Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science
Papers in refereed, published conference proceedings
Publication Title
Instructions
Select the first letter of the publication title from the alphabetical list.
A
G
I
N
O
P
S
T
Koen R, Olivier MS: 2008. An evidence acquisition tool for live systems. In Advances in Digital Forensics IV, (25), IFIP, a Springer Series in Computer Science, pp 325-334.
Olivier MS: 2008. Using sensor dirt for toolmark analysis of digital photographs. In Advances in Digital Forensics IV, (16), IFIP, a Springer Series in Computer Science, pp 193-206.
Back to Top
Gruner S: 2008. Graph Transformation Model of a Triangulated Network of Mobile Units. In GT-VMT 2008 7th International Workshop on Graph Transformation and Visual Modeling Techniques, Open Journal Systems, pp 319-331.
Back to Top
Khan SA, Engelbrecht AP: 2008. A Fuzzy Ant Colony Optimization Algorithm for Topology Design of Distributed Local Area Networks. In IEEE Swarm Intelligence Symposium 2008, IEEE, pp 1-7.
Lane J, Engelbrecht AP, Gain J: 2008. Particle Swarm Optimization with Spatially Meaningful Neighbours. In IEEE Swarm Intelligence Symposium 2008, IEEE, pp 1-8.
Back to Top
Saadeh E, Kourie DG, Boake A: 2008. An Algorithm for Ordering Refactorings Based on Fine-Grained Model Transformations. In New Trends in Software Methodologies, Tools and Techniques Proceedings of the seventh SoMet_08, IOS Press, pp 225-243.
Back to Top
Bishop JM, Horspool N: 2008. On the Efficiency of Design Patterns implemented in C# 3.0. In Objects, Components, Models and Patterns 46th International Conference, TOOLS, Springer, pp 356-371.
Back to Top
Gruner S, Kourie DG, Strauss MD, Watson BW, Roggenbach M: 2008. A new CSP Operator for Optional Parallelism. In Proceedings International Conference on Computer Science and Software Engineering CSSE 2008, IEEE Computer Society, pp 788-791.
Brandi W, Olivier MS, Zugenmaier A: 2008. Preservation of Privacy in Thwarting the Ballot Stuffing Scheme. In Proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus), Springer, pp 195-204.
Al Rahed A, Coetzee SM, Rademeyer M: 2008. A data model for efficient address data representation - Lessons learnt from the Intiendo address matching tool. In Proceedings of the Academic Track of the 2008 Free and Open Source Software for Geospatial (FOSS4G) Conference, incorporating the GISSA 2008 Conference, Document Transformation Technologies CC, pp 200-213.
Cooper AK, Coetzee SM: 2008. The South African address standard and initiatives towards an international address standard. In Proceedings of the Academic Track of the 2008 Free and Open Source Software for Geospatial (FOSS4G) Conference, incorporating the GISSA 2008 Conference, Document Transformation Technologies CC, pp 58-70.
Coetzee SM, Cooper AK: 2008. Can the South African address standard (SANS 1883) work for small local municipalities?. In Proceedings of the Academic Track of the 2008 Free and Open Source Software for Geospatial (FOSS4G) Conference, incorporating the GISSA 2008 Conference, Document Transformation Technologies CC, pp 71-81.
Nicholls G, Kourie DG, Strauss MD: 2008. Assessment of Location Sensitivity of Voronoi-based Sensor Deployment and Reconfiguration using GIS. In Proceedings of the Academic Track of the 2008 Free and Open Source Software for Geospatial (FOSS4G) Conference, incorporating the GISSA 2008 Conference, Geo-Information Society of South Africa, pp 297-307.
Pampara G, Engelbrecht AP, Cloete T: 2008. CIlib: A Collaborative Framework for Computational Intelligence Algorithms - Part 1. In Proceedings of the IEEE 2008 International Joint Conference on Neural Networks (IJCNN'08), IEEE, pp 1751-1758.
Cloete T, Engelbrecht AP, Pampara G: 2008. CIlib: A Collaborative Framework for Computational Intelligence Algorithms - Part II. In Proceedings of the IEEE 2008 International Joint Conference on Neural Networks (IJCNN'08), IEEE, pp 1765-1774.
Rakitianskaia A, Engelbrecht AP: 2008. Cooperative Charged Particle Swarm Optimiser. In Proceedings of the IEEE 2008 International Joint Conference on Neural Networks (IJCNN'08), IEEE, pp 933-939.
Olorunda O, Engelbrecht AP: 2008. Measuring Exploration/Exploitation in Particle Swarms using Swarm Diversity. In Proceedings of the IEEE 2008 International Joint Conference on Neural Networks (IJCNN'08), IEEE, pp 1128-1134.
Greef M, Engelbrecht AP: 2008. Solving Dynamic Multi-Objective Problems with Vector Evaluated Particle Swarm Optimisation. In Proceedings of the IEEE 2008 International Joint Conference on Neural Networks (IJCNN'08), IEEE, pp 2922-2929.
Du Plessis MC, Engelbrecht AP: 2008. Improved Differential Evolution for Dynamic Optimization Problems. In Proceedings of the IEEE 2008 International Joint Conference on Neural Networks (IJCNN'08), IEEE, pp 229-234.
Graaff AJ, Engelbrecht AP: 2008. Towards a Self Regulating Local Network Neighbourhood Artificial Immune System for Data Clustering. In Proceedings of the IEEE 2008 International Joint Conference on Neural Networks (IJCNN'08), IEEE, pp 633-640.
Malan KM, Engelbrecht AP: 2008. Algorithm Comparisons and the Significance of Population Size. In Proceedings of the IEEE 2008 International Joint Conference on Neural Networks (IJCNN'08), IEEE, pp 914-920.
van Heerden WS, Engelbrecht AP: 2008. A Comparison of Map Neuron Labeling Approaches for Unsupervised Self-Organizing Feature Maps. In Proceedings of the IEEE 2008 International Joint Conference on Neural Networks (IJCNN'08), IEEE, pp 2140-2147.
Grobler J, Engelbrecht AP, Yadavalli VSS: 2008. Multi-objective DE and PSO Strategies for Production Scheduling. In Proceedings of the IEEE 2008 International Joint Conference on Neural Networks (IJCNN'08), IEEE, pp 1154-1161.
Mokhonoana PM, Olivier MS: 2008. Application of Message Digests for the Verification of Logical Forensic Data. In Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA, pp 1-10.
Koen R, Olivier MS: 2008. The use of File Timestamps in Digital Forensics. In Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA, pp 1-15.
Kohn MD, Eloff JHP, Olivier MS: 2008. UML Modelling of Digital Forensic Process Models (DFPMs). In Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA, pp 1-12.
Veerasamy N, Eloff JHP: 2008. Towards a Framework for a Network Warfare Capability. In Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA, pp 1-18.
Strauss MD, Kourie DG, Watson B: 2008. A Concurrent Specification of an Incremental DFA Minimisation Algorithm. In Proceedings of the Prague Stringology Conference 2008, Czech Technical University in Prague, pp 218-226.
Coetser W, Kourie DG, Watson B: 2008. On Regular Expression Hashing to Reduce FA Size. In Proceedings of the Prague Stringology Conference 2008, Czech Technical University in Prague, pp 227-241.
Reddy K, Venter HS, Olivier MS, Currie I: 2008. Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. In Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, IEEE, pp 56-64.
Veerasamy N, Eloff JHP: 2008. The application of Non-quantitative Modelling in the Analysis of a Network Warfare Environment. In Proceedings of World Academy of Science, Engineering and Technology, WASET, pp 567-573.
Back to Top
Adigun EA, Eloff JHP: 2008. Implementing a Trusted Service-Oriented Network Environment. In Southern Africa Telecommunication Networks and Applications Conference (SATNAC), Telkom SA, pp 1-6.
Back to Top
Engelbrecht AP, Anguelov B: 2008. Discrete Pulse Transform of Images: Algorithm and Applications. In The 19th International Conference on Pattern Recognition, IEEE, pp 1-4.
Derbel B, Mosbah M, Gruner S: 2008. Mobile Agents implementing Local Computations in Graphs. In The 4th International Conference on Graph Transformation (ICGT 2008), Springer, pp 99-114.
Bishop JM: 2008. Language Features meet Design Patterns: Raising the Abstraction Bar. In The Role of Abstraction in Software Engineering in conjunction with the 30th International Conference on Software Engineering (ICSE), IEEE Computer Society, pp 1-7.
Back to Top
|