Browsing Research Articles (Computer Science) by Title

Browsing Research Articles (Computer Science) by Title

Sort by: Order: Results:

  • Gruner, Stefan; Mosbah, Mohamed; Bauderon, Michel (2001)
    We present a tool for the visualization of distributed computations. Special attention is payed to certain distributed algorithms which have been coded as rewriting systems. In order to study the behaviour of algorithms ...
  • Karie, Nickson M.; Venter, H.S. (Hein) (Wiley-Blackwell, 2014-09)
    Ontologies are widely used in different disciplines as a technique for representing and reasoning about domain knowledge. However, despite the widespread ontology-related research activities and applications in different ...
  • Takada, Shingo; Cuadros-Vargas, Ernesto; Impagliazzo, John; Gordon, Steven; Marshall, Linda; Topi, Heikki; Van der Veer, Gerrit; Waguespack, Leslie (Springer, 2020-09)
    Various computing subdisciplines, such as computer science and software engineering, each have their own curricular guidelines. They can be very difficult to understand and compare for people such as prospective students, ...
  • Ismaila, Idris.; Legbo, Victor Y.; Ikuesan, Adeyemi Richard; Imavah, Shaka A.; Mohammad, Abdullahi B.; Abduldayan, Fatimah J.; Baba, Meshach. (Blue Eyes Intelligence Engineering and Sciences Publication, 2019-05)
    Technology-assisted living is a growing trend in most developing nations, particularly for young-aged demographic countries, as it presents a platform for personal development and knowledge management. However, this ...
  • Cruz-Duarte, Jorge M.; Ortiz-Bayliss, Jose C.; Amaya, Ivan; Shi, Yong; Terashima-Marin, Hugo; Pillay, Nelishia (MDPI, 2020-11-17)
    Metaheuristics have become a widely used approach for solving a variety of practical problems. The literature is full of diverse metaheuristics based on outstanding ideas and with proven excellent capabilities. Nonetheless, ...
  • Solms, Fritz; Pieterse, Vreda (Springer, 2016-10)
    The automated static and dynamic assessment of programs makes it practical to increase the learning opportunities of large student classes through the regular assessment of programming assignments. Automatic assessments ...
  • Northover, Mandy; Kourie, Derrick G.; Boake, Andrew B.; Gruner, Stefan; Northover, Alan (Springer, 2008-08)
    Over the past four decades, software engineering has emerged as a discipline in its own right, though it has roots both in computer science and in classical engineering. Its philosophical foundations and premises are not ...
  • Rakitianskaia, A.S. (Anastassia Sergeevna); Engelbrecht, Andries P. (Springer, 2012-09)
    Particle swarm optimisation has been successfully applied to train feedforward neural networks in static environments.Many real-world problems to which neural networks are applied are dynamic in the sense that the ...
  • Scheepers, Christiaan; Engelbrecht, Andries P. (Springer, 2016-02)
    A new competitive coevolutionary team-based particle swarm optimiser (CCPSO(t)) algorithm is developed to train multi-agent teams from zero knowledge. The CCPSO(t) algorithm is applied to train a team of agents to play ...
  • Izadinia, Vafa Dario; Kourie, Derrick G.; Eloff, Jan H.P. (Elsevier, 2006)
    Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its responses to targeted probes, or by listening on a ...
  • Munkhondya, Howard; Ikuesan, Richard Adeyemi; Singh, Avinash; Venter, H.S. (Hein) (Elsevier, 2023)
    Software-Defined Networking (SDN) is an evolutionary networking paradigm that offers simplified and agile network configuration and management capabilities. However, embracing this new and futuristic paradigm requires the ...
  • Louis, A.L.; Engelbrecht, Andries P. (Elsevier, 2011-04)
    This paper addresses the problem of analysing textual data for evidence discovery.A novel framework in which to perform evidence discovery is proposed in order to reduce the quantity of data to be analysed, aid the analysts’ ...
  • Solms, Fritz; Loubser, Dawid (Springer, 2010-01)
    The Use Case, Responsibility Driven Analysis and Design (URDAD) methodology is a methodology for technology neutral design generating the Platform Independent Model of the Object Management Group’s Model Driven Architecture. ...
  • Marivate, Vukosi; Combrink, Herkulaas MvE (Committee on Data for Science and Technology (CODATA), 2020-05)
    The coronavirus disease (COVID-19), caused by the SARS-CoV-2 virus, was declared a pandemic by the World Health Organization (WHO) in February 2020. Currently, there are no vaccines or treatments that have been approved ...
  • Fei, B.K.L. (Bennie Kar Leung); Eloff, Jan H.P.; Olivier, Martin S.; Venter, H.S. (Hein) (Elsevier, 2006-10)
    The dramatic increase in crime relating to the Internet and computers has caused a growing need for digital forensics. Digital forensic tools have been developed to assist investigators in conducting a proper investigation ...
  • Kroeze, Christina J.; Malan, Katherine Mary (Computer Society of South Africa, 2016-12-09)
    Mobile devices such as smartphones have until now been protected by traditional authentication methods, including passwords or pattern locks. These authentication mechanisms are difficult to remember and are often disabled, ...
  • Du Plessis, M.C. (Mathys Cornelius); Engelbrecht, Andries P. (Elsevier, 2012-04)
    This paper proposes two adaptations to DynDE, a differential evolution-based algorithm for solving dynamic optimization problems. The first adapted algorithm, Competitive Population Evaluation (CPE), is a multi-population ...
  • Olivier, Martin S.; Eloff, Jan H.P.; Venter, H.S. (Hein); Botes, Mariette E. (Computer Society of South Africa, 2011-07)
    Donor funds are available for treatment of many diseases such as HIV. However, privacy constraints make it hard for donor organisations to verify that they have not sponsored the same patient twice | or sponsored a patient ...
  • Van der Walt, Estee; Eloff, Jan H.P. (Institute of Electrical and Electronics Engineers, 2018)
    There is a growing number of people who hold accounts on social media platforms (SMPs) but hide their identity for malicious purposes. Unfortunately, very little research has been done to date to detect fake identities ...
  • Graaff, A.J. (Alexander Jakobus); Engelbrecht, Andries P. (Elsevier, 2011-03)
    Many of the existing network theory based artificial immune systems have been applied to data clustering. The formation of artificial lymphocyte (ALC) networks represents potential clusters in the data. Although these ...