Search
Now showing items 11-20 of 108
Investigating cost effective communication alternatives for geographically hostile regions
(2001)
The lack of communication facilities in developing countries is a constraint to social, political and economic empowerment of the people. However, advances in technology promise to deliver voice, video and data communication ...
Facilitating the modelling and automated analysis of cryptographic protocols
(2001)
Multi-dimensional security protocol engineering is effective for creating cryptographic protocols since it encompasses a variety of design, analysis and deployment techniques, thereby providing a higher level of confidence ...
A meta-authoring tool for specifying behaviour in virtual reality environments
(2004)
In this dissertation, we explore methods for empowering non-programmers with the ability to develop their own virtual environment applications. We explored some of the existing systems to determine what methodologies have ...
Managing economic value and uncertainty on software projects : an empirical study with the CASSE framework
(2009)
Lack of adaptive-predictor models in software development renders the decision-making process complex, principally when evaluating investment options. Prior work has presented various approaches which are still non-integrated, ...
Usable authentication for mobile banking
(2009)
This dissertation describes the design of two mobile authentication techniques: combinational graphical passwords and gesture passwords. These systems were implemented as prototypes. The prototypes along with a PIN ...
Quality control tools for interactive rendering of 3D triangle meshes
(2002)
In this dissertation we explore methods of quality control of untextured polygonal models. The tools presented build, evaluate and improve on the field of multiresolution analysis through decimation. We evaluate the quality ...
Supporting mobile developers through a Java IDE
(2008)
There exist several challenges in supporting mobile applications. For example, creating a separate target application for each device type, leaving developers with a huge maintenance chore. Most desktop applications run ...
Softbridge : a socially aware framework for communication bridges over digital divides
(2009)
Computer scientists must align social and technical factors for communication technologies in developing regions yet lack a framework to do so. The novel Softbridge framework comprises several components to address this ...
Using access information in the dynamic visualisation of web sites
(2004)
Log file analysis provides a cost-effective means to detennine web site usage. However, current methods of displaying log analysis results tend to be limited in that they either contain no reference to a web site's structure, ...
Anomaly detection and prediction of human actions in a video surveillance environment
(2007)
World wide focus has over the years been shifting towards security issues, not in least due to recent world wide terrorist activities. Several researchers have proposed state of the art surveillance systems to help with ...