Institutional Repository

Browsing School of Computing by Type "Article"

Browsing School of Computing by Type "Article"

Sort by: Order: Results:

  • Smuts, W (South African Computer Society (SAICSIT), 1999)
    Most existing information security classification schemes use a 1-dimensional scale such as [top secret, secret, employee confidential, company confidential, restricted]. These classification schemes do not differentiate ...
  • Machanick, Philip (South African Computer Society (SAICSIT), 1997)
    Experience in industry suggests that reuse does not happen without retraining, despite the fact that many experienced software engineers accept that reuse ought to be more efficient than coding from scratch. A possible ...
  • Unknown author (Computer Society of South Africa (on behalf of SAICSIT), 1987)
  • De Villiers, Mary Ruth; Pretorius, Marco Cobus (2012-09)
    An academic group and discussion forum were established on Facebook for a cohort of postgraduate students studying the concepts and principles of eLearning. The Forum had a constructivist, student-centric ethos, in which ...
  • De Villiers, Mary Ruth (2010)
    Social networking sites, especially Facebook, are an integral part of the lifestyle of contemporary youth. The facilities are increasingly being used by older persons as well. Usage is mainly for social purposes, but the ...
  • Greenwood, PH; Nash, PE (South African Computer Society (SAICSIT), 1992)
    The purchase cost of specialized subroutine libraries can be high, especially if they need to be duplicated on several hosts on a local area network. A remote library access system has been designed, and a prototype built, ...
  • Sukhoo, Aneerav; Barnard, Andries; Eloff, Mariki; Van der Poll, John Andrew; Motah, Mahendrenath (Information Science Institute, 2005)
    Software project management probably is a sector that has witnessed the highest rate of project failure in the world. This is not the case with project management concerned with other disciplines due to better management ...
  • De Villiers, Mary Ruth; Lubbe, Sam, 1952-; Klopper, Rembrandt (2007)
    There is an increasing interest in action research in business and management studies. This is due to a number of drivers, an important one being that increasing numbers of degree candidates find it very convenient and ...
  • De Villiers, Mary Ruth (2007)
    The teaching and learning of a complex section in Theoretical Computer Science 1 in a distanceeducation context at the University of South Africa (UNISA) has been enhanced by a supplementary e-learning application called ...
  • Quilling, RD; Erwin, GJ; Petkova, O (South African Computer Society (SAICSIT), 1999)
    Changes following South Africa's first democratic election when Nelson Mandela was elected President, have stimulated reviews of many economic, political and social structures including those in national education. One of ...
  • Bosua, R; Du Plessis, A.L (South African Institute of Computer Scientists and Information Technologists, 1991)
    Specification languages to be used in conjunction with Ada as the implementation language have been proposed in the literature. Simultaneously, methods for the development of real-time software systems have been introduced, ...
  • Pirow, Peter (Computer Society of South Africa (on behalf of SAICSIT), 1984)
    In five years of watching students operate terminals I have observed that the response time of the terminal has much to do with the comfort of the user. I have also observed this phenomenon in the business environment. ...
  • Berman, Sonia (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    An automated database design tool called ADD has been developed at the University of Cape Town. This system obtains a requirements specification from a user and from this generates a relation scheme and a Codasyl schema. ...
  • Schoeman, Marthie; Venter, Lucas; Cloete, Elsabé (2007)
    Agents and mobile agents hold significant benefits for current trends in computing. Despite some industries actively exploring mobile agent applications the promised deployment has not taken place as expected. Possible ...
  • Scott, TG; Hattingh, J.M.; Steyn, T (South African Computer Society (SAICSIT), 1996)
    The simplex method is one way of solving a linear programming problem (LP-problem). An A* search algorithm based on a certain evaluation function has been developed to obtain the shortest path to an optimal solution within ...
  • Roets, P. P. (Computer Society of South Africa (on behalf of SAICSIT), 1979)
    An algorithm is presented for sorting a random access file in place. The algorithm is unique in the sense that no auxiliary storage, apart from a number of buffers in the machine's high-speed memory, is required. In ...
  • Christensen, A. H. J. (A. H. J. Christensen (1979) An Algorithm for the Approximation of Surfaces and for the Packing of Volumes. Computer Society of South Africa (on behalf of SAICSIT), 1979)
    An algorithm is presented here that approximates a given swface A by a set of regular or semi-regular faces forming a polyhedron C. If the faces are all square, C assumes the aspect of a 'blocked' swface. It is also ...
  • Kroeze, Jan H.; Ponelis, Shana; Venter, Isabella M.; Pretorius, Philip; Prinsloo, Paul (International Multi-conference on Society, Cybernetics and Informatics, 2012-07-17)
    This paper explores graduate attributes as is required of students in Computer Science and Information Systems disciplines in Africa in general and in South Africa in particular. Graduate attributes as envisioned by students ...
  • Philips, N.C.K. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    This paper presents an axiomatic specification of a data type which is shown to be equivalent to the Vienna data structures. The advantage of this alternative approach is its obvious simplicity.
  • Melville, SW (South African Institute of Computer Scientists and Information Technologists, 1992)
    Communications networks with sporadically available links pose particular problems in terms of delay analysis. This paper presents an approach to determining the effectiveness of various routing strategies when applied to ...

Search UnisaIR


Browse

My Account