


default search action
SAICSIT Conf. 2009: Vanderbijlpark, Emfuleni, South Africa
- Barry Dwolatzky, Jason Cohen, Scott Hazelhurst:

Proceedings of the 2009 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, SAICSIT 2009, Vanderbijlpark, Emfuleni, South Africa, October 12-14, 2009. ACM International Conference Proceeding Series, ACM 2009, ISBN 978-1-60558-643-4 - Phillip Miller:

Team software process: recent successes and technical advances: invited lecture. 3 - Erkki Sutinen:

From behind to ahead ICT4D as an agent of change for the CS curriculum: invited lecture. 4 - Charlene Elliott, Gary Marsden, Marion Walton, Edwin H. Blake

:
Design notations for creating virtual environments. 7-15 - Patricia M. Alexander

, H. H. Lotriet
, M. C. Matthee
:
Methodological challenges in e-skills shortage research in South Africa. 16-21 - Emmad Saadeh, Derrick G. Kourie:

Composite refactoring using fine-grained transformations. 22-29 - Mardé Greeff

, Paula Kotzé:
A lightweight methodology to improve web accessibility. 30-39 - Tsepo L. Tsekoa

:
Molecular modelling of calcium dependent protein kinase 4 (CDPK4) from Plasmodium falciparum. 40-43 - Fred Otten, Barry Irwin

, Hannah Thinyane
:
Evaluating text preprocessing to improve compression on maillogs. 44-53 - Mathys C. du Plessis:

A hybrid neural network and Minimax algorithm for zero-sum games. 54-59 - Dynal Patel, Gary Marsden, Matt Jones

, Steve Jones:
An evaluation of techniques for image searching and browsing on mobile devices. 60-69 - Hanlie Smuts

, Alta van der Merwe, Marianne Loock
, Paula Kotzé:
A framework and methodology for knowledge management system implementation. 70-79 - Simon Kerr, Hannah Thinyane

, Greg Foster:
Mobile phone performance analysis for camera based visual interactions. 80-86 - Akash Singh, Janet Wesson

:
Evaluation criteria for assessing the usability of ERP systems. 87-95 - Johanna C. van Niekerk, J. D. Roode:

Glaserian and Straussian grounded theory: similar or completely different? 96-103 - Lekometsa Mokhesi, Antoine B. Bagula

:
Context-aware handoff decision for wireless access networks using Bayesian networks. 104-111 - Neeshal Munga, Thomas Fogwill

, Quentin Williams:
The adoption of open source software in business models: a Red Hat and IBM case study. 112-121 - Estelle de Kock

, Judy van Biljon
, Marco Pretorius:
Usability evaluation methods: mind the gaps. 122-131 - Delene Heukelman, Seraphin Desire Eyono Obono

:
Exploring the African Village metaphor for computer user interface icons. 132-140 - Dieter Vogts:

Plagiarising of source code by novice programmers a "cry for help"? 141-149 - Pieter van Zyl, Derrick G. Kourie, Louis Coetzee, Andrew Boake:

The influence of optimisations on the performance of an object relational mapping tool. 150-159 - Alastair Nottingham, Barry Irwin

:
GPU packet classification using OpenCL: a consideration of viable classification methods. 160-169 - Christiaan J. Pretorius

, Mathys C. du Plessis, Charmain Cilliers:
Towards an artificial neural network-based simulator for behavioural evolution in evolutionary robotics. 170-178 - Hendrik Willem Pretorius

, Carina de Villiers
:
An analysis of the international discourse about women in information technology. 179-186 - Nelishia Pillay:

The revised developmental approach to the uncapacitated examination timetabling problem. 187-192 - Nixon Muganda

:
Assessing alignment of an e-government project in the context of a developing country: a Heideggerian perspective. 193-202

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














