Institutional Repository

Browsing College of Science, Engineering and Technology by Title

Browsing College of Science, Engineering and Technology by Title

Sort by: Order: Results:

  • Swartz, Paulus (2019-04)
    The general aim of this research is to develop a conceptual privacy governance framework (CPGF) that can be used to develop a valid and reliable information privacy governance questionnaire (IPGQ) to assess the perception ...
  • Van Biljon, Judy; Renaud, Karen (ACM, 2016-09-26)
    Designing a usable mobile phone interface is a non-trivial task, especially when it is intended for use by a special needs group. The group we focus on here is composed of the elderly in developing countries. To inform ...
  • Steyn, Paul Stephanes (2009-01)
    The specification of enterprise information systems using formal specification languages enables the formal verification of these systems. Reasoning about the properties of a formal specification is a tedious task that ...
  • Steyn, Paul S.; Van der Poll, John A. (2007-06)
    The specification of enterprise information systems using formal specification languages enables the formal verification of these systems. Reasoning about the properties of a formal specification is a tedious task that can ...
  • Roux, HN; De Villiers, PJA (1996)
    The implementation of protocols can be speed up by incorporating formally validated designs in documents that describe new protocols. Unfortunately, this seldom happens in practice. It is proposed that a formally validated ...
  • Venter, BH (1991)
    Most statically typed Algol-style languages were designed to conform with the view that a value belongs to one and only one type. The adoption of this view bought compiler simplicity at the ex­pense of language expressivity. ...
  • Martins, Nico; Da Veiga, Adele (2014-09)
    It is crucial to understand the perceptions, attitudes and behaviour of an organisation’s employees in order to shape the information security culture into one in which the confidentiality and sensitivity of information ...
  • Nsayi, Jissy Nsonde (2015-12)
    We study variants of P-frames and associated rings, which can be viewed as natural generalizations of the classical variants of P-spaces and associated rings. To be more precise, we de ne quasi m-rings to be those rings ...
  • Schlingloff, B (South African Computer Society (SAICSIT), 1997)
    These tutorial notes contain an introduction to the logical theory and computational aspects of computer aided verification of finite state reactive systems with linear and branching temporal logic model checking. As a ...
  • Jablonski, J.; Dijkman, J.H. (Computer Society of South Africa (on behalf of SAICSIT), 1984)
    The design of a high speed graphics workstation 1s presented A spec1f1caly designed Graphics System Interface com bines standard computer peripherals to produce a soph1st1cated man machine workstation A review 1s given ...
  • Mwim, Emilia N.; Kritzinger, E (2016-07)
    The term ‘digital divide’ was introduced in the mid-1990s and has become popular as an area of interdisciplinary concern. The term has received much attention from many researchers and policy makers. However it remains an ...
  • Mukwevho, Mukosi Abraham (2010-11)
    Network research experiments have traditionally been conducted in emulated or simulated environments. Emulators are frequently deployed on physical networks. Network simulators provide a self-contained and simple environment ...
  • Turton, Trevor (Computer Society of South Africa (on behalf of SAICSIT), 1984)
    This paper describes computer design which 'would achieve a high instruction throughput rate on a relatively modest amount of hardware. It is based on multiprogramming the CPU at a sub-instruction level. The design will ...
  • Van Wyk, Etienne; De Villiers, M.R. (Ruth) (2009)
    Virtual reality is a rapidly growing technology which utilises the ever-increasing power of computers to simulate real-world and imaginary environments and situations with a high degree of realism and interactiveness. ...
  • Van Wyk, Etienne; DeVilliers, Ruth (2009)
    Virtual reality is a rapidly growing technology which utilises the ever-increasing power of computers to simulate real-world and imaginary environments and situations with a high degree of realism and interactiveness. Safety ...
  • Rock, ST (South African Computer Society (SAICSIT), 1999)
    This paper describes the use of pictorial representations in showing the understanding of natural language that is about multiple or extended events. The focus is on the structure of such eventualities, and depiction of ...
  • van Wyk, Quintus; Van Biljon, Judy; Schoeman, Marthie (IEEE, 2019)
    Incident Management Systems (IMS) assist in managing resources in order to minimize fatalities and damage. Visual artifacts in an IMS can facilitate knowledge transfer between responders to an incident, however, ...
  • Gouws, Patricia M; De Villiers, M.R. (Ruth) (2009)
    This study considers the development and use of RoutePlanner, which is a model for the visualization process to transform raw data in a data warehouse into required insight, specifically in the domain of insurance brokerage. ...
  • Basu, Sayan (2020-05)
    The present International Celestial Reference Frame (ICRF), the ICRF-3 is based on a catalogue of 4536 quasar positions obtained from Very Long Baseline Interferometry (VLBI) radio measurements. This radio frame is crucial ...
  • Schoeman, Daniel Frederik (1996-06)

Search UnisaIR


Browse

My Account