Institutional Repository

Browsing SAICSIT Proceedings: 1979-2001 by Title

Browsing SAICSIT Proceedings: 1979-2001 by Title

Sort by: Order: Results:

  • Smuts, W (1998)
    Most existing information security classification schemes use a 1-dimensional scale such as [top secret, secret, employee confidential, company confidential, restricted]. These classification schemes do not differentiate ...
  • Bytheway, A; Hearne, G (1998)
    In considering the requirements of an academic infrastructure that might support computer science and information systems education in South Africa, it is easy to be driven solely by the opportunities that innovative ...
  • Van Niekerk, C (1998)
    This talk will cover the following areas of importance to this problem: • Problems that Academic Institutions are facing today. • How Computer Associates want to get involved. • Overview of the Technology we are ...
  • Botha, R; Eloff, J (2001)
    The eXtensible Markup Language {XML) are being upheld as having the potential to change the way business is conducted. This will be effected by changing the way in which information is shared. However, with the sharing of ...
  • Botha, RA (2000)
    This paper defines an electronic workflow environment as being conducive to the performance of business processes according to certain policies and practices in an electronic fashion. The workflow procedure will be facilitated ...
  • Drevin, L (1998)
    l. Activities and purpose of WG 11.8 WG 11.8 is one of the workgroups of TCl 1. WG 11.8 came together on 2 September 1998 on a boat between Vienna and Budapest as part of the IFIP World Computer Congress (WCC '98) where ...
  • Bishop, JM (1987)
    This paper looks at ways of obtaining a distributed version of an Ada program. Since current approaches require a large investment in system software, we propose instead the use of an Adapter, which can be a manual methodology ...
  • Messerschmidt, HJ; Robertson, J (2000)
    This paper outlines a new direct algebraic method for the factorization of integers. It shows how by using a mixed binary - decimal multiplication scheme the multiplication can be reconstructed from the product only. This ...
  • De Villiers, C; Roode, JD (1995)
    lnterpersonal skills and communications are the two topics in Curriculum '95, compiled by the joint task force of the ACM/AIS-ICIS/DPMA, where both academics and industry expect the level of knowledge of the students to ...
  • Melville, S (1991)
    CommunIcations networks with sporadically available links pose particular problems in terms of delay analysis. This paper presents an approach to determining the effectiveness of various routing strategies when applied ...
  • Blewett, CN; Erwin, GJ (1995)
    We describe the prototype of an expert system software advisor for the lock manager of a database system. The software advisor, called EAGLE (Expert Advisor for Granting Locks Effectively), is intended to become an ...
  • Philips, MJ (1987)
    The difficulties encountered by users without experience of the use of multiple databases are described, as well as an approach which allow such users to make worthwhile use of these systems, encompassing potentially ...
  • Krzesinski, AE (1987)
    A Multidass Queueing Network (MQN) Q ( N, .M ) consisting of M centres with index set .M and population vector N is partitioned into two subnetworks Q ( fJ -V , .M -1) ) and Q (V , V ) . The centres in Q (V , · V ) are ...
  • Watzenboeck, M (1996)
    Automating network management is regarded as a prerequisite for further plant automation. Artificial intelligence techniques, such as case based reasoning, topological reasoning and automated learning enable automated ...
  • Viljoen, E (2000)
    Logics of belief and knowledge are typically formulated in terms of modal languages. A possible world semantics is traditionally used for such languages but when a formula A is read as "The agent believes that A", the ...
  • Hazelhurst, S; Fatti, A; Henwood, A (1998)
    The growth of network and internet communication creates several challenges for network design. Two important issues are security and performance. As the volume of communication increases together with the importance of ...
  • Olivier, MS; Von Solms, SH (1991)
    In current database systems the responsibility for enforcing security is often given to the various application programs. Even where the Database Management System (DBMS) does supply security mechanisms, a single application ...
  • Blewett, CN; Erwin, GJ (1995)
    The book uses storytelling as teaching, with exclusive use of active tense, local examples a problem-driven approach rather than a product-driven approach. For example, magnetic tape principles are explained in ...
  • Kruger, MF; Hattingh, JM; Steyn, T (2000)
    The Knapsack Problem is one of the most important problems in Discrete optimization. Although it is the simplest integer program, it has numerous practical applications and often appears as a subproblem in solving more ...
  • Machanick, P (2001)
    Increasingly aggressive pipelining achieves diminishing returns. Simultaneous Multi-threading (SMT) attempts to exploit the fact that functional units are frequently idle. This paper argues the case for keeping the processor ...

Search UnisaIR


Browse

My Account