Institutional Repository

Browsing SAICSIT Digital Archive by Title

Browsing SAICSIT Digital Archive by Title

Sort by: Order: Results:

  • Peleska, J; Siegel, M (South African Computer Society (SAICSIT), 1997)
    This article focuses on test automation for safety-critical reactive systems. In the first part of the paper we introduce a methodology for specification, design and verification of fault-tolerant systems allowing to ...
  • Unknown author (Computer Society of South Africa (on behalf of SAICSIT), 1979-06-01)
    See pdf for four abstracts.
  • Paijmans, H (South African Computer Society (SAICSIT), 1998)
    A number of methods for feature reduction and feature selection in text classification and information retrieval systems are compared. These include feature sets that are constructed by Latent Semantic Indexing, 'local ...
  • Radue, J. E. (Computer Society of South Africa (on behalf of SAICSIT), 1979)
    The benefits associated with text compression include more efficient use of peripheral devices. faster information transfer rates and, in some cases, improved sorting speeds through the use of shorter sort keys. However. ...
  • Brink, C (2000)
    This is a quite general survey talk in which I present some of the infrastructure, activities and scientific flavour of what has, for better or worse, come to be called "Theoretical Computer Science". I will try to relate ...
  • Van der Merwe, AJ; Labuschagne, WA (South African Computer Society (SAICSIT), 1997)
    In 1985 Smith introduced a new way of deriving fully normalized tables. His method was based on the use of a dependency list and a dependency diagram to produce fifth normal form directly. We introduce the use of end-line, ...
  • Van der Merwe, A; Labuschagne, W (1996)
    In the middle 80s Smith introduced a new way of deriving fully normalized tables: His method was based on the use of an dependency list and a dependency diagram to produce fifth normal form directly. We introduce the use ...
  • Scarrott, G.G. (Computer Society of South Africa (on behalf of SAICSIT), 1980)
    The era ofinformation engineering was initiated some thirty years' ago by the demonstration of the first stored program electronic computer. At that time there was intense innovative excitement among the pioneers which, ...
  • Mende, J. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    After identifying the processing functions required in a computer based information system, the designer needs to combine them into an optimal set of load units. Some "packaging" arrangements yield a better system ...
  • Mende, J (1987)
    After identifying the processing functions required in a computer based information system, the designer needs to combine them into an optimal se t of load un its. Some “packaging” arrangements yield a better system than ...
  • Machanick, Philip (Computer Society of South Africa (on behalf of SAICSIT), 1985)
    After a brief look at how the notion of the stored program is applied by programmers in the area of Artificial Intelligence (Al), we shall look at a specific Al tool: a production svstem. The discussion is at a ...
  • Harmse, R; Thomas, T (2001)
    The arrival of outcomes-based education (OBE) in South African means that we have to change the way in which we assess our learners. Coupled with this change comes a move to larger classes where individual assessment has ...
  • Mori, R (1987)
    The programming requirements of the Artificial Intelligence ( AI ) community have led to the creation of tools to aid the software development process. One such tool is the programming environment. ...
  • Kotze, P (1995)
    There are three major agents in a computer-based instruction (CBI) environment: the tutor, the tutoring system and the tutee. The emphasis of this paper is on the tutoring system which contains the instructional content ...
  • De Ridder, C; Pretorius, L; Barnard, A (2001)
    With the advent of the lnformation Age and global connectivity, the ethical use of Information and Communication Technologies (/CI) has become essential. As the drive towards the establishment of a so-called IT profession ...
  • Ludik, J; Cloete, I (South African Computer Society (SAICSIT), 1995)
    The typical approach taken by other researchers to address the defects of standard backpropagation is to investigate alternative methods for selecting initial parameter values, or for adjusting parameter values during BP ...
  • Webster, MR; Harley, RG; Levy, DC; Woodward, DR (1991)
    This paper describes a software development environment currently being built at the University of Natal that provides a powerful and easy to use engineering tool for the design, simulation and implementation of high ...
  • Postma, Stef W. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Two topics are studied, related and generalised in this paper - the Knuth transform of an arbitrary tree to a binary tree, and Pfaltz' s definition of a data structure as a graph with assignments. Trees are defined in ...
  • Watson, BW (1995)
    Compiler writing techniques have undergone a number of major revisions over the past forty years. The introduction of object-oriented design and implementation techniques promises to improve the quality of compilers, while ...
  • Lubinsky, D (1995)
    The ability to learn from observations and to modify our understanding of the world based on experience is an essential aspect of intelligent behavior. Machine learning has thus become an important sub-area of artificial ...

Search UnisaIR


Browse

My Account