This is a digital archive of the official journal of the Computer Society of South Africa from 1979 until 1983 that was published in printed form only. Later issues of OI apeared under the name South African Computer Journal
Schach, Stephen R.(Computer Society of South Africa (on behalf of SAICSIT), 1982)
data structure and its computer implementation.
However, in the course of debugging a program written in a high-level language, the user is sometimes forced to
try to understand the low-level implementation of his data ...
Venter, BH(Computer Society of South Africa (on behalf of SAICSIT), 1989)
Computer Science is a relatively recent scientific
discipline. It has seen rapid growth and even more
rapid change. Not surprisingly there is constant
controversy among computer scientists about the
nature of the ...
Machanick, Philip(Computer Society of South Africa (on behalf of SAICSIT), 1989)
Appropriate technology refers to technology appropriate for use in less developed parts of the world, especially
the Third World; this paper raises some problems in adapting a definition of appropriate technology to ...
Kourie, D.G.(Computer Society of South Africa (on behalf of SAICSIT), 1989)
A proposal for defining abstractions and refinements is given in terms of three-valued logic applied to a
domain of discourse consisting of a property and an entity set. Definitions for several related concepts
flow ...
Finnie, G.R.(Computer Society of South Africa (on behalf of SAICSIT), 1989)
Expert system development environments based on current language constructs such as rules and frames have
been criticised for approaching the task of problem solving from too low a level of abstraction. This paper
describes ...
Atkinson, C.R.; Lay, P.M.Q.(Computer Society of South Africa (on behalf of SAICSIT), 1989)
17zis paper addresses the challenging question of the rigour of the systems analysis process. First of all it
discusses the nature of analysis, concluding that, contradictory to cu"ent opinion, it can best be described ...
De Kock, G de V(Computer Society of South Africa (on behalf of SAICSIT), 1988)
Norms to measure the success of surname matching algorithms for use in a South African Genealogical
Database are proposed. Surnames in the database can be grouped in equivalence classes.
These algorithms are taken from ...
Smith, T.H.C.(Computer Society of South Africa (on behalf of SAICSIT), 1988)
We propose an edge exchange algorithm/or finding a cheaper 1-matchingfrom a given ]-matching as well as a
heuristic algorithm/or constructing a relatively cheap ]-matching from the optimal solution of a relaxation of
the ...
Short, R.M.C.(Computer Society of South Africa (on behalf of SAICSIT), 1988)
Learning about the domain into which an information system will fit is an essential part of the system
development process.
In this paper it is argued that the first stage of the development process should be learning ...
Postma, Stef W.; Philips, N.C.K.(S W Postma and N C K Phillips (1988) The parallel conditional. Computer Society of South Africa (on behalf of SAICSIT), 1988)
The parallel conditional is a new but natural programming language construct. It is particularly suited to
evaluation on parallel maclunes and generalizes other well known conditionals.
McDonald, T(Computer Society of South Africa (on behalf of SAICSIT), 1988)
In contrast to other countries, South Africa has sadly lacked a computer network for researchers. This paper
starts with previous efforts to establish a national network for researchers and gives possible reasons for ...
Kourie, D.G.; Van den Heever, R.J.(Computer Society of South Africa (on behalf of SAICSIT), 1988)
Experiences and insights gained from implementing and using a Prolog trace generator for CSP
specifications are discussed. The use of Prolog as an implementation language is evaluated. The value of
trace generation as ...
Bruwer, P.J.S.(Computer Society of South Africa (on behalf of SAICSIT), 1988)
In a previous research project (Bruwer [ 1 J) a methodology to identify information system problems from a user
point of view, was presented. This methodology was also illustrated by means of empirical data collected ...
Anderssen, E.C.; Von Solms, S.H.(Computer Society of South Africa (on behalf of SAICSIT), 1988)
A polygon clipping algorithm is presented for the clipping of closed geographical areas such as dams or
forests, against a surrounding rectangular windowframe. The algorithm employs a line clipping procedure
which divides ...
Wagener, M.J.; De Kock, G de V(Computer Society of South Africa (on behalf of SAICSIT), 1988)
Verslag word gelewer oor 'n prestasiemeting van 'n stel letter-na-klank reels vir die omskakeling van
Afrikaanse teks na foneme. Die prestasie van die stel reels word getoets deur gebruik te maak van 'n
verteenwoordigende ...
Rennhackkamp, M.H.; Von Solms, S.H.(Computer Society of South Africa (on behalf of SAICSIT), 1988)
Numerous concurrency control methods have been proposed for distributed databases. Various crz·teria
are used to compare these methods. The comparisons range from qualitative overviews through quantitative
analyses to ...
Postma, Stef W.(Computer Society of South Africa (on behalf of SAICSIT), 1988)
Two topics are studied, related and generalised in this paper - the Knuth transform of an arbitrary tree to a
binary tree, and Pfaltz' s definition of a data structure as a graph with assignments. Trees are defined in ...
Orlowska, M.E.(Computer Society of South Africa (on behalf of SAICSIT), 1988)
We propose a mathematical model of a database with incomplete information, which we call the N-system.
Basically speaking, such a system stores information concerning properties of some objects. The information
may be ...
Mende, J.(Computer Society of South Africa (on behalf of SAICSIT), 1988)
In designing a computer-based information system one can partition the transformation process in many
alternative ways. To find the optimal partition, a designer needs explicit rules which predict the most
successful ...