Institutional Repository

Browsing School of Computing by Title

Browsing School of Computing by Title

Sort by: Order: Results:

  • Viljoen, Elizabeth (1997-04)
    The inadequacy of the usual possible world semantics of modal languages when the meaning of 'belief' is attached to the modal operator is discussed. Three other approaches are then investigated. In the case of Moore's ...
  • Masamha, Tavengwa (2020-02)
    Information and communication technology (ICT) greatly influence today’s business processes be it in public or private sectors. Everything that is done in business requires ICT in one way or the other. Research in ICTs ...
  • Berezner, SA; Krzesinski, AE (1995)
    Consider a circuit-switched network where several source switches are connected to a destination switch via a tandem switch. Circuit-switched networks traditionally employ a Blocked Calls Cleared ( BCC) admission rule: a ...
  • Machanick, Philip (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    There has been a proliferation of low-cost AI tools. Consideration is given as to how significant research may be conducted using these tools, in the light of experience of developing Al tools on large, expensive machines. ...
  • Diani, OA; Seipone, T (1996)
    A low-cost microcomputer-based online system has been developed for the basic In-patient Medical Records functions of a General Hospital. Its basic functions are: to access patient data, register and admit a patient, enter ...
  • Twinomurinzi, Hossana; Ojo, Rosemary Bukola (2010)
    The ability for a government administrator to make just, fair and reasonable decisions, better known as administrative decision making, is dependent on the information flow between the administrator and a citizen. South ...
  • Musungwa, Tapera (2021-03)
    As developing nations like South Africa chart a path of socio-economic development, the spatialisation of progress, opportunity, and neglect is a critical antecedent to policy-making and regional interventionism. Efforts ...
  • Kourie, D.G.; van den Heever, WJ; Oosthuizen, GD (South African Computer Society (SAICSIT), 1992)
    This paper describes how a machine translation system, LEXICA, has been used and adapted to translate from African languages to English. Results with Tswana provide comprehensible translations that, although not necessarily ...
  • Langa, S (1998)
    The purpose of the research is to investigate the management aspects of client/server computing. The latter is seen as a prerequisite for better management of all aspects of client/server computing. Noting the fact that ...
  • Turton, Trevor (Computer Society of South Africa (on behalf of SAICSIT), 1979)
    A new approach is proposed for the management of operating system state data. Relational database concepts are suggested for the analysis and organization of this data, and a common central service routine is described ...
  • Ramgovind, S.; Eloff, M.M.; Smith, E. (Information Security for South Africa, 2010-08-02)
    Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible scalable computing processing power to match elastic demand and supply, whilst reducing capital ...
  • Visser, P. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    This paper presents a summary of tutorial material on accepted management techniques and philosophies as applied to the development of large software systems, based upon the documentation for such systems.
  • Maphosa, M; Eloff, M.M. (2012-09-17)
    Businesses and organisations are undertaking innovative projects to gain competitive advantage in the market. Research into innovative project management has been biased towards how innovative projects are managed to the ...
  • Harmse, RG; Pullen, G (1998)
    This paper describes a proposed solution to address some of the problems encountered when attempting to teach programming to a large number of students with diverse backgrounds and vastly different levels of technological ...
  • Mcleod, G (South African Computer Society (SAICSIT), 1992)
    Organizations have used systems planning and development methodologies for some time now. Results are mixed, with some reporting substantial benefits, and others abandoning the process without achieving the desired benefits. ...
  • Potgieter, BC (2001)
    Computer scientists and information technologists are morally obliged to study the social impact of their technologies. They must also consider the results of the non-positivistic · approaches that are generally avoided ...
  • Kroeze, Jan H; Bothma, T.J.D.; Matthee, M.C. (2011)
    The article focuses on the conversion of linguistic data between an XML data cube and a three-dimensional array structure in Visual Basic 6 in order to eventually facilitate data access and manipulation. After a ...
  • Bause, F; Kritzinger, P; Sczittnick, M (South African Computer Society (SAICSIT), 1994)
    The Distributed Queue Dual Bus (DQDB) protocol or IEEE 802.6 has been accepted as the international standard for Metropolitan Area Networks (MAN). This paper describes a combined MIG/I and Markov model for the steady state ...
  • Lubbe, Sam; Klopper, Rembrandt; Rugbeer, Hemduth (2007)
    The study that is reported here investigated password security and related issues at a South African tertiary institution. The main reason was to investigate why password security is such a problem for students. This was ...

Search UnisaIR


Browse

My Account