skip to main content
10.1145/1292491acmotherconferencesBook PagePublication PageshtConference Proceedingsconference-collections
SAICSIT '07: Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
ACM2007 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SAICSIT '07: 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists Port Elizabeth South Africa October 2 - 3, 2007
ISBN:
978-1-59593-775-9
Published:
02 October 2007
Sponsors:
Telcom, Microsoft, COE
Next Conference
September 10 - 13, 2024
Poznan , Poland
Bibliometrics
Skip Abstract Section
Abstract

The South African Institute of Computer Scientists and Information technologists (SAICSIT) has, over the past number of years, developed into a highly acclaimed and respected forum for exchanging and sharing knowledge. The annual SAICSIT conference has gained recognition not only in South Africa, but also internationally.

At this year's conference, much like previous years, we strived to provide an opportunity for academics in Computer Science, Information Systems and information Technology to review, present and discuss research in their fields. We also actively tried to enlarge the international participation in the conference, specifically as far as the programme committee was concerned. We would like to thank the international reviewers for their effort. We trust that the Programme Committee will remain involved in the conference and will advertise the work and opportunities provided by the SAICSIT conference in their fields of influence.

This year's conference is broken into two parts: a main conference of which this is the proceedings, as well as a post-graduate Research Symposium aimed at supporting young researchers from a capacity building perspective. The main conference received 61 submissions of which 23 were accepted for presentation at the conference, resulting in a 38% acceptance rate. All papers were subjected to a peer-review process with each paper receiving a minimum of three reviews from the international programme. We have no doubt that the process yielded papers of high quality and would like to thank the reviewers for their efforts in this regards

Skip Table Of Content Section
Article
Peepholes with no strings attached: using image processing as input in camera-phones

Peepholes are virtual windows to large workspaces. Using a peephole provides an intuitive interface onto information spaces too large to be viewed on the screen of a mobile device. To date, these peephole systems have relied on tethered tracking devices ...

Article
A probabilistic movement model for shortest path formation in virtual ant-like agents

We propose a probabilistic movement model for controlling ant-like agents foraging between two points. Such agents are all identical, simple, autonomous and can only communicate indirectly through the environment. These agents secrete two types of ...

Article
Constraint-based conversion of fiction text to a time-based graphical representation

This paper presents a method for converting unrestricted fiction text into a time-based graphical form. Key concepts extracted from the text are used to formulate constraints describing the interaction of entities in a scene. The solution of these ...

Article
Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment

The importance of properly securing an organization's information and computing resources has become paramount in modern business. Intrusion detection systems in particular have an increasingly valuable role to play: as networks grow and more ...

Article
A model to assess the benefit value of knowledge management in an IT service provider environment

In recent years, intensive debate has raged over the significance of knowledge management within the business context. The adoption of knowledge management as a business imperative has relied heavily on its ability to deliver tangible value to ...

Article
Simulating adversarial interactions between intruders and system administrators using OODA-RR

Intrusion in information systems is a major problem in security management. Present-day intrusion detection systems detect attacks too late to counter them in real-time. Several authors in the digital forensics literature have proposed using Boyd's ...

Article
Assessment of a framework to compare software development methodologies

A decision-supporting framework was applied in a pilot study to assist in the decision making about what software development methodology to use at a software engineering company. This paper critically assesses this decision making process and framework ...

Article
Supporting CS1 with a program beacon recognition tool

Reading and understanding algorithms is not an easy task and often neglected by educators in an introductory programming course. One proposed solution to this problem is the incorporation of a technological support tool to aid program comprehension in ...

Article
Design principles for a virtual multiprocessor

The case for chip multiprocessor (CMP) or multicore designs is strong, and increasingly accepted as evidenced by the growing number of commercial multicore designs. However, there is also some evidence that the quest for instruction-level parallelism, ...

Article
Evolving pushdown automata

The research presented in this paper evaluates genetic programming (GP) as a means of evolving pushdown automata. Each pushdown automaton is represented as a directed graph. Tournament selection is used to select parents during each generation and the ...

Article
Dynamic role allocation for small search engine clusters

Search engines facilitate efficient discovery of information in large information environments such as the Web. As the amount of information rapidly increases, search engines require greater computational resources. Similarly, as the user base increases ...

Article
Providing a holistic perspective to evaluating e-service quality in web-based systems: a multi-stakeholder approach

Over a period spanning approximately twenty five years IS researchers have been plagued by the problem of how to evaluate IS effectiveness or success. After the advent of the WWW in the 1990s, questions have arisen regarding the relevance of previously ...

Article
Agile software development: a contemporary philosophical perspective

This paper critically evaluates the use of revolutionary and evolutionary theories of scientific method, respectively those of two prominent 20th century philosophers, Thomas Kuhn and Karl Popper, to account for change in software engineering ...

Article
A hybrid approach to automatic programming for the object-oriented programming paradigm

This paper describes a first attempt at automatically inducing object-oriented programs. The system implemented for this purpose uses a rule-based expert system to firstly derive an object-oriented design (OOD) for the problem instance. Input to the ...

Article
Identity and access management for the distribution of social grants in South Africa

Identity and Access Management (IAM) is an emerging solution for authenticating and authorising individuals. This begins with determining an individual's 'identity' through identification and verification processes. Then it becomes vital for every ...

Article
A comparative study of two usability evaluation methods using a web-based e-learning application

Usability evaluation of e-learning applications is a maturing area, which addresses interfaces, usability and interaction from human-computer interaction (HCI) and pedagogy and learning from education. The selection of usability evaluation methods (UEMs)...

Article
An ontology-based, multi-modal platform for the inclusion of marginalized rural communities into the knowledge society

With the information revolution that promises to shape the 21st century, knowledge has become the prime commodity, very much like land, means of production and capital have been at different times in the past. Access to information, made instantly ...

Article
Modelling the factors that influence mobile phone adoption

Technology adoption models specify a pathway of technology acceptance from external variables to beliefs, intentions, adoption and actual usage. Mobile phone adoption has been studied from a variety of perspectives, including sociology, computer-...

Article
Criteria used in selecting effective requirements elicitation procedures

New methods, methodologies and procedures are often introduced within information systems without discussing the effectiveness thereof. We investigate the effectiveness of a requirements elicitation procedure for deriving process model structures. There ...

Article
Generic process model structures: towards a standard notation for abstract representations

The identification of process model structures is usually complex and costly. If these structures can be reused across boundaries, this could not only benefit the internal structure of one application domain, but could also benefit organizations where ...

Article
SQL's revoke with a view on privacy

Protecting access to data that can be linked to an individual (or personal identifiable information (PII)), thereby seeking to protect the individual's privacy can be accomplished through legislation, organisational safeguards, and technology. Of ...

Article
KernTune: self-tuning Linux kernel performance using support vector machines

Self-tuning has been an elusive goal for operating systems and is becoming a pressing issue for modern operating systems. Well-trained system administrators are able to tune an operating system to achieve better system performance for a specific system ...

Article
Examining the influence of demographic factors on internet users' information privacy concerns

One of the key factors affecting the growth of e-commerce is the lack of Internet users' confidence in online information privacy. Despite the importance of understanding the nature of the Internet users' concerns for information privacy, this topic is ...

Contributors
  • Nelson Mandela University
  • Nelson Mandela University

Recommendations

Acceptance Rates

Overall Acceptance Rate187of439submissions,43%
YearSubmittedAcceptedRate
SAICSIT '171083936%
SAICSIT '151194336%
SAICSIT '13894854%
SAICSIT '06612948%
SAICSIT '05622845%
Overall43918743%