Institutional Repository

Browsing SAICSIT Digital Archive by Title

Browsing SAICSIT Digital Archive by Title

Sort by: Order: Results:

  • Postma, Stef W. (Computer Society of South Africa (on behalf of SAICSIT), 1982)
    Quadlisp is a symbol manipulation language for sophisticated users, and it is an improper extension of Lisp 1.5 (in the same sense that Pascal is an improper extension of Algol). Elements from Lisp thus are basic to the ...
  • Cloete, E (1995)
    A 1 D non-linear filter which is based on 'max-min' selectors is extended for use in 2 0 applications. The objective of this research is to remove impulsive noise without unduly changing original, valid data. Some examples ...
  • Machanick, P (1998)
    The SAVoD (Scalable Architecture for Video on Demand) approach to video on demand exploits the fact that end-user latency goals are relatively modest, while increasing bandwidth is much easier than improving bandwidth. ...
  • Wagener, MJ (1991)
    The design of a speech synthesis system for the generation of speech from text is presented. The system accepts any Afrikaans sentence and then derives segmental and suprasegmental informa­tion through various linguistic ...
  • Machanick, P (1991)
    Parallel simulation, if it is to become a mainstream technology, must become reasonably accessible to programmer s without unusual skills. Since low-cost shared memory machines are becoming an increasing possibility a ...
  • Machanick, Philip (South African Institute of Computer Scientists and Information Technologists, 1992)
    Parallel simulation, if it is to become a mainstream technology, must become reasonably accessible to programmers without unusual skills. Since low-cost shared memory machines are becoming an increasing possibility, a ...
  • Pangalos, G; Khair, M (South African Computer Society (SAICSIT), 1996)
    A database design methodology is presented in this paper which aims to improve the security of medical database systems. The proposed methodology is based on both the discretionary and the mandatory database security ...
  • Warren, PR; Viljoen, M (1998)
    This work reports on 23 third year student' s projects in which the user interfaces (UI) were found wanting. We show in which ways we regard the UI to be in error. However, an examination of the available literature on UI ...
  • Williams, M.H. (Computer Society of South Africa (on behalf of SAICSIT), 1979)
    BASIC and Pascal are two rather different programming languages, both of which have proved to be very popular. A new language BPL has been designed as an interactive programming language based on these two languages, ...
  • Venter, B.H. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    An operating system provides, among other things, an operational definition of a process. The concept of a process is one of the fundamental concepts of Computer Science, and the designer of an operating system must strive ...
  • Hetzel, Bill; Calingaert, Peter (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    A controlled experiment was designed and conducted to compare three methods for detecting errors in computer programs: disciplined, structured reading; specification or black-box testing; and a refined form of typical ...
  • McDermott, T.S. (Computer Society of South Africa (on behalf of SAICSIT), 1984)
    A language-independent syntax-directed editor for teaching programming languages on micro-computers is briefly described. The design of the configuring grammar and the lnternal tree-structure to be edited and interpreted ...
  • Schroder, C; Thomas, T (2000)
    Today software developers are required to work closely with users when defining, developing and implementing systems. Interaction between software developers and users can influence the success or failure of the system ...
  • Ganchev, GF (1995)
    The compiler construction toolkit under development in the University of Botswana (UB is intended to allow the students build rapidly components of compilers for languages that they define. It consists of a case-type scanner ...
  • Van Wyk, DF; Benade, SJ; Steenkamp, AL (1995)
    Any company that is involved in manufacturing, must be able to tell the exact difference between any two products of the same family. This is necessary to enable such a company to support these products during the total ...
  • Panagou, S; Bangay, S (South African Computer Society (SAICSIT), 1999)
    We address the problem of virtual-videoconferencing. The proposed solution is effected in terms of a generic framework based on an in-house Virtual Reality system. The framework is composed of a number of distinct components: ...
  • Morris, MA (1987)
    Difference equation methods are used to develop redundant (n-version) programs required for high reliability computing systems. The n-version programs are developed by exploiting the iterative nature of real time software. The ...
  • Van der Vegte, L.J. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    In this article a brief overview is given of specification techniques in general and in particular, specification techniques used for the specification of communication protocols. This discussion forms the background ...
  • Pillay, N (2000)
    End-user computing is a compulsory course that all first year technikon students who are not registered for a computer-related diploma. However, most students ( especially those from disadvantaged educational backgrounds) ...
  • Streicher, M; Wesson, JL; Calitz, A (2001)
    During the last ten years, a number of computerised testing systems have been developed without considering the users' level of computer proficiency. Students at the University of Port Elizabeth come from a diverse background, ...

Search UnisaIR


Browse

My Account