Institutional Repository

Browsing SAICSIT Digital Archive by Title

Browsing SAICSIT Digital Archive by Title

Sort by: Order: Results:

  • Ehlers, E.M.; von Solms, S. H. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Random Context Structure Grammars are defined. The language generated by a Random Context Structure Grammar is a set of three-dimensional digital structures. A hierarchy of Random Context Grammars is discussed briefly. ...
  • Ntlatlapa, N (1995)
    Symmetric positive definite matrices appear in most methods for Unconstrained Optimization. The method widely adopted for factoring these matrices is Cholesky Factorization. Furthermore, in Quassi-Newton methods for ...
  • Bruwer, P.J.S. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    In a previous research project (Bruwer [ 1 J) a methodology to identify information system problems from a user point of view, was presented. This methodology was also illustrated by means of empirical data collected ...
  • Sanders, I; Lubinsky, D; Sears, M (2000)
    Guarding and covering problems have great importance in Computational Geometry. In this paper the notion of a ray guard, a guard that can only 'see' along a single ray, is introduced. The problem of siting the fewest ...
  • Considine, TN (1996)
    The Real-time Control System Model is a system design methodology which provides robust systems based on Object technology. The paper will detail the components of the model including the control layers and the time-based ...
  • Burford, DJ; Blake, EH (2001)
    Facial expressions form an important part of human to human communication. In order to exploit the fall potential of computer networks and the Internet for communication and interaction, provision should be made for conveying ...
  • Heher, A. D. (Computer Society of South Africa (on behalf of SAICSIT), 1979)
    This paper is concerned with the problems of interactive computing when multiple real-time tasks are involved. The interactive facilities which can be provided are described and some of the important software engineering ...
  • Kew, SJ; Dwolatzky, B (2001)
    "OPC" is an important new specification designed to solve interoperability problems in the process control environment. It is based on Microsoft's Component Object Model (COM). The paper surveys and describes the OPC ...
  • Blackburn, P; Jaspars, J; De Rijke, M (South African Computer Society (SAICSIT), 1997)
    The purpose of these notes is two fold: (i) to give a reasonably self-contained introduction to a particular approach to theory change, known as the Alchourron-Gardenfors-Makinson (AGM) approach, and to discuss some of the ...
  • Vahed, A (South African Computer Society (SAICSIT), 1995)
    The associative network presents a practical and efficient means for the storage and retrieval of data. Although the recall abilities of single-layer associative memories have been well researched [3], little investigation ...
  • Vahed, A (1995)
    The associative network presents a practical and efficient means for the storage and retrieval of data. Although the recall abilities of single-layer associative memories have been well researched[3], little investigation ...
  • Turner, R; Lowry, G (South African Computer Society (SAICSIT), 1999)
    This paper is the first of a series of studies of a research program aimed at achieving a better fit between university study and professional practise of information systems. The paper reports the results of two surveys: ...
  • Renaud, K; Kotze, P (South African Computer Society (SAICSIT), 1997)
    In many applications today multiple pre-existing database systems are integrated into a single multiple database system called a multi­database system. One of the biggest problems for transaction management in a multidatabase ...
  • Tcheeko, L (South African Computer Society (SAICSIT), 1998)
    The pedagogical assessment of a tutoring system relies upon a proof of convergence: for such a tutor the correction of student mistakes must not forever delay the teaching process. Such a tutor must provide uniform diagnosis ...
  • Cloete, E; Venter, LM (1998)
    In this paper we address the time complexity problem associated with fractal image coding. In particular, we describe a new hybrid technique called Fractal Vector Quantization coding (FVQ), which takes advantage of the ...
  • Dhevcharran, N; Steenkamp, AL; Ram, V (1996)
    The increasing complexity of large process control systems impedes efforts to construct, co-ordinate and monitor these systems effectively. The object oriented paradigm and associated mechanisms greatly assist in software ...
  • Morgan, C (South African Computer Society (SAICSIT), 1995)
    The refinement calculus, based on weakest preconditions, elaborates imperative program developments as a series of steps linked by a mathematical refinement relation. Specifications and executable code are regarded equally ...
  • Venter, BH (Computer Society of South Africa (on behalf of SAICSIT), 1989)
    Computer Science is a relatively recent scientific discipline. It has seen rapid growth and even more rapid change. Not surprisingly there is constant controversy among computer scientists about the nature of the ...
  • De Waal, DA; Hattingh, GN (1998)
    Given some first-order theory, a formula (also called a conjecture) may or may not be a theorem of some theory. A theorem prover attempting to prove that the given formula is a theorem may terminate, proving that the formula ...
  • De Ru, WG; Eloff, JHP (South African Computer Society (SAICSIT), 1996)
    This paper presents a methodology for the reinforcement of password authentication with the use of typing biometrical mechanisms. Typing biometrics refers to the analysis of keystroke patterns, which is unique for each ...

Search UnisaIR


Browse

My Account