ZT Five - шаблон joomla Окна

SACJ

SAICSIT founded and supports the SA Computer Journal (SACJ). The South African Computer Journal is an accredited specialist ICT academic journal, publishing research articles, technical reports and communications in English in the Computer Science and Information Systems domains. The journal has been on Scopus since 2016, and appears on the DHET sub-list of Scopus-indexed journals that qualify for subsidy for articles published by South African academics at public universities. For more information on SACJ and all recent issues, see http://sacj.cs.uct.ac.za

Links to previous issues (pre-2001)

Authors Year Issue Page no Title Keywords Link
Machanick, P 2000 SACJ 25 68-77 Scalability of the RAMpage memory hierarchy Memory hierarchy, memory wall, caches, computer system performance simulation 241
Sanders, ID; Watts, DC; Hall, AD 2000 SACJ 25 56-67 Orthogonal axial line placement in chains and trees of orthogonal rectangles Computational geometry, NP-complete problems, covering, guarding, orthogonal rectangles, axial lines 240
Waldron, JT 2000 SACJ 25 45-55 Object Oriented programs and a stack based virtual machine Virtual machines, languages and compilers, interpreters, run-time environments 239
Tapamo, JR 2000 SACJ 25 38-44 Syntactic description of neighbourhood in Quadtree Quadtree, rewriting rules, image processing, neighbourhood, q-code 238
Nieuwoudt, C; Botha, EC 2000 SACJ 25 32-37 Multilingual training of acoustic models in automatic speech recognition Adaptation, multilingual, speech recognition 237
Abdulrab, H; Ngomo, M; Drissi-Talbi, A 2000 SACJ 25 23-31 A declarative framework for temporal discrete simulation Integer programming, process, model of temporal computation, simulation, constraints on natural numbers, unification 236
Cloete, E; Venter, LM 2000 SACJ 25 18-22 Image coding with fractal vector quantisation Fractal compression, image coding, vector quantization 235
Clarke, MC  2000 SACJ 25 12-17 Tehnological experience and technophobia in South African university students Technophobia, attitudes to computers, South Africa, technological experience 234
Bouras, Z-E; Khammaci, T; Ghoulf, S 2000 SACJ 25 3-11 A new approach for Program Integration Software maintenance, program dependence graph, program integration, slice, role. 233
Du, B; Maeder, A 1999 SACJ 24 210-214 Approaches to video transmission over GSM networks Mobile telecommunications, video transmission, video coding, GSM, H.263 232
Li, F; Liu, Y; Lee, JY; Ahmad, I 1999 SACJ 24 146-154 Shortest delay scheduling algorithm for lossless quality transmission of stored VBR video under limited bandwidth Smoothing algorithm, VBR video, temporal burstiness, safe interval, bandwidth, bandwidth profile, scheduling, conflict 231
Galpin, V; Hazelhurst, S; Mueller, C; Sanders, I 1999 SACJ 24 258-263 Introducing research methods to Computer Science honours students Computer science education, research methods 230
Handzic, M; Low, G 1999 SACJ 24 194-200 The role of experience in user perceptions of information technology: an empirical examination Experience, perceived usefulness, perceived ease of use, information technology acceptance, computer education 229
Turner, R; Lowry, G 1999 SACJ 24 136-145 Reconciling the needs of new information systems graduates and their employers in small, developed countries Information systems education, social issues, the computing profession 228
Van den Bergh, F; Lalioti, V 1999 SACJ 24 155-162 Software chroma keying in an immersive virtual environment Virtual reality, immersive telepresence, chroma keying 227
Van Zijl, L; Van der Walt, APJ 1999 SACJ 24   Some automata-theoretic properties of -NFA Nondeterminism, automata theory 226
Lee, M 1999 SACJ 24 201-209 What are websites used for - cost-saving, revenue generating or value creating? Electronic commerce, strategic analysis, business model, functional analysis, web-site study 225
Yu, L; Khong, SC; Xun, Y; Yuan, M 1999 SACJ 24 128-135 Improving object-oriented analysis by explicit change analysis Object-orientation, change analysis, software engineering, changeability 224
Panagou, S; Bangay, S  1999 SACJ 24 185-193 The development of a generic framework for the implementation of a cheap, component-based virtual video-conferencing system Three dimensional graphics and realism, reconstruction, scene analysis: tracking, shape, time-varying imagery, videoconferencing, coding and information theory 223
Prange, J; Bishop, J 1999 SACJ 24 249-252 Distributed operating systems: a study in applicability SCADA, distributed operating concepts, real-world application 222
Rock, ST 1999 SACJ 24 264 Visualising eventuality structure Visualisation, natural language, eventuality structure 221
Schimkat, RD; Kuchlin, W; Krautter, R 1999 SACJ 24 244-248 An object-oriented framework for rapid client-side integration of information management systems Frameworks, software reuse, components, design patterns, java, internet, document management systems 220
Shear, S 1999 SACJ 24 229-233 Multimedia as a positive force to leverage web marketing, with particular reference to the commercial sector Internet, Multimedia, audio, video advertising 219
Smit, J 1999 SACJ 24 219-222 Grounded theory methodology in IS research: Glaser vs Strauss Grounded theory, IS research, research methodology 218
Viktor, HL 1999 SACJ 24 176-184 The CILT multi-agent learning system Multi-agent learning, rule induction, data analysis, knowledge discovery 217
Von Solms, R; Van de Haar, H 1999 SACJ 24 215-218 From information security baselines to information security profiles None 216
Waldron, JT; Horgan, J; Keogh, G 1999 SACJ 24 168-175 Statistical analysis of an automated computer architecture learning environment Assembly language programming, computer-managed instruction 215
Warren, P 1999 SACJ 24 234-238 Understanding HCI methodologies Human computer interface methodologies, software engineering, interactive computer systems 214
Zimmer, R; Holt, R 1999 SACJ 24 223-228 Introducing a continuum of abstraction-led hierarchical search techniques Heuristic search, abstraction 213
Holt, A 1999 SACJ 24 253-257 Formal verification with natural language specifications: guidelines, experiments and lessons so far Formal verification, natural language specification, model checking 212
Buhler, D; Nusser, G; Gruhler, G; Kuchlin, W 1999 SACJ 24 128-135+F36 A Java client/server system for accessing arbitrary CANopen fieldbus devices via the Internet Network computing, CANopen device, Java api, fieldbus, internet, client/server, distance education, remote maintenance 211
Lawrence, E.; Garner, B. 1999 SACJ 24 119-127 Harmonizing global internet tax: a collaborative extranet model Extranet, evidence based medicine, case based reasoning 210
Hazelhurst, S. 1999 SACJ 24 110-118 Generalised unification of finite temporal logic formulas Unification, temporal logic, pattern matching 209
Keiller, P.A.; Mazzuchi, T.A. 1999 SACJ 24 105-109 Enhancing the predictability of two popular software reliability growth models Software reliability, maximum likelihood method, Laplace trend test 208
Averweg, U.; Erwin, G.J. 1999 SACJ 24 95-104 Critical success factors for the implementation of DSS at a selection of organisations in Kwazulu-Natal, South Africa Critical success factors, DSS, top management support, user information satisfaction 207
Thomas, T.A. 1999 SACJ 24 87-94 Cooperating to learn using JAD techniques Information systems education, JAD, cooperative learning 206
Barrow, J. 1999 SACJ 24 77-86 Computer programming and learning to write Teaching programming, information systems teaching, teaching methodology, distance teaching, writing 205
Levitt, S.P.; Dwolatzky, B. 1999 SACJ 24 68-76 BuRS: a building recognition system Computer vision, building extraction, homogenous operator 204
Njovu, C.; Gray, W.A. 1999 SACJ 24 58-67 A pragmatic approach to bitemporal databases: conceptualisaiton, representation and visualisation Bitemporal objects, bitemporal states, bitemporal event, time-varying attributes, bitemporal databases, valid time, transaction time, event-oriented approach, visualisation 203
Trakulsuk, P.; Avatchanakorn, V. 1999 SACJ 24 49-57 A conceptual design for high-volume data processing of warehouse database into multidimensional database Databases, data model, graph model, data warehouse, OLP 202
Torn, A.; Andersson, T.; Enholm, K. 1999 SACJ 24 40-48 A complexity metrics model for software Computer program, hierarchical measure, software metrics, structural complexity 201
Meyer, T.A. 1999 SACJ 24 33-39 An information-theoretic semantics for belief change Artificial intelligence, knowledge representation, belief revision, theory change, belief contraction 200
Petkova, O.; Roode, J.D. 1999 SACJ 24 26-32 An application of a framework for evaluation of the factors affecting software development productivity in the context of a particular organisational environment IS development, software productivity, soft systems thinking, AHP 199
Kotze, P. 1999 SACJ 24 15-25 A generic modelling framework for interactive authoring support environments Formal modelling, interactive systems, generic models, usability, authoring support environments 198
Quilling, R.D.; Erwin, G.J.; Petkova, O. 1999 SACJ 24 5-14 Active learning: Issues and challenges for information systems and technology Information systems education, active learning, deep learning 197
Jansen van Renburg, M. 1999 SACJ 23 107-120 Progressing towards object orientation in South Africa Object orientation, methodology 196
Abdulrab, H.; Ngomo, M.; Drissi-Talbi, A. 1999 SACJ 23 98-106 A declarative and non-determinist framework for dynamic object-oriented and constraint logic programming Multiple states object, multiple definitions method, freezing mechanisms, object-oriented programming, constraint and logic programming, state changes 195
Smuts, W. 1999 SACJ 23 92-97 A 3-dimensional security classification for information Information security, information classification 194
Wortmann, K.L.; Petkov, D.; Senior, E. 1999 SACJ 23 72-84 Indexing in a case-based reasoning system for waste management Case-based reasoning, indexing, waste management 193
Patsouris, P.A.; Korostenski, M.; Kissimov, V. 1999 SACJ 23 54-71 A formal model for object bases FMOB (formal model for objectbases), universal algebra of words, functionally complete algebra, two-level hierarchy of objects, 2-class, 2-object, digraphs, accessible set-systems, greedoids 192
Cronje, J.C.; Baras Baker, S.J. 1999 SACJ 23 42-53 Electronic performance support systems: appropriate technology for the development of middle management in developing countries Electronic performance support systems, evaluation, user acceptance, automation, computer-assisted instruction 191
Sanders, I.; Lubinsky, D.; Sears, M.; Kourie, D. 1999 SACJ 23 18-29 Orthogonal ray guarding of adjacencies between orthogonal rectangles Computational geography, NP-complete, covering, guarding, orthogonal rectangles 190
Van der Poll, J.A.; Labuschagne, W.A. 1999 SACJ 23 3-17 Heuristics for resolution-based set-theoretic proofs Heuristics, problem frames, resolution, set theory, theorem-proving, Z, ZF 189
Machanick, P. 1999 SACJ 23 1 Computer science and information systems: the future? None 188
Jackson, M.A. 1999 SACJ 22 47-60 Problem analysis using small problem frames Software engineering, problems, frames, framework, patterns 187
Misra, J. 1999 SACJ 22 32-46 A logic for the design of multiprogramming systems Safety, progress, invariant, stable, fixed point, liveness, fairness, trnsient, ensures, leads-to 186
Gries, D.; Schneider, F.B. 1999 SACJ 22 28-31 Teaching math more effectively, through the design of calculational proofs None  185
Morgan, C.; McIver, A. 1999 SACJ 22 14-27 pGCL: formal reasoning for random algorithms Program correctness, probability, demonic nondeterminism, random algorithm, predicate transformer, weakest precondition, guarded command, correctness proof, invariant, variant 184
Bjorner, D. 1999 SACJ 22 3-13 Where do software architectures come from? Software engineering, domain engineering, requirements engineering, software design, software architecture, program organisation, abstrcation, modelling, development validation, correctness verification, formal specification, RAISE, RSL 183
Tcheeko, L. 1998 SACJ 21 A63-A68 Recursive specifications and formal logic Artificial intelligence, tutoring system, pragmatic approach, computational models, recursive specifications, student model 182
Pretorius, L. 1998 SACJ 21 A55-A62 Applied Lambda calculus Applied Lambda calculus, type theory, proof assistants, Coq 181
Cloete, I.; Venter, L.M. 1998 SACJ 21 A49-A54 Fractal image compression Fractal image, comrpession, contraction, IFS, self-similarity, transformations 180
Ram, V. 1998 SACJ 21 44-48 Specific acquisition of collective belief knowledge for sicially motivated multiagent systems Multiagent systems, knowledge acquisition, applications 179
Knottenbelt, W.; Kritzinger, P. 1998 SACJ 21 34-43 A performance analyser for the numerical solution of general Markov chains Performance analysis, Markov chains, state space generation, probabilistic dynamic storage, steady state solution, Krylov subspace techniques, DINAmaca 178
Clarke, M.C.; Finnie, G.R. 1998 SACJ 21 26-33 Changes in entry-level university students' attitudes to computers from 1985-1997 Attitudes towards computers, education, South Africa 177
Machanick, P.; Salverda, P. 1998 SACJ 21 16-25 Preliminary investigation of the RAMpage memory hierarchy Memory hierarchy, caches, paging, software-controlled replacement 176
Paijmans, H. 1998 SACJ 21 4-15 Text categorization as an information retrieval task Machine learning, classification 175
Renaud, K.; Kotze, P. 1997 SACJ 20 62-66 The recovery problem in multidatabase systems - characteristics and solutions Multidatabase systems, transaction management, global commitment, database consistency, crash recovery 174
Vosloo, I. 1997 SACJ 20 57-61 Mobile agents at ISADS 97 None 173
Kotze, P.; De Villiers, R. 1997 SACJ 20 49-56 Applying software engineering methods to instructional systems development Software engineering, computer-aided instruction, instructional systems development, courseware engineering 172
Van der Merwe, A.J.; Labuschagne, W.A. 1997 SACJ 20 44-48 Theory meets practice Normalization, database design, file design 171
Remenyi, D. 1997 SACJ 20 36-43 Some typical phases of a business transformation project Business process reengineering, transformation, methodology, continuous improvement, delayering, core processes, outsourcing 170
Rensleigh, C.W.; Olivier, M.S. 1997 SACJ 20 25-35  A computerised-consultation service for the computerisation of the very small small-business enterprise Small-business enterprise, computerisation, consultant, end-users, hardware, software, expert system 169
Sanders, I.; Tsai, C. 1997 SACJ 20 18-24 Word prediction strategies in program editing environments Disabled users, word prediction, prediction strategies, predictive editors 168
Olivier, M.S. 1997 SACJ 20 11-17 Secure mobile nodes in federated databases Distributed systems, distributed databases, database management, mobile computing, security and protection 167
Machanick, P. 1997 SACJ 20 2-10 The abstraction-first approach to encouraging reuse Object-oriented programming, abstraction, reuse, computer science education 166
McIver, A.K.; Morgan, C.; Sanders, J.W. 1997 SACJ 19 78-102 Application-oriented program semantics Semantics, formal methods, refinement, data refinement, process algebra, probability, Galois, connection, binary relations, predicate transformers 165
Peleska, J.; Siegel, M. 1997 SACJ 19 53-77 Test automation of safety-critical reactive systems Test generation, test strategies, dependability, fault-tolerance,reactive systems 164
Schlingloff, B 1997 SACJ 19 27-52 Verification of finite state systems with temporal logic model checking Computer aided verification, finite state systems, temporal logic, model checking, modal logic, expressivity, expressiveness, w-languages, Buchi-automata, completeness, decision procedures, tableaus, specification, binary decision diagrams (BDDs), partial order methods, stubborn sets 163
Blackburn, P.; Jaspars, J.; De Rijke, M. 1997 SACJ 19 2-26 Reasoning about changing information Theory change, knowledge representation, modal logic, dynamic logic 162
Brink, C. 1997 SACJ 19 1 WOFACS '96: Workshop on formal and applied computer science None 161
Smith, D. 1996 SACJ 18 A69-A72 The new IS'95 curriculum IS education, course accreditation, IS professionalism 160
Sutcliffe, G.; Melville, S. 1996 SACJ 18 57-68 The practice of clausification in automatic theorem proving Automatic theorem proving, clauses, resolution 159
Donaldson, S.R.; Bause, F.; Kritzinger, P.S. 1996 SACJ 18 45-56 The complexity of Petri Net transformations Petri Nets, analysis of algorithms, problem complexity, program verification, model validation and analysis 158
Scott, T.G.; Hattingh, J.M.; Steyn, T. 1996 SACJ 18 40-44 An AI search algorithm to obtain the shortest simplex path Linear programming, artificial intelligence, simplex mthod, search algorithm, A*-algorithm 157
Renaud, K.; Kotze, P. 1996 SACJ 18 32-39 An integrated classification of multiple database systems Multiple database system, autonomy, heterogeneity, distribution, multidatabase, schema, database management system 156
Blewett, C.N.; Erwin, G.J. 1996 SACJ 18 24-31 Dynamic deadlock avoidance: a prototype Deadlock, database, expert system, scripts, knowledge representation 155
Shewaram, T. 1996 SACJ 18 15-23 Business process reengineering: a down to earth critique Business process reengineering, process orientation, Michael Hammer, James Champy, socio-technical school 154
Koornhof, C. 1996 SACJ 18 10-14 The homological transfer research method revisited Homologous transfers, homological transfer research method, research method, systems theory, taxonomy 153
Addison, T.M.; Hamersma, S. 1996 SACJ 18 4-9 Critical success fctors for implementing CASE at a selection of companies in South Africa CSF, critical success factor, upper CASE, integrated CASE 152
Pangalos, G.; Khair, M. 1996 SACJ 17 45-53 Design of secure medical database systems Database systems security, medical database security, secure database design 151
Mncube, S.S. 1996 SACJ 18 1-3 A pragmatic approach to development information to provide service on a wide scale None 151
Von Solms, S.H. 1996 SACJ 17 36-44 Information security on the electronic superhighway Security protocols, internet, world wide web, SSL, SHTTP, SEPP 150
De Ru, W.G.; Eloff, J.H.P. 1996 SACJ 17 26-35 Reinforcing password authentication with typing biometrics Computer security, authentication, biometrics, keystroke dynamics, fuzzy logic, authentication, passwords 149
Muftic, S. 1996 SACJ 17 17-25 Functional and operational security system for open distributed environments D.4.6, C.2.4 148
Hoffman, L.J. 1996 SACJ 17 10-16 Encryption policy for the global information infrastructure Information security, Cryptology policy, export control 147
Parker, D.B. 1996 SACJ 17 4-9 A new framework for information security to avoid information anarchy Information security, confidentiality, integrity, availability 146
Von Solms, B. 1996 SACJ 17 1-3 Information security - the family member who came home None 145
Bishop, J.M. 1996 SACJ 16 54-A65 The status of computing manpower and training in tertiary education in Southern African universities 1995   144
Whittaker, L. 1996 SACJ 16 40-53 The evaluation of business process reengineering projects in South Africa Business process reengineering, evaluation, benefits, measurement 143
Froneman, L.; Roode, J.D. 1996 SACJ 16 31-39 Reviewing IS curricula: a practical approach IS curriculum, IS skills requirements, IS training and development 142
Machanick, P. 1996 SACJ 16 23-30 Efficient shared memory multiprocessing and object-oriented programming Object-oriented programming, parallel programming, cache-based shared-memory systems 141
De Jager, N.; Roos, J. 1996 SACJ 16 18-22 ATM transmission convergence implementations: SONET/SDH vs cell-based ATM, SONET, SDH, cell-based, transmission convergence sublayer, physical layer 140
Petkov, D. 1996 SACJ 16 13-17 An approach for the standardisation of policies for selection of computer hardware and software Decentralised decision making, multiple criteria decision support systems, analytic hierarchy process 139
Blake, G. 1996 SACJ 16 2-12 Information technology and South Africa's Green Paper on Science and Technology None 138
Yellen, R.E.; Sanford, C.C. 1995 SACJ 15 45-50 Lessons from Singapore and Zimbabwe: a model for emerging countries to achieve quality economic growth Information technology, economic growth 137
Lai, L.S.L. 1995 SACJ 15 36-44 A pluralistic approach to systems development Pluralistic approach, systems development, soft systems methodology, strategic data planning methodologies, developing countries 136
Grobler, M. 1995 SACJ 15 26-35 Computer-supported cooperative education to support development in South Africa South Africa, education, information technology, computer-supported cooperative education, development 135
Korpela, M. 1995 SACJ 15 20-25 Who will implement information technology for development? Information technology, socio-economic development, Africa 133
Crossman, T.D.; Fortmann, P.; Heneke, V.; Murray, D. 1995 SACJ 15 13-19 Information technology in a developing economy Developing economies, social responsibilities, value of IT, unemployment 132
Avgerou, C.; Madon, S. 1995 SACJ 15 4-12 Development, self-determination and information Development, self-determination, information 131
Oosthuysen, W.H.; McDonald, T. 1995 SACJ 14 A80-A187 Limitations and problems of management applications that use enterprise extensions to the SNMP MIB Simple network management protocol (SNMP), management information base (MIB), enterprise MIB extensions, integrated network management 130
Messerschmidt, H.J. 1995 SACJ 14 A77-A79 Computer fraud in SA: an indictment of Information Systems Computer fraud, computer crime 129
Tromp, P.J.; Roode, J.D. 1995 SACJ 14 64-75 Enabling a collaborative approach to management Groupware, group decision support systems, collaborative work, computer supported co-operative work, organizational impact 128
Halland, K.J.; Labuschagne, W.A. 1995 SACJ 14 59-63 A family tree of circumscriptive logics Circumscription, nonmonotonic logic, second-order logic 127
Ludik, J.; Cloete, I. 1995 SACJ 14 48-58 Training strategies for architecture-specific recurrent neural networks Training strategies, architecture-specific recurrent neural networks, incremental, increased complexity 126
Vahed, A. 1995 SACJ 14 42-47 The recall performance of multiple associative memories - a comparison of thresholding strategies Associative memory, recall performance, neural networks 125
Kisimov, V.; Da Silva, I. 1995 SACJ 14 28-41 Parallel distributed objects' structure and their synchronization in an APPC environment Distributed systems, synchronisation mechanisms in distributed systems, distributed objects, concurrent programming, distributed databases 124
Paijmans, H. 1995 SACJ 14 20-27 Word frequencies in scientific prose Information retrieval, word frequencies, SMART, full-text document 123
Parkinson, E.; Warren, P.R. 1995 SACJ 14 14-19 A comparison of graph colouring techniques Graph colouring, heuristic algorithms, NP-hard, random graphs 122
Jones, M.R. 1995 SACJ 14 1-11 Business process reengineering: managmeent's new paradigm or emperor's new clothes? Business process reengineering 121
Morgan, C. 1995 SACJ 13 64-96 The refinement calculus Refinement, weakest preconditions, program development, specifications, data refinement, miracles 120
Goslett, J.; Melton, A. 1995 SACJ 13 45-63 A gentle introduction to domain theory: domains and powerdomains Domains, powerdomains 119
Goldblatt, R. 1995 SACJ 13 14-44 Model logics for programs Modal logic, dynamic logic, linear temporal logic, branching time logics, Hennesy-Milner modal logic, modal mu calculus 118
Brinksma, E.; Langerak, R. 1995 SACJ 13 2-13 Functionality decomposition by compositional correctness preserving transformation Process algebra, correctness preserving transformation, decomposition, bisimulation 117
Remenyi, D. 1994 SACJ 12 53-66 The innovative management if Information in the mid-1990s Innovation, information systems management, business process reengineering, business transformation, virtual corporation, managing change, business restructuring 116
Jordaan, D.B.; Gilliland, S. 1994 SACJ 12 50-52 Teaching Pascal using multimedia Multimedia, teaching methods, video 115
Labuschagne, W.A.; Miller, M.G. 1994 SACJ 12 43-49 On using the sitation calculus dynamically rather than temporally Circumscription frame problem, minimal model, situation calculus, temporal projection problem, Yale shooting scenario 114
Sutherland, F. 1994 SACJ 12 32-42 Some current practices in evaluating IT benefits in South African organisations IT benefits, evaluation, payback, intangible, post-implementation audit, system types 113
Mata-Montero, M.; Ellis, J.A. 1994 SACJ 12 21-31 A linear time algorithm for the longest (s-t)-path problem restricted to partial-k-trees Bounded treewidth, partial k-trees, longest path, linear time algorithn 112
Theron, H.; Cloete, I. 1994 SACJ 12 12-20 Specialisation by exclusion Learning from examples, irredundant set covers 111
Lochovsky, F.H. 1994 SACJ 12 1-11 Organizatinal computing technologies for supporting organizational activities None 110
Introna, L.D. 1994 SACJ 11 1-6 Ideologies of information systems and technology None 109
Krzesinski, T. 1994 SACJ 11 99-102 The FRD special programme on collaborative software research and development. Draft call for proposals None 108
Lutu, P.E.N. 1994 SACJ 11 91-98 Parallel, execution strategies for conventional logic programs: a review Logic programs, parallel prolog execution, AND-parallelism, AND-OR parallelism 107
Smuts, W.B. 1994 SACJ 11 84-90 A survey of Information Authentication techniques Authentication, information security, digital signatures 106
Schach, S.R. 1994 SACJ 11 77-83 The object-oriented paradigm: uncertainties and insecurities Object-oriented paradigm, software engineering, management of software 105
Roets, R. 1994 SACJ 11 68-76 Information Technology training in organisations: a replication Information systems training, training, skills, training needs, end-user computing 104
Gardner, B.R. 1994 SACJ 11 63-67 Ensuring successful IT utilisation in developing countries Developing countries, foundations for Information Technology 103
De Kock, G. de V.; Du Plessis, C. 1994 SACJ 11 58-62 An evaluation of substring algorithms that determine similarity between surnames Genealogical database, word, string and surname matching 102
Bause, F.; Kritzinger, P.; Sczittnick, M. 1994 SACJ 11 47-57 Markovian analysis of DQDB MAC protocol DQDB, Markov model, metropolitan area network, performance analysis 101
Berman, S. 1994 SACJ 11 39-46 Metadata and security management in a persistent store Design, experimentation, performance, metadata, security 100
Harrington, G. 1994 SACJ 11 26-38 EDI in South Africa: an assessment of the costs and benefits Electronic data interchange (EDI), EDI benefits, EDI standards, EDI costs, EDIFACT, EDI software, EDI networks, VAN, EDI hardware configurations 99
Finnie, G.R.; Wittig, G.E. 1994 SACJ 11 18-25 Effect of system and team size on 4GL software development productivity Development effort, development team size, software development productivity, system size, total elapsed development time 98
Ram, V. 1994 SACJ 11 11-17 Intelligent production scheduling: a survey of current techniques and an application in the footwear industry Intelligent scheduling, multiple context reasoning 97
Crossman, T.D. 1994 SACJ 11 7-10 What is information systems? Science, nonscience, service, ethics, IS research 96
Crossman, T.D. 1993 SACJ 10 60-64 Artificial intelligence, expert systems and business computing: is there a problem? Artificial intelligence, expert systems, accountability, business computing 95
Ram, V. 1993 SACJ 10 54-59 Expert systems for management control: a multi-expert architecture Distributed expert systems, blackboard architecture, management control 94
De Kock, G. de V.; Du Plessis, C. 1993 SACJ 10 48-53 Die empiriese evaluering van variasies van woordpassingsalgoritmes vir die bepaling van ekwivalente vanne in 'n genealogiese databasis Genealogical database, word matching, name and surname matching 93
Lamprecht, S.M. 1993 SACJ 10 37-47 A simulation environment for evaluating distributed query processing algorithms Distributed database, query processing, query optimization, simulation, performance evaluation 92
Jordaan, D.B.; Hattingh, J.M.; Steyn, T. 1993 SACJ 10 32-36 Die versoening vna konflikterende doelwitte in die databasisomgewing met behulp van regressiemetodes Databasis, datamodel, databasisomgewing 91
Norman, M.J.; Berman, S. 1993 SACJ 10 23-31 SSDE: CASE in Education Case tools, software engineering education, structured development 90
Remenyi, D.S. 1993 SACJ 10 14-22 The key issues in Information Management for the mid-1990s. Back to business basics through the commercialisation of the ISD. Management issues, rightsizing, outsourcing, culture, change, partnership, systems ownership 89
Mullany, M.; Dos Santos Gomes, A.; Miller, R. 1993 SACJ 10 8-13 An enquiry into property-goal type definitions of the term "Information System" Information system definition, information system properties, information system goals 88
Parker-Nance, T.C.; Warren, P.R. 1993 SACJ 10 1-7 Assessing the usability of computer systems User interface, usability 87
Maddux, R.D. 1993 SACJ 9 92-130 A working relational model: the derivation of the Dijkstra-Scholten predicate transformer semantics from Tarski's axioms for the Peirce-Schroder calculus of relations Relation algebras, semantics, relational, axiomatic, predicate transformers, preconditions 86
Eisinger, N.; Ohlbach, H.J. 1993 SACJ 9 44-91 Deduction systems based on resolution Automated reasoning, deduction, resolution principle 85
Gosleu, J.; Hulley, H.; Melton, A. 1993 SACJ 9 31-43 Denotational semantics and domain theory Semantics, meanings of programs, domains 84
Zucker, J.; Pretorius, L. 1993 SACJ 9 3-30 Introduction to computability theory Computability, recursion, primitive recursion, church-turing thesis, recursive enumerability 83
Labuschagne, W.A.; Van der Westhuizen, P.L. 1992 SACJ 8 77-86 Logic programming: ideal vs practice Logic programming, resolution, negation-as-failure, closed world assumption, completed database, stratified program 82
Bradshaw, J. 1992 SACJ 8 70-76 Qualitative reasoning: an introduction Qualitative reasoning, process centered, component centered, constraint based 81
Clarke, M.C. 1992 SACJ 8 63-69 Social responsibility for computign professionals and students University computing curricula, social impact of computing, computer ethics, professional responsibility 80
Smith, D.C.; Newton, S.; Riley, M.J. 1992 SACJ 8 51-62 An evaluation of the skill requirements of entry-level graduates in the Information Systems industry IS skills, IS curricula, IS graduates, IS education 79
Couger, J.D.; Smith, D.C. 1992 SACJ 8 46-51 Evaluating the motivating environment for Information Systems personnel in South Africa compared to the United States (Part II) Motivation, IS personnel, career paths, productivity 78
Wheeler, G.; Kritzinger, P.S. 1992 SACJ 8 37-45 PEW: a tool for the automated performance analysis of protocols Computer networks, communication protocols, protocol engineering, performance evaluation, correctness of protocols 77
Theron, H.; Cloete, I. 1992 SACJ 8 32-36 Beam search in attribute-based concept induction Learning from examples, beam search, pruning 76
De Villiers, P.J.A. 1992 SACJ 8 24-31 A model checker for transition systems Verification, transition systems, branching time temporal logic, model checking 75
Carson, D.I.; Oellermann, O.R.  1992 SACJ 8 12-23 A new algorithm for finding an upper bound of the genus of a graph PQ-trees, genus, circuit layouts 74
Calitz, A.P.; De Kock, G. de V.; Venter, D.J.L. 1992 SACJ 8 4-11 Selection criteria for first year Computer Science students First year Computer Science student selection, selection criteria, matriculation results, Computer Science education 73
Clayton, P.G. 1992 SACJ 7 90-96 The CSP notation and its application to parallel processing CSP, communicating sequential processes 72
Jayasekera, U.; Phillips, N.C.K. 1992 SACJ 7 85-86 An implementation of the parallel conditional Language construct, conditional, guarded command 71
Couger, J.D.; Smith, D.C. 1992 SACJ 7 79-84 Evaluating the motivating environment for Information Systems personnel in South Africa compared to the United States (Part 1) Motivation, IS personnel, career paths, productivity 70
Oosthuizen, G.D.; Avenant, C. 1992 SACJ 7 72-78 Integrating similarity-based and explanation-based learning Artificial intelligence, machine learning 69
Wood, P.T. 1992 SACJ 7 67-71 Efficient evaluation of regular path programs Deductive databases, logic programming, optimization, rule rewriting 68
Viktor, H.L.; Rennhackkamp, M.H. 1992 SACJ 7 59-66 Extending local recovery techniques for distributed databases Database management, distributed database system, failures, recovery techniques, recovery 67
Van Zijl, L.; Mitton, D. 1992 SACJ 7 44-58 Using statecharts to design and specify a direct-manipulation user interface Human-computer interface, X-Windows, reactive systems, statecharts 66
Melville, S.W. 1992 SACJ 7 37-43 Analysing routing strategies in sporadic networks Sporadic networks, routing, meteor-burst communications 65
Machanick, P. 1992 SACJ 7 27-36 Design of an object-oriented framework for optimistic parallel simulation on shared-memory computers Simulation, parallel processing, object-oriented programming 64
MacGregor, K.J.; Campbell, R.H. 1992 SACJ 7 21-26 The design and analysis of distributed virtual memory consistency protocols in an object-orientated operating system None 63
Brink, C.; Rewitzky, I. 1992 SACJ 7 11-20 Modelling the algebra of weakest preconditions Guarded commands, invariants, predicate transformers, weakest preconditions 62
Clayton, P.G.; Wentworth, E.P.; Wells, G.C.; De-Heer-Menlah, F.K. 1992 SACJ 7 3-10 An implementation of Linda Tuple space under the Helios operating system Distributed systems, parallel processing, transputer, Linda, Helios 61
Clayton, P.G. 1992 SACJ 6 90-96 The CSP notation and its application to parallel processing CSP, communicating sequential processes 60
Jayasekera, U.; Phillips, N.C.K. 1992 SACJ 6 85-86 An implementation of the parallel conditional Language construct, conditional, guarded command 59
Couger, J.D.; Smith, D.C. 1992 SACJ 6 79-84 Evaluating the motivating environment for Information Systems personnel in South Africa compared to the United States (Part 1) Motivation, IS personnel, career paths, productivity 58
Oosthuizen, G.D.; Avenant, C. 1992 SACJ 6 72-78 Integrating similarity-based and explanation-based learning Artificial intelligence, machine learning 57
Wood, P.T. 1992 SACJ 6 67-71 Efficient evaluation of regular path programs Deductive databases, logic programming, optimization, rule rewriting 56
Viktor, H.L.; Rennhackkamp, M.H. 1992 SACJ 6 59-66 Extending local recovery techniques for distributed databases Database management, distributed database system, failures, recovery techniques, recovery 55
Van Zijl, L.; Mitton, D. 1992 SACJ 6 44-58 Using statecharts to design and specify a direct-manipulation user interface Human-computer interface, X-Windows, reactive systems, statecharts 54
Melville, S.W. 1992 SACJ 6 37-43 Analysing routing strategies in sporadic networks Sporadic networks, routing, meteor-burst communications 53
Machanick, P. 1992 SACJ 6 27-36 Design of an object-oriented framework for optimistic parallel simulation on shared-memory computers Simulation, parallel processing, object-oriented programming 52
MacGregor, K.J.; Campbell, R.H. 1992 SACJ 6 21-26 The design and analysis of distributed virtual memory consistency protocols in an object-orientated operating system None 51
Brink, C.; Rewitzky, I. 1992 SACJ 6 11-20 Modelling the algebra of weakest preconditions Guarded commands, invariants, predicate transformers, weakest preconditions 50
Clayton, P.G.; Wentworth, E.P.; Wells, G.C.; De-Heer-Menlah, F.K. 1992 SACJ 6 3-10 An implementation of Linda Tuple space under the Helios operating system Distributed systems, parallel processing, transputer, Linda, Helios 49
Shaw, V. 1991 SACJ 5 75-76 An update on UNINET-ZA: the Southern African academic and research network None 48
Crossman, T.D. 1991 SACJ 5 70-74 A method of controlling quality of application software Inspection teams, software quality, development costs, errors, egoless programming 47
Caduri, A.; Kourie, D.G. 1991 SACJ 5 58-69 Cost-effective visual simulation based on graphics workstations Computer generated imagery, visual simulation, graphics workstation 46
Von Solms, S.H.; Ehlers, E.M.; Enslin, D.J. 1991 SACJ 5 54-56 Knowledge representation using formal grammars None 45
Hazelhurst, S.E. 1991 SACJ 5 44-53 A Linda solution to the evolving philosophers problem Change management, Linda, evolving philosophers problem, dining philosophers problem 44
Sartori-Angus, A.G.; Neville, R. 1991 SACJ 5 39-43 PEST -  a mmicrocomputer Pascal base expert system shell Artificial intelligence, expert systems, production systems 43
Kambanis, J. 1991 SACJ 5 32-38 Concept network framework for a multi-paradigm knowledge base Knowledge base, associative networks 42
Smith, T.H.C.; Meyer, T.W.S.; Leenen, L. 1991 SACJ 5 28-31 An efficient primal simplex implementation for the continuous 2-matching problem Matching, travelling salesman problem, linear programming 41
Wessels, L.F.A.; Barnard, E.; Van Rooyen, E. 1991 SACJ 5 22-27 The physical correlates of local minima Neural networks, classifier, backpropagation, training, criterion function, decision boundaries, local minima 40
Greyling, J.H.; Warren, P.R. 1991 SACJ 5 16-21 An investigation in the separation of the application from its user interface User interface, separation, Seeheim model, object oriented programming 39
Du Plessis, J.P.; Messerschmidt, H.J. 1991 SACJ 5 9-15 The placement of subprograms by an automatic programming system Automatic programming, placement of subprograms, program derivation, programming system 38
Barth, G. 1991 SACJ 5 4-8 Why the fuss about neural networks? None 37
Tidwell, L.D. II; Schach, S.R. 1991 SACJ 4 81-84 Automatic vectorization Automatic vectorization, Cray Y-MP, FORGE, FORTRAN, supercomputer, vector machine 36
Erlank, S.; Pelteret, D.; Meskin, M. 1991 SACJ 4 68-77 An analysis of the usage of systems development methods in South Africa System analysis, systems design, methodologies, CASE, systems development 35
Smith, D.C.; Hansen, A.L.; Oosthuizen, N.C. 1991 SACJ 4 64-67 A causal analysis of job turnover among systems analysts System analyst, job turnover, staff shortages, remuneration 34
Finnie, G.R. 1991 SACJ 4 55-63 Knowledge-based selection and combination forecasting methods Expert systems, abduction, forecasting, explanation 33
Bosua, R.; Du Plessis, A.L. 1991 SACJ 4 46-54 An ADA compatible specification language Ada, object-based development methodology, object-relationship-property model, real-time systems, software engineering, specification language, software engineering environment (SEE) system encyclopedia manager (SEM) system, system development life cycle (SDLC) 32
Clayton, P.G. 1991 SACJ 4 34-45 An interrupt driven paradigm of concurrent programming Concurrent notations, parallel processing, distributed processing 31
Viktor, H.L.; Rennhackkamp, M.H. 1991 SACJ 4 25-33 Database consistency under UNIX Consistency, recovery, system failure, UNIX 30
Philips, M.J.; Berman, S. 1991 SACJ 4 17-24 The universal relation as a database interface Universal relation, end-user systems, database navigation 29
Cloete, I.; Theron, H. 1991 SACJ 4 10-16 CID3: an extension of ID3 for attributes with ordered domains Machine learning, induction, decision trees 28
Barrow, J.  1991 SACJ 4 3-9 Hypertext for browsing in computer aided learning Browsing, CAL, discovery learning, structured hypertext 27
Postma, S.W.; McGee, A. 1990 SACJ 3 53-58 The fixpoint theorem in the Calculus Octolisp, fixpoints, equisimultaneity, nondeterminism 26
Pistorius, M.C.; Fallick, P.M. 1990 SACJ 3 72-75 A review of the use of computers in education in Southern Africa: tertiary education None 25
Meumann, M.D.; Rennhackkamp, M.H. 1990 SACJ 3 23-29 MINIX for a distributed database system Distributed database managemnt system, operating system, MINIX 24
Hoffman, P.K.; Smit, G de V 1990 SACJ 3 30-38 A file server for a multi-transputer UNIX system File servers, multiprocessor system, operating systems, satellite systems, transputer 23
Hing, R.L. 1990 SACJ 3 61-71 Review of mapping neural networks in classification systems Neural networks, classificaiton systems, non-linearly separable functions, perception convergence algorithm, LMS rule, back-propagation 22
Heidema, J.; Labuschagne, W.A. 1990 SACJ 3 39-44 Data-dependence of semantic information Information, probability, logic, clause, Boolean algebra, automorphism 21
Du Plessis, C.J.; Rip, S.D.E.; Lay, P.M.Q. 1990 SACJ 3 5-18 An exploratory study into communications between IS staff and users during requirement specification Communications, requirement specifications, system developers 20
Dempster, R. 1990 SACJ 3 45-52 OCTOLISP: an experiment with data structures Lamlbda expression, concurrency, parallellism 19
Bruwer, P.J.S. 1990 SACJ 3 19-22 Kritiese faktore vir die suksesvolle afhandeling van inligtingstelselprojekte Information system, information system project 18
Viljoen, H.C. 1990 SACJ 2 3-5 Vth SA computer symposium None 17
Venter, B.H. 1990 SACJ 2 45-50 Data structuring via functions Data structures, functional data model, sets, lists, records 16
Kritzinger, P.S.; Van Dijk, J. 1990 SACJ 2 23-30 An Estelle compiler for a protocol development environment Estelle, compilers, computer networks, specification languages 15
Naccache de Paz, D. 1990 SACJ 2 12-16 On the generation of permutations Algorithm, permutation, generation, arrangement, rank, unrank 14
Mende, J. 1990 SACJ 2 6-11 Homological transfer: an information systems research method None 13
McCullagh, P.J.; Smit, G. de V. 1990 SACJ 2 39-44 Implementing UNIX on the INMOS transputer Multiprocessor, UNIX, distributed processing, transputer 12
Goosen, H.A.; Cheriton, D.R. 1990 SACJ 2 31-38 Predicting the performance of shared multiprocessor caches Shared-memory multiprocessors, parallel processing 11
Fallick, P.M.; Pistorius, M.C. 1990 SACJ 2 53-58 A review of the use of computers in education in South Africa part 1: primary and high schools None 10
Buys, J.; Messerschmidt, H.J.; Botha, J.F. 1990 SACJ 2 17-22 Coping with degeneracy in the computation of dirichlet tessellations Tessellation triangulation, degeneracy 9
Wood, P.T. 1990 SACJ 1 11-18 Finding, regular paths in acyclic graphs Algorithms, graph databases, finite state automata, query processing, regular expressions 8
Rennhackkamp, M.H. 1990 SACJ 1 5-10 The NRDNIX distributed database management system Database management, distributed database system 7
Oosthuizen, G.D. 1990 SACJ 1 31-35 The use of a lattice for fast pattern matching Knowledge processing, matching, clustering, indexing, information retrieval 6
Murrell, H.C.; Carson, D. 1990 SACJ 1 36-42 Image reconstruction via the Hartley transform Reconstruction, tomography, Hartley transform 5
Mueller, C.S.M. 1990 SACJ 1 19-23 Programming using induction Induction, programming, programming language constructs, verification 4
Mende, J. 1990 SACJ 1 43-49 Four major success criteria for information system design Information systems, success criteria, design objectives, effectiveness, efficiency 3
Mende, J. 1990 SACJ 1 50-58 A multi-criteria partitioning technique for information system design System design, partitioning, success criteria, effectiveness, efficiency, theorem-proving 2
Kambanis, J. 1990 SACJ 1 24-30 A design environment for semantic data models Semantic data models, software engineering environments, data bases, hypertext 1
Paijmans, H. 1999 SACJ 23 30-41 Discriminators for authorship attribution Authorship attribution, machine learning, information retrieval 0
Nieuwoudt, C.; Botha, E.C. 1999 SACJ 23 85-91 Connected digit recognition in Afrikaans using hidden Markov models Connected digit recognition, duration modelling 0
Kourie, D.G.  1989 QI 6, 4 174 An approach to defining abstractions, refinements anda enrichments.   150
Lay, P.M.Q.; Atkinson, C.R. 1989 QI 6, 4 169-173 The application of scientific method to information systems analysis   149
Finnie, G.R. 1989 QI 6, 4 162-168 A Cooperating expert's framework for business expert system design   148
Machanick, P. 1989 QI 6, 4 153-161 Software design to meet third world requirements: an experimental software engineering approach   147
MSc/PhD 1989 QI 6, 4 143-152 Abstracts: MSc/PhD CONFERENCE HELD AT Dikololo in 1988   146
Venter, B.H. 1989 QI 6, 4 139-142 Reflections on the nature and future of computer science in Southern Africa   145
Anderssen, E.C.; Von Solms, S.H. 1988 QI 6, 3 129 Frame clipping of polygons   143
Short, R. 1988 QI 6, 3 123-128 Learning the first step in requirements specification   142
De Kock, G. de V 1988 QI 6, 3 119-122 Die meting van sukses van naampassingsalgoritmes in 'n genealogiese databasis   141
Kourie, D.G.; Van den Heever, R.J. 1988 QI 6, 3 13-118 Experiences in CSP trace generation   140
Postma, S.W.; Phillips, N.C.K. 1988 QI 6, 3 109-112 The parallel conditional   139
Bruwer, P.J.S. 1988 QI 6, 3 104-108 Ranking information system problems in a user environment   138
Smith, T.H.C. 1988 QI 6, 3 100-103 Finding a cheap matching   137
McDonald, T. 1988 QI 6, 3 95-99 A proposed computer network for researchers   136
Postma, S.W. 1988 QI 6, 2 89 Traversible trees and forests   134
Orlowska, M.E. 1988 QI 6, 2 83-88 On syntax and semantics related to incomplete information systems   133
Cooper, A.K. 1988 QI 6, 2 77-82 A data structure for exchanging geographical information   132
Rennhackkamp, MH; Von Solms, SH 1988 QI 6, 2 70-76 Modelling distributed database concurrency  control overhead   131
Wagener, M.J.; De Kock, G DE v 1988 QI 6, 2 67-69 Rekenaar spraaksintese: die omskakeling van teks na klank - 'n prestasiemeting   130
Mende, J. 1988 QI 6, 2 63-'66 A classification of partitioning rules for information systems design   129
De Villiers, D.P.; Von Solms, S.H. 1988 QI 6, 1  54 Using NLC-grammars to formalise the take/grant and send/receive security models   127
Smit, P.J. 1988 QI 6, 1  33-53 The use of colour in raster graphics   126
Mende, J. 1988 QI 6, 1  28-32 A structural model of information systems theory   125
Kritzinger, P.S. 1988 QI 6, 1  19-27 Protocol performance using image protocols   124
Von Solms, S.H.; De Villiers, D.P. 1988 QI 6, 1  15-18 Protection graph rewriting grammars and the take/grant security model   123
Venter, B.H. 1988 QI 6, 1  8-14 A new general purpose operating system   122
Venter, B.H. 1988 QI 6, 1  2-7 A detailed look at operating system processes   121
Du Plessis, A.L.; Bornman, C.H. 1987 QI 5, 3 67 The ELSIM Langauge: an FSM based language for ELSIM SEE   119
Von Solms, S.H. 1987 QI 5, 3 51-66 Generating relations using format grammars   118
Bruwer, P.J.S. 1987 QI 5, 3 44-50 Strategic planning models for information systems   117
Crossman, T.D. 1987 QI 5, 3 36-43 A comparison of academic and practitioner perceptions of the changing role of the systems analyst: an empirical study   116
Mende, J. 1987 QI 5, 3 32-35 Three packaging rules for information system design   115
Bruwer, P.J.S. Groenewald, J.J. 1987 QI 5, 3 214-31 A model to evaluate the success of information centres in organisations   114
Phillips, N.C.K.; Postma, S.W. 1987 QI 5, 3 21-23 Pointers as a data type   113
Byron-Moore, S.P. 1987 QI 5, 3 13-20 A program development environment for microcomputers   112
Orlowska, M.E. 1987 QI 5, 3 1-12 Common approach to some informational systems   111
Clayton, P.G. 1987 QI 5, 2 63 Hands-on microprogramming for computer science students   109
Finnie, G.R. 1987 QI 5, 2 56-62 Novice attitude changes during a first course in computing: a case study   108
Scheepers, C.F. 1987 QI 5, 2 46-55 Polygon shading on vector type devices   107
Bruwer, P.J.S. 1987 QI 5, 2 40-45 User attitudes: main reason why information systems fail   106
Mueller, C.S.M. 1987 QI 5, 2 29-39 Set-oriented functional style of programming   105
Ehlers, E.M.; Von Solms, S.H. 1987 QI 5, 2 23-28 Random context structure grammars   104
Goosen, H.A.; Hoogendoorn, C.H. 1987 QI 5, 2 16-22 A model for fault-tolerant computer systems   103
Anderssen, E.C.; Von Solms, S.H. 1987 QI 5, 2 7-15 A CAI model of space and time with special reference to field battles   102
Wagener, M.J. 1987 QI 5, 2 1-6 Rekenaar spraaksintese: die omskakeling van teks na klank   101
Van der Vegte, L.J. 1987 QI 5, 1 63 The development of a syntax checker for LOTOS   99
Roos, J. 1987 QI 5, 1 51-62 The protocol specification language ESTELLE   98
Podevyn, D. 1987 QI 5, 1 46-50 Decision tables as a knwoledge representation formalism   97
Levieux, C. 1987 QI 5, 1 41-45 Education rather than training   96
Hoogendoorn, C.H. 1987 QI 5, 1 36-40 Experience with teaching software engineering   95
Pirow, P.C. 1987 QI 5, 1 23-35 Research computeracy   94
Berman, S. 1987 QI 5, 1 19-22 Semantic information management   93
Kritzinger, P.S. 1987 QI 5, 1 11-18 Local area networks in perspective   92
Finnie, G.R. 1987 QI 5, 1 1-10 On learning styles and novice computer use   91
Kourie, D.G. 1986 QI 4, 3 59 A Partial RJE pad specification to illustrate LOTOS   89
Carey, C.W.; Hattingh, C.; Kourie, D.G.; Van den Heever, R.J.; Verkroost, R.F. 1986 QI 4, 3 45-58 The development of an RJE/X.25 Pad: A case study   88
Ridler, R.F. 1986 QI 4, 3 39-44 In praise of solid state discs   87
Byron-Moore, S.P. 1986 QI 4, 3 33-38 What is wrong with CP/M?   86
Machanick, P. 1986 QI 4, 3 27-32 Low-cost artificial intelligence research tools   85
Bruwer, P.J.S.; Hattingh, J.M. 1986 QI 4, 3 21-26 Models to evaluate the state of computer facilities at South African universities   84
Van der Poel, K.G.; Bryson, L.R. 1986 QI 4, 3 13-20 Protection of computerised private information: a comparative analysis   83
Berman, S.; Walker, L. 1986 QI 4, 3 7-12 A high-level interface to a relational database system   82
Mende, J. 1986 QI 4, 3 1-6 Laws and techniques of information systems   81
Berman, S. 1986 QI 4, 2 25 A persistent programming language - preliminary report   79
Heng, A.K. 1986 QI 4, 2 23-24 A summation problem   78
Heng, A.K. 1986 QI 4, 2 21-22 Some remarks on deleting a node from a binary tree   77
Handley, C.C. 1986 QI 4, 2 15-20 Finding all primes less than some maximum   76
Postma, S.W. 1986 QI 4, 2 7-14 New CS syllabus at Natal (PMB)   75
Finnie, G.R. 1986 QI 4, 2 1-6 Modeller: A DSS for experimental study of human-computer interaction   74
Phillips, N.C. 1986 QI 4, 1 21 An alternative development of Vienna data structures   72
Bishop, J.M. 1986 QI 4, 1 11-20 Ways of assessing programming skills   71
Dempster, R. 1986 QI 4, 1 5-10 The SECD machine: an introduction   70
Mende, J. 1986 QI 4, 1 1-4 Research directions in information systems   69
Machanick, P. 1985 QI 3, 3 30 Tools for creating tools: programming in Artificial Intelligence   67
Sutcliffe, G. 1985 QI 3, 3 19-29 A comparison of methods used to represent graphs on a computer   66
Short, R. 1985 QI 3, 3 14-18 A consideration of formalisms in computing   65
Hirsch, M; Schach, S.R.; Van Biljon, W.R. 1985 QI 3, 3 9-13 High-level debugging systems for Pascal: interpreter versus compiler   64
MacGregor, K.J. 1985 QI 3, 3 2-8 Quo Vadis, computer science?   63
Postma, S.W. 1984 QI 3, 2 28 New reading: a book review   61
McDermott, T.S. 1984 QI 3, 2 25-27 Developing an intelligent editor for microcomputers   60
Wulf, S. 1984 QI 3, 2 23-24 Specification and performance prediction fo 4th generation language run units   59
Pirow, P.C. 1984 QI 3, 2 21-22 An adaptive response algorithm   58
Du Preez, L.S. 1984 QI 3, 2 15-20 Software configuration management - a practical approach   57
Pino, J.A. 1984 QI 3, 2 11-14 Migrations: a microcomputer-based generalised information retrieval system   56
Labuschagne, W.A.; Van Rooyen, H.O. 1984 QI 3, 2 7-10 On a generalisation of Cayley diagrams   55
Postma, S.W. 1984 QI 3, 2 3-6 Syllabi for computer science as a scientific discipline   54
Mueller, C.S.M. 1984 QI 3, 1 25 Concurrency: an easier way to program   52
Kaplan, S.M. 1984 QI 3, 1 21-24 A context sensitive metalanguage for intelligent editos   51
Turton, T. 1984 QI 3, 1 15-20 A virtual multiprocessor computer design   50
Richfield, J.M. 1984 QI 3, 1 9-14 Program design as the tool of preference in computer literacy education, experience, incentives, implications   49
Hunter, D.A. 1984 QI 3, 1 5-8 Documenting a databse system with a database   48
Jablonski, J; Dijkman, H.J. 1984 QI 3, 1 1-4 Very high speed graphics work-station   47
Cuthbertson, A.J.; Van Niekerk, I.J.; Turton, T. 1983 QI 2, 3 29 A disk space management system   45
Berman, S 1983 QI 2, 3 25-28 Add: The automated database design tool   44
Mann, R.J. 1983 QI 2, 3 21-24 Analytical model of a mixed-workload MVS computer system   43
Wulf, S. 1983 QI 2, 3 19-20 Modelling blocking on admission of tasks to computer   42
Currin, D.C. 1983 QI 2, 3 15-18 Data structures for generalised network algorithms   41
Van Rooyen, H.O.; Weiermans, D.J. 1983 QI 2, 3 11-14 Nebulas as structural data models   40
Schach, S.R. 1983 QI 2, 3 7-10 An improved implementation of Grimbleby's algorithm   39
Bruwer, P.J.S. 1983 QI 2, 3 1-6 Evaluating the performance of computer-based information systems using a restricted linear regression model   38
Van Rooyen, M.H. 1983 QI 2, 2 29 Die definisie en implementasie van die taal Scrap   36
Popelas, J.M.; Calingaert, P. 1983 QI 2, 2 25-28 Case-grammar representation of programming languages   35
Schach, S,R, 1983 QI 2, 2 19-24 Datastructure traces   34
Visser, P. 1983 QI 2, 2 15-18 Managing and documenting 10-20 man year projects   33
Wulf, S. 1983 QI 2, 2 11-14 Restructuring of the conceptual schema to produce DBMS schemata   32
Hetzel, B.; Calingaert, P. 1983 QI 2, 2 7-10 Detecting errors in computer programs   31
Van Niekerk, J.C. 1983 QI 2, 2 3-6 Die operasionele enkelbedienermodel   30
Pirow, P. 1982 QI 2, 1 31 The relative merits of two organisational behaviour models for structuring a managmeent information system.   28
Becker, R.I.; Perl, Y; Schach, S.R.   QI 2, 1 27-30 An efficient implementation of an algorithm for min-max tree partitioning   27
Schach, S.R. 1982 QI 2, 1 23-26 An interactive graphical array trace   26
Roets, P.P. 1982 QI 2, 1 19-22 Micro-code impelmentation of language interpreters   25
Finnie, G.R. 1982 QI 2, 1 13-18 The design and microprogrammed implementation of a structured language machine   24
Linck, M.H. 1982 QI 2, 1 7-12 A CSP Description of some parallel sorting algorithms   23
Postma, S.W. 1982 QI 2, 1 3-6 The design objectives of Quadlisp   22
Scarrot, G.G. 1980 QI 1, 3 13-19 Thirty years of information engines   20
Postma, S.W. 1980 QI 1, 3 7-12 A high-level programming language for interactive lisp-like languages   19
Stein, D.M. 1980 QI 1, 3 1-6 The memory organisation of future large processors   18
Christensen, A.H.J. 1979 QI 1, 2 44-48 An algorithm for the approximation of surfaces and for the packing of volumes   16
Roets, P.P. 1979 QI 1, 2 41-43 An algorithm for merging disk files in place   15
Danhof, K.J.; Smith, C.L. 1979 QI 1, 2 38-40 The impact of microcomputers in computer science   14
Calingaert. P. 1979 QI 1, 2 34-37 Teacher control in computer-assisted science   13
Turton, T. 1979 QI 1, 2 30-33 The management of operating systems state data   12
Currin, D.C.; Bishop, J.M.; Varol, y.l. 1979 QI 1, 2 26-29 The sequence abstraction in the implementation of EMILY   11
Williams, M.H. 1979 QI 1, 2 23-25 Design principles of the language BPL   10
King, M.C.F.; Naude, G.; Von Solms, S.H. 1979 QI 1, 2 16-22 Database design: choice of a methodology   9
Anderssen, E.C. 1979 QI 1, 2 12-15 Rekenaarondersteunde onderhoud van programmatuurstelsels   8
Penzhordn, A. 1979 QI 1, 2 1-10 Toepaslikheid van 'n analitiese model by die keuse van 'n lêerstruktuur vir 'n teksverwerkingstelsel   7
Radue, J.E. 1979 QI 1, 1 30-36 Text compression techniques   5
Phillips, N.C.K. 1979 QI 1, 1 26-29 The P-NP question and recent independence results   4
Pederby, N.J. 1979 QI 1, 1 17-25 Distributed Computer Systems - a review   3
Heher, A.D. 1979 QI 1, 1 5-16 Real-time interactive multiprogramming   2
Rodd, M.G. 1979 QI 1, 1 1-4 A hardware based real-time operating system   1