UJDigispace Repository

Browsing Academy of Computer Science and Software Engineering (ETDs) by Title

Browsing Academy of Computer Science and Software Engineering (ETDs) by Title

Sort by: Order: Results:

  • McRoberts, Duncan Andrew Keith (2011)
    Real-time terrain rendering (RTTR) is an exciting eld in computer graphics. The algorithms and techniques developed in this domain allow immersive virtual environments to be created for interactive applications. Many ...
  • Venter, Hein S. (1999)
    The present study was undertaken in a bid within the realm of the existing Internet working environment to meet the need for a more secure network-security process in terms of which possible risks to be incurred by Internet ...
  • Nuss, Jacques Erich (2004)
    The rate of change in the business arena is continuously increasing and companies are constantly seeking innovative products, services and knowledge-enabled processes to enable them to compete effectively against each ...
  • Van Dyk, Pierre-Aldo (1990)
    Please refer to full text to view abstract
  • Jordaan, Jacoba Frederica (1998)
    This dissertation comprises an in-depth investigation into the domain of computer vision, with specific reference to the textile industry. The study consists of three main sections. In the first section, the computer-vision ...
  • Du Toit, J. Jurgens (2007)
    The aim of this dissertation is to identify and evaluate current security issues related to eassessment systems, to identify current technologies used to mitigate the risks associated with these issues, and to propose a ...
  • Boshoff, Willem Hendrik (2006)
    Researchers in artificial intelligence and agent technologies are presented with a massive array of various technologies that they might use for their research projects. It is difficult for researchers to test their theories ...
  • Toko, Guy Roger (2010)
    This research endeavour offers a holistic approach to software systems adoption within the higher education (HE) systems of developing countries at a time when the cost of licensing fees seems to be negatively affecting ...
  • Van der Merwe, Isak Pieter (1993)
    The aim of this study is to introduce a model that can be used to manage the security profiles by using a role oriented approach. In chapter 1 the addressed problem and the aim of the study, are introduced. In chapter ...
  • Pedroncelli, Antony (2002)
    A message can be communicated to other people using a combination of pictures, sounds, and actions. Ensuring that the message is understood as intended often depends on the presentation of these forms of multimedia. In ...
  • Olivier, Martin Stephanus (1991)
    The need for security in a database is obvious. Object-orientation enables databases to be used in applications where other database models are not adequate. It is thus clear that security of object-oriented databases ...
  • Ellefsen, Ian David (2009)
    This dissertation investigates the possibility of a steganographic file system which does not have to duplicate hidden data in order to avoid "collisions" between the hidden and non-hidden data. This will ensure the ...
  • Boshoff, Paul Marthinus (1998)
    Using the Internet for communication purposes constitutes a high risk, considering the security of such information. The protocol suite used on the Internet is the TCP/IP protocol suite, which consists of the Transmission ...
  • Nembambula, Malindi (1997)
    "For better for worse, most computer systems are not in that way today. Security is in general, a trade-off with convenience of remote access via networks to their computers. Inevitably, they suffer from some loss of ...
  • Tolnai, Annette (2012)
    Virtualization is a new infrastructure platform whose trend is sweeping through IT like a blaze. Improving the IT industry by higher utilization from hardware, better responsiveness to changing business conditions and ...
  • Du Toit, Johannes Hendrik (1992)
    Please refer to full text to view abstract
  • Mokgosi, Letlhogonolo (2012)
    Service Oriented Architecture has many advantages. For example, organisations can align business with Information Technology, reuse the developed functionality, reduce development and maintain cost for applications. ...
  • Louwrens, Cecil Petrus (1996)
    The aim of this dissertation (referred to as thesis in the rest of the document) is to investigate the concept of Single Sign-on (SSO) in heterogeneous computing environments and to provide guidelines and reference frameworks ...
  • Gerber, E. (2000)
    The domain of computer graphics has undergone phenomenal changes and improvements over the past decade, to the extent that photorealistic renderings have now become possible. Evidence of the vast potential of such ...

Search UJDigispace


Browse

My Account