Abstract is missing.
- The complementary role of two evaluation methods in the usability and accessibility evaluation of a non-standard systemFunmi Adebesin, Paula Kotzé, Helene Gelderblom. 1-11 [doi]
- Probing some theoretical aspects of practitioner-based inquiry research in information systemsUdo Richard Averweg, Jan Hendrik Kroeze. 12-18 [doi]
- Identifying annotations for adventure game generation from fiction textRoss Berkland, Shaun Bangay. 19-28 [doi]
- Mobile user experience in a mlearning environmentAdele Botha, Marlien Herselman, Darelle van Greunen. 29-38 [doi]
- Panopticon: a scalable monitoring systemDuncan Clough, Stefano Rivera, Michelle Kuttel, Vincent Geddes, Patrick Marais. 39-47 [doi]
- A four-way framework for validating a specificationCyrille Dongmo, John A. van der Poll. 48-57 [doi]
- A mobile commerce application for rural economy development: a case study for DwesaEdim Azom Emmanuel, Hippolyte N. Muyingi. 58-66 [doi]
- Mobile phone adoption: do existing models adequately capture the actual usage of older adults?Helene Gelderblom, Tobie van Dyk, Judy van Biljon. 67-74 [doi]
- Documenting open source migration processes for re-useAurona Gerber, Onkgopotse Molefe, Alta van der Merwe. 75-85 [doi]
- Investigating the feasibility factors of synthetic sign language visualization methods on mobile phonesMehrdad Ghaziasgar, James Connan. 86-92 [doi]
- PH2: an hadoop-based framework for mining structural properties from the PDB databaseScott Hazelhurst. 104-112 [doi]
- A-POInter: an adaptive mobile tourist guideRyan Hill, Janet Wesson. 113-122 [doi]
- m-Health adoption and sustainability prognosis from a care givers and patients perspectiveBoroto Hwabamungu, Quentin Williams. 123-131 [doi]
- The evaluation of an adaptive user interface modelBronwin Jason, André P. Calitz, Jéan H. Greyling. 132-143 [doi]
- Motivation and learning preferences of information technology learners in South African secondary schoolsMelisa Koorsse, Charmain Cilliers, André P. Calitz. 144-152 [doi]
- Ontology goes postmodern in ICTJan H. Kroeze. 153-159 [doi]
- Deriving a digraph isomorphism for digraph compliance measurementLinda Marshall, Derrick G. Kourie. 160-169 [doi]
- User experience evaluation metrics for usable accounting toolsJob Mashapa, Darelle van Greunen. 170-181 [doi]
- Towards energy efficient mobile communicationsMoshe T. Masonta, Mjumo Mzyece, Ntsibane Ntlatlapa. 182-186 [doi]
- The impact of accents on automatic recognition of South African English speech: a preliminary investigationAudrey Mbogho, Michelle Katz. 187-192 [doi]
- Sweetening the medicine: educating users about information security by means of game playThomas Monk, Johan Van Niekerk, Rossouw von Solms. 193-200 [doi]
- Integrated security framework for low cost RFID tagsMark Muwanguzi, Elmarie Biermann. 201-208 [doi]
- A data lineage model for distributed sub-image processingJohnson Mwebaze, John McFarland, Danny Booxhorn, Edwin Valentijn. 209-219 [doi]
- A framework for benchmarking FA-based string recognizersErnest Ketcha Ngassam, Derrick G. Kourie, Bruce W. Watson. 220-230 [doi]
- Parallel packet classification using GPU co-processorsAlastair Nottingham, Barry Irwin. 231-241 [doi]
- Performance of C++ bit-vector implementationsVreda Pieterse, Derrick G. Kourie, Loek G. Cleophas, Bruce W. Watson. 242-250 [doi]
- An empirical study into the structure of heuristic combinations in an evolutionary algorithm hyper-heuristic for the examination timetabling problemNelishia Pillay. 251-257 [doi]
- A study into the use of hyper-heuristics to solve the school timetabling problemNelishia Pillay. 258-264 [doi]
- A South African perspective of the international discourse about women in information technologyHendrik Willem Pretorius, Carina De Villiers. 265-274 [doi]
- Using eye tracking to compare how adults and children learn to use an unfamiliar computer gameMarco Pretorius, Helene Gelderblom, Bester Chimbo. 275-283 [doi]
- Qualitative techniques for evaluating enterprise resource planning (ERP) user interfacesBrenda Scholtz, Charmain Cilliers, André P. Calitz. 284-293 [doi]
- A virtual VLSI architecture for computer hardware evolutionFarouk Smith. 294-303 [doi]
- Critical success factors for information systems outsourcing management: a software development lifecycle viewHanlie Smuts, Alta van der Merwe, Paula Kotzé, Marianne Loock. 304-313 [doi]
- Design and evaluation of a multimodal interface for in-car communication systemsPatrick Tchankue, Dieter Vogts, Janet Wesson. 314-321 [doi]
- Is tilt interaction better than keypad interaction for mobile map-based applications?Bradley van Tonder, Janet Wesson. 322-331 [doi]
- Determining requirements within an indigenous knowledge system of African rural communitiesHeike Winschiers-Theophilus, Nicola J. Bidwell, Shilumbe Chivuno-Kuria, Gereon Koch Kapuire. 332-340 [doi]
- Blind assessment of image blur using the Haar waveletAsheer Bachoo. 341-345 [doi]
- Toward database inference by GUI analysis: a case studyMeredith A. Barnes, Mathys C. du Plessis, Brenda Scholtz. 346-349 [doi]
- A busyness model for assigning tutors to pupils in a mobile, online tutoring system: a look at C:::3:::TOLaurie L. Butgereit, Reinhardt A. Botha. 350-355 [doi]
- Data classification for artificial intelligence construct training to aid in network incident identification using network telescope dataBradley Cowie, Barry Irwin. 356-360 [doi]
- The shortage of skilled storage professionals in South Africa and coping strategies employedDavid Denton, Irwin Brown. 361-364 [doi]
- Determining the user profile for an adaptable training platformMardé Greeff, Quentin Williams, Ronéll Alberts, Harriet Pretorius. 365-369 [doi]
- An overview of HLTs for South African Bantu languagesAditi Sharma Grover, Karen Calteaux, Gerhard van Huyssteen, Marthinus W. Pretorius. 370-375 [doi]
- Quality metrics for mashupsAgnes Koschmider, Volker Hoyer, Andrea Giessmann. 376-380 [doi]
- The management of service desk role players: a South African perspectiveAwie Leonard, Ian Strydom. 381-385 [doi]
- Numberplate detection using double segmentationPei Li, James Connan. 386-389 [doi]
- A framework for predicting droughts in developing countries using sensor networks and mobile phonesMuthoni Masinde, Antoine B. Bagula. 390-393 [doi]
- Acoustic modelling of Sepedi affricates for ASRThipe Modipa, Marelie H. Davel, Febe de Wet. 394-398 [doi]
- Toward a service creation framework: a case of intelligent semantic servicesJabu Mtsweni, Elmarie Biermann, Laurette Pretorius. 399-403 [doi]
- Wireless network deployment configurations: Dwesa marginalized area as a case studyNkanyiso Ndlovu, Nobert Rangarirai Jere, Handsome Mpofu. 404-407 [doi]
- An informed genetic algorithm for the high school timetabling problemRushil Raghavjee, Nelishia Pillay. 408-412 [doi]
- An intelligent framework for mobile devicesEvan Saunders, Jean Greyling, Lester Cowley. 413-416 [doi]
- Comparing and analyzing the computational complexity of FCA algorithmsFedor Strok, Alexey Neznanov. 417-420 [doi]
- Hybrid online-offline digital collectionsHussein Suleman, Marc Bowes, Matthew Hirst, Suraj Subrun. 421-425 [doi]
- IT moderation going greenCornè Johandia van Staden. 426-428 [doi]
- awareNet: the system design of a social networking software for disadvantaged South African schoolsRonald Wertlen, Richard Strickland. 429-433 [doi]
- CSFs for decision-making support systems: an IS practitioner-researcher perspectiveUdo Richard Averweg. 434-435 [doi]