SAICSIT Digital Archive: Recent submissions

  • Smuts, WB (South African Computer Society (SAICSIT), 1994)
    This article provides a survey of techniques which can be used to add authenticity to electronic documents and messages.
  • Buhler, D; Nusser, G; Gruhler, G; Kuchlin, W (South African Computer Society (SAICSIT), 1999)
    This paper describes the Java CAN API a portable and extensible application interface to arbitrary CANopen fieldbus devices. This API forms the basis for the implementation of JRCC (Java Remote CAN Control), a tool which ...
  • Blewett, CN; Erwin, GJ (South African Computer Society (SAICSIT), 1996)
    In this paper, we describe a prototype of an expert system software advisor for the deadlock treatment of a lock manager in a database system. The software advisor, called EAGLE (External Advisor for Granting Locks ...
  • Waldron, JT (South African Computer Society (SAICSIT), 2000)
    Dynamic quantitative measurements of Bytecode and Stack Frame Usage by Eiffel and Java Programs in the Java Virtual Machine are made. Two Eiffel programs are dynamically analysed while executing on the JVM, and the results ...
  • Tapamo, JR (South African Computer Society (SAICSIT), 2000)
    Region representation is very important in Graphics and Image Processing. This paper is concerned with a formalisation of image representation by quadtrees. Indeed an image here is a language over an alphabet of four ...
  • Sanders, ID; Watts, DC; Hall, AD (South African Computer Society (SAICSIT), 2000)
    Previous research has shown that the orthogonal axial line placement problem for orthogonal rectangles is NP-complete in general but also that there are restrictions of the problem for which polynomial time solutions can ...
  • Nieuwoudt, C; Botha, EC (South African Computer Society (SAICSIT), 2000)
    This paper evaluates the performance of a speech recognition system using acoustic models trained on multilingual data. The reason in our case for using data from more than one language is that there may not be enough ...
  • Machanick, P (South African Computer Society (SAICSIT), 2000)
    The RAMpage memory hierarchy is an alternative to the traditional division between cache and main memory: main memory is moved up a level and DRAM is used as a paging device. As the CPU-DRAM speed gap grows, it is expected ...
  • Cloete, E; Venter, LM (South African Computer Society (SAICSIT), 2000)
    In this paper, we address the time complexity problem associated with fractal image coding. In particular, we describe a new hybrid technique called Fractal Vector Quantization (FVQ), which takes advantage of the best ...
  • Clarke, MC (South African Computer Society (SAICSIT), 2000)
    In an earlier study co-ordinated by Weil and Rosen, university students in 23 countries were surveyed in order to compare their levels of technological sophistication and technophobia. The countries sampled did not include ...
  • Bouras, Z-E; Khammaci, T; Ghoul, S (South African Computer Society (SAICSIT), 2000)
    Program integration combines independent enhancements to some version of a software system into a new system that includes the enhancements and the old system. Current approaches use the slice concept. The latter is a ...
  • Abdulrab, H; Ngomo, M; Drissi-Talbi, A (South African Computer Society (SAICSIT), 2000)
    The aim of this paper is to introduce temporal processes and linear constraints on naturals for solving temporal discrete simulations problems. We first describe a new approach for solving such constraints, based on the ...
  • Waldron, JT; Horgan, J; Keogh, G (South African Computer Society (SAICSIT), 1999)
    The level of programming skill achieved by a method of learning introductory computer architecture with a strong emphasis on assembly language programming as part of a Graduate Diploma in Information Technology in the ...
  • Von Solms, R; Van de Haar, H (South African Computer Society (SAICSIT), 1999)
    To protect the information systems of an organization an appropriate set of security controls needs to be installed and managed properly. Many organizations that can afford it conduct either a risk analysis exercise ...
  • Viktor, HL (South African Computer Society (SAICSIT), 1999)
    A multi-agent learning system consists of two or more learners or learning agents that co-exist in a learning environment. The learners have the ability to learn together, thus utilizing one another's strengths and ...
  • Van Zijl, L; Van der Walt, APJ (South African Computer Society (SAICSIT), 1999)
    We prove that the shortest word accepted by an n-state intersection selective nondeterministic automaton with nonempty language can be of length O( e n log n).
  • Van den Bergh, F; Lalioti, V (South African Computer Society (SAICSIT), 1999)
    This paper presents a very fast software chroma keying algorithm, requiring at most five integer operations per pixel. An improvement of more than 300% in performance over HLS based algorithms was achieved. The algorithm ...
  • Turner, R; Lowry, G (South African Computer Society (SAICSIT), 1999)
    This paper is the first of a series of studies of a research program aimed at achieving a better fit between university study and professional practise of information systems. The paper reports the results of two surveys: ...
  • Trakulsuk, P; Avatchanakorn, V (South African Computer Society (SAICSIT), 1999)
    This paper presents a conceptual model of analyzing huge amount of information from a data warehouse into Multidimensional Database (MDDB) using multidimensional data (MDD)model. The major advantages of this model are: 1) ...
  • Torn, A; Andersson, T; Enholm, K (South African Computer Society (SAICSIT), 1999)
    A complexity metrics model for software is introduced. The model is defined as l( p )c( p ) = e( p ), where p is any piece of software, l( p ) its length, c( p ) an average type complexity measure independent of length, ...

Search UnisaIR


Browse

My Account