Institutional Repository

1998 National Research and Development Conference

1998 National Research and Development Conference

 

– Proceedings of the annual research and development symposium, SAICSIT (South African Institute for Computer Scientists and Information Technologists), Van Riebeeck Hotel, Gordons Bay, Cape Town, 23-24 November 1998, edited by D. Petkov and L. Venter (ISBN 1-86840-303-3).

Recent Submissions

  • Randiki, E (1998)
    The purpose of this paper is to identify and analyse error in selected medical devices: the Datex cardiocap and the capnomac Ultima II. These are both anaesthetic machines used to monitor patients in theatre. A secondary ...
  • Venter, L (1998)
    INSTAP is a multimedia program to teach Afrikaans at first year university level. The intended audience consists of students who come from non-Afrikaans speaking communities, and hence sound is a very important aspect of ...
  • Velinov, Y (1998)
    In this paper we share our experience in the design of electronic lectures for theoretical subjects. The basis for our discussion are experiments for designing electronic lectures in Set Theory using the potential of ...
  • Van Zyl, J (1998)
    The purpose of this paper is to describe the Leaming Model and related concepts. In the context of this paper, the following principles are discussed: • What do we need to learn? • How must we learn it? These two ...
  • Van Niekerk, C (1998)
    This talk will cover the following areas of importance to this problem: • Problems that Academic Institutions are facing today. • How Computer Associates want to get involved. • Overview of the Technology we are ...
  • Thomas, T (1998)
    This paper describes the social constructivist theory of learning and how it can be applied to handle the problems of diversity in Information Systems and Computer Science classes. Examples are given on methods that can ...
  • Terblanche, F; Hattingh, G (1998)
    Response surface analysis aims of exploring the behavior of a response function in some region. Some authors (see e.g. [BRU] and [DEV]), have used this approach to get "better" interpretations of the behavior of linear ...
  • Smuts, W (1998)
    Most existing information security classification schemes use a 1-dimensional scale such as [top secret, secret, employee confidential, company confidential, restricted]. These classification schemes do not differentiate ...
  • Roussev, B (1998)
    The Advanced Operating Systems (AOS) module is one of the courses offered by the Computer Science Department in its honours program. The module aims are twofold: to enhance students' knowledge in single processor operating ...
  • Petkova, O; Roode, JD (1998)
    pAst software development productivity research has taken two main directions: in the first, research has concentrated on determining the factors which have a significant effect on productivity; and in the second, the ...
  • Petkov, D; Petkova, O (1998)
    The subject of IT outsourcing has received a growing attention recently both by practitioners and researchers. There are a number of critical decisions to be made by a company embarking on outsourcing. These include a ...
  • Papenfus, C; Botha, RA (1998)
    Modem computer systems are truly awe-inspiring fetes of detailed design. Millions of transistors perform billions of instructions every second, linking thousands of people from every continent with a remarkable degree ...
  • Nepal, T; Andrew, T (1998)
    With the introduction of the degree programs in technikons the call for research outputs sounds increasingly urgent. Technikons have now realised that they are well positioned to also undertake applied and experimental ...
  • Munyiri, E; Von Solms, R (1998)
    Information has become a very important asset in most organizations today. For this reason, it is imperative that information and the associated resources are properly protected. Traditionally, information assets were ...
  • Muller, MC (1998)
    When I use the term Repository Driven User Interface (RDUI), it simply means that besides the normal data that users save and use in the running of a business, other data, concerning the user interface is also stored in ...
  • Mueller, C (1998)
    Formal methods have not as yet succeeded in becoming an accepted way to develop software. This paper explores whether a possible reason for this is the complexity of the tools we use, in particular, the programming paradigms. ...
  • Masethe, HD; Dandadzi, TA (1998)
    A change in the Strategic Infrastructure Development (SID) approach is called for in order to build academic quality. In the past the Information System (IS) infrastructure in South Africa was designed towards literacy ...
  • Machanick, P (1998)
    The SAVoD (Scalable Architecture for Video on Demand) approach to video on demand exploits the fact that end-user latency goals are relatively modest, while increasing bandwidth is much easier than improving bandwidth. ...
  • Machanick, P; Salverda, P (1998)
    The RAMpage memory hierarchy is an attempt at devising a comprehensive strategy to address the growing DRAM-CPU speed gap. By moving the main memory up a level to the SRAM currently used to implement the lowest-level ...
  • Machanick, P (1998)
    Latency goals often relate to response times seen by users, which are slow by computer standards, but scaling up to large numbers of users presents a problem. Examples include transaction-based systems and web sites. ...

View more