Institutional Repository

Browsing School of Computing by Title

Browsing School of Computing by Title

Sort by: Order: Results:

  • Smuts, W (South African Computer Society (SAICSIT), 1999)
    Most existing information security classification schemes use a 1-dimensional scale such as [top secret, secret, employee confidential, company confidential, restricted]. These classification schemes do not differentiate ...
  • Smuts, W (1998)
    Most existing information security classification schemes use a 1-dimensional scale such as [top secret, secret, employee confidential, company confidential, restricted]. These classification schemes do not differentiate ...
  • Machanick, Philip (South African Computer Society (SAICSIT), 1997)
    Experience in industry suggests that reuse does not happen without retraining, despite the fact that many experienced software engineers accept that reuse ought to be more efficient than coding from scratch. A possible ...
  • Unknown author (Computer Society of South Africa (on behalf of SAICSIT), 1987)
  • Bytheway, A; Hearne, G (1998)
    In considering the requirements of an academic infrastructure that might support computer science and information systems education in South Africa, it is easy to be driven solely by the opportunities that innovative ...
  • De Villiers, M.R. (Ruth); Pretorius, Marco Cobus (2012-09)
    An academic group and discussion forum were established on Facebook for a cohort of postgraduate students studying the concepts and principles of eLearning. The Forum had a constructivist, student-centric ethos, in which ...
  • Van Niekerk, C (1998)
    This talk will cover the following areas of importance to this problem: • Problems that Academic Institutions are facing today. • How Computer Associates want to get involved. • Overview of the Technology we are ...
  • De Villiers, M.R. (Ruth) (2010)
    Social networking sites, especially Facebook, are an integral part of the lifestyle of contemporary youth. The facilities are increasingly being used by older persons as well. Usage is mainly for social purposes, but the ...
  • Botha, R; Eloff, J (2001)
    The eXtensible Markup Language {XML) are being upheld as having the potential to change the way business is conducted. This will be effected by changing the way in which information is shared. However, with the sharing of ...
  • Botha, RA (2000)
    This paper defines an electronic workflow environment as being conducive to the performance of business processes according to certain policies and practices in an electronic fashion. The workflow procedure will be facilitated ...
  • Kotzé, Paula; Eloff, M.M.; Adesina-Ojo, Ayodele (6th International Conference on Enterprise Information Systems, Porto, Portugal, 14 – 17 April 2004, 2004-04)
    Universal design is the design of products and environments so that anyone can use them without adaptation or specialised design. Life must be simplified by making products, communications and the built environment more ...
  • Greenwood, PH; Nash, PE (South African Computer Society (SAICSIT), 1992)
    The purchase cost of specialized subroutine libraries can be high, especially if they need to be duplicated on several hosts on a local area network. A remote library access system has been designed, and a prototype built, ...
  • Sukhoo, Aneerav; Barnard, Andries; Eloff, M.M.; Van der Poll, John A; Motah, Mahendrenath (Information Science Institute, 2005)
    Software project management probably is a sector that has witnessed the highest rate of project failure in the world. This is not the case with project management concerned with other disciplines due to better management ...
  • De Villiers, M.R. (Ruth) (2007)
    The teaching and learning of a complex section in Theoretical Computer Science 1 in a distanceeducation context at the University of South Africa (UNISA) has been enhanced by a supplementary e-learning application called ...
  • De Villiers, M.R. (Ruth); Lubbe, Sam; Klopper, Rembrandt (2007)
    There is an increasing interest in action research in business and management studies. This is due to a number of drivers, an important one being that increasing numbers of degree candidates find it very convenient and ...
  • Quilling, RD; Erwin, GJ; Petkova, O (South African Computer Society (SAICSIT), 1999)
    Changes following South Africa's first democratic election when Nelson Mandela was elected President, have stimulated reviews of many economic, political and social structures including those in national education. One of ...
  • Drevin, L (1998)
    l. Activities and purpose of WG 11.8 WG 11.8 is one of the workgroups of TCl 1. WG 11.8 came together on 2 September 1998 on a boat between Vienna and Budapest as part of the IFIP World Computer Congress (WCC '98) where ...
  • Bosua, R; Du Plessis, A.L (South African Institute of Computer Scientists and Information Technologists, 1991)
    Specification languages to be used in conjunction with Ada as the implementation language have been proposed in the literature. Simultaneously, methods for the development of real-time software systems have been introduced, ...
  • Bishop, JM (1987)
    This paper looks at ways of obtaining a distributed version of an Ada program. Since current approaches require a large investment in system software, we propose instead the use of an Adapter, which can be a manual methodology ...
  • Pirow, Peter (Computer Society of South Africa (on behalf of SAICSIT), 1984)
    In five years of watching students operate terminals I have observed that the response time of the terminal has much to do with the comfort of the user. I have also observed this phenomenon in the business environment. ...

Search UnisaIR


Browse

My Account