Institutional Repository

Browsing SAICSIT Digital Archive by Title

Browsing SAICSIT Digital Archive by Title

Sort by: Order: Results:

  • Hajek, M (2000)
    A neural network was used to model experimental fluidisation data - bubble size and velocity - from a laboratory size fluidised bed column. Experiments were performed for several particle sizes and temperatures. A classical ...
  • McLeod, M; Bajic, VB (1996)
    The paper introduces a method for identification and assisted controller tuning for industrial process control loops suitable for an 'in-chip' solution. The method is based on utilization of neural network technology. It ...
  • Carson, DI; Oellermann, OR (South African Computer Society (SAICSIT), 1992)
    In this paper we discuss the problem of finding an upper bound on the genus of a graph. This problem has applications to circuit layouts. An electronic circuit may be modelled by a graph. By punching holes into the circuit ...
  • Carson, DI; Oellermann, OR (1991)
    In this paper we discuss the problem of finding an upper bound on the genus of a graph. This problem has applications to circuit layouts. An electronic circuit may be modelled by a graph. By punching holes into the circuit ...
  • Bouras, Z-E; Khammaci, T; Ghoul, S (South African Computer Society (SAICSIT), 2000)
    Program integration combines independent enhancements to some version of a software system into a new system that includes the enhancements and the old system. Current approaches use the slice concept. The latter is a ...
  • Postma, Stef W. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    The Department of Computer Science of the Pietermaritzburg Campus of the University of Natal is one of the youngest departments in the country, although service courses to the Faculty of Commerce have been available ...
  • Klein, HK; Truex, DP (1995)
    This paper outlines the basic theoretical assumptions of language analysis and then proposed a new approach called discourse analysis. The theoretical foundations of discourse analysis are Wittgenstein's theory of language ...
  • Parker, DB (South African Computer Society (SAICSIT), 1996)
    It is reasoned that to preserve the three traditional elements of information security, confidentiality, integrity and availabil­ity, it is not sufficient to fully protect information. Three new elements are introduced: ...
  • Venter, BH (1987)
    The current generation of widely-used, multi-user, general-purpose operating systems have evolved from versions that were designed when many of the issues that are important today were unimportant or not even thought of. ...
  • Venter, B.H. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    The current generation of widely-used, multi-user, general-purpose operating systems have evolved from versions that were designed when many of the issues that are important today were unimportant or not even thought of. ...
  • Smith, DC (South African Computer Society (SAICSIT), 1996)
    The recent acceptance of South Africa as a world player and the government's reconstruction and development programme (RDP) have created new challenges and opportunities for business and universities. The Information Systems ...
  • Sanders, I (1998)
    In an earlier paper the notion of a ray guard --'- a guard that can only see along a single ray, was introduced. The ray guarding problem is in siting the fewest possible such guards so that they guard all adjacencies ...
  • Finnie, G.R. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    This paper describes a study of changes in attitude toward computers exhibited by novice student users during a first course in business computing. Several dimensions of attitude were established by factor analysis. ...
  • Rennhackkamp, MH (South African Institute of Computer Scientists and Information Technologists, 1990)
    A distributed database management system must facilitate integrated processing of data which is physically distributed over a network of node computers, while providing locality transparency. The NRDNIX prototype has ...
  • Rennhackkamp, M (1991)
    There is, as yet, no single formal definition for the object-oriented approach. The object-oriented paradigm is described in terms of the concepts accentuated by the approach, namely classes, objects, methods, messages and ...
  • Waldron, JT (South African Computer Society (SAICSIT), 2000)
    Dynamic quantitative measurements of Bytecode and Stack Frame Usage by Eiffel and Java Programs in the Java Virtual Machine are made. Two Eiffel programs are dynamically analysed while executing on the JVM, and the results ...
  • Watzenboeck, M (2000)
    Financial industry and manufacturing are the main customers in migrating existing applications into client server environments. This paper helps in identifying the candidates for migration and suggests a method for ...
  • Loock, M; Steenkamp, AL (1995)
    The research is conducted in the area of Software Engineering, with emphasis on the design phase of the Software Development Life Cycle (SDLC). The object-oriented paradigm is the point of departure. The investigation deals ...
  • Schimkat, RD; Kuchlin, W; Krautter, R (South African Computer Society (SAICSIT), 1999)
    Reuse of software components offers the potential for significant savings in application development costs and time. This paper provides a characterization of reuse at different levels of client-based software in distributed ...
  • Schach, Stephen R. (South African Computer Society (SAICSIT), 1994)
    The object-oriented paradigm is widely promoted as the optimal way to develop software. However, there is as yet no experimental evidence to back that assertion, and it is extremely unlikely that such evidence could be ...

Search UnisaIR


Browse

My Account