Institutional Repository

Browsing Quaestiones Informaticae Vol 4 No 3 by Title

Browsing Quaestiones Informaticae Vol 4 No 3 by Title

Sort by: Order: Results:

  • Berman, Sonia; Walker, L. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    A high-level language for accessing a relational database is being developed at UCT. The system, known as HAL (High-level Access Language), provides complete data independence as users view the database in terms of ...
  • Ridler, P.F. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Various ways of using random access memory to emulate a magnetic disc storage system are described and the advantages and disadvantages are enumerated. An algorithm for making use of a solid state disc is given which avoids ...
  • Mende, J. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Research has a utilitarian role of providing the knowledge needed by the designers of mankind's artefacts. In this context four distinct categories of knowledge are identifiable. 1. Laws of Nature describe inherent ...
  • Machanick, Philip (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    There has been a proliferation of low-cost AI tools. Consideration is given as to how significant research may be conducted using these tools, in the light of experience of developing Al tools on large, expensive machines. ...
  • Bruwer, P.J.S.; Hattingh, J.M. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Computer technology has grown exponentially in the course of the past decade in terms of sophistication - not only with regard to hardware and networks, but also with regard to mainframe and micro-computer systems. ...
  • Kourie, D.G. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    LOTOS (Language Of Temporal Ordering Specification) is employed to give a partial specification of a system to connect RJE devices across an X.25 network. The system's implementation has been described fully elsewhere ...
  • Van der Poel, K.G.; Bryson, I.R. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    The principles of protection of private information have gradually been defined during the last decades. The US Privacy Act of 1974 regulates practices of the federal government. Two committees of the UK government ...
  • Byron-Moore, S.P. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Trends in operating systems are examined in the light of advances in computer hardware. Consideration is given to the desirability of a good, up-to-date single-user operating system. The specification and implementation ...

Search UnisaIR


Browse

My Account