Institutional Repository

Browsing School of Computing by Title

Browsing School of Computing by Title

Sort by: Order: Results:

  • Cooper, A.K. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Geographical information consists of non-spatial information (alphanumeric) and spatial information (vector and raster), the relationships between the non-spatial information and the spatial information, as well as ...
  • Cooper, AK (1987)
    Geographical information consists of non-spatial information (alphanumeric) and spatial information (vector and raster), the relationships between the non-spatial information and the spatial information, as well as the ...
  • Schach, Stephen R. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    Three levels of traces for data structures (as opposed to simple variables) are defined. A machine-code core dump is essentially a low level trace. A high level trace reflects the high level language in which the data ...
  • Currin, Desmond C. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    Generalized network problems involve the optimization of a flow through a network. In contrast to normal networks, generalized networks include multipliers which alter the flow as it passes through the arcs. This enables ...
  • Venter, BH (South African Institute of Computer Scientists and Information Technologists, 1990)
    A programming language data model is introduced, based on the notions that variables are functions and types are sets of values. It is shown that, despite the simplicity of the underlying mathematical formalism, the data ...
  • Heidema, J; Labuschagne, W.A. (South African Institute of Computer Scientists and Information Technologists, 1990)
    The theory of semantic information is sketched in an algebraic setting, and automorphisms characterising various degrees of incompatibility are introduced. Data-dependent measures of semantic information are defined in ...
  • Viktor, HL; Rennhackkamp, MH (South African Institute of Computer Scientists and Information Technologists, 1991)
    A recovery technique, to facilitate the recovery from system failures should ensure a consistent database state at all times. The UNIX write system call uses a delayed-write policy. Data blocks are kept in a buffer cache ...
  • King, M. C. F.; Naude, G.; von Solms, S. H. (Computer Society of South Africa (on behalf of SAICSIT), 1979)
    Aspects are discussed of the pract.Ical applicat.Ion of recent relatlonal theory The relevant defirut.Ions, extracted from vanous papers, have been restated usmg a common notat.Ion An attempt is made to descnbe unambiguously ...
  • Podevyn, D. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    A knowledge engineering tool called GESS (General Expert System Shell) is presented which is used for building different types of expert systems. Knowledge representation is based on direct extensions of the idea of decision ...
  • Abdulrab, H; Ngomo, M; Drissi-Talbi, A (South African Computer Society (SAICSIT), 1999)
    LOP (Logic, Object, Parallelism) is a system that integrates object-oriented and constraint logic programming. It is entirely designed and implemented, using object-oriented methodology, under the form of hierarchical ...
  • Abdulrab, H; Ngomo, M; Drissi-Talbi, A (South African Computer Society (SAICSIT), 2000)
    The aim of this paper is to introduce temporal processes and linear constraints on naturals for solving temporal discrete simulations problems. We first describe a new approach for solving such constraints, based on the ...
  • Eisinger, N; Ohlbach, HJ (South African Computer Society (SAICSIT), 1993)
    A general theory of deduction systems is presented The theory is illustrated with deduction systems based on the resolution calculus, in particular with clause graphs. This theory distinguishes four constituents of a ...
  • Govender, I. (Irene) (1998-06)
    In this dissertation a formalisation of nonmonotonic reasoning, namely Default logic, is discussed. A proof theory for default logic and a variant of Default logic - Prioritised Default logic - is presented. We also pursue ...
  • Da Veiga, Adele; Martins, Nico (Computers & Security (Elsevier Journal), 2017-05-12)
    consider the possibility of several information security subcultures that could be present in the organisation. This means that different geographical, ethnic or age groups of employees could have different assumptions, ...
  • Da Veiga, Adele; Astakhova, Liudmila V.; Botha, Adele; Herselman, Marlien (Elsevier, 2020-01-08)
    The ideal or strong information security culture can aid in minimising the threat of humans to informa- tion protection and thereby aid in reducing data breaches or incidents in organisations. This research sets out to ...
  • Renaud, Karen; Van Biljon, Judy (South African Institute of Computer Scientists and Information Technologists, 2017-12)
    Guidelines are recommended as a tool for informing user interface design. Despite a proliferation of guidelines in the research literature, there is little evidence of their use in industry, nor their influence in academic ...
  • Goslett, J.; Hulley, H; Melton, A (South African Computer Society (SAICSIT), 1993)
    This tutorial is an introduction to denotational semantics and domain theory. For this reason the presentation is not entirely rigorous, with some proofs being omitted and certain simplifying assumptions being made. Instead, ...
  • Marnewick, C.; Labuschagne, L. (University of South Africa, 2009-12-03)
    Organisations initiate and execute projects at an ever-increasing rate in order to achieve their strategic intentions. Many of these, however, find it difficult to measure the contribution that these projects make towards ...
  • MacGregor, KJ; Campbell, RH (1991)
    An object-orientated framework for the design of distributed virtual memory consistency is presented. It is shown that custom designed protocols for different types of applications are easy to construct and use within this ...
  • MacGregor, K.J.; Campbell, RH (Soutth African Institute of Computer Scientists and Information Technologists, 1992)
    An object-orientated framework for the design of distributed virtual memory consistency protocols is presented. It is shown that custom designed protocols for different types of applications are easy to construct and use ...

Search UnisaIR


Browse

My Account