College of Science, Engineering and Technology: Recent submissions

  • Smuts, W (South African Computer Society (SAICSIT), 1999)
    Most existing information security classification schemes use a 1-dimensional scale such as [top secret, secret, employee confidential, company confidential, restricted]. These classification schemes do not differentiate ...
  • Sanders, I; Lubinsky, D; Sears, M; Kourie, D (South African Computer Society (SAICSIT), 1999)
    Guarding and covering problems have great importance in Computational Geometry. In this article the notion of' a ray guard, a guard that can only 'see' along a single ray, is introduced. The problem of siting the fewest ...
  • Jansen van Rensburg, M (South African Computer Society (SAICSIT), 1999)
    This article provides a description of the current state of Object Orientation in South African companies. It forms part of an MSc research report, looking at the pitfalls and guidelines in the transition to 00. The problems ...
  • Patsouris, PA; Korostenski, M; Kissimov, V (South African Computer Society (SAICSIT), 1999)
    We introduce FMOB: a formal model for Objectbases. The term "Objectbase" represents better the widely used "object­ oriented database". FMOB consists of ( 1) objects (classes and their instances) with extended encapsulation ...
  • Paijmans, H (South African Computer Society (SAICSIT), 1999)
    This paper describes some experiments with the automated attribution of authorship. Lexical cohesion in combination with machine learning techniques are used as a method to compare texts of different authors. A methodology ...
  • Nieuwoudt, C; Botha, EC (South African Computer Society (SAICSIT), 1999)
    We implement and evaluate the performance of a state-of-the-art connected digit recognition system for spoken Afrikaans digits. The creation of a database for our purpose is discussed. Results indicate that an efficient ...
  • Cronje, JC; Baras Baker, SJ (South African Computer Society (SAICSIT), 1999)
    The shortage of suitably qualified middle management in South Africa, and its impact on the potential success of the RDP is well documented. There are various ways of addressing this problem. These methods range from ...
  • Abdulrab, H; Ngomo, M; Drissi-Talbi, A (South African Computer Society (SAICSIT), 1999)
    LOP (Logic, Object, Parallelism) is a system that integrates object-oriented and constraint logic programming. It is entirely designed and implemented, using object-oriented methodology, under the form of hierarchical ...
  • Van der Poll, JA; Labuschagne, WA (South African Computer Society (SAICSIT), 1999)
    A formal specification language like Z permits the specifier to construct proofs which corroborate the aptness of the spec­ification. This process may be facilitated by establishing a partnership between the specifier and ...
  • Schach, Stephen R. (Computer Society of South Africa (on behalf of SAICSIT), 1982)
    data structure and its computer implementation. However, in the course of debugging a program written in a high-level language, the user is sometimes forced to try to understand the low-level implementation of his data ...
  • Venter, BH (Computer Society of South Africa (on behalf of SAICSIT), 1989)
    Computer Science is a relatively recent scientific discipline. It has seen rapid growth and even more rapid change. Not surprisingly there is constant controversy among computer scientists about the nature of the ...
  • Machanick, Philip (Computer Society of South Africa (on behalf of SAICSIT), 1989)
    Appropriate technology refers to technology appropriate for use in less developed parts of the world, especially the Third World; this paper raises some problems in adapting a definition of appropriate technology to ...
  • Kourie, D.G. (Computer Society of South Africa (on behalf of SAICSIT), 1989)
    A proposal for defining abstractions and refinements is given in terms of three-valued logic applied to a domain of discourse consisting of a property and an entity set. Definitions for several related concepts flow ...
  • Finnie, G.R. (Computer Society of South Africa (on behalf of SAICSIT), 1989)
    Expert system development environments based on current language constructs such as rules and frames have been criticised for approaching the task of problem solving from too low a level of abstraction. This paper describes ...
  • Atkinson, C.R.; Lay, P.M.Q. (Computer Society of South Africa (on behalf of SAICSIT), 1989)
    17zis paper addresses the challenging question of the rigour of the systems analysis process. First of all it discusses the nature of analysis, concluding that, contradictory to cu"ent opinion, it can best be described ...
  • De Kock, G de V (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Norms to measure the success of surname matching algorithms for use in a South African Genealogical Database are proposed. Surnames in the database can be grouped in equivalence classes. These algorithms are taken from ...
  • Smith, T.H.C. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    We propose an edge exchange algorithm/or finding a cheaper 1-matchingfrom a given ]-matching as well as a heuristic algorithm/or constructing a relatively cheap ]-matching from the optimal solution of a relaxation of the ...
  • Short, R.M.C. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Learning about the domain into which an information system will fit is an essential part of the system development process. In this paper it is argued that the first stage of the development process should be learning ...
  • Postma, Stef W.; Philips, N.C.K. (S W Postma and N C K Phillips (1988) The parallel conditional. Computer Society of South Africa (on behalf of SAICSIT), 1988)
    The parallel conditional is a new but natural programming language construct. It is particularly suited to evaluation on parallel maclunes and generalizes other well known conditionals.
  • McDonald, T (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    In contrast to other countries, South Africa has sadly lacked a computer network for researchers. This paper starts with previous efforts to establish a national network for researchers and gives possible reasons for ...

Search UnisaIR


Browse

My Account