SAICSIT Digital Archive: Recent submissions

  • Du Plessis, A.L.; Bornman, C.H. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    A fonnal requirements specification language, the ELSIM language, is presented. The language uses conceptual models for modelling data processing, and control characteristics and behavior of real-time systems, and is ...
  • Crossman, T.D. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Changes in technology introduce new job responsibilities and demand new skills profiles from personnel involved in application software development. Inability to perfonn competently within these job responsibilities can ...
  • Bruwer, P.J.S. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    A key to the success of the information system function in organizations is a comprehensive, effective planning system. According to R.V. Head's[l] pyramid structure of an Information system managers are classified into ...
  • Bruwer, P.J.S.; Groenewald, J.J. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    The objective of this research report was to investigate some South African organizations who have been operating information centres (IC's) successfully for more than two years. As the success of the IC is strongly · ...
  • Unknown author (Computer Society of South Africa (on behalf of SAICSIT), 1987)
  • Byron-Moore, S.P. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Any distractions in the working environment can affect the quality and quantity of output. For example, noise may disturb a person's thought processes and lead to errors. In addition, the programmer is subject to other, ...
  • Sutcliffe, G; Melville, S (South African Computer Society (SAICSIT), 1996)
    In the process of resolution based Automatic Theorem Proving, problems expressed in First Order Form (FOF) are transformed by a clausifier to Clause Normal Form (CNF). This research examines and compares clausifiers. ...
  • Smith, DC (South African Computer Society (SAICSIT), 1996)
    The recent acceptance of South Africa as a world player and the government's reconstruction and development programme (RDP) have created new challenges and opportunities for business and universities. The Information Systems ...
  • Shewaram, T (South African Computer Society (SAICSIT), 1996)
    'Change' is a universal phenomenon that many take for granted. Without change, time has no meaning. Even people are essentially dynamic processes, we are constantly changing in multitudinous ways. In light of this, it is ...
  • Scott, TG; Hattingh, J.M.; Steyn, T (South African Computer Society (SAICSIT), 1996)
    The simplex method is one way of solving a linear programming problem (LP-problem). An A* search algorithm based on a certain evaluation function has been developed to obtain the shortest path to an optimal solution within ...
  • Renaud, K; Kotze, P (South African Computer Society (SAICSIT), 1996)
    In many applications today multiple pre-existing database systems are integrated into one multiple database system. There are various characteristics of these systems which distinguish them from other types of multiple ...
  • Koornhof, C (South African Computer Society (SAICSIT), 1996)
    The Homological transfer method is a very efficient research method which is based on similarities between manufacturing, financial, educational, informational and other productive processes. The existence of these ...
  • Donaldson, SR; Bause, F; Kritzinger, Pieter S. (South African Computer Society (SAICSIT), 1996)
    We consider the complexity of several property preserving Petri net transformations found in the literature. These transfor­mations were candidates for.inclusion in a software tool to peiform liveness and boundedness ...
  • Addison, TM; Hamersma, S (South African Computer Society (SAICSIT), 1996)
    CASE, or Computer Assisted Software Engineering, provides the potential for a future in which computer programs will be generated automatically from business rules, but many potential buyers have adopted a wait and see ...
  • Wagener, M.J. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Verslag word gelewer oor die ontwikkeling en implementering van 'n stel letter-na-klank reels vir die omskakeling van Afrikaanse teks na foneme. 'n Inleidende oorsig van rekenaar spraaksintese en 'n kort beskrywing van ...
  • Scheepers, C.F. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    A method is presented whereby the interior of boundary-defined regions on vector type devices may be shaded using regular line, cross-hatch and dot patterns. Different shades are realized by changing shading parameters ...
  • Mueller, C.S.M. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    A novel way of programming, which starts with specific details of a particular example and abstracts these details into generalised sets, is proposed. The whole program is constructed around the definition of these ...
  • Parker, DB (South African Computer Society (SAICSIT), 1996)
    It is reasoned that to preserve the three traditional elements of information security, confidentiality, integrity and availabil­ity, it is not sufficient to fully protect information. Three new elements are introduced: ...
  • Goosen, H.A.; Hoogendoorn, C.H.; Goosen (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Reliability is an important consideration in the design of computer systems. This is a result of the increasing complexity of computer systems and of the greater reliance placed on their continuous and correct operation. ...
  • Von Solms, SH (South African Computer Society (SAICSIT), 1996)
    This paper discusses a number of security protocols for the Internet and World Wide Web. The first two, SSL and SHTTP, provide general authentication, confidentiality and integrity facilities, while SEPP is a payment ...

Search UnisaIR


Browse

My Account