[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1145675acmotherconferencesBook PagePublication PageshtConference Proceedingsconference-collections
SAICSIT '05: Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
2005 Proceeding
Publisher:
  • South African Institute for Computer Scientists and Information Technologists
  • P. O. Box 392
  • South Africa
Conference:
SAICSIT '05: IT research in developing countries White River South Africa September 20 - 22, 2005
ISBN:
978-1-59593-258-7
Published:
20 July 2005

Reflects downloads up to 01 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

This is the 20th Annual conference of South Africa's Institute of Computer Scientists and Information Technologists. It is thus fitting to reflect a bit on our history. In 1982, twelve good men and true (including one woman) got together over a (few) bottles of wine and decided to form a scientific body dedicated to promoting the interests of computing research in this country. The people were:Stef Postma (RAU), Judith Bishop (Wits), Pierre Visser, Gideon De Kock (UPE), Niek du Plooy (CSIR), Doug Laing (IBM), Ken MacGregor (UCT), Phil Roets (NRIMS), Trevor Turton (IBM), Gerrit Wiechers (UNISA), Trevor Winer, Roelf van den Heever (UP) and Derrick Kourie (UP).The enduring legacy of this group of legends in computing has been the SA Computer Journal, and the Annual SAICSIT conference. Each year the conference chair chooses a theme for the conference, and this year "Research in a changing world" aptly sums up where we are now, and where we want to be. We live in a world of rapid technological, economic and social change, and to foster world class research in this environment is both the Institute's aim and challenge. Fittingly, this year's conference was marked by several real changes.Paper submission and entry were handled by the conference system. 60 submissions were received and 30 full papers were chosen after a stringent refereeing process which involved three referees per paper from an internationally representative programme committee, plus an online discussion to select the top papers, and a second round of checking that the referees' comments had been adhered to. For many on both sides of refereeing, such care and control was quite new, and I salute everyone who adapted so easily to the system --- the 22 members of the IPC, the 34 members of the Review Panel, and the over 150 authors. In particular, thanks are due to Dirk Peters of the University of Leipzig, who ran the Paperdyne system with such technical efficiency and user-friendly support.Then we did away with the "short paper" category, as well as the student paper day, instituting instead a poster session. Ten posters were received, and they were all reviewed and accepted.

Skip Table Of Content Section
Article
The added value of eye tracking in the usability evaluation of a network management tool
Pages 1–10

Usability evaluation techniques have evolved over several years to assess the user interface of systems with regard to efficiency, interaction flexibility, interaction robustness and quality of use. The evaluation of the user's thought process is ...

Article
Emergent behaviour of aspects in high performance and distributed computing
Pages 11–19

In this paper we discuss the characteristics of Aspect Oriented Programming (AOP), and the development of new or existing applications using AOP. Aspects are emerging everywhere, and there is a particular need to introduce and practice them strategically ...

Article
Evaluating parts-of-speech taggers for use in a text-to-scene conversion system
Pages 20–28

This paper presents parts-of-speech tagging as a first step towards an autonomous text-to-scene conversion system. It categorizes some freely available taggers, according to the techniques used by each in order to automatically identify word-classes. In ...

Article
Information flows for meaningful implementation of the promotion of administrative justice act of South Africa
Pages 29–37

The Promotion of Administrative Justice Act of South Africa (AJA) requires administrators to provide those who have been negatively affected by a decision with reasonable explanations if these are requested. Fair and accountable administration is ...

Article
TABASCO: a taxonomy-based domain engineering method
Pages 38–47

We discuss TABASCO, a method for constructing Domain-Specific Toolkits (DSTs). We present TABASCO in the context of domain engineering and generative programming. We discuss the steps of TABASCO in detail, with a focus on the software construction side, ...

Article
Orthogonal axial line placement in hole free collections of rectangles
Pages 48–55

Previous research showed that the problem of finding the smallest set of orthogonal axial lines needed to cross all adjacencies between rectangles in a collection of orthogonal rectangles (ALP-OLOR) is NP-Complete. There are, however, some cases where ...

Article
A queueing network model of TCP performance
Pages 56–65

Measurement, simulation and analytical models are the techniques and tools that can be used to understand and investigate the Internet and its performance. Measurements become costly and inflexible with the growth and complexity of the Internet. ...

Article
A genetic programming system for the induction of iterative solution algorithms to novice procedural programming problems
Pages 66–77

The study presented in this paper evaluates genetic programming (GP) as a means of evolving solution algorithms to novice iterative programming problems. This research forms part of a study aimed at reducing the costs associated with developing ...

Article
Containing particles inside niches when optimizing multimodal functions
Pages 78–85

Traditionally particle swarm optimization was employed to locate a single optimal solution in a search space. The strategy can be adapted in niching algorithms to find multiple optimal solutions in a problem domain. Initially good candidate solutions ...

Article
Designing a 'universal' web application server
Pages 86–94

Modern Web server systems typically consist of a single Web server instance capable of utilising various backend technologies. For security reasons this Web server instance is run as the unprivileged user, the user 'nobody'. This has the implication of ...

Article
A framework for comparing different information security risk analysis methodologies
Pages 95–103

Organisations wanting to conduct information security risk analysis may find selecting a methodology problematic. Currently there are numerous risk analysis methodologies available, some of which are qualitative while others are more quantitative in ...

Article
Distributed proxies for browsing privacy: a simulation of flocks
Pages 104–112

In previous work we introduced an anonymising proxy scheme --- called Flocks --- to be used for browsing privacy. Flocks is similar to Crowds in that each proxy randomly decides whether to forward any request it receives to the destination Web server, or ...

Article
Towards a framework for connection anonymity
Pages 113–122

Anonymising services have evolved from simple proxies to complex systems. Numerous techniques have been developed to thwart and confuse attackers, thereby improving the degree of anonymity. These techniques are often presented as additional advantages of ...

Article
The role of key loggers in computer-based assessment forensics
Pages 123–130

When conducting a computer-based assessment in an educational environment, several infringements of assessment regulations could arise. Examples are, illegal communication (e.g. by e-mail, web or cell phone); hiding of computer objects with the aim of ...

Article
Using action research in information systems design to address change: a South African health information systems case study
Pages 131–141

This paper advocates for the use of Action Research (AR) approaches in the designing of Information Systems (IS). Following a brief overview of the history of AR as a research methodology and it's use in IS research a framework for describing the AR ...

Article
Three approaches as pillars for interpretive information systems research: development research, action research and grounded theory
Pages 142–151

This paper addresses practical approaches and models, based on the paradigm of the 'interpretivist school', to operationalise research in information systems. The study overviews research paradigms and some current issues in IS research, then describes, ...

Article
A conceptual framework for explaining the value of end user maturity levels for IT management
Pages 152–158

This paper proposes a conceptual framework of three maturity levels for the effective management of end users during systems development. The framework is based on a model that explains all the important elements involved during the establishment and ...

Article
Unifying planning and control using an OODA-based architecture
Pages 159–170

Planning and real-time control are closely related, but separate research fields. An architecture that unifies planning and control, together with related processes, is needed for autonomous systems, for military command and control (C2), for agile ...

Article
A simulation study of traffic conditioner performance
Pages 171–181

This article reports on the results of a simulation study to investigate the relative performance of five Differentiated Services traffic conditioners in a range of situation created by varying traffic patterns and subscription levels in a fixed topology ...

Article
Tracing software product line variability: from problem to solution space
Pages 182–191

The management of variability plays an important role in successful software product line engineering. There is a need for a universal variability management approach to be consistent and scalable; it should provide traceability between variations at ...

Article
The repertory grid: "discovering" a 50-year-old research technique
Pages 192–199

Empirical research in any discipline is heavily dependent on the quality of data collected and the meaning which subsequent analysis reveals. This obvious statement underlies the debates on rigor, and less directly on relevance, which recur periodically ...

Article
A cross-cultural investigation into customer satisfaction with internet banking security
Pages 200–207

Consumer Internet banking has been fairly successful in South Africa, with all major retail banks providing this service to customers. Approximately one million Internet users make use of this channel, with the profile tending to be those with higher ...

Article
Implementing mobile services: does the platform really make a difference?
Pages 208–216

This paper discusses an investigation into two different platforms for developing mobile services, namely Microsoft .NET Mobile and J2ME. A mobile student information and services (MSS) application was developed in both platforms. Comparisons were made ...

Article
The word-processing patent: a sceptical view from a person having ordinary skill in the art
Pages 217–225

In April of 2004 a patent was published by the South African patent office entitled: "Word-processing document stored in a single XML file that may be manipulated by applications that understand XML". The description refers to a word-processing program ...

Article
Design of a high resolution soft real-time timer under a Win32 operating
Pages 226–235

This article defines a real-time timer, and shows that a Win32 PC operating system does not provide a timer that fits this definition. Without a real-time timer, a true hard real-time system cannot be implemented. Not withstanding this, some companies, ...

Article
Texture detection for segmentation of iris images
Pages 236–243

The idea of using the distinct spatial distribution of patterns in the human iris for person authentication is now a widely developing technology. Current systems rely on a set of basic assumptions in order to improve the accuracy and running time of the ...

Article
Instant messaging on handhelds: an affective gesture approach
Pages 244–251

Text communication can be perceived as lacking in chat spontaneity, or plastic, due to medium limitations during interaction. A form of text messaging, Instant Messaging (IM), is now on the uptake, even on mobile handhelds. This paper presents results of ...

Article
Towards proving preservation of behaviour of refactoring of UML models
Pages 252–259

Refactoring of a design before updating and modifying software has become an accepted practice in order to prepare the design for the upcoming changes. This paper describes a refactoring of the design of a particular application to illustrate a suggested ...

Article
Enhancing adaptability of distributed groupware applications
Pages 260–267

Distributed Groupware applications must be designed to cope with an increasingly diverse set of operational conditions. The available network bandwidth and latency, the network connectivity, the number of users, the type of devices, the system load, are, ...

Article
In search of the sweet spot: agile open collaborative corporate software development
Pages 268–277

Corporate software developers are faced with many difficulties. Development windows are decreasing; scale and complexity are increasing; business requirements are vague and changing; and the underlying technology moves ever on. Agile methods have emerged ...

Contributors
  • Stellenbosch University

Index Terms

  1. Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
      Index terms have been assigned to the content through auto-classification.
      Please enable JavaScript to view thecomments powered by Disqus.

      Recommendations

      Acceptance Rates

      SAICSIT '05 Paper Acceptance Rate 28 of 62 submissions, 45%;
      Overall Acceptance Rate 187 of 439 submissions, 43%
      YearSubmittedAcceptedRate
      SAICSIT '171083936%
      SAICSIT '151194336%
      SAICSIT '13894854%
      SAICSIT '06612948%
      SAICSIT '05622845%
      Overall43918743%