Institutional Repository

Browsing SAICSIT Proceedings: 1979-2001 by Issue Date

Browsing SAICSIT Proceedings: 1979-2001 by Issue Date

Sort by: Order: Results:

  • De Waal, DA; Denecker, M; Bruynooghe, M; Thielscher, M (2000)
    In deductive planning, there exists a· particular class of planning problems, called unsolvable planning problems, which although successfully treated theoretically, turns out to be undetectable using ordinary resolution ...
  • Dekenah, B (2000)
    The role of the Chief Information Officer (CIO) and all that it represents has inspired much discussion and speculation, as well as varied and heated debate, in overseas publications. In South Africa however, the title ...
  • Figueira, R; Berman, S (2000)
    This paper describes a metamodelling system that has been created at the University of Cape Town as part of an integrated software engineering environment called the Persistent Programmers Workshop. The workshop architecture ...
  • Hajek, M (2000)
    A neural network was used to model experimental fluidisation data - bubble size and velocity - from a laboratory size fluidised bed column. Experiments were performed for several particle sizes and temperatures. A classical ...
  • Coetzee, MA; Baart, ML (2000)
    In our research on transfinite interpolation with quadric patches, we needed to draw the part of some quadratic surface that lies between two given planes. In this talk, we discuss a way to parameterize a quadric patch ...
  • Foster, A (2000)
    This telemedicine project is a proof of concept for a remote respiratory disease diagnosis computer system, operating over a high bandwidth network, implemented in Java TM. It hopes to increase medical health in South ...
  • Sanders, I; Lubinsky, D; Sears, M (2000)
    Guarding and covering problems have great importance in Computational Geometry. In this paper the notion of a ray guard, a guard that can only 'see' along a single ray, is introduced. The problem of siting the fewest ...
  • Braude, B; Walker, AJ (2000)
    This paper explores the use of the Internet to supply and support software products within a quality management system. The Software Engineering Applications Laboratory (SEAL) at the University of the Witwatersrand is in ...
  • Serutla, SL; Oosthuizen, GD (2000)
    Ease of retrieval is of crucial importance in case based reasoning (CBR). In fact, the performance of a CBR system depends on how such a system is able to retrieve relevant cases from memory and adapts them to suit new ...
  • Viljoen, E (2000)
    Logics of belief and knowledge are typically formulated in terms of modal languages. A possible world semantics is traditionally used for such languages but when a formula A is read as "The agent believes that A", the ...
  • Hattingh, JM (2000)
    In general response surface analysis refers to the modeling of experimental or observational data. Computer technology and graphical techniques obviously play a significant role in the representations of these models. A ...
  • Hazelhurst, S (2001)
    The use of IP filtering to improve system security is well established, and although limited in what it can achieve has proved to be efficient and effective. In the design of a security policy there is always a trade-off ...
  • De Ridder, C; Pretorius, L; Barnard, A (2001)
    With the advent of the lnformation Age and global connectivity, the ethical use of Information and Communication Technologies (/CI) has become essential. As the drive towards the establishment of a so-called IT profession ...
  • Wong, B; Marsden, G (2001)
    With the continuing growth of the Internet, an increasing number of organisations are incorporating the Web into their business activities. The appeal of a site to users in terms of both attractiveness and usability ...
  • Van Zyl, J; Walker, AJ (2001)
    The notion of patterns has been used in many different disciplines, and the software industry is no exception. There are many books written, academic research done and practical examples available of where patterns have ...
  • Casanueva, J; Blake, E (2001)
    Presence in Collaborative Virtual Environments (CVEs) can be divided into personal presence and co-presence. Personal presence is having a feeling of "being there" in the CVE oneself. Co-presence is having a feeling that ...
  • Burford, DJ; Blake, EH (2001)
    Facial expressions form an important part of human to human communication. In order to exploit the fall potential of computer networks and the Internet for communication and interaction, provision should be made for conveying ...
  • Lutu, PEN (2001)
    Data mining is the process of extracting informative patterns from data stored in a database or data warehouse. Decision tree induction algorithms, from the area of machine learning are well suited for building classification ...
  • Dixie, CH; Wesson, JL (2001)
    Research is underway at the University of Port Elizabeth (UPE) to establish a framework for introductory IT courses to match the needs of future graduates of diverse programmes from the Faculties of Arts, Building Sciences, ...
  • Renaud, K (2001)
    This paper discusses issues pertaining to mechanisms which can be used to change the behaviour of Java classes at runtime. The proxy mechanism will be compared to and contrasted with other standard approaches to this ...

Search UnisaIR


Browse

My Account