Browsing Research Articles (Computer Science) by Title

Browsing Research Articles (Computer Science) by Title

Sort by: Order: Results:

  • Pieterse, Vreda; Thompson, J.E. (Lisa) (Routledge, 2010-08)
    The acquisition of effective teamwork skills is crucial in all disciplines. Using an interpretive approach, this study investigates collaboration and co-operation in teams of software engineering students. Teams whose ...
  • Coetzee, Marijke; Eloff, Jan H.P. (Emerald, 2005)
    Purpose – To define a framework for access control for virtual applications, enabled through web services technologies. The framework supports the loosely coupled manner in which web services are shared between partners. ...
  • Padayachee, Keshnee; Eloff, Jan H.P. (Elsevier, 2009)
    Access controls are difficult to implement and evidently deficient under certain conditions. Traditional controls offer no protection for unclassified information, such as a telephone list of employees that is unrestricted, ...
  • Kebande, V.R. (Victor); Karie, Nickson M.; Venter, H.S. (Hein) (Indonesian Society for Knowledge and Human Development, 2018)
    The unique identities of remote sensing, monitoring, self-actuating, self–adapting and self-configuring “things” in Internet of Things (IoT) has come out as fundamental building blocks for the development of “smart ...
  • Coetzee, Serena Martha; Bishop, Judith (International Journal of Geographical Information Science, 2009-09-07)
    The original purpose of addresses was to enable the correct and unambiguous delivery of postal mail. The advent of computers and more specifically geographic information systems (GIS) opened up a whole new range of ...
  • Iliopoulos, Costas S.; Kourie, Derrick G.; Mouchard, Laurent; Musombuka, Themba K.; Pissis, Solon P.; De Ridder, Corne (Elsevier, 2012-01)
    Next-generation sequencing technologies have redefined the way genome sequencing is performed. They are able to produce tens of millions of short sequences (reads), during a single experiment, and with a much lower cost ...
  • Poggiolini, Mario; Engelbrecht, Andries P. (Elsevier, 2013-08)
    The Negative Selection Algorithm developed by Forrest et al. was inspired by the way in which T-cell lymphocytes mature within the thymus before being released into the blood system. The mature T-cell lymphocytes exhibit ...
  • Reddy, Kamil; Venter, Hein S. (Elsevier, 2013-02)
    A coordinated approach to digital forensic readiness (DFR) in a large organisation requires the management and monitoring of a wide variety of resources, both human and technical. The resources involved in DFR in large ...
  • Ras, D.J.; Venter, H.S. (Hein) (AOSIS Open Journals, 2016)
    Cloud systems have to deal with massive amounts of distributed, volatile data which makes forensic investigations difficult. Using the NIST reference architecture, a system is devised to proactively capture forensic data ...
  • Pillay, Nelishia; Qu, Rong; Srinivasan, Dipti; Hammer, Barbara; Sorensen, Kenneth (Institute of Electrical and Electronics Engineers, 2018-05)
    The three articles in this special section focus on the development of automated design of machine learning and search algorithms. There is a demand, especially from industry and business, to automate the design of machine ...
  • Pillay, Nelishia; Özcan, Ender (Springer, 2017-09)
    Construction heuristics play an important role in solving combinatorial optimization problems. These heuristics are usually used to create an initial solution to the problem which is improved using optimization techniques ...
  • Omran, Mahamed G.H.; Engelbrecht, Andries P.; Salman, Ayed (Elsevier, 2008-07)
    The barebones differential evolution (BBDE) is a new, almost parameter-free optimization algorithm that is a hybrid of the barebones particle swarm optimizer and differential evolution. Differential evolution is used to ...
  • Helbig, Marde; Engelbrecht, Andries P. (Association for Computing, 2014-01)
    Algorithms that solve Dynamic Multi-Objective Optimisation Problems (DMOOPs) should be tested on benchmark functions to determine whether the algorithm can overcome specific difficulties that can occur in real-world problems. ...
  • Pieterse, Heloise; Olivier, Martin S. (Elsevier, 2014-09)
    Bluetooth is popular technology for short-range communications and is incorporated in mobile devices such as smartphones, tablet computers and laptops. Vulnerabilities associated with Bluetooth technology led to improved ...
  • Oldewage, E.T. (Elre); Engelbrecht, Andries P.; Cleghorn, Christopher Wesley (Springer, 2018-10)
    This paper investigates the use of boundary constraint handling mechanisms to prevent unwanted particle roaming behaviour in high dimensional spaces. The paper tests a range of strategies on a benchmark for large scale ...
  • Malan, Katherine Mary; Engelbrecht, Andries P. (Springer, 2014-12)
    The focus of research in swarm intelligence has been largely on the algorithmic side with relatively little attention being paid to the study of problems and the behaviour of algorithms in relation to problems. When a ...
  • Graaff, A.J. (Alexander Jakobus); Engelbrecht, Andries P. (Springer, 2012-03)
    The network theory in immunology inspired the modelling of network based artificial immune system (AIS) models for data clustering. Current network based AIS models determine the network connectivity between artificial ...
  • Nitschke, G.S.; Schut, M.C.; Eiben, A.E. (Springer, 2009-12)
    This article presents results from an evaluation of the collective neuro-evolution (CONE)controller design method. CONE solves collective behavior tasks, and increases task performance via facilitating emergent behavioral ...
  • Vural, Ickin; Venter, Hein S. (Graz University of Technology, 2012-03-28)
    Malicious software (malware) infects large numbers of mobile devices. Once infected these mobile devices may be involved in many kinds of online criminal activity, including identity theft, unsolicited commercial SMS ...
  • Strauss, Tinus; Kourie, Derrick G.; Olivier, Martin S. (Elsevier, 2008-11)
    In this paper, the simulated performance of a number of differentiated services traffic conditioners is studied under a range of synthetic traffic conditions. The traffic conditioners are compared using two performance ...