Now showing items 1-9 of 9

  • Human–computer interface design issues for a multi-cultural and multi-lingual English speaking country — Botswana 

    Onibere, E.A.; Morgan, S.; Busang, E.M.; Mpoeleng, D. (Elsevier Science Ltd, www.elsevier.com/locate/intcom, 2001)
    This paper reports on research carried out to determine whether a localised interface is preferred by users in a multi-cultural and multi-lingual country where a non-local language is nationally used,. We attempted to ...
  • Building computer graphics education in southern Africa 

    Asare, S.D.; Mashwama, P.M.; Cunningham, S. (Elsevier Science Ltd, http://www.elsevier.com/locate/cag, 2003)
    This note discusses issues in building the educational base for computer graphics growth in developing countries, particularly in southern Africa. It is based on a delegation’s visit to southern Africa in the spring of ...
  • Stochastic estimator-based wireless traffic control schemes 

    Ogwu, F.J.; Talib, M.; Aderounmu, G.A. (Science Publications, http://www.scipub.org/scipub/c4p.php?j_id=JCS, 2007)
    Recent works on Available Bit Rate (ABR) traffic control have generated efficient control schemes for ABR traffic on Asynchronous Transfer Mode (ATM) network. This study examines the improved performance envisaged if these ...
  • Improving the quality of service guarantee in an Asynchronous Transfer Mode (ATM) Network 

    Ogwu, F.J.; Talib, M.; Aderounmu, G.A. (Science Publications, http://www.scipub.org/scipub/c4p.php?j_id=JCS, 2007)
    This study presents a technique for improving the quality of service (QoS) guarantee in an ATM network. In the proposed model, it was assumed that high priority traffic have been allocated a switch resource to guarantee a ...
  • Using merkle tree to mitigate cooperative black-hole attack in Wireless Mesh Networks 

    Om, S.; Talib, M. (The Science and Information Organization Inc., www.ijacsa.thesai.org, 2011)
    Security is always a major concern and a topic of hot discussion to users of Wireless Mesh Networks (WMNs). The open architecture of WMNs makes it very easy for malicious attackers to exploit the loopholes in the routing ...
  • Computing knowledge and skills demand: A content analysis of job adverts in Botswana 

    Ayalew, Y.; Mbero, Z.A.; Nkgau, T.Z.; Motlogelwa, P.; Masizana-Katongo, A. (The Science and Information Organization, http://thesai.org/Publication/Default.aspx, 2011)
    This paper presents the results of a content analysis of computing job adverts to assess the types of skills required by employers in Botswana. Through the study of job adverts for computing professionals for one year ...
  • A tag-like, linked navigation approach for retrieval and discovery of desktop documents 

    Mosweunyane, Gontlafetse; Carr, Leslie; Gibbins, Nicholas (Springer, www.springer.com, 2011)
    Computer systems provide users with abilities to create, organize, store and access information. Most of this information is in the form of documents in files organized in the hierarchical folder structures provided by ...
  • Analyzing the load balance of term-based partitioning 

    Abusukhon, A.; Talib, M. (The Science and Information Organization Inc., http://ijacsa.thesai.org/, 2011)
    In parallel (IR) systems, where a large-scale collection is indexed and searched, the query response time is limited by the time of the slowest node in the system. Thus distributing the load equally across the nodes is ...
  • Assessing acceptance of adaptive educational hypermedia systems: prior knowledge vs. cognitive styles 

    Mampadi, F. (International Journal of Computer Science Issues, http://www.ijcsi.org/index.php, 2012)
    Perceived usefulness and ease of use have proved to be key determinants of the acceptance and usage of e-learning systems. On the contrary, little is known about students' perceptions in Adaptive Educational Hypermedia ...