School of Computing: Recent submissions

  • Pretorius, L (South African Computer Society (SAICSIT), 1998)
    We introduce a number of typed lambda calculi, show how type theory may be used as basis for a proof assistant, and illustrate this with the Coq proof assistant.
  • Paijmans, H (South African Computer Society (SAICSIT), 1998)
    A number of methods for feature reduction and feature selection in text classification and information retrieval systems are compared. These include feature sets that are constructed by Latent Semantic Indexing, 'local ...
  • Machanick, P; Salverda, P (South African Computer Society (SAICSIT), 1998)
    The RAMpage memory hierarchy addresses the growing concern about the memory wall - the possibility that the CPU­-DRAM speed gap will ultimately limit the benefits of rapid improvement in CPU speed. Reducing references to ...
  • Cooper, A.K. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Geographical information consists of non-spatial information (alphanumeric) and spatial information (vector and raster), the relationships between the non-spatial information and the spatial information, as well as ...
  • Knottenbelt, W; Kritzinger, P (South African Computer Society (SAICSIT), 1998)
    Despite many advances in queueing theory and other modelling paradigms, one persistenty discovers real life stochastic systems which do not yield neatly to existing methods for their performance analysis. In most such ...
  • Cloete, E; Venter, LM (South African Computer Society (SAICSIT), 1998)
    Conventional image compression strategies present a number of uncomfortable limitations. Many of the impediments can be overcome by Fractal Image Compression (FIC). FIC is rooted strongly in mathematics. In comparison to ...
  • Venter, B.H. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    An operating system provides, among other things, an operational definition of a process. The concept of a process is one of the fundamental concepts of Computer Science, and the designer of an operating system must strive ...
  • Venter, B.H. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    The current generation of widely-used, multi-user, general-purpose operating systems have evolved from versions that were designed when many of the issues that are important today were unimportant or not even thought of. ...
  • Clarke, MC; Finnie, GR (South African Computer Society (SAICSIT), 1998)
    A modified version of Lee's instrument for measuring attitudes to computers was administered to two groups of first-year university students separated by a period of twelve years. Factor analysis was applied to these two ...
  • Vosloo, I (South African Computer Society (SAICSIT), 1997)
    This communication gives an overview of the field of mobile agents as presented at various events held in conjunction with a recent international symposium in Germany. The nature of mobile agents and the key concepts ...
  • Smit, P.J. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Colour computer graphics covers a wide field of applications such as games, computer aided-design, image processing and digital terrain modelling. The traditional way of using colour in raster graphics systems, the RGB ...
  • Van der Merwe, AJ; Labuschagne, WA (South African Computer Society (SAICSIT), 1997)
    In 1985 Smith introduced a new way of deriving fully normalized tables. His method was based on the use of a dependency list and a dependency diagram to produce fifth normal form directly. We introduce the use of end-line, ...
  • Mende, J. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    The laws and techniques of maJure sub1ects such as Physics and Electrical Engineering are logically connected to one another in the form of a deductive network There is a foundation of basic laws deriving from them ...
  • Sanders, I; Tsai, C (South African Computer Society (SAICSIT), 1997)
    The goal of this research is to demonstrate that word prediction in a constrained domain like a programming language can be done effectively and hence has the potential to facilitate typing for disabled people who are ...
  • Kritzinger, Pieter S. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Performance analyses of data communication systems do not always rely on a detailed analysis of the underlying protocols. Those analyses which do, usually rely on an analysis of the protocol state transition graph. These ...
  • Rensleigh, CW; Olivier, MS (South African Computer Society (SAICSIT), 1997)
    Small-business performance can benefit from computerisation. Unfortunately, however, most of the very small small-business enterprises do not have the financial means to acquire the services of a computerisation consultant. ...
  • Renaud, K; Kotze, P (South African Computer Society (SAICSIT), 1997)
    In many applications today multiple pre-existing database systems are integrated into a single multiple database system called a multi­database system. One of the biggest problems for transaction management in a multidatabase ...
  • Remenyi, D (South African Computer Society (SAICSIT), 1997)
    Business Process Reengineering (BPR) or Business Transformation is very difficult to manage successfully. There is a high failure rate of BPR projects and thus the risk associated with this type of work is high. Although ...
  • Olivier, MS (South African Computer Society (SAICSIT), 1997)
    Mobile computers pose special security risks since information contained on them can more easily be compromised. However, availability of information at the location where the mobile computer is to be used often outweighs ...
  • Von Solms, S.H.; De Villiers, D.P. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    The operations in the Take/Grant Protection Model are formalised using theory and results from the discipline of formal languages. A Protection Graph Rewriting Grammar is defined, which generates protection graphs consistent ...

Search UnisaIR


Browse

My Account