SAICSIT Digital Archive: Recent submissions

  • Finnie, G.R. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    This paper describes a study of changes in attitude toward computers exhibited by novice student users during a first course in business computing. Several dimensions of attitude were established by factor analysis. ...
  • Pangalos, G; Khair, M (South African Computer Society (SAICSIT), 1996)
    A database design methodology is presented in this paper which aims to improve the security of medical database systems. The proposed methodology is based on both the discretionary and the mandatory database security ...
  • Ehlers, E.M.; von Solms, S. H. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Random Context Structure Grammars are defined. The language generated by a Random Context Structure Grammar is a set of three-dimensional digital structures. A hierarchy of Random Context Grammars is discussed briefly. ...
  • Clayton, Peter G. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    This paper advocates hands-on training on microprogrammable hardware for Computer Science students, and suggests an appropriate microprogram development approach for this purpose. The particular tool discussed is ...
  • Muftic, S (South African Computer Society (SAICSIT), 1996)
    The paper describes the design details and implementation results of the completely integrated, functional and operational security system, suitable for open distributed environments. Functionality means that security ...
  • Hoffman, LJ (South African Computer Society (SAICSIT), 1996)
    Cryptology policy deals not only with various technological encryption methods but also with thorny political and adminis­trative problems. It is a challenge to address these in a timely and open manner. The problems arise ...
  • Roos, Jan (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    ESTELLE is being developed by the International Standards Organisation (ISO), Technical Committee (TC) 97, Sub-committee (SC) 21, Working Group (WG) 1, Formal Definition Technique (FDT) Subgroup B to fulfil the need for ...
  • Podevyn, D. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    A knowledge engineering tool called GESS (General Expert System Shell) is presented which is used for building different types of expert systems. Knowledge representation is based on direct extensions of the idea of decision ...
  • Pirow, Peter Cluver (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    This paper describes the concept of computeracy as it applies to research workers and argues that research will be improved if the level of computeracy can be raised.
  • Levieux, Craig (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    The role of teachers in a University Computer Science course is examined. The case for education rather than training is put. It is argued that current methods of teaching are not as effective as they could be. A case ...
  • Kritzinger, Pieter S. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Current scientific and trade literature are flooded with information about local area networks. Details about physical media and their properties, versions of media access methods confusingly called protocols, variations ...
  • Hoogendoorn, C.H. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    The term "software engineering" has been in use for nearly 20 years since the so-called "software crisis" was identified in the late 1960's. However, it is only comparatively recently that courses in software engineering ...
  • Postma, Stef W. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    The Department of Computer Science of the Pietermaritzburg Campus of the University of Natal is one of the youngest departments in the country, although service courses to the Faculty of Commerce have been available ...
  • Finnie, G.R. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Learning to use a decision support system involves both formal and informal teaching as well as self-teaching. Many cases have been documented of unsuccesful implementation of DSS or MIS in organisations and identifying ...
  • Berman, Sonia (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    An information management system with a semantic data model interface is currently being developed at UCT. This system provides high-level, non-procedural access to information and enforces powerful integrity and security ...
  • Whittaker, L (South African Computer Society (SAICSIT), 1996)
    While much has been written describing the necessity for and effects of Business Process Reengineering (BPR), little research has been conducted into the evaluation of BPR projects. This paper describes the result of a ...
  • Petkov, D (South African Computer Society (SAICSIT), 1996)
    This paper suggests an approach for the selection of microcomputer equipment in a decentralised environment. It is based on a modification of the procedure of the Analytic Hierarchy Process (AHP) by T. Saaty. The structuring ...
  • Machanick, Philip (South African Computer Society (SAICSIT), 1996)
    Object-oriented techniques are shown to hold promise for addressing the growing speed gap between memory and processors on shared-memory multiprocessors. However, reducing cache misses can be at the expense of more misses ...
  • De Jager, N; Roos, J (South African Computer Society (SAICSIT), 1996)
    This article discusses various issues around the Transmission Convergence (TC) sublayer in the physical layer of ATM. A brief introduction is given to the layered approach and functionality of the ATM physical layer. This ...
  • Froneman, L; Roode, JD (South African Computer Society (SAICSIT), 1996)
    Many curriculum designs are based purely on what educators think it should be, reflecting their own experiences or idiosyn­crasies, with little reference to the needs of the information systems field. A number of studies ...

Search UnisaIR


Browse

My Account