Author:Smith, Andrew CDate:May 2010The authors investigate a potentially low-cost multi-user computer pointing interface. Given a choice of four targets arranged on the screen, the authors looked at what the user’s preference is in visiting the targets with a hand-held light ...Read more
Author:Mutanga, MB; Mudali, P; Dlamini, IZ; Ndlovu, L; Xulu, SSDate:May 2010Network forensics plays a major role in the investigation of criminal activities involving computer networks. Investigating such crimes is still an open research area due to the fact that technology is always advancing hence investigators ...Read more
Author:Masonta, Moshe T; Olwal, T; Ntlatlapa, Ntsibane SDate:May 2010In the past decade, the access to telephone services has increased drastically due to the deployment of wireless technologies and liberalization of telecommunications markets. But internet access in most African rural communities still remains ...Read more
Author:Smith, Andrew C; Kotzé, PaulaDate:May 2010In this paper the authors are interested in determining if there is indeed an opportunity to use existing traditional African artefacts as tangible programming elements in computing systems. Research to date has focussed on the design of new ...Read more
Author:Coetzee, L; Seetharam, D; Butgereit, L; Van Gelder, ADate:May 2010South Africa produces a large number of engineering and computer science graduates annually. There is a perception that many of these graduates are not work ready and require additional training before they can contribute to large scale ...Read more
Author:Batchelor, J; Herselman, Martha E; Traxler, JDate:May 2010Preparing learners for the demands of the 21st century requires dedicated, innovative teachers willing to push existing boundaries. It is also about exploiting the affordances of emerging technologies to enhance teaching and learning strategies. ...Read more