Institutional Repository

Browsing SAICSIT Digital Archive by Title

Browsing SAICSIT Digital Archive by Title

Sort by: Order: Results:

  • Smuts, W (South African Computer Society (SAICSIT), 1999)
    Most existing information security classification schemes use a 1-dimensional scale such as [top secret, secret, employee confidential, company confidential, restricted]. These classification schemes do not differentiate ...
  • Smuts, W (1998)
    Most existing information security classification schemes use a 1-dimensional scale such as [top secret, secret, employee confidential, company confidential, restricted]. These classification schemes do not differentiate ...
  • Machanick, Philip (South African Computer Society (SAICSIT), 1997)
    Experience in industry suggests that reuse does not happen without retraining, despite the fact that many experienced software engineers accept that reuse ought to be more efficient than coding from scratch. A possible ...
  • Unknown author (Computer Society of South Africa (on behalf of SAICSIT), 1987)
  • Bytheway, A; Hearne, G (1998)
    In considering the requirements of an academic infrastructure that might support computer science and information systems education in South Africa, it is easy to be driven solely by the opportunities that innovative ...
  • Van Niekerk, C (1998)
    This talk will cover the following areas of importance to this problem: • Problems that Academic Institutions are facing today. • How Computer Associates want to get involved. • Overview of the Technology we are ...
  • Botha, R; Eloff, J (2001)
    The eXtensible Markup Language {XML) are being upheld as having the potential to change the way business is conducted. This will be effected by changing the way in which information is shared. However, with the sharing of ...
  • Botha, RA (2000)
    This paper defines an electronic workflow environment as being conducive to the performance of business processes according to certain policies and practices in an electronic fashion. The workflow procedure will be facilitated ...
  • Greenwood, PH; Nash, PE (South African Computer Society (SAICSIT), 1992)
    The purchase cost of specialized subroutine libraries can be high, especially if they need to be duplicated on several hosts on a local area network. A remote library access system has been designed, and a prototype built, ...
  • Quilling, RD; Erwin, GJ; Petkova, O (South African Computer Society (SAICSIT), 1999)
    Changes following South Africa's first democratic election when Nelson Mandela was elected President, have stimulated reviews of many economic, political and social structures including those in national education. One of ...
  • Drevin, L (1998)
    l. Activities and purpose of WG 11.8 WG 11.8 is one of the workgroups of TCl 1. WG 11.8 came together on 2 September 1998 on a boat between Vienna and Budapest as part of the IFIP World Computer Congress (WCC '98) where ...
  • Bosua, R; Du Plessis, A.L (South African Institute of Computer Scientists and Information Technologists, 1991)
    Specification languages to be used in conjunction with Ada as the implementation language have been proposed in the literature. Simultaneously, methods for the development of real-time software systems have been introduced, ...
  • Bishop, JM (1987)
    This paper looks at ways of obtaining a distributed version of an Ada program. Since current approaches require a large investment in system software, we propose instead the use of an Adapter, which can be a manual methodology ...
  • Pirow, Peter (Computer Society of South Africa (on behalf of SAICSIT), 1984)
    In five years of watching students operate terminals I have observed that the response time of the terminal has much to do with the comfort of the user. I have also observed this phenomenon in the business environment. ...
  • Berman, Sonia (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    An automated database design tool called ADD has been developed at the University of Cape Town. This system obtains a requirements specification from a user and from this generates a relation scheme and a Codasyl schema. ...
  • Scott, TG; Hattingh, J.M.; Steyn, T (South African Computer Society (SAICSIT), 1996)
    The simplex method is one way of solving a linear programming problem (LP-problem). An A* search algorithm based on a certain evaluation function has been developed to obtain the shortest path to an optimal solution within ...
  • Messerschmidt, HJ; Robertson, J (2000)
    This paper outlines a new direct algebraic method for the factorization of integers. It shows how by using a mixed binary - decimal multiplication scheme the multiplication can be reconstructed from the product only. This ...
  • Roets, P. P. (Computer Society of South Africa (on behalf of SAICSIT), 1979)
    An algorithm is presented for sorting a random access file in place. The algorithm is unique in the sense that no auxiliary storage, apart from a number of buffers in the machine's high-speed memory, is required. In ...
  • Christensen, A. H. J. (A. H. J. Christensen (1979) An Algorithm for the Approximation of Surfaces and for the Packing of Volumes. Computer Society of South Africa (on behalf of SAICSIT), 1979)
    An algorithm is presented here that approximates a given swface A by a set of regular or semi-regular faces forming a polyhedron C. If the faces are all square, C assumes the aspect of a 'blocked' swface. It is also ...
  • Philips, N.C.K. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    This paper presents an axiomatic specification of a data type which is shown to be equivalent to the Vienna data structures. The advantage of this alternative approach is its obvious simplicity.

Search UnisaIR


Browse

My Account