SAICSIT Conf. 2007: Port Elizabeth, South Africa
Lynette Barnard, Reinhardt A. Botha (Eds.): Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, SAICSIT Conf. 2007, Port Elizabeth, South Africa, October 2-3, 2007. ACM 2007 ACM International Conference Proceeding Series 226 ISBN 978-1-59593-775-9
Leonard Martin Ah Kun, Kuo-Hung Lee, Gary Marsden: Peepholes with no strings attached: using image processing as input in camera-phones. 1-8
Colin Chibaya, Shaun Bangay: A probabilistic movement model for shortest path formation in virtual ant-like agents. 9-18
Kevin R. Glass, Shaun Bangay: Constraint-based conversion of fiction text to a time-based graphical representation. 19-28
Robert Gavin Goss, Martin Botha, Rossouw von Solms: Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment. 29-35
Surendren S. Govender, Dalenca Pottas: A model to assess the benefit value of knowledge management in an IT service provider environment. 36-45
T. J. Grant, H. S. Venter, Jan H. P. Eloff: Simulating adversarial interactions between intruders and system administrators using OODA-RR. 46-55
Riaan Klopper, Stefan Gruner, Derrick G. Kourie: Assessment of a framework to compare software development methodologies. 56-65
Ronald Leppan, Charmain Cilliers, Marinda Taljaard: Supporting CS1 with a program beacon recognition tool. 66-75
Philip Machanick: Design principles for a virtual multiprocessor. 76-82
Ndapandula Nakashole, Hussein Suleman, Calvin Pedzai: Dynamic role allocation for small search engine clusters. 91-96
Herschel Nomdoe, Shaun Pather: Providing a holistic perspective to evaluating e-service quality in web-based systems: a multi-stakeholder approach. 97-105
Mandy Northover, Alan Northover, Stefan Gruner, Derrick G. Kourie, Andrew Boake: Agile software development: a contemporary philosophical perspective. 106-115
Nelishia Pillay, Caryl K. A. Chalmers: A hybrid approach to automatic programming for the object-oriented programming paradigm. 116-124
Gideon Ranga, Stephen Flowerday: Identity and access management for the distribution of social grants in South Africa. 125-131
Samuel Ssemugabi, Ruth de Villiers: A comparative study of two usability evaluation methods using a web-based e-learning application. 132-142
Mamello Thinyane, Lorenzo Dalvit, Hannah Slay, Thandeka Mapi, Alfredo Terzoli, Peter Clayton: An ontology-based, multi-modal platform for the inclusion of marginalized rural communities into the knowledge society. 143-151
Alta van der Merwe, Paula Kotzé: Criteria used in selecting effective requirements elicitation procedures. 162-171
Alta van der Merwe, Paula Kotzé, Aurona Gerber: Generic process model structures: towards a standard notation for abstract representations. 172-180
Long Yi, James Connan: KernTune: self-tuning Linux kernel performance using support vector machines. 189-196
Tomasz Zukowski, Irwin Brown: Examining the influence of demographic factors on internet users' information privacy concerns. 197-204



