Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Stellenbosch University" +contributor:("Sanders, J. W."). Showing records 1 – 4 of 4 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Stellenbosch University

1. Rajaona, Solofomampionona Fortunat. An algebraic framework for reasoning about security.

Degree: MSc, Mathematical Sciences, 2013, Stellenbosch University

ENGLISH ABSTRACT: Stepwise development of a program using refinement ensures that the program correctly implements its requirements. The specification of a system is “refined” incrementally… (more)

Subjects/Keywords: Mathematics; Computer software  – Development; Computer software  – Verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rajaona, S. F. (2013). An algebraic framework for reasoning about security. (Masters Thesis). Stellenbosch University. Retrieved from http://hdl.handle.net/10019/9983

Chicago Manual of Style (16th Edition):

Rajaona, Solofomampionona Fortunat. “An algebraic framework for reasoning about security.” 2013. Masters Thesis, Stellenbosch University. Accessed April 21, 2019. http://hdl.handle.net/10019/9983.

MLA Handbook (7th Edition):

Rajaona, Solofomampionona Fortunat. “An algebraic framework for reasoning about security.” 2013. Web. 21 Apr 2019.

Vancouver:

Rajaona SF. An algebraic framework for reasoning about security. [Internet] [Masters thesis]. Stellenbosch University; 2013. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/10019/9983.

Council of Science Editors:

Rajaona SF. An algebraic framework for reasoning about security. [Masters Thesis]. Stellenbosch University; 2013. Available from: http://hdl.handle.net/10019/9983


Stellenbosch University

2. Hassan, Ahmed Mohamed Ali Omer. Topology control in wireless ad hoc networks.

Degree: MSc, Mathematical Sciences, 2014, Stellenbosch University

ENGLISH ABSTRACT: Wireless ad hoc networks are increasingly used in today’s life in various areas ranging from environmental monitoring to the military. For technical reasons,… (more)

Subjects/Keywords: Mathematics; Computer networks; Topology; Wireless communication systems; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hassan, A. M. A. O. (2014). Topology control in wireless ad hoc networks. (Masters Thesis). Stellenbosch University. Retrieved from http://hdl.handle.net/10019.1/86709

Chicago Manual of Style (16th Edition):

Hassan, Ahmed Mohamed Ali Omer. “Topology control in wireless ad hoc networks.” 2014. Masters Thesis, Stellenbosch University. Accessed April 21, 2019. http://hdl.handle.net/10019.1/86709.

MLA Handbook (7th Edition):

Hassan, Ahmed Mohamed Ali Omer. “Topology control in wireless ad hoc networks.” 2014. Web. 21 Apr 2019.

Vancouver:

Hassan AMAO. Topology control in wireless ad hoc networks. [Internet] [Masters thesis]. Stellenbosch University; 2014. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/10019.1/86709.

Council of Science Editors:

Hassan AMAO. Topology control in wireless ad hoc networks. [Masters Thesis]. Stellenbosch University; 2014. Available from: http://hdl.handle.net/10019.1/86709


Stellenbosch University

3. Taha, Samah M. Osman. Small-world network models and their average path length.

Degree: MSc, Mathematical Sciences, 2014, Stellenbosch University

ENGLISH ABSTRACT: Socially-based networks are of particular interest amongst the variety of communication networks arising in reality. They are distinguished by having small average path… (more)

Subjects/Keywords: Network topology; Small-world networks; Real-world networks; Erdos-Renyi random network models; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Taha, S. M. O. (2014). Small-world network models and their average path length. (Masters Thesis). Stellenbosch University. Retrieved from http://hdl.handle.net/10019.1/95834

Chicago Manual of Style (16th Edition):

Taha, Samah M Osman. “Small-world network models and their average path length.” 2014. Masters Thesis, Stellenbosch University. Accessed April 21, 2019. http://hdl.handle.net/10019.1/95834.

MLA Handbook (7th Edition):

Taha, Samah M Osman. “Small-world network models and their average path length.” 2014. Web. 21 Apr 2019.

Vancouver:

Taha SMO. Small-world network models and their average path length. [Internet] [Masters thesis]. Stellenbosch University; 2014. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/10019.1/95834.

Council of Science Editors:

Taha SMO. Small-world network models and their average path length. [Masters Thesis]. Stellenbosch University; 2014. Available from: http://hdl.handle.net/10019.1/95834


Stellenbosch University

4. Ralaivaosaona, Tanjona Fiononana. On the effciency of code-based steganography.

Degree: MSc, 2015, Stellenbosch University

ENGLISH ABSTRACT: Steganography is the art of hiding information inside a data host called the cover. The amount of distortion caused by that embedding can… (more)

Subjects/Keywords: Hidden information; Coding; UCTD; Cryptography; Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ralaivaosaona, T. F. (2015). On the effciency of code-based steganography. (Masters Thesis). Stellenbosch University. Retrieved from http://hdl.handle.net/10019.1/96997

Chicago Manual of Style (16th Edition):

Ralaivaosaona, Tanjona Fiononana. “On the effciency of code-based steganography.” 2015. Masters Thesis, Stellenbosch University. Accessed April 21, 2019. http://hdl.handle.net/10019.1/96997.

MLA Handbook (7th Edition):

Ralaivaosaona, Tanjona Fiononana. “On the effciency of code-based steganography.” 2015. Web. 21 Apr 2019.

Vancouver:

Ralaivaosaona TF. On the effciency of code-based steganography. [Internet] [Masters thesis]. Stellenbosch University; 2015. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/10019.1/96997.

Council of Science Editors:

Ralaivaosaona TF. On the effciency of code-based steganography. [Masters Thesis]. Stellenbosch University; 2015. Available from: http://hdl.handle.net/10019.1/96997

.