School of Computing: Recent submissions

  • Finnie, G.R. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Learning to use a decision support system involves both formal and informal teaching as well as self-teaching. Many cases have been documented of unsuccesful implementation of DSS or MIS in organisations and identifying ...
  • Berman, Sonia (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    An information management system with a semantic data model interface is currently being developed at UCT. This system provides high-level, non-procedural access to information and enforces powerful integrity and security ...
  • Whittaker, L (South African Computer Society (SAICSIT), 1996)
    While much has been written describing the necessity for and effects of Business Process Reengineering (BPR), little research has been conducted into the evaluation of BPR projects. This paper describes the result of a ...
  • Petkov, D (South African Computer Society (SAICSIT), 1996)
    This paper suggests an approach for the selection of microcomputer equipment in a decentralised environment. It is based on a modification of the procedure of the Analytic Hierarchy Process (AHP) by T. Saaty. The structuring ...
  • Machanick, Philip (South African Computer Society (SAICSIT), 1996)
    Object-oriented techniques are shown to hold promise for addressing the growing speed gap between memory and processors on shared-memory multiprocessors. However, reducing cache misses can be at the expense of more misses ...
  • De Jager, N; Roos, J (South African Computer Society (SAICSIT), 1996)
    This article discusses various issues around the Transmission Convergence (TC) sublayer in the physical layer of ATM. A brief introduction is given to the layered approach and functionality of the ATM physical layer. This ...
  • Froneman, L; Roode, JD (South African Computer Society (SAICSIT), 1996)
    Many curriculum designs are based purely on what educators think it should be, reflecting their own experiences or idiosyn­crasies, with little reference to the needs of the information systems field. A number of studies ...
  • Bishop, JM (South African Computer Society (SAICSIT), 1996)
    The survey of staff and student numbers done in 1992 provided the first country-wide picture of computing departments in South Africa. This report presents the picture three years later, from data collected in 1995. It ...
  • Parkinson, E; Warren, PR (South African Computer Society (SAICSIT), 1995)
    Many scheduling problems can be modelled as graph colouring problems. This paper gives a survey of heuristic algorithms used to colour graphs by describing a number of such algorithms found in the literature using an ...
  • Vahed, A (South African Computer Society (SAICSIT), 1995)
    The associative network presents a practical and efficient means for the storage and retrieval of data. Although the recall abilities of single-layer associative memories have been well researched [3], little investigation ...
  • Tromp, PJ; Roode, JD (South African Computer Society (SAICSIT), 1995)
    In this paper the collaborative approach to management is examined and, in particular, how this approach could benefit from the right technological support. Collaborative management focuses on the joint performance of ...
  • Paijmans, H (South African Computer Society (SAICSIT), 1995)
    An overview is given of popular term-weighting schemes as used in Information Retrieval. The question is raised whether the word frequency based t f.idf weights may be used as a yardstick to compare schemes that are not ...
  • Oosthuysen, WH; McDonald, T (South African Computer Society (SAICSIT), 1995)
    Until some years ago, management of TCP/IP based products was done in a proprietary fashion. Many large companies build their own system-wide management facilities because of a lack of usable systems to manage heterogeneous ...
  • Messerschmidt, HJ (South African Computer Society (SAICSIT), 1995)
    There is an increasing amount of computer fraud in South Africa. A recent court case shows that Information Systems can actually assist criminals. The paper shows where the major loopholes are and suggests ways of improving ...
  • Ludik, J; Cloete, I (South African Computer Society (SAICSIT), 1995)
    The typical approach taken by other researchers to address the defects of standard backpropagation is to investigate alternative methods for selecting initial parameter values, or for adjusting parameter values during BP ...
  • Berman, Sonia; Walker, L. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    A high-level language for accessing a relational database is being developed at UCT. The system, known as HAL (High-level Access Language), provides complete data independence as users view the database in terms of ...
  • Kisimov, V; Da Silva, I (South African Computer Society (SAICSIT), 1995)
    Over a period of a few hours, every computer participating in a distributed system has many unused resources. If these resources can be combined, a large amount of computational power can be generated. This paper offers ...
  • Halland, KJ; Labuschagne, W.A. (South African Computer Society (SAICSIT), 1995)
    The relationships between the best-known forms of circumscription are elucidated with the aid of an hypothetical ancestor, which we choose to call naive circumscription.
  • Ridler, P.F. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Various ways of using random access memory to emulate a magnetic disc storage system are described and the advantages and disadvantages are enumerated. An algorithm for making use of a solid state disc is given which avoids ...
  • Morgan, C (South African Computer Society (SAICSIT), 1995)
    The refinement calculus, based on weakest preconditions, elaborates imperative program developments as a series of steps linked by a mathematical refinement relation. Specifications and executable code are regarded equally ...

Search UnisaIR


Browse

My Account