default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 34 matches
- 2008
- Richard J. Barnett, Barry Irwin:
Towards a taxonomy of network scanning techniques. SAICSIT 2008: 1-7 - Irwin Brown:
Investigating the impact of the external environment on strategic information systems planning: a qualitative inquiry. SAICSIT 2008: 8-15 - Mark Chapman, Alta van der Merwe:
Contemplating systematic software reuse in a project-centric company. SAICSIT 2008: 16-26 - Colin Chibaya, Shaun Bangay:
The relationship between emergence of the shortest path and information value using ant-like agents. SAICSIT 2008: 27-34 - Nomusa Dlodlo, Merryl Ford, Lara Marques:
Utilising the living labs approach in the design of a digital platform for SINGA. SAICSIT 2008: 35-40 - Carlos Ferreira, Jason F. Cohen:
Agile systems development and stakeholder satisfaction: a South African empirical study. SAICSIT 2008: 48-55 - Lynn Futcher, Rossouw von Solms:
Guidelines for secure software development. SAICSIT 2008: 56-65 - Helene Gelderblom, Paula Kotzé:
Designing technology for young children: what we can learn from theories of cognitive development. SAICSIT 2008: 66-75 - Mardé Greeff, Louis Coetzee, Martin Pistorius:
Usability evaluation of the South African National Accessibility Portal interactive voice response system. SAICSIT 2008: 76-85 - Darelle van Greunen, Alexandros Yeratziotis:
e-Government: living up to the challenge of culture context. SAICSIT 2008: 246-256 - Mike Hart:
Do online buying behaviour and attitudes to web personalization vary by age group? SAICSIT 2008: 86-93 - Scott Hazelhurst:
Scientific computing using virtual high-performance computing: a case study using the Amazon elastic computing cloud. SAICSIT 2008: 94-103 - Ryan Hill, Janet Wesson:
Using mobile preference-based searching to improve tourism decision support. SAICSIT 2008: 104-113 - Tertia Hörne, John A. van der Poll:
Planning as model checking: the performance of ProB vs NuSMV. SAICSIT 2008: 114-123 - Naomi Isabirye, Stephen Flowerday:
A model for eliciting user requirements specific to South African rural areas. SAICSIT 2008: 124-130 - Alex Koller, Greg Foster, Madeleine Wright:
Java Micro Edition and Adobe Flash Lite for arcade-style mobile phone game development: a comparative study. SAICSIT 2008: 131-138 - Rangarirai Matavire, Irwin Brown:
Investigating the use of "Grounded Theory" in information systems research. SAICSIT 2008: 139-147 - Alta van der Merwe, Jan H. Kroeze:
Development and implementation of an institutional repository within a science, engineering and technology (SET) environment. SAICSIT 2008: 237-245 - Jabu Mtsweni, Elmarie Biermann:
An investigation into the implementation of open source software within the SA government: an emerging expansion model. SAICSIT 2008: 148-158 - Wayne Chelliah Naidoo, Jules-Raymond Tapamo:
A model of an intelligent video-based security surveillance system for general indoor/outdoor environments. SAICSIT 2008: 159-168 - Felix Ntawanga, André P. Calitz, Lynette Barnard:
Maintaining customer profiles in an e-commerce environment. SAICSIT 2008: 169-179 - Christopher Parker, Hussein Suleman:
A lightweight web interface to grid scheduling systems. SAICSIT 2008: 180-187 - Nelishia Pillay:
An analysis of representations for hyper-heuristics for the uncapacitated examination timetabling problem in a genetic programming system. SAICSIT 2008: 188-192 - Mathys C. du Plessis, Lynette Barnard:
Incorporating layout managers into an evolutionary programming algorithm to design graphical user interfaces. SAICSIT 2008: 41-47 - Rushil Raghavjee, Nelishia Pillay:
An application of genetic algorithms to the school timetabling problem. SAICSIT 2008: 193-199 - Karen Renaud, Judy van Biljon:
Predicting technology acceptance and adoption by the elderly: a qualitative study. SAICSIT 2008: 210-219 - Gopal Ravi Sankar, Jéan H. Greyling, Dieter Vogts, Mathys C. du Plessis:
Models towards a hybrid conversational agent for contact centres. SAICSIT 2008: 200-209 - Hannah Slay, Greg Foster, Edison Mukadah:
Investigating the viability of scroll-wheel interfaced mobile phones for text entry. SAICSIT 2008: 220-228 - Hussein Suleman:
Automatic marking with Sakai. SAICSIT 2008: 229-236 - Martin van Tonder, Charmain Cilliers, Jéan H. Greyling:
A framework for gaze selection techniques. SAICSIT 2008: 267-275
skipping 4 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-29 05:10 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint