Institutional Repository

South African Computer Journal 1997(20)

South African Computer Journal 1997(20)

 

Recent Submissions

  • Machanick, Philip (South African Computer Society (SAICSIT), 1997)
    Experience in industry suggests that reuse does not happen without retraining, despite the fact that many experienced software engineers accept that reuse ought to be more efficient than coding from scratch. A possible ...
  • Kotze, P; De Villiers, R (South African Computer Society (SAICSIT), 1997)
    The research reported in this paper aims to integrate software engineering approaches with instructional factors in the requirements analysis, design and production phases of instructional software development. The integration ...
  • Vosloo, I (South African Computer Society (SAICSIT), 1997)
    This communication gives an overview of the field of mobile agents as presented at various events held in conjunction with a recent international symposium in Germany. The nature of mobile agents and the key concepts ...
  • Van der Merwe, AJ; Labuschagne, WA (South African Computer Society (SAICSIT), 1997)
    In 1985 Smith introduced a new way of deriving fully normalized tables. His method was based on the use of a dependency list and a dependency diagram to produce fifth normal form directly. We introduce the use of end-line, ...
  • Sanders, I; Tsai, C (South African Computer Society (SAICSIT), 1997)
    The goal of this research is to demonstrate that word prediction in a constrained domain like a programming language can be done effectively and hence has the potential to facilitate typing for disabled people who are ...
  • Rensleigh, CW; Olivier, MS (South African Computer Society (SAICSIT), 1997)
    Small-business performance can benefit from computerisation. Unfortunately, however, most of the very small small-business enterprises do not have the financial means to acquire the services of a computerisation consultant. ...
  • Renaud, K; Kotze, P (South African Computer Society (SAICSIT), 1997)
    In many applications today multiple pre-existing database systems are integrated into a single multiple database system called a multi­database system. One of the biggest problems for transaction management in a multidatabase ...
  • Remenyi, D (South African Computer Society (SAICSIT), 1997)
    Business Process Reengineering (BPR) or Business Transformation is very difficult to manage successfully. There is a high failure rate of BPR projects and thus the risk associated with this type of work is high. Although ...
  • Olivier, MS (South African Computer Society (SAICSIT), 1997)
    Mobile computers pose special security risks since information contained on them can more easily be compromised. However, availability of information at the location where the mobile computer is to be used often outweighs ...