Institutional Repository

Browsing SAICSIT Digital Archive by Title

Browsing SAICSIT Digital Archive by Title

Sort by: Order: Results:

  • Anderssen, E.C.; Von Solms, S.H. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    A polygon clipping algorithm is presented for the clipping of closed geographical areas such as dams or forests, against a surrounding rectangular windowframe. The algorithm employs a line clipping procedure which divides ...
  • Viktor, HL; Cloete, I (1996)
    Computational intelligent programs are capable of discovering interesting relationships contained in "raw" data. These programs, including artificial neural networks, set covering algorithms and decision trees, have been ...
  • Licker, PS (1998)
    This paper develops a multidimensional framework to look at the role that information systems can play in the field of National Development. While there are already several frameworks, these are aimed at the employment ...
  • Krzesinski, T (South African Computer Society (SAICSIT), 1994)
    The foundation for Research Development (FRD) is evaluating the need for a new Special Programme in Computer Science. An initial meeting was held in August 1993 at the FRD to discuss the new programme. A Steering Committee ...
  • Pendock, N (South African Computer Society (SAICSIT), 1992)
    The routine use of satellite remotely sensed imagery for a variety of applications is twenty years old this year. In addition to these digital photographs of the earth's surface, subterranean views are made using gravity, ...
  • Von Solms, R; Van de Haar, H (South African Computer Society (SAICSIT), 1999)
    To protect the information systems of an organization an appropriate set of security controls needs to be installed and managed properly. Many organizations that can afford it conduct either a risk analysis exercise ...
  • Muftic, S (South African Computer Society (SAICSIT), 1996)
    The paper describes the design details and implementation results of the completely integrated, functional and operational security system, suitable for open distributed environments. Functionality means that security ...
  • Brinksma, E; Langerak, R (South African Computer Society (SAICSIT), 1995)
    We present an algorithm for the decomposition of processes in a process algebraic framework. Decomposition, or the refinement of process substructure, is an important design principle in the top-down development of concurrent ...
  • Machanick, P; Patel, Z (2001)
    The RAMpage memory hierarchy is an alternative to the traditional division between cache and main memory: main memory is moved up a level and DRAM is used as a paging device. Earlier RAMpage work has shown that the RAMpage ...
  • Apteker, RT; Bishop, JM (South African Computer Society (SAICSIT), 1992)
    Graphic User Interfaces (GUls) are the key ingredient in the development of a new era of computer software. Pioneered at Xerox, launched at Apple, pursued by Microsoft, and challenged by a host of others, the age of the ...
  • Putter, P; Roos, JD (South African Computer Society (SAICSIT), 1992)
    This paper proposes a general building block for distributed systems. This building block is referred to as a generic distributed system entity (GDE). The purpose of the GDE is to create a generic entity which can be used ...
  • Van Biljon, WR (1987)
    The expression structure of programming languages is examined. Two weaknesses are identified. The first pertains to the inability, or limited ability, to redefine operators or to define new operators. The second pertains ...
  • Hazelhurst, S (South African Computer Society (SAICSIT), 1999)
    Given two temporal logic formulas, g and h, we wish to know whether there is a modification, m, we can make to h so that g ==> m( h). This problem has important applications in hardware verification, where finding such ...
  • Venter, H (1996)
    Given a complete, formal description of the semantics of a programming language, it should be possible to generate a compiler for the language using an automated process. This is highly desirable, since it reduces the work ...
  • von Solms, S. H. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Grammars generating 2-dimensional arrays have been studied by many people [1, 2, 3, 4). One effort was Random Context Array Grammars [4], where different types of context conditions placed on the production, were used ...
  • De Waal, DA; Denecker, M; Bruynooghe, M; Thielscher, M (2000)
    In deductive planning, there exists a· particular class of planning problems, called unsolvable planning problems, which although successfully treated theoretically, turns out to be undetectable using ordinary resolution ...
  • Kotze, P (South African Computer Society (SAICSIT), 1999)
    Existing modelling frameworks for the design of interactive systems emphasise the relationship between the system's in­ternal state and the rendering of this state at the user interface. Modern programming and multimedia ...
  • Goslett, J.; Melton, A (South African Computer Society (SAICSIT), 1995)
    This tutorial is a companion paper to the tutorial Denotational Semantics and Domain Theory by Goslett, Hulley, and Melton. The purpose of the earlier tutorial was to present a computationally intuitive introduction to ...
  • Mphahlele, M; Roos, J (2000)
    Survivability in connection-oriented ATM networks is critical due to link and node failures. With regard to high priority connections, it is important that the network maintains their performance guarantees. The restoration ...
  • Smit, J (South African Computer Society (SAICSIT), 1999)
    Grounded Theory (GT), along with the surging interest in qualitative research, is becoming a popular research strategy in the Information Systems (IS) field. At the same time however, the method seems to be changing in its ...

Search UnisaIR


Browse

My Account