Institutional Repository

Browsing South African Computer Journal (SACJ) by Title

Browsing South African Computer Journal (SACJ) by Title

Sort by: Order: Results:

  • Couger, JD; Smith, DC (South African Institute of Computer Scientists and Information Technologists, 1992)
    The South African computer industry suffers from a shortage of skilled staff. Therefore, an important management issue is to maximise the productivity and motivation of Information Systems (IS ) staff in their current and ...
  • Couger, JD; Smith, DC (South African Computer Society (SAICSIT), 1992)
    The South African computer industry suffers from a shortage of skilled staff. To maximise the productivity and motivation of Information Systems (IS) staff in their current and future jobs is therefore an important management ...
  • Whittaker, L (South African Computer Society (SAICSIT), 1996)
    While much has been written describing the necessity for and effects of Business Process Reengineering (BPR), little research has been conducted into the evaluation of BPR projects. This paper describes the result of a ...
  • De Kock, G de V; Du Plessis, C (South African Computer Society (SAICSIT), 1994)
    The problem investigated in this study is, given a surname, determine similar surnames in a genealogical database. There exist a number of algorithms to determine the similarity between two strings based on their common ...
  • Smith, DC; Newton, S; Riley, MJ (South African Computer Society (SAICSIT), 1992)
    Information Systems (IS), although a relatively new academic discipline, is receiving considerable attention in tertiary institutions in South Africa. Despite this, there is currently no standard curricula for IS graduates ...
  • Ram, V (South African Computer Society (SAICSIT), 1993)
    The use of Expert Systems technology in management decision making domains is increasing rapidly as business environments worldwide grow more turbulent and as the cost of development tools decrease. Research effort in this ...
  • Du Plessis, CJ; Rip, SDE; Lay, PMQ (South African Institute of Computer Scientists and Information Technologists, 1990)
    Communication between IS staff and users during requirement specification is unavoidable. However, little research has been conducted to explore the relationship between effective group communication and the quality of the ...
  • Viktor, HL; Rennhackkamp, MH (South African Institute of Computer Scientists and Information Technologists, 1992)
    The most frequently used local database system failure recovery techniques are logging , shadowing and differential files. In a distributed database these local system failure recovery techniques may be·utilized for recovery ...
  • Halland, KJ; Labuschagne, W.A. (South African Computer Society (SAICSIT), 1995)
    The relationships between the best-known forms of circumscription are elucidated with the aid of an hypothetical ancestor, which we choose to call naive circumscription.
  • Hoffman, PK; Smit, G de V (South African Institute of Computer Scientists and Information Technologists, 1990)
    The DISTRIX operating system is a multiprocessor UNIX-like distributed operating system. It consists of a number of satellite processors connected to central servers. The system is based on the MINIX operating system, ...
  • Wood, PT (South African Institute of Computer Scientists and Information Technologists, 1990)
    Increasing the expressive power of relational query languages by providing some form of recursion is currently a topic of much research. For many recursive queries in relational databases, a relation can be represented ...
  • Postma, SW; McGee, A (South African Institute of Computer Scientists and Information Technologists, 1990)
    The οr.1-calculus is presented as an extension to the standard 1-calculus, and a r.1-term called the strong conditional is discussed. The strong conditional is shown to be non-monotomic, and an extension is made to the ...
  • Patsouris, PA; Korostenski, M; Kissimov, V (South African Computer Society (SAICSIT), 1999)
    We introduce FMOB: a formal model for Objectbases. The term "Objectbase" represents better the widely used "object­ oriented database". FMOB consists of ( 1) objects (classes and their instances) with extended encapsulation ...
  • Holt, A (South African Computer Society (SAICSIT), 1999)
    The industrial take-up of formal verification techniques remains limited. Allowing specifications to be expressed in natural language (perhaps augmented with diagrams) offers the prospect of increasing the usability of ...
  • Mende, J. (South African Institute of Computer Scientists and Information Technologists, 1990)
    Both in the advancement of Information Systems theory and in practical development projects, significant errors of omission can occur unless one is aware of all aspects of the concept "information system success". At least ...
  • Cloete, E; Venter, LM (South African Computer Society (SAICSIT), 1998)
    Conventional image compression strategies present a number of uncomfortable limitations. Many of the impediments can be overcome by Fractal Image Compression (FIC). FIC is rooted strongly in mathematics. In comparison to ...
  • Krzesinski, T (South African Computer Society (SAICSIT), 1994)
    The foundation for Research Development (FRD) is evaluating the need for a new Special Programme in Computer Science. An initial meeting was held in August 1993 at the FRD to discuss the new programme. A Steering Committee ...
  • Pendock, N (South African Computer Society (SAICSIT), 1992)
    The routine use of satellite remotely sensed imagery for a variety of applications is twenty years old this year. In addition to these digital photographs of the earth's surface, subterranean views are made using gravity, ...
  • Von Solms, R; Van de Haar, H (South African Computer Society (SAICSIT), 1999)
    To protect the information systems of an organization an appropriate set of security controls needs to be installed and managed properly. Many organizations that can afford it conduct either a risk analysis exercise ...
  • Muftic, S (South African Computer Society (SAICSIT), 1996)
    The paper describes the design details and implementation results of the completely integrated, functional and operational security system, suitable for open distributed environments. Functionality means that security ...

Search UnisaIR


Browse

My Account