SAICSIT Digital Archive: Recent submissions

  • Bishop, JM (South African Computer Society (SAICSIT), 1996)
    The survey of staff and student numbers done in 1992 provided the first country-wide picture of computing departments in South Africa. This report presents the picture three years later, from data collected in 1995. It ...
  • Parkinson, E; Warren, PR (South African Computer Society (SAICSIT), 1995)
    Many scheduling problems can be modelled as graph colouring problems. This paper gives a survey of heuristic algorithms used to colour graphs by describing a number of such algorithms found in the literature using an ...
  • Vahed, A (South African Computer Society (SAICSIT), 1995)
    The associative network presents a practical and efficient means for the storage and retrieval of data. Although the recall abilities of single-layer associative memories have been well researched [3], little investigation ...
  • De Ru, WG; Eloff, JHP (South African Computer Society (SAICSIT), 1996)
    This paper presents a methodology for the reinforcement of password authentication with the use of typing biometrical mechanisms. Typing biometrics refers to the analysis of keystroke patterns, which is unique for each ...
  • Bruwer, P.J.S. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Some factors which may influence the attitude of the user toward a computerized system are investigated in this article. The research was done in South Africa involving the users of computer-based systems in two organizations. ...
  • Anderssen, E.C.; von Solms, S. H. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    A computer aided instruction facility is presented, in which the simulation of field battles introduces history students to the dynamic relationships between space and time in a historical perspective. Information on a ...
  • Van der Vegte, L.J. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    In this article a brief overview is given of specification techniques in general and in particular, specification techniques used for the specification of communication protocols. This discussion forms the background ...
  • Tromp, PJ; Roode, JD (South African Computer Society (SAICSIT), 1995)
    In this paper the collaborative approach to management is examined and, in particular, how this approach could benefit from the right technological support. Collaborative management focuses on the joint performance of ...
  • Paijmans, H (South African Computer Society (SAICSIT), 1995)
    An overview is given of popular term-weighting schemes as used in Information Retrieval. The question is raised whether the word frequency based t f.idf weights may be used as a yardstick to compare schemes that are not ...
  • Oosthuysen, WH; McDonald, T (South African Computer Society (SAICSIT), 1995)
    Until some years ago, management of TCP/IP based products was done in a proprietary fashion. Many large companies build their own system-wide management facilities because of a lack of usable systems to manage heterogeneous ...
  • Messerschmidt, HJ (South African Computer Society (SAICSIT), 1995)
    There is an increasing amount of computer fraud in South Africa. A recent court case shows that Information Systems can actually assist criminals. The paper shows where the major loopholes are and suggests ways of improving ...
  • Ludik, J; Cloete, I (South African Computer Society (SAICSIT), 1995)
    The typical approach taken by other researchers to address the defects of standard backpropagation is to investigate alternative methods for selecting initial parameter values, or for adjusting parameter values during BP ...
  • Berman, Sonia; Walker, L. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    A high-level language for accessing a relational database is being developed at UCT. The system, known as HAL (High-level Access Language), provides complete data independence as users view the database in terms of ...
  • Kisimov, V; Da Silva, I (South African Computer Society (SAICSIT), 1995)
    Over a period of a few hours, every computer participating in a distributed system has many unused resources. If these resources can be combined, a large amount of computational power can be generated. This paper offers ...
  • Halland, KJ; Labuschagne, W.A. (South African Computer Society (SAICSIT), 1995)
    The relationships between the best-known forms of circumscription are elucidated with the aid of an hypothetical ancestor, which we choose to call naive circumscription.
  • Ridler, P.F. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Various ways of using random access memory to emulate a magnetic disc storage system are described and the advantages and disadvantages are enumerated. An algorithm for making use of a solid state disc is given which avoids ...
  • Morgan, C (South African Computer Society (SAICSIT), 1995)
    The refinement calculus, based on weakest preconditions, elaborates imperative program developments as a series of steps linked by a mathematical refinement relation. Specifications and executable code are regarded equally ...
  • Mende, J. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Research has a utilitarian role of providing the knowledge needed by the designers of mankind's artefacts. In this context four distinct categories of knowledge are identifiable. 1. Laws of Nature describe inherent ...
  • Machanick, Philip (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    There has been a proliferation of low-cost AI tools. Consideration is given as to how significant research may be conducted using these tools, in the light of experience of developing Al tools on large, expensive machines. ...
  • Kourie, D.G. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    LOTOS (Language Of Temporal Ordering Specification) is employed to give a partial specification of a system to connect RJE devices across an X.25 network. The system's implementation has been described fully elsewhere ...

Search UnisaIR


Browse

My Account