College of Science, Engineering and Technology: Recent submissions

  • Paijmans, H (South African Computer Society (SAICSIT), 1995)
    An overview is given of popular term-weighting schemes as used in Information Retrieval. The question is raised whether the word frequency based t f.idf weights may be used as a yardstick to compare schemes that are not ...
  • Oosthuysen, WH; McDonald, T (South African Computer Society (SAICSIT), 1995)
    Until some years ago, management of TCP/IP based products was done in a proprietary fashion. Many large companies build their own system-wide management facilities because of a lack of usable systems to manage heterogeneous ...
  • Messerschmidt, HJ (South African Computer Society (SAICSIT), 1995)
    There is an increasing amount of computer fraud in South Africa. A recent court case shows that Information Systems can actually assist criminals. The paper shows where the major loopholes are and suggests ways of improving ...
  • Ludik, J; Cloete, I (South African Computer Society (SAICSIT), 1995)
    The typical approach taken by other researchers to address the defects of standard backpropagation is to investigate alternative methods for selecting initial parameter values, or for adjusting parameter values during BP ...
  • Berman, Sonia; Walker, L. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    A high-level language for accessing a relational database is being developed at UCT. The system, known as HAL (High-level Access Language), provides complete data independence as users view the database in terms of ...
  • Kisimov, V; Da Silva, I (South African Computer Society (SAICSIT), 1995)
    Over a period of a few hours, every computer participating in a distributed system has many unused resources. If these resources can be combined, a large amount of computational power can be generated. This paper offers ...
  • Halland, KJ; Labuschagne, W.A. (South African Computer Society (SAICSIT), 1995)
    The relationships between the best-known forms of circumscription are elucidated with the aid of an hypothetical ancestor, which we choose to call naive circumscription.
  • Ridler, P.F. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Various ways of using random access memory to emulate a magnetic disc storage system are described and the advantages and disadvantages are enumerated. An algorithm for making use of a solid state disc is given which avoids ...
  • Morgan, C (South African Computer Society (SAICSIT), 1995)
    The refinement calculus, based on weakest preconditions, elaborates imperative program developments as a series of steps linked by a mathematical refinement relation. Specifications and executable code are regarded equally ...
  • Mende, J. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Research has a utilitarian role of providing the knowledge needed by the designers of mankind's artefacts. In this context four distinct categories of knowledge are identifiable. 1. Laws of Nature describe inherent ...
  • Machanick, Philip (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    There has been a proliferation of low-cost AI tools. Consideration is given as to how significant research may be conducted using these tools, in the light of experience of developing Al tools on large, expensive machines. ...
  • Kourie, D.G. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    LOTOS (Language Of Temporal Ordering Specification) is employed to give a partial specification of a system to connect RJE devices across an X.25 network. The system's implementation has been described fully elsewhere ...
  • Carey, C.W.; Hattingh, C.; Kourie, D.G.; Van den Heever, R.J.; Verkroost, R.F. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    This paper describes the practical aspects of a protocol system implementation. The software for a BSC/X.25 Packet Assembler/Disassembler (PAD) was designed, developed and tested. The PAD was designed to support ...
  • Byron-Moore, S.P. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Trends in operating systems are examined in the light of advances in computer hardware. Consideration is given to the desirability of a good, up-to-date single-user operating system. The specification and implementation ...
  • Van der Poel, K.G.; Bryson, I.R. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    The principles of protection of private information have gradually been defined during the last decades. The US Privacy Act of 1974 regulates practices of the federal government. Two committees of the UK government ...
  • Bruwer, P.J.S.; Hattingh, J.M. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Computer technology has grown exponentially in the course of the past decade in terms of sophistication - not only with regard to hardware and networks, but also with regard to mainframe and micro-computer systems. ...
  • Goslett, J.; Melton, A (South African Computer Society (SAICSIT), 1995)
    This tutorial is a companion paper to the tutorial Denotational Semantics and Domain Theory by Goslett, Hulley, and Melton. The purpose of the earlier tutorial was to present a computationally intuitive introduction to ...
  • Goldblatt, R (South African Computer Society (SAICSIT), 1995)
    These lectures provide an introduction to modal logic and its use in formalising reasoning about the behaviour of computational processes. They begin with a general introduction to the syntax, semantics, and proof-theory ...
  • Brinksma, E; Langerak, R (South African Computer Society (SAICSIT), 1995)
    We present an algorithm for the decomposition of processes in a process algebraic framework. Decomposition, or the refinement of process substructure, is an important design principle in the top-down development of concurrent ...
  • Theron, H; Cloete, I (South African Computer Society (SAICSIT), 1994)
    This paper presents a theoretical analysis of the search schemes employed by AQ, CN2 and the recently introduced BEXA algorithm. These covering algorithms induce disjunctive concept descriptions, and employ a general-to-specific ...

Search UnisaIR


Browse

My Account