|
Conferences in DBLP
(saicsit) 2007 (conf/saicsit/2007)
Peepholes with no strings attached: using image processing as input in camera-phones. [Citation Graph (, )][DBLP]
A probabilistic movement model for shortest path formation in virtual ant-like agents. [Citation Graph (, )][DBLP]
Constraint-based conversion of fiction text to a time-based graphical representation. [Citation Graph (, )][DBLP]
Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment. [Citation Graph (, )][DBLP]
A model to assess the benefit value of knowledge management in an IT service provider environment. [Citation Graph (, )][DBLP]
Simulating adversarial interactions between intruders and system administrators using OODA-RR. [Citation Graph (, )][DBLP]
Assessment of a framework to compare software development methodologies. [Citation Graph (, )][DBLP]
Supporting CS1 with a program beacon recognition tool. [Citation Graph (, )][DBLP]
Design principles for a virtual multiprocessor. [Citation Graph (, )][DBLP]
Evolving pushdown automata. [Citation Graph (, )][DBLP]
Dynamic role allocation for small search engine clusters. [Citation Graph (, )][DBLP]
Providing a holistic perspective to evaluating e-service quality in web-based systems: a multi-stakeholder approach. [Citation Graph (, )][DBLP]
Agile software development: a contemporary philosophical perspective. [Citation Graph (, )][DBLP]
A hybrid approach to automatic programming for the object-oriented programming paradigm. [Citation Graph (, )][DBLP]
Identity and access management for the distribution of social grants in South Africa. [Citation Graph (, )][DBLP]
A comparative study of two usability evaluation methods using a web-based e-learning application. [Citation Graph (, )][DBLP]
An ontology-based, multi-modal platform for the inclusion of marginalized rural communities into the knowledge society. [Citation Graph (, )][DBLP]
Modelling the factors that influence mobile phone adoption. [Citation Graph (, )][DBLP]
Criteria used in selecting effective requirements elicitation procedures. [Citation Graph (, )][DBLP]
Generic process model structures: towards a standard notation for abstract representations. [Citation Graph (, )][DBLP]
SQL's revoke with a view on privacy. [Citation Graph (, )][DBLP]
KernTune: self-tuning Linux kernel performance using support vector machines. [Citation Graph (, )][DBLP]
Examining the influence of demographic factors on internet users' information privacy concerns. [Citation Graph (, )][DBLP]
|