Stop the war!
Остановите войну!
for scientists:
default search action
SAICSIT Conf. 2013: East London, South Africa
- John McNeill, Karen L. Bradshaw, Philip Machanick, Mosiuoa Tsietsi:
2013 South African Institute for Computer Scientists and Information Technologists, SAICSIT '13, East London, South Africa, October 7-9, 2013. ACM 2013, ISBN 978-1-4503-2112-9
Algorithms
- Laurie L. Butgereit, Reinhardt A. Botha:
A comparison of different calculations for N-gram similarities in a spelling corrector for mobile instant messaging language. 1-7 - Ian D. Sanders:
Cooperating to buy shoes: an application of picking cycles in directed graphs. 8-16
GPU parallelism
- Dale Tristram, Karen L. Bradshaw:
Evaluating the acceleration of typical scientific problems on the GPU. 17-26 - Alastair Nottingham, Barry Irwin:
Towards a GPU accelerated virtual machine for massively parallel packet classification and filtering. 27-36
Machine learning
- Kyle Williams, Hussein Suleman, Jorgina K. do R. Paihama:
A comparison of machine learning techniques for handwritten |Xam word recognition. 37-46 - Patrick Tchankue, Janet Wesson, Dieter Vogts:
Using machine learning to predict the driving context whilst driving. 47-55
Image processing and intelligent systems
- Pieter J. Blignaut:
A new mapping function to improve the accuracy of a video-based eye tracker. 56-59 - James E. Gain:
Using poll sheets and computer vision as an inexpensive alternative to clickers. 60-63 - Kevin Igwe, Nelishia Pillay, Christopher Rae:
Solving the 8-puzzle problem using genetic programming. 64-67
Security and hardware
- Candice Louw, Sebastiaan H. von Solms:
Personally identifiable information leakage through online social networks. 68-71 - Kegomoditswe Molotsi, Bobby L. Tait:
UMS-dev-sec: a proposed framework to address security concerns of UMS devices. 72-76 - Gavin J. Dollman, Lizette de Wet, Tanya René Beelders:
Effectiveness with EEG BCIs: exposure to traditional input methods as a factor of performance. 77-80 - Kevin A. Naudé:
Green16: a frugal CPU architecture. 81-84
Information and technology services
- Nerina Reddy, Penny Singh, Doncho Petkov:
Perceptions and expectations of IT service delivery post migration to a Microsoft platform at a university of technology in South Africa. 85-89 - Melius Weideman:
Googling South African academic publications: search query generation methods. 90-95 - G. M. Muriithi, Eduan Kotzé:
A conceptual framework for delivering cost effective business intelligence solutions as a service. 96-100
Mobile and social networking
- Baldreck Chipangura:
Categorizing the provision of mobile centric information access and interaction for higher educational institutions. 101-110 - Marie Hattingh, Machdel Matthee, Hugo Lotriet:
Internet use and degree of flow experienced by expatriates in the Kingdom of Saudi Arabia. 111-120 - Kalpana Parshotam:
Crowd computing: a literature review and definition. 121-130 - Tendani Mawela, Nixon Muganda Ochara:
Sustainability of e-participation through mobile technologies. 131-143
Tools
- Craig Edwards, Stefan Gruner:
A new tool for URDAD to Java EE EJB transformations. 144-153 - Melusi Malinga, Stefan Gruner, Agnes Koschmider:
Quality and usability of mashup tools: criteria and evaluation. 154-159 - Lighton Phiri, Hussein Suleman:
Flexible design for simple digital library tools and services. 160-169 - Fritz Solms:
Experiences with using the systematic method for architecture recovery (SyMAR). 170-178
Image processing and graphics
- Warren Nel, Mehrdad Ghaziasgar, James Connan:
An integrated sign language recognition system. 179-185 - Diego Mushfieldt, Mehrdad Ghaziasgar, James Connan:
Robust facial expression recognition in the presence of rotation and partial occlusion. 186-193 - Brett Lagerwall, Serestina Viriri:
Robust real-time face recognition. 194-199 - Bernardt Duvenhage, Kadi Bouatouch, Derrick G. Kourie:
Numerical verification of bidirectional reflectance distribution functions for physical plausibility. 200-208
Neural networks
- Clayton Burger, Mathys C. du Plessis, Charmain Cilliers:
Design and parametric considerations for artificial neural network pruning in UCT game playing. 209-217 - Ralf C. Staudemeyer, Christian W. Omlin:
Evaluating performance of long short-term memory recurrent neural networks on intrusion detection data. 218-224
ICT4D
- Sue A. Conger:
Knowledge management in LLiSA ICT4D projects. 225-232 - Nobert Rangarirai Jere, Mamello Thinyane, Tlou Boikhutso, Nkanyiso Ndlovu:
An assessment of ICT challenges in rural areas: ICT experts vs rural users views: a case of the Siyakhula Living Lab. 233-241
Education
- Siobhan O'Donovan, James E. Gain, Patrick C. Marais:
A case study in the gamification of a university-level games development course. 242-251 - Ruth de Villiers, Patricia-Ann Harpur:
Design-based research - the educational technology variant of design research: illustrated by the design of an m-learning environment. 252-261 - Thomas McDonald van der Merwe, M. E. van Heerden:
Ease of use and usefulness of webinars in an open distance learning environment: an activity theory perspective. 262-270 - Lindsey Ann Gouws, Karen L. Bradshaw, Peter Wentworth:
First year student performance in a test for computational thinking. 271-277
Algorithms
- Nelishia Pillay:
A comparative study of hyper-heuristics for solving the school timetabling problem. 278-285 - Ian D. Sanders:
Cooperating to buy shoes in the real world: online cycle picking in directed graphs. 286-294 - Grant Blaise O'Reilly:
Peak and valley detection in multimodal functions by means of 3D normal metadata. 295-304
Mobile and networks
- Elisha O. Ochola, Mariki M. Eloff, John A. van der Poll:
The failure of watchdog schemes in MANET security: a case of an intelligent black-hole. 305-311 - Charmain Cilliers, Lynette Barnard, Thomas Hibbers, Melisa Koorsse:
MIDD: an architecture for inter-domain mobile content distribution. 312-319 - Felix Ntawanga, André P. Calitz, Lynette Barnard:
An integrated logical context sensor for mobile web applications. 320-330
Business applications
- Chrisna Jooste, Judy van Biljon, Jan Mentz:
Usability evaluation guidelines for business intelligence applications. 331-340 - John Trimble, Harry Keeling:
Comparative paradigms in the examination of software production. 341-346 - Brenda Scholtz, André P. Calitz, Irene Snyman:
The usability of collaborative tools: application to business process modelling. 347-358
Computer science
- Timothy Matthews, Dieter Vogts, Kevin A. Naudé:
Sketch-based interfaces: drawings to data. 359-368 - Loek G. Cleophas, Derrick G. Kourie, Bruce W. Watson:
Efficient representation of DNA data for pattern recognition using failure factor oracles. 369-377 - Allan Edward van den Berg, Farouk Smith:
Hardware evolution of a digital circuit using a custom VLSI architecture. 378-387
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.