Institutional Repository

Browsing School of Computing by Title

Browsing School of Computing by Title

Sort by: Order: Results:

  • Pirow, Peter (Computer Society of South Africa (on behalf of SAICSIT), 1984)
    In five years of watching students operate terminals I have observed that the response time of the terminal has much to do with the comfort of the user. I have also observed this phenomenon in the business environment. ...
  • Berman, Sonia (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    An automated database design tool called ADD has been developed at the University of Cape Town. This system obtains a requirements specification from a user and from this generates a relation scheme and a Codasyl schema. ...
  • Buthelezi, Mokateko Portia (2017-06)
    nformation security (InfoSec) policies are widely used by institutions as a form of InfoSec control measure to protect their information assets. InfoSec policies are commonly documented in natural language, which is prone ...
  • Buthelezi, Mokateko Portia (2017-06)
    Information security (InfoSec) policies are widely used by institutions as a form of InfoSec control measure to protect their information assets. InfoSec policies are commonly documented in natural language, which is prone ...
  • Kamau, John Wachira (2017-02)
    Open source products such as software development tools and server applications are gaining popularity among expert users. There is however a notable lag in adoption of desktop open source software among ordinary users ...
  • Musanhi, Nyaradzo (2021-11-19)
    This study investigated how the attitudes of taxi entrepreneurs affect their acceptance of transport management systems in the South African taxi industry. The study was instigated by a rise in the adoption of transport ...
  • Schoeman, Marthie; Venter, Lucas; Cloete, Elsabé (2007)
    Agents and mobile agents hold significant benefits for current trends in computing. Despite some industries actively exploring mobile agent applications the promised deployment has not taken place as expected. Possible ...
  • Scott, TG; Hattingh, J.M.; Steyn, T (South African Computer Society (SAICSIT), 1996)
    The simplex method is one way of solving a linear programming problem (LP-problem). An A* search algorithm based on a certain evaluation function has been developed to obtain the shortest path to an optimal solution within ...
  • Messerschmidt, HJ; Robertson, J (2000)
    This paper outlines a new direct algebraic method for the factorization of integers. It shows how by using a mixed binary - decimal multiplication scheme the multiplication can be reconstructed from the product only. This ...
  • Roets, P. P. (Computer Society of South Africa (on behalf of SAICSIT), 1979)
    An algorithm is presented for sorting a random access file in place. The algorithm is unique in the sense that no auxiliary storage, apart from a number of buffers in the machine's high-speed memory, is required. In ...
  • Christensen, A. H. J. (A. H. J. Christensen (1979) An Algorithm for the Approximation of Surfaces and for the Packing of Volumes. Computer Society of South Africa (on behalf of SAICSIT), 1979)
    An algorithm is presented here that approximates a given swface A by a set of regular or semi-regular faces forming a polyhedron C. If the faces are all square, C assumes the aspect of a 'blocked' swface. It is also ...
  • Kroeze, Jan H.; Ponelis, Shana; Venter, Isabella M.; Pretorius, Philip; Prinsloo, Paul (International Multi-conference on Society, Cybernetics and Informatics, 2012-07-17)
    This paper explores graduate attributes as is required of students in Computer Science and Information Systems disciplines in Africa in general and in South Africa in particular. Graduate attributes as envisioned by students ...
  • Philips, N.C.K. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    This paper presents an axiomatic specification of a data type which is shown to be equivalent to the Vienna data structures. The advantage of this alternative approach is its obvious simplicity.
  • De Villiers, C; Roode, JD (1995)
    lnterpersonal skills and communications are the two topics in Curriculum '95, compiled by the joint task force of the ACM/AIS-ICIS/DPMA, where both academics and industry expect the level of knowledge of the students to ...
  • Melville, S (1991)
    CommunIcations networks with sporadically available links pose particular problems in terms of delay analysis. This paper presents an approach to determining the effectiveness of various routing strategies when applied ...
  • Melville, SW (South African Institute of Computer Scientists and Information Technologists, 1992)
    Communications networks with sporadically available links pose particular problems in terms of delay analysis. This paper presents an approach to determining the effectiveness of various routing strategies when applied to ...
  • Barth, Kirstin (2018-09)
    This research determines whether data quality mining can be used to describe, monitor and evaluate the scope and impact of semantic data quality problems in the learner enrolment data on the National Learners’ Records ...
  • Fiseha, Martha Sileshi (2020-02)
    Effective Governance of Enterprise Information Technology (GEIT) is very important for an enterprise that has a huge investment in IT infrastructure. Implementing effective GEIT helps an enterprise to meet stakeholder needs ...
  • Erlank, S; Pelteret, D; Meskin, M (South African Institute of Computer Scientists and Information Technologists, 1991)
    The systems development process is commonly described in terms of a System Development Life Cycle (SDLC). There is a wide range of tools and techniques available to the system developer, and these are typically used for ...
  • Mann, R.J. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    A basic description of the facilities of the computer modelling package, AUTO-CONFIGURATER, is presented together with detailed procedures to calculate the required input parameters from monitor statistics. Techniques to ...

Search UnisaIR


Browse

My Account