School of Computing: Recent submissions

  • De Villiers, PJA (South African Computer Society (SAICSIT), 1992)
    A model checker automatically determines whether a model of a reactive system satisfies its specification. Temporal logic is used to specify the intended behaviour of a reactive system which is modelled as a transition ...
  • Wheeler, G; Kritzinger, Pieter S. (South African Computer Society (SAICSIT), 1992)
    The Protocol Engineering Workbench (PEW) is an integrated software system or tool for the analysis of communication protocols specified using the Estelle Formal Description Technique or FDT. The execution of systems specified ...
  • Theron, H; Cloete, I (South African Computer Society (SAICSIT), 1992)
    Thi spaper investigates the issues of specializing only a single best conjunction to employing a beam search when learning attribute-based concept descriptions using the GCA algorithm. We describe GCA, a recently introduced ...
  • Smith, DC; Newton, S; Riley, MJ (South African Computer Society (SAICSIT), 1992)
    Information Systems (IS), although a relatively new academic discipline, is receiving considerable attention in tertiary institutions in South Africa. Despite this, there is currently no standard curricula for IS graduates ...
  • Labuschagne, W.A.; Van der Westhuizen, PL (South African Computer Society (SAICSIT), 1992)
    The logician who encounters logic programming expects it to involve 'using predicate logic as a programming language'. He is soon disillusioned. He discovers that it really means 'programming in PROLOG', which in tum seems ...
  • Couger, JD; Smith, DC (South African Computer Society (SAICSIT), 1992)
    The South African computer industry suffers from a shortage of skilled staff. To maximise the productivity and motivation of Information Systems (IS) staff in their current and future jobs is therefore an important management ...
  • Clarke, MC (South African Computer Society (SAICSIT), 1992)
    In our desire for technical excellence, an appreciation of the human factors of computing is often overlooked. This paper proposes that the social and ethical implications of computers need to be understood by computer ...
  • Carson, DI; Oellermann, OR (South African Computer Society (SAICSIT), 1992)
    In this paper we discuss the problem of finding an upper bound on the genus of a graph. This problem has applications to circuit layouts. An electronic circuit may be modelled by a graph. By punching holes into the circuit ...
  • Calitz, AP; De Kock, G de V; Venter, DJL (South African Computer Society (SAICSIT), 1992)
    The evaluation of selection criteria for the admission of first year Computer Science students has been an ongoing project at the University of Port Elizabeth since 1984. Various selection criteria and methods, for example ...
  • Bradshaw, J (South African Computer Society (SAICSIT), 1992)
    This paper serves as an introduction to the areas of qualitative reasoning. The three main streams of qualitative reasoning are described: the component centered approach, the process centered approach and the constraint ...
  • Wulf, S. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    The need for modelling techniques to allow blocking of tasks prior to admission to the computer system in queueing network models is described. A detailed algorithm which presents a technique to enforce blocking by priority ...
  • Van Rooyen, H.O.; Weiermans, D.J. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    Nebula modell_ing is_ a generalised structural modelling technique which applies to any finite set of objects (entities) and n-ary relat1onsh1ps (n ~2). A nebula model can be presented in either diagrammatic or tabular ...
  • Schach, Stephen R. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    Details are given of an implementation of Grimbleby's algorithm for the common spanning tree problem with running times up to 50% less than for the original implementation. An explanation is given as to why implementations ...
  • Mann, R.J. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    A basic description of the facilities of the computer modelling package, AUTO-CONFIGURATER, is presented together with detailed procedures to calculate the required input parameters from monitor statistics. Techniques to ...
  • Cuthbertson, A.J.; Van Niekerk, I.J.; Turton, Trevor (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    This paper describes the research that was undertaken in designing a disk space management system. The system has strong similarities to the management of real storage in a virtual storage environment. These similarities ...
  • Currin, Desmond C. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    Generalized network problems involve the optimization of a flow through a network. In contrast to normal networks, generalized networks include multipliers which alter the flow as it passes through the arcs. This enables ...
  • Bruwer, P.J.S. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    Performance evaluation techniques can contribute substantially to the successful management of the information services function in an organization. Unfortunately the design and implementation of computer-based ...
  • Berman, Sonia (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    An automated database design tool called ADD has been developed at the University of Cape Town. This system obtains a requirements specification from a user and from this generates a relation scheme and a Codasyl schema. ...
  • Wulf, S. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    An overall methodology for database design is presented. This includes creation of a data dictionary and relational analysis. An algorithm is presented to create a conceptual schema or logical database design from the set ...
  • Visser, P. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    This paper presents a summary of tutorial material on accepted management techniques and philosophies as applied to the development of large software systems, based upon the documentation for such systems.

Search UnisaIR


Browse

My Account