Institutional Repository

Browsing School of Computing by Title

Browsing School of Computing by Title

Sort by: Order: Results:

  • Melton, A; Shenoi, S (South African Computer Society (SAICSIT), 1992)
    It is often the case that a major concern with databases is security. In this paper we introduce a new model for database security. The basic idea of this new model is that answers to queries are based on equivalent data ...
  • Mende, J. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Research has a utilitarian role of providing the knowledge needed by the designers of mankind's artefacts. In this context four distinct categories of knowledge are identifiable. 1. Laws of Nature describe inherent ...
  • Short, R.M.C. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Learning about the domain into which an information system will fit is an essential part of the system development process. In this paper it is argued that the first stage of the development process should be learning ...
  • De Villiers, M.R. (Ruth) (2006)
    Outcomes-based education (OBE) is the educational paradigm currently advocated in South Africa. This paper proposes the Hexa-C Metamodel (HCMm) as a learning theory foundation for the design and development of e-learning ...
  • Van Biljon, Judy; Dembskey, Evan (2011-10-26)
    Developing countries such as South Africa have underdeveloped human resources. Teaching with information communication technology (ICT) as enabling technology has often been proposed as an approach to maximize the development ...
  • De Villiers, M.R. (Ruth); Becker, Daphne; Adebesin, Tawakkaltu Funmilola (2012)
    E-learning tutorials provide engaging learning activities and feedback assupplementary study material for distance learners. Relations is an interactive, CD-based, multi-media tutorial, custom-built to foster mathematical ...
  • Ronald Mitchell Campbell (2014-03-20)
    The purpose of this study is to identify the legal and ethical issues involved with the deployment of a computer system defence implementation known as a honeypot. During the course of this research reference shall be made ...
  • Dagada, Rabelani (2014-11)
    E-commerce is growing rapidly due to the massive usage of the Internet to conduct commercial transactions. This growth has presented both customers and merchants with many advantages. However, one of the challenges in ...
  • Twinomurinzi, Hossana; Bon, Anna; Jordaan, Dolf; Schryver, Tom De (2012)
    Continuous technological innovations in ICTs have unleashed many new educational practices worldwide. Most higher education institutions nowadays use different kinds of Elearning. In this paper we will show that constraining ...
  • Yellen, RE; Sanford, CC (South African Computer Society (SAICSIT), 1995)
    The Singapore government's adoption of policies which has promulgated an infrastructure heavily reliant on information technology is used as a model to explain Singapore's remarkable economic growth. This model helps to ...
  • Thomas, TA; Brown, S (2001)
    Group activities are important for students in order to develop the skills they will need for working with other people when they get into industry. The Internet offers an exciting environment for students to practise these ...
  • Mazhindu_Shumba, R (1996)
    This paper presents the lessons learned from using the C++ programming language and an object-oriented design methodology for the development of a prototype analysis tool for inheritance relationships in object-oriented ...
  • Baart, L; McLeod, R (2000)
    R.A. Liming developed a method based on classical conic section theory to design cross-sections of aircraft using implicit rather than explicit forms of the quadratic equations. In its basic form the method is used to ...
  • Oosthuysen, WH; McDonald, T (South African Computer Society (SAICSIT), 1995)
    Until some years ago, management of TCP/IP based products was done in a proprietary fashion. Many large companies build their own system-wide management facilities because of a lack of usable systems to manage heterogeneous ...
  • Hazelhurst, SE (South African Institute of Computer Scientists and Information Technologists, 1991)
    The dining philosophers problem and the evolving philosophers problems are abstractions of resource sharing problems in parallel and distributed systems. A Linda solution to the dining problem has already been shown; this ...
  • Hattingh, JM (2000)
    In general response surface analysis refers to the modeling of experimental or observational data. Computer technology and graphical techniques obviously play a significant role in the representations of these models. A ...
  • Mata-Montero, M; Ellis, JA (South African Computer Society (SAICSIT), 1994)
    The Longest (s-t)-path Problem, a known NP-complete set, is shown to admit a linear time solution when the instances of the problem are restricted to partial k-trees. This class of graphs is defined and some of the properties ...
  • Kritzinger, Pieter S. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Current scientific and trade literature are flooded with information about local area networks. Details about physical media and their properties, versions of media access methods confusingly called protocols, variations ...
  • Misra, J (South African Computer Society (SAICSIT), 1998)
    This paper presents a short introduction to the UNITY logic, a fragment of linear temporal logic. The logic was designed to specify safety and progress properties of reactive systems. A version of the UNITY ...
  • Labuschagne, W.A.; Van der Westhuizen, PL (South African Computer Society (SAICSIT), 1992)
    The logician who encounters logic programming expects it to involve 'using predicate logic as a programming language'. He is soon disillusioned. He discovers that it really means 'programming in PROLOG', which in tum seems ...

Search UnisaIR


Browse

My Account