


default search action
SAICSIT Conf. 2007: Port Elizabeth, South Africa
- Lynette Barnard, Reinhardt A. Botha:

Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, SAICSIT 2007, Port Elizabeth, South Africa, October 2-3, 2007. ACM International Conference Proceeding Series 226, ACM 2007, ISBN 978-1-59593-775-9 - Leonard Martin Ah Kun, Kuo-Hung Lee, Gary Marsden:

Peepholes with no strings attached: using image processing as input in camera-phones. 1-8 - Colin Chibaya

, Shaun Bangay:
A probabilistic movement model for shortest path formation in virtual ant-like agents. 9-18 - Kevin R. Glass, Shaun Bangay:

Constraint-based conversion of fiction text to a time-based graphical representation. 19-28 - Robert Gavin Goss, Martin Botha, Rossouw von Solms:

Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment. 29-35 - Surendren S. Govender, Dalenca Pottas

:
A model to assess the benefit value of knowledge management in an IT service provider environment. 36-45 - Tim J. Grant, H. S. Venter

, Jan H. P. Eloff:
Simulating adversarial interactions between intruders and system administrators using OODA-RR. 46-55 - Riaan Klopper, Stefan Gruner, Derrick G. Kourie:

Assessment of a framework to compare software development methodologies. 56-65 - Ronald Leppan, Charmain Cilliers, Marinda Taljaard:

Supporting CS1 with a program beacon recognition tool. 66-75 - Philip Machanick

:
Design principles for a virtual multiprocessor. 76-82 - Amashini Naidoo, Nelishia Pillay:

Evolving pushdown automata. 83-90 - Ndapandula Nakashole

, Hussein Suleman
, Calvin Pedzai:
Dynamic role allocation for small search engine clusters. 91-96 - Herschel Nomdoe, Shaun Pather:

Providing a holistic perspective to evaluating e-service quality in web-based systems: a multi-stakeholder approach. 97-105 - Mandy Northover

, Alan Northover
, Stefan Gruner, Derrick G. Kourie, Andrew Boake:
Agile software development: a contemporary philosophical perspective. 106-115 - Nelishia Pillay, Caryl K. A. Chalmers:

A hybrid approach to automatic programming for the object-oriented programming paradigm. 116-124 - Gideon Ranga, Stephen Flowerday

:
Identity and access management for the distribution of social grants in South Africa. 125-131 - Samuel Ssemugabi

, Ruth de Villiers
:
A comparative study of two usability evaluation methods using a web-based e-learning application. 132-142 - Mamello Thinyane

, Lorenzo Dalvit, Hannah Slay
, Thandeka Mapi, Alfredo Terzoli, Peter Clayton:
An ontology-based, multi-modal platform for the inclusion of marginalized rural communities into the knowledge society. 143-151 - Judy van Biljon

, Paula Kotzé:
Modelling the factors that influence mobile phone adoption. 152-161 - Alta van der Merwe, Paula Kotzé:

Criteria used in selecting effective requirements elicitation procedures. 162-171 - Alta van der Merwe, Paula Kotzé, Aurona Gerber

:
Generic process model structures: towards a standard notation for abstract representations. 172-180 - Wynand van Staden

, Martin S. Olivier
:
SQL's revoke with a view on privacy. 181-188 - Long Yi, James Connan:

KernTune: self-tuning Linux kernel performance using support vector machines. 189-196 - Tomasz Zukowski, Irwin Brown

:
Examining the influence of demographic factors on internet users' information privacy concerns. 197-204

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














