SAICSIT Conf. 2007:
Port Elizabeth,
South Africa
Lynette Barnard, Reinhardt A. Botha (Eds.):
Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, SAICSIT Conf. 2007, Port Elizabeth, South Africa, October 2-3, 2007.
ACM International Conference Proceeding Series 226 ACM 2007, ISBN 978-1-59593-775-9
- Leonard Martin Ah Kun, Kuo-Hung Lee, Gary Marsden:
Peepholes with no strings attached: using image processing as input in camera-phones.
1-8
- Colin Chibaya, Shaun Bangay:
A probabilistic movement model for shortest path formation in virtual ant-like agents.
9-18
- Kevin R. Glass, Shaun Bangay:
Constraint-based conversion of fiction text to a time-based graphical representation.
19-28
- Robert Goss, Martin Botha, Rossouw von Solms:
Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment.
29-35
- Surendren S. Govender, Dalenca Pottas:
A model to assess the benefit value of knowledge management in an IT service provider environment.
36-45
- T. J. Grant, H. S. Venter, Jan H. P. Eloff:
Simulating adversarial interactions between intruders and system administrators using OODA-RR.
46-55
- Riaan Klopper, Stefan Gruner, Derrick G. Kourie:
Assessment of a framework to compare software development methodologies.
56-65
- Ronald Leppan, Charmain Cilliers, Marinda Taljaard:
Supporting CS1 with a program beacon recognition tool.
66-75
- Philip Machanick:
Design principles for a virtual multiprocessor.
76-82
- Amashini Naidoo, Nelishia Pillay:
Evolving pushdown automata.
83-90
- Ndapandula Nakashole, Hussein Suleman, Calvin Pedzai:
Dynamic role allocation for small search engine clusters.
91-96
- Herschel Nomdoe, Shaun Pather:
Providing a holistic perspective to evaluating e-service quality in web-based systems: a multi-stakeholder approach.
97-105
- Mandy Northover, Alan Northover, Stefan Gruner, Derrick G. Kourie, Andrew Boake:
Agile software development: a contemporary philosophical perspective.
106-115
- Nelishia Pillay, Caryl K. A. Chalmers:
A hybrid approach to automatic programming for the object-oriented programming paradigm.
116-124
- Gideon Ranga, Stephen Flowerday:
Identity and access management for the distribution of social grants in South Africa.
125-131
- Samuel Ssemugabi, Ruth de Villiers:
A comparative study of two usability evaluation methods using a web-based e-learning application.
132-142
- Mamello Thinyane, Lorenzo Dalvit, Hannah Slay, Thandeka Mapi, Alfredo Terzoli, Peter Clayton:
An ontology-based, multi-modal platform for the inclusion of marginalized rural communities into the knowledge society.
143-151
- Judy van Biljon, Paula Kotzé:
Modelling the factors that influence mobile phone adoption.
152-161
- Alta van der Merwe, Paula Kotzé:
Criteria used in selecting effective requirements elicitation procedures.
162-171
- Alta van der Merwe, Paula Kotzé, Aurona Gerber:
Generic process model structures: towards a standard notation for abstract representations.
172-180
- Wynand van Staden, Martin S. Olivier:
SQL's revoke with a view on privacy.
181-188
- Long Yi, James Connan:
KernTune: self-tuning Linux kernel performance using support vector machines.
189-196
- Tomasz Zukowski, Irwin Brown:
Examining the influence of demographic factors on internet users' information privacy concerns.
197-204
Copyright © Mon Mar 15 03:53:18 2010
by Michael Ley (ley@uni-trier.de)