Institutional Repository

Browsing SAICSIT Proceedings: 1979-2001 by Issue Date

Browsing SAICSIT Proceedings: 1979-2001 by Issue Date

Sort by: Order: Results:

  • Olivier, MS; Von Solms, SH (1991)
    In current database systems the responsibility for enforcing security is often given to the various application programs. Even where the Database Management System (DBMS) does supply security mechanisms, a single application ...
  • Fouche, W; De Villiers, PJA (1991)
    A kernel has been developed which can be used to simplify the development of control software. It can be used to control several physical machines which are interconnected via a fast local area network. One or more virtual ...
  • Van Zijl, L; Mitton, D (1991)
    Statecharts were developed by Harel et al [10] to specify complex reactive systems. In this paper we report on our application of statecharts as a design and specification tool for an X-Windows based Graphical User ...
  • Carson, DI; Oellermann, OR (1991)
    In this paper we discuss the problem of finding an upper bound on the genus of a graph. This problem has applications to circuit layouts. An electronic circuit may be modelled by a graph. By punching holes into the circuit ...
  • Ram, V (South African Computer Society (SAICSIT), 1991)
    The use of Expert Systems technology in management decision making domains is increasing rapidly as business environments worldwide grow more turbulent and as the cost of development tools decrease. Research effort in ...
  • Radovanovic, A; Venter, DM (1995)
    South African networking history started in the mid 1980's. Within less than ten years, the country became the 15-th fastest growing network within the lnternet community. Today, the South African network offers a variety ...
  • Ntlatlapa, N (1995)
    Symmetric positive definite matrices appear in most methods for Unconstrained Optimization. The method widely adopted for factoring these matrices is Cholesky Factorization. Furthermore, in Quassi-Newton methods for ...
  • Blewett, CN; Erwin, GJ (1995)
    The book uses storytelling as teaching, with exclusive use of active tense, local examples a problem-driven approach rather than a product-driven approach. For example, magnetic tape principles are explained in ...
  • De Villiers, C; Roode, JD (1995)
    lnterpersonal skills and communications are the two topics in Curriculum '95, compiled by the joint task force of the ACM/AIS-ICIS/DPMA, where both academics and industry expect the level of knowledge of the students to ...
  • Loock, M; Steenkamp, AL (1995)
    The research is conducted in the area of Software Engineering, with emphasis on the design phase of the Software Development Life Cycle (SDLC). The object-oriented paradigm is the point of departure. The investigation deals ...
  • Klein, HK; Truex, DP (1995)
    This paper outlines the basic theoretical assumptions of language analysis and then proposed a new approach called discourse analysis. The theoretical foundations of discourse analysis are Wittgenstein's theory of language ...
  • Ikram, IM (1995)
    We consider the problem of automatically generating parallel programs in the occam language. In particular, we are concerned with the generation of program skeletons, that define just those computations that are common ...
  • Froneman, L; Roode, JD (1995)
    What to teach students in an undergraduate program in Information Systems at a tertiary institution has repeatedly been debated over the years. Various curricula have been published, the most recent effort being the IS ...
  • Sithole, AS (1995)
    This paper attempts to address the need and justification for a Computer Skills Requirements Model for Zimbabwe as well as the findings and plans following the recently completed Zimbabwe Computer Industry Manpower Survey. ...
  • Barrow, J (1995)
    This paper describes SuperText, a computer program designed to support productive expository writing processes among students at a distance teaching university. Being able to write well is an import communication skill, ...
  • Ram, V (1995)
    Software Reuse is the technique of reusing software components previously developed in order to reduce the effort required to develop new software. It is generally accepted that software reuse can improve the rate of ...
  • Ganchev, GF (1995)
    The compiler construction toolkit under development in the University of Botswana (UB is intended to allow the students build rapidly components of compilers for languages that they define. It consists of a case-type scanner ...
  • Nepal, T; Melville, S (1995)
    This paper deals with approaches to the timetabling problem, focusing on tertiary institutions in Southern Africa. A questionnaire which dealt with, inter alia, student population, number of class groups, methods used for ...
  • Kotze, P (1995)
    There are three major agents in a computer-based instruction (CBI) environment: the tutor, the tutoring system and the tutee. The emphasis of this paper is on the tutoring system which contains the instructional content ...
  • Blewett, CN; Erwin, GJ (1995)
    We describe the prototype of an expert system software advisor for the lock manager of a database system. The software advisor, called EAGLE (Expert Advisor for Granting Locks Effectively), is intended to become an ...

Search UnisaIR


Browse

My Account