Browsing Computer Science by Title

Browsing Computer Science by Title

Sort by: Order: Results:

  • Masvosvere, Derek Jens Emeth (University of Pretoria, 2019)
    The internet has had a major impact on how information is shared within supply chains, and in commerce in general. This has resulted in the establishment of information systems such as esupply chains (eSCs) amongst others ...
  • Antwi-Boasiako, Albert (University of Pretoria, 2018)
    Riding on the tide of the current development in computing and internet technologies, criminals have transitioned to the use of computer systems and digital channels to commit crimes. This transformation of crime requires ...
  • van der Berg, Johan Sarel (University of Pretoria, 2018)
    Structured Object Orientated Formal Language (SOFL) is a formal method design methodology that combines data flows diagrams and predicates in order to describe processes that can be refined. This methodology creates a ...
  • van der Berg, Johan Sarel (University of Pretoria, 2018)
    Structured Object Orientated Formal Language (SOFL) is a formal method design methodology that combines data flows diagrams and predicates in order to describe processes that can be refined. This methodology creates a very ...
  • Gruner, Stefan (Springer-Verlag, 2003)
    Experiments have been conducted in order to determine to what extent Abstract Partial Deduction can infer implicit safety properties of the well-known Bakery Protocol.
  • Gruner, Stefan (Shaker Verlag, Aachen, Germany, 2013)
    In the no longer existing South African journal Quaestiones Informaticae, "An Approach to Defining Abstractions, Refinements and Enrichments" was published by Derrick Kourie more than twenty years ago. At some occasion, ...
  • Pieterse, Vreda; Thompson, J.E. (Lisa) (Routledge, 2010-08)
    The acquisition of effective teamwork skills is crucial in all disciplines. Using an interpretive approach, this study investigates collaboration and co-operation in teams of software engineering students. Teams whose ...
  • Coetzee, Marijke; Eloff, Jan H.P. (Emerald, 2005)
    Purpose – To define a framework for access control for virtual applications, enabled through web services technologies. The framework supports the loosely coupled manner in which web services are shared between partners. ...
  • Du Plessis, Johan (University of Pretoria, 2005)
    A mobile ad hoc network is a collection of wireless mobile devices which dynamically form a temporary network, without using any existing network infrastructure or centralised administration. Each node in the network ...
  • Adejumo, Adebola Adebisi (University of Pretoria, 2007-11-20)
    Please read the abstract in the section 00front of this document
  • Padayachee, Keshnee; Eloff, Jan H.P. (Elsevier, 2009)
    Access controls are difficult to implement and evidently deficient under certain conditions. Traditional controls offer no protection for unclassified information, such as a telephone list of employees that is unrestricted, ...
  • Du Plessis, M.C. (Mathys Cornelius) (University of Pretoria, 2012-09-27)
    Dynamic optimisation problems are problems where the search space does not remain constant over time. Evolutionary algorithms aimed at static optimisation problems often fail to effectively optimise dynamic problems. The ...
  • Kebande, Victor Rigworo; Karie, Nickson M.; Venter, H.S. (Hein) (Indonesian Society for Knowledge and Human Development, 2018)
    The unique identities of remote sensing, monitoring, self-actuating, self–adapting and self-configuring “things” in Internet of Things (IoT) has come out as fundamental building blocks for the development of “smart ...
  • Coetzee, Serena Martha; Cooper, Antony; ISO Workshop on address standards : Considering the issues related to an international address standard, 25 May 2008, Copenhagen, Denmark (Department of Computer Science, University of Pretoria, 2008-05-25)
    An address is one of the most common forms of describing a location with the purpose of providing directions for all kinds of ‘deliveries’, ranging from visitors, postal mail, utility services such as water, sewerage, ...
  • Coetzee, Serena Martha; Bishop, Judith (International Journal of Geographical Information Science, 2009-09-07)
    The original purpose of addresses was to enable the correct and unambiguous delivery of postal mail. The advent of computers and more specifically geographic information systems (GIS) opened up a whole new range of ...
  • Lind, Morten; ISO Workshop on address standards : Considering the issues related to an international address standard, 25 May 2008, Copenhagen, Denmark (Department of Computer Science, University of Pretoria, 2008-05-25)
    Based on experiences from the development of the address system in Denmark, the paper discusses the benefits and disadvantages from different approaches to address management and to the conceptual modeling of address data. ...
  • Coote, Andrew; INSPIRE Thematic Working Group; ISO Workshop on address standards : Considering the issues related to an international address standard, 25 May 2008, Copenhagen, Denmark (University of Pretoria, 2008-05-25)
    No abstract available
  • Iliopoulos, Costas S.; Kourie, Derrick G.; Mouchard, Laurent; Musombuka, Themba K.; Pissis, Solon P.; De Ridder, Corne (Elsevier, 2012-01)
    Next-generation sequencing technologies have redefined the way genome sequencing is performed. They are able to produce tens of millions of short sequences (reads), during a single experiment, and with a much lower cost ...
  • Kenyon, David Leicester (University of Pretoria, 2018)
    Insurance fraud costs South Africa (and the global insurance industry) billions of Rands. Insurance claims fraud, which involves over-inflating claim amounts or fabricating a loss to result in a claim settlement, makes up ...
  • Islami, Lejla; Fischer-Hubner, Simone; Hammond, Eunice Naa Korkoi; Eloff, Jan H.P. (Springer, 2021-04)
    While privacy-enhancing solutions for car-to-car communication are increasingly researched, end user aspects of such solutions have not been in the focus. In this paper, we present a qualitative study with 16 car drivers ...