UCT CS Research Document Archive

Subject: C.4 PERFORMANCE OF SYSTEMS


    Number of records: 21.

  1. Winschiers-Theophilus, Heike, Nicola J Bidwell and Edwin H Blake (2012) Community consensus: Design beyond participation. Design Issues 28(3):89-100.

  2. Symington, Andrew (2009) A Hardware Testbed for Measuring IEEE 802.11g DCF Performance. MSc, Department of Computer Science, University of Cape Town.

  3. Nakashole, Ndapandula (2009) A Hybrid Scavenger Grid Approach to Intranet Search. MSc, Department of Computer Science, University of Cape Town.

  4. Parker, Christopher P (2009) A lightweight interface to local Grid scheduling systems. MSc, Department of Computer Science, University of Cape Town.

  5. Badenhorst, Scott (2015) Acceleration of the noise suppression component of the DUCHAMP source-finder.. MSc, Department of Computer Science, University of Cape Town.

  6. Nakashole, Ndapandula, Calvin Pedzai and Hussein Suleman (2006) An Approach to Better System Resource Utilization for Search Engine Clusters. Technical Report CS06-10-00, Department of Computer Science, University of Cape Town.

  7. Admatsky, Andrew, Selim Akl, Ramon Alonso-Sanz, Wesley van Dessel, Zuwaire Ibrahim, Andrew Ilachinski, Jeff Jones, Anne V.D.M. Kayem, Genaro Martinez, Pedro de Oliveria, Mikhail Propenko, Theresa Schubert, Peter Sloot, Emmanuele Strano and Xie-She Yang (2012) Are Motorways Rational from Slime Mould's Point of View?. International Journal of Parallel, Emergent, and Distributed Systems.

  8. Nakashole, Ndapandula, Hussein Suleman and Calvin Pedzai (2007) Dynamic Role Allocation for Small Search Engine Clusters. In Barnard, Lynette and Reinhard A Botha, Eds. Proceedings Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT 2007), Port Alfred, South Africa.

  9. Kayem, Anne V.D.M., Patrick Martin and Selim G. Akl (2011) Efficient enforcement of dynamic cryptographic access control policies for outsourced data . In Proceedings 10th Information Security South Africa (ISSA), 2011 , pages 1-8, Johanesburg, South Africa.

  10. Kayem, Anne V.D.M., Patrick Martin and Selim G. Akl (2011) Enhancing Identity Trust in Cryptographic Key Management Systems for Dynamic Environments. Wiley's Security and Communication Networks Journal 4(1):74-94.

  11. Keet, C. Maria, Claudia d'Amato, Zubeida Casmod Khan and Agnieszka Lawrynowicz (2014) Exploring Reasoning with the DMOP Ontology. In Bail, Samantha, Birte Glimm, Ernesto Jimenez-Ruiz, N. Matentzoglu, Bijan Parsia and A. Steigmiller, Eds. Proceedings 3rd Workshop on Ontology Reasoner Evaluation (ORE'14) 1207, pages 64-70, Vienna, Austria.

  12. de Wet, Nico (2005) Model Driven Communication Protocol Engineering and Simulation based Performance Analysis using UML 2.0. MSc, Department of Computer Science, University of Cape Town.

  13. Clough, Duncan, Stefano Riviera, Michelle Kuttel, Vincent Geddes and Patrick Marais (2010) Panopticon: A Scalable Monitoring System. In Proceedings Proceedings of South African Institute for Computer Scientists and Information Technologists Conference (SAICSIT 2010).

  14. Suleman, Hussein (2006) Parallelising Harvesting. In Proceedings 9th International Conference on the Asian Digital Library, Kyoto, Japan.

  15. Fisher, Mario (2012) Performance Benchmarking Physical and Virtual Linux Environments. MPhil, Department of Computer Science, University of Cape Town.

  16. Kayem, Anne V.D.M. , Patrick Martin and Selim G. Akl (2011) Self-Protecting Access Control: On Mitigating Privacy Violations with Fault Tolerance, in Yee, George, Eds. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards. IGI Global.

  17. Kayem, Anne V.D.M. , Patrick Martin and Selim G. Akl (2012) Self-Protecting Access Control: On Mitigating Privacy Violations with Fault Tolerance, in Yee, George, Eds. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, pages 95-128. IGI Global.

  18. Lifson, Farrel (2004) Specification and Verification of Systems Using Model Checking and Markov Reward Models. MSc, Department of Computer Science, University of Cape Town.

  19. de Wet, Nico Dirk and Pieter S. Kritzinger (2004) Using UML Models for the Performance Analysis of Network Systems. In Proceedings Workshop on Integrated-reliability with Telecommunications and UML Languages (WITUL), Rennes, Brittany, France.

  20. Thompson, John, David Bainbridge and Hussein Suleman (2011) Very Large Scale Digital Library Building in Greenstone using Parallel Processing. In Xing, Chunxiao, Fabio Crestani and Andreas Rauber, Eds. Proceedings 13th International Conference on Asia-Pacific Digital Libraries, pages 331-340, Beijing, China.

  21. Nyirenda, Mayumbo and Hussein Suleman (2008) X-Switch: A Secure, Multi-User, Language-Independent Web Application Server. In Proceedings CARI 2008, Rabat, Morrocco.

  22. This list was generated on Sat Jun 24 15:15:12 SAST 2017.