Institutional Repository

SAICSIT Digital Archive

SAICSIT Digital Archive

 

Sub-communities within this community

Recent Submissions

  • Wulf, S. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    The need for modelling techniques to allow blocking of tasks prior to admission to the computer system in queueing network models is described. A detailed algorithm which presents a technique to enforce blocking by priority ...
  • Van Rooyen, H.O.; Weiermans, D.J. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    Nebula modell_ing is_ a generalised structural modelling technique which applies to any finite set of objects (entities) and n-ary relat1onsh1ps (n ~2). A nebula model can be presented in either diagrammatic or tabular ...
  • Schach, Stephen R. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    Details are given of an implementation of Grimbleby's algorithm for the common spanning tree problem with running times up to 50% less than for the original implementation. An explanation is given as to why implementations ...
  • Mann, R.J. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    A basic description of the facilities of the computer modelling package, AUTO-CONFIGURATER, is presented together with detailed procedures to calculate the required input parameters from monitor statistics. Techniques to ...
  • Cuthbertson, A.J.; Van Niekerk, I.J.; Turton, T. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    This paper describes the research that was undertaken in designing a disk space management system. The system has strong similarities to the management of real storage in a virtual storage environment. These similarities ...
  • Currin, Desmond C. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    Generalized network problems involve the optimization of a flow through a network. In contrast to normal networks, generalized networks include multipliers which alter the flow as it passes through the arcs. This enables ...
  • Bruwer, P.J.S. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    Performance evaluation techniques can contribute substantially to the successful management of the information services function in an organization. Unfortunately the design and implementation of computer-based ...
  • Berman, S (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    An automated database design tool called ADD has been developed at the University of Cape Town. This system obtains a requirements specification from a user and from this generates a relation scheme and a Codasyl schema. ...
  • Wulf, S. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    An overall methodology for database design is presented. This includes creation of a data dictionary and relational analysis. An algorithm is presented to create a conceptual schema or logical database design from the set ...
  • Visser, P. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    This paper presents a summary of tutorial material on accepted management techniques and philosophies as applied to the development of large software systems, based upon the documentation for such systems.
  • Van Niekerk, J.C. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    The operational approach to the analysis of the single server model is discusses. Firstly Buzen's operational equivalent to the stochastic birth/death Markov model is presented, whereafter generalisations of the model are ...
  • Schach, S. R. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    Three levels of traces for data structures (as opposed to simple variables) are defined. A machine-code core dump is essentially a low level trace. A high level trace reflects the high level language in which the data ...
  • Van Rooyen, Martha H. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    SCRAP is a high-level language that provides facilities for systems progrc~ff)ming, but can equally well be used for applications programming. The prominent features of the language are a well-defined syntax, a modular ...
  • Popelas, Judy Mallino; Calingaert, Peter (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    The correction of errors in programs can be based on an analysis, that subordinates syntactic relationships to functional relationships among elements of a program. For this purpose, case grammars, originally developed ...
  • Hetzel, Bill; Calingaert, Peter (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    A controlled experiment was designed and conducted to compare three methods for detecting errors in computer programs: disciplined, structured reading; specification or black-box testing; and a refined form of typical ...
  • Viktor, HL; Rennhackkamp, MH (South African Computer Society (SAICSIT), 1992)
    The technology of distributed databases is based on two other technologies which have developed a solid foundation: computer networks and centralized databases. A distributed database designer should therefore address ...
  • van der Poel, E; Cloete, I (South African Computer Society (SAICSIT), 1992)
    In Artificial Neural Network (ANN) simulation it is usually necessary to examine the behaviour of the ANN and detect problems if they occur. However, due to the large volume and high dimensionality of data generated during ...
  • Tredoux, G (South African Computer Society (SAICSIT), 1992)
    The mechanization in Higher Order Logic of a general- purpose operational semantics for programming languages is described. The mechanization allows the sound derivation of Dijkstra-style axiomatic semantics. A small ...
  • Theron, PZ; Cloete, I (South African Computer Society (SAICSIT), 1992)
    The problem of automatic acquisition of lexical-semantic relations for Afrikaans nouns from a dictionary is addressed. The acquisition process is improved over previous approaches by implementing both typographic constraints ...
  • Sparg, SB; Berman, S (South African Computer Society (SAICSIT), 1992)
    Existing persistent languages cannot express the structure and semantics of the data they work on precisely and simply. As a result programs are more difficult to write and the integrity of the data is compromised. This ...

View more