This is a quite general survey talk in which I present some of the infrastructure,
activities and scientific flavour of what has, for better or worse, come to be called
"Theoretical Computer Science". I will try to relate ...
Van der Merwe, AJ; Labuschagne, WA(South African Computer Society (SAICSIT), 1997)
In 1985 Smith introduced a new way of deriving fully normalized tables. His method was based on the use of a dependency list and a dependency diagram to produce fifth normal form directly. We introduce the use of end-line, ...
In the middle 80s Smith introduced a new way of deriving fully normalized tables: His
method was based on the use of an dependency list and a dependency diagram to produce
fifth normal form directly. We introduce the use ...
HAVENGA, M; De Villiers, M.R. (Ruth); MENTZ, E(2011)
Computer programmers must be able to understand programming source code and write programs that execute complex tasks to solve real-world problems. This article is a transdisciplinary study at the intersection of computer ...
Scarrott, G.G.(Computer Society of South Africa (on behalf of SAICSIT), 1980)
The era ofinformation engineering was initiated some thirty years' ago by the demonstration of the first stored program electronic computer.
At that time there was intense innovative excitement among the pioneers which, ...
This paper addresses practical approaches and models, based on the paradigm of the ‘interpretivist school’, to operationalise research in information systems. The study overviews research paradigms and some current issues ...
Mende, J.(Computer Society of South Africa (on behalf of SAICSIT), 1987)
After identifying the processing functions required in a computer based information system, the designer needs
to combine them into an optimal set of load units. Some "packaging" arrangements yield a better system ...
After identifying the processing functions required in a computer based information system, the designer needs to combine them into an optimal se t of load un its. Some “packaging” arrangements yield a better system than ...
Dagada, Rabelani; Eloff, M.M.; Venter, L.M.(Information Security for South Africa (ISSA), 2009)
South Africa has myriad laws that address information security related issues.
One such law is the Electronic Communications and Transactions Act of 2002
(ECTA), which is highly regarded internationally. A study, which ...
Machanick, Philip(Computer Society of South Africa (on behalf of SAICSIT), 1985)
After a brief look at how the notion of the stored program is applied by
programmers in the area of Artificial Intelligence (Al), we shall look at a
specific Al tool: a production svstem. The discussion is at a ...
Information and Communication Technologies (ICTs) are capable of expanding access to quality education, educational resources, and also provide teachers with new skills. Nevertheless, a majority of rural public schools ...
This comparative study into the integration of technology into teaching and learning, examines cases of computer use and e-learning in Science classrooms in two Southern African states, namely, South Africa (SA) and the ...
Formal specification of software systems has been very promising. Critics against the end
results of formal methods, that is, producing quality software products, is certainly rare. Instead,
reasons have been formulated ...
Specification plays a vital role in software engineering to facilitate the development of highly dependable software. The importance of specification in software development is to serve, amongst others, as a communication ...
The Semantic Web, as the foreseen successor of the current Web, is
envisioned to be a semantically enriched information space usable by machines
or agents that perform sophisticated tasks on behalf of their users.
The ...
Knowledge management has roots in a variety of disciplines, such as philosophy,
psychology, social sciences, management sciences and computing. As a result, a wide
variety of theories and definitions of knowledge and ...
In the 21st century, information security has become the heartbeat of any organisation. One of the best-known methods of tightening and continuously improving security on an information system is to uniquely and efficiently ...
The arrival of outcomes-based education (OBE) in South African means that we have to change the way in which we assess our learners. Coupled with this change comes a move to larger classes where individual assessment has ...
The road of development through Information and Communication technology (ICT4D) is
lined with deep potholes and dead ends since little is done to “accumulate either knowledge or practical guidance” (Heeks and Bailur, ...
Jokonya, Osden; Kroeze, Jan H; Van der Poll , John Andrew(SAICSIT, 2012-10)
Information Technology (IT) adoption challenges facing organizations are too complex to be resolved using only one methodology. Most existing Information Technology (IT) adoption models such as the Technology Acceptance ...