skip to main content
10.1145/1899503acmconferencesBook PagePublication PageshtConference Proceedingsconference-collections
SAICSIT '10: Proceedings of the 2010 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists
ACM2010 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SAICSIT '10: 2010 Annual Conference of the South African Institute of Computer Scientists and Information Technologists Bela Bela South Africa October 11 - 13, 2010
ISBN:
978-1-60558-950-3
Published:
11 October 2010
Sponsors:
AAIICT, NRF, ACM, CSIR, Microsoft, ASFKP-ICT, SAICSIT, Telkom, IFIP
Next Conference
September 10 - 13, 2024
Poznan , Poland
Bibliometrics
Skip Abstract Section
Abstract

You are holding the Proceedings of the 2010 Annual Research Conference of the South African Institute of Computer Scientist and Information Technologists. The creation of the Proceedings of the SAICSIT 2010 Conference is really a testament to the enthusiasm and collegial spirit amongst the computing research community in South Africa and our many friends internationally.

One of the main objectives of the South African Institute of Computer Scientist and Information Technologist is to build research capacity in our region by providing researchers with the vehicles to get feedback on, or present their research, either through a presentation at the Annual SAICSIT Conference or as a paper in the South African Computer Journal.

The last time I wrote a preface to the Proceedings of the SAICSIT Conference was in 2004. Whilst in the process of compiling the conference programme and managing the collation of the final papers for SAICSIT 2010, I could not help but notice how far we have come in the last 6 years. And I am not the only one who noticed the change: several reviewers also commented on the vast improvement in the quality of papers being submitted for review. Not only has the quality of the papers submitted improved a great deal since 2004, with the accepted full research papers of comparable standard to that of other leading international conferences, the demographics of our authors have also changed. We are progressing slowly but surely with regards to transformation. A large proportion of papers in this proceedings has one or more black authors, and the authors have gained this position not by being given special treatment, but by competing on an equal footing through a double blind peer-review process. And we have made major inroads into Africa. Where we had not a single full research paper emanating from an African author (other than South Africa) in 2004, this proceedings is filled with several African papers. Although many of the first authors list a South African university as their affiliation, they come from all over Africa: Cameroon, Democratic Republic of the Congo, Ghana, Nigeria, Uganda, Zambia, Zimbabwe, etc.

Our programme is further boosted this year by the presence of three distinguished international researchers as keynote speakers: Prof Jan Dietz, Emeritus Professor of Information Systems Design at Delft University of Technology, The Netherlands; Dr Virpi Roto, Principal Researcher at Nokia Research Center in Helsinki, Finland; and Dr Jonathan Donner, Researcher in the Technology for Emerging Markets Group (TEM) at Microsoft Research India.

The pre-conference day include the Postgraduate Symposium (where 19 masters and doctoral students will present their work), an Enterprise Architecture Knowledge Development Workshop (supported by the NRF), a Workshop on ICT Uses in Warfare and the Safeguarding of Peace, A Tutorial on User Experience (UX) presented by Dr Virpi Roto, a Tutorial on Enterprise Engineering by Prof Jan Dietz, and a Grid Computing Tutorial presented by Dr Bruce Becker, Coordinator of the South African National Grid.

research-article
The complementary role of two evaluation methods in the usability and accessibility evaluation of a non-standard system

Usability, which is generally defined in terms of application effectiveness, efficiency and user satisfaction, is one of the focus areas of human-computer interaction (HCI). Accessibility is the design of systems that can be perceived, understood and ...

research-article
Probing some theoretical aspects of practitioner-based inquiry research in information systems

Information and Communication Technologies (ICT) practitioners are often located in the social sciences branch of Information Systems (IS). Practitioner research comprises of research that practitioners undertake with a view to the advancement of their ...

research-article
Identifying annotations for adventure game generation from fiction text

Recent advancements in Text-to-Scene research have lead to the development of systems which automatically extract key concepts from the text of a fiction book and generate computer animated movies depicting the story. Extracting such annotations from ...

research-article
Mobile user experience in a mlearning environment

The purpose of this paper is to explore components that influence the Mobile User Experience (MEX) in a mlearning interaction through a review of relevant literature. The application of mobile cellular technology in education has been the focus of the ...

research-article
Panopticon: a scalable monitoring system

Monitoring systems are necessary for the management of anything beyond the smallest networks of computers. While specialised monitoring systems can be deployed to detect specific problems, more general systems are required to detect unexpected issues, ...

research-article
A four-way framework for validating a specification

The validation of a software specification may be viewed as a function of what the specification is to be used for and any comprehensive validation exercise needs to address possibly conflicting requirements. In this paper we develop a framework which ...

research-article
A mobile commerce application for rural economy development: a case study for Dwesa

Economic activities in rural areas of developing countries are usually not strong enough to impact significantly in poverty alleviation and improve rural life. These communities are often marginalized in terms of basic infrastructures; low economic ...

research-article
Mobile phone adoption: do existing models adequately capture the actual usage of older adults?

This paper investigates mobile phone adoption by older adults to better understand this user group's current level of adoption and to assess how well existing adoption models capture the acceptance levels of elderly users. The rationale is that mobile ...

research-article
Documenting open source migration processes for re-use

There are several sources that indicate a remarkable increase in the adoption of open source software (OSS) into the technology infrastructure of organizations. In fact, the number of medium to large organizations without some OSS installations, is ...

research-article
Investigating the feasibility factors of synthetic sign language visualization methods on mobile phones

The SASL project at the University of the Western Cape is in the process of creating a machine translation system on mobile phones that can automate the translation process between English and South African Sign Language (SASL). This will supplement the ...

research-article
Application usage of unsupervised digital doorway computer kiosks in remote locations in South Africa

Digital Doorways are rugged computer terminals that offer unassisted learning and peer-assisted learning of basic computer skills, as well as a range of computing activities from entertainment, through education, to independent research. Sites are ...

research-article
PH2: an hadoop-based framework for mining structural properties from the PDB database

PH2 is an Hadoop and SQL-based tool for extracting information out of the Protein Database (PDB) quickly. The PDB database is stored as a set of Hadoop sequence files in a replicated way on the Hadoop Distributed File System. PH2 then allows a user to ...

research-article
A-POInter: an adaptive mobile tourist guide

Today's mobile computing devices provide a convenient means to search for points-of-interest (POIs) such as restaurants and accommodation. These devices, however, have several design constraints including limited screen space and hardware capabilities. ...

research-article
m-Health adoption and sustainability prognosis from a care givers' and patients' perspective

The penetration of mobile phones and mobile technologies in developing countries has led to innovative developments of various m-Health applications. These applications have proven the potential of mobile technologies for improving the quality of health ...

research-article
The evaluation of an adaptive user interface model

User expertise and skill affects the way users interact with software. It is envisaged that an adaptive user interface (AUI) which dynamically changes from a novice user interface (UI) to an expert UI could possibly improve users' performance. Contact ...

research-article
Motivation and learning preferences of information technology learners in South African secondary schools

The Information Technology (IT) subject presented in South African secondary schools is considered to be a difficult subject. The programming component of IT is believed to be the main cause of this difficulty. Learners who struggle with programming are ...

research-article
Ontology goes postmodern in ICT

This paper investigates the move from philosophical ontology to information systems ontologies. Ontology has traditionally been (and still is) a philosophical discipline that studies the nature of existence. In a certain time and philosophical era, ...

research-article
Deriving a digraph isomorphism for digraph compliance measurement

Many problems in the world exists where it is necessary to compare a given implementation with a specification and provide some quantification as to whether the implementation complies with the specification. An example of such a problem is determining ...

research-article
User experience evaluation metrics for usable accounting tools

Small Medium and Micro Enterprises (SMMEs) have become active instruments for poverty alleviation, employment generation as well as economic and social development. However, SMMEs in developing countries operate under effervescent business environments ...

research-article
Towards energy efficient mobile communications

The rapid growth and development of wireless communication services and applications corresponds to an increase in associated energy consumption. For broadband wireless network deployment in rural areas affected by unreliability and unavailability of ...

research-article
The impact of accents on automatic recognition of South African English speech: a preliminary investigation

The accent with which words are spoken can have a strong effect on the performance of a speech recognition system. In a multilingual country such as South Africa where English is not the first language of most citizens, the need to address this issue is ...

research-article
Sweetening the medicine: educating users about information security by means of game play

Employees of companies are often unable to work securely, because they lack knowledge in the field of Information Security.

This paper is based on the premise that a computer game could be used to educate employees about Information Security. A game was ...

research-article
Integrated security framework for low cost RFID tags

Radio Frequency Identification (RFID) systems are becoming more popular today because of the wide area of applications. It is being used in several industries such as the transport industry, sports, medical and government institutions. Its advantages ...

research-article
A data lineage model for distributed sub-image processing

An important challenge facing e-Science is the development of scalable systems and analysis techniques that allow client applications to locate data and services in increasingly large-scale distributed environments. e-Science Systems should achieve ...

research-article
A framework for benchmarking FA-based string recognizers

Previous work on implementations of FA-based string recognizers suggested a range of implementation strategies (and therefore, algorithms) aiming at improving their performance for fast string recognition. However, an efficient exploitation of suggested ...

research-article
Parallel packet classification using GPU co-processors

In the domain of network security, packet filtering for classification purposes is of significant interest. Packet classification provides a mechanism for understanding the composition of packet streams arriving at distinct network interfaces, and is ...

research-article
Performance of C++ bit-vector implementations

This paper describes an experimental study to compare the performance of various dynamically resizable bit-vector implementations for the C++ programming language.

We compare the std::vector<bool> from the Standard Template Library (STL), boost::dynamic_...

research-article
An empirical study into the structure of heuristic combinations in an evolutionary algorithm hyper-heuristic for the examination timetabling problem

A hyper-heuristic for the examination timetabling problem searches a space of constructive heuristic combinations instead of a space of examination timetables. The most optimal heuristic combination found by the search is used to construct the ...

research-article
A study into the use of hyper-heuristics to solve the school timetabling problem

Research in the domain of school timetabling has not developed as rapidly as other areas of educational timetabling such as university course and examination timetabling. A lot of research has been conducted into using hyper-heuristics to solve the ...

research-article
A South African perspective of the international discourse about women in information technology

Currently there is a declining participation of women in Information Technology (IT) education and profession internationally. This article builds on international research - the international discourse about women in IT - by performing a critical ...

Contributors
  • University of Pretoria
  • University of Pretoria
  • University of Pretoria

Recommendations

Acceptance Rates

Overall Acceptance Rate187of439submissions,43%
YearSubmittedAcceptedRate
SAICSIT '171083936%
SAICSIT '151194336%
SAICSIT '13894854%
SAICSIT '06612948%
SAICSIT '05622845%
Overall43918743%