Institutional Repository

Browsing SAICSIT Digital Archive by Title

Browsing SAICSIT Digital Archive by Title

Sort by: Order: Results:

  • Machanick, P; Salverda, P (South African Computer Society (SAICSIT), 1998)
    The RAMpage memory hierarchy addresses the growing concern about the memory wall - the possibility that the CPU­-DRAM speed gap will ultimately limit the benefits of rapid improvement in CPU speed. Reducing references to ...
  • Jackson, MA (South African Computer Society (SAICSIT), 1998)
    The notion of a problem frame is introduced and explained, and its use in analysing and structuring problems is illustrated. A problem frame characterises a class of simple problem. Realistic problems are seen as compositions ...
  • Krzesinski, AE; Schassberger, R (1991)
    The MultiServer centre with Hierarchical Concurrency Constraints (MSHCC) is an exponential multiserver with a queueing discipline which imposes restrictions on the number of customers of different types and subtypes that ...
  • Richfield, J.M. (Computer Society of South Africa (on behalf of SAICSIT), 1984)
    Structured program design is urged as a rewarding vehicle for the introduction of computer concepts to age groups ranging from mid primary school to senior management. Progressively expanded subsets of the material form ...
  • Byron-Moore, S.P. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Any distractions in the working environment can affect the quality and quantity of output. For example, noise may disturb a person's thought processes and lead to errors. In addition, the programmer is subject to other, ...
  • Mueller, C.S.M. (South African Institute of Computer Scientists and Information Technologists, 1990)
    Induction has been used as a major tool in mathematics in proving theorems. This paper explores whether it has an equally important role in formulating programs. There are those who advocate that induction should be used ...
  • Jansen van Rensburg, M (South African Computer Society (SAICSIT), 1999)
    This article provides a description of the current state of Object Orientation in South African companies. It forms part of an MSc research report, looking at the pitfalls and guidelines in the transition to 00. The problems ...
  • Le Roux, M (1996)
    Thoughts are exchanged on Project Management in practice, specifically regarding projects analysed and systems developed with the Composer by IEF CASE tool. The information engineering methodology (IEM) that is being ...
  • Hazelhurst, S (2001)
    The use of IP filtering to improve system security is well established, and although limited in what it can achieve has proved to be efficient and effective. In the design of a security policy there is always a trade-off ...
  • McDonald, T (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    In contrast to other countries, South Africa has sadly lacked a computer network for researchers. This paper starts with previous efforts to establish a national network for researchers and gives possible reasons for ...
  • Von Solms, S.H.; De Villiers, D.P. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    The operations in the Take/Grant Protection Model are formalised using theory and results from the discipline of formal languages. A Protection Graph Rewriting Grammar is defined, which generates protection graphs consistent ...
  • Van der Poel, K.G.; Bryson, I.R. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    The principles of protection of private information have gradually been defined during the last decades. The US Privacy Act of 1974 regulates practices of the federal government. Two committees of the UK government ...
  • Kritzinger, Pieter S. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Performance analyses of data communication systems do not always rely on a detailed analysis of the underlying protocols. Those analyses which do, usually rely on an analysis of the protocol state transition graph. These ...
  • Kritzinger, PS (1987)
    Performance analyses of data communication systems do not always rely on a detailed analysis of the underlying protocols. Those analyses which do, usually rely on an analysis of the protocol state transition graph. These ...
  • Roos, Jan (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    ESTELLE is being developed by the International Standards Organisation (ISO), Technical Committee (TC) 97, Sub-committee (SC) 21, Working Group (WG) 1, Formal Definition Technique (FDT) Subgroup B to fulfil the need for ...
  • Punt, JL (1987)
    This paper discusses a protocol validation system. The input to the system is a protocol definition specified in the specification language ESTELLE. The ESTELLE specification is the input to a translator program which ...
  • Unknown author (2019)
  • Unknown author (SAICSIT, 1979-06-01)
  • Unknown author (SAICSIT, 1982-11-01)
  • SAICSIT (SAICSIT, 1985)

Search UnisaIR


Browse

My Account