College of Science, Engineering and Technology: Recent submissions

  • Cuthbertson, A.J. Van Niekerk, I.J. Turton, Trevor (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    This paper describes the research that was undertaken in designing a disk space management system. The system has strong similarities to the management of real storage in a virtual storage environment. These similarities ...
  • Currin, Desmond C. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    Generalized network problems involve the optimization of a flow through a network. In contrast to normal networks, generalized networks include multipliers which alter the flow as it passes through the arcs. This enables ...
  • Bruwer, P.J.S. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    Performance evaluation techniques can contribute substantially to the successful management of the information services function in an organization. Unfortunately the design and implementation of computer-based ...
  • Berman, Sonia (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    An automated database design tool called ADD has been developed at the University of Cape Town. This system obtains a requirements specification from a user and from this generates a relation scheme and a Codasyl schema. ...
  • Wulf, S. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    An overall methodology for database design is presented. This includes creation of a data dictionary and relational analysis. An algorithm is presented to create a conceptual schema or logical database design from the set ...
  • Visser, P. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    This paper presents a summary of tutorial material on accepted management techniques and philosophies as applied to the development of large software systems, based upon the documentation for such systems.
  • Van Niekerk, J.C. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    The operational approach to the analysis of the single server model is discusses. Firstly Buzen's operational equivalent to the stochastic birth/death Markov model is presented, whereafter generalisations of the model are ...
  • Schach, Stephen R. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    Three levels of traces for data structures (as opposed to simple variables) are defined. A machine-code core dump is essentially a low level trace. A high level trace reflects the high level language in which the data ...
  • Van Rooyen, Martha H. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    SCRAP is a high-level language that provides facilities for systems progrc~ff)ming, but can equally well be used for applications programming. The prominent features of the language are a well-defined syntax, a modular ...
  • Popelas, Judy Mallino Calingaert, Peter (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    The correction of errors in programs can be based on an analysis, that subordinates syntactic relationships to functional relationships among elements of a program. For this purpose, case grammars, originally developed ...
  • Hetzel, Bill Calingaert, Peter (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    A controlled experiment was designed and conducted to compare three methods for detecting errors in computer programs: disciplined, structured reading; specification or black-box testing; and a refined form of typical ...
  • Viktor, HL Rennhackkamp, MH (South African Computer Society (SAICSIT), 1992)
    The technology of distributed databases is based on two other technologies which have developed a solid foundation: computer networks and centralized databases. A distributed database designer should therefore address ...
  • van der Poel, E Cloete, I (South African Computer Society (SAICSIT), 1992)
    In Artificial Neural Network (ANN) simulation it is usually necessary to examine the behaviour of the ANN and detect problems if they occur. However, due to the large volume and high dimensionality of data generated during ...
  • Tredoux, G (South African Computer Society (SAICSIT), 1992)
    The mechanization in Higher Order Logic of a general- purpose operational semantics for programming languages is described. The mechanization allows the sound derivation of Dijkstra-style axiomatic semantics. A small ...
  • Theron, PZ Cloete, I (South African Computer Society (SAICSIT), 1992)
    The problem of automatic acquisition of lexical-semantic relations for Afrikaans nouns from a dictionary is addressed. The acquisition process is improved over previous approaches by implementing both typographic constraints ...
  • Greenwood, PH Nash, PE (South African Computer Society (SAICSIT), 1992)
    The purchase cost of specialized subroutine libraries can be high, especially if they need to be duplicated on several hosts on a local area network. A remote library access system has been designed, and a prototype built, ...
  • Gabbay, D Ohlbach, HJ (South African Computer Society (SAICSIT), 1992)
    An algorithm is presented which eliminates second-order quantifiers over predicate variables in formulae of type 3Pi , ...,Pn 1/; where 1/J is an arbitrary formula of first-order predicate logic. The resulting formula is ...
  • Foss, RJ Rehmet, GM Watkins, RC (South African Computer Society (SAICSIT), 1992)
    This paper describes the development of a memory resident version of the Xinu operating system for the IBM PC range of computers. The operating system co-resides with the MS-DOS operating system. The need for the operating ...
  • Clayton, Peter G. de-Heer-Menlah, FK Wentworth, EP (South African Computer Society (SAICSIT), 1992)
    This paper presents a process placement algorithm, designed for use in a transputer-based implementation of the Linda programming environment. A static, heuristic approach is adopted, which takes cognisance of the special ...
  • Brand, M Wood, PT (South African Computer Society (SAICSIT), 1992)
    Unlike the relational model, there is no universally accepted object-oriented data model. This has led to systems being defined in an ad-hoc manner, with the resultant difficulty of determining exactly what features are ...

Search UnisaIR


Browse

My Account