Please note that UPSpace will be unavailable from Friday, 2 May at 18:00 (South African Time) until Sunday, 4 May at 20:00 due to scheduled system upgrades. We apologise for any inconvenience this may cause and appreciate your understanding.
Browsing Research Articles (Computer Science) by Type "Postprint Article"
-
Pieterse, Vreda; Thompson, J.E. (Lisa)
(Routledge, 2010-08)
The acquisition of effective teamwork skills is crucial in all disciplines. Using an interpretive approach, this study
investigates collaboration and co-operation in teams of software engineering students. Teams whose ...
-
Coetzee, Marijke; Eloff, Jan H.P.
(Emerald, 2005)
Purpose – To define a framework for access control for virtual applications, enabled through web services technologies. The framework supports the loosely coupled manner in which web services are shared between partners. ...
-
Padayachee, Keshnee; Eloff, Jan H.P.
(Elsevier, 2009)
Access controls are difficult to implement and evidently deficient under certain conditions. Traditional controls offer no protection for unclassified information, such as a telephone list of employees that is unrestricted, ...
-
Coetzee, Serena Martha; Bishop, Judith
(International Journal of Geographical Information Science, 2009-09-07)
The original purpose of addresses was to enable the correct and unambiguous delivery of postal mail. The advent of computers and more specifically geographic information systems (GIS) opened up a whole new range of ...
-
Islami, Lejla; Fischer-Hubner, Simone; Hammond, Eunice Naa Korkoi; Eloff, Jan H.P.
(Springer, 2021-04)
While privacy-enhancing solutions for car-to-car communication are increasingly researched, end user aspects of such solutions have not been in the focus. In this paper, we present a qualitative study with 16 car drivers ...
-
Poggiolini, Mario; Engelbrecht, Andries P.
(Elsevier, 2013-08)
The Negative Selection Algorithm developed by Forrest et al. was inspired by the way in which T-cell
lymphocytes mature within the thymus before being released into the blood system. The mature T-cell
lymphocytes exhibit ...
-
Reddy, Kamil; Venter, H.S. (Hein)
(Elsevier, 2013-02)
A coordinated approach to digital forensic readiness (DFR) in a large organisation requires
the management and monitoring of a wide variety of resources, both human and technical.
The resources involved in DFR in large ...
-
Pillay, Nelishia; Qu, Rong; Srinivasan, Dipti; Hammer, Barbara; Sorensen, Kenneth
(Institute of Electrical and Electronics Engineers, 2018-05)
The three articles in this special section focus on the development of automated design of machine learning and search algorithms. There is a demand, especially from industry and business, to automate the design of machine ...
-
Pillay, Nelishia; Özcan, Ender
(Springer, 2019-04)
Construction heuristics play an important role in solving combinatorial optimization problems. These heuristics are usually used to create an initial solution to the problem which is improved using optimization techniques ...
-
Omran, Mahamed G.H.; Engelbrecht, Andries P.; Salman, Ayed
(Elsevier, 2008-07)
The barebones differential evolution (BBDE) is a new, almost parameter-free optimization algorithm that is a hybrid of the barebones particle swarm optimizer and differential evolution. Differential evolution is used to ...
-
Helbig, Marde; Engelbrecht, Andries P.
(Association for Computing, 2014-01)
Algorithms that solve Dynamic Multi-Objective Optimisation Problems (DMOOPs) should be tested on benchmark functions to determine whether the algorithm can overcome specific difficulties that can occur in real-world problems. ...
-
Ventresca, Mario; Harrison, Kyle Robert; Ombuki-Berman, Beatrice M.
(Elsevier, 2018-03)
Identifying critical nodes in complex networks has become an important task across a variety of application domains. The Critical Node Detection Problem (CNDP) is an optimization problem that aims to minimize pairwise ...
-
Pieterse, Heloise; Olivier, Martin S.
(Elsevier, 2014-09)
Bluetooth is popular technology for short-range communications and is incorporated in
mobile devices such as smartphones, tablet computers and laptops. Vulnerabilities associated
with Bluetooth technology led to improved ...
-
Oldewage, E.T. (Elre); Engelbrecht, Andries P.; Cleghorn, Christopher Wesley
(Springer, 2018-10)
This paper investigates the use of boundary constraint handling mechanisms to prevent unwanted particle roaming behaviour in high dimensional spaces. The paper tests a range of strategies on a benchmark for large scale ...
-
Dlamini, Moses Thandokuhle; Eloff, Jan H.P.; Venter, H.S. (Hein); Eloff, Mariki M.
(Wiley, 2022-01)
For businesses to benefit from the many opportunities of cloud computing, they must first address a number of security challenges, such as the potential leakage of confidential data to unintended third parties. An inter-VM ...
-
Malan, Katherine Mary; Engelbrecht, Andries P.
(Springer, 2014-12)
The focus of research in swarm intelligence has been largely on the algorithmic
side with relatively little attention being paid to the study of problems and the behaviour
of algorithms in relation to problems. When a ...
-
Graaff, A.J. (Alexander Jakobus); Engelbrecht, Andries P.
(Springer, 2012-03)
The network theory in immunology inspired the modelling of network based artificial immune system (AIS) models for data clustering. Current network based AIS models determine the network connectivity between artificial ...
-
Nitschke, G.S.; Schut, M.C.; Eiben, A.E.
(Springer, 2009-12)
This article presents results from an evaluation
of the collective neuro-evolution (CONE)controller design method. CONE solves collective behavior tasks, and increases task performance via facilitating emergent behavioral ...
-
Kuranga, Cry; Pillay, Nelishia
(Elsevier, 2022-03)
Usually, real-world time-series forecasting problems are dynamic. If such time-series are characterized by mere concept shifts, a passive approach to learning become ideal to continuously adapt the model parameters whenever ...
-
Strauss, Tinus; Kourie, Derrick G.; Olivier, Martin S.
(Elsevier, 2008-11)
In this paper, the simulated performance of a number of differentiated services traffic conditioners is studied under a range of synthetic traffic conditions. The traffic conditioners are compared using two performance ...