Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An empirical investigation of the accuracy of location-based services in South Africa., and . J. Locat. Based Serv., 6 (1): 22-34 (2012)Cyber Security, a Threat to Cyber Banking in South Africa: An Approach to Network and Application Security., and . CSCloud, page 1-6. IEEE Computer Society, (2016)Design for a three-tier mobile form in an ASP.NET application., and . SEDE, page 332-337. ISCA, (2007)Agile Methodologies Selection Toolbox., and . ICSEA, page 72. IEEE Computer Society, (2007)Intermediate domain system identification using walsh transforms.. Autom., 20 (2): 237-242 (1984)The process agent model and message passing in a distributed processing VR system., , and . VRST, page 165-172. ACM, (1997)Defining Agile Software Quality Assurance., and . ICSEA, page 36. IEEE Computer Society, (2006)Formal Specification and Refinement for an Interactive Web Example., and . WEBIST (1), page 89-96. INSTICC Press, (2006)Investigating Geometry-Aware Network-Based Positioning in Cellular Networks Using Neural Network Predictive Model., and . Wireless Personal Communications, 90 (3): 1413-1432 (2016)Tailoring Agile Methodologies to the Southern African Environment., , and . XP, volume 3556 of Lecture Notes in Computer Science, page 259-262. Springer, (2005)