Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science
Papers in refereed, published conference proceedings
Publication Title
Instructions
Select the first letter of the publication title from the alphabetical list.
2
C
I
P
S
T
Neethling M, Engelbrecht AP: 2006. Determining RNA Secondary Structure using Set-based Particle Swarm Optimization. In 2006 IEEE World Congress on Computational Intelligence, IEEE, pp 6134-6141.
Pampara G, Engelbrecht AP, Franken CJ: 2006. Binary Differential Evolution. In 2006 IEEE World Congress on Computational Intelligence, IEEE, pp 6764-6770.
Edwards AI, Engelbrecht AP: 2006. Comparing Particle Swarm Optimisation and Genetic Algorithms for Nonlinear Mapping. In 2006 IEEE World Congress on Computational Intelligence, IEEE, pp 2709-2716.
Omran MGH, Engelbrecht AP: 2006. Self-Adaptive Differential Evolution Methods for Unsupervised Image Classification. In 2nd IEEE International Conferences on Cybernetics & Intelligent Systems and Robotics, Automation & Mechatronics (CIS-RAM 2006), IEEE, pp 800-805.
Back to Top
Ketcha Ngassam E, Kourie DG, Watson BW: 2006. FA-based String Processing: The Hardcoded Dynamic State Allocation Algorithm. In CARI '06 Proceedings of the 8th African Conference on Research in Computer Science, INRIA, pp 75-82.
Back to Top
Conradie LJ, Engelbrecht AP: 2006. Training Bao Game-Playing Agents using Coevolutionary Particle Swarm Optimization. In IEEE Symposium on Computational Intelligence in Games (CIG '06), IEEE, p. CD.
Fei BKL, Eloff JHP, Olivier MS, Venter HS: 2006. Analysis of Web Proxy Logs. In IFIP International Conference on Digital Forensics, International Federation for Information Processing, pp 247-258.
Slaviero ML, Granova A, Olivier MS: 2006. Active Traffic Capture for Network Forensics. In IFIP International Conference on Digital Forensics, International Federation for Information Processing, pp 215-228.
Strauss MD, Olivier MS, Kourie DG: 2006. Logical Traffic Isolation using Differentiated Services. In IFIP International Conference on Digital Forensics, International Federation for Information Processing, pp 229-237.
Wojcik M, Venter HS, Eloff JHP, Olivier MS: 2006. Applying Machine Trust Models to Forensic Investigations. In IFIP International Conference on Digital Forensics, International Federation for Information Processing, pp 55-65.
Back to Top
Van Zyl P, Kourie DG, Boake A: 2006. Comparing the Performance of Object Databases and ORM Tools. In Proceedings of SAICSIT 2006: Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, SAICSIT, pp 1-11.
Prinsloo JM, Schulz CL, Kourie DG, Theunissen WHM, Strauss MD, van den Heever RJ, Grobbelaar S: 2006. A Service Oriented Architecture for Wireless Sensor and Actor Network Applications. In Proceedings of SAICSIT 2006: Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, SAICSIT, pp 145-154.
Pieterse V, Kourie DG, Sonnekus IP: 2006. Software Engineering Team Diversity and Performance. In Proceedings of SAICSIT 2006: Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, SAICSIT, pp 180-186.
de Ridder C, Kourie DG, Watson BW: 2006. FireuSat: Meeting the challenge of detecting microsatellites in DNA. In Proceedings of SAICSIT 2006: Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, SAICSIT, pp 247-256.
Ketcha Ngassam E, Kourie DG, Watson BW: 2006. A Taxonomy of DFA-based String Processors. In Proceedings of SAICSIT 2006: Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, SAICSIT, pp 238-246.
Padayachee K, Eloff JHP: 2006. An Aspect-Oriented Implementation of e-Consent to Foster Trust. In Proceedings of SAICSIT 2006: Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, SAICSIT, pp 164-169.
Rama J, Bishop JM: 2006. A Survey and Comparison of CSCW Groupware Applications. In Proceedings of SAICSIT 2006: Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, SAICSIT, pp 198-205.
Bishop JM: 2006. Multi-platform User Interface Construction - A Challenge for Software Engineering-in-the-Small. In Proceedings of the 28th International Conference on Software Engineering & Co-Located Workshops, ACM, pp 751-760.
Coetzee M, Eloff JHP: 2006. A Framework for Web Services Trust. In Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), International Federation for Information Processing, pp 75-86.
Brandi W, Olivier MS: 2006. On bidder zones, cell phones and ballot stuffing. In Proceedings of the ISSA 2006 from Insight to Foresight Conference, Information Security South Africa, pp 1-11.
Croft NJ, Olivier MS: 2006. Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation. In Proceedings of the ISSA 2006 from Insight to Foresight Conference, Information Security South Africa, pp 1-14.
Kohn MD, Eloff JHP, Olivier MS: 2006. Framework for a Digital Forensic Investigation. In Proceedings of the ISSA 2006 from Insight to Foresight Conference, Information Security South Africa, pp 1-7.
MacManus L, Eloff JHP: 2006. Using IT Benchmarking Principles to design an Information Security Benchmark Model. In Proceedings of the ISSA 2006 from Insight to Foresight Conference, Information Security South Africa, pp 1-10.
Wojcik M, Venter HS, Eloff JHP: 2006. Trust Model Evaluation Criteria: A Detailed Analysis of Trust Evaluation. In Proceedings of the ISSA 2006 from Insight to Foresight Conference, Information Security South Africa, pp 1-9.
Strauss MD, Kourie DG, Watson BW: 2006. A concurrent specification of Brzozowski's DFA construction algorithm. In Proceedings of the Prague Stringology Conference '06, Prague Stringology Club, pp 90-99.
Watson BW, Kourie DG, Ketcha Ngassam E, Strauss MD, Cleophas LG: 2006. Efficient Automata Constructions and Approximate Automata. In Proceedings of the Prague Stringology Conference '06, Prague Stringology Club, pp 100-107.
Ketcha Ngassam E, Kourie DG, Watson BW: 2006. On implementation and performance of table-driven DFA-based string processors. In Proceedings of the Prague Stringology Conference '06, Prague Stringology Club, pp 108-122.
de Ridder C, Kourie DG, Watson BW: 2006. FireuSat: An Algorithm to Detect Microsatellites in DNA. In Proceedings of the Prague Stringology Conference '06, Prague Stringology Club, pp 137-150.
Padayachee K, Eloff JHP: 2006. The Next Challenge: Aspect-Oriented Programming. In Proceedings of the Sixth IASTED International Conference on Modelling, Simulation and Optimization, ACTA Press, pp 304-307.
Back to Top
Theunissen WHM, Boake A, Kourie DG: 2006. Open Source Software Development: Next Steps for the Local Telecommunications Industry. In Southern African Telecommunication Networks Applications Conference (SATNAC) 2006 Proceedings, Telkom, pp 1-5.
Wojcik M, Venter HS, Eloff JHP: 2006. A Detailed Analysis of Trust Representation as a Trust Model Evaluation Criterion. In Southern African Telecommunication Networks Applications Conference (SATNAC) 2006 Proceedings, Telkom, pp 1-6.
Croft NJ, Olivier MS: 2006. Anonymous Mobile Conference Calls. In Southern African Telecommunication Networks Applications Conference (SATNAC) 2006 Proceedings, Telkom, pp 1-6.
Back to Top
Drozdz M, Kourie DG, Watson BW, Boake A: 2006. Refactoring Tools and Complementary Techniques. In The 4th ACS/IEEE International Conference on Computer Systems and Applications, IEEE, p. 165.
Back to Top
|