Institutional Repository

Browsing 1995 SAICSIT 95 Research and Development Symposium by Issue Date

Browsing 1995 SAICSIT 95 Research and Development Symposium by Issue Date

Sort by: Order: Results:

  • Radovanovic, A; Venter, DM (1995)
    South African networking history started in the mid 1980's. Within less than ten years, the country became the 15-th fastest growing network within the lnternet community. Today, the South African network offers a variety ...
  • Ntlatlapa, N (1995)
    Symmetric positive definite matrices appear in most methods for Unconstrained Optimization. The method widely adopted for factoring these matrices is Cholesky Factorization. Furthermore, in Quassi-Newton methods for ...
  • Blewett, CN; Erwin, GJ (1995)
    The book uses storytelling as teaching, with exclusive use of active tense, local examples a problem-driven approach rather than a product-driven approach. For example, magnetic tape principles are explained in ...
  • De Villiers, C; Roode, JD (1995)
    lnterpersonal skills and communications are the two topics in Curriculum '95, compiled by the joint task force of the ACM/AIS-ICIS/DPMA, where both academics and industry expect the level of knowledge of the students to ...
  • Loock, M; Steenkamp, AL (1995)
    The research is conducted in the area of Software Engineering, with emphasis on the design phase of the Software Development Life Cycle (SDLC). The object-oriented paradigm is the point of departure. The investigation deals ...
  • Klein, HK; Truex, DP (1995)
    This paper outlines the basic theoretical assumptions of language analysis and then proposed a new approach called discourse analysis. The theoretical foundations of discourse analysis are Wittgenstein's theory of language ...
  • Ikram, IM (1995)
    We consider the problem of automatically generating parallel programs in the occam language. In particular, we are concerned with the generation of program skeletons, that define just those computations that are common ...
  • Froneman, L; Roode, JD (1995)
    What to teach students in an undergraduate program in Information Systems at a tertiary institution has repeatedly been debated over the years. Various curricula have been published, the most recent effort being the IS ...
  • Sithole, AS (1995)
    This paper attempts to address the need and justification for a Computer Skills Requirements Model for Zimbabwe as well as the findings and plans following the recently completed Zimbabwe Computer Industry Manpower Survey. ...
  • Barrow, J (1995)
    This paper describes SuperText, a computer program designed to support productive expository writing processes among students at a distance teaching university. Being able to write well is an import communication skill, ...
  • Ram, V (1995)
    Software Reuse is the technique of reusing software components previously developed in order to reduce the effort required to develop new software. It is generally accepted that software reuse can improve the rate of ...
  • Ganchev, GF (1995)
    The compiler construction toolkit under development in the University of Botswana (UB is intended to allow the students build rapidly components of compilers for languages that they define. It consists of a case-type scanner ...
  • Nepal, T; Melville, S (1995)
    This paper deals with approaches to the timetabling problem, focusing on tertiary institutions in Southern Africa. A questionnaire which dealt with, inter alia, student population, number of class groups, methods used for ...
  • Kotze, P (1995)
    There are three major agents in a computer-based instruction (CBI) environment: the tutor, the tutoring system and the tutee. The emphasis of this paper is on the tutoring system which contains the instructional content ...
  • Blewett, CN; Erwin, GJ (1995)
    We describe the prototype of an expert system software advisor for the lock manager of a database system. The software advisor, called EAGLE (Expert Advisor for Granting Locks Effectively), is intended to become an ...
  • Daratos, J; Steenkamp, AL (1995)
    Many information strategists today agree that the Object-Oriented Technology (OOT) has particular requirements that should not be omitted from a traditional Information Technology (IT) strategy. An Object-Oriented Strategy ...
  • Teichroew, D (1995)
    The term "software engineering" originally appeared as a (some would say, the) solution to the software crisis; the term that has been used to include all the problems, real or perceived, in the use of computers in society. ...
  • Heidema, J; Labuschagne, WA; Meyer, TA; Rosenblatt, H (1995)
  • Thornton, DM; Steenkamp, AL (1995)
    Software quality assurance for object-oriented information systems development is the issue dealt with here. A Quality Assurance Reference Model is proposed based on the Revised Spiral Life Cycle Model. The Quality Assurance ...
  • Hillebrand, G (1995)
    This paper presents an overview of the established concepts of David Harel' s higraphs, to increase their visibility. Higraphs are a union of extended graph and extended set theory which allows the understandable definition ...

Search UnisaIR


Browse

My Account