Institutional Repository

Browsing SAICSIT Digital Archive by Title

Browsing SAICSIT Digital Archive by Title

Sort by: Order: Results:

  • Von Solms, R; Van de Haar, H (South African Computer Society (SAICSIT), 1999)
    To protect the information systems of an organization an appropriate set of security controls needs to be installed and managed properly. Many organizations that can afford it conduct either a risk analysis exercise ...
  • Muftic, S (South African Computer Society (SAICSIT), 1996)
    The paper describes the design details and implementation results of the completely integrated, functional and operational security system, suitable for open distributed environments. Functionality means that security ...
  • Brinksma, E; Langerak, R (South African Computer Society (SAICSIT), 1995)
    We present an algorithm for the decomposition of processes in a process algebraic framework. Decomposition, or the refinement of process substructure, is an important design principle in the top-down development of concurrent ...
  • Machanick, P; Patel, Z (2001)
    The RAMpage memory hierarchy is an alternative to the traditional division between cache and main memory: main memory is moved up a level and DRAM is used as a paging device. Earlier RAMpage work has shown that the RAMpage ...
  • Apteker, RT; Bishop, JM (South African Computer Society (SAICSIT), 1992)
    Graphic User Interfaces (GUls) are the key ingredient in the development of a new era of computer software. Pioneered at Xerox, launched at Apple, pursued by Microsoft, and challenged by a host of others, the age of the ...
  • Putter, P; Roos, JD (South African Computer Society (SAICSIT), 1992)
    This paper proposes a general building block for distributed systems. This building block is referred to as a generic distributed system entity (GDE). The purpose of the GDE is to create a generic entity which can be used ...
  • Van Biljon, WR (1987)
    The expression structure of programming languages is examined. Two weaknesses are identified. The first pertains to the inability, or limited ability, to redefine operators or to define new operators. The second pertains ...
  • Hazelhurst, S (South African Computer Society (SAICSIT), 1999)
    Given two temporal logic formulas, g and h, we wish to know whether there is a modification, m, we can make to h so that g ==> m( h). This problem has important applications in hardware verification, where finding such ...
  • Venter, H (1996)
    Given a complete, formal description of the semantics of a programming language, it should be possible to generate a compiler for the language using an automated process. This is highly desirable, since it reduces the work ...
  • von Solms, S. H. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Grammars generating 2-dimensional arrays have been studied by many people [1, 2, 3, 4). One effort was Random Context Array Grammars [4], where different types of context conditions placed on the production, were used ...
  • De Waal, DA; Denecker, M; Bruynooghe, M; Thielscher, M (2000)
    In deductive planning, there exists a· particular class of planning problems, called unsolvable planning problems, which although successfully treated theoretically, turns out to be undetectable using ordinary resolution ...
  • Kotze, P (South African Computer Society (SAICSIT), 1999)
    Existing modelling frameworks for the design of interactive systems emphasise the relationship between the system's in­ternal state and the rendering of this state at the user interface. Modern programming and multimedia ...
  • Goslett, J.; Melton, A (South African Computer Society (SAICSIT), 1995)
    This tutorial is a companion paper to the tutorial Denotational Semantics and Domain Theory by Goslett, Hulley, and Melton. The purpose of the earlier tutorial was to present a computationally intuitive introduction to ...
  • Mphahlele, M; Roos, J (2000)
    Survivability in connection-oriented ATM networks is critical due to link and node failures. With regard to high priority connections, it is important that the network maintains their performance guarantees. The restoration ...
  • Smit, J (South African Computer Society (SAICSIT), 1999)
    Grounded Theory (GT), along with the surging interest in qualitative research, is becoming a popular research strategy in the Information Systems (IS) field. At the same time however, the method seems to be changing in its ...
  • Thomas, T (1998)
    This paper describes the social constructivist theory of learning and how it can be applied to handle the problems of diversity in Information Systems and Computer Science classes. Examples are given on methods that can ...
  • Clayton, Peter G. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    This paper advocates hands-on training on microprogrammable hardware for Computer Science students, and suggests an appropriate microprogram development approach for this purpose. The particular tool discussed is ...
  • Joubert, A; Jordaan, A (1998)
    This paper explores the use of dive computer downloader units and Delphi 3 object-oriented structures to integrate the fields of Computer Systems and Software Engineering in the academic environment. Currently there is a ...
  • Rodd, M. G. (Computer Society of South Africa (on behalf of SAICSIT), 1979)
    The efficient use of multiprogrammed industrial control computers is largely a function of the relationship between hardware and software. A shift in this relationship is desirable, since multiprogrammed computers typically ...
  • Rodd, M. G. (Computer Society of South Africa (on behalf of SAICSIT), 1979-06-01)
    The efficient use of multiprogrammed mdustnal control computers 1s largely a function of the relationship between hardware and software A shift in this relationship 1s desirable, smce multiprogrammed computers typically ...

Search UnisaIR


Browse

My Account