College of Science, Engineering and Technology: Recent submissions

  • McDermott, T.S. (Computer Society of South Africa (on behalf of SAICSIT), 1984)
    A language-independent syntax-directed editor for teaching programming languages on micro-computers is briefly described. The design of the configuring grammar and the lnternal tree-structure to be edited and interpreted ...
  • Labuschagne, W.A.; Van Rooyen, H.O. (Computer Society of South Africa (on behalf of SAICSIT), 1984)
    A technique for partially representing binary group operations by sets of binary relations was devised by Cayley. This technique can be generalised to permit the representation of arbitrary sets of n-ary relations {n ~ ...
  • Du Preez, L.S. (Computer Society of South Africa (on behalf of SAICSIT), 1984)
    A brief description of software configuration management principles is given, followed by a discussion on the application of these principles in a specific installation.
  • Finnie, G.R. (South African Institute of Computer Scientists and Information Technologists, 1991)
    Forecasting techniques are used extensively in a variety of business (and other) applications for the analysis and prediction of various factors of interest e.g. future market demand for a specific product. However, the ...
  • Erlank, S; Pelteret, D; Meskin, M (South African Institute of Computer Scientists and Information Technologists, 1991)
    The systems development process is commonly described in terms of a System Development Life Cycle (SDLC). There is a wide range of tools and techniques available to the system developer, and these are typically used for ...
  • Cloete, I; Theron, H (South African Institute of Computer Scientists and Information Technologists, 1991)
    Quinlan's ID3 is a popular and efficient algorithm for inducing decision trees from concept examples, where the examples are presented as vectors of attribute-value pairs. If some attributes have integer or real domains ...
  • Clayton, Peter G. (South African Institute of Computer Scientists and Information Technologists, 1991)
    This paper introduces a class of concurrent programming construct based on an interrupt driven paradigm. This programming model is designed to simplify the application of conventional imperative programming techniques ...
  • Bosua, R; Du Plessis, A.L (South African Institute of Computer Scientists and Information Technologists, 1991)
    Specification languages to be used in conjunction with Ada as the implementation language have been proposed in the literature. Simultaneously, methods for the development of real-time software systems have been introduced, ...
  • Barrow, J (South African Institute of Computer Scientists and Information Technologists, 1991)
    Hypertext is presented as a database accessing mechanism well-suited to computer aided learning applications. On the basis of informal experiments with prototype software, some benefits of structured hypertext are explored. ...
  • De Villiers, PJA (South African Computer Society (SAICSIT), 1992)
    A model checker automatically determines whether a model of a reactive system satisfies its specification. Temporal logic is used to specify the intended behaviour of a reactive system which is modelled as a transition ...
  • Wheeler, G; Kritzinger, Pieter S. (South African Computer Society (SAICSIT), 1992)
    The Protocol Engineering Workbench (PEW) is an integrated software system or tool for the analysis of communication protocols specified using the Estelle Formal Description Technique or FDT. The execution of systems specified ...
  • Theron, H; Cloete, I (South African Computer Society (SAICSIT), 1992)
    Thi spaper investigates the issues of specializing only a single best conjunction to employing a beam search when learning attribute-based concept descriptions using the GCA algorithm. We describe GCA, a recently introduced ...
  • Smith, DC; Newton, S; Riley, MJ (South African Computer Society (SAICSIT), 1992)
    Information Systems (IS), although a relatively new academic discipline, is receiving considerable attention in tertiary institutions in South Africa. Despite this, there is currently no standard curricula for IS graduates ...
  • Labuschagne, W.A.; Van der Westhuizen, PL (South African Computer Society (SAICSIT), 1992)
    The logician who encounters logic programming expects it to involve 'using predicate logic as a programming language'. He is soon disillusioned. He discovers that it really means 'programming in PROLOG', which in tum seems ...
  • Couger, JD; Smith, DC (South African Computer Society (SAICSIT), 1992)
    The South African computer industry suffers from a shortage of skilled staff. To maximise the productivity and motivation of Information Systems (IS) staff in their current and future jobs is therefore an important management ...
  • Clarke, MC (South African Computer Society (SAICSIT), 1992)
    In our desire for technical excellence, an appreciation of the human factors of computing is often overlooked. This paper proposes that the social and ethical implications of computers need to be understood by computer ...
  • Carson, DI; Oellermann, OR (South African Computer Society (SAICSIT), 1992)
    In this paper we discuss the problem of finding an upper bound on the genus of a graph. This problem has applications to circuit layouts. An electronic circuit may be modelled by a graph. By punching holes into the circuit ...
  • Calitz, AP; De Kock, G de V; Venter, DJL (South African Computer Society (SAICSIT), 1992)
    The evaluation of selection criteria for the admission of first year Computer Science students has been an ongoing project at the University of Port Elizabeth since 1984. Various selection criteria and methods, for example ...
  • Bradshaw, J (South African Computer Society (SAICSIT), 1992)
    This paper serves as an introduction to the areas of qualitative reasoning. The three main streams of qualitative reasoning are described: the component centered approach, the process centered approach and the constraint ...
  • Wulf, S. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    The need for modelling techniques to allow blocking of tasks prior to admission to the computer system in queueing network models is described. A detailed algorithm which presents a technique to enforce blocking by priority ...

Search UnisaIR


Browse

My Account