Browsing Dept. of Computer Science by Issue Date

Now showing items 61-80 of 311

  • Facilitating the modelling and automated analysis of cryptographic protocols 

    Saul, Elton (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2001)
    Multi-dimensional security protocol engineering is effective for creating cryptographic protocols since it encompasses a variety of design, analysis and deployment techniques, thereby providing a higher level of confidence ...

  • Epistemology as the basis for a corporate memory model 

    Azbel, Ilan (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2001)
    Epistemology is the philosophical study of knowledge; it attempts to understand which beliefs a person can claim to know. This thesis discusses how theories found in epistemology can be used to understand what knowledge ...

  • A framework for building spatiotemporal applications in Java 

    Voges, Erik (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2001)
    A relatively new area of study that first received attention during the past decade explores how spatiotemporal data can be efficiently used in applications and stored in databases. Spatial data includes the locations or ...

  • Extraction of surface texture data from low quality photographs to aid the construction of virtual reality models of archaeological sites 

    Williams, John G (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2001)
    A tool has been designed and implemented to use information extracted from photographs captured using uncalibrated cameras (so-called casual photographs) to fill the occlusions which occur in three-dimensional models of ...

  • Symbolic techniques for the performance analysis of generalised stochastic petri nets 

    Davies, Ian (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2001)
    Binary Decision Diagrams (BDDs) have been successfully used in sequential circuit theory, VLSI, and model checking. They form a highly memory efficient canonical representation of a Boolean function. In this dissertation, ...

  • Presence and co-presence in collaborative virtual environments 

    Casaneuva, Juan S (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2001)
    Presence in Collaborative Virtual Environments (CVEs) can be defined into personal presence and co-presence. Personal presence is having a feeling of "being there" in the CVE yourself. Co-presence is having a feeling that ...

  • Quality control tools for interactive rendering of 3D triangle meshes 

    Southern, Richard (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2002)
    In this dissertation we explore methods of quality control of untextured polygonal models. The tools presented build, evaluate and improve on the field of multiresolution analysis through decimation. We evaluate the quality ...

  • Garbage collection of the PLAVA object store 

    Schulz, Michael F (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2002)
    This research investigates the implementation of suitable garbage collection schemes for a persistent store. The store that formed the basis for these experiments was the one developed for a Java Virtual Machine known as ...

  • Using programming tools in virtual environments 

    Yang, Shih-min (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2002)
    Presence is the sense of being in the computer-generated environment. It is regarded as the key to understanding the success of a virtual environment. In this research we focus on desktop virtual environment authoring ...

  • Model-based segmentation of CT Images 

    Marte, O. (University of Cape TownUniversity of Cape TownFaculty of ScienceDepartment of Computer Science, 2002)
    This paper presents preliminary work on the segmentation of Computed Tomography data using a model-based approach. Conventional image processing of CT data is aimed at the production of simple iso-surfaces for surgical ...

  • The spatial learning method : facilitation of learning through the use of cognitive mapping in virtual reality 

    Johns, Cathryn (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2002)
    When moving through an environment, people unconsciously build up a mental image, or cognitive map, of that environment. When later planning a trip or giving directions to someone else, they can mentally walk through the ...

  • Modulating application behaviour for closely coupled intrusion detection 

    Welz, Marc (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2003)
    This thesis presents a security measure that is closely coupled to applications. This distinguishes it from conventional security measures which tend to operate at the infrastructure level (network, operating system or ...

  • An implementation of the μC/OS-II kernel and an analysis of its suitability as a real time operating system for embedded applications. 

    De vos, Gabriël (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2003)

  • Fast and accurate visibility preprocessing 

    Nirenstein, Shaun (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2003)
    Currently, the standard approach to visibility preprocessing algorithms is to use a form of approximate solution, known as conservative culling. Such algorithms over-estimate the set of visible polygons. This compromise ...

  • A connectionist explanation of presence in virtual environments 

    Nunez, David (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2003)
    Presence has various definitions, but can be understood as the sensation that a virtual environment is a real place, that the user is actually in the virtual environment rather than at the display terminal, or that the ...

  • Music education software : an HCI evaluation of existing software and prototype implementation of an ear training programme based on a proposed approach 

    Kӧnik, Stella (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2003)
    This research paper uses Human Computer Interaction(HCI) evaluation methods, namely questionnaires and interviews, to obtain information about the kind of music software currently in common use in music departments, and ...

  • Attack analysis of cryptographic protocols using strand spaces 

    Lukell, S A (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2003)
    Security protocols make use of cryptographic techniques to achieve goals such as confidentiality, authentication and integrity. However, the fact that strong cryptographic algorithms exist does not guarantee the security ...

  • Model driven communication protocol engineering and simulation based performance analysis using UML 2.0 

    De Wet, Nico (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2004)
    The automated functional and performance analysis of communication systems specified with some Formal Description Technique has long been the goal of telecommunication engineers. In the past SDL and Petri nets have been ...

  • The subjective response of people living with HIV to illness narratives in VR 

    Hamza, Sabeeha (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2004)
    This dissertation reports on the results on an exploratory investigation into the potential efficacy of VR as both a support mechanism to people living with HIV I AIDS, as well its capabilities as an emotive medium. Two ...

  • A meta-authoring tool for specifying behaviour in virtual reality environments 

    Hendricks, Zayd (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2004)
    In this dissertation, we explore methods for empowering non-programmers with the ability to develop their own virtual environment applications. We explored some of the existing systems to determine what methodologies have ...