Institutional Repository

Browsing SAICSIT Digital Archive by Title

Browsing SAICSIT Digital Archive by Title

Sort by: Order: Results:

  • Potgieter, BC (2001)
    Computer scientists and information technologists are morally obliged to study the social impact of their technologies. They must also consider the results of the non-positivistic · approaches that are generally avoided ...
  • Bause, F; Kritzinger, P; Sczittnick, M (South African Computer Society (SAICSIT), 1994)
    The Distributed Queue Dual Bus (DQDB) protocol or IEEE 802.6 has been accepted as the international standard for Metropolitan Area Networks (MAN). This paper describes a combined MIG/I and Markov model for the steady state ...
  • Ngubane, SB (1995)
    This paper discusses the development and implementation of a set of measures which support a Total Quality Management (TOM) process in a Systems Development environment. This process is taking place in the background of ...
  • Tredoux, G (South African Computer Society (SAICSIT), 1992)
    The mechanization in Higher Order Logic of a general- purpose operational semantics for programming languages is described. The mechanization allows the sound derivation of Dijkstra-style axiomatic semantics. A small ...
  • Stein, David M. (Computer Society of South Africa (on behalf of SAICSIT), 1980)
    In this paper some specifics and some generalities on the subject of memory organization for future large processors are discussed. We briefly review the current hierarchy and discuss technological and economic changes ...
  • Berman, Sonia (South African Computer Society (SAICSIT), 1994)
    Since its emergence in the early eighties, persistence has become an important branch of Computer Science. Many persistent systems have now been developed and a wide variety of related issues have been well researched. Two ...
  • Figueira, R; Berman, S (2000)
    This paper describes a metamodelling system that has been created at the University of Cape Town as part of an integrated software engineering environment called the Persistent Programmers Workshop. The workshop architecture ...
  • Crossman, T.D. (South African Institute of Computer Scientists and Information Technologists, 1991)
    This paper describes the inspection team process and explores its value to the application developer. The conclusion reached is that the technique does incur added development costs, but the whole process brings with it ...
  • Ikram, IM (1995)
    We consider the problem of automatically generating parallel programs in the occam language. In particular, we are concerned with the generation of program skeletons, that define just those computations that are common ...
  • Redelinghuys, M; Steenkamp, AL (1996)
    The research is conducted in the area of software methodologies with the emphasis on the integration of legacy systems with client/server environments. The investigation starts with identifying the characteristics of legacy ...
  • Roets, P. P. (Computer Society of South Africa (on behalf of SAICSIT), 1982)
    An evaluation is made of the improvement of language interpreters by coding recurring sequences of instructions in micro-code. The results of an experiment with PASCAL indicate that the increase in speed expected may not ...
  • Pino, Jose A. (Computer Society of South Africa (on behalf of SAICSIT), 1984)
    This paper describes the design of MIGRATIONS, a software system under development at the University of Chile, whose purpose is to store, manage and retrieve unformatted text information. Among the most important design ...
  • Meumann, MD; Rennhackkamp, MH (South African Institute of Computer Scientists and Information Technologists, 1990)
    A user of a distributed database management system must be able to access data which is stored on a number of different sites, connected by a network, without being aware of the physical data distribution. The NRDNIX ...
  • Vosloo, I (South African Computer Society (SAICSIT), 1997)
    This communication gives an overview of the field of mobile agents as presented at various events held in conjunction with a recent international symposium in Germany. The nature of mobile agents and the key concepts ...
  • Goldblatt, R (South African Computer Society (SAICSIT), 1995)
    These lectures provide an introduction to modal logic and its use in formalising reasoning about the behaviour of computational processes. They begin with a general introduction to the syntax, semantics, and proof-theory ...
  • De Villiers, PJA (1991)
    A model checker automatically determines whether a model of a re­active system satisfies its specification.Temporal logic is used to spec­ify the intended behaviour of a reactive system which is modelled as a transition ...
  • De Villiers, PJA (South African Computer Society (SAICSIT), 1992)
    A model checker automatically determines whether a model of a reactive system satisfies its specification. Temporal logic is used to specify the intended behaviour of a reactive system which is modelled as a transition ...
  • Hazelhurst, S (1997)
    Traditional methods of testing computer systems, although valuable, are inadequate for ensuring sufficiently high quality in systems in which a high degree of reliability must be placed. Formal methods for development of ...
  • Barnard, L; Von Solms, R (2000)
    During the last few decades computing environments have advanced from single user systems to distributed, open environments we all know today. Through these Information Technology advancements, more and more role players ...
  • Goosen, H.A.; Hoogendoorn, C.H.; Goosen (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Reliability is an important consideration in the design of computer systems. This is a result of the increasing complexity of computer systems and of the greater reliance placed on their continuous and correct operation. ...

Search UnisaIR


Browse

My Account