Quaestiones Informaticae (QI): Recent submissions

  • Machanick, Philip (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    There has been a proliferation of low-cost AI tools. Consideration is given as to how significant research may be conducted using these tools, in the light of experience of developing Al tools on large, expensive machines. ...
  • Kourie, D.G. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    LOTOS (Language Of Temporal Ordering Specification) is employed to give a partial specification of a system to connect RJE devices across an X.25 network. The system's implementation has been described fully elsewhere ...
  • Carey, C.W. Hattingh, C. Kourie, D.G. Van den Heever, R.J. Verkroost, R.F. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    This paper describes the practical aspects of a protocol system implementation. The software for a BSC/X.25 Packet Assembler/Disassembler (PAD) was designed, developed and tested. The PAD was designed to support ...
  • Byron-Moore, S.P. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Trends in operating systems are examined in the light of advances in computer hardware. Consideration is given to the desirability of a good, up-to-date single-user operating system. The specification and implementation ...
  • Van der Poel, K.G. Bryson, I.R. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    The principles of protection of private information have gradually been defined during the last decades. The US Privacy Act of 1974 regulates practices of the federal government. Two committees of the UK government ...
  • Bruwer, P.J.S. Hattingh, J.M. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    Computer technology has grown exponentially in the course of the past decade in terms of sophistication - not only with regard to hardware and networks, but also with regard to mainframe and micro-computer systems. ...
  • Handley, C.C. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    The problem of finding all prime numbers less than some specified maximum is frequently set as an exercise to beginning programmers, particular students doing their first programming course at University. Several ...
  • Berman, Sonia (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    A persistent programming language PPL is currently being designed at the University of Cape Town. The language treats persistence (permanent storage) as an orthogonal property of data and is consistent in its treatment of ...
  • Aik-Koen, Heng (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    This paper suggests a method to minimize the roundoff errors of adding N positive nimbers. The idea of construction can be easily applied to a linear recurrence process.
  • Aik-Koen, Heng (Computer Society of South Africa (on behalf of SAICSIT), 1986)
  • Philips, N.C.K. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    This paper presents an axiomatic specification of a data type which is shown to be equivalent to the Vienna data structures. The advantage of this alternative approach is its obvious simplicity.
  • Mende, J. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    The success of a research project depends upon the inputs and outputs selected by the researcher, a poor choice entailing useless results or wasted efforts.To avoid this one might consider the following alternatives: t. ...
  • Finnie, G.R. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    This paper describes the structure of a simple nonprocedural financial modelling system designed to collect a variety of statistics on aspects of novice interaction with decision support systems. Some findings on the use ...
  • Dempster, Robert (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    The S(tack), E(nvironment), C(ontrol) and D(ump) machine was invented by Landin (1964) to perform the mechanical evaluation of symbolic expressions. The evaluation of an expression invariably involves the application of ...
  • Bishop, J.M. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    The programming skills taught in first year computer science courses are more difficult to assess than the skills in older science courses because of the very large numbers of students involved coupled with material ...
  • Sutcliffe, Geoff (Computer Society of South Africa (on behalf of SAICSIT), 1985)
    In general graph theorists have a limited knowledge of computers and computing, and are unaware of the possible variations of representation available, and in what circumstances which representation would be better. To ...
  • Short, R. (Computer Society of South Africa (on behalf of SAICSIT), 1985)
    Formalisms comprise the essential bricks and mortar that we need in order to construct information systems. Not surprisingly therefore the invention and refinement of formalisms has formed and continues to form a ...
  • Machanick, Philip (Computer Society of South Africa (on behalf of SAICSIT), 1985)
    After a brief look at how the notion of the stored program is applied by programmers in the area of Artificial Intelligence (Al), we shall look at a specific Al tool: a production svstem. The discussion is at a ...
  • Turton, Trevor (Computer Society of South Africa (on behalf of SAICSIT), 1984)
    This paper describes computer design which 'would achieve a high instruction throughput rate on a relatively modest amount of hardware. It is based on multiprogramming the CPU at a sub-instruction level. The design will ...
  • Richfield, J.M. (Computer Society of South Africa (on behalf of SAICSIT), 1984)
    Structured program design is urged as a rewarding vehicle for the introduction of computer concepts to age groups ranging from mid primary school to senior management. Progressively expanded subsets of the material form ...

Search UnisaIR


Browse

My Account