default search action
South African Computer Journal, Volume 28
Volume 28, 2002
- Derrick G. Kourie:
Editorial notes. 1-2 - Reinhardt A. Botha, Jan H. P. Eloff:
An access control architecture for XML documents in workflow environments. 3-10 - Andries Barnard, E. M. Ehlers:
Combining context provisions with graph grammar rewriting rules - the three-dimensional case. 11-20 - D. C. Smith, M. Becker, J. Burns-Howell, J. Kyriakides:
Creating high performance IS teams. 21-29 - Laurette Pretorius, Sonja E. Bosch:
Finite-state computational morphology - treatment of the Zulu noun. 30-38 - Katarina Britz:
Implication in three-valued logics of partial information. 39-43 - Jason F. Cohen:
Information systems strategic planning and IS function performance : an empirical study. 44-53 - Otto-Carl Marte, Patrick C. Marais:
Model-based segmentation of CT images. 54-59 - Elsabé Cloete, M. G. Miller:
Structured educational design and modelling for digital courses. 60-66 - Gary Marsden, Matt Jones:
Ubiquitous computing and cellular handset interfaces - are menus the best way forward? 67-74
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.