Institutional Repository

Browsing School of Computing by Title

Browsing School of Computing by Title

Sort by: Order: Results:

  • Rennhackkamp, M (1991)
    There is, as yet, no single formal definition for the object-oriented approach. The object-oriented paradigm is described in terms of the concepts accentuated by the approach, namely classes, objects, methods, messages and ...
  • Nassis, Antonios (1995-11)
    Modern data intensive applications, such as multimedia systems require the ability to store and manipulate complex data. The classical Database Management Systems (DBMS), such as relational databases, cannot support these ...
  • Waldron, JT (South African Computer Society (SAICSIT), 2000)
    Dynamic quantitative measurements of Bytecode and Stack Frame Usage by Eiffel and Java Programs in the Java Virtual Machine are made. Two Eiffel programs are dynamically analysed while executing on the JVM, and the results ...
  • Watzenboeck, M (2000)
    Financial industry and manufacturing are the main customers in migrating existing applications into client server environments. This paper helps in identifying the candidates for migration and suggests a method for ...
  • Loock, M; Steenkamp, AL (1995)
    The research is conducted in the area of Software Engineering, with emphasis on the design phase of the Software Development Life Cycle (SDLC). The object-oriented paradigm is the point of departure. The investigation deals ...
  • Schimkat, RD; Kuchlin, W; Krautter, R (South African Computer Society (SAICSIT), 1999)
    Reuse of software components offers the potential for significant savings in application development costs and time. This paper provides a characterization of reuse at different levels of client-based software in distributed ...
  • Schach, Stephen R. (South African Computer Society (SAICSIT), 1994)
    The object-oriented paradigm is widely promoted as the optimal way to develop software. However, there is as yet no experimental evidence to back that assertion, and it is extremely unlikely that such evidence could be ...
  • Daratos, J; Steenkamp, AL (1995)
    Many information strategists today agree that the Object-Oriented Technology (OOT) has particular requirements that should not be omitted from a traditional Information Technology (IT) strategy. An Object-Oriented Strategy ...
  • Dempster, Robert (South African Institute of Computer Scientists and Information Technologists, 1990)
    OCTOLISP is a functional programming language which provides the programmer with a number of explicit data structures, such as lists, stacks, vectors, sets, trees and forests. Each of these data structures also has a ...
  • Labuschagne, W.A.; Van Rooyen, H.O. (Computer Society of South Africa (on behalf of SAICSIT), 1984)
    A technique for partially representing binary group operations by sets of binary relations was devised by Cayley. This technique can be generalised to permit the representation of arbitrary sets of n-ary relations {n ~ ...
  • Wortmann, KL; Petkov, D; Senior, E (2000)
    Case Based Reasoning is an Artificial Intelligence technique that utilises the concept of reasoning from a stored knowledge base reflecting prior experience. It offers a number of advantages, such as learning and validation ...
  • Finnie, G.R. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Learning to use a decision support system involves both formal and informal teaching as well as self-teaching. Many cases have been documented of unsuccesful implementation of DSS or MIS in organisations and identifying ...
  • Kunene, KN; Petkov, D (1998)
    Research in the field of Group Decision Support Systems (GDSS) has focused on the following main issues: the Task (task complexity, clarity and rationality); the Individual (the profile of individual group members); the ...
  • Orlowska, ME (1987)
    We propose a mathematical model of a database with incomplete information, which we call the N-system. Basically speaking, such a system stores information concerning properties of some objects. The information may be ...
  • Orlowska, M.E. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    We propose a mathematical model of a database with incomplete information, which we call the N-system. Basically speaking, such a system stores information concerning properties of some objects. The information may be ...
  • Naccache de Paz, D (South African Institute of Computer Scientists and Information Technologists, 1990)
    A new incremental algorithm for generating permutations on 1,2,..n (hereafter called "arrangements') is presented. The scheme generates arrangement k +1 by reversing a certain prefix of its predecessor and linking it to ...
  • Petkov, D; Mihova-Petkova, O (1996)
    Decision Support Systems(DSS) have been dealing so far predominantly with semistructured problems for which existed well established Operations Research techniques. Most of them were originally oriented towards supporting ...
  • Labuschagne, W.A.; Miller, MG (South African Computer Society (SAICSIT), 1994)
    Yet another axiomatisation of the Yale shooting scenario is provided. The point illustrated by the axiomatisation is that, when using the situation calculus to represent knowledge about a dynamic system in which actions ...
  • Petkov, D; Petkova, O (1998)
    The subject of IT outsourcing has received a growing attention recently both by practitioners and researchers. There are a number of critical decisions to be made by a company embarking on outsourcing. These include a ...
  • Gutiérrez Cárdenas, Juan Manuel (2022-01)
    The study of MicroRNAs (miRNAs), long non-coding RNAs (lncRNAs) and gene interactions may be expected to provide new technologies to serve as valuable biomarkers for personalized treatments of diseases and to aid in the ...

Search UnisaIR


Browse

My Account