Institutional Repository

Browsing SAICSIT Digital Archive by Type "Article"

Browsing SAICSIT Digital Archive by Type "Article"

Sort by: Order: Results:

  • Smuts, W (South African Computer Society (SAICSIT), 1999)
    Most existing information security classification schemes use a 1-dimensional scale such as [top secret, secret, employee confidential, company confidential, restricted]. These classification schemes do not differentiate ...
  • Machanick, Philip (South African Computer Society (SAICSIT), 1997)
    Experience in industry suggests that reuse does not happen without retraining, despite the fact that many experienced software engineers accept that reuse ought to be more efficient than coding from scratch. A possible ...
  • Unknown author (Computer Society of South Africa (on behalf of SAICSIT), 1987)
  • Greenwood, PH; Nash, PE (South African Computer Society (SAICSIT), 1992)
    The purchase cost of specialized subroutine libraries can be high, especially if they need to be duplicated on several hosts on a local area network. A remote library access system has been designed, and a prototype built, ...
  • Quilling, RD; Erwin, GJ; Petkova, O (South African Computer Society (SAICSIT), 1999)
    Changes following South Africa's first democratic election when Nelson Mandela was elected President, have stimulated reviews of many economic, political and social structures including those in national education. One of ...
  • Bosua, R; Du Plessis, A.L (South African Institute of Computer Scientists and Information Technologists, 1991)
    Specification languages to be used in conjunction with Ada as the implementation language have been proposed in the literature. Simultaneously, methods for the development of real-time software systems have been introduced, ...
  • Pirow, Peter (Computer Society of South Africa (on behalf of SAICSIT), 1984)
    In five years of watching students operate terminals I have observed that the response time of the terminal has much to do with the comfort of the user. I have also observed this phenomenon in the business environment. ...
  • Berman, Sonia (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    An automated database design tool called ADD has been developed at the University of Cape Town. This system obtains a requirements specification from a user and from this generates a relation scheme and a Codasyl schema. ...
  • Scott, TG; Hattingh, J.M.; Steyn, T (South African Computer Society (SAICSIT), 1996)
    The simplex method is one way of solving a linear programming problem (LP-problem). An A* search algorithm based on a certain evaluation function has been developed to obtain the shortest path to an optimal solution within ...
  • Roets, P. P. (Computer Society of South Africa (on behalf of SAICSIT), 1979)
    An algorithm is presented for sorting a random access file in place. The algorithm is unique in the sense that no auxiliary storage, apart from a number of buffers in the machine's high-speed memory, is required. In ...
  • Christensen, A. H. J. (A. H. J. Christensen (1979) An Algorithm for the Approximation of Surfaces and for the Packing of Volumes. Computer Society of South Africa (on behalf of SAICSIT), 1979)
    An algorithm is presented here that approximates a given swface A by a set of regular or semi-regular faces forming a polyhedron C. If the faces are all square, C assumes the aspect of a 'blocked' swface. It is also ...
  • Philips, N.C.K. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    This paper presents an axiomatic specification of a data type which is shown to be equivalent to the Vienna data structures. The advantage of this alternative approach is its obvious simplicity.
  • Melville, SW (South African Institute of Computer Scientists and Information Technologists, 1992)
    Communications networks with sporadically available links pose particular problems in terms of delay analysis. This paper presents an approach to determining the effectiveness of various routing strategies when applied to ...
  • Erlank, S; Pelteret, D; Meskin, M (South African Institute of Computer Scientists and Information Technologists, 1991)
    The systems development process is commonly described in terms of a System Development Life Cycle (SDLC). There is a wide range of tools and techniques available to the system developer, and these are typically used for ...
  • Mann, R.J. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    A basic description of the facilities of the computer modelling package, AUTO-CONFIGURATER, is presented together with detailed procedures to calculate the required input parameters from monitor statistics. Techniques to ...
  • van der Poel, E; Cloete, I (South African Computer Society (SAICSIT), 1992)
    In Artificial Neural Network (ANN) simulation it is usually necessary to examine the behaviour of the ANN and detect problems if they occur. However, due to the large volume and high dimensionality of data generated during ...
  • Petkova, O; Roode, JD (South African Computer Society (SAICSIT), 1999)
    The goal of this paper is to present the practical implementation of a novel framework for evaluation of the factors affect­ing software development productivity, combining elements from several systems approaches and ...
  • Atkinson, C.R.; Lay, P.M.Q. (Computer Society of South Africa (on behalf of SAICSIT), 1989)
    17zis paper addresses the challenging question of the rigour of the systems analysis process. First of all it discusses the nature of analysis, concluding that, contradictory to cu"ent opinion, it can best be described ...
  • McIver, AK; Morgan, C; Sanders, JW (South African Computer Society (SAICSIT), 1997)
    This paper abridges lecture notes from WOFACS 96. It provides semantic models for a variety of programming and development formalisms, showing how different models for the same formalism are related by Galois connections. ...
  • Pretorius, L (South African Computer Society (SAICSIT), 1998)
    We introduce a number of typed lambda calculi, show how type theory may be used as basis for a proof assistant, and illustrate this with the Coq proof assistant.

Search UnisaIR


Browse

My Account