Institutional Repository

Browsing 2001 National Research and Development Conference by Title

Browsing 2001 National Research and Development Conference by Title

Sort by: Order: Results:

  • Adler, J; Christelis, GD; Deneys, JA; Konidaris, GD; Lewis, G; Lipson, AG; Phillips, RL; Scott-Dawkins, DK; Shell, DA; Strydom, BV; Trakman, WM; Van Gool, LD (2001)
    Two polygons are adjacent if they have edges which share a common edge segment. In this paper we consider the problem of finding adjacencies in a set of n non-overlapping polygons. Using the fact that adjacent edges must ...
  • Pretorius, L; Bosch, SE (2001)
    Morphological analysis is a basic enabling application for further kinds of natural lan guage processing, including part-of-speech tagging, parsing, translation and other high-level applications. Automated morphological ...
  • Van Greunen, D; Wesson, J (2001)
    The goal of this paper is to discuss the role of usability testing in software development in South Africa. Throughout the software industry software engineers develop user interfaces (Ul) with little or no support from ...
  • Machanick, P; Patel, Z (2001)
    The RAMpage memory hierarchy is an alternative to the traditional division between cache and main memory: main memory is moved up a level and DRAM is used as a paging device. Earlier RAMpage work has shown that the RAMpage ...
  • Nirenstein, S; Blake, E; Winberg, S; Mason, A (2001)
    The predictive hierarchical level of detail optimization algorithm of Mason and Blake is experimentally evaluated in the form of a practical application to hierarchical radiosity. In a novel approach the recursively ...
  • Britz, K (2001)
    In formal logic, both semantic entailment and the conditional connective are used to formalize the intuitive notion of implication. The former is defined in the meta-language of the logic, and the latter in the language ...
  • Nepal, T; Petkov, D (2001)
    Organisations today face many issues that are complex and ill structured. The complexity of these issues does not lend themselves to structuring and formulation by quantitative models, or simple intuitive problem solving. ...
  • Von Solms, E; Eloff, JHP (2001)
    Information is a very valuable resource and must be protected against harmful attacks from inside as well as outside the organization. As a resource, information is the lifeline of many organizations and is therefore vital ...
  • Cohen, JF (2001)
    The validity of managerial activities such as strategic planning have come under increasing scrutiny in recent years. In particular, the validity of information systems strategic planning (ISSP) within South African ...
  • Dixie, CH; Wesson, JL (2001)
    Research is underway at the University of Port Elizabeth (UPE) to establish a framework for introductory IT courses to match the needs of future graduates of diverse programmes from the Faculties of Arts, Building Sciences, ...
  • Hart, ML; Davies, K; Barker-Goldie, E-J; Theron, A (2001)
    This research describes a study into the adoption of data mining (DM) techniques and tools in industry. They are seen by most companies interviewed as strategically important, with key applications varying per sector, but ...
  • Renaud, K (2001)
    This paper discusses issues pertaining to mechanisms which can be used to change the behaviour of Java classes at runtime. The proxy mechanism will be compared to and contrasted with other standard approaches to this ...
  • Renaud, K; Smith, E (2001)
    This paper presents a novel approach to a familiar problem - that of helping users to choose better passwords, and to remember them. User identification and authentication is an essential aspect of our technologically ...
  • Handzic, M; Van Toorn, C; Parkin, P (2001)
    The aim of the case study reported in this paper was to provide a cultural audit of a university school as a typical knowledge-based organisation. The subjects were 24 academic staff members who participated in the study ...
  • Thomas, TA; Brown, S (2001)
    Group activities are important for students in order to develop the skills they will need for working with other people when they get into industry. The Internet offers an exciting environment for students to practise these ...
  • Potgieter, BC (2001)
    Computer scientists and information technologists are morally obliged to study the social impact of their technologies. They must also consider the results of the non-positivistic · approaches that are generally avoided ...
  • Marte, O-C; Marais, P (2001)
    This paper presents preliminary work on the segmentation of Computed Tomography data using a model-based approach. Conventional image processing of CT data is aimed at the production of simple iso-surfaces far surgical ...
  • Lutu, PEN (2001)
    Data mining is the process of extracting informative patterns from data stored in a database or data warehouse. Decision tree induction algorithms, from the area of machine learning are well suited for building classification ...
  • Van Zyl, J; Walker, AJ (2001)
    The notion of patterns has been used in many different disciplines, and the software industry is no exception. There are many books written, academic research done and practical examples available of where patterns have ...
  • Hazelhurst, S (2001)
    The use of IP filtering to improve system security is well established, and although limited in what it can achieve has proved to be efficient and effective. In the design of a security policy there is always a trade-off ...

Search UnisaIR


Browse

My Account