Institutional Repository

Browsing 1998 National Research and Development Conference by Issue Date

Browsing 1998 National Research and Development Conference by Issue Date

Sort by: Order: Results:

  • Hazelhurst, S; Fatti, A; Henwood, A (1998)
    The growth of network and internet communication creates several challenges for network design. Two important issues are security and performance. As the volume of communication increases together with the importance of ...
  • Machanick, P (1998)
    A commonly accepted hierarchy of cognitive skills puts analysis and synthesis near the top, with straightforward knowledge and comprehension at the bottom. A typical Computer Science curriculum, though, usually starts ...
  • Machanick, P (1998)
    Latency goals often relate to response times seen by users, which are slow by computer standards, but scaling up to large numbers of users presents a problem. Examples include transaction-based systems and web sites. ...
  • Kunene, KN; Petkov, D (1998)
    Research in the field of Group Decision Support Systems (GDSS) has focused on the following main issues: the Task (task complexity, clarity and rationality); the Individual (the profile of individual group members); the ...
  • Munyiri, E; Von Solms, R (1998)
    Information has become a very important asset in most organizations today. For this reason, it is imperative that information and the associated resources are properly protected. Traditionally, information assets were ...
  • Kruger, MF; Hattingh, JM (1998)
    Our investigation on the impact of partitioning the search space of the classical 0- 1 Knapsack Problem through the inclusion of equality constraints on the knapsack's cardinality, has given rise to the study we undertook ...
  • Machanick, P (1998)
    The SAVoD (Scalable Architecture for Video on Demand) approach to video on demand exploits the fact that end-user latency goals are relatively modest, while increasing bandwidth is much easier than improving bandwidth. ...
  • Mueller, C (1998)
    Formal methods have not as yet succeeded in becoming an accepted way to develop software. This paper explores whether a possible reason for this is the complexity of the tools we use, in particular, the programming paradigms. ...
  • Langa, S (1998)
    The purpose of the research is to investigate the management aspects of client/server computing. The latter is seen as a prerequisite for better management of all aspects of client/server computing. Noting the fact that ...
  • Joubert, A; Jordaan, A (1998)
    This paper explores the use of dive computer downloader units and Delphi 3 object-oriented structures to integrate the fields of Computer Systems and Software Engineering in the academic environment. Currently there is a ...
  • Muller, MC (1998)
    When I use the term Repository Driven User Interface (RDUI), it simply means that besides the normal data that users save and use in the running of a business, other data, concerning the user interface is also stored in ...
  • Machanick, P; Salverda, P (1998)
    The RAMpage memory hierarchy is an attempt at devising a comprehensive strategy to address the growing DRAM-CPU speed gap. By moving the main memory up a level to the SRAM currently used to implement the lowest-level ...
  • Nepal, T; Andrew, T (1998)
    With the introduction of the degree programs in technikons the call for research outputs sounds increasingly urgent. Technikons have now realised that they are well positioned to also undertake applied and experimental ...
  • Harmse, RG; Pullen, G (1998)
    This paper describes a proposed solution to address some of the problems encountered when attempting to teach programming to a large number of students with diverse backgrounds and vastly different levels of technological ...
  • Masethe, HD; Dandadzi, TA (1998)
    A change in the Strategic Infrastructure Development (SID) approach is called for in order to build academic quality. In the past the Information System (IS) infrastructure in South Africa was designed towards literacy ...
  • Krige, W; Von Solms, R (1998)
    Log files or audit logs are files that record information about events that occur on a computer system at all times, that is if the log files are configured correctly. Most information security officers do not use this ...
  • Huisman, HM (1998)
    The software crisis has been well documented. Software is being delivered late, over budget and full of residual faults. In an attempt to solve these problems, CASE technology has been developed. CASE technology provides ...
  • Papenfus, C; Botha, RA (1998)
    Modem computer systems are truly awe-inspiring fetes of detailed design. Millions of transistors perform billions of instructions every second, linking thousands of people from every continent with a remarkable degree ...
  • Van Zyl, J (1998)
    The purpose of this paper is to describe the Leaming Model and related concepts. In the context of this paper, the following principles are discussed: • What do we need to learn? • How must we learn it? These two ...
  • Venter, L (1998)
    INSTAP is a multimedia program to teach Afrikaans at first year university level. The intended audience consists of students who come from non-Afrikaans speaking communities, and hence sound is a very important aspect of ...

Search UnisaIR


Browse

My Account