College of Science, Engineering and Technology: Recent submissions

  • Wagener, M.J. De Kock, G de V (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Verslag word gelewer oor 'n prestasiemeting van 'n stel letter-na-klank reels vir die omskakeling van Afrikaanse teks na foneme. Die prestasie van die stel reels word getoets deur gebruik te maak van 'n verteenwoordigende ...
  • Rennhackkamp, M.H. Von Solms, S.H. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Numerous concurrency control methods have been proposed for distributed databases. Various crz·teria are used to compare these methods. The comparisons range from qualitative overviews through quantitative analyses to ...
  • Morgan, C McI, A (South African Computer Society (SAICSIT), 1998)
    Dijkstra's guarded-command language GCL contains explicit 'demonic' nondeterminism, representing abstraction from (or ignorance of ) which of two program fragments will be executed. We introduce probabilistic nondeterminism ...
  • Misra, J (South African Computer Society (SAICSIT), 1998)
    This paper presents a short introduction to the UNITY logic, a fragment of linear temporal logic. The logic was designed to specify safety and progress properties of reactive systems. A version of the UNITY ...
  • Jackson, MA (South African Computer Society (SAICSIT), 1998)
    The notion of a problem frame is introduced and explained, and its use in analysing and structuring problems is illustrated. A problem frame characterises a class of simple problem. Realistic problems are seen as compositions ...
  • Gries, D Schneider, FB (South African Computer Society (SAICSIT), 1998)
  • Postma, Stef W. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Two topics are studied, related and generalised in this paper - the Knuth transform of an arbitrary tree to a binary tree, and Pfaltz' s definition of a data structure as a graph with assignments. Trees are defined in ...
  • Bjorner, D (South African Computer Society (SAICSIT), 1998)
    In this paper we show how details of a software design emerges in two steps: software architecture and program organisation and from first having established careful descriptions of the application domain and of functional ...
  • Orlowska, M.E. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    We propose a mathematical model of a database with incomplete information, which we call the N-system. Basically speaking, such a system stores information concerning properties of some objects. The information may be ...
  • Mende, J. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    In designing a computer-based information system one can partition the transformation process in many alternative ways. To find the optimal partition, a designer needs explicit rules which predict the most successful ...
  • Tcheeko, L (South African Computer Society (SAICSIT), 1998)
    The pedagogical assessment of a tutoring system relies upon a proof of convergence: for such a tutor the correction of student mistakes must not forever delay the teaching process. Such a tutor must provide uniform diagnosis ...
  • Ram, V (South African Computer Society (SAICSIT), 1998)
    Shared beliefs and knowledge are an integral part of an organisation's identity and a prerequisite for collective func­tioning. Multiagent systems that support or emulate cooperative problem solving in such a context cannot ...
  • Pretorius, L (South African Computer Society (SAICSIT), 1998)
    We introduce a number of typed lambda calculi, show how type theory may be used as basis for a proof assistant, and illustrate this with the Coq proof assistant.
  • Paijmans, H (South African Computer Society (SAICSIT), 1998)
    A number of methods for feature reduction and feature selection in text classification and information retrieval systems are compared. These include feature sets that are constructed by Latent Semantic Indexing, 'local ...
  • Machanick, P Salverda, P (South African Computer Society (SAICSIT), 1998)
    The RAMpage memory hierarchy addresses the growing concern about the memory wall - the possibility that the CPU­-DRAM speed gap will ultimately limit the benefits of rapid improvement in CPU speed. Reducing references to ...
  • Cooper, A.K. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Geographical information consists of non-spatial information (alphanumeric) and spatial information (vector and raster), the relationships between the non-spatial information and the spatial information, as well as ...
  • Knottenbelt, W Kritzinger, P (South African Computer Society (SAICSIT), 1998)
    Despite many advances in queueing theory and other modelling paradigms, one persistenty discovers real life stochastic systems which do not yield neatly to existing methods for their performance analysis. In most such ...
  • Cloete, E Venter, LM (South African Computer Society (SAICSIT), 1998)
    Conventional image compression strategies present a number of uncomfortable limitations. Many of the impediments can be overcome by Fractal Image Compression (FIC). FIC is rooted strongly in mathematics. In comparison to ...
  • Venter, B.H. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    An operating system provides, among other things, an operational definition of a process. The concept of a process is one of the fundamental concepts of Computer Science, and the designer of an operating system must strive ...
  • Venter, B.H. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    The current generation of widely-used, multi-user, general-purpose operating systems have evolved from versions that were designed when many of the issues that are important today were unimportant or not even thought of. ...

Search UnisaIR


Browse

My Account