default search action
SAICSIT Conf. 2018: Port Elizabeth, South Africa
- Sue Petratos, Johan Van Niekerk, Bertram Haskins:
Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, SAICSIT 2018, Port Elizabeth, South Africa, September 26-28, 2018. ACM 2018, ISBN 978-1-4503-6647-2 - Jabu Mtsweni, Noluxolo Gcaza, Mphahlele Thaba:
A unified cybersecurity framework for complex environments. 1-9 - Gregory Linklater, Christian Smith, Alan Herbert, Barry Irwin:
Toward distributed key management for offline authentication. 10-19 - Laurette Marais, Lynette van Zijl:
The state complexity of language operations on XNFA-succinct unary regular languages. 20-28 - Roxane Adams, Lynette van Zijl:
Ant sorting based on cellular automata with clustering. 29-38 - Sean Pennefather, Karen L. Bradshaw, Barry Irwin:
Extending the NFComms framework for bulk data transfers. 39-48 - Yusuf Moosa Motara, Karl van der Schyff:
A functional ontology. 49-54 - Clara Mloza-Banda, Brenda Scholtz:
Crowdsensing for successful water resource monitoring: an analysis of citizens' intentions and motivations. 55-64 - Zola Mahlaza, C. Maria Keet:
Measuring verb similarity using binary coefficients with application to isiXhosa and isiZulu. 65-71 - Nathan Watt, Mathys C. du Plessis:
Dropout algorithms for recurrent neural networks. 72-78 - Laurenz A. Cornelissen, Richard J. Barnett, Petrus Schoonwinkel, Brent D. Eichstadt, Hluma B. Magodla:
A network topology approach to bot classification. 79-88 - C. Sue Price, Deshen Moodley, Anban W. Pillay:
Dynamic Bayesian decision network to represent growers' adaptive pre-harvest burning decisions in a sugarcane supply chain. 89-98 - Henri Knoesen, Lisa F. Seymour:
Adoption of mobile enterprise applications in the insurance industry. 99-107 - Ricky Nhlanhla Dlamini, Grant Royd Howard:
Investigating the antecedents to teaching green information technology (Green IT): a survey of student teachers in Swaziland. 108-117 - Pula Rammoko, Linda Marshall:
Towards a taxonomy of subgraph isomorphism algorithms. 118-125 - Ayodele A. Barrett, Machdel Matthee:
A critical analysis of informed use of context-aware technologies. 126-134 - Babafemi Odusote, Olawande J. Daramola, Matthew Adigun:
Towards an extended misuse case framework for elicitation of cloud dependability requirements. 135-144 - L. Westraadt, André P. Calitz:
A gap analysis of new smart city solutions for integrated city planning and management. 145-153 - Kudzai Mapingire, Jacobus Philippus van Deventer, Alta van der Merwe:
Competencies and skills of enterprise architects: a study in a South African telecommunications company. 154-163 - Ivan Daniel Burke, Alan Herbert, Roderick Mooi:
Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN): a postmortem analysis of the memcached attack on the SANReN. 164-170 - L. Noruwana, Wallace Chigona, Donald Flywell Malanga:
How information and communication technologies empower disadvantaged communities in Cape Town, South Africa. 171-178 - Laurenz A. Cornelissen, Richard J. Barnett, Morakane A. M. Kepa, Daniel Loebenberg-Novitzkas, Jacques Jordaan:
Deploying South African social honeypots on Twitter. 179-187 - Ndivhuwo Stan Ramunyisi, Jaco Badenhorst, Carmen Moors, Tebogo Gumede:
Rapid development of a command and control interface for smart office environments. 188-194 - Peter John Alkema, Stephen Phillip Levitt, Ken J. Nixon:
WeThinkCode_: case study of a tuition-free coding academy. 195-204 - Tanya René Beelders, Jean-Pierre du Plessis:
Reading usability of ereaders and ebooks for information technology students. 205-214 - P. Banda, Lynette Barnard:
A deep learning approach to photovoltaic cell defect classification. 215-221 - Motlhabane Jacobus Maboe, Mariki M. Eloff, Marthie A. Schoeman:
The role of accessibility and usability in bridging the digital divide for students with disabilities in an e-learning environment. 222-228 - A. Saleh Zadeh, André P. Calitz, Jéan H. Greyling:
Evaluating a biosensor-based interface to recognize hand-finger gestures using a Myo armband. 229-238 - Gina Horscroft, Jivashi Nagar, Hussein Suleman:
Re-ranking the search results for users with time-periodic intents. 239-247 - Grace Mudarikwa, Thomas D. Grace:
Agile system development methodologies usage and acceptance in South African banking firms: an exploratory analysis. 248-257 - Ntsako Baloyi, Paula Kotzé:
A data privacy model based on internet of things and cyber-physical systems reference architectures. 258-268 - Philip Machanick:
A preliminary study of minimal-contention locks. 269-278 - T. Masombuka, Ernest Mnkandla:
A DevOps collaboration culture acceptance model. 279-285 - Avsharn Bachoo:
Achieving value from enterprise architecture maturity. 286-295 - Carmen Moors, Ilana Wilken, Karen Calteaux, Tebogo Gumede:
Human language technology audit 2018: analysing the development trends in resource availability in all South African languages. 296-304 - T. Kotzé, Hanlie Smuts:
Model for knowledge capturing during system requirements elicitation in a high reliability organization: a case study. 305-312 - Mikhail N. Rybakov, Dmitry Shkatov:
On complexity of propositional linear-time temporal logic with finitely many variables. 313-316
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.