Browsing Dept. of Computer Science by Issue Date

Now showing items 101-120 of 311

  • A structured approach to network security protocol implementation 

    Tobler, Benjamin (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2005)
    The implementation of network security protocols has not received the same level of attention in the literature as their analysis. Security protocol analysis has successfully used inference logics, like GNY and BAN, and ...

  • A component assembly approach to digital library systems 

    Eyambe, Linda (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2005)
    With the advent of the Internet came the promise of global information access. In keeping with this promise, Digital Libraries (DLs) began to emerge across the world as a method of providing structured information to their ...

  • Inclination of scholars to major in information systems or computer science 

    Seymour, Lisa (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2005)
    This paper describes a survey of 497 final year scholars at schools in the Western Cape, South Africa. They were asked about their inclination to study information systems (IS) or computer science (CS), their knowledge of ...

  • Customisable abstract representation layer for digital libraries 

    Feng, Fu-Yao Kevin (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2006)
    The user interface is a very important component in a piece of software as it is the layer which allows user interaction with the underlying functionality. Within the domain of digital libraries modification to the interface ...

  • Analyzing storage system workloads 

    Sikalinda, Paul (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2006)
    Analysis of storage system workloads is important for a number of reasons. The analysis might be performed to understand the usage patterns of existing storage systems. It is very important for the architects to understand ...

  • Adaptive Bayesian Agents: Enabling distributed social networks 

    Potgieter, A (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2006)
    This article brings together two views of organisations: resource-based theories (RBT) and social network analysis (SNA). Resource-based theories stress the importance of tangible assets, as well as less tangible ones, ...

  • Flexible packaging methodologies for rapid deployment of customisable component-based digital libraries 

    Mhlongo, Siyabonga (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2006)
    Software engineering is a discipline concerned with manufacturing or developing software. Software plays a pivotal role in everyday life, an absence of which will be devastating to a number of governmental, recreational ...

  • Link prediction and link detection in sequences of large social networks using temporal and local metrics 

    Cooke, Richard Jeremy Edwin (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2006)
    This dissertation builds upon the ideas introduced by Liben-Nowell and Kleinberg in The Link Prediction Problem for Social Networks [42]. Link prediction is the problem of predicting between which unconnected nodes in a ...

  • MIRMaid : an interface for a content based Music Information Retrieval test-bed 

    Cloete, Candice Lynn (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2006)
    MIRMaid is an acronym for Music Information Retrieval Modular aid and is an interface that allows different content based retrieval tasks to be compared against each other to find optimal combinations of retrieval parameters ...

  • The design and evaluation of a Java image analysis tool for componentizing lines from digitial architectural floor plans 

    Ochwo, Jeniffer (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2006)
    This research set out to determine the feasibility of using Java to create a tool that could perform paper-to-electronic format conversion by vectorizing the lines in a raster image of an architectural floor plan. The tool ...

  • Schema matching in a peer-to-peer database system 

    Rouse, Colin (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2006)
    Peer-to-peer or P2P systems are applications that allow a network of peers to share resources in a scalable and efficient manner. My research is concerned with the use of P2P systems for sharing databases. To allow data ...

  • Intelligent detection of anomalies in telecommunications customer behaviour 

    Osunmakinde, Isaac Olusegun (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2006)
    In this research, we present a modelling technique that can efficiently facilitate anomaly detection that will help call analysts and managers with adaptive decision-making. We developed and implemented a Data 'fransformation ...

  • An adaptive agent architecture for exogenous data sales forecasting 

    Jedeikin, Jonathan (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2006)
    In a world of unpredictability and complexity, sales forecasting is becoming recognised as essential to operations planning in business and industry. With increased globalisation and higher competition, more products are ...

  • An examination and implementation of the libor market model 

    Jardine, James (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2006)
    The relatively young field of quantitative finance has grown over the past thirty years with the cherry-picking of a wide variety of techniques from the disciplines of finance, mathematics and computer science. The Libor ...

  • Firewall information and security visualization : improving the usage and adoption of modern network firewalls by novice users 

    Gasant, Mogamad Yaqeen (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2007)
    The increasing number of people having access to computers and the Internet and the numerous services provided by the Internet - e.g., Internet banking, online shopping, eBay, email - emphasizes the need for computer ...

  • Investigating the efficacy of XML and stylesheets to render electronic courseware for multiple learning styles 

    Du Toit, Masha (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2007)
    The objective of this project was to test the efficacy of using Extensible Markup Language (XML) - in particular the DocBook 5.0b5 schema - and Extensible Stylesheet Language Transformation (XSLT) to render electronic ...

  • Anomaly detection and prediction of human actions in a video surveillance environment 

    Spasic, Nemanja (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2007)
    World wide focus has over the years been shifting towards security issues, not in least due to recent world wide terrorist activities. Several researchers have proposed state of the art surveillance systems to help with ...

  • Help or hindrance? : an investigation into learning through web interfaces 

    Bowra, Tamsin (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2007)
    A usability study was designed with these issues in mind, to determine the influence of interface design on learning in an educational institution in Namibia. A pilot study identified obstacles and served to enhance the ...

  • A comparison of statistical and geometric reconstruction techniques : guidelines for correcting fossil hominin crania 

    Neeser, Rudolph (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2007)
    The study of human evolution centres, to a large extent, around the study of fossil morphology, including the comparison and interpretation of these remains within the context of what is known about morphological variation ...

  • An open source model for teaching environments incorporating wireless devices 

    Mutuku, James (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2007)
    Attempts have been made at bridging the digital divide in schools using desktop PC systems without much success. As a result many computer laboratories sit empty. There are many reasons for these failures. Often there are ...