Institutional Repository

Browsing School of Computing by Title

Browsing School of Computing by Title

Sort by: Order: Results:

  • Sanders, I (1998)
    In an earlier paper the notion of a ray guard --'- a guard that can only see along a single ray, was introduced. The ray guarding problem is in siting the fewest possible such guards so that they guard all adjacencies ...
  • Finnie, G.R. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    This paper describes a study of changes in attitude toward computers exhibited by novice student users during a first course in business computing. Several dimensions of attitude were established by factor analysis. ...
  • Mwapwele, Samwel; Van Biljon, Judy (John Wiley & Sons Ltd, 2021)
    Collaboration is fundamental to progress in the field of information and communication technologies for development (ICT4D) research where interdisciplinary teams are involved in the requirements elicitation, design, ...
  • Rennhackkamp, MH (South African Institute of Computer Scientists and Information Technologists, 1990)
    A distributed database management system must facilitate integrated processing of data which is physically distributed over a network of node computers, while providing locality transparency. The NRDNIX prototype has ...
  • Rennhackkamp, M (1991)
    There is, as yet, no single formal definition for the object-oriented approach. The object-oriented paradigm is described in terms of the concepts accentuated by the approach, namely classes, objects, methods, messages and ...
  • Nassis, Antonios (1995-11)
    Modern data intensive applications, such as multimedia systems require the ability to store and manipulate complex data. The classical Database Management Systems (DBMS), such as relational databases, cannot support these ...
  • Waldron, JT (South African Computer Society (SAICSIT), 2000)
    Dynamic quantitative measurements of Bytecode and Stack Frame Usage by Eiffel and Java Programs in the Java Virtual Machine are made. Two Eiffel programs are dynamically analysed while executing on the JVM, and the results ...
  • Watzenboeck, M (2000)
    Financial industry and manufacturing are the main customers in migrating existing applications into client server environments. This paper helps in identifying the candidates for migration and suggests a method for ...
  • Loock, M; Steenkamp, AL (1995)
    The research is conducted in the area of Software Engineering, with emphasis on the design phase of the Software Development Life Cycle (SDLC). The object-oriented paradigm is the point of departure. The investigation deals ...
  • Schimkat, RD; Kuchlin, W; Krautter, R (South African Computer Society (SAICSIT), 1999)
    Reuse of software components offers the potential for significant savings in application development costs and time. This paper provides a characterization of reuse at different levels of client-based software in distributed ...
  • Schach, Stephen R. (South African Computer Society (SAICSIT), 1994)
    The object-oriented paradigm is widely promoted as the optimal way to develop software. However, there is as yet no experimental evidence to back that assertion, and it is extremely unlikely that such evidence could be ...
  • Daratos, J; Steenkamp, AL (1995)
    Many information strategists today agree that the Object-Oriented Technology (OOT) has particular requirements that should not be omitted from a traditional Information Technology (IT) strategy. An Object-Oriented Strategy ...
  • Dempster, Robert (South African Institute of Computer Scientists and Information Technologists, 1990)
    OCTOLISP is a functional programming language which provides the programmer with a number of explicit data structures, such as lists, stacks, vectors, sets, trees and forests. Each of these data structures also has a ...
  • Labuschagne, W.A.; Van Rooyen, H.O. (Computer Society of South Africa (on behalf of SAICSIT), 1984)
    A technique for partially representing binary group operations by sets of binary relations was devised by Cayley. This technique can be generalised to permit the representation of arbitrary sets of n-ary relations {n ~ ...
  • Wortmann, KL; Petkov, D; Senior, E (2000)
    Case Based Reasoning is an Artificial Intelligence technique that utilises the concept of reasoning from a stored knowledge base reflecting prior experience. It offers a number of advantages, such as learning and validation ...
  • Finnie, G.R. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Learning to use a decision support system involves both formal and informal teaching as well as self-teaching. Many cases have been documented of unsuccesful implementation of DSS or MIS in organisations and identifying ...
  • Kunene, KN; Petkov, D (1998)
    Research in the field of Group Decision Support Systems (GDSS) has focused on the following main issues: the Task (task complexity, clarity and rationality); the Individual (the profile of individual group members); the ...
  • Orlowska, ME (1987)
    We propose a mathematical model of a database with incomplete information, which we call the N-system. Basically speaking, such a system stores information concerning properties of some objects. The information may be ...
  • Orlowska, M.E. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    We propose a mathematical model of a database with incomplete information, which we call the N-system. Basically speaking, such a system stores information concerning properties of some objects. The information may be ...
  • Naccache de Paz, D (South African Institute of Computer Scientists and Information Technologists, 1990)
    A new incremental algorithm for generating permutations on 1,2,..n (hereafter called "arrangements') is presented. The scheme generates arrangement k +1 by reversing a certain prefix of its predecessor and linking it to ...

Search UnisaIR


Browse

My Account