Abstract is missing.
- Team software process: recent successes and technical advances: invited lecturePhillip Miller. 3 [doi]
- From behind to ahead ICT4D as an agent of change for the CS curriculum: invited lectureErkki Sutinen. 4 [doi]
- Design notations for creating virtual environmentsCharlene Elliott, Gary Marsden, Marion Walton, Edwin H. Blake. 7-15 [doi]
- Methodological challenges in e-skills shortage research in South AfricaP. M. Alexander, H. H. Lotriet, M. C. Matthee. 16-21 [doi]
- Composite refactoring using fine-grained transformationsEmmad Saadeh, Derrick G. Kourie. 22-29 [doi]
- A lightweight methodology to improve web accessibilityMardé Greeff, Paula Kotzé. 30-39 [doi]
- Evaluating text preprocessing to improve compression on maillogsFred Otten, Barry Irwin, Hannah Thinyane. 44-53 [doi]
- A hybrid neural network and Minimax algorithm for zero-sum gamesMathys C. du Plessis. 54-59 [doi]
- An evaluation of techniques for image searching and browsing on mobile devicesDynal Patel, Gary Marsden, Matt Jones, Steve Jones. 60-69 [doi]
- A framework and methodology for knowledge management system implementationHanlie Smuts, Alta van der Merwe, Marianne Loock, Paula Kotzé. 70-79 [doi]
- Mobile phone performance analysis for camera based visual interactionsSimon Kerr, Hannah Thinyane, Greg Foster. 80-86 [doi]
- Evaluation criteria for assessing the usability of ERP systemsAkash Singh, Janet Wesson. 87-95 [doi]
- Glaserian and Straussian grounded theory: similar or completely different?Johanna C. van Niekerk, J. D. Roode. 96-103 [doi]
- Context-aware handoff decision for wireless access networks using Bayesian networksLekometsa Mokhesi, Antoine B. Bagula. 104-111 [doi]
- The adoption of open source software in business models: a Red Hat and IBM case studyNeeshal Munga, Thomas Fogwill, Quentin Williams. 112-121 [doi]
- Usability evaluation methods: mind the gapsEstelle de Kock, Judy van Biljon, Marco Pretorius. 122-131 [doi]
- Exploring the African Village metaphor for computer user interface iconsDelene Heukelman, Seraphin Eyono Obono. 132-140 [doi]
- Plagiarising of source code by novice programmers a cry for help ?Dieter Vogts. 141-149 [doi]
- The influence of optimisations on the performance of an object relational mapping toolPieter van Zyl, Derrick G. Kourie, Louis Coetzee, Andrew Boake. 150-159 [doi]
- GPU packet classification using OpenCL: a consideration of viable classification methodsAlastair Nottingham, Barry Irwin. 160-169 [doi]
- Towards an artificial neural network-based simulator for behavioural evolution in evolutionary roboticsChristiaan J. Pretorius, Mathys C. du Plessis, Charmain Cilliers. 170-178 [doi]
- An analysis of the international discourse about women in information technologyH. W. Pretorius, C. de Villiers. 179-186 [doi]
- The revised developmental approach to the uncapacitated examination timetabling problemNelishia Pillay. 187-192 [doi]
- Assessing alignment of an e-government project in the context of a developing country: a Heideggerian perspectiveNixon Muganda. 193-202 [doi]