Institutional Repository

Browsing 2001 National Research and Development Conference by Title

Browsing 2001 National Research and Development Conference by Title

Sort by: Order: Results:

  • Nirenstein, S; Blake, E; Winberg, S; Mason, A (2001)
    The predictive hierarchical level of detail optimization algorithm of Mason and Blake is experimentally evaluated in the form of a practical application to hierarchical radiosity. In a novel approach the recursively ...
  • Britz, K (2001)
    In formal logic, both semantic entailment and the conditional connective are used to formalize the intuitive notion of implication. The former is defined in the meta-language of the logic, and the latter in the language ...
  • Nepal, T; Petkov, D (2001)
    Organisations today face many issues that are complex and ill structured. The complexity of these issues does not lend themselves to structuring and formulation by quantitative models, or simple intuitive problem solving. ...
  • Von Solms, E; Eloff, JHP (2001)
    Information is a very valuable resource and must be protected against harmful attacks from inside as well as outside the organization. As a resource, information is the lifeline of many organizations and is therefore vital ...
  • Cohen, JF (2001)
    The validity of managerial activities such as strategic planning have come under increasing scrutiny in recent years. In particular, the validity of information systems strategic planning (ISSP) within South African ...
  • Dixie, CH; Wesson, JL (2001)
    Research is underway at the University of Port Elizabeth (UPE) to establish a framework for introductory IT courses to match the needs of future graduates of diverse programmes from the Faculties of Arts, Building Sciences, ...
  • Hart, ML; Davies, K; Barker-Goldie, E-J; Theron, A (2001)
    This research describes a study into the adoption of data mining (DM) techniques and tools in industry. They are seen by most companies interviewed as strategically important, with key applications varying per sector, but ...
  • Renaud, K (2001)
    This paper discusses issues pertaining to mechanisms which can be used to change the behaviour of Java classes at runtime. The proxy mechanism will be compared to and contrasted with other standard approaches to this ...
  • Renaud, K; Smith, E (2001)
    This paper presents a novel approach to a familiar problem - that of helping users to choose better passwords, and to remember them. User identification and authentication is an essential aspect of our technologically ...
  • Handzic, M; Van Toorn, C; Parkin, P (2001)
    The aim of the case study reported in this paper was to provide a cultural audit of a university school as a typical knowledge-based organisation. The subjects were 24 academic staff members who participated in the study ...
  • Thomas, TA; Brown, S (2001)
    Group activities are important for students in order to develop the skills they will need for working with other people when they get into industry. The Internet offers an exciting environment for students to practise these ...
  • Potgieter, BC (2001)
    Computer scientists and information technologists are morally obliged to study the social impact of their technologies. They must also consider the results of the non-positivistic · approaches that are generally avoided ...
  • Marte, O-C; Marais, P (2001)
    This paper presents preliminary work on the segmentation of Computed Tomography data using a model-based approach. Conventional image processing of CT data is aimed at the production of simple iso-surfaces far surgical ...
  • Lutu, PEN (2001)
    Data mining is the process of extracting informative patterns from data stored in a database or data warehouse. Decision tree induction algorithms, from the area of machine learning are well suited for building classification ...
  • Van Zyl, J; Walker, AJ (2001)
    The notion of patterns has been used in many different disciplines, and the software industry is no exception. There are many books written, academic research done and practical examples available of where patterns have ...
  • Hazelhurst, S (2001)
    The use of IP filtering to improve system security is well established, and although limited in what it can achieve has proved to be efficient and effective. In the design of a security policy there is always a trade-off ...
  • Burford, DJ; Blake, EH (2001)
    Facial expressions form an important part of human to human communication. In order to exploit the fall potential of computer networks and the Internet for communication and interaction, provision should be made for conveying ...
  • Kew, SJ; Dwolatzky, B (2001)
    "OPC" is an important new specification designed to solve interoperability problems in the process control environment. It is based on Microsoft's Component Object Model (COM). The paper surveys and describes the OPC ...
  • Van der Poll, JA; Kotze, P (2001)
    A formal specification of a multi-level marketing (MLM} business is presented. Specifying a MLM business boils down to specifying properties of and operations on mathematical forests and trees. The usefulness of the ...
  • Cloete, E; Miller, MG (2001)
    In this paper we consider the consequences of e-learning design and implementation on the working processes and on the roles to be fulfilled in the usually cyclic process of course development and exploitation. We analyse ...

Search UnisaIR


Browse

My Account