Browsing Research Articles (Computer Science) by Issue Date

Browsing Research Articles (Computer Science) by Issue Date

Sort by: Order: Results:

  • Gruner, Stefan; Kurt, Murat; Taentzer, Gabriele (Carleton Scientific, 2000)
    Sophisticated control concepts are necessary to make the application of graph grammars feasible for practical graph grammar engineering and specification tasks. For this purpose we introduce hybrid control graphs based on ...
  • Gruner, Stefan; Mosbah, Mohamed; Bauderon, Michel (2001)
    We present a tool for the visualization of distributed computations. Special attention is payed to certain distributed algorithms which have been coded as rewriting systems. In order to study the behaviour of algorithms ...
  • Coetzee, Marijke; Eloff, Jan H.P. (Emerald, 2005)
    Purpose – To define a framework for access control for virtual applications, enabled through web services technologies. The framework supports the loosely coupled manner in which web services are shared between partners. ...
  • Izadinia, Vafa Dario; Kourie, Derrick G.; Eloff, Jan H.P. (Elsevier, 2006)
    Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its responses to targeted probes, or by listening on a ...
  • Fei, B.K.L. (Bennie Kar Leung); Eloff, Jan H.P.; Olivier, Martin S.; Venter, Hein S. (Elsevier, 2006-10)
    The dramatic increase in crime relating to the Internet and computers has caused a growing need for digital forensics. Digital forensic tools have been developed to assist investigators in conducting a proper investigation ...
  • Coetzee, Marijke; Eloff, Jan H.P. (Emerald, 2007)
    PURPOSE – This paper seeks to investigate how the concept of a trust level is used in the access control policy of a web services provider in conjunction with the attributes of users. DESIGN/METHODOLOGY/APPROACH – A ...
  • Da Veiga, A.; Martins, Nico; Eloff, Jan H.P. (College of Economic and Management Sciences, University of South Africa, 2007-04)
    Organisations need to ensure that the interaction among people, as well as between people and information technology (IT) systems, contributes to the protection of information assets. Organisations therefore need to assess ...
  • Gruner, Stefan (Computer Society of South Africa, 2007-06)
    If you follow the recent IT-related discussions in South Africa with open ears, you will certainly have heard voices complaining about a shortage of skilled staff in the IT industry and a too low output of MSc-Graduates ...
  • Coetzee, Serena Martha; Cooper, A.K. (Antony Kyle); Adam, John B. (AOSIS Open Journals, 2007-11)
    Addresses come in many forms as they have a variety of uses. In our paper we illustrate the need for standardized addresses in South Africa by describing scenarios where standardized addresses are required, or where ...
  • Burkard, Benjamin; Vogeler, Georg; Gruner, Stefan (Graz University of Technology, 2008)
    This article is a revised and extended version of [VBG, 07]. We conjecture that the digitalization of historical text documents as a basis of data mining and information retrieval for the purpose of progress in the history ...
  • Gruner, Stefan (Springer-Verlag, 2008)
    In "use cases considered harmful", Simons has analyzed the logical weaknesses of the UML use case notation and has recommended to “fix the faulty notion of dependency” (Simons: Use cases considered harmful. 29th Conference ...
  • Pieterse, Vreda; Du Toit, Cecilia Magdalena (Unisa Press, 2008)
    A major challenge to the efficacy of student team learning projects occurs when some members of a group are unable to contribute effectively to the collaborative endeavour due to their academic deficits. A graded benchmark ...
  • Gruner, Stefan (Computer Society of South Africa, 2008-06)
    No abstract available.
  • Omran, Mahamed G.H.; Engelbrecht, Andries P.; Salman, Ayed (Elsevier, 2008-07)
    The barebones differential evolution (BBDE) is a new, almost parameter-free optimization algorithm that is a hybrid of the barebones particle swarm optimizer and differential evolution. Differential evolution is used to ...
  • Northover, Mandy; Kourie, Derrick G.; Boake, Andrew B.; Gruner, Stefan; Northover, Alan (Springer, 2008-08)
    Over the past four decades, software engineering has emerged as a discipline in its own right, though it has roots both in computer science and in classical engineering. Its philosophical foundations and premises are not ...
  • Lo, Johnny Li-Chang; Bishop, Judith; Eloff, Jan H.P. (Elsevier, 2008-10)
    Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However, SMS does not guarantee confidentiality and ...
  • Strauss, Tinus; Kourie, Derrick G.; Olivier, Martin S. (Elsevier, 2008-11)
    In this paper, the simulated performance of a number of differentiated services traffic conditioners is studied under a range of synthetic traffic conditions. The traffic conditioners are compared using two performance ...
  • Bihina Bella, M.A. (Madeleine Adrienne); Eloff, Jan H.P.; Olivier, Martin S. (Elsevier, 2009)
    This paper proposes an original architecture for a fraud management system (FMS) for convergent. Nextgeneration networks (NGNs), which are based on the Internet protocol (IP). The architecture has the potential to satisfy ...
  • Padayachee, Keshnee; Eloff, Jan H.P. (Elsevier, 2009)
    Access controls are difficult to implement and evidently deficient under certain conditions. Traditional controls offer no protection for unclassified information, such as a telephone list of employees that is unrestricted, ...
  • Nicholls, Gareth; Kourie, Derrick G.; Strauss, Tinus (Computer Society of South Africa, 2009-07)
    This study examines the effects of location inaccuracies on two movement-assisted Voronoi-based sensor deployment and reconfiguration algorithms, VEC and VOR, due to Wang et al. For the purposes of examining the extent ...