Institutional Repository

Browsing SAICSIT Proceedings: 1979-2001 by Type "Article"

Browsing SAICSIT Proceedings: 1979-2001 by Type "Article"

Sort by: Order: Results:

  • Smith, DC (1998)
    Projects, and their success, are vital if organisations are to produce new products and services. The key players in IS projects are the project manager and the project team. This paper discussed ongoing research of two ...
  • Cooper, AK (1987)
    Geographical information consists of non-spatial information (alphanumeric) and spatial information (vector and raster), the relationships between the non-spatial information and the spatial information, as well as the ...
  • Warren, PR; Viljoen, M (1998)
    This work reports on 23 third year student' s projects in which the user interfaces (UI) were found wanting. We show in which ways we regard the UI to be in error. However, an examination of the available literature on UI ...
  • Mulders, MA; Serwy, DA; Van Biljon, WR (1987)
    An implementation of a Graham-Glanville type pattern-matching code generator for the NRIMS systems programming language SCRAP is discussed. The simple heuristic algorithm on which the pattern matcher is based is presented ...
  • Ram, V (South African Computer Society (SAICSIT), 1991)
    The use of Expert Systems technology in management decision making domains is increasing rapidly as business environments worldwide grow more turbulent and as the cost of development tools decrease. Research effort in ...
  • Pretorius, L; Bosch, SE (2001)
    Morphological analysis is a basic enabling application for further kinds of natural lan guage processing, including part-of-speech tagging, parsing, translation and other high-level applications. Automated morphological ...
  • Britz, K (2001)
    In formal logic, both semantic entailment and the conditional connective are used to formalize the intuitive notion of implication. The former is defined in the meta-language of the logic, and the latter in the language ...
  • Von Solms, R (1996)
    Information security has moved a long way from the early days when physical security, together with a set of backups, fonned the backbone of a company's security controls. Today, infonnation security is all about policies, ...
  • Carson, DI; Oellermann, OR (1991)
    In this paper we discuss the problem of finding an upper bound on the genus of a graph. This problem has applications to circuit layouts. An electronic circuit may be modelled by a graph. By punching holes into the circuit ...
  • Sanders, I (1998)
    In an earlier paper the notion of a ray guard --'- a guard that can only see along a single ray, was introduced. The ray guarding problem is in siting the fewest possible such guards so that they guard all adjacencies ...
  • Kritzinger, PS (1987)
    Performance analyses of data communication systems do not always rely on a detailed analysis of the underlying protocols. Those analyses which do, usually rely on an analysis of the protocol state transition graph. These ...
  • Blewett, CN; Cansfield, J; Gibson, L (1996)
    South African organisations are facing increasing demands stemming from growing competition, fast changing technologies and global trends and pressures. The methods and management structures enabled these organisations to ...
  • Mueller, CSM (1987)
    A novel way of programming, which starts with specific details of a particular example and abstracts these details into generalised sets, is proposed. The whole program is constructed around the definition of these sets. ...

Search UnisaIR


Browse

My Account