default search action
Fredrick Mtenzi
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j13]Ali Gohar Qazi, Fredrick Japhet Mtenzi:
The Conceptual Framing, Design, and Development of Mobile-Mediated Professional Development for Primary Mathematics Teachers. Int. J. Mob. Blended Learn. 15(2): 1-19 (2023)
2010 – 2019
- 2019
- [j12]Xinlu Li, Brian Keegan, Fredrick Mtenzi, Thomas Weise, Ming Tan:
Energy-Efficient Load Balancing Ant Based Routing Algorithm for Wireless Sensor Networks. IEEE Access 7: 113182-113196 (2019) - 2018
- [j11]Xinlu Li, Brian Keegan, Fredrick Mtenzi:
Energy Efficient Hybrid Routing Protocol Based on the Artificial Fish Swarm Algorithm and Ant Colony Optimisation for WSNs. Sensors 18(10): 3351 (2018) - 2017
- [c23]Catherine Higgins, Fredrick Mtenzi, Ciarán O'Leary, Orla Hanratty, Claire McAvinia:
A Software Development Process for Freshman Undergraduate Students. WCCE 2017: 599-608 - 2016
- [j10]Fredrick Japhet Mtenzi:
A New Educational Mobile Devices Platform for Social Inclusion in Tanzania. Int. J. ICT Res. Afr. Middle East 5(2): 49-58 (2016) - [c22]Ciarán O'Leary, Fred Mtenzi, Claire McAvinia:
Towards Reusable Personas for Everyday Design. CHI Extended Abstracts 2016: 2915-2922 - [c21]Ciarán O'Leary, Fred Mtenzi, Claire McAvinia:
Understanding the Everyday Designer in Organisations. DESRIST 2016: 114-130 - [c20]Dennis M. Lupiana, Fredrick Mtenzi:
KiCM: A knowledge-intensive context model. ICITST 2016: 223-229 - 2014
- [c19]Edina Hatunic-Webster, Fredrick Mtenzi, Brendan O'Shea:
Model for analysing Anti-Phishing Authentication Ceremonies. ICITST 2014: 144-150 - 2013
- [j9]George S. Oreku, Fredrick Japhet Mtenzi, Ali Al-Dahoud:
A viewpoint of Tanzania e-commerce and implementation barriers. Comput. Sci. Inf. Syst. 10(1): 263-281 (2013) - [c18]Ngonidzashe Zanamwe, Kudakwashe Dube, Jasmine S. Thomson, Fredrick Japhet Mtenzi, Gilford T. Hapanyengwi:
Characterisation of Knowledge Incorporation into Solution Models for the Meal Planning Problem. FHIES 2013: 254-273 - [c17]Heather Brotherton, J. Eric Dietz, John McGrory, Fredrick Mtenzi:
Energy overhead of the graphical user interface in server operating systems. SIGUCCS 2013: 65-68 - 2012
- [c16]Jason Flood, Mark Denihan, Anthony Keane, Fredrick Mtenzi:
Black hat training of white hat resources: The future of security is gaming. ICITST 2012: 488-491 - 2010
- [b1]Charles A. Shoniregun, Kudakwashe Dube, Fredrick Mtenzi:
Electronic Healthcare Information Security. Advances in Information Security 53, Springer 2010, ISBN 978-0-387-84817-4, pp. 1-183 - [j8]Michael Gleeson, David Markey, Fredrick Mtenzi:
V-isoNet: A Virtualised and Isolated Network using Open Source Technologies. J. Digit. Inf. Manag. 8(2): 95-100 (2010) - [c15]Said Jafari, Fredrick Mtenzi, Ciaran O'Driscoll, Ronan Fitzpatrick, Brendan O'Shea:
Privacy metrics in ubiquitous computing applications. ICITST 2010: 1-2 - [c14]Dennis M. Lupiana, Fredrick Mtenzi, Ciaran O'Driscoll, Brendan O'Shea:
Strictly alphanumeric data: Improving privacy in smart environments. ICITST 2010: 1-3 - [c13]Conor Mc Manamon, Fredrick Mtenzi:
Defending privacy: The development and deployment of a darknet. ICITST 2010: 1-6 - [c12]Zanifa Omary, Fredrick Mtenzi, Bing Wu, Ciaran O'Driscoll:
Accessing sensitive patient information in ubiquitous healthcare systems. ICITST 2010: 1-3 - [c11]Bossi Masamila, Fredrick Mtenzi, Said Jafari, Rose Tinabo:
A Secured Mobile Payment Model for Developing Markets. NDT (1) 2010: 175-182
2000 – 2009
- 2009
- [j7]George S. Oreku, Jianzhong Li, Fredrick Mtenzi:
Language based information routing security: policy enforcement. Int. Arab J. Inf. Technol. 6(1): 91-98 (2009) - [j6]Rose Tinabo, Fredrick Mtenzi, Ciaran O'Driscoll, Brendan O'Shea:
Multiple Anonymisation Techniques can balance Data Usefulness and 218Protection of Personal Identifiable Information (PII). Int. J. Web Appl. 1(4): 218-227 (2009) - [j5]Dennis M. Lupiana, Ciaran O'Driscoll, Fredrick Mtenzi:
Characterising Ubiquitous Computing Environments. Int. J. Web Appl. 1(4): 253-262 (2009) - [j4]George S. Oreku, Jianzhong Li, Kimutai Kimeli, Fredrick Mtenzi:
State of Tanzania e-readiness and e-commerce: Overview. Inf. Technol. Dev. 15(4): 302-311 (2009) - [c10]George S. Oreku, Fredrick Japhet Mtenzi:
Intrusion Detection Based on Data Mining. DASC 2009: 696-701 - [c9]George S. Oreku, Fredrick Mtenzi:
Using Nature to Best Clarify Computer Security and Threats. DASC 2009: 702-707 - [c8]Said Jafari, Fredrick Mtenzi, Ronan Fitzpatrick, Brendan O'Shea:
An approach for developing comparative security metrics for healthcare organizations. ICITST 2009: 1-6 - [c7]Zanifa Omary, Fredrick Mtenzi:
Dataset threshold for the performance estimators in supervised machine learning experiments. ICITST 2009: 1-8 - [c6]Zanifa Omary, Fredrick Mtenzi, Bing Wu:
How does politics affect electronic healthcare adoption. ICITST 2009: 1-8 - [c5]Rose Tinabo, Fredrick Mtenzi, Brendan O'Shea:
Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data. ICITST 2009: 1-6 - 2008
- [c4]Ciaran O'Driscoll, Daniel MacCormac, Mark Deegan, Fredrick Mtenzi, Brendan O'Shea:
RFID: An Ideal Technology for Ubiquitous Computing?. UIC 2008: 490-504 - 2007
- [c3]Daniel MacCormac, Mark Deegan, Fredrick Mtenzi, Brendan O'Shea:
A Thin Client Approach to Supporting Adaptive Session Mobility. GPC 2007: 694-701 - [c2]Daniel MacCormac, Fredrick Mtenzi, Mark Deegan, Brendan O'Shea, Charles A. Shoniregun:
Towards local resource redirection across thin client protocols. ICDIM 2007: 165-172 - [c1]George S. Oreku, Jianzhong Li, Fredrick Japhet Mtenzi:
End user Authentication (EUA). WEBIST (1) 2007: 406-409 - 2005
- [j3]Fredrick Mtenzi:
Distributed Construction of Weakly Connected Dominating Sets for Clustering Mobile Ad Hoc Networks. J. Digit. Inf. Manag. 3(3) (2005) - [j2]Fredrick Japhet Mtenzi:
Distributed Construction of Weakly Connected Dominating Sets for Clustering Mobile Ad hoc Networks. J. Digit. Inf. Manag. 3(4): 241-243 (2005) - 2004
- [j1]Xiaohai Wei, Guoliang Chen, Yingyu Wan, Fredrick Mtenzi:
Optimized priority based energy efficient routing algorithm for mobile ad hoc networks. Ad Hoc Networks 2(3): 231-239 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint