


default search action
SAICSIT Conf. 2013: East London, South Africa
- John McNeill, Karen L. Bradshaw, Philip Machanick, Mosiuoa Tsietsi:

2013 South African Institute for Computer Scientists and Information Technologists, SAICSIT '13, East London, South Africa, October 7-9, 2013. ACM 2013, ISBN 978-1-4503-2112-9
Algorithms
- Laurie L. Butgereit, Reinhardt A. Botha

:
A comparison of different calculations for N-gram similarities in a spelling corrector for mobile instant messaging language. 1-7 - Ian D. Sanders

:
Cooperating to buy shoes: an application of picking cycles in directed graphs. 8-16
GPU parallelism
- Dale Tristram, Karen L. Bradshaw

:
Evaluating the acceleration of typical scientific problems on the GPU. 17-26 - Alastair Nottingham, Barry Irwin

:
Towards a GPU accelerated virtual machine for massively parallel packet classification and filtering. 27-36
Machine learning
- Kyle Williams, Hussein Suleman

, Jorgina K. do R. Paihama:
A comparison of machine learning techniques for handwritten |Xam word recognition. 37-46 - Patrick Tchankue, Janet Wesson

, Dieter Vogts:
Using machine learning to predict the driving context whilst driving. 47-55
Image processing and intelligent systems
- Pieter J. Blignaut:

A new mapping function to improve the accuracy of a video-based eye tracker. 56-59 - James E. Gain:

Using poll sheets and computer vision as an inexpensive alternative to clickers. 60-63 - Kevin Igwe, Nelishia Pillay, Christopher Rae:

Solving the 8-puzzle problem using genetic programming. 64-67
Security and hardware
- Candice Louw

, Sebastiaan H. von Solms:
Personally identifiable information leakage through online social networks. 68-71 - Kegomoditswe Molotsi, Bobby L. Tait

:
UMS-dev-sec: a proposed framework to address security concerns of UMS devices. 72-76 - Gavin J. Dollman, Lizette de Wet, Tanya René Beelders:

Effectiveness with EEG BCIs: exposure to traditional input methods as a factor of performance. 77-80 - Kevin A. Naudé:

Green16: a frugal CPU architecture. 81-84
Information and technology services
- Nerina Reddy, Penny Singh, Doncho Petkov

:
Perceptions and expectations of IT service delivery post migration to a Microsoft platform at a university of technology in South Africa. 85-89 - Melius Weideman:

Googling South African academic publications: search query generation methods. 90-95 - G. M. Muriithi, Eduan Kotzé

:
A conceptual framework for delivering cost effective business intelligence solutions as a service. 96-100
Mobile and social networking
- Baldreck Chipangura

:
Categorizing the provision of mobile centric information access and interaction for higher educational institutions. 101-110 - Marie Hattingh, Machdel Matthee, Hugo Lotriet:

Internet use and degree of flow experienced by expatriates in the Kingdom of Saudi Arabia. 111-120 - Kalpana Parshotam:

Crowd computing: a literature review and definition. 121-130 - Tendani Mawela

, Nixon Muganda Ochara
:
Sustainability of e-participation through mobile technologies. 131-143
Tools
- Craig Edwards, Stefan Gruner:

A new tool for URDAD to Java EE EJB transformations. 144-153 - Melusi Malinga, Stefan Gruner, Agnes Koschmider

:
Quality and usability of mashup tools: criteria and evaluation. 154-159 - Lighton Phiri

, Hussein Suleman
:
Flexible design for simple digital library tools and services. 160-169 - Fritz Solms:

Experiences with using the systematic method for architecture recovery (SyMAR). 170-178
Image processing and graphics
- Warren Nel, Mehrdad Ghaziasgar, James Connan:

An integrated sign language recognition system. 179-185 - Diego Mushfieldt, Mehrdad Ghaziasgar, James Connan:

Robust facial expression recognition in the presence of rotation and partial occlusion. 186-193 - Brett Lagerwall, Serestina Viriri

:
Robust real-time face recognition. 194-199 - Bernardt Duvenhage, Kadi Bouatouch, Derrick G. Kourie:

Numerical verification of bidirectional reflectance distribution functions for physical plausibility. 200-208
Neural networks
- Clayton Burger, Mathys C. du Plessis, Charmain Cilliers:

Design and parametric considerations for artificial neural network pruning in UCT game playing. 209-217 - Ralf C. Staudemeyer, Christian W. Omlin

:
Evaluating performance of long short-term memory recurrent neural networks on intrusion detection data. 218-224
ICT4D
- Sue A. Conger:

Knowledge management in LLiSA ICT4D projects. 225-232 - Nobert Rangarirai Jere, Mamello Thinyane, Tlou Boikhutso, Nkanyiso Ndlovu:

An assessment of ICT challenges in rural areas: ICT experts vs rural users views: a case of the Siyakhula Living Lab. 233-241
Education
- Siobhan O'Donovan, James E. Gain, Patrick C. Marais:

A case study in the gamification of a university-level games development course. 242-251 - Ruth de Villiers

, Patricia-Ann Harpur:
Design-based research - the educational technology variant of design research: illustrated by the design of an m-learning environment. 252-261 - Thomas McDonald van der Merwe

, M. E. van Heerden:
Ease of use and usefulness of webinars in an open distance learning environment: an activity theory perspective. 262-270 - Lindsey Ann Gouws, Karen L. Bradshaw

, Peter Wentworth:
First year student performance in a test for computational thinking. 271-277
Algorithms
- Nelishia Pillay:

A comparative study of hyper-heuristics for solving the school timetabling problem. 278-285 - Ian D. Sanders

:
Cooperating to buy shoes in the real world: online cycle picking in directed graphs. 286-294 - Grant Blaise O'Reilly:

Peak and valley detection in multimodal functions by means of 3D normal metadata. 295-304
Mobile and networks
- Elisha O. Ochola

, Mariki M. Eloff
, John A. van der Poll:
The failure of watchdog schemes in MANET security: a case of an intelligent black-hole. 305-311 - Charmain Cilliers, Lynette Barnard, Thomas Hibbers, Melisa Koorsse:

MIDD: an architecture for inter-domain mobile content distribution. 312-319 - Felix Ntawanga

, André P. Calitz, Lynette Barnard:
An integrated logical context sensor for mobile web applications. 320-330
Business applications
- Chrisna Jooste, Judy van Biljon

, Jan Mentz
:
Usability evaluation guidelines for business intelligence applications. 331-340 - John Trimble, Harry Keeling:

Comparative paradigms in the examination of software production. 341-346 - Brenda Scholtz

, André P. Calitz, Irene Snyman:
The usability of collaborative tools: application to business process modelling. 347-358
Computer science
- Timothy Matthews, Dieter Vogts, Kevin A. Naudé:

Sketch-based interfaces: drawings to data. 359-368 - Loek G. Cleophas

, Derrick G. Kourie, Bruce W. Watson:
Efficient representation of DNA data for pattern recognition using failure factor oracles. 369-377 - Allan Edward van den Berg, Farouk Smith

:
Hardware evolution of a digital circuit using a custom VLSI architecture. 378-387

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














