South African Computer Journal (SACJ): Recent submissions

  • Paijmans, H (South African Computer Society (SAICSIT), 1995)
    An overview is given of popular term-weighting schemes as used in Information Retrieval. The question is raised whether the word frequency based t f.idf weights may be used as a yardstick to compare schemes that are not ...
  • Oosthuysen, WH; McDonald, T (South African Computer Society (SAICSIT), 1995)
    Until some years ago, management of TCP/IP based products was done in a proprietary fashion. Many large companies build their own system-wide management facilities because of a lack of usable systems to manage heterogeneous ...
  • Messerschmidt, HJ (South African Computer Society (SAICSIT), 1995)
    There is an increasing amount of computer fraud in South Africa. A recent court case shows that Information Systems can actually assist criminals. The paper shows where the major loopholes are and suggests ways of improving ...
  • Ludik, J; Cloete, I (South African Computer Society (SAICSIT), 1995)
    The typical approach taken by other researchers to address the defects of standard backpropagation is to investigate alternative methods for selecting initial parameter values, or for adjusting parameter values during BP ...
  • Kisimov, V; Da Silva, I (South African Computer Society (SAICSIT), 1995)
    Over a period of a few hours, every computer participating in a distributed system has many unused resources. If these resources can be combined, a large amount of computational power can be generated. This paper offers ...
  • Halland, KJ; Labuschagne, W.A. (South African Computer Society (SAICSIT), 1995)
    The relationships between the best-known forms of circumscription are elucidated with the aid of an hypothetical ancestor, which we choose to call naive circumscription.
  • Morgan, C (South African Computer Society (SAICSIT), 1995)
    The refinement calculus, based on weakest preconditions, elaborates imperative program developments as a series of steps linked by a mathematical refinement relation. Specifications and executable code are regarded equally ...
  • Goslett, J.; Melton, A (South African Computer Society (SAICSIT), 1995)
    This tutorial is a companion paper to the tutorial Denotational Semantics and Domain Theory by Goslett, Hulley, and Melton. The purpose of the earlier tutorial was to present a computationally intuitive introduction to ...
  • Goldblatt, R (South African Computer Society (SAICSIT), 1995)
    These lectures provide an introduction to modal logic and its use in formalising reasoning about the behaviour of computational processes. They begin with a general introduction to the syntax, semantics, and proof-theory ...
  • Brinksma, E; Langerak, R (South African Computer Society (SAICSIT), 1995)
    We present an algorithm for the decomposition of processes in a process algebraic framework. Decomposition, or the refinement of process substructure, is an important design principle in the top-down development of concurrent ...
  • Theron, H; Cloete, I (South African Computer Society (SAICSIT), 1994)
    This paper presents a theoretical analysis of the search schemes employed by AQ, CN2 and the recently introduced BEXA algorithm. These covering algorithms induce disjunctive concept descriptions, and employ a general-to-specific ...
  • Remenyi, D (South African Computer Society (SAICSIT), 1994)
    This paper reviews recent literature on the subject of the operational and financial difficulties facing business and manage­ment in the mid 1990's. It identifies how, due to generally poor results, business is under more ...
  • Mata-Montero, M; Ellis, JA (South African Computer Society (SAICSIT), 1994)
    The Longest (s-t)-path Problem, a known NP-complete set, is shown to admit a linear time solution when the instances of the problem are restricted to partial k-trees. This class of graphs is defined and some of the properties ...
  • Lochovsky, FH (South African Computer Society (SAICSIT), 1994)
    Technologies for supporting organizational activities are becoming increasingly important as a means for organizations to achieve their business goals. Such technologies allow organizations to model, execute, and control ...
  • Labuschagne, W.A.; Miller, MG (South African Computer Society (SAICSIT), 1994)
    Yet another axiomatisation of the Yale shooting scenario is provided. The point illustrated by the axiomatisation is that, when using the situation calculus to represent knowledge about a dynamic system in which actions ...
  • Jordaan, DB; Gilliland, S (South African Computer Society (SAICSIT), 1994)
    Research has shown that traditional teaching methods such as lecturing are not always as effective as the teacher or lecturer might like them to be. Frederick [3, p45] stated: 'Nearly all learning theorists.faculty development ...
  • Schach, Stephen R. (South African Computer Society (SAICSIT), 1994)
    The object-oriented paradigm is widely promoted as the optimal way to develop software. However, there is as yet no experimental evidence to back that assertion, and it is extremely unlikely that such evidence could be ...
  • Roets, R (South African Computer Society (SAICSIT), 1994)
    This paper replicates a study conducted in the USA to test the perceived need for IT training in organisations by non-IS employees, and the need for more general business knowledge by IS employees. The hypothesis tested ...
  • Ram, V (South African Computer Society (SAICSIT), 1994)
    Computer Based Scheduling is an important activity especially in automated environments such as CIM (Computer Integrated Manufacturing ) where it is an integral part of the total manufacturing function. Developments in ...
  • Lutu, PEN (South African Computer Society (SAICSIT), 1994)
    Parallel execution strategies/or Prolog programs are reviewed. Three models, AOPM, APPNet and RAP are discussed in some detail. The AOPM and the APPNet are AND-OR parallel execution models and represent the two ends of the ...

Search UnisaIR


Browse

My Account