College of Science, Engineering and Technology: Recent submissions

  • Ngubane, SB (1995)
    This paper discusses the development and implementation of a set of measures which support a Total Quality Management (TOM) process in a Systems Development environment. This process is taking place in the background of ...
  • Nepal, T; Melville, S (1995)
    This paper deals with approaches to the timetabling problem, focusing on tertiary institutions in Southern Africa. A questionnaire which dealt with, inter alia, student population, number of class groups, methods used for ...
  • Lubinsky, D (1995)
    The ability to learn from observations and to modify our understanding of the world based on experience is an essential aspect of intelligent behavior. Machine learning has thus become an important sub-area of artificial ...
  • Loock, M; Steenkamp, AL (1995)
    The research is conducted in the area of Software Engineering, with emphasis on the design phase of the Software Development Life Cycle (SDLC). The object-oriented paradigm is the point of departure. The investigation deals ...
  • Kotze, P (1995)
    There are three major agents in a computer-based instruction (CBI) environment: the tutor, the tutoring system and the tutee. The emphasis of this paper is on the tutoring system which contains the instructional content ...
  • Klein, HK; Truex, DP (1995)
    This paper outlines the basic theoretical assumptions of language analysis and then proposed a new approach called discourse analysis. The theoretical foundations of discourse analysis are Wittgenstein's theory of language ...
  • Ikram, IM (1995)
    We consider the problem of automatically generating parallel programs in the occam language. In particular, we are concerned with the generation of program skeletons, that define just those computations that are common ...
  • Heidema, J; Labuschagne, WA; Meyer, TA; Rosenblatt, H (1995)
  • Ganchev, GF (1995)
    The compiler construction toolkit under development in the University of Botswana (UB is intended to allow the students build rapidly components of compilers for languages that they define. It consists of a case-type scanner ...
  • Van Biljon, Judy; Van der Merwe, Ronell (Academic Conferences and Publishing International Limited, 2018)
    Advances in cloud computing technology coupled with increasing volumes of data has driven the growth and differentiation of cloud-based solutions in teaching and learning. The cloud computing industry has matured over the ...
  • Van Biljon, Judy; Van der Merwe, Ronell (Academic Conferences and Publishing International Limited, 2018)
    There are many uncertainties about the future of e-Learning, but one thing is certain: e-Learning will be more data-driven in the future. The automation of data capturing, analysis and presentation, together with economic ...
  • Froneman, L; Roode, JD (1995)
    What to teach students in an undergraduate program in Information Systems at a tertiary institution has repeatedly been debated over the years. Various curricula have been published, the most recent effort being the IS ...
  • De Villiers, C; Roode, JD (1995)
    lnterpersonal skills and communications are the two topics in Curriculum '95, compiled by the joint task force of the ACM/AIS-ICIS/DPMA, where both academics and industry expect the level of knowledge of the students to ...
  • Daratos, J; Steenkamp, AL (1995)
    Many information strategists today agree that the Object-Oriented Technology (OOT) has particular requirements that should not be omitted from a traditional Information Technology (IT) strategy. An Object-Oriented Strategy ...
  • Bosua, R (1995)
    Multiple CASE tools that support systems analysis and design are available today. These tools are becoming indispensable in its support for the systems development process, although the support varies in term of the methods ...
  • Blewett, CN; Erwin, GJ (1995)
    We describe the prototype of an expert system software advisor for the lock manager of a database system. The software advisor, called EAGLE (Expert Advisor for Granting Locks Effectively), is intended to become an ...
  • De Villiers, PJA (1991)
    A model checker automatically determines whether a model of a re­active system satisfies its specification.Temporal logic is used to spec­ify the intended behaviour of a reactive system which is modelled as a transition ...
  • Viktor, HL; Rennhackkamp, MH (1991)
    The most frequently used local database system failure recovery techniques are logging, shadowing and differential files. In a distributed database these, local system failure recovery techniques may be utilized for recovery ...
  • Venter, BH (1991)
    Most statically typed Algol-style languages were designed to conform with the view that a value belongs to one and only one type. The adoption of this view bought compiler simplicity at the ex­pense of language expressivity. ...
  • Van Zijl, L; Mitton, D (1991)
    Statecharts were developed by Harel et al [10] to specify complex reactive systems. In this paper we report on our application of statecharts as a design and specification tool for an X-Windows based Graphical User ...

Search UnisaIR


Browse

My Account