Institutional Repository

Browsing 2001 National Research and Development Conference by Issue Date

Browsing 2001 National Research and Development Conference by Issue Date

Sort by: Order: Results:

  • Nash, JM; Gwilt, D; Ludwig, A; Shaw, K (2001)
    This research provides some qualitative insights into the prevalence and use of technologies to support decision-making in South Africa. The paper focuses on two hypotheses: firstly, that decision support technology is not ...
  • Machanick, P; Patel, Z (2001)
    The RAMpage memory hierarchy is an alternative to the traditional division between cache and main memory: main memory is moved up a level and DRAM is used as a paging device. Earlier RAMpage work has shown that the RAMpage ...
  • Kew, SJ; Dwolatzky, B (2001)
    "OPC" is an important new specification designed to solve interoperability problems in the process control environment. It is based on Microsoft's Component Object Model (COM). The paper surveys and describes the OPC ...
  • Dixie, CH; Wesson, JL (2001)
    Research is underway at the University of Port Elizabeth (UPE) to establish a framework for introductory IT courses to match the needs of future graduates of diverse programmes from the Faculties of Arts, Building Sciences, ...
  • Burford, DJ; Blake, EH (2001)
    Facial expressions form an important part of human to human communication. In order to exploit the fall potential of computer networks and the Internet for communication and interaction, provision should be made for conveying ...
  • Casanueva, J; Blake, E (2001)
    Presence in Collaborative Virtual Environments (CVEs) can be divided into personal presence and co-presence. Personal presence is having a feeling of "being there" in the CVE oneself. Co-presence is having a feeling that ...
  • Renaud, K (2001)
    This paper discusses issues pertaining to mechanisms which can be used to change the behaviour of Java classes at runtime. The proxy mechanism will be compared to and contrasted with other standard approaches to this ...
  • Lutu, PEN (2001)
    Data mining is the process of extracting informative patterns from data stored in a database or data warehouse. Decision tree induction algorithms, from the area of machine learning are well suited for building classification ...
  • Botha, M; Von Solms, R (2001)
    Computer crime and more particularly computer hacking has become increasingly active in today's business environment. Proof of this statement is a survey completed by the Computer Security Institute and the FBI which ...
  • Cloete, E; Miller, MG (2001)
    In this paper we consider the consequences of e-learning design and implementation on the working processes and on the roles to be fulfilled in the usually cyclic process of course development and exploitation. We analyse ...
  • Machanick, P (2001)
    Increasingly aggressive pipelining achieves diminishing returns. Simultaneous Multi-threading (SMT) attempts to exploit the fact that functional units are frequently idle. This paper argues the case for keeping the processor ...
  • Nirenstein, S; Blake, E; Winberg, S; Mason, A (2001)
    The predictive hierarchical level of detail optimization algorithm of Mason and Blake is experimentally evaluated in the form of a practical application to hierarchical radiosity. In a novel approach the recursively ...
  • Licker, PS; Anderson, R; Macintosh, C; Van Kets, A (2001)
    This research looks into factors that affect the readability of web sites. For those with low literacy skills, low readability may prove to be an insurmountable barrier to profitable, comfortable website use. Two factors ...
  • Nepal, T; Petkov, D (2001)
    Organisations today face many issues that are complex and ill structured. The complexity of these issues does not lend themselves to structuring and formulation by quantitative models, or simple intuitive problem solving. ...
  • Potgieter, BC (2001)
    Computer scientists and information technologists are morally obliged to study the social impact of their technologies. They must also consider the results of the non-positivistic · approaches that are generally avoided ...
  • Von Solms, E; Eloff, JHP (2001)
    Information is a very valuable resource and must be protected against harmful attacks from inside as well as outside the organization. As a resource, information is the lifeline of many organizations and is therefore vital ...
  • Van Zyl, J; Walker, AJ (2001)
    The notion of patterns has been used in many different disciplines, and the software industry is no exception. There are many books written, academic research done and practical examples available of where patterns have ...
  • Van der Poll, JA; Kotze, P (2001)
    A formal specification of a multi-level marketing (MLM} business is presented. Specifying a MLM business boils down to specifying properties of and operations on mathematical forests and trees. The usefulness of the ...
  • Britz, K (2001)
    In formal logic, both semantic entailment and the conditional connective are used to formalize the intuitive notion of implication. The former is defined in the meta-language of the logic, and the latter in the language ...

Search UnisaIR


Browse

My Account