Open Access Repositories: Recent submissions
Now showing items 1541-1560 of 4204
-
Quantitative assessment of computational models for retinotopic map formation
(WileyDevelopmental Neurobiology, 2014-11-14)Molecular and activity-based cues acting together are thought to guide retinal axons to their terminal sites in vertebrate optic tectum or superior colliculus (SC) to form an ordered map of connections. The details of ...
-
A framework for building spatiotemporal applications in Java
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2001)A relatively new area of study that first received attention during the past decade explores how spatiotemporal data can be efficiently used in applications and stored in databases. Spatial data includes the locations or ...
-
Extraction of surface texture data from low quality photographs to aid the construction of virtual reality models of archaeological sites
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2001)A tool has been designed and implemented to use information extracted from photographs captured using uncalibrated cameras (so-called casual photographs) to fill the occlusions which occur in three-dimensional models of ...
-
tBurton: A Divide and Conquer Temporal Planner
(2014-10-24)Planning for and controlling a network of interacting devices requires a planner that accounts for the automatic timed transitions of devices while meeting deadlines and achieving durative goals. For example, a planner for ...
-
Story experience in a virtual San storytelling environment : a cultural heritage application for children and young adults
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2005)This dissertation explores virtual storytelling for conveying cultural stories effectively. We set out to investigate: (1) the strengths and/or weaknesses of VR as a storytelling medium; (2) the use of a culturally familiar ...
-
Automatic Error Elimination by Multi-Application Code Transfer
(2014-10-02)We present pDNA, a system for automatically transfer- ring correct code from donor applications into recipient applications to successfully eliminate errors in the recipient. Experimental results using six donor applications ...
-
Automatic Error Elimination by Multi-Application Code Transfer
(2014-09-30)We present pDNA, a system for automatically transfer- ring correct code from donor applications into recipient applications to successfully eliminate errors in the recipient. Experimental results using six donor applications ...
-
Automatic Error Elimination by Multi-Application Code Transfer
(2014-08-11)We present pDNA, a system for automatically transferring correct code from donor applications into recipient applications to successfully eliminate errors in the recipient. Experimental results using three donor applications ...
-
Incompatibility of lognormal forward-Libor and Swap market models
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2005)The lognormal forward-Libor and Swap market models were formulated to price caps and swaptions. However, the prices computed by these two models, under equivalent measures, are reported to be unequal. This study investigates ...
-
An object-oriented library for shared-memory parallel simulations
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 1996)Programming shared-memory multiprocessor systems is becoming increasingly difficult as the gap between memory speed and processor speed increases. At the same time, this class of computer-based on standard microprocessors-is ...
-
An Analyst's Assistant for the Interpretation of Vehicle Track Data
(2014-10-08)This report describes the Analyst's Assistant, a software system for language-interactive, collaborative user-system interpretation of events, specifically targeting vehicle events that can be recognized on the basis of ...
-
Automatic Error Elimination by Multi-Application Code Transfer
(2014-10-02)We present Code Phage (CP), a system for automatically transferring correct code from donor applications into recipient applications to successfully eliminate errors in the recipient. Experimental results using six donor ...
-
Constraint Generation for the Jeeves Privacy Language
(2014-10-01)Our goal is to present a completed, semantic formalization of the Jeeves privacy language evaluation engine, based on the original Jeeves constraint semantics defined by Yang et al at POPL12, but sufficiently strong to ...
-
OpLog: a library for scaling update-heavy data structures
(2014-09-16)Existing techniques (e.g., RCU) can achieve good multi-core scaling for read-mostly data, but for update-heavy data structures only special-purpose techniques exist. This paper presents OpLog, a general-purpose library ...
-
Using programming tools in virtual environments
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2002)Presence is the sense of being in the computer-generated environment. It is regarded as the key to understanding the success of a virtual environment. In this research we focus on desktop virtual environment authoring ...
-
Garbage collection of the PLAVA object store
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2002)This research investigates the implementation of suitable garbage collection schemes for a persistent store. The store that formed the basis for these experiments was the one developed for a Java Virtual Machine known as ...
-
Alloy*: A Higher-Order Relational Constraint Solver
(2014-09-02)The last decade has seen a dramatic growth in the use of constraint solvers as a computational mechanism, not only for analysis and synthesis of software, but also at runtime. Solvers are available for a variety of logics ...
-
ITIKI: Bridge between African indigenous knowledge and modern science on drought prediction
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2012)The now more rampant and severe droughts have become synonymous with Sub-Saharan Africa; they are a major contributor to the acute food insecurity in the Region. Though this scenario may be replicated in other regions in ...
-
Alpha Invariants and K-Stability for General Polarizations of Fano Varieties
(Oxford University PressINTERNATIONAL MATHEMATICS RESEARCH NOTICES, 2014-09-26)We provide a sufficient condition for polarisations of Fano varieties to be K-stable in terms of Tian’s alpha invariant, which uses the log canonical threshold to measure singularities of divisors in the linear system ...
-
Interactive 3-D spatial analysis in a virtual reality environment
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2004)The emergence of virtual reality and related tools enables the fundamental infrastructure to begin building virtual cities, which can provide an interactive simulation and analysis environment for planning and management ...
