South African Computer Journal (SACJ): Recent submissions

  • Scott, TG; Hattingh, J.M.; Steyn, T (South African Computer Society (SAICSIT), 1996)
    The simplex method is one way of solving a linear programming problem (LP-problem). An A* search algorithm based on a certain evaluation function has been developed to obtain the shortest path to an optimal solution within ...
  • Renaud, K; Kotze, P (South African Computer Society (SAICSIT), 1996)
    In many applications today multiple pre-existing database systems are integrated into one multiple database system. There are various characteristics of these systems which distinguish them from other types of multiple ...
  • Koornhof, C (South African Computer Society (SAICSIT), 1996)
    The Homological transfer method is a very efficient research method which is based on similarities between manufacturing, financial, educational, informational and other productive processes. The existence of these ...
  • Donaldson, SR; Bause, F; Kritzinger, Pieter S. (South African Computer Society (SAICSIT), 1996)
    We consider the complexity of several property preserving Petri net transformations found in the literature. These transfor­mations were candidates for.inclusion in a software tool to peiform liveness and boundedness ...
  • Addison, TM; Hamersma, S (South African Computer Society (SAICSIT), 1996)
    CASE, or Computer Assisted Software Engineering, provides the potential for a future in which computer programs will be generated automatically from business rules, but many potential buyers have adopted a wait and see ...
  • Parker, DB (South African Computer Society (SAICSIT), 1996)
    It is reasoned that to preserve the three traditional elements of information security, confidentiality, integrity and availabil­ity, it is not sufficient to fully protect information. Three new elements are introduced: ...
  • Von Solms, SH (South African Computer Society (SAICSIT), 1996)
    This paper discusses a number of security protocols for the Internet and World Wide Web. The first two, SSL and SHTTP, provide general authentication, confidentiality and integrity facilities, while SEPP is a payment ...
  • Pangalos, G; Khair, M (South African Computer Society (SAICSIT), 1996)
    A database design methodology is presented in this paper which aims to improve the security of medical database systems. The proposed methodology is based on both the discretionary and the mandatory database security ...
  • Muftic, S (South African Computer Society (SAICSIT), 1996)
    The paper describes the design details and implementation results of the completely integrated, functional and operational security system, suitable for open distributed environments. Functionality means that security ...
  • Hoffman, LJ (South African Computer Society (SAICSIT), 1996)
    Cryptology policy deals not only with various technological encryption methods but also with thorny political and adminis­trative problems. It is a challenge to address these in a timely and open manner. The problems arise ...
  • De Ru, WG; Eloff, JHP (South African Computer Society (SAICSIT), 1996)
    This paper presents a methodology for the reinforcement of password authentication with the use of typing biometrical mechanisms. Typing biometrics refers to the analysis of keystroke patterns, which is unique for each ...
  • Whittaker, L (South African Computer Society (SAICSIT), 1996)
    While much has been written describing the necessity for and effects of Business Process Reengineering (BPR), little research has been conducted into the evaluation of BPR projects. This paper describes the result of a ...
  • Petkov, D (South African Computer Society (SAICSIT), 1996)
    This paper suggests an approach for the selection of microcomputer equipment in a decentralised environment. It is based on a modification of the procedure of the Analytic Hierarchy Process (AHP) by T. Saaty. The structuring ...
  • Machanick, Philip (South African Computer Society (SAICSIT), 1996)
    Object-oriented techniques are shown to hold promise for addressing the growing speed gap between memory and processors on shared-memory multiprocessors. However, reducing cache misses can be at the expense of more misses ...
  • De Jager, N; Roos, J (South African Computer Society (SAICSIT), 1996)
    This article discusses various issues around the Transmission Convergence (TC) sublayer in the physical layer of ATM. A brief introduction is given to the layered approach and functionality of the ATM physical layer. This ...
  • Froneman, L; Roode, JD (South African Computer Society (SAICSIT), 1996)
    Many curriculum designs are based purely on what educators think it should be, reflecting their own experiences or idiosyn­crasies, with little reference to the needs of the information systems field. A number of studies ...
  • Bishop, JM (South African Computer Society (SAICSIT), 1996)
    The survey of staff and student numbers done in 1992 provided the first country-wide picture of computing departments in South Africa. This report presents the picture three years later, from data collected in 1995. It ...
  • Parkinson, E; Warren, PR (South African Computer Society (SAICSIT), 1995)
    Many scheduling problems can be modelled as graph colouring problems. This paper gives a survey of heuristic algorithms used to colour graphs by describing a number of such algorithms found in the literature using an ...
  • Vahed, A (South African Computer Society (SAICSIT), 1995)
    The associative network presents a practical and efficient means for the storage and retrieval of data. Although the recall abilities of single-layer associative memories have been well researched [3], little investigation ...
  • Tromp, PJ; Roode, JD (South African Computer Society (SAICSIT), 1995)
    In this paper the collaborative approach to management is examined and, in particular, how this approach could benefit from the right technological support. Collaborative management focuses on the joint performance of ...

Search UnisaIR


Browse

My Account