
    • Towards University Semester and Examinations Regulations Model Verification 

      Katushabe, Calorine; Nabaasa, Evarist; Nyanzi, Abubaker (International Journal of Computer Applications, 2016)
      This paper reviewed the Mbarara University of Science and Technology semester and examinations regulations handbook and diagrammatically identified a number of flaws in the model. The next phase of this research is to ...
    • Survey of Crowd Detection Algorithms using Wireless Sensor Networks 

      Obbo, Aggrey; Nabaasa, Evarist (International Journal of Computer Applications, 2019)
      In this paper a survey is carried out on crowd detection algorithms, highlighting challenges and gaps vis-a-avis people crowd detection. The research identifies some of the key capabilities considered invaluable in ...