School of Computing: Recent submissions

  • McIver, AK; Morgan, C; Sanders, JW (South African Computer Society (SAICSIT), 1997)
    This paper abridges lecture notes from WOFACS 96. It provides semantic models for a variety of programming and development formalisms, showing how different models for the same formalism are related by Galois connections. ...
  • Blackburn, P; Jaspars, J; De Rijke, M (South African Computer Society (SAICSIT), 1997)
    The purpose of these notes is two fold: (i) to give a reasonably self-contained introduction to a particular approach to theory change, known as the Alchourron-Gardenfors-Makinson (AGM) approach, and to discuss some of the ...
  • Yellen, RE; Sanford, CC (South African Computer Society (SAICSIT), 1995)
    The Singapore government's adoption of policies which has promulgated an infrastructure heavily reliant on information technology is used as a model to explain Singapore's remarkable economic growth. This model helps to ...
  • Lai, LSL (South African Computer Society (SAICSIT), 1995)
    It is believed that revolutionary developments in information technology may allow developing countries to leapfrog obsta­cles to development if they can successfully apply the new technology. However, many organizations ...
  • Korpela, M (South African Computer Society (SAICSIT), 1995)
    There is a long, although thin, tradition of research on whether and how information technology (IT) can contribute to national development and basic human needs, particularly in developing countries (DCs). It is striking, ...
  • Grobler, M (South African Computer Society (SAICSIT), 1995)
    With the enormous educational backlogs in South Africa it seems that there is no choice other than searching for alternative, technology-based ways for improving the existing educational situation. This paper describes ...
  • Crossman, T.D.; Fortmann, P; Heneke, V; Murray, D (South African Computer Society (SAICSIT), 1995)
    There is considerable debate about the value of information technology (IT) in developing economies. Some argue opti­mistically that without IT, developing economies will not grow. Others, somewhat pessimistically, warn ...
  • Avgerou, C; Madon, S (South African Computer Society (SAICSIT), 1995)
    In this article we review the current debate on the impact of the increasing significance of information handling enabled by advances in information technology on socio-economic development, with particular emphasis on the ...
  • von Solms, S. H. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Grammars generating 2-dimensional arrays have been studied by many people [1, 2, 3, 4). One effort was Random Context Array Grammars [4], where different types of context conditions placed on the production, were used ...
  • Vosloo, I (South African Computer Society (SAICSIT), 1997)
    This communication gives an overview of the field of mobile agents as presented at various events held in conjunction with a recent international symposium in Germany. The nature of mobile agents and the key concepts ...
  • Smit, P.J. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Colour computer graphics covers a wide field of applications such as games, computer aided-design, image processing and digital terrain modelling. The traditional way of using colour in raster graphics systems, the RGB ...
  • Van der Merwe, AJ; Labuschagne, WA (South African Computer Society (SAICSIT), 1997)
    In 1985 Smith introduced a new way of deriving fully normalized tables. His method was based on the use of a dependency list and a dependency diagram to produce fifth normal form directly. We introduce the use of end-line, ...
  • Mende, J. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    The laws and techniques of maJure sub1ects such as Physics and Electrical Engineering are logically connected to one another in the form of a deductive network There is a foundation of basic laws deriving from them ...
  • Sanders, I; Tsai, C (South African Computer Society (SAICSIT), 1997)
    The goal of this research is to demonstrate that word prediction in a constrained domain like a programming language can be done effectively and hence has the potential to facilitate typing for disabled people who are ...
  • Kritzinger, Pieter S. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Performance analyses of data communication systems do not always rely on a detailed analysis of the underlying protocols. Those analyses which do, usually rely on an analysis of the protocol state transition graph. These ...
  • Rensleigh, CW; Olivier, MS (South African Computer Society (SAICSIT), 1997)
    Small-business performance can benefit from computerisation. Unfortunately, however, most of the very small small-business enterprises do not have the financial means to acquire the services of a computerisation consultant. ...
  • Renaud, K; Kotze, P (South African Computer Society (SAICSIT), 1997)
    In many applications today multiple pre-existing database systems are integrated into a single multiple database system called a multi­database system. One of the biggest problems for transaction management in a multidatabase ...
  • Remenyi, D (South African Computer Society (SAICSIT), 1997)
    Business Process Reengineering (BPR) or Business Transformation is very difficult to manage successfully. There is a high failure rate of BPR projects and thus the risk associated with this type of work is high. Although ...
  • Olivier, MS (South African Computer Society (SAICSIT), 1997)
    Mobile computers pose special security risks since information contained on them can more easily be compromised. However, availability of information at the location where the mobile computer is to be used often outweighs ...
  • Von Solms, S.H.; De Villiers, D.P. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    The operations in the Take/Grant Protection Model are formalised using theory and results from the discipline of formal languages. A Protection Graph Rewriting Grammar is defined, which generates protection graphs consistent ...

Search UnisaIR


Browse

My Account