School of Computing: Recent submissions

  • Van der Merwe, A; Labuschagne, W (1996)
    In the middle 80s Smith introduced a new way of deriving fully normalized tables: His method was based on the use of an dependency list and a dependency diagram to produce fifth normal form directly. We introduce the use ...
  • Suleman, H; Hajek, M (1996)
    Mathematica has proven itself to be a suitable platform on which to develop prototype Genetic Programming applications. However, due to the sheer complexity of genetic programming calculations, non-trivial problems cannot ...
  • Smith, D (1996)
    As changes in Information Technology and organisations move into the sophisticated areas of client/server computing and open, integrated architectures, the IS professional needs to develop an increasing range of skills and ...
  • Roux, HN; De Villiers, PJA (1996)
    The implementation of protocols can be speed up by incorporating formally validated designs in documents that describe new protocols. Unfortunately, this seldom happens in practice. It is proposed that a formally validated ...
  • Renaud, K; Kotze, P (1996)
    In many applications today multiple pre-existing database systems are integrated into a single multiple database system called a multidatabase system. There are various characteristics of these systems which distinguish ...
  • Pillay, N (1996)
    Development software is one of the courses that first year students studying towards a Diploma in Financial Studies enrol for. This course contains an appreciable amount of RMCOBOL programming. Past experience is indicative ...
  • Parkinson, E; Warren, PR (1996)
    We investigate the performance of simulated annealing and tabu search, two new general problem solving heuristics, on an examination timetabling problem. These two techniques are described here and issues arising from ...
  • Morris, A (1996)
    The independent online is the Internet service of Independent Newspapers, South Africa's largest newspaper group. This paper is a case study of the events of the past year, including the lessons, successes and failures ...
  • Watson, BW (1995)
    In this extended abstract, we present a brief description of the tutorial. The primary reference material, a book and some software (1] , is available for ftp from the Eindhoven University of Technology. In this tutorial, ...
  • Waja, M; Blignaut, R (1995)
    I/O Subsystem performance is one of the key components that impact the business operations of today's organisations. The objective of this paper is to provide a detailed performance evaluation of various storage architectures ...
  • Von Solms, R (1995)
    Traditionally, Technikon training was focused on career-oriented education and training. This has changed over the last few years and research has started to play a major role in Technikon education. This additional objective ...
  • Viljoen, Z; Steenkamp, AL (1995)
    People work together to solve a wide variety of problems using different forms of cooperation for each class of problem. Modern technology is complex, and therefore it is unusual for an individual to attempt the development ...
  • Viktor, HL; Cloete, I (1995)
    Artificial neural networks (ANNs) have been proven to be successful general machine learning techniques for, amongst others, pattern recognition and classification. Realworld problems in agriculture (soybean, tea), ...
  • Venter, IM; Blignaut, RJ (1995)
    The rapidly changing·end-user computing environment requires an informed recipient of information who can play an active role in the design of information systems to capture. retrieve and interpret data [6). We need our ...
  • Van Wyk, DF; Benade, SJ; Steenkamp, AL (1995)
    Any company that is involved in manufacturing, must be able to tell the exact difference between any two products of the same family. This is necessary to enable such a company to support these products during the total ...
  • Vahed, A (1995)
    The associative network presents a practical and efficient means for the storage and retrieval of data. Although the recall abilities of single-layer associative memories have been well researched[3], little investigation ...
  • Totev, DM (1995)
    The fundamental concept of the Pythagorean Brotherhood "All things are numbers" could easily be implemented in processing textual data considered not only from a linguistic point of view but also as a quantity of numbers. ...
  • Thornton, DM; Steenkamp, AL (1995)
    Software quality assurance for object-oriented information systems development is the issue dealt with here. A Quality Assurance Reference Model is proposed based on the Revised Spiral Life Cycle Model. The Quality Assurance ...
  • Teichroew, D (1995)
    The term "software engineering" originally appeared as a (some would say, the) solution to the software crisis; the term that has been used to include all the problems, real or perceived, in the use of computers in society. ...
  • Smuts, WB (1995)
    The real-time services offered by modern high speed networks are complex enough to prompt a new look at how these services should be paid for. In this article, it is motivated that paying for the use of guaranteed services ...

Search UnisaIR


Browse

My Account