Abstract is missing.
- Peepholes with no strings attached: using image processing as input in camera-phonesLeonard Martin Ah Kun, Kuo-Hung Lee, Gary Marsden. 1-8 [doi]
- A probabilistic movement model for shortest path formation in virtual ant-like agentsColin Chibaya, Shaun Bangay. 9-18 [doi]
- Constraint-based conversion of fiction text to a time-based graphical representationKevin R. Glass, Shaun Bangay. 19-28 [doi]
- Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environmentRobert Goss, Martin Botha, Rossouw von Solms. 29-35 [doi]
- A model to assess the benefit value of knowledge management in an IT service provider environmentSurendren S. Govender, Dalenca Pottas. 36-45 [doi]
- Simulating adversarial interactions between intruders and system administrators using OODA-RRT. J. Grant, H. S. Venter, Jan H. P. Eloff. 46-55 [doi]
- Assessment of a framework to compare software development methodologiesRiaan Klopper, Stefan Gruner, Derrick G. Kourie. 56-65 [doi]
- Supporting CS1 with a program beacon recognition toolRonald Leppan, Charmain Cilliers, Marinda Taljaard. 66-75 [doi]
- Design principles for a virtual multiprocessorPhilip Machanick. 76-82 [doi]
- Evolving pushdown automataAmashini Naidoo, Nelishia Pillay. 83-90 [doi]
- Dynamic role allocation for small search engine clustersNdapandula Nakashole, Hussein Suleman, Calvin Pedzai. 91-96 [doi]
- Providing a holistic perspective to evaluating e-service quality in web-based systems: a multi-stakeholder approachHerschel Nomdoe, Shaun Pather. 97-105 [doi]
- Agile software development: a contemporary philosophical perspectiveMandy Northover, Alan Northover, Stefan Gruner, Derrick G. Kourie, Andrew Boake. 106-115 [doi]
- A hybrid approach to automatic programming for the object-oriented programming paradigmNelishia Pillay, Caryl K. A. Chalmers. 116-124 [doi]
- Identity and access management for the distribution of social grants in South AfricaGideon Ranga, Stephen Flowerday. 125-131 [doi]
- A comparative study of two usability evaluation methods using a web-based e-learning applicationSamuel Ssemugabi, Ruth De Villiers. 132-142 [doi]
- An ontology-based, multi-modal platform for the inclusion of marginalized rural communities into the knowledge societyMamello Thinyane, Lorenzo Dalvit, Hannah Slay, Thandeka Mapi, Alfredo Terzoli, Peter Clayton. 143-151 [doi]
- Modelling the factors that influence mobile phone adoptionJudy van Biljon, Paula Kotzé. 152-161 [doi]
- Criteria used in selecting effective requirements elicitation proceduresAlta van der Merwe, Paula Kotzé. 162-171 [doi]
- Generic process model structures: towards a standard notation for abstract representationsAlta van der Merwe, Paula Kotzé, Aurona Gerber. 172-180 [doi]
- SQL s revoke with a view on privacyWynand van Staden, Martin S. Olivier. 181-188 [doi]
- KernTune: self-tuning Linux kernel performance using support vector machinesLong Yi, James Connan. 189-196 [doi]
- Examining the influence of demographic factors on internet users information privacy concernsTomasz Zukowski, Irwin Brown. 197-204 [doi]