Institutional Repository

Browsing South African Computer Journal (SACJ) by Title

Browsing South African Computer Journal (SACJ) by Title

Sort by: Order: Results:

  • Mcleod, G (South African Computer Society (SAICSIT), 1992)
    Organizations have used systems planning and development methodologies for some time now. Results are mixed, with some reporting substantial benefits, and others abandoning the process without achieving the desired benefits. ...
  • Bause, F; Kritzinger, P; Sczittnick, M (South African Computer Society (SAICSIT), 1994)
    The Distributed Queue Dual Bus (DQDB) protocol or IEEE 802.6 has been accepted as the international standard for Metropolitan Area Networks (MAN). This paper describes a combined MIG/I and Markov model for the steady state ...
  • Tredoux, G (South African Computer Society (SAICSIT), 1992)
    The mechanization in Higher Order Logic of a general- purpose operational semantics for programming languages is described. The mechanization allows the sound derivation of Dijkstra-style axiomatic semantics. A small ...
  • Berman, Sonia (South African Computer Society (SAICSIT), 1994)
    Since its emergence in the early eighties, persistence has become an important branch of Computer Science. Many persistent systems have now been developed and a wide variety of related issues have been well researched. Two ...
  • Crossman, T.D. (South African Institute of Computer Scientists and Information Technologists, 1991)
    This paper describes the inspection team process and explores its value to the application developer. The conclusion reached is that the technique does incur added development costs, but the whole process brings with it ...
  • Meumann, MD; Rennhackkamp, MH (South African Institute of Computer Scientists and Information Technologists, 1990)
    A user of a distributed database management system must be able to access data which is stored on a number of different sites, connected by a network, without being aware of the physical data distribution. The NRDNIX ...
  • Vosloo, I (South African Computer Society (SAICSIT), 1997)
    This communication gives an overview of the field of mobile agents as presented at various events held in conjunction with a recent international symposium in Germany. The nature of mobile agents and the key concepts ...
  • Goldblatt, R (South African Computer Society (SAICSIT), 1995)
    These lectures provide an introduction to modal logic and its use in formalising reasoning about the behaviour of computational processes. They begin with a general introduction to the syntax, semantics, and proof-theory ...
  • De Villiers, PJA (South African Computer Society (SAICSIT), 1992)
    A model checker automatically determines whether a model of a reactive system satisfies its specification. Temporal logic is used to specify the intended behaviour of a reactive system which is modelled as a transition ...
  • Brand, M; Wood, PT (South African Computer Society (SAICSIT), 1992)
    Unlike the relational model, there is no universally accepted object-oriented data model. This has led to systems being defined in an ad-hoc manner, with the resultant difficulty of determining exactly what features are ...
  • Brink, C; Rewitzky, I (th African Institute of Computer Scientists and Information Technologists, 1992)
    Dijkstra's weakest precondition semantics, as presented in textbook form by Gries, may be viewed as an equational algebra. The problem then is to find a reasonable (set-theoretic ) model of this algebra. This paper provides one.
  • Mende, J. (South African Institute of Computer Scientists and Information Technologists, 1990)
    In order to design and operate a complex computer based information system, one needs to partition its transformation process into modules of manageable size. The same process can be partitioned in many different ways, ...
  • Nieuwoudt, C; Botha, EC (South African Computer Society (SAICSIT), 2000)
    This paper evaluates the performance of a speech recognition system using acoustic models trained on multilingual data. The reason in our case for using data from more than one language is that there may not be enough ...
  • Shear, S (South African Computer Society (SAICSIT), 1999)
    The Internet (World-Wide-Web) has opened a whole new dimension into advertising, and there is little doubt that audio and video- the basic components of conventional advertising, will play a role there as well. However, ...
  • Kriel, CF; Krzesinski, AE (South African Computer Society (SAICSIT), 1992)
    This paper defines the the Multiserver Station With Dynamic Concurrency Constraints. The MSDCC station consists of B parallel identical exponential servers. The customers requesting service at the MSDCC station belong to ...
  • Foss, RJ; Rehmet, GM; Watkins, RC (South African Computer Society (SAICSIT), 1992)
    This paper describes the development of a memory resident version of the Xinu operating system for the IBM PC range of computers. The operating system co-resides with the MS-DOS operating system. The need for the operating ...
  • Viktor, HL; Rennhackkamp, MH (South African Computer Society (SAICSIT), 1992)
    The technology of distributed databases is based on two other technologies which have developed a solid foundation: computer networks and centralized databases. A distributed database designer should therefore address ...
  • Carson, DI; Oellermann, OR (South African Computer Society (SAICSIT), 1992)
    In this paper we discuss the problem of finding an upper bound on the genus of a graph. This problem has applications to circuit layouts. An electronic circuit may be modelled by a graph. By punching holes into the circuit ...
  • Bouras, Z-E; Khammaci, T; Ghoul, S (South African Computer Society (SAICSIT), 2000)
    Program integration combines independent enhancements to some version of a software system into a new system that includes the enhancements and the old system. Current approaches use the slice concept. The latter is a ...
  • Parker, DB (South African Computer Society (SAICSIT), 1996)
    It is reasoned that to preserve the three traditional elements of information security, confidentiality, integrity and availabil­ity, it is not sufficient to fully protect information. Three new elements are introduced: ...

Search UnisaIR


Browse

My Account