1995 SAICSIT 95 Research and Development Symposium: Recent submissions

  • Radovanovic, A; Venter, DM (1995)
    South African networking history started in the mid 1980's. Within less than ten years, the country became the 15-th fastest growing network within the lnternet community. Today, the South African network offers a variety ...
  • Ntlatlapa, N (1995)
    Symmetric positive definite matrices appear in most methods for Unconstrained Optimization. The method widely adopted for factoring these matrices is Cholesky Factorization. Furthermore, in Quassi-Newton methods for ...
  • Cloete, E (1995)
    A 1 D non-linear filter which is based on 'max-min' selectors is extended for use in 2 0 applications. The objective of this research is to remove impulsive noise without unduly changing original, valid data. Some examples ...
  • Hillebrand, G (1995)
    This paper presents an overview of the established concepts of David Harel' s higraphs, to increase their visibility. Higraphs are a union of extended graph and extended set theory which allows the understandable definition ...
  • Zellouf, M; Prevot, P; Aubry, R (1995)
    The project success depends to a large degree on communication and coordination among team members. But project management systems and models do not support cooperative group work. Their basic philosophy is rather hierarchical ...
  • Wesson, JL; De Kock, G de V (1995)
    Systems development methods or software methodologies have evolved considerably over the past few years. This development has tended to fall into two main areas: Software Engineering and Human Computer Interaction (HCI). ...
  • Watson, BW (1995)
    Compiler writing techniques have undergone a number of major revisions over the past forty years. The introduction of object-oriented design and implementation techniques promises to improve the quality of compilers, while ...
  • Watson, BW (1995)
    In this extended abstract, we present a brief description of the tutorial. The primary reference material, a book and some software (1] , is available for ftp from the Eindhoven University of Technology. In this tutorial, ...
  • Waja, M; Blignaut, R (1995)
    I/O Subsystem performance is one of the key components that impact the business operations of today's organisations. The objective of this paper is to provide a detailed performance evaluation of various storage architectures ...
  • Von Solms, R (1995)
    Traditionally, Technikon training was focused on career-oriented education and training. This has changed over the last few years and research has started to play a major role in Technikon education. This additional objective ...
  • Viljoen, Z; Steenkamp, AL (1995)
    People work together to solve a wide variety of problems using different forms of cooperation for each class of problem. Modern technology is complex, and therefore it is unusual for an individual to attempt the development ...
  • Viktor, HL; Cloete, I (1995)
    Artificial neural networks (ANNs) have been proven to be successful general machine learning techniques for, amongst others, pattern recognition and classification. Realworld problems in agriculture (soybean, tea), ...
  • Venter, IM; Blignaut, RJ (1995)
    The rapidly changing·end-user computing environment requires an informed recipient of information who can play an active role in the design of information systems to capture. retrieve and interpret data [6). We need our ...
  • Van Wyk, DF; Benade, SJ; Steenkamp, AL (1995)
    Any company that is involved in manufacturing, must be able to tell the exact difference between any two products of the same family. This is necessary to enable such a company to support these products during the total ...
  • Vahed, A (1995)
    The associative network presents a practical and efficient means for the storage and retrieval of data. Although the recall abilities of single-layer associative memories have been well researched[3], little investigation ...
  • Totev, DM (1995)
    The fundamental concept of the Pythagorean Brotherhood "All things are numbers" could easily be implemented in processing textual data considered not only from a linguistic point of view but also as a quantity of numbers. ...
  • Thornton, DM; Steenkamp, AL (1995)
    Software quality assurance for object-oriented information systems development is the issue dealt with here. A Quality Assurance Reference Model is proposed based on the Revised Spiral Life Cycle Model. The Quality Assurance ...
  • Teichroew, D (1995)
    The term "software engineering" originally appeared as a (some would say, the) solution to the software crisis; the term that has been used to include all the problems, real or perceived, in the use of computers in society. ...
  • Smuts, WB (1995)
    The real-time services offered by modern high speed networks are complex enough to prompt a new look at how these services should be paid for. In this article, it is motivated that paying for the use of guaranteed services ...
  • Sithole, AS (1995)
    This paper attempts to address the need and justification for a Computer Skills Requirements Model for Zimbabwe as well as the findings and plans following the recently completed Zimbabwe Computer Industry Manpower Survey. ...

Search UnisaIR


Browse

My Account