Quaestiones Informaticae (QI): Recent submissions

  • Van der Poel, K.G.; Bryson, I.R. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    The principles of protection of private information have gradually been defined during the last decades. The US Privacy Act of 1974 regulates practices of the federal government. Two committees of the UK government ...
  • Bruwer, P.J.S.; Hattingh, J.M. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Computer technology has grown exponentially in the course of the past decade in terms of sophistication - not only with regard to hardware and networks, but also with regard to mainframe and micro-computer systems. ...
  • Mende, J. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Research has a utilitarian role of providing the knowledge needed by the designers of mankind's artefacts. In this context four distinct categories of knowledge are identifiable. 1. Laws of Nature describe inherent ...
  • Machanick, Philip (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    There has been a proliferation of low-cost AI tools. Consideration is given as to how significant research may be conducted using these tools, in the light of experience of developing Al tools on large, expensive machines. ...
  • Kourie, D.G. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    LOTOS (Language Of Temporal Ordering Specification) is employed to give a partial specification of a system to connect RJE devices across an X.25 network. The system's implementation has been described fully elsewhere ...
  • Carey, C.W.; Hattingh, C.; Kourie, D.G.; Van den Heever, R.J.; Verkroost, R.F. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    This paper describes the practical aspects of a protocol system implementation. The software for a BSC/X.25 Packet Assembler/Disassembler (PAD) was designed, developed and tested. The PAD was designed to support ...
  • Handley, C.C. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    The problem of finding all prime numbers less than some specified maximum is frequently set as an exercise to beginning programmers, particular students doing their first programming course at University. Several ...
  • Berman, Sonia (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    A persistent programming language PPL is currently being designed at the University of Cape Town. The language treats persistence (permanent storage) as an orthogonal property of data and is consistent in its treatment of ...
  • Aik-Koen, Heng (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    This paper suggests a method to minimize the roundoff errors of adding N positive nimbers. The idea of construction can be easily applied to a linear recurrence process.
  • Aik-Koen, Heng (Computer Society of South Africa (on behalf of SAICSIT), 1986)
  • Philips, N.C.K. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    This paper presents an axiomatic specification of a data type which is shown to be equivalent to the Vienna data structures. The advantage of this alternative approach is its obvious simplicity.
  • Mende, J. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    The success of a research project depends upon the inputs and outputs selected by the researcher, a poor choice entailing useless results or wasted efforts.To avoid this one might consider the following alternatives: t. ...
  • Finnie, G.R. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    This paper describes the structure of a simple nonprocedural financial modelling system designed to collect a variety of statistics on aspects of novice interaction with decision support systems. Some findings on the use ...
  • Dempster, Robert (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    The S(tack), E(nvironment), C(ontrol) and D(ump) machine was invented by Landin (1964) to perform the mechanical evaluation of symbolic expressions. The evaluation of an expression invariably involves the application of ...
  • Bishop, J.M. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    The programming skills taught in first year computer science courses are more difficult to assess than the skills in older science courses because of the very large numbers of students involved coupled with material ...
  • Sutcliffe, Geoff (Computer Society of South Africa (on behalf of SAICSIT), 1985)
    In general graph theorists have a limited knowledge of computers and computing, and are unaware of the possible variations of representation available, and in what circumstances which representation would be better. To ...
  • Short, R. (Computer Society of South Africa (on behalf of SAICSIT), 1985)
    Formalisms comprise the essential bricks and mortar that we need in order to construct information systems. Not surprisingly therefore the invention and refinement of formalisms has formed and continues to form a ...
  • Machanick, Philip (Computer Society of South Africa (on behalf of SAICSIT), 1985)
    After a brief look at how the notion of the stored program is applied by programmers in the area of Artificial Intelligence (Al), we shall look at a specific Al tool: a production svstem. The discussion is at a ...
  • MacGregor, K.J. (Computer Society of South Africa (on behalf of SAICSIT), 1985)
    The discipline of Computer Science has been established for almost twenty years. In SOUTH AFRICA, Computer Science Departments have been in existence for fifteen years, and producing graduates for twelve, however, the ...
  • Hirsch, Michael; Schach, Stephen R.; Van Biljon, Willem R. (Computer Society of South Africa (on behalf of SAICSIT), 1985)
    Two approaches to high-level debugging systems for Pascal are compared, namely the use of a debugging precompiler as against a debugging interpreter. A description is given of a high-level Pascal debugging interpreter ...

Search UnisaIR


Browse

My Account