Institutional Repository

Quaestiones Informaticae Vol 6 No 1

Quaestiones Informaticae Vol 6 No 1

 

Recent Submissions

  • Venter, B.H. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    An operating system provides, among other things, an operational definition of a process. The concept of a process is one of the fundamental concepts of Computer Science, and the designer of an operating system must strive ...
  • Venter, B.H. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    The current generation of widely-used, multi-user, general-purpose operating systems have evolved from versions that were designed when many of the issues that are important today were unimportant or not even thought of. ...
  • Smit, P.J. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Colour computer graphics covers a wide field of applications such as games, computer aided-design, image processing and digital terrain modelling. The traditional way of using colour in raster graphics systems, the RGB ...
  • Mende, J. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    The laws and techniques of maJure sub1ects such as Physics and Electrical Engineering are logically connected to one another in the form of a deductive network There is a foundation of basic laws deriving from them ...
  • Kritzinger, Pieter S. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Performance analyses of data communication systems do not always rely on a detailed analysis of the underlying protocols. Those analyses which do, usually rely on an analysis of the protocol state transition graph. These ...
  • Von Solms, S.H.; De Villiers, D.P. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    The operations in the Take/Grant Protection Model are formalised using theory and results from the discipline of formal languages. A Protection Graph Rewriting Grammar is defined, which generates protection graphs consistent ...
  • De Villiers, D.P.; Von Solms, S.H. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    In this paper the Send/Receive and Take/Grant logical security models are formalised using results from formal language theory. By using the graph rewriting facilities of NLC-grammars, and by extending these facilities ...