Computer Science

Computer Science

Recent Submissions

  • Kebande, V.R. (Victor); Karie, Nickson M.; Venter, H.S. (Hein) (Indonesian Society for Knowledge and Human Development, 2018)
    The unique identities of remote sensing, monitoring, self-actuating, self–adapting and self-configuring “things” in Internet of Things (IoT) has come out as fundamental building blocks for the development of “smart ...
  • Kebande, V.R. (Victor); Karie, Nickson M.; Venter, H.S. (Hein) (Indonesian Society for Knowledge and Human Development, 2018)
    For every contact made on a digital device, a trace is left behind; this means that every digital device contains some form of electronic evidence that may be associated to the behaviour of the users in a given environment. ...
  • Van der Walt, Estee; Eloff, Jan H.P.; Grobler, Jacomine (Elsevier, 2018-09)
    Social media platforms allow billions of individuals to share their thoughts, likes and dislikes in real-time, without any censorship. This freedom, however, comes at a cyber-security risk. Cyber threats are more difficult ...
  • Ernsberger, Dominik; Adeyemi, Ikuesan Richard; Venter, H.S. (Hein); Zugenmaier, Alf (Springer, 2018-01)
    The Integration of mouse dynamics in user authentication and authorization has gained wider research attention in the security domain, specifically for user identification. However, same cannot be said for user identification ...
  • Van Staden, Ruan Ruan (University of Pretoria, 2018)
    Email forensic investigations rely on the collection and analysis of digital forensic evidence collected from email systems. Problems arise when the digital forensic evidence needed for the email forensic investigation is ...
  • Trenwith, Philip Mauritz (University of Pretoria, 2018)
    The cloud has exacerbated the difficulty of digital forensic investigations because data may be spread over an ever-changing set of hosts and data centers. The normal search and seizure approach digital forensic investigators ...
  • Oldewage, Elre Talea (University of Pretoria, 2018)
    Particle swarm optimisation (PSO) is a stochastic, population-based optimisation algorithm. PSO has been applied successfully to a variety of domains. This thesis examines the behaviour of PSO when applied to high dimensional ...
  • Kebande, Victor Rigworo (University of Pretoria, 2018)
    The ubiquity of the cloud has accelerated an abundance of modern Information and Communication Technology (ICT)-based technologies to be built based on the cloud infrastructures. This has increased the number of internet ...
  • Gruner, Stefan (University of Wollongong (Australia), 2016-12)
    This paper recapitulates some of the most important thoughts and aspects of the early and almost forgotten computer- and informatics-philosophy by the Austrian computer pioneer Heinz Zemanek (1920-2014). From a practical ...
  • Gruner, Stefan; Kurt, Murat; Taentzer, Gabriele (Carleton Scientific, 2000)
    Sophisticated control concepts are necessary to make the application of graph grammars feasible for practical graph grammar engineering and specification tasks. For this purpose we introduce hybrid control graphs based on ...
  • Gruner, Stefan; Mosbah, Mohamed; Bauderon, Michel (2001)
    We present a tool for the visualization of distributed computations. Special attention is payed to certain distributed algorithms which have been coded as rewriting systems. In order to study the behaviour of algorithms ...
  • Timm, Nils; Gruner, Stefan (Department of Computer Science: University of Pretoria, 2018-08-01)
    In this Technical Report we provide the proof to Theorem 1 which appears in our forthcoming article "Three-Valued Bounded Model Checking with Cause-Guided Abstraction Refinement", to appear in the journal: Science of ...
  • Timm, Nils; Gruner, Stefan; CBSoft 2014 Brazilian Conference on Software : Theory and Practice (2014 : Maceio, Brazil) untranslated (2014)
    Three-valued abstraction is an established technique in software model checking. It proceeds by generating an abstract state space model over the values true, false and unknown, where the latter value is used to represent ...
  • Gruner, Stefan (SciTePress, 2010)
    The key to mature and efficient industrial software engineering is standardisation more than an aggressive struggle for innovation only for the sake of its own. This is assumption is also held for the area of sensor networks ...
  • Harrison, Kyle Robert; Engelbrecht, Andries P.; Ombuki-Berman, Beatrice M. (Springer, 2018-09)
    Particle swarm optimization (PSO) is a population-based, stochastic search algorithm inspired by the flocking behaviour of birds. The PSO algorithm has been shown to be rather sensitive to its control parameters, and thus, ...
  • Adeyemi, Ikuesan Richard; Abd Razak, Shukor; Salleh, Mazleena; Venter, H.S. (Hein) (Indonesian Society for Knowledge and Human Development, 2017)
    User attribution, the process of identifying a human in a digital medium, is a research area that has received significant attention in information security research areas, with a little research focus on digital forensics. ...
  • Gruner, Stefan (Cosmos and History Publishing Co-op, 2017)
    Long before Alan Turing laid the foundations of the ongoing artificial intelligence project with all its computer-scientific and philosophical consequences and side effects, we can find in a short but intellectually dense ...
  • Du Plessis, Susanna H.; Pieterse, Vreda (AOSIS Open Journals, 2017)
    Mathematics is an important cornerstone to most forms of tertiary education and the quality of mathematics education an important determinant for a nation’s economic progress. We propose a study to determine the effect ...
  • Du Plessis, Susanna H.; Pieterse, Vreda (Springer, 2017-11)
    The use of a well-designed and uniform notational system is imperative to improve communication and understanding. Currently, a fairly consistent notational system is used to notate the elements of sets, but the notations ...
  • Pillay, Nelishia; Qu, Rong; Srinivasan, Dipti; Hammer, Barbara; Sorensen, Kenneth (Institute of Electrical and Electronics Engineers, 2018-05)
    The three articles in this special section focus on the development of automated design of machine learning and search algorithms. There is a demand, especially from industry and business, to automate the design of machine ...

View more