Browsing Research Papers (Computer Science) by Title

DSpace/Manakin Repository

Browsing Research Papers (Computer Science) by Title

Sort by: Order: Results:

  • Blake, Edwin H.; Tucker, William D.; Glaser, Meryl; Freudenthal, Adinda (Wiley, 2011)
    The process of community-based co-design is one that explores various solution configurations in a multi-dimensional design space whose axes are the different dimensions of requirements and the various dimensions of designer ...
  • Blake, Edwin H.; Tucker, William D.; Glaser, Meryl; Freudenthal, Adinda (Wiley, 2011)
    The process of community-based co-design is one that explores various solution configurations in a multi-dimensional design space whose axes are the different dimensions of requirements and the various dimensions of designer ...
  • Azeez, Nureni A.; Abidoye, Ademola P.; Agbele, Kehinde K.; Adesina, Ademola Olusola (Academic Journals Inc., 2012)
    Grid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). Since this technology allows aggregation of various computer ...
  • Renaud, Karen; Blignaut, Renette; Venter, Isabella M. (Springer, 2013)
    Designing for diversity is a laudable aim. How to achieve this, in the context of mobile phone usage by South African seniors, is a moot point. We considered this question from two possible perspectives: universal ...
  • Chetty, Marshini; Tucker, William D.; Blake, Edwin H. (SAICSIT, in assocation with ACM, 2004)
    The digital divide between rural and urban areas within developing countries is vast. We investigate how to address this divide by introducing Information and Communication Technologies (ICTs) into remote rural areas. Our ...
  • Adesina, Ademola Olusola; Nyongesa, Henry O.; Agbele, Kehinde K. (IIMC International Information Management Corporation, 2010)
    Digital watermarking is the art of embedding data, called a watermark, into a multimedia object such that the watermark can be detected or extracted later without impairing the object. Concealment of secret messages ...
  • Agbele, Kehinde K.; Adesina, Ademola Olusola; Ekong, Daniel; Seluwa, Dele (Institute of Electrical and Electronics Engineers (IEEE) Inc., 2011)
    The association connecting information and communication technologies (ICTs) and well-being or poverty remains vague and research today has resulted to divergent conclusions. This paper defines ICTs as “tools” that ...
  • Adesina, Ademola Olusola; Agbele, Kehinde K.; Februarie, Ronald; Abidoye, Ademola P.; Nyongesa, Henry O. (Academy of Science of South Africa, 2011)
    The sensitivity of health-care information and its accessibility via the Internet and mobile technology systems is a cause for concern in these modern times. The privacy, integrity and confidentiality of a patient’s data ...
  • Hersh, Marion A.; Tucker, William D. (Elsevier, 2005)
    There are a number of pressures on researchers in academia and industry to behave unethically or compromise their ethical standards, for instance in order to obtain funding or publish frequently. In this paper a case study ...
  • Adesina, Ademola Olusola; Agbele, Kehinde K.; Abidoye, Ademola P.; Azeez, Nureni A. (Institute of Electrical and Electronics Engineers (IEEE) Inc., 2012)
    Mobile phones are ubiquitous with millions of users acquiring them every day for personal, business and social usage or communication. Its enormous pervasiveness has created a great advantage for its use as a technological ...
  • Maunder, Andrew; Marsden, Gary; Tucker, William D. (ACM, 2006)
    Developing ICT software that is useful and usable in a rural context poses many problems. One of the major difficulties is understanding the real needs of the target users and the constraints imposed by the rural environment. ...
  • Rey-Moreno, Carlos; Tucker, William D.; Bidwell, Nicola J.; Roro, Zukile; Siya, Masbulele Jay; Simo-Reigadas, Javier (ACM, 2013)
    The DEV community knows that technology interventions involve consideration of social and environmental factors as much as technical ones. This is particularly true for the introduction of communications infrastructure in ...
  • Blignaut, Renette; Venter, Isabella M.; Cranfield, D.J. (Computer Society of South Africa, 2000)
    A computer-based training (CBT) system was used to teach Computer Literacy to full-time students at the University of the Western Cape. This approach was successful in creating computer literate students as well as creating ...
  • Chitedze, Zimani; Tucker, William D. (Telkom, 2012)
    This paper shows that mobility management protocols for infrastructure Internet may be used in a wireless mesh network environment. Mesh topology tends to be an unplanned graph and routes change dynamically and in this ...
  • Benjamin, Anita; Tucker, William D. (Telkom, 2003)
    We have built a hybrid voice/text web–board that utilizes floor control for handling resources such as microphone and interface events. The aim of this research is to determine the most appropriate floor control mechanism ...
  • Paulse, Tania M.; Tucker, William D. (Telkom, 2000)
    The multi-service, multi-architecture nature of NGNs is so complex that the management of services, in addition to networks, emerges as a research challenge. Despite QoS limitations, VoIP (as opposed to VoATM), dominates ...
  • Tucker, William D.; Keats, Derek (Telkom, 1998)
    Grafting an ATM network onto an existing Ethernet network is a non-trivial exercise in network configuration. The process of mating ATM technology to an Ethernet network without tampering the underlying backbone and network ...
  • Julius, Elroy P.; Tucker, William D. (Telkom, 2005)
    This paper presents an empirical solution for guaranteeing the delivery of synchronous and asynchronous messages within a semi-synchronous IPbased communication domain. The communication infrastructure that is needed between ...
  • Julius, Elroy P.; Tucker, William D. (Telkom, 2004)
    This research aims to find an empirical solution for guaranteeing the delivery of synchronous and asynchronous messages within a semi-synchronous IP-based communication domain. The communication infrastructure that is ...
  • Adesemowo, A. Kayode; Tucker, William D. (Telkom, 2003)
    As mobile devices and networks become more data-centric, text messaging requires an extension of co-presence capabilities for better interactive discussion between input/output handicapped handheld users and their free ...

Search Repository


Advanced Search
Reports

Browse

My Account