This is the 20th Annual conference of South Africa's Institute of Computer Scientists and Information Technologists. It is thus fitting to reflect a bit on our history. In 1982, twelve good men and true (including one woman) got together over a (few) bottles of wine and decided to form a scientific body dedicated to promoting the interests of computing research in this country. The people were:Stef Postma (RAU), Judith Bishop (Wits), Pierre Visser, Gideon De Kock (UPE), Niek du Plooy (CSIR), Doug Laing (IBM), Ken MacGregor (UCT), Phil Roets (NRIMS), Trevor Turton (IBM), Gerrit Wiechers (UNISA), Trevor Winer, Roelf van den Heever (UP) and Derrick Kourie (UP).The enduring legacy of this group of legends in computing has been the SA Computer Journal, and the Annual SAICSIT conference. Each year the conference chair chooses a theme for the conference, and this year "Research in a changing world" aptly sums up where we are now, and where we want to be. We live in a world of rapid technological, economic and social change, and to foster world class research in this environment is both the Institute's aim and challenge. Fittingly, this year's conference was marked by several real changes.Paper submission and entry were handled by the conference system. 60 submissions were received and 30 full papers were chosen after a stringent refereeing process which involved three referees per paper from an internationally representative programme committee, plus an online discussion to select the top papers, and a second round of checking that the referees' comments had been adhered to. For many on both sides of refereeing, such care and control was quite new, and I salute everyone who adapted so easily to the system --- the 22 members of the IPC, the 34 members of the Review Panel, and the over 150 authors. In particular, thanks are due to Dirk Peters of the University of Leipzig, who ran the Paperdyne system with such technical efficiency and user-friendly support.Then we did away with the "short paper" category, as well as the student paper day, instituting instead a poster session. Ten posters were received, and they were all reviewed and accepted.
Proceeding Downloads
The added value of eye tracking in the usability evaluation of a network management tool
Usability evaluation techniques have evolved over several years to assess the user interface of systems with regard to efficiency, interaction flexibility, interaction robustness and quality of use. The evaluation of the user's thought process is ...
Emergent behaviour of aspects in high performance and distributed computing
In this paper we discuss the characteristics of Aspect Oriented Programming (AOP), and the development of new or existing applications using AOP. Aspects are emerging everywhere, and there is a particular need to introduce and practice them strategically ...
Evaluating parts-of-speech taggers for use in a text-to-scene conversion system
This paper presents parts-of-speech tagging as a first step towards an autonomous text-to-scene conversion system. It categorizes some freely available taggers, according to the techniques used by each in order to automatically identify word-classes. In ...
Information flows for meaningful implementation of the promotion of administrative justice act of South Africa
The Promotion of Administrative Justice Act of South Africa (AJA) requires administrators to provide those who have been negatively affected by a decision with reasonable explanations if these are requested. Fair and accountable administration is ...
TABASCO: a taxonomy-based domain engineering method
We discuss TABASCO, a method for constructing Domain-Specific Toolkits (DSTs). We present TABASCO in the context of domain engineering and generative programming. We discuss the steps of TABASCO in detail, with a focus on the software construction side, ...
Orthogonal axial line placement in hole free collections of rectangles
Previous research showed that the problem of finding the smallest set of orthogonal axial lines needed to cross all adjacencies between rectangles in a collection of orthogonal rectangles (ALP-OLOR) is NP-Complete. There are, however, some cases where ...
A queueing network model of TCP performance
Measurement, simulation and analytical models are the techniques and tools that can be used to understand and investigate the Internet and its performance. Measurements become costly and inflexible with the growth and complexity of the Internet. ...
A genetic programming system for the induction of iterative solution algorithms to novice procedural programming problems
The study presented in this paper evaluates genetic programming (GP) as a means of evolving solution algorithms to novice iterative programming problems. This research forms part of a study aimed at reducing the costs associated with developing ...
Containing particles inside niches when optimizing multimodal functions
Traditionally particle swarm optimization was employed to locate a single optimal solution in a search space. The strategy can be adapted in niching algorithms to find multiple optimal solutions in a problem domain. Initially good candidate solutions ...
Designing a 'universal' web application server
Modern Web server systems typically consist of a single Web server instance capable of utilising various backend technologies. For security reasons this Web server instance is run as the unprivileged user, the user 'nobody'. This has the implication of ...
A framework for comparing different information security risk analysis methodologies
Organisations wanting to conduct information security risk analysis may find selecting a methodology problematic. Currently there are numerous risk analysis methodologies available, some of which are qualitative while others are more quantitative in ...
Distributed proxies for browsing privacy: a simulation of flocks
In previous work we introduced an anonymising proxy scheme --- called Flocks --- to be used for browsing privacy. Flocks is similar to Crowds in that each proxy randomly decides whether to forward any request it receives to the destination Web server, or ...
Towards a framework for connection anonymity
Anonymising services have evolved from simple proxies to complex systems. Numerous techniques have been developed to thwart and confuse attackers, thereby improving the degree of anonymity. These techniques are often presented as additional advantages of ...
The role of key loggers in computer-based assessment forensics
When conducting a computer-based assessment in an educational environment, several infringements of assessment regulations could arise. Examples are, illegal communication (e.g. by e-mail, web or cell phone); hiding of computer objects with the aim of ...
Using action research in information systems design to address change: a South African health information systems case study
This paper advocates for the use of Action Research (AR) approaches in the designing of Information Systems (IS). Following a brief overview of the history of AR as a research methodology and it's use in IS research a framework for describing the AR ...
Three approaches as pillars for interpretive information systems research: development research, action research and grounded theory
This paper addresses practical approaches and models, based on the paradigm of the 'interpretivist school', to operationalise research in information systems. The study overviews research paradigms and some current issues in IS research, then describes, ...
A conceptual framework for explaining the value of end user maturity levels for IT management
This paper proposes a conceptual framework of three maturity levels for the effective management of end users during systems development. The framework is based on a model that explains all the important elements involved during the establishment and ...
Unifying planning and control using an OODA-based architecture
Planning and real-time control are closely related, but separate research fields. An architecture that unifies planning and control, together with related processes, is needed for autonomous systems, for military command and control (C2), for agile ...
A simulation study of traffic conditioner performance
This article reports on the results of a simulation study to investigate the relative performance of five Differentiated Services traffic conditioners in a range of situation created by varying traffic patterns and subscription levels in a fixed topology ...
Tracing software product line variability: from problem to solution space
The management of variability plays an important role in successful software product line engineering. There is a need for a universal variability management approach to be consistent and scalable; it should provide traceability between variations at ...
The repertory grid: "discovering" a 50-year-old research technique
Empirical research in any discipline is heavily dependent on the quality of data collected and the meaning which subsequent analysis reveals. This obvious statement underlies the debates on rigor, and less directly on relevance, which recur periodically ...
A cross-cultural investigation into customer satisfaction with internet banking security
Consumer Internet banking has been fairly successful in South Africa, with all major retail banks providing this service to customers. Approximately one million Internet users make use of this channel, with the profile tending to be those with higher ...
Implementing mobile services: does the platform really make a difference?
This paper discusses an investigation into two different platforms for developing mobile services, namely Microsoft .NET Mobile and J2ME. A mobile student information and services (MSS) application was developed in both platforms. Comparisons were made ...
The word-processing patent: a sceptical view from a person having ordinary skill in the art
In April of 2004 a patent was published by the South African patent office entitled: "Word-processing document stored in a single XML file that may be manipulated by applications that understand XML". The description refers to a word-processing program ...
Design of a high resolution soft real-time timer under a Win32 operating
This article defines a real-time timer, and shows that a Win32 PC operating system does not provide a timer that fits this definition. Without a real-time timer, a true hard real-time system cannot be implemented. Not withstanding this, some companies, ...
Texture detection for segmentation of iris images
The idea of using the distinct spatial distribution of patterns in the human iris for person authentication is now a widely developing technology. Current systems rely on a set of basic assumptions in order to improve the accuracy and running time of the ...
Instant messaging on handhelds: an affective gesture approach
Text communication can be perceived as lacking in chat spontaneity, or plastic, due to medium limitations during interaction. A form of text messaging, Instant Messaging (IM), is now on the uptake, even on mobile handhelds. This paper presents results of ...
Towards proving preservation of behaviour of refactoring of UML models
Refactoring of a design before updating and modifying software has become an accepted practice in order to prepare the design for the upcoming changes. This paper describes a refactoring of the design of a particular application to illustrate a suggested ...
Enhancing adaptability of distributed groupware applications
Distributed Groupware applications must be designed to cope with an increasingly diverse set of operational conditions. The available network bandwidth and latency, the network connectivity, the number of users, the type of devices, the system load, are, ...
In search of the sweet spot: agile open collaborative corporate software development
Corporate software developers are faced with many difficulties. Development windows are decreasing; scale and complexity are increasing; business requirements are vague and changing; and the underlying technology moves ever on. Agile methods have emerged ...
Index Terms
- Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
SAICSIT '17 | 108 | 39 | 36% |
SAICSIT '15 | 119 | 43 | 36% |
SAICSIT '13 | 89 | 48 | 54% |
SAICSIT '06 | 61 | 29 | 48% |
SAICSIT '05 | 62 | 28 | 45% |
Overall | 439 | 187 | 43% |