SAICSIT Digital Archive: Recent submissions

  • Scheepers, CF (1987)
    A method is presented whereby the interior of boundary-defined regions on vector type devices may be shaded using regular line, cross-hatch and dot patterns. Different shades are realized by changing ...
  • Rennhackkamp, MH (1987)
    Numerous concurrency control methods have been proposed for distributed databases. Various criteria are used to compare these methods. The comparisons range from qualitative overviews through quantitative analyses ...
  • Morris, MA (1987)
    Difference equation methods are used to develop redundant (n-version) programs required for high reliability computing systems. The n-version programs are developed by exploiting the iterative nature of real time software. The ...
  • Mori, R (1987)
    The programming requirements of the Artificial Intelligence ( AI ) community have led to the creation of tools to aid the software development process. One such tool is the programming environment. ...
  • Mende, J (1987)
    After identifying the processing functions required in a computer based information system, the designer needs to combine them into an optimal se t of load un its. Some “packaging” arrangements yield a better system than ...
  • Krzesinski, AE (1987)
    A Multidass Queueing Network (MQN) Q ( N, .M ) consisting of M centres with index set .M and population vector N is partitioned into two subnetworks Q ( fJ -V , .M -1) ) and Q (V , V ) . The centres in Q (V , · V ) are ...
  • Punt, JL (1987)
    This paper discusses a protocol validation system. The input to the system is a protocol definition specified in the specification language ESTELLE. The ESTELLE specification is the input to a translator program which ...
  • Philips, MJ (1987)
    The difficulties encountered by users without experience of the use of multiple databases are described, as well as an approach which allow such users to make worthwhile use of these systems, encompassing potentially ...
  • Orlowska, ME (1987)
    We propose a mathematical model of a database with incomplete information, which we call the N-system. Basically speaking, such a system stores information concerning properties of some objects. The information may be ...
  • Kourie, DG (1987)
    The role of traces in the context of formal description techniques is discussed, as well as issues arising in the generation of these traces by means of software. A trace generator (written in Prolog) for systems described ...
  • Gorringe, HP (1987)
    In any form of display where three-dimensional images are required to be projected onto a two-dimensional display the hidden surface or hidden line removal certainly helps to enhance the realism of the final image. This ...
  • Ehlers, EM; Von Solms, SH (1987)
    A representation of chemical molecules by Random Context Structure Grammars is proposed. Random Context Structure Grammars generate three-dimensional digital structures. Random Context Structure Grammars and Random Context ...
  • Du Plessis, L; Borman, C (1987)
    A formal requirements specification language, the ELSIM language, is presented. The language uses conceptual models for modelling data processing, and control characteristics and behaviour of real-time systems, and is ...
  • Bishop, JM (1987)
    This paper looks at ways of obtaining a distributed version of an Ada program. Since current approaches require a large investment in system software, we propose instead the use of an Adapter, which can be a manual methodology ...
  • Van Biljon, WR (1987)
    The expression structure of programming languages is examined. Two weaknesses are identified. The first pertains to the inability, or limited ability, to redefine operators or to define new operators. The second pertains ...
  • Berman, S (1987)
    Semantic data models were originally introduced as a tool for data description and design. SDMI (Semantic Data Model Interface) investigates their use in another role - as the basis for a data manipulation language - and ...
  • Berman, S (1987)
    Persistent data is defined as that which survives on secon­dary store after program execution terminates. In a persistent programming language there is no distinction what ­ever between persistent data and ...
  • Barrow, J (1995)
    This paper describes SuperText, a computer program designed to support productive expository writing processes among students at a distance teaching university . Being able to write well is an important communication ...
  • Addison, TM; Hamersma, S (1995)
    We discuss the implementation of Rhoda, our Linda-like Tuple Space server which runs under the Helios operating system. The approach analyses and partitions tuple space at compile time in order to reduce the run time- ...
  • Buhler, D; Nusser, G; Gruhler, G; Kuchlin, W (South African Computer Society (SAICSIT), 1999)
    This paper describes the Java CAN API a portable and extensible application interface to arbitrary CANopen fieldbus devices. This API forms the basis for the implementation of JRCC (Java Remote CAN Control), a tool which ...

Search UnisaIR


Browse

My Account