Institutional Repository

Browsing South African Computer Journal (SACJ) by Title

Browsing South African Computer Journal (SACJ) by Title

Sort by: Order: Results:

  • Melton, A; Shenoi, S (South African Computer Society (SAICSIT), 1992)
    It is often the case that a major concern with databases is security. In this paper we introduce a new model for database security. The basic idea of this new model is that answers to queries are based on equivalent data ...
  • Yellen, RE; Sanford, CC (South African Computer Society (SAICSIT), 1995)
    The Singapore government's adoption of policies which has promulgated an infrastructure heavily reliant on information technology is used as a model to explain Singapore's remarkable economic growth. This model helps to ...
  • Oosthuysen, WH; McDonald, T (South African Computer Society (SAICSIT), 1995)
    Until some years ago, management of TCP/IP based products was done in a proprietary fashion. Many large companies build their own system-wide management facilities because of a lack of usable systems to manage heterogeneous ...
  • Hazelhurst, SE (South African Institute of Computer Scientists and Information Technologists, 1991)
    The dining philosophers problem and the evolving philosophers problems are abstractions of resource sharing problems in parallel and distributed systems. A Linda solution to the dining problem has already been shown; this ...
  • Mata-Montero, M; Ellis, JA (South African Computer Society (SAICSIT), 1994)
    The Longest (s-t)-path Problem, a known NP-complete set, is shown to admit a linear time solution when the instances of the problem are restricted to partial k-trees. This class of graphs is defined and some of the properties ...
  • Misra, J (South African Computer Society (SAICSIT), 1998)
    This paper presents a short introduction to the UNITY logic, a fragment of linear temporal logic. The logic was designed to specify safety and progress properties of reactive systems. A version of the UNITY ...
  • Labuschagne, W.A.; Van der Westhuizen, PL (South African Computer Society (SAICSIT), 1992)
    The logician who encounters logic programming expects it to involve 'using predicate logic as a programming language'. He is soon disillusioned. He discovers that it really means 'programming in PROLOG', which in tum seems ...
  • Kourie, D.G.; van den Heever, WJ; Oosthuizen, GD (South African Computer Society (SAICSIT), 1992)
    This paper describes how a machine translation system, LEXICA, has been used and adapted to translate from African languages to English. Results with Tswana provide comprehensible translations that, although not necessarily ...
  • Mcleod, G (South African Computer Society (SAICSIT), 1992)
    Organizations have used systems planning and development methodologies for some time now. Results are mixed, with some reporting substantial benefits, and others abandoning the process without achieving the desired benefits. ...
  • Bause, F; Kritzinger, P; Sczittnick, M (South African Computer Society (SAICSIT), 1994)
    The Distributed Queue Dual Bus (DQDB) protocol or IEEE 802.6 has been accepted as the international standard for Metropolitan Area Networks (MAN). This paper describes a combined MIG/I and Markov model for the steady state ...
  • Tredoux, G (South African Computer Society (SAICSIT), 1992)
    The mechanization in Higher Order Logic of a general- purpose operational semantics for programming languages is described. The mechanization allows the sound derivation of Dijkstra-style axiomatic semantics. A small ...
  • Berman, Sonia (South African Computer Society (SAICSIT), 1994)
    Since its emergence in the early eighties, persistence has become an important branch of Computer Science. Many persistent systems have now been developed and a wide variety of related issues have been well researched. Two ...
  • Crossman, T.D. (South African Institute of Computer Scientists and Information Technologists, 1991)
    This paper describes the inspection team process and explores its value to the application developer. The conclusion reached is that the technique does incur added development costs, but the whole process brings with it ...
  • Meumann, MD; Rennhackkamp, MH (South African Institute of Computer Scientists and Information Technologists, 1990)
    A user of a distributed database management system must be able to access data which is stored on a number of different sites, connected by a network, without being aware of the physical data distribution. The NRDNIX ...
  • Vosloo, I (South African Computer Society (SAICSIT), 1997)
    This communication gives an overview of the field of mobile agents as presented at various events held in conjunction with a recent international symposium in Germany. The nature of mobile agents and the key concepts ...
  • Goldblatt, R (South African Computer Society (SAICSIT), 1995)
    These lectures provide an introduction to modal logic and its use in formalising reasoning about the behaviour of computational processes. They begin with a general introduction to the syntax, semantics, and proof-theory ...
  • De Villiers, PJA (South African Computer Society (SAICSIT), 1992)
    A model checker automatically determines whether a model of a reactive system satisfies its specification. Temporal logic is used to specify the intended behaviour of a reactive system which is modelled as a transition ...
  • Brand, M; Wood, PT (South African Computer Society (SAICSIT), 1992)
    Unlike the relational model, there is no universally accepted object-oriented data model. This has led to systems being defined in an ad-hoc manner, with the resultant difficulty of determining exactly what features are ...
  • Brink, C; Rewitzky, I (th African Institute of Computer Scientists and Information Technologists, 1992)
    Dijkstra's weakest precondition semantics, as presented in textbook form by Gries, may be viewed as an equational algebra. The problem then is to find a reasonable (set-theoretic ) model of this algebra. This paper provides one.
  • Mende, J. (South African Institute of Computer Scientists and Information Technologists, 1990)
    In order to design and operate a complex computer based information system, one needs to partition its transformation process into modules of manageable size. The same process can be partitioned in many different ways, ...

Search UnisaIR


Browse

My Account