Please note that UPSpace will be unavailable from Friday, 2 May at 18:00 (South African Time) until Sunday, 4 May at 20:00 due to scheduled system upgrades. We apologise for any inconvenience this may cause and appreciate your understanding.
Browsing Research Articles (Computer Science) by Title
-
Pieterse, Vreda; Thompson, J.E. (Lisa)
(Routledge, 2010-08)
The acquisition of effective teamwork skills is crucial in all disciplines. Using an interpretive approach, this study
investigates collaboration and co-operation in teams of software engineering students. Teams whose ...
-
Coetzee, Marijke; Eloff, Jan H.P.
(Emerald, 2005)
Purpose – To define a framework for access control for virtual applications, enabled through web services technologies. The framework supports the loosely coupled manner in which web services are shared between partners. ...
-
Padayachee, Keshnee; Eloff, Jan H.P.
(Elsevier, 2009)
Access controls are difficult to implement and evidently deficient under certain conditions. Traditional controls offer no protection for unclassified information, such as a telephone list of employees that is unrestricted, ...
-
Kebande, Victor Rigworo; Karie, Nickson M.; Venter, H.S. (Hein)
(Indonesian Society for Knowledge and Human Development, 2018)
The unique identities of remote sensing, monitoring, self-actuating, self–adapting and self-configuring “things” in Internet
of Things (IoT) has come out as fundamental building blocks for the development of “smart ...
-
Coetzee, Serena Martha; Bishop, Judith
(International Journal of Geographical Information Science, 2009-09-07)
The original purpose of addresses was to enable the correct and unambiguous delivery of postal mail. The advent of computers and more specifically geographic information systems (GIS) opened up a whole new range of ...
-
Mushtaq, Muhammad Umer; Venter, H.S. (Hein); Singh, Avinash; Owais, Muhammad
(MDPI, 2025-03)
Energy harvesting wireless sensor networks (EH-WSNs) appear as the fundamental backbone of research that attempts to expand the lifespan and efficiency of sensor
networks positioned in resource-constrained environments. ...
-
Iliopoulos, Costas S.; Kourie, Derrick G.; Mouchard, Laurent; Musombuka, Themba K.; Pissis, Solon P.; De Ridder, Corne
(Elsevier, 2012-01)
Next-generation sequencing technologies have redefined the way genome sequencing is
performed. They are able to produce tens of millions of short sequences (reads), during
a single experiment, and with a much lower cost ...
-
Islami, Lejla; Fischer-Hubner, Simone; Hammond, Eunice Naa Korkoi; Eloff, Jan H.P.
(Springer, 2021-04)
While privacy-enhancing solutions for car-to-car communication are increasingly researched, end user aspects of such solutions have not been in the focus. In this paper, we present a qualitative study with 16 car drivers ...
-
Van der Merwe, Barend Jacobus; Pillay, Nelishia; Coetzee, Serena Martha
(Elsevier, 2022-06)
Barchan morphometric data have been used as proxies of meteorological and topographical data in environments where this data is lacking (such as other planetary bodies), gaining insights into barchan dune field dynamics ...
-
Wekwete, Takura Asael; Kufakunesu, Rodwell; Van Zyl, A.J. (Gusti)
(Elsevier, 2023-11)
Asset Liability Management (ALM) is an essential risk management technique in Quantitative Finance and
Actuarial Science. It aims to maximise a risk-taker’s ability to fulfil future liabilities. ALM is especially critical
in ...
-
Poggiolini, Mario; Engelbrecht, Andries P.
(Elsevier, 2013-08)
The Negative Selection Algorithm developed by Forrest et al. was inspired by the way in which T-cell
lymphocytes mature within the thymus before being released into the blood system. The mature T-cell
lymphocytes exhibit ...
-
Reddy, Kamil; Venter, H.S. (Hein)
(Elsevier, 2013-02)
A coordinated approach to digital forensic readiness (DFR) in a large organisation requires
the management and monitoring of a wide variety of resources, both human and technical.
The resources involved in DFR in large ...
-
Ras, D.J.; Venter, H.S. (Hein)
(AOSIS Open Journals, 2016)
Cloud systems have to deal with massive amounts of distributed, volatile data which
makes forensic investigations difficult. Using the NIST reference architecture, a system is
devised to proactively capture forensic data ...
-
Pillay, Nelishia; Qu, Rong; Srinivasan, Dipti; Hammer, Barbara; Sorensen, Kenneth
(Institute of Electrical and Electronics Engineers, 2018-05)
The three articles in this special section focus on the development of automated design of machine learning and search algorithms. There is a demand, especially from industry and business, to automate the design of machine ...
-
Gerber, Mia; Pillay, Nelishia
(MDPI, 2022-11-29)
Deep neural networks have proven to be effective in various domains, especially in natural
language processing and image processing. However, one of the challenges associated with using
deep neural networks includes the ...
-
Pillay, Nelishia; Özcan, Ender
(Springer, 2019-04)
Construction heuristics play an important role in solving combinatorial optimization problems. These heuristics are usually used to create an initial solution to the problem which is improved using optimization techniques ...
-
Omran, Mahamed G.H.; Engelbrecht, Andries P.; Salman, Ayed
(Elsevier, 2008-07)
The barebones differential evolution (BBDE) is a new, almost parameter-free optimization algorithm that is a hybrid of the barebones particle swarm optimizer and differential evolution. Differential evolution is used to ...
-
Helbig, Marde; Engelbrecht, Andries P.
(Association for Computing, 2014-01)
Algorithms that solve Dynamic Multi-Objective Optimisation Problems (DMOOPs) should be tested on benchmark functions to determine whether the algorithm can overcome specific difficulties that can occur in real-world problems. ...
-
Ventresca, Mario; Harrison, Kyle Robert; Ombuki-Berman, Beatrice M.
(Elsevier, 2018-03)
Identifying critical nodes in complex networks has become an important task across a variety of application domains. The Critical Node Detection Problem (CNDP) is an optimization problem that aims to minimize pairwise ...
-
Pieterse, Heloise; Olivier, Martin S.
(Elsevier, 2014-09)
Bluetooth is popular technology for short-range communications and is incorporated in
mobile devices such as smartphones, tablet computers and laptops. Vulnerabilities associated
with Bluetooth technology led to improved ...