Institutional Repository

Browsing SAICSIT Digital Archive by Title

Browsing SAICSIT Digital Archive by Title

Sort by: Order: Results:

  • Kotze, P; De Villiers, R (South African Computer Society (SAICSIT), 1997)
    The research reported in this paper aims to integrate software engineering approaches with instructional factors in the requirements analysis, design and production phases of instructional software development. The integration ...
  • Petkov, D (South African Computer Society (SAICSIT), 1996)
    This paper suggests an approach for the selection of microcomputer equipment in a decentralised environment. It is based on a modification of the procedure of the Analytic Hierarchy Process (AHP) by T. Saaty. The structuring ...
  • Kourie, D.G. (Computer Society of South Africa (on behalf of SAICSIT), 1989)
    A proposal for defining abstractions and refinements is given in terms of three-valued logic applied to a domain of discourse consisting of a property and an entity set. Definitions for several related concepts flow ...
  • Philips, MJ (1987)
    The difficulties encountered by users without experience of the use of multiple databases are described, as well as an approach which allow such users to make worthwhile use of these systems, encompassing potentially ...
  • Du, B; Maeder, A (South African Computer Society (SAICSIT), 1999)
    Real-time video delivery adds an aspect of reality when used in conjunction with other computer and human communi­cations facilities (eg in videophone or videoconferencing applications). However, the complex and time-critical ...
  • Krzesinski, AE (1987)
    A Multidass Queueing Network (MQN) Q ( N, .M ) consisting of M centres with index set .M and population vector N is partitioned into two subnetworks Q ( fJ -V , .M -1) ) and Q (V , V ) . The centres in Q (V , · V ) are ...
  • Crossman, T.D. (South African Computer Society (SAICSIT), 1993)
    Some sources suggest that the implementation of Artificial Intelligence and Expert Systems applications (AI/ES) may create problems for the business sector. This article presents a management tool (based on the concept of ...
  • Parker-Nance, TC; Warren, PR (South African Computer Society (SAICSIT), 1993)
    Usability problems with computer systems can be divided into three broad categories: problems due to the socio/political environment, problems due to the usefulness of systems, and problems due to the accessibility of ...
  • De Jager, N; Roos, J (South African Computer Society (SAICSIT), 1996)
    This article discusses various issues around the Transmission Convergence (TC) sublayer in the physical layer of ATM. A brief introduction is given to the layered approach and functionality of the ATM physical layer. This ...
  • Watzenboeck, M (1996)
    Automating network management is regarded as a prerequisite for further plant automation. Artificial intelligence techniques, such as case based reasoning, topological reasoning and automated learning enable automated ...
  • Tidwell, LD; Schach, Stephen R. (South African Institute of Computer Scientists and Information Technologists, 1991)
    It is becoming increasingly difficult for researchers with little or no formal computer science background to make effective use of supercomputers and other vector machines in their own fields of research. Automatic ...
  • Theron, PZ; Cloete, I (South African Computer Society (SAICSIT), 1992)
    The problem of automatic acquisition of lexical-semantic relations for Afrikaans nouns from a dictionary is addressed. The acquisition process is improved over previous approaches by implementing both typographic constraints ...
  • Theron, H; Cloete, I (South African Computer Society (SAICSIT), 1992)
    Thi spaper investigates the issues of specializing only a single best conjunction to employing a beam search when learning attribute-based concept descriptions using the GCA algorithm. We describe GCA, a recently introduced ...
  • Viljoen, E (2000)
    Logics of belief and knowledge are typically formulated in terms of modal languages. A possible world semantics is traditionally used for such languages but when a formula A is read as "The agent believes that A", the ...
  • Hazelhurst, S; Fatti, A; Henwood, A (1998)
    The growth of network and internet communication creates several challenges for network design. Two important issues are security and performance. As the volume of communication increases together with the importance of ...
  • Olivier, MS; Von Solms, SH (1991)
    In current database systems the responsibility for enforcing security is often given to the various application programs. Even where the Database Management System (DBMS) does supply security mechanisms, a single application ...
  • Levitt, SP; Dwolatzky, B (South African Computer Society (SAICSIT), 1999)
    In this paper the design of a novel building extraction system, entitled BuRS, is proposed. It is capable of identifying man-made structures that are visible in monocular greyscale aerial photography of rural settlements ...
  • Blewett, CN; Erwin, GJ (1995)
    The book uses storytelling as teaching, with exclusive use of active tense, local examples a problem-driven approach rather than a product-driven approach. For example, magnetic tape principles are explained in ...
  • Shewaram, T (South African Computer Society (SAICSIT), 1996)
    'Change' is a universal phenomenon that many take for granted. Without change, time has no meaning. Even people are essentially dynamic processes, we are constantly changing in multitudinous ways. In light of this, it is ...
  • Jones, MR (South African Computer Society (SAICSIT), 1995)
    Business Process Reengineering (BPR) is currently attracting much attention as an approach to organisational change, but has received relatively little critical scrutiny. This paper seeks to examine the origins, antecedents ...

Search UnisaIR


Browse

My Account