Institutional Repository

Quaestiones Informaticae Vol 2 No 2

Quaestiones Informaticae Vol 2 No 2

 

Recent Submissions

  • Wulf, S. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    An overall methodology for database design is presented. This includes creation of a data dictionary and relational analysis. An algorithm is presented to create a conceptual schema or logical database design from the set ...
  • Visser, P. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    This paper presents a summary of tutorial material on accepted management techniques and philosophies as applied to the development of large software systems, based upon the documentation for such systems.
  • Van Niekerk, J.C. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    The operational approach to the analysis of the single server model is discusses. Firstly Buzen's operational equivalent to the stochastic birth/death Markov model is presented, whereafter generalisations of the model are ...
  • Schach, Stephen R. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    Three levels of traces for data structures (as opposed to simple variables) are defined. A machine-code core dump is essentially a low level trace. A high level trace reflects the high level language in which the data ...
  • Van Rooyen, Martha H. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    SCRAP is a high-level language that provides facilities for systems progrc~ff)ming, but can equally well be used for applications programming. The prominent features of the language are a well-defined syntax, a modular ...
  • Popelas, Judy Mallino; Calingaert, Peter (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    The correction of errors in programs can be based on an analysis, that subordinates syntactic relationships to functional relationships among elements of a program. For this purpose, case grammars, originally developed ...
  • Hetzel, Bill; Calingaert, Peter (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    A controlled experiment was designed and conducted to compare three methods for detecting errors in computer programs: disciplined, structured reading; specification or black-box testing; and a refined form of typical ...