default search action
SAICSIT Conf. 2016: Johannesburg, South Africa
- Frans F. Blauw, Marijke Coetzee, Duncan Anthony Coulter, Elize M. Ehlers, Wai Sze Leung, Carl Marnewick, Dustin van der Haar:
Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, SAICSIT 2016, Johannesburg, South Africa, September 26-28, 2016. ACM 2016, ISBN 978-1-4503-4805-8 - Abejide Ade-Ibijola:
FINCHAN: A Grammar-based Tool for Automatic Comprehension of Financial Instant Messages. 1:1-1:10 - Graeme Ampeire, Lisa Seymour:
Students' Perceived ERP Competence Gains: Evidence from an African Case Study. 2:1-2:8 - Kayode Ayankoya, André P. Calitz, Jéan H. Greyling:
Using Neural Networks for Predicting Futures Contract Prices of White Maize in South Africa. 3:1-3:10 - Simlindile Abongile Bantom, Retha de la Harpe, Nkqubela Ruxwana:
Accessibility to Patients' Own Health Information: A Case in Rural Eastern Cape, South Africa. 4:1-4:9 - Tanya René Beelders, Jean-Pierre du Plessis:
The Influence of Syntax Highlighting on Scanning and Reading Behaviour for Source Code. 5:1-5:10 - Anthony Bolton, Leila Goosen, Elmarie Kritzinger:
Enterprise Digitization Enablement Through Unified Communication & Collaboration. 6:1-6:10 - Dane Brown, Karen L. Bradshaw:
Extended Feature-Fusion Guidelines to Improve Image-Based Multi-Modal Biometrics. 7:1-7:9 - Laurie L. Butgereit:
Four NoSQLs in Four Fun Fortnights: Exploring NoSQLs in a Corporate IT Environment. 8:1-8:6 - Wallace Chigona, Selina L. Mudavanhu, Adrian Siebritz, Zaid Amerika:
Domestication of Free Wi-Fi Amongst People Living in Disadvantaged Communities in the Western Cape Province of South Africa. 9:1-9:9 - Andrew Clark, Deshendran Moodley:
A System for a Hand Gesture-Manipulated Virtual Reality Environment. 10:1-10:10 - Emma Coleman:
'Real' Police Work?: Norms and Consequences of UK Police Email Use. 11:1-11:10 - Riana Crafford, Machdel Matthee:
Implementing Open Badges for Recognition of Learning Achievements in South African Organisations. 12:1-12:10 - Prittish Dala, Hein S. Venter:
Understanding the Level of Compliance by South African Institutions to the Protection of Personal Information (POPI) Act. 13:1-13:8 - Tiaan de Jager, Irwin Brown:
A Descriptive Categorized Typology of Requisite Skills for Business Intelligence Professionals. 14:1-14:10 - Estelle de Kock, Judy van Biljon, Adele Botha:
User Experience of Academic Staff in the Use of a Learning Management System Tool. 15:1-15:10 - Victor Gueorguiev, Michelle Kuttel:
Implementation, Validation and Profiling of a Genetic Algorithm for Molecular Conformational Optimization. 16:1-16:8 - Kurt Jacobs, Mehrdad Ghasiazgar, Isabella Margarethe Venter, Reg Dodds:
Hand Gesture Recognition of Hand Shapes in Varied Orientations using Deep Learning. 17:1-17:9 - Henri Knoesen, Lisa F. Seymour:
Designing a Process for Identifying and Managing the Benefits of Mobile Enterprise Applications in the Insurance Industry. 18:1-18:10 - Dumisani Kunene, Hima Vadapalli, Jaco Cronje:
Indoor Sign Recognition for the Blind. 19:1-19:9 - Timothy Lee Son, Janet Wesson, Dieter Vogts:
A Natural User Interface to Facilitate Information Sharing Among Mobile Devices in a Co-located Environment. 20:1-20:9 - Jean-Louis Leysens, Daniel B. le Roux, Douglas A. Parry:
Can I Have Your Attention, Please?: An Empirical Investigation of Media Multitasking during University Lectures. 21:1-21:10 - Mike A. Marin, Hugo Lotriet, John A. van der Poll:
Implementing Deterministic Finite State Machines using Guard-Stage-Milestone. 22:1-22:10 - Tendani Mawela, Nixon Muganda Ochara, Hossana Twinomurinzi:
E-Government Implementation: Lessons from South African Municipalities. 23:1-23:10 - Busisiwe Mbuyisa, Awie Leonard:
ICT Usage in Small and Medium Enterprises: The Impact on Poverty Reduction. 24:1-24:11 - Lucas Mimbi, Felix Olu Bankole:
Factors Influencing ICT Service Efficiency in Curbing Corruption in Africa: A Bootstrap Approach. 25:1-25:10 - Elizabeth Mkoba, Carl Marnewick:
IT Project Success: A Conceptual Framework for IT Project Auditing Assurance. 26:1-26:8 - Carrington M. Mukwasi, Lisa F. Seymour:
Customer Relationship Management in IT Service Delivery: A Practitioner-based Inquiry in a Higher Education Institution. 27:1-27:7 - Donald Munro, André P. Calitz, Dieter Vogts:
AARemu: An Outdoor Mobile Augmented Reality Emulator for Android. 28:1-28:9 - Michael J. Norman, Isabella Margarethe Venter:
Factors for Developing a Software Industry. 29:1-29:10 - Nomzamo Ntombela, Nelishia Pillay:
Evolving Construction Heuristics for the Symmetric Travelling Salesman Problem. 30:1-30:5 - Siobhan O'Donovan, James E. Gain, Brian DeRenzi:
A Comparison of Interactive Shadows and Multi-View Layouts for Mouse-based 3D Modelling. 31:1-31:10 - Arnu Pretorius, Douglas A. Parry:
Human Decision Making and Artificial Intelligence: A Comparison in the Domain of Sports Prediction. 32:1-32:10 - Carianne Pretorius:
Supporting Wicked Problems with Procedural Decision Support Systems. 33:1-33:10 - Justy Range, Awie Leonard:
LAYERS: The Link Between Governance and Self-service Technology in Supporting Trust Within Fresh Produce Markets in South Africa. 34:1-34:8 - Alfred Rudman, Malcolm Garbutt, Lisa F. Seymour:
Towards a Framework of Process Owner Competencies and Tasks. 35:1-35:7 - Ian Douglas Sanders, Colin L. Pilkington, Patricia Margaret Alexander:
The Impact of Leadership, Trust and Time on Technology Choice by Virtual Teams. 36:1-36:10 - Marthie A. Schoeman, Helene Gelderblom:
The Effect of Students' Educational Background and Use of a Program Visualization Tool in Introductory Programming. 37:1-37:10 - Sunganani Silubonde, Digby Warner, Michelle Kuttel:
Effective Visualization of Tuberculosis Three-Drug Assays: A Design Study. 38:1-38:10 - Vusi Sithole, Fritz Solms:
Synchronized Agile. 39:1-39:9 - Fritz Solms, Linda Marshall:
Contract-Based Mocking for Services-Oriented Development. 40:1-40:8 - Samuel Ssemugabi, M. R. de Villiers:
Make Your Choice: Dimensionality of an Open Integrated Conceptual Model for Evaluating E-Service Quality, Usability and User Experience (e-SQUUX) of Web-Based Applications. 41:1-41:10 - Lambertus J. Steyn, Tendani Mawela:
A Trust-based e-Commerce Decision-making Model for South African Citizens. 42:1-42:9 - Callie Thomson, Jane Nash, Anthony J. Maeder:
Persuasive Design for Behaviour Change Apps: Issues for Designers. 43:1-43:10 - Judy van Biljon, Karen Renaud:
Validating Mobile Phone Design Guidelines: Focusing on the Elderly in a Developing Country. 44:1-44:10 - Michael Waltham, Deshen Moodley:
An Analysis of Artificial Intelligence Techniques in Multiplayer Online Battle Arena Game Environments. 45:1-45:7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.