Institutional Repository

Browsing SAICSIT Digital Archive by Title

Browsing SAICSIT Digital Archive by Title

Sort by: Order: Results:

  • Marsden, G; Jones, M (2001)
    Embedded interactive computer systems, such as those found in cellular handsets, can be hard to use. The combination of small form factor - limited input and output potential - and an increasing feature set, result in ...
  • Venter, IM; Blignaut, RJ (1995)
    The rapidly changing·end-user computing environment requires an informed recipient of information who can play an active role in the design of information systems to capture. retrieve and interpret data [6). We need our ...
  • Warren, P (South African Computer Society (SAICSIT), 1999)
    The paper proposes a framework for discussing methodologies for developing interactive computer systems. It uses this framework for a sample of systems and shows how certain insights about missing aspects of the methodologies ...
  • Philips, M.J.; Berman, Sonia (South African Institute of Computer Scientists and Information Technologists, 1991)
    The universal relation is a way of overcoming users' prime database access difficulty, namely navigation through database structures. As a result there is reduced user involvement with the underlying logical database ...
  • Shaw, V (South African Institute of Computer Scientists and Information Technologists, 1991)
    The UNINET Academic and Research Network is a collaborative project among Universities, Research Councils and the FRD for the development, implementation and promotion of an academic and research network of computers ...
  • Oosthuizen, GD (South African Institute of Computer Scientists and Information Technologists, 1990)
    Pattern recognition involves the matching of a given pattern against a collection of patterns in store in order to identify the given pattern as belonging to a particular class already known to the system or not. Similarly, ...
  • Smit, P.J. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Colour computer graphics covers a wide field of applications such as games, computer aided-design, image processing and digital terrain modelling. The traditional way of using colour in raster graphics systems, the RGB ...
  • Nash, JM; Gwilt, D; Ludwig, A; Shaw, K (2001)
    This research provides some qualitative insights into the prevalence and use of technologies to support decision-making in South Africa. The paper focuses on two hypotheses: firstly, that decision support technology is not ...
  • Braude, B; Walker, AJ (2000)
    This paper explores the use of the Internet to supply and support software products within a quality management system. The Software Engineering Applications Laboratory (SEAL) at the University of the Witwatersrand is in ...
  • Bruwer, P.J.S. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Some factors which may influence the attitude of the user toward a computerized system are investigated in this article. The research was done in South Africa involving the users of computer-based systems in two organizations. ...
  • Serutla, SL; Oosthuizen, GD (2000)
    Ease of retrieval is of crucial importance in case based reasoning (CBR). In fact, the performance of a CBR system depends on how such a system is able to retrieve relevant cases from memory and adapts them to suit new ...
  • O'Donovan, BC (South African Computer Society (SAICSIT), 1992)
    Designers of both computerized information systems and instructional systems are faced with a need to find more effective methods of identifying and supplying the information that the users of these systems require. Both ...
  • Bester, L; Du Preez, E (2000)
    In recent years individualized instruction and the use of computer technology to facilitate learning at all levels of education and training has received increased emphasis. The use of computers in education has been ...
  • De Villiers, D.P.; Von Solms, S.H. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    In this paper the Send/Receive and Take/Grant logical security models are formalised using results from formal language theory. By using the graph rewriting facilities of NLC-grammars, and by extending these facilities ...
  • Van Zijl, L; Mitton, D (1991)
    Statecharts were developed by Harel et al [10] to specify complex reactive systems. In this paper we report on our application of statecharts as a design and specification tool for an X-Windows based Graphical User ...
  • Van Zijl, L; Mitton, D (South African Institute of Computer Scientists and Information Technologists, 1992)
    Statecharts were developed by Harel et al [10] to specify complex reactive systems. In this paper we report on our application of statecharts as a design and specification tool for an X-Windows based Graphical User Interface ...
  • Roux, HN; De Villiers, PJA (1996)
    The implementation of protocols can be speed up by incorporating formally validated designs in documents that describe new protocols. Unfortunately, this seldom happens in practice. It is proposed that a formally validated ...
  • Venter, BH (1991)
    Most statically typed Algol-style languages were designed to conform with the view that a value belongs to one and only one type. The adoption of this view bought compiler simplicity at the ex­pense of language expressivity. ...
  • Schlingloff, B (South African Computer Society (SAICSIT), 1997)
    These tutorial notes contain an introduction to the logical theory and computational aspects of computer aided verification of finite state reactive systems with linear and branching temporal logic model checking. As a ...
  • Jablonski, J.; Dijkman, J.H. (Computer Society of South Africa (on behalf of SAICSIT), 1984)
    The design of a high speed graphics workstation 1s presented A spec1f1caly designed Graphics System Interface com bines standard computer peripherals to produce a soph1st1cated man machine workstation A review 1s given ...

Search UnisaIR


Browse

My Account