Institutional Repository

Browsing School of Computing by Title

Browsing School of Computing by Title

Sort by: Order: Results:

  • Ronald Mitchell Campbell (2014-03-20)
    The purpose of this study is to identify the legal and ethical issues involved with the deployment of a computer system defence implementation known as a honeypot. During the course of this research reference shall be made ...
  • Dagada, Rabelani (2014-11)
    E-commerce is growing rapidly due to the massive usage of the Internet to conduct commercial transactions. This growth has presented both customers and merchants with many advantages. However, one of the challenges in ...
  • Twinomurinzi, Hossana; Bon, Anna; Jordaan, Dolf; Schryver, Tom De (2012)
    Continuous technological innovations in ICTs have unleashed many new educational practices worldwide. Most higher education institutions nowadays use different kinds of Elearning. In this paper we will show that constraining ...
  • Yellen, RE; Sanford, CC (South African Computer Society (SAICSIT), 1995)
    The Singapore government's adoption of policies which has promulgated an infrastructure heavily reliant on information technology is used as a model to explain Singapore's remarkable economic growth. This model helps to ...
  • Thomas, TA; Brown, S (2001)
    Group activities are important for students in order to develop the skills they will need for working with other people when they get into industry. The Internet offers an exciting environment for students to practise these ...
  • Mazhindu_Shumba, R (1996)
    This paper presents the lessons learned from using the C++ programming language and an object-oriented design methodology for the development of a prototype analysis tool for inheritance relationships in object-oriented ...
  • Baart, L; McLeod, R (2000)
    R.A. Liming developed a method based on classical conic section theory to design cross-sections of aircraft using implicit rather than explicit forms of the quadratic equations. In its basic form the method is used to ...
  • Oosthuysen, WH; McDonald, T (South African Computer Society (SAICSIT), 1995)
    Until some years ago, management of TCP/IP based products was done in a proprietary fashion. Many large companies build their own system-wide management facilities because of a lack of usable systems to manage heterogeneous ...
  • Hazelhurst, SE (South African Institute of Computer Scientists and Information Technologists, 1991)
    The dining philosophers problem and the evolving philosophers problems are abstractions of resource sharing problems in parallel and distributed systems. A Linda solution to the dining problem has already been shown; this ...
  • Hattingh, JM (2000)
    In general response surface analysis refers to the modeling of experimental or observational data. Computer technology and graphical techniques obviously play a significant role in the representations of these models. A ...
  • Mata-Montero, M; Ellis, JA (South African Computer Society (SAICSIT), 1994)
    The Longest (s-t)-path Problem, a known NP-complete set, is shown to admit a linear time solution when the instances of the problem are restricted to partial k-trees. This class of graphs is defined and some of the properties ...
  • Kritzinger, Pieter S. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Current scientific and trade literature are flooded with information about local area networks. Details about physical media and their properties, versions of media access methods confusingly called protocols, variations ...
  • Misra, J (South African Computer Society (SAICSIT), 1998)
    This paper presents a short introduction to the UNITY logic, a fragment of linear temporal logic. The logic was designed to specify safety and progress properties of reactive systems. A version of the UNITY ...
  • Labuschagne, W.A.; Van der Westhuizen, PL (South African Computer Society (SAICSIT), 1992)
    The logician who encounters logic programming expects it to involve 'using predicate logic as a programming language'. He is soon disillusioned. He discovers that it really means 'programming in PROLOG', which in tum seems ...
  • Viljoen, Elizabeth (1997-04)
    The inadequacy of the usual possible world semantics of modal languages when the meaning of 'belief' is attached to the modal operator is discussed. Three other approaches are then investigated. In the case of Moore's ...
  • Masamha, Tavengwa (2020-02)
    Information and communication technology (ICT) greatly influence today’s business processes be it in public or private sectors. Everything that is done in business requires ICT in one way or the other. Research in ICTs ...
  • Berezner, SA; Krzesinski, AE (1995)
    Consider a circuit-switched network where several source switches are connected to a destination switch via a tandem switch. Circuit-switched networks traditionally employ a Blocked Calls Cleared ( BCC) admission rule: a ...
  • Machanick, Philip (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    There has been a proliferation of low-cost AI tools. Consideration is given as to how significant research may be conducted using these tools, in the light of experience of developing Al tools on large, expensive machines. ...
  • Diani, OA; Seipone, T (1996)
    A low-cost microcomputer-based online system has been developed for the basic In-patient Medical Records functions of a General Hospital. Its basic functions are: to access patient data, register and admit a patient, enter ...
  • Twinomurinzi, Hossana; Ojo, Rosemary Bukola (2010)
    The ability for a government administrator to make just, fair and reasonable decisions, better known as administrative decision making, is dependent on the information flow between the administrator and a citizen. South ...

Search UnisaIR


Browse

My Account