SAICSIT Proceedings: 1979-2001: Recent submissions

  • Renaud, K; Smith, E (2001)
    This paper presents a novel approach to a familiar problem - that of helping users to choose better passwords, and to remember them. User identification and authentication is an essential aspect of our technologically ...
  • Hazelhurst, S (2001)
    The use of IP filtering to improve system security is well established, and although limited in what it can achieve has proved to be efficient and effective. In the design of a security policy there is always a trade-off ...
  • Hart, ML; Davies, K; Barker-Goldie, E-J; Theron, A (2001)
    This research describes a study into the adoption of data mining (DM) techniques and tools in industry. They are seen by most companies interviewed as strategically important, with key applications varying per sector, but ...
  • Harmse, R; Thomas, T (2001)
    The arrival of outcomes-based education (OBE) in South African means that we have to change the way in which we assess our learners. Coupled with this change comes a move to larger classes where individual assessment has ...
  • Handzic, M; Van Toorn, C; Parkin, P (2001)
    The aim of the case study reported in this paper was to provide a cultural audit of a university school as a typical knowledge-based organisation. The subjects were 24 academic staff members who participated in the study ...
  • Van Greunen, D; Wesson, J (2001)
    The goal of this paper is to discuss the role of usability testing in software development in South Africa. Throughout the software industry software engineers develop user interfaces (Ul) with little or no support from ...
  • Franken, J; Stander, A; Booley, Z; Isaacs, Z; Rose, R (2001)
    Designers of mobile systems continue to focus on transferring the typical workstation environment as prevalent on the desktop PC to mobile devices. The lack of specific focus on the requirements of the wireless platforms ...
  • Dixie, CH; Wesson, JL (2001)
    Research is underway at the University of Port Elizabeth (UPE) to establish a framework for introductory IT courses to match the needs of future graduates of diverse programmes from the Faculties of Arts, Building Sciences, ...
  • Cohen, JF (2001)
    The validity of managerial activities such as strategic planning have come under increasing scrutiny in recent years. In particular, the validity of information systems strategic planning (ISSP) within South African ...
  • Cloete, E; Miller, MG (2001)
    In this paper we consider the consequences of e-learning design and implementation on the working processes and on the roles to be fulfilled in the usually cyclic process of course development and exploitation. We analyse ...
  • Casanueva, J; Blake, E (2001)
    Presence in Collaborative Virtual Environments (CVEs) can be divided into personal presence and co-presence. Personal presence is having a feeling of "being there" in the CVE oneself. Co-presence is having a feeling that ...
  • Burford, DJ; Blake, EH (2001)
    Facial expressions form an important part of human to human communication. In order to exploit the fall potential of computer networks and the Internet for communication and interaction, provision should be made for conveying ...
  • Botha, R; Eloff, J (2001)
    The eXtensible Markup Language {XML) are being upheld as having the potential to change the way business is conducted. This will be effected by changing the way in which information is shared. However, with the sharing of ...
  • Botha, M; Von Solms, R (2001)
    Computer crime and more particularly computer hacking has become increasingly active in today's business environment. Proof of this statement is a survey completed by the Computer Security Institute and the FBI which ...
  • Barnard, A; Ehlers, EM (2001)
    In this paper we consider the representation and generation of three-dimensional structures by means of formal descriptive methods. Graph and graph grammar theory present us with a powerful two-dimensional representational ...
  • Adler, J; Christelis, GD; Deneys, JA; Konidaris, GD; Lewis, G; Lipson, AG; Phillips, RL; Scott-Dawkins, DK; Shell, DA; Strydom, BV; Trakman, WM; Van Gool, LD (2001)
    Two polygons are adjacent if they have edges which share a common edge segment. In this paper we consider the problem of finding adjacencies in a set of n non-overlapping polygons. Using the fact that adjacent edges must ...
  • Terblanche, F; Hattingh, G (1998)
    Response surface analysis aims of exploring the behavior of a response function in some region. Some authors (see e.g. [BRU] and [DEV]), have used this approach to get "better" interpretations of the behavior of linear ...
  • Smuts, W (1998)
    Most existing information security classification schemes use a 1-dimensional scale such as [top secret, secret, employee confidential, company confidential, restricted]. These classification schemes do not differentiate ...
  • Roussev, B (1998)
    The Advanced Operating Systems (AOS) module is one of the courses offered by the Computer Science Department in its honours program. The module aims are twofold: to enhance students' knowledge in single processor operating ...
  • Petkova, O; Roode, JD (1998)
    pAst software development productivity research has taken two main directions: in the first, research has concentrated on determining the factors which have a significant effect on productivity; and in the second, the ...

Search UnisaIR


Browse

My Account