School of Computing: Recent submissions

  • Byron-Moore, S.P. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Trends in operating systems are examined in the light of advances in computer hardware. Consideration is given to the desirability of a good, up-to-date single-user operating system. The specification and implementation ...
  • Van der Poel, K.G.; Bryson, I.R. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    The principles of protection of private information have gradually been defined during the last decades. The US Privacy Act of 1974 regulates practices of the federal government. Two committees of the UK government ...
  • Bruwer, P.J.S.; Hattingh, J.M. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Computer technology has grown exponentially in the course of the past decade in terms of sophistication - not only with regard to hardware and networks, but also with regard to mainframe and micro-computer systems. ...
  • Goslett, J.; Melton, A (South African Computer Society (SAICSIT), 1995)
    This tutorial is a companion paper to the tutorial Denotational Semantics and Domain Theory by Goslett, Hulley, and Melton. The purpose of the earlier tutorial was to present a computationally intuitive introduction to ...
  • Goldblatt, R (South African Computer Society (SAICSIT), 1995)
    These lectures provide an introduction to modal logic and its use in formalising reasoning about the behaviour of computational processes. They begin with a general introduction to the syntax, semantics, and proof-theory ...
  • Brinksma, E; Langerak, R (South African Computer Society (SAICSIT), 1995)
    We present an algorithm for the decomposition of processes in a process algebraic framework. Decomposition, or the refinement of process substructure, is an important design principle in the top-down development of concurrent ...
  • Theron, H; Cloete, I (South African Computer Society (SAICSIT), 1994)
    This paper presents a theoretical analysis of the search schemes employed by AQ, CN2 and the recently introduced BEXA algorithm. These covering algorithms induce disjunctive concept descriptions, and employ a general-to-specific ...
  • Remenyi, D (South African Computer Society (SAICSIT), 1994)
    This paper reviews recent literature on the subject of the operational and financial difficulties facing business and manage­ment in the mid 1990's. It identifies how, due to generally poor results, business is under more ...
  • Mata-Montero, M; Ellis, JA (South African Computer Society (SAICSIT), 1994)
    The Longest (s-t)-path Problem, a known NP-complete set, is shown to admit a linear time solution when the instances of the problem are restricted to partial k-trees. This class of graphs is defined and some of the properties ...
  • Lochovsky, FH (South African Computer Society (SAICSIT), 1994)
    Technologies for supporting organizational activities are becoming increasingly important as a means for organizations to achieve their business goals. Such technologies allow organizations to model, execute, and control ...
  • Labuschagne, W.A.; Miller, MG (South African Computer Society (SAICSIT), 1994)
    Yet another axiomatisation of the Yale shooting scenario is provided. The point illustrated by the axiomatisation is that, when using the situation calculus to represent knowledge about a dynamic system in which actions ...
  • Jordaan, DB; Gilliland, S (South African Computer Society (SAICSIT), 1994)
    Research has shown that traditional teaching methods such as lecturing are not always as effective as the teacher or lecturer might like them to be. Frederick [3, p45] stated: 'Nearly all learning theorists.faculty development ...
  • Mende, J. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Research has a utilitarian role of providing the knowledge needed by the designers of mankind's artefacts. In this context four distinct categories of knowledge are identifiable. 1. Laws of Nature describe inherent ...
  • Machanick, Philip (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    There has been a proliferation of low-cost AI tools. Consideration is given as to how significant research may be conducted using these tools, in the light of experience of developing Al tools on large, expensive machines. ...
  • Kourie, D.G. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    LOTOS (Language Of Temporal Ordering Specification) is employed to give a partial specification of a system to connect RJE devices across an X.25 network. The system's implementation has been described fully elsewhere ...
  • Carey, C.W.; Hattingh, C.; Kourie, D.G.; Van den Heever, R.J.; Verkroost, R.F. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    This paper describes the practical aspects of a protocol system implementation. The software for a BSC/X.25 Packet Assembler/Disassembler (PAD) was designed, developed and tested. The PAD was designed to support ...
  • Schach, Stephen R. (South African Computer Society (SAICSIT), 1994)
    The object-oriented paradigm is widely promoted as the optimal way to develop software. However, there is as yet no experimental evidence to back that assertion, and it is extremely unlikely that such evidence could be ...
  • Roets, R (South African Computer Society (SAICSIT), 1994)
    This paper replicates a study conducted in the USA to test the perceived need for IT training in organisations by non-IS employees, and the need for more general business knowledge by IS employees. The hypothesis tested ...
  • Ram, V (South African Computer Society (SAICSIT), 1994)
    Computer Based Scheduling is an important activity especially in automated environments such as CIM (Computer Integrated Manufacturing ) where it is an integral part of the total manufacturing function. Developments in ...
  • Lutu, PEN (South African Computer Society (SAICSIT), 1994)
    Parallel execution strategies/or Prolog programs are reviewed. Three models, AOPM, APPNet and RAP are discussed in some detail. The AOPM and the APPNet are AND-OR parallel execution models and represent the two ends of the ...

Search UnisaIR


Browse

My Account