Personal tools
You are here: Home / SAICSIT 2010 / Accepted Papers - SAICSIT 2010
Log in


Forgot your password?
 

Accepted Papers - SAICSIT 2010

The following is the list of all the accepted papers for the SAICSIT 2010 Main Conference (both full and short reasearch papers, and industry papers) in alphabetical order by paper title:

 

A "BUSY-NESS" MODEL FOR ASSIGNING TUTORS TO PUPILS IN A MOBILE, ONLINE TUTORING SYSTEM: A LOOK AT C3TO

Laurie Butgereit and Reinhardt A Botha

 

A DATA LINEAGE MODEL FOR DISTRIBUTED SUBIMAGE PROCESSING Johnson Mwebaze, John John McFarland, Danny Booxhorn and Edwin Valentijn

 

A FOUR-WAY FRAMEWORK FOR VALIDATING A SPECIFICATION

Cyrille Dongmo and John A. van Der Poll

 

A FRAMEWORK FOR BENCHMARKING FA-BASED STRING RECOGNIZERS

Ernest Ketcha Ngassam, Derrick Kourie and Bruce Watson

 

A FRAMEWORK FOR EFFICIENT FILE TRANSFER FOR MOBILE DEVICES

Evan Saunders, Jean Greyling and Lester Cowley

 

A FRAMEWORK FOR PREDICTING DROUGHTS IN DEVELOPING COUNTRIES USING SENSOR NETWORKS AND MOBILE PHONES

Muthoni Masinde and Antoine Bagula (PhD)

 

A MOBILE COMMERCE APPLICATION FOR RURAL ECONOMY DEVELOPMENT: A CASE STUDY FOR DWESA

Edim A. Emmanuel and Muyingi HN

 

A SOUTH AFRICAN PERSPECTIVE OF THE INTERNATIONAL DISCOURSE ABOUT WOMEN IN INFORMATION TECHNOLOGY

Hendrik Willem Pretorius and Carina de Villiers

 

A STUDY INTO THE USE OF HYPER-HEURISTICS TO SOLVE THE SCHOOL TIMETABLING PROBLEM

Nelishia Pillay

 

A VIRTUAL VLSI ARCHITECTURE FOR COMPUTER HARDWARE EVOLUTION

Farouk Smith

 

ACOUSTIC MODELLING OF SEPEDI AFFRICATES FOR ASR

Thipe Modipa, Febe De Wet and Marelie Davel

 

AN EMPIRICAL STUDY INTO THE STRUCTURE OF HEURISTIC COMBINATIONS IN AN EVOLUTIONARY ALGORITHM HYPER-HEURISTIC FOR THE EXAMINATION TIMETABLING PROBLEM

Nelishia Pillay

 

AN INFORMED GENETIC ALGORITHM FOR THE HIGH SCHOOL TIMETABLING PROBLEM

Rushil Raghavjee and Nelishia Pillay

 

AN OVERVIEW OF HLTS FOR SOUTH AFRICAN BANTU LANGUAGES

Aditi Sharma Grover, Karen Calteaux, Gerhard van Huyssteen and

Marthinus Pretorius

 

APOINTER: AN ADAPTIVE MOBILE TOURIST GUIDE

Ryan Hill and Janet Wesson

 

APPLICATION USAGE OF UNSUPERVISED DIGITAL DOORWAY COMPUTER KIOSKS IN REMOTE LOCATIONS IN SOUTH AFRICA.

Kim Gush and Ruth de Villiers

 

AWARENET: SOCIAL NETWORKING FOR DISADVANTAGED SOUTH AFRICAN SCHOOLS

Ronald Roman Robert Wertlen and Richard Strickland

 

BLIND ASSESSMENT OF IMAGE BLUR USING THE HAAR WAVELET

Asheer Kasar Bachoo

 

COMPARING AND ANALYZING THE COMPUTATIONAL COMPLEXITY OF FCA ALGORITHMS

Fedor Strok and Alexey Neznanov

 

CRITICAL SUCCESS FACTORS FOR INFORMATION SYSTEMS OUTSOURCING MANAGEMENT: A SOFTWARE DEVELOPMENT LIFECYCLE VIEW

Hanlie Smuts, Alta van der Merwe, Paula Kotze and Marianne Loock

 

CSFS FOR DECISION-MAKING SUPPORT SYSTEMS: AN IS PRACTITIONER-RESEARCHER PERSPECTIVE

Udo Richard Averweg

 

DATA CLASSIFICATION FOR NEURAL CLASSIFIER TRAINING TO AID IN NETWORK INCIDENT IDENTIFICATION

Bradley Cowie and Barry Irwin

 

DERIVING A DIGRAPH ISOMORPHISM FOR DIGRAPH COMPLIANCE MEASUREMENT

Linda Marshall and Derrick Kourie

 

DESIGN AND EVALUATION OF A MULTIMODAL INTERFACE FOR IN-CAR COMMUNICATION SYSTEMS

Patrick Tchankue, Dieter Vogts and Janet Wesson

 

DETERMINING REQUIREMENTS WITHIN AN INDIGENOUS KNOWLEDGE SYSTEM OF AFRICAN RURAL COMMUNITIES

Heike Winschiers-Theophilus, Nicola J Bidwell, Shilumbe Chivuno-Kuria

and Gereon Koch Kapuire

 

DETERMINING THE USER PROFILE FOR AN ADAPTABLE TRAINING PLATFORM

Marde Greeff, Quentin Williams, Ronell Alberts and Riette Pretorius

 

DOCUMENTING OPEN SOURCE MIGRATION PROCESSES FOR RE-USE.

Aurona Gerber, Onkgopotse Molefe and Alta van der Merwe

 

FACTORS INFLUENCING THE SHORTAGE OF SKILLED STORAGE PROFESSIONALS IN SOUTH AFRICA AND COPING STRATEGIES EMPLOYED

David Denton and Irwin Brown

 

HYBRID ONLINE-OFFLINE DIGITAL COLLECTIONS

Hussein Suleman, Marc Bowes, Matthew Hirst and Suraj Subrun

 

IDENTIFYING ANNOTATIONS FOR ADVENTURE GAME GENERATION FROM FICTION TEXT

Ross Berkland and Shaun Bangay

 

IMPROVING HEALTH CARE AT EHHC WITH SAP IS-H AND I.S.H.MED

Barbara Kegelaer and Monika Calitz

 

INTEGRATED SECURITY FRAMEWORK FOR LOW COST RFID TAGS

Mark Muwanguzi and Elmarie Biermann

 

INVESTIGATING THE FEASIBILITY FACTORS OF SYNTHETIC SIGN LANGUAGE VISUALIZATION METHODS ON MOBILE PHONES

Mehrdad Ghaziasgar and James Connan

 

IS TILT INTERACTION BETTER THAN KEYPAD INTERACTION FOR MOBILE MAP-BASED APPLICATIONS?

Bradley van Tonder and Janet Wesson

 

IT MODERATION GOING GREEN!

Cornè Johandia van Staden

 

M-HEALTH ADOPTION AND SUSTAINABILITY PROGNOSIS FROM A CARE GIVERS’ AND PATIENTS’ PERSPECTIVE

Boroto Hwabamungu and Quentin Williams

 

MOBILE PHONE ADOPTION: DO EXISTING MODELS ADEQUATELY CAPTURE THE ACTUAL USAGE OF OLDER ADULTS?

Helene Gelderblom, Tobie van Dyk and Judy van Biljon

 

MOBILE USER EXPERIENCE IN A MLEARNING ENVIRONMENT

Adele Botha, Marlien Herselman and Darelle Van Greunen

 

MOTIVATION AND LEARNING PREFERENCES OF INFORMATION TECHNOLOGY LEARNERS IN SOUTH AFRICAN SECONDARY SCHOOLS

Melisa Koorsse, Charmain Cilliers and Andre Calitz

 

NUMBERPLATE DETECTION USING DOUBLE SEGMENTATION

Pei Li and James Connan

 

ON THE SUITABILITY OF QUALITY METRICS FOR MASHUPS

Agnes Koschmider, Volker Hoyer and Andrea Fuchsloch

 

ONTOLOGY GOES POSTMODERN IN ICT

Jan H. Kroeze

 

PANOPTICON: SCALABLE MONITORING SYSTEM

Duncan Clough, Stefano Rivera, Michelle Kuttel, Vincent Geddes and

Patrick Marais

 

PARALLEL PACKET CLASSIFICATION USING GPU CO-PROCESSORS

Alastair Nottingham and Barry Irwin

 

PERFORMANCE OF C++ BIT-VECTOR IMPLEMENTATIONS

Vreda Pieterse, Derrick G Kourie, Loek Cleophas and Bruce Watson

 

PH2: AN HADOOP-BASED FRAMEWORK FOR MINING STRUCTURAL PROPERTIES FROM THE PDB DATABASE

Scott Hazelhurst

 

PROBING SOME THEORETICAL ASPECTS OF PRACTITIONER-BASED INQUIRY RESEARCH IN INFORMATION SYSTEMS

Udo Richard Averweg and Jan Hendrik Kroeze

 

QUALITATIVE TECHNIQUES FOR EVALUATING ENTERPRISE RESOURCE PLANNING (ERP) SOFTWARE INTERFACES

Brenda Scholtz, Charmain Cilliers and Andre Calitz

 

SWEETING THE MEDICINE: EDUCATING USERS ABOUT INFORMATION SECURITY BY MEANS OF GAME PLAY

Thomas Monk, Johan van Niekerk and Rossouw von Solms

 

THE COMPLEMENTARY ROLE OF TWO EVALUATION METHODS IN THE USABILITY AND ACCESSIBILITY EVALUATION OF A NON-STANDARD SYSTEM

Funmi Adebesin, Paula Kotze and Helene Gelderblom

 

THE EVALUATION OF AN ADAPTIVE USER INTERFACE MODEL

Bronwin Jason, Andre Calitz and Jean Greyling

 

THE IMPACT OF ACCENTS ON AUTOMATIC RECOGNITION OF SOUTH AFRICAN ENGLISH SPEECH: A PRELIMINARY INVESTIGATION

Audrey Mbogho and Michelle Katz

 

THE MANAGEMENT OF SERVICE DESK ROLE PLAYERS: A SOUTH AFRICAN PERSPECTIVE

Awie Leonard and Ian Strydom

 

TOWARD A SERVICE CREATION FRAMEWORK: A CASE OF INTELLIGENT SEMANTIC SERVICES

Jabu Mtsweni, Elmarie Biermann and Laurette Pretorius

 

TOWARDS DATABASE INFERENCE BY GUI ANALYSIS: A CASE STUDY

Meredith Barnes, Mathys C du Plessis and Brenda Scholtz

 

TOWARDS ENERGY EFFICIENT MOBILE COMMUNICATIONS

Moshe Timothy Masonta, Mjumo Mzyece and Ntsibane Ntlatlapa

 

USER EXPERIENCE EVALUATION METRICS FOR USABLE ACCOUNTING TOOLS

Job Mashapa and Darelle van Greunen

 

USING EYE TRACKING TO COMPARE HOW ADULTS AND CHILDREN LEARN TO USE AN UNFAMILIAR COMPUTER GAME

Marco Pretorius, Helene Gelderblom and Bester Chimbo

 

WIRELESS NETWORK DEPLOYMENT CONFIGURATIONS: DWESA RURAL MARGINALIZED AREA AS A CASE STUDY

Nkanyiso Ndlovu, Nobert Jere and Handsome Mpofu

 

Document Actions