default search action
SAICSIT Conf. 2007: Port Elizabeth, South Africa
- Lynette Barnard, Reinhardt A. Botha:
Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, SAICSIT 2007, Port Elizabeth, South Africa, October 2-3, 2007. ACM International Conference Proceeding Series 226, ACM 2007, ISBN 978-1-59593-775-9 - Leonard Martin Ah Kun, Kuo-Hung Lee, Gary Marsden:
Peepholes with no strings attached: using image processing as input in camera-phones. 1-8 - Colin Chibaya, Shaun Bangay:
A probabilistic movement model for shortest path formation in virtual ant-like agents. 9-18 - Kevin R. Glass, Shaun Bangay:
Constraint-based conversion of fiction text to a time-based graphical representation. 19-28 - Robert Gavin Goss, Martin Botha, Rossouw von Solms:
Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment. 29-35 - Surendren S. Govender, Dalenca Pottas:
A model to assess the benefit value of knowledge management in an IT service provider environment. 36-45 - Tim J. Grant, H. S. Venter, Jan H. P. Eloff:
Simulating adversarial interactions between intruders and system administrators using OODA-RR. 46-55 - Riaan Klopper, Stefan Gruner, Derrick G. Kourie:
Assessment of a framework to compare software development methodologies. 56-65 - Ronald Leppan, Charmain Cilliers, Marinda Taljaard:
Supporting CS1 with a program beacon recognition tool. 66-75 - Philip Machanick:
Design principles for a virtual multiprocessor. 76-82 - Amashini Naidoo, Nelishia Pillay:
Evolving pushdown automata. 83-90 - Ndapandula Nakashole, Hussein Suleman, Calvin Pedzai:
Dynamic role allocation for small search engine clusters. 91-96 - Herschel Nomdoe, Shaun Pather:
Providing a holistic perspective to evaluating e-service quality in web-based systems: a multi-stakeholder approach. 97-105 - Mandy Northover, Alan Northover, Stefan Gruner, Derrick G. Kourie, Andrew Boake:
Agile software development: a contemporary philosophical perspective. 106-115 - Nelishia Pillay, Caryl K. A. Chalmers:
A hybrid approach to automatic programming for the object-oriented programming paradigm. 116-124 - Gideon Ranga, Stephen Flowerday:
Identity and access management for the distribution of social grants in South Africa. 125-131 - Samuel Ssemugabi, Ruth de Villiers:
A comparative study of two usability evaluation methods using a web-based e-learning application. 132-142 - Mamello Thinyane, Lorenzo Dalvit, Hannah Slay, Thandeka Mapi, Alfredo Terzoli, Peter Clayton:
An ontology-based, multi-modal platform for the inclusion of marginalized rural communities into the knowledge society. 143-151 - Judy van Biljon, Paula Kotzé:
Modelling the factors that influence mobile phone adoption. 152-161 - Alta van der Merwe, Paula Kotzé:
Criteria used in selecting effective requirements elicitation procedures. 162-171 - Alta van der Merwe, Paula Kotzé, Aurona Gerber:
Generic process model structures: towards a standard notation for abstract representations. 172-180 - Wynand van Staden, Martin S. Olivier:
SQL's revoke with a view on privacy. 181-188 - Long Yi, James Connan:
KernTune: self-tuning Linux kernel performance using support vector machines. 189-196 - Tomasz Zukowski, Irwin Brown:
Examining the influence of demographic factors on internet users' information privacy concerns. 197-204
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.