School of Computing: Recent submissions

  • De Villiers, D.P.; Von Solms, S.H. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    In this paper the Send/Receive and Take/Grant logical security models are formalised using results from formal language theory. By using the graph rewriting facilities of NLC-grammars, and by extending these facilities ...
  • Machanick, Philip (South African Computer Society (SAICSIT), 1997)
    Experience in industry suggests that reuse does not happen without retraining, despite the fact that many experienced software engineers accept that reuse ought to be more efficient than coding from scratch. A possible ...
  • Blackburn, P; Jaspars, J; De Rijke, M (South African Computer Society (SAICSIT), 1997)
    The purpose of these notes is two fold: (i) to give a reasonably self-contained introduction to a particular approach to theory change, known as the Alchourron-Gardenfors-Makinson (AGM) approach, and to discuss some of the ...
  • Yellen, RE; Sanford, CC (South African Computer Society (SAICSIT), 1995)
    The Singapore government's adoption of policies which has promulgated an infrastructure heavily reliant on information technology is used as a model to explain Singapore's remarkable economic growth. This model helps to ...
  • Lai, LSL (South African Computer Society (SAICSIT), 1995)
    It is believed that revolutionary developments in information technology may allow developing countries to leapfrog obsta­cles to development if they can successfully apply the new technology. However, many organizations ...
  • Korpela, M (South African Computer Society (SAICSIT), 1995)
    There is a long, although thin, tradition of research on whether and how information technology (IT) can contribute to national development and basic human needs, particularly in developing countries (DCs). It is striking, ...
  • Grobler, M (South African Computer Society (SAICSIT), 1995)
    With the enormous educational backlogs in South Africa it seems that there is no choice other than searching for alternative, technology-based ways for improving the existing educational situation. This paper describes ...
  • Crossman, T.D.; Fortmann, P; Heneke, V; Murray, D (South African Computer Society (SAICSIT), 1995)
    There is considerable debate about the value of information technology (IT) in developing economies. Some argue opti­mistically that without IT, developing economies will not grow. Others, somewhat pessimistically, warn ...
  • Avgerou, C; Madon, S (South African Computer Society (SAICSIT), 1995)
    In this article we review the current debate on the impact of the increasing significance of information handling enabled by advances in information technology on socio-economic development, with particular emphasis on the ...
  • von Solms, S. H. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Grammars generating 2-dimensional arrays have been studied by many people [1, 2, 3, 4). One effort was Random Context Array Grammars [4], where different types of context conditions placed on the production, were used ...
  • Kotze, P; De Villiers, R (South African Computer Society (SAICSIT), 1997)
    The research reported in this paper aims to integrate software engineering approaches with instructional factors in the requirements analysis, design and production phases of instructional software development. The integration ...
  • Schlingloff, B (South African Computer Society (SAICSIT), 1997)
    These tutorial notes contain an introduction to the logical theory and computational aspects of computer aided verification of finite state reactive systems with linear and branching temporal logic model checking. As a ...
  • Peleska, J; Siegel, M (South African Computer Society (SAICSIT), 1997)
    This article focuses on test automation for safety-critical reactive systems. In the first part of the paper we introduce a methodology for specification, design and verification of fault-tolerant systems allowing to ...
  • McIver, AK; Morgan, C; Sanders, JW (South African Computer Society (SAICSIT), 1997)
    This paper abridges lecture notes from WOFACS 96. It provides semantic models for a variety of programming and development formalisms, showing how different models for the same formalism are related by Galois connections. ...
  • Philips, N.C.K.; Postma, Stef W. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    The distinction between an abstract data type and an implementation of a data type is not as clear as is commonly thought. A hash table can be used to implement the type bag but few of our colleagues think of a hash table ...
  • Orlowska, M.E. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    In this paper we consider relationships between a complete system [6], an L-system [3], a stochastic system [13] and an N-system [8]. We introduce a notion of the induction of one system by another. We prove the important ...
  • Mende, J. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    After identifying the processing functions required in a computer based information system, the designer needs to combine them into an optimal set of load units. Some "packaging" arrangements yield a better system ...
  • Du Plessis, A.L.; Bornman, C.H. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    A fonnal requirements specification language, the ELSIM language, is presented. The language uses conceptual models for modelling data processing, and control characteristics and behavior of real-time systems, and is ...
  • Crossman, T.D. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Changes in technology introduce new job responsibilities and demand new skills profiles from personnel involved in application software development. Inability to perfonn competently within these job responsibilities can ...
  • Bruwer, P.J.S. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    A key to the success of the information system function in organizations is a comprehensive, effective planning system. According to R.V. Head's[l] pyramid structure of an Information system managers are classified into ...

Search UnisaIR


Browse

My Account