Quaestiones Informaticae (QI): Recent submissions

  • Unknown author (2019)
  • Schach, Stephen R. (Computer Society of South Africa (on behalf of SAICSIT), 1982)
    data structure and its computer implementation. However, in the course of debugging a program written in a high-level language, the user is sometimes forced to try to understand the low-level implementation of his data ...
  • Venter, BH (Computer Society of South Africa (on behalf of SAICSIT), 1989)
    Computer Science is a relatively recent scientific discipline. It has seen rapid growth and even more rapid change. Not surprisingly there is constant controversy among computer scientists about the nature of the ...
  • Machanick, Philip (Computer Society of South Africa (on behalf of SAICSIT), 1989)
    Appropriate technology refers to technology appropriate for use in less developed parts of the world, especially the Third World; this paper raises some problems in adapting a definition of appropriate technology to ...
  • Kourie, D.G. (Computer Society of South Africa (on behalf of SAICSIT), 1989)
    A proposal for defining abstractions and refinements is given in terms of three-valued logic applied to a domain of discourse consisting of a property and an entity set. Definitions for several related concepts flow ...
  • Finnie, G.R. (Computer Society of South Africa (on behalf of SAICSIT), 1989)
    Expert system development environments based on current language constructs such as rules and frames have been criticised for approaching the task of problem solving from too low a level of abstraction. This paper describes ...
  • Atkinson, C.R.; Lay, P.M.Q. (Computer Society of South Africa (on behalf of SAICSIT), 1989)
    17zis paper addresses the challenging question of the rigour of the systems analysis process. First of all it discusses the nature of analysis, concluding that, contradictory to cu"ent opinion, it can best be described ...
  • De Kock, G de V (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Norms to measure the success of surname matching algorithms for use in a South African Genealogical Database are proposed. Surnames in the database can be grouped in equivalence classes. These algorithms are taken from ...
  • Smith, T.H.C. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    We propose an edge exchange algorithm/or finding a cheaper 1-matchingfrom a given ]-matching as well as a heuristic algorithm/or constructing a relatively cheap ]-matching from the optimal solution of a relaxation of the ...
  • Short, R.M.C. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Learning about the domain into which an information system will fit is an essential part of the system development process. In this paper it is argued that the first stage of the development process should be learning ...
  • Postma, Stef W.; Philips, N.C.K. (S W Postma and N C K Phillips (1988) The parallel conditional. Computer Society of South Africa (on behalf of SAICSIT), 1988)
    The parallel conditional is a new but natural programming language construct. It is particularly suited to evaluation on parallel maclunes and generalizes other well known conditionals.
  • McDonald, T (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    In contrast to other countries, South Africa has sadly lacked a computer network for researchers. This paper starts with previous efforts to establish a national network for researchers and gives possible reasons for ...
  • Kourie, D.G.; Van den Heever, R.J. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Experiences and insights gained from implementing and using a Prolog trace generator for CSP specifications are discussed. The use of Prolog as an implementation language is evaluated. The value of trace generation as ...
  • Bruwer, P.J.S. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    In a previous research project (Bruwer [ 1 J) a methodology to identify information system problems from a user point of view, was presented. This methodology was also illustrated by means of empirical data collected ...
  • Anderssen, E.C.; Von Solms, S.H. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    A polygon clipping algorithm is presented for the clipping of closed geographical areas such as dams or forests, against a surrounding rectangular windowframe. The algorithm employs a line clipping procedure which divides ...
  • Wagener, M.J.; De Kock, G de V (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Verslag word gelewer oor 'n prestasiemeting van 'n stel letter-na-klank reels vir die omskakeling van Afrikaanse teks na foneme. Die prestasie van die stel reels word getoets deur gebruik te maak van 'n verteenwoordigende ...
  • Rennhackkamp, M.H.; Von Solms, S.H. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Numerous concurrency control methods have been proposed for distributed databases. Various crz·teria are used to compare these methods. The comparisons range from qualitative overviews through quantitative analyses to ...
  • Postma, Stef W. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Two topics are studied, related and generalised in this paper - the Knuth transform of an arbitrary tree to a binary tree, and Pfaltz' s definition of a data structure as a graph with assignments. Trees are defined in ...
  • Orlowska, M.E. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    We propose a mathematical model of a database with incomplete information, which we call the N-system. Basically speaking, such a system stores information concerning properties of some objects. The information may be ...
  • Mende, J. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    In designing a computer-based information system one can partition the transformation process in many alternative ways. To find the optimal partition, a designer needs explicit rules which predict the most successful ...

Search UnisaIR


Browse

My Account