SAICSIT Digital Archive: Recent submissions

  • Finnie, G.R. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    This paper describes a study of changes in attitude toward computers exhibited by novice student users during a first course in business computing. Several dimensions of attitude were established by factor analysis. ...
  • Pangalos, G; Khair, M (South African Computer Society (SAICSIT), 1996)
    A database design methodology is presented in this paper which aims to improve the security of medical database systems. The proposed methodology is based on both the discretionary and the mandatory database security ...
  • Ehlers, E.M.; von Solms, S. H. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Random Context Structure Grammars are defined. The language generated by a Random Context Structure Grammar is a set of three-dimensional digital structures. A hierarchy of Random Context Grammars is discussed briefly. ...
  • Clayton, Peter G. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    This paper advocates hands-on training on microprogrammable hardware for Computer Science students, and suggests an appropriate microprogram development approach for this purpose. The particular tool discussed is ...
  • Muftic, S (South African Computer Society (SAICSIT), 1996)
    The paper describes the design details and implementation results of the completely integrated, functional and operational security system, suitable for open distributed environments. Functionality means that security ...
  • Hoffman, LJ (South African Computer Society (SAICSIT), 1996)
    Cryptology policy deals not only with various technological encryption methods but also with thorny political and adminis­trative problems. It is a challenge to address these in a timely and open manner. The problems arise ...
  • De Ru, WG; Eloff, JHP (South African Computer Society (SAICSIT), 1996)
    This paper presents a methodology for the reinforcement of password authentication with the use of typing biometrical mechanisms. Typing biometrics refers to the analysis of keystroke patterns, which is unique for each ...
  • Bruwer, P.J.S. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Some factors which may influence the attitude of the user toward a computerized system are investigated in this article. The research was done in South Africa involving the users of computer-based systems in two organizations. ...
  • Anderssen, E.C.; von Solms, S. H. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    A computer aided instruction facility is presented, in which the simulation of field battles introduces history students to the dynamic relationships between space and time in a historical perspective. Information on a ...
  • Van der Vegte, L.J. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    In this article a brief overview is given of specification techniques in general and in particular, specification techniques used for the specification of communication protocols. This discussion forms the background ...
  • Roos, Jan (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    ESTELLE is being developed by the International Standards Organisation (ISO), Technical Committee (TC) 97, Sub-committee (SC) 21, Working Group (WG) 1, Formal Definition Technique (FDT) Subgroup B to fulfil the need for ...
  • Podevyn, D. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    A knowledge engineering tool called GESS (General Expert System Shell) is presented which is used for building different types of expert systems. Knowledge representation is based on direct extensions of the idea of decision ...
  • Pirow, Peter Cluver (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    This paper describes the concept of computeracy as it applies to research workers and argues that research will be improved if the level of computeracy can be raised.
  • Levieux, Craig (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    The role of teachers in a University Computer Science course is examined. The case for education rather than training is put. It is argued that current methods of teaching are not as effective as they could be. A case ...
  • Kritzinger, Pieter S. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Current scientific and trade literature are flooded with information about local area networks. Details about physical media and their properties, versions of media access methods confusingly called protocols, variations ...
  • Hoogendoorn, C.H. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    The term "software engineering" has been in use for nearly 20 years since the so-called "software crisis" was identified in the late 1960's. However, it is only comparatively recently that courses in software engineering ...
  • Postma, Stef W. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    The Department of Computer Science of the Pietermaritzburg Campus of the University of Natal is one of the youngest departments in the country, although service courses to the Faculty of Commerce have been available ...
  • Finnie, G.R. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Learning to use a decision support system involves both formal and informal teaching as well as self-teaching. Many cases have been documented of unsuccesful implementation of DSS or MIS in organisations and identifying ...
  • Berman, Sonia (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    An information management system with a semantic data model interface is currently being developed at UCT. This system provides high-level, non-procedural access to information and enforces powerful integrity and security ...
  • Whittaker, L (South African Computer Society (SAICSIT), 1996)
    While much has been written describing the necessity for and effects of Business Process Reengineering (BPR), little research has been conducted into the evaluation of BPR projects. This paper describes the result of a ...

Search UnisaIR


Browse

My Account