School of Computing: Recent submissions

  • Viktor, HL; Rennhackkamp, MH (1991)
    The most frequently used local database system failure recovery techniques are logging, shadowing and differential files. In a distributed database these, local system failure recovery techniques may be utilized for recovery ...
  • Venter, BH (1991)
    Most statically typed Algol-style languages were designed to conform with the view that a value belongs to one and only one type. The adoption of this view bought compiler simplicity at the ex­pense of language expressivity. ...
  • Van Zijl, L; Mitton, D (1991)
    Statecharts were developed by Harel et al [10] to specify complex reactive systems. In this paper we report on our application of statecharts as a design and specification tool for an X-Windows based Graphical User ...
  • Blewett, CN; Erwin, GJ (1995)
    The book uses storytelling as teaching, with exclusive use of active tense, local examples a problem-driven approach rather than a product-driven approach. For example, magnetic tape principles are explained in ...
  • Berezner, SA; Krzesinski, AE (1995)
    Consider a circuit-switched network where several source switches are connected to a destination switch via a tandem switch. Circuit-switched networks traditionally employ a Blocked Calls Cleared ( BCC) admission rule: a ...
  • Barrow, J (1995)
    This paper describes SuperText, a computer program designed to support productive expository writing processes among students at a distance teaching university. Being able to write well is an import communication skill, ...
  • Wood, PT (1991)
    The next generation of query languages for database systems should have the ability to express recursive queries, the efficient evaluation of which will be crucial to the success of these systems. One such query language ...
  • Webster, MR; Harley, RG; Levy, DC; Woodward, DR (1991)
    This paper describes a software development environment currently being built at the University of Natal that provides a powerful and easy to use engineering tool for the design, simulation and implementation of high ...
  • Wagener, MJ (1991)
    The design of a speech synthesis system for the generation of speech from text is presented. The system accepts any Afrikaans sentence and then derives segmental and suprasegmental informa­tion through various linguistic ...
  • Rennhackkamp, M (1991)
    There is, as yet, no single formal definition for the object-oriented approach. The object-oriented paradigm is described in terms of the concepts accentuated by the approach, namely classes, objects, methods, messages and ...
  • Oosthuizen, GD; Avenant, C (1991)
    Recently, there have been various attempts to combine the strengths of similarity-based learning (SBL) and explanation-based learning (EBL) in a single learning system. We describe a graph-based learning method called ...
  • Olivier, MS; Von Solms, SH (1991)
    In current database systems the responsibility for enforcing security is often given to the various application programs. Even where the Database Management System (DBMS) does supply security mechanisms, a single application ...
  • Melville, S (1991)
    CommunIcations networks with sporadically available links pose particular problems in terms of delay analysis. This paper presents an approach to determining the effectiveness of various routing strategies when applied ...
  • Machanick, P (1991)
    Parallel simulation, if it is to become a mainstream technology, must become reasonably accessible to programmer s without unusual skills. Since low-cost shared memory machines are becoming an increasing possibility a ...
  • MacGregor, KJ; Campbell, RH (1991)
    An object-orientated framework for the design of distributed virtual memory consistency is presented. It is shown that custom designed protocols for different types of applications are easy to construct and use within this ...
  • Krzesinski, AE; Schassberger, R (1991)
    The MultiServer centre with Hierarchical Concurrency Constraints (MSHCC) is an exponential multiserver with a queueing discipline which imposes restrictions on the number of customers of different types and subtypes that ...
  • Fouche, W; De Villiers, PJA (1991)
    A kernel has been developed which can be used to simplify the development of control software. It can be used to control several physical machines which are interconnected via a fast local area network. One or more virtual ...
  • Rennhackkamp, MH (1987)
    Numerous concurrency control methods have been proposed for distributed databases. Various criteria are used to compare these methods. The comparisons range from qualitative overviews through quantitative analyses ...
  • Punt, JL (1987)
    This paper discusses a protocol validation system. The input to the system is a protocol definition specified in the specification language ESTELLE. The ESTELLE specification is the input to a translator program which ...
  • Philips, MJ (1987)
    The difficulties encountered by users without experience of the use of multiple databases are described, as well as an approach which allow such users to make worthwhile use of these systems, encompassing potentially ...

Search UnisaIR


Browse

My Account