Institutional Repository

Browsing SAICSIT Digital Archive by Title

Browsing SAICSIT Digital Archive by Title

Sort by: Order: Results:

  • Melton, A; Shenoi, S (South African Computer Society (SAICSIT), 1992)
    It is often the case that a major concern with databases is security. In this paper we introduce a new model for database security. The basic idea of this new model is that answers to queries are based on equivalent data ...
  • Mende, J. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Research has a utilitarian role of providing the knowledge needed by the designers of mankind's artefacts. In this context four distinct categories of knowledge are identifiable. 1. Laws of Nature describe inherent ...
  • Short, R.M.C. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Learning about the domain into which an information system will fit is an essential part of the system development process. In this paper it is argued that the first stage of the development process should be learning ...
  • Yellen, RE; Sanford, CC (South African Computer Society (SAICSIT), 1995)
    The Singapore government's adoption of policies which has promulgated an infrastructure heavily reliant on information technology is used as a model to explain Singapore's remarkable economic growth. This model helps to ...
  • Thomas, TA; Brown, S (2001)
    Group activities are important for students in order to develop the skills they will need for working with other people when they get into industry. The Internet offers an exciting environment for students to practise these ...
  • Mazhindu_Shumba, R (1996)
    This paper presents the lessons learned from using the C++ programming language and an object-oriented design methodology for the development of a prototype analysis tool for inheritance relationships in object-oriented ...
  • Baart, L; McLeod, R (2000)
    R.A. Liming developed a method based on classical conic section theory to design cross-sections of aircraft using implicit rather than explicit forms of the quadratic equations. In its basic form the method is used to ...
  • Oosthuysen, WH; McDonald, T (South African Computer Society (SAICSIT), 1995)
    Until some years ago, management of TCP/IP based products was done in a proprietary fashion. Many large companies build their own system-wide management facilities because of a lack of usable systems to manage heterogeneous ...
  • Hazelhurst, SE (South African Institute of Computer Scientists and Information Technologists, 1991)
    The dining philosophers problem and the evolving philosophers problems are abstractions of resource sharing problems in parallel and distributed systems. A Linda solution to the dining problem has already been shown; this ...
  • Hattingh, JM (2000)
    In general response surface analysis refers to the modeling of experimental or observational data. Computer technology and graphical techniques obviously play a significant role in the representations of these models. A ...
  • Mata-Montero, M; Ellis, JA (South African Computer Society (SAICSIT), 1994)
    The Longest (s-t)-path Problem, a known NP-complete set, is shown to admit a linear time solution when the instances of the problem are restricted to partial k-trees. This class of graphs is defined and some of the properties ...
  • Kritzinger, Pieter S. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Current scientific and trade literature are flooded with information about local area networks. Details about physical media and their properties, versions of media access methods confusingly called protocols, variations ...
  • Misra, J (South African Computer Society (SAICSIT), 1998)
    This paper presents a short introduction to the UNITY logic, a fragment of linear temporal logic. The logic was designed to specify safety and progress properties of reactive systems. A version of the UNITY ...
  • Labuschagne, W.A.; Van der Westhuizen, PL (South African Computer Society (SAICSIT), 1992)
    The logician who encounters logic programming expects it to involve 'using predicate logic as a programming language'. He is soon disillusioned. He discovers that it really means 'programming in PROLOG', which in tum seems ...
  • Berezner, SA; Krzesinski, AE (1995)
    Consider a circuit-switched network where several source switches are connected to a destination switch via a tandem switch. Circuit-switched networks traditionally employ a Blocked Calls Cleared ( BCC) admission rule: a ...
  • Machanick, Philip (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    There has been a proliferation of low-cost AI tools. Consideration is given as to how significant research may be conducted using these tools, in the light of experience of developing Al tools on large, expensive machines. ...
  • Diani, OA; Seipone, T (1996)
    A low-cost microcomputer-based online system has been developed for the basic In-patient Medical Records functions of a General Hospital. Its basic functions are: to access patient data, register and admit a patient, enter ...
  • Kourie, D.G.; van den Heever, WJ; Oosthuizen, GD (South African Computer Society (SAICSIT), 1992)
    This paper describes how a machine translation system, LEXICA, has been used and adapted to translate from African languages to English. Results with Tswana provide comprehensible translations that, although not necessarily ...
  • Langa, S (1998)
    The purpose of the research is to investigate the management aspects of client/server computing. The latter is seen as a prerequisite for better management of all aspects of client/server computing. Noting the fact that ...
  • Turton, Trevor (Computer Society of South Africa (on behalf of SAICSIT), 1979)
    A new approach is proposed for the management of operating system state data. Relational database concepts are suggested for the analysis and organization of this data, and a common central service routine is described ...

Search UnisaIR


Browse

My Account