Performance analyses of data communication systems do not always rely
on a detailed analysis of the underlying protocols. Those analyses which do, usually
rely on an analysis of the protocol state transition graph. These ...
Geographical information consists of non-spatial information (alphanumeric) and spatial information (vector and raster), the relationships between the non-spatial information and the spatial information, as well as the ...
An implementation of a Graham-Glanville type pattern-matching code generator for the NRIMS systems programming language SCRAP is discussed. The simple heuristic algorithm on which the pattern matcher is based is presented ...
A novel way of programming, which starts with specific details of a particular example
and abstracts these details into generalised sets, is proposed. The whole program is
constructed around the definition of these sets. ...
Parallel simulation, if it is to become a mainstream technology, must become reasonably accessible to programmer s without unusual skills. Since low-cost shared memory machines are becoming an increasing possibility a ...
The MultiServer centre with Hierarchical Concurrency Constraints
(MSHCC) is an exponential multiserver with a queueing discipline which imposes restrictions on the number of customers of different types and subtypes that ...
In conventional systems, transaction management has been thoroughly investigated and is
now considered to be well understood. Transaction management in multidatabase systems,
however, is less well understood. A multidatabase ...
CommunIcations networks with sporadically available links pose particular problems
in terms of delay analysis. This paper presents an approach to determining the effectiveness of various routing strategies when applied ...
We discuss the implementation of Rhoda, our Linda-like Tuple Space server which runs under the Helios operating system. The approach analyses and partitions tuple space at compile time in order to reduce the run time ...
In a process control environment, batch processes, as opposed to continuous processes, are characterised by multi-product manufacturing lines producing relatively small quantities which often involves frequent product ...
The design of a speech synthesis system for the generation of speech from text is presented. The system accepts any Afrikaans sentence and then derives segmental and suprasegmental information through various linguistic ...
This paper describes a software development environment currently being built at the University of Natal that provides a powerful and easy to use engineering tool for the design, simulation and implementation of high ...
There is, as yet, no single formal definition for the object-oriented approach. The object-oriented paradigm is described in terms of the concepts accentuated by the approach, namely classes, objects, methods, messages and ...
An object-orientated framework for the design of distributed virtual memory consistency is presented. It is shown that custom designed protocols for different types of applications are easy to construct and use within this ...
Recently, there have been various attempts to combine the strengths of
similarity-based learning (SBL) and explanation-based learning (EBL) in a single learning system.
We describe a graph-based learning method called ...
A model checker automatically determines whether a model of a reactive system satisfies its specification.Temporal logic is used to specify the intended behaviour of a reactive system which is modelled as a transition ...
Most statically typed Algol-style languages were designed to conform with the view that a value belongs to one and only one type. The adoption of this view bought compiler simplicity at the expense of language expressivity. ...
The next generation of query languages for database systems should have the
ability to express recursive queries, the efficient evaluation of which will be crucial to
the success of these systems. One such query language ...
The most frequently used local database system failure recovery techniques are logging, shadowing and differential files. In a distributed database these, local system failure recovery techniques may be utilized for recovery ...
Dijkstra's weakest precondition semantics, as presented in textbook form by Gries, may be viewed as an equational algebra. The problem then is to find a reasonable (set-theoric) model of this algebra. This paper provides one.