Abstract is missing.
- A comparison of different calculations for N-gram similarities in a spelling corrector for mobile instant messaging languageLaurie L. Butgereit, Reinhardt A. Botha. 1-7 [doi]
- Cooperating to buy shoes: an application of picking cycles in directed graphsI. D. Sanders. 8-16 [doi]
- Evaluating the acceleration of typical scientific problems on the GPUDale Tristram, Karen L. Bradshaw. 17-26 [doi]
- Towards a GPU accelerated virtual machine for massively parallel packet classification and filteringAlastair Nottingham, Barry Irwin. 27-36 [doi]
- A comparison of machine learning techniques for handwritten |Xam word recognitionKyle Williams, Hussein Suleman, Jorgina K. do R. Paihama. 37-46 [doi]
- Using machine learning to predict the driving context whilst drivingPatrick Tchankue, Janet Wesson, Dieter Vogts. 47-55 [doi]
- A new mapping function to improve the accuracy of a video-based eye trackerPieter J. Blignaut. 56-59 [doi]
- Using poll sheets and computer vision as an inexpensive alternative to clickersJames E. Gain. 60-63 [doi]
- Solving the 8-puzzle problem using genetic programmingKevin Igwe, Nelishia Pillay, Christopher Rae. 64-67 [doi]
- Personally identifiable information leakage through online social networksCandice Louw, Sebastiaan H. von Solms. 68-71 [doi]
- UMS-dev-sec: a proposed framework to address security concerns of UMS devicesKegomoditswe Molotsi, Bobby L. Tait. 72-76 [doi]
- Effectiveness with EEG BCIs: exposure to traditional input methods as a factor of performanceGavin J. Dollman, Lizette de Wet, Tanya René Beelders. 77-80 [doi]
- Green16: a frugal CPU architectureKevin A. Naudé. 81-84 [doi]
- Perceptions and expectations of IT service delivery post migration to a Microsoft platform at a university of technology in South AfricaNerina Reddy, Penny Singh, Doncho Petkov. 85-89 [doi]
- Googling South African academic publications: search query generation methodsM. Weideman. 90-95 [doi]
- A conceptual framework for delivering cost effective business intelligence solutions as a serviceG. M. Muriithi, J. E. Kotzé. 96-100 [doi]
- Categorizing the provision of mobile centric information access and interaction for higher educational institutionsBaldreck Chipangura. 101-110 [doi]
- Internet use and degree of flow experienced by expatriates in the Kingdom of Saudi ArabiaMarie Hattingh, Machdel Matthee, Hugo Lotriet. 111-120 [doi]
- Crowd computing: a literature review and definitionKalpana Parshotam. 121-130 [doi]
- Sustainability of e-participation through mobile technologiesTendani Mawela, Nixon Muganda Ochara. 131-143 [doi]
- A new tool for URDAD to Java EE EJB transformationsCraig Edwards, Stefan Gruner. 144-153 [doi]
- Quality and usability of mashup tools: criteria and evaluationMelusi Malinga, Stefan Gruner, Agnes Koschmider. 154-159 [doi]
- Flexible design for simple digital library tools and servicesLighton Phiri, Hussein Suleman. 160-169 [doi]
- Experiences with using the systematic method for architecture recovery (SyMAR)Fritz Solms. 170-178 [doi]
- An integrated sign language recognition systemWarren Nel, Mehrdad Ghaziasgar, James Connan. 179-185 [doi]
- Robust facial expression recognition in the presence of rotation and partial occlusionDiego Mushfieldt, Mehrdad Ghaziasgar, James Connan. 186-193 [doi]
- Robust real-time face recognitionB. Lagerwall, Serestina Viriri. 194-199 [doi]
- Numerical verification of bidirectional reflectance distribution functions for physical plausibilityBernardt Duvenhage, Kadi Bouatouch, Derrick G. Kourie. 200-208 [doi]
- Design and parametric considerations for artificial neural network pruning in UCT game playingClayton Burger, Mathys C. du Plessis, Charmain Cilliers. 209-217 [doi]
- Evaluating performance of long short-term memory recurrent neural networks on intrusion detection dataRalf C. Staudemeyer, Christian W. Omlin. 218-224 [doi]
- Knowledge management in LLiSA ICT4D projectsSue Conger. 225-232 [doi]
- An assessment of ICT challenges in rural areas: ICT experts vs rural users views: a case of the Siyakhula Living LabNobert Rangarirai Jere, Mamello Thinyane, Tlou Boikhutso, Nkanyiso Ndlovu. 233-241 [doi]
- A case study in the gamification of a university-level games development courseSiobhan O'Donovan, James E. Gain, Patrick Marais. 242-251 [doi]
- Design-based research - the educational technology variant of design research: illustrated by the design of an m-learning environmentRuth De Villiers, P. A. Harpur. 252-261 [doi]
- Ease of use and usefulness of webinars in an open distance learning environment: an activity theory perspectiveT. M. Van der Merwe, M. E. van Heerden. 262-270 [doi]
- First year student performance in a test for computational thinkingLindsey Ann Gouws, Karen L. Bradshaw, Peter Wentworth. 271-277 [doi]
- A comparative study of hyper-heuristics for solving the school timetabling problemNelishia Pillay. 278-285 [doi]
- Cooperating to buy shoes in the real world: online cycle picking in directed graphsI. D. Sanders. 286-294 [doi]
- Peak and valley detection in multimodal functions by means of 3D normal metadataGrant Blaise O'Reilly. 295-304 [doi]
- The failure of watchdog schemes in MANET security: a case of an intelligent black-holeElisha O. Ochola, Mariki M. Eloff, John A. van der Poll. 305-311 [doi]
- MIDD: an architecture for inter-domain mobile content distributionCharmain Cilliers, Lynette Barnard, Thomas Hibbers, Melisa Koorsse. 312-319 [doi]
- An integrated logical context sensor for mobile web applicationsFelix Ntawanga, André P. Calitz, Lynette Barnard. 320-330 [doi]
- Usability evaluation guidelines for business intelligence applicationsChrisna Jooste, Judy van Biljon, Jan Mentz. 331-340 [doi]
- Comparative paradigms in the examination of software productionJohn Trimble, Harry Keeling. 341-346 [doi]
- The usability of collaborative tools: application to business process modellingBrenda Scholtz, André P. Calitz, Irene Snyman. 347-358 [doi]
- Sketch-based interfaces: drawings to dataTimothy Matthews, Dieter Vogts, Kevin A. Naudé. 359-368 [doi]
- Efficient representation of DNA data for pattern recognition using failure factor oraclesLoek G. Cleophas, Derrick G. Kourie, Bruce W. Watson. 369-377 [doi]
- Hardware evolution of a digital circuit using a custom VLSI architectureAllan Edward van den Berg, Farouk Smith. 378-387 [doi]