SAICSIT Digital Archive: Recent submissions

  • Petkov, D (South African Computer Society (SAICSIT), 1996)
    This paper suggests an approach for the selection of microcomputer equipment in a decentralised environment. It is based on a modification of the procedure of the Analytic Hierarchy Process (AHP) by T. Saaty. The structuring ...
  • Machanick, Philip (South African Computer Society (SAICSIT), 1996)
    Object-oriented techniques are shown to hold promise for addressing the growing speed gap between memory and processors on shared-memory multiprocessors. However, reducing cache misses can be at the expense of more misses ...
  • De Jager, N; Roos, J (South African Computer Society (SAICSIT), 1996)
    This article discusses various issues around the Transmission Convergence (TC) sublayer in the physical layer of ATM. A brief introduction is given to the layered approach and functionality of the ATM physical layer. This ...
  • Froneman, L; Roode, JD (South African Computer Society (SAICSIT), 1996)
    Many curriculum designs are based purely on what educators think it should be, reflecting their own experiences or idiosyn­crasies, with little reference to the needs of the information systems field. A number of studies ...
  • Bishop, JM (South African Computer Society (SAICSIT), 1996)
    The survey of staff and student numbers done in 1992 provided the first country-wide picture of computing departments in South Africa. This report presents the picture three years later, from data collected in 1995. It ...
  • Parkinson, E; Warren, PR (South African Computer Society (SAICSIT), 1995)
    Many scheduling problems can be modelled as graph colouring problems. This paper gives a survey of heuristic algorithms used to colour graphs by describing a number of such algorithms found in the literature using an ...
  • Vahed, A (South African Computer Society (SAICSIT), 1995)
    The associative network presents a practical and efficient means for the storage and retrieval of data. Although the recall abilities of single-layer associative memories have been well researched [3], little investigation ...
  • Tromp, PJ; Roode, JD (South African Computer Society (SAICSIT), 1995)
    In this paper the collaborative approach to management is examined and, in particular, how this approach could benefit from the right technological support. Collaborative management focuses on the joint performance of ...
  • Paijmans, H (South African Computer Society (SAICSIT), 1995)
    An overview is given of popular term-weighting schemes as used in Information Retrieval. The question is raised whether the word frequency based t f.idf weights may be used as a yardstick to compare schemes that are not ...
  • Oosthuysen, WH; McDonald, T (South African Computer Society (SAICSIT), 1995)
    Until some years ago, management of TCP/IP based products was done in a proprietary fashion. Many large companies build their own system-wide management facilities because of a lack of usable systems to manage heterogeneous ...
  • Messerschmidt, HJ (South African Computer Society (SAICSIT), 1995)
    There is an increasing amount of computer fraud in South Africa. A recent court case shows that Information Systems can actually assist criminals. The paper shows where the major loopholes are and suggests ways of improving ...
  • Ludik, J; Cloete, I (South African Computer Society (SAICSIT), 1995)
    The typical approach taken by other researchers to address the defects of standard backpropagation is to investigate alternative methods for selecting initial parameter values, or for adjusting parameter values during BP ...
  • Berman, Sonia; Walker, L. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    A high-level language for accessing a relational database is being developed at UCT. The system, known as HAL (High-level Access Language), provides complete data independence as users view the database in terms of ...
  • Kisimov, V; Da Silva, I (South African Computer Society (SAICSIT), 1995)
    Over a period of a few hours, every computer participating in a distributed system has many unused resources. If these resources can be combined, a large amount of computational power can be generated. This paper offers ...
  • Halland, KJ; Labuschagne, W.A. (South African Computer Society (SAICSIT), 1995)
    The relationships between the best-known forms of circumscription are elucidated with the aid of an hypothetical ancestor, which we choose to call naive circumscription.
  • Ridler, P.F. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Various ways of using random access memory to emulate a magnetic disc storage system are described and the advantages and disadvantages are enumerated. An algorithm for making use of a solid state disc is given which avoids ...
  • Morgan, C (South African Computer Society (SAICSIT), 1995)
    The refinement calculus, based on weakest preconditions, elaborates imperative program developments as a series of steps linked by a mathematical refinement relation. Specifications and executable code are regarded equally ...
  • Byron-Moore, S.P. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Trends in operating systems are examined in the light of advances in computer hardware. Consideration is given to the desirability of a good, up-to-date single-user operating system. The specification and implementation ...
  • Van der Poel, K.G.; Bryson, I.R. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    The principles of protection of private information have gradually been defined during the last decades. The US Privacy Act of 1974 regulates practices of the federal government. Two committees of the UK government ...
  • Bruwer, P.J.S.; Hattingh, J.M. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Computer technology has grown exponentially in the course of the past decade in terms of sophistication - not only with regard to hardware and networks, but also with regard to mainframe and micro-computer systems. ...

Search UnisaIR


Browse

My Account