SAICSIT founded and supports the SA Computer Journal (SACJ). The South African Computer Journal is an accredited specialist ICT academic journal, publishing research articles, technical reports and communications in English in the Computer Science and Information Systems domains. The journal has been on Scopus since 2016, and appears on the DHET sub-list of Scopus-indexed journals that qualify for subsidy for articles published by South African academics at public universities. For more information on SACJ and all recent issues, see http://sacj.cs.uct.ac.za
Authors | Year | Issue | Page no | Title | Keywords | Link |
Machanick, P | 2000 | SACJ 25 | 68-77 | Scalability of the RAMpage memory hierarchy | Memory hierarchy, memory wall, caches, computer system performance simulation | 241 |
Sanders, ID; Watts, DC; Hall, AD | 2000 | SACJ 25 | 56-67 | Orthogonal axial line placement in chains and trees of orthogonal rectangles | Computational geometry, NP-complete problems, covering, guarding, orthogonal rectangles, axial lines | 240 |
Waldron, JT | 2000 | SACJ 25 | 45-55 | Object Oriented programs and a stack based virtual machine | Virtual machines, languages and compilers, interpreters, run-time environments | 239 |
Tapamo, JR | 2000 | SACJ 25 | 38-44 | Syntactic description of neighbourhood in Quadtree | Quadtree, rewriting rules, image processing, neighbourhood, q-code | 238 |
Nieuwoudt, C; Botha, EC | 2000 | SACJ 25 | 32-37 | Multilingual training of acoustic models in automatic speech recognition | Adaptation, multilingual, speech recognition | 237 |
Abdulrab, H; Ngomo, M; Drissi-Talbi, A | 2000 | SACJ 25 | 23-31 | A declarative framework for temporal discrete simulation | Integer programming, process, model of temporal computation, simulation, constraints on natural numbers, unification | 236 |
Cloete, E; Venter, LM | 2000 | SACJ 25 | 18-22 | Image coding with fractal vector quantisation | Fractal compression, image coding, vector quantization | 235 |
Clarke, MC | 2000 | SACJ 25 | 12-17 | Tehnological experience and technophobia in South African university students | Technophobia, attitudes to computers, South Africa, technological experience | 234 |
Bouras, Z-E; Khammaci, T; Ghoulf, S | 2000 | SACJ 25 | 3-11 | A new approach for Program Integration | Software maintenance, program dependence graph, program integration, slice, role. | 233 |
Du, B; Maeder, A | 1999 | SACJ 24 | 210-214 | Approaches to video transmission over GSM networks | Mobile telecommunications, video transmission, video coding, GSM, H.263 | 232 |
Li, F; Liu, Y; Lee, JY; Ahmad, I | 1999 | SACJ 24 | 146-154 | Shortest delay scheduling algorithm for lossless quality transmission of stored VBR video under limited bandwidth | Smoothing algorithm, VBR video, temporal burstiness, safe interval, bandwidth, bandwidth profile, scheduling, conflict | 231 |
Galpin, V; Hazelhurst, S; Mueller, C; Sanders, I | 1999 | SACJ 24 | 258-263 | Introducing research methods to Computer Science honours students | Computer science education, research methods | 230 |
Handzic, M; Low, G | 1999 | SACJ 24 | 194-200 | The role of experience in user perceptions of information technology: an empirical examination | Experience, perceived usefulness, perceived ease of use, information technology acceptance, computer education | 229 |
Turner, R; Lowry, G | 1999 | SACJ 24 | 136-145 | Reconciling the needs of new information systems graduates and their employers in small, developed countries | Information systems education, social issues, the computing profession | 228 |
Van den Bergh, F; Lalioti, V | 1999 | SACJ 24 | 155-162 | Software chroma keying in an immersive virtual environment | Virtual reality, immersive telepresence, chroma keying | 227 |
Van Zijl, L; Van der Walt, APJ | 1999 | SACJ 24 | Some automata-theoretic properties of -NFA | Nondeterminism, automata theory | 226 | |
Lee, M | 1999 | SACJ 24 | 201-209 | What are websites used for - cost-saving, revenue generating or value creating? | Electronic commerce, strategic analysis, business model, functional analysis, web-site study | 225 |
Yu, L; Khong, SC; Xun, Y; Yuan, M | 1999 | SACJ 24 | 128-135 | Improving object-oriented analysis by explicit change analysis | Object-orientation, change analysis, software engineering, changeability | 224 |
Panagou, S; Bangay, S | 1999 | SACJ 24 | 185-193 | The development of a generic framework for the implementation of a cheap, component-based virtual video-conferencing system | Three dimensional graphics and realism, reconstruction, scene analysis: tracking, shape, time-varying imagery, videoconferencing, coding and information theory | 223 |
Prange, J; Bishop, J | 1999 | SACJ 24 | 249-252 | Distributed operating systems: a study in applicability | SCADA, distributed operating concepts, real-world application | 222 |
Rock, ST | 1999 | SACJ 24 | 264 | Visualising eventuality structure | Visualisation, natural language, eventuality structure | 221 |
Schimkat, RD; Kuchlin, W; Krautter, R | 1999 | SACJ 24 | 244-248 | An object-oriented framework for rapid client-side integration of information management systems | Frameworks, software reuse, components, design patterns, java, internet, document management systems | 220 |
Shear, S | 1999 | SACJ 24 | 229-233 | Multimedia as a positive force to leverage web marketing, with particular reference to the commercial sector | Internet, Multimedia, audio, video advertising | 219 |
Smit, J | 1999 | SACJ 24 | 219-222 | Grounded theory methodology in IS research: Glaser vs Strauss | Grounded theory, IS research, research methodology | 218 |
Viktor, HL | 1999 | SACJ 24 | 176-184 | The CILT multi-agent learning system | Multi-agent learning, rule induction, data analysis, knowledge discovery | 217 |
Von Solms, R; Van de Haar, H | 1999 | SACJ 24 | 215-218 | From information security baselines to information security profiles | None | 216 |
Waldron, JT; Horgan, J; Keogh, G | 1999 | SACJ 24 | 168-175 | Statistical analysis of an automated computer architecture learning environment | Assembly language programming, computer-managed instruction | 215 |
Warren, P | 1999 | SACJ 24 | 234-238 | Understanding HCI methodologies | Human computer interface methodologies, software engineering, interactive computer systems | 214 |
Zimmer, R; Holt, R | 1999 | SACJ 24 | 223-228 | Introducing a continuum of abstraction-led hierarchical search techniques | Heuristic search, abstraction | 213 |
Holt, A | 1999 | SACJ 24 | 253-257 | Formal verification with natural language specifications: guidelines, experiments and lessons so far | Formal verification, natural language specification, model checking | 212 |
Buhler, D; Nusser, G; Gruhler, G; Kuchlin, W | 1999 | SACJ 24 | 128-135+F36 | A Java client/server system for accessing arbitrary CANopen fieldbus devices via the Internet | Network computing, CANopen device, Java api, fieldbus, internet, client/server, distance education, remote maintenance | 211 |
Lawrence, E.; Garner, B. | 1999 | SACJ 24 | 119-127 | Harmonizing global internet tax: a collaborative extranet model | Extranet, evidence based medicine, case based reasoning | 210 |
Hazelhurst, S. | 1999 | SACJ 24 | 110-118 | Generalised unification of finite temporal logic formulas | Unification, temporal logic, pattern matching | 209 |
Keiller, P.A.; Mazzuchi, T.A. | 1999 | SACJ 24 | 105-109 | Enhancing the predictability of two popular software reliability growth models | Software reliability, maximum likelihood method, Laplace trend test | 208 |
Averweg, U.; Erwin, G.J. | 1999 | SACJ 24 | 95-104 | Critical success factors for the implementation of DSS at a selection of organisations in Kwazulu-Natal, South Africa | Critical success factors, DSS, top management support, user information satisfaction | 207 |
Thomas, T.A. | 1999 | SACJ 24 | 87-94 | Cooperating to learn using JAD techniques | Information systems education, JAD, cooperative learning | 206 |
Barrow, J. | 1999 | SACJ 24 | 77-86 | Computer programming and learning to write | Teaching programming, information systems teaching, teaching methodology, distance teaching, writing | 205 |
Levitt, S.P.; Dwolatzky, B. | 1999 | SACJ 24 | 68-76 | BuRS: a building recognition system | Computer vision, building extraction, homogenous operator | 204 |
Njovu, C.; Gray, W.A. | 1999 | SACJ 24 | 58-67 | A pragmatic approach to bitemporal databases: conceptualisaiton, representation and visualisation | Bitemporal objects, bitemporal states, bitemporal event, time-varying attributes, bitemporal databases, valid time, transaction time, event-oriented approach, visualisation | 203 |
Trakulsuk, P.; Avatchanakorn, V. | 1999 | SACJ 24 | 49-57 | A conceptual design for high-volume data processing of warehouse database into multidimensional database | Databases, data model, graph model, data warehouse, OLP | 202 |
Torn, A.; Andersson, T.; Enholm, K. | 1999 | SACJ 24 | 40-48 | A complexity metrics model for software | Computer program, hierarchical measure, software metrics, structural complexity | 201 |
Meyer, T.A. | 1999 | SACJ 24 | 33-39 | An information-theoretic semantics for belief change | Artificial intelligence, knowledge representation, belief revision, theory change, belief contraction | 200 |
Petkova, O.; Roode, J.D. | 1999 | SACJ 24 | 26-32 | An application of a framework for evaluation of the factors affecting software development productivity in the context of a particular organisational environment | IS development, software productivity, soft systems thinking, AHP | 199 |
Kotze, P. | 1999 | SACJ 24 | 15-25 | A generic modelling framework for interactive authoring support environments | Formal modelling, interactive systems, generic models, usability, authoring support environments | 198 |
Quilling, R.D.; Erwin, G.J.; Petkova, O. | 1999 | SACJ 24 | 5-14 | Active learning: Issues and challenges for information systems and technology | Information systems education, active learning, deep learning | 197 |
Jansen van Renburg, M. | 1999 | SACJ 23 | 107-120 | Progressing towards object orientation in South Africa | Object orientation, methodology | 196 |
Abdulrab, H.; Ngomo, M.; Drissi-Talbi, A. | 1999 | SACJ 23 | 98-106 | A declarative and non-determinist framework for dynamic object-oriented and constraint logic programming | Multiple states object, multiple definitions method, freezing mechanisms, object-oriented programming, constraint and logic programming, state changes | 195 |
Smuts, W. | 1999 | SACJ 23 | 92-97 | A 3-dimensional security classification for information | Information security, information classification | 194 |
Wortmann, K.L.; Petkov, D.; Senior, E. | 1999 | SACJ 23 | 72-84 | Indexing in a case-based reasoning system for waste management | Case-based reasoning, indexing, waste management | 193 |
Patsouris, P.A.; Korostenski, M.; Kissimov, V. | 1999 | SACJ 23 | 54-71 | A formal model for object bases | FMOB (formal model for objectbases), universal algebra of words, functionally complete algebra, two-level hierarchy of objects, 2-class, 2-object, digraphs, accessible set-systems, greedoids | 192 |
Cronje, J.C.; Baras Baker, S.J. | 1999 | SACJ 23 | 42-53 | Electronic performance support systems: appropriate technology for the development of middle management in developing countries | Electronic performance support systems, evaluation, user acceptance, automation, computer-assisted instruction | 191 |
Sanders, I.; Lubinsky, D.; Sears, M.; Kourie, D. | 1999 | SACJ 23 | 18-29 | Orthogonal ray guarding of adjacencies between orthogonal rectangles | Computational geography, NP-complete, covering, guarding, orthogonal rectangles | 190 |
Van der Poll, J.A.; Labuschagne, W.A. | 1999 | SACJ 23 | 3-17 | Heuristics for resolution-based set-theoretic proofs | Heuristics, problem frames, resolution, set theory, theorem-proving, Z, ZF | 189 |
Machanick, P. | 1999 | SACJ 23 | 1 | Computer science and information systems: the future? | None | 188 |
Jackson, M.A. | 1999 | SACJ 22 | 47-60 | Problem analysis using small problem frames | Software engineering, problems, frames, framework, patterns | 187 |
Misra, J. | 1999 | SACJ 22 | 32-46 | A logic for the design of multiprogramming systems | Safety, progress, invariant, stable, fixed point, liveness, fairness, trnsient, ensures, leads-to | 186 |
Gries, D.; Schneider, F.B. | 1999 | SACJ 22 | 28-31 | Teaching math more effectively, through the design of calculational proofs | None | 185 |
Morgan, C.; McIver, A. | 1999 | SACJ 22 | 14-27 | pGCL: formal reasoning for random algorithms | Program correctness, probability, demonic nondeterminism, random algorithm, predicate transformer, weakest precondition, guarded command, correctness proof, invariant, variant | 184 |
Bjorner, D. | 1999 | SACJ 22 | 3-13 | Where do software architectures come from? | Software engineering, domain engineering, requirements engineering, software design, software architecture, program organisation, abstrcation, modelling, development validation, correctness verification, formal specification, RAISE, RSL | 183 |
Tcheeko, L. | 1998 | SACJ 21 | A63-A68 | Recursive specifications and formal logic | Artificial intelligence, tutoring system, pragmatic approach, computational models, recursive specifications, student model | 182 |
Pretorius, L. | 1998 | SACJ 21 | A55-A62 | Applied Lambda calculus | Applied Lambda calculus, type theory, proof assistants, Coq | 181 |
Cloete, I.; Venter, L.M. | 1998 | SACJ 21 | A49-A54 | Fractal image compression | Fractal image, comrpession, contraction, IFS, self-similarity, transformations | 180 |
Ram, V. | 1998 | SACJ 21 | 44-48 | Specific acquisition of collective belief knowledge for sicially motivated multiagent systems | Multiagent systems, knowledge acquisition, applications | 179 |
Knottenbelt, W.; Kritzinger, P. | 1998 | SACJ 21 | 34-43 | A performance analyser for the numerical solution of general Markov chains | Performance analysis, Markov chains, state space generation, probabilistic dynamic storage, steady state solution, Krylov subspace techniques, DINAmaca | 178 |
Clarke, M.C.; Finnie, G.R. | 1998 | SACJ 21 | 26-33 | Changes in entry-level university students' attitudes to computers from 1985-1997 | Attitudes towards computers, education, South Africa | 177 |
Machanick, P.; Salverda, P. | 1998 | SACJ 21 | 16-25 | Preliminary investigation of the RAMpage memory hierarchy | Memory hierarchy, caches, paging, software-controlled replacement | 176 |
Paijmans, H. | 1998 | SACJ 21 | 4-15 | Text categorization as an information retrieval task | Machine learning, classification | 175 |
Renaud, K.; Kotze, P. | 1997 | SACJ 20 | 62-66 | The recovery problem in multidatabase systems - characteristics and solutions | Multidatabase systems, transaction management, global commitment, database consistency, crash recovery | 174 |
Vosloo, I. | 1997 | SACJ 20 | 57-61 | Mobile agents at ISADS 97 | None | 173 |
Kotze, P.; De Villiers, R. | 1997 | SACJ 20 | 49-56 | Applying software engineering methods to instructional systems development | Software engineering, computer-aided instruction, instructional systems development, courseware engineering | 172 |
Van der Merwe, A.J.; Labuschagne, W.A. | 1997 | SACJ 20 | 44-48 | Theory meets practice | Normalization, database design, file design | 171 |
Remenyi, D. | 1997 | SACJ 20 | 36-43 | Some typical phases of a business transformation project | Business process reengineering, transformation, methodology, continuous improvement, delayering, core processes, outsourcing | 170 |
Rensleigh, C.W.; Olivier, M.S. | 1997 | SACJ 20 | 25-35 | A computerised-consultation service for the computerisation of the very small small-business enterprise | Small-business enterprise, computerisation, consultant, end-users, hardware, software, expert system | 169 |
Sanders, I.; Tsai, C. | 1997 | SACJ 20 | 18-24 | Word prediction strategies in program editing environments | Disabled users, word prediction, prediction strategies, predictive editors | 168 |
Olivier, M.S. | 1997 | SACJ 20 | 11-17 | Secure mobile nodes in federated databases | Distributed systems, distributed databases, database management, mobile computing, security and protection | 167 |
Machanick, P. | 1997 | SACJ 20 | 2-10 | The abstraction-first approach to encouraging reuse | Object-oriented programming, abstraction, reuse, computer science education | 166 |
McIver, A.K.; Morgan, C.; Sanders, J.W. | 1997 | SACJ 19 | 78-102 | Application-oriented program semantics | Semantics, formal methods, refinement, data refinement, process algebra, probability, Galois, connection, binary relations, predicate transformers | 165 |
Peleska, J.; Siegel, M. | 1997 | SACJ 19 | 53-77 | Test automation of safety-critical reactive systems | Test generation, test strategies, dependability, fault-tolerance,reactive systems | 164 |
Schlingloff, B | 1997 | SACJ 19 | 27-52 | Verification of finite state systems with temporal logic model checking | Computer aided verification, finite state systems, temporal logic, model checking, modal logic, expressivity, expressiveness, w-languages, Buchi-automata, completeness, decision procedures, tableaus, specification, binary decision diagrams (BDDs), partial order methods, stubborn sets | 163 |
Blackburn, P.; Jaspars, J.; De Rijke, M. | 1997 | SACJ 19 | 2-26 | Reasoning about changing information | Theory change, knowledge representation, modal logic, dynamic logic | 162 |
Brink, C. | 1997 | SACJ 19 | 1 | WOFACS '96: Workshop on formal and applied computer science | None | 161 |
Smith, D. | 1996 | SACJ 18 | A69-A72 | The new IS'95 curriculum | IS education, course accreditation, IS professionalism | 160 |
Sutcliffe, G.; Melville, S. | 1996 | SACJ 18 | 57-68 | The practice of clausification in automatic theorem proving | Automatic theorem proving, clauses, resolution | 159 |
Donaldson, S.R.; Bause, F.; Kritzinger, P.S. | 1996 | SACJ 18 | 45-56 | The complexity of Petri Net transformations | Petri Nets, analysis of algorithms, problem complexity, program verification, model validation and analysis | 158 |
Scott, T.G.; Hattingh, J.M.; Steyn, T. | 1996 | SACJ 18 | 40-44 | An AI search algorithm to obtain the shortest simplex path | Linear programming, artificial intelligence, simplex mthod, search algorithm, A*-algorithm | 157 |
Renaud, K.; Kotze, P. | 1996 | SACJ 18 | 32-39 | An integrated classification of multiple database systems | Multiple database system, autonomy, heterogeneity, distribution, multidatabase, schema, database management system | 156 |
Blewett, C.N.; Erwin, G.J. | 1996 | SACJ 18 | 24-31 | Dynamic deadlock avoidance: a prototype | Deadlock, database, expert system, scripts, knowledge representation | 155 |
Shewaram, T. | 1996 | SACJ 18 | 15-23 | Business process reengineering: a down to earth critique | Business process reengineering, process orientation, Michael Hammer, James Champy, socio-technical school | 154 |
Koornhof, C. | 1996 | SACJ 18 | 10-14 | The homological transfer research method revisited | Homologous transfers, homological transfer research method, research method, systems theory, taxonomy | 153 |
Addison, T.M.; Hamersma, S. | 1996 | SACJ 18 | 4-9 | Critical success fctors for implementing CASE at a selection of companies in South Africa | CSF, critical success factor, upper CASE, integrated CASE | 152 |
Pangalos, G.; Khair, M. | 1996 | SACJ 17 | 45-53 | Design of secure medical database systems | Database systems security, medical database security, secure database design | 151 |
Mncube, S.S. | 1996 | SACJ 18 | 1-3 | A pragmatic approach to development information to provide service on a wide scale | None | 151 |
Von Solms, S.H. | 1996 | SACJ 17 | 36-44 | Information security on the electronic superhighway | Security protocols, internet, world wide web, SSL, SHTTP, SEPP | 150 |
De Ru, W.G.; Eloff, J.H.P. | 1996 | SACJ 17 | 26-35 | Reinforcing password authentication with typing biometrics | Computer security, authentication, biometrics, keystroke dynamics, fuzzy logic, authentication, passwords | 149 |
Muftic, S. | 1996 | SACJ 17 | 17-25 | Functional and operational security system for open distributed environments | D.4.6, C.2.4 | 148 |
Hoffman, L.J. | 1996 | SACJ 17 | 10-16 | Encryption policy for the global information infrastructure | Information security, Cryptology policy, export control | 147 |
Parker, D.B. | 1996 | SACJ 17 | 4-9 | A new framework for information security to avoid information anarchy | Information security, confidentiality, integrity, availability | 146 |
Von Solms, B. | 1996 | SACJ 17 | 1-3 | Information security - the family member who came home | None | 145 |
Bishop, J.M. | 1996 | SACJ 16 | 54-A65 | The status of computing manpower and training in tertiary education in Southern African universities 1995 | 144 | |
Whittaker, L. | 1996 | SACJ 16 | 40-53 | The evaluation of business process reengineering projects in South Africa | Business process reengineering, evaluation, benefits, measurement | 143 |
Froneman, L.; Roode, J.D. | 1996 | SACJ 16 | 31-39 | Reviewing IS curricula: a practical approach | IS curriculum, IS skills requirements, IS training and development | 142 |
Machanick, P. | 1996 | SACJ 16 | 23-30 | Efficient shared memory multiprocessing and object-oriented programming | Object-oriented programming, parallel programming, cache-based shared-memory systems | 141 |
De Jager, N.; Roos, J. | 1996 | SACJ 16 | 18-22 | ATM transmission convergence implementations: SONET/SDH vs cell-based | ATM, SONET, SDH, cell-based, transmission convergence sublayer, physical layer | 140 |
Petkov, D. | 1996 | SACJ 16 | 13-17 | An approach for the standardisation of policies for selection of computer hardware and software | Decentralised decision making, multiple criteria decision support systems, analytic hierarchy process | 139 |
Blake, G. | 1996 | SACJ 16 | 2-12 | Information technology and South Africa's Green Paper on Science and Technology | None | 138 |
Yellen, R.E.; Sanford, C.C. | 1995 | SACJ 15 | 45-50 | Lessons from Singapore and Zimbabwe: a model for emerging countries to achieve quality economic growth | Information technology, economic growth | 137 |
Lai, L.S.L. | 1995 | SACJ 15 | 36-44 | A pluralistic approach to systems development | Pluralistic approach, systems development, soft systems methodology, strategic data planning methodologies, developing countries | 136 |
Grobler, M. | 1995 | SACJ 15 | 26-35 | Computer-supported cooperative education to support development in South Africa | South Africa, education, information technology, computer-supported cooperative education, development | 135 |
Korpela, M. | 1995 | SACJ 15 | 20-25 | Who will implement information technology for development? | Information technology, socio-economic development, Africa | 133 |
Crossman, T.D.; Fortmann, P.; Heneke, V.; Murray, D. | 1995 | SACJ 15 | 13-19 | Information technology in a developing economy | Developing economies, social responsibilities, value of IT, unemployment | 132 |
Avgerou, C.; Madon, S. | 1995 | SACJ 15 | 4-12 | Development, self-determination and information | Development, self-determination, information | 131 |
Oosthuysen, W.H.; McDonald, T. | 1995 | SACJ 14 | A80-A187 | Limitations and problems of management applications that use enterprise extensions to the SNMP MIB | Simple network management protocol (SNMP), management information base (MIB), enterprise MIB extensions, integrated network management | 130 |
Messerschmidt, H.J. | 1995 | SACJ 14 | A77-A79 | Computer fraud in SA: an indictment of Information Systems | Computer fraud, computer crime | 129 |
Tromp, P.J.; Roode, J.D. | 1995 | SACJ 14 | 64-75 | Enabling a collaborative approach to management | Groupware, group decision support systems, collaborative work, computer supported co-operative work, organizational impact | 128 |
Halland, K.J.; Labuschagne, W.A. | 1995 | SACJ 14 | 59-63 | A family tree of circumscriptive logics | Circumscription, nonmonotonic logic, second-order logic | 127 |
Ludik, J.; Cloete, I. | 1995 | SACJ 14 | 48-58 | Training strategies for architecture-specific recurrent neural networks | Training strategies, architecture-specific recurrent neural networks, incremental, increased complexity | 126 |
Vahed, A. | 1995 | SACJ 14 | 42-47 | The recall performance of multiple associative memories - a comparison of thresholding strategies | Associative memory, recall performance, neural networks | 125 |
Kisimov, V.; Da Silva, I. | 1995 | SACJ 14 | 28-41 | Parallel distributed objects' structure and their synchronization in an APPC environment | Distributed systems, synchronisation mechanisms in distributed systems, distributed objects, concurrent programming, distributed databases | 124 |
Paijmans, H. | 1995 | SACJ 14 | 20-27 | Word frequencies in scientific prose | Information retrieval, word frequencies, SMART, full-text document | 123 |
Parkinson, E.; Warren, P.R. | 1995 | SACJ 14 | 14-19 | A comparison of graph colouring techniques | Graph colouring, heuristic algorithms, NP-hard, random graphs | 122 |
Jones, M.R. | 1995 | SACJ 14 | 1-11 | Business process reengineering: managmeent's new paradigm or emperor's new clothes? | Business process reengineering | 121 |
Morgan, C. | 1995 | SACJ 13 | 64-96 | The refinement calculus | Refinement, weakest preconditions, program development, specifications, data refinement, miracles | 120 |
Goslett, J.; Melton, A. | 1995 | SACJ 13 | 45-63 | A gentle introduction to domain theory: domains and powerdomains | Domains, powerdomains | 119 |
Goldblatt, R. | 1995 | SACJ 13 | 14-44 | Model logics for programs | Modal logic, dynamic logic, linear temporal logic, branching time logics, Hennesy-Milner modal logic, modal mu calculus | 118 |
Brinksma, E.; Langerak, R. | 1995 | SACJ 13 | 2-13 | Functionality decomposition by compositional correctness preserving transformation | Process algebra, correctness preserving transformation, decomposition, bisimulation | 117 |
Remenyi, D. | 1994 | SACJ 12 | 53-66 | The innovative management if Information in the mid-1990s | Innovation, information systems management, business process reengineering, business transformation, virtual corporation, managing change, business restructuring | 116 |
Jordaan, D.B.; Gilliland, S. | 1994 | SACJ 12 | 50-52 | Teaching Pascal using multimedia | Multimedia, teaching methods, video | 115 |
Labuschagne, W.A.; Miller, M.G. | 1994 | SACJ 12 | 43-49 | On using the sitation calculus dynamically rather than temporally | Circumscription frame problem, minimal model, situation calculus, temporal projection problem, Yale shooting scenario | 114 |
Sutherland, F. | 1994 | SACJ 12 | 32-42 | Some current practices in evaluating IT benefits in South African organisations | IT benefits, evaluation, payback, intangible, post-implementation audit, system types | 113 |
Mata-Montero, M.; Ellis, J.A. | 1994 | SACJ 12 | 21-31 | A linear time algorithm for the longest (s-t)-path problem restricted to partial-k-trees | Bounded treewidth, partial k-trees, longest path, linear time algorithn | 112 |
Theron, H.; Cloete, I. | 1994 | SACJ 12 | 12-20 | Specialisation by exclusion | Learning from examples, irredundant set covers | 111 |
Lochovsky, F.H. | 1994 | SACJ 12 | 1-11 | Organizatinal computing technologies for supporting organizational activities | None | 110 |
Introna, L.D. | 1994 | SACJ 11 | 1-6 | Ideologies of information systems and technology | None | 109 |
Krzesinski, T. | 1994 | SACJ 11 | 99-102 | The FRD special programme on collaborative software research and development. Draft call for proposals | None | 108 |
Lutu, P.E.N. | 1994 | SACJ 11 | 91-98 | Parallel, execution strategies for conventional logic programs: a review | Logic programs, parallel prolog execution, AND-parallelism, AND-OR parallelism | 107 |
Smuts, W.B. | 1994 | SACJ 11 | 84-90 | A survey of Information Authentication techniques | Authentication, information security, digital signatures | 106 |
Schach, S.R. | 1994 | SACJ 11 | 77-83 | The object-oriented paradigm: uncertainties and insecurities | Object-oriented paradigm, software engineering, management of software | 105 |
Roets, R. | 1994 | SACJ 11 | 68-76 | Information Technology training in organisations: a replication | Information systems training, training, skills, training needs, end-user computing | 104 |
Gardner, B.R. | 1994 | SACJ 11 | 63-67 | Ensuring successful IT utilisation in developing countries | Developing countries, foundations for Information Technology | 103 |
De Kock, G. de V.; Du Plessis, C. | 1994 | SACJ 11 | 58-62 | An evaluation of substring algorithms that determine similarity between surnames | Genealogical database, word, string and surname matching | 102 |
Bause, F.; Kritzinger, P.; Sczittnick, M. | 1994 | SACJ 11 | 47-57 | Markovian analysis of DQDB MAC protocol | DQDB, Markov model, metropolitan area network, performance analysis | 101 |
Berman, S. | 1994 | SACJ 11 | 39-46 | Metadata and security management in a persistent store | Design, experimentation, performance, metadata, security | 100 |
Harrington, G. | 1994 | SACJ 11 | 26-38 | EDI in South Africa: an assessment of the costs and benefits | Electronic data interchange (EDI), EDI benefits, EDI standards, EDI costs, EDIFACT, EDI software, EDI networks, VAN, EDI hardware configurations | 99 |
Finnie, G.R.; Wittig, G.E. | 1994 | SACJ 11 | 18-25 | Effect of system and team size on 4GL software development productivity | Development effort, development team size, software development productivity, system size, total elapsed development time | 98 |
Ram, V. | 1994 | SACJ 11 | 11-17 | Intelligent production scheduling: a survey of current techniques and an application in the footwear industry | Intelligent scheduling, multiple context reasoning | 97 |
Crossman, T.D. | 1994 | SACJ 11 | 7-10 | What is information systems? | Science, nonscience, service, ethics, IS research | 96 |
Crossman, T.D. | 1993 | SACJ 10 | 60-64 | Artificial intelligence, expert systems and business computing: is there a problem? | Artificial intelligence, expert systems, accountability, business computing | 95 |
Ram, V. | 1993 | SACJ 10 | 54-59 | Expert systems for management control: a multi-expert architecture | Distributed expert systems, blackboard architecture, management control | 94 |
De Kock, G. de V.; Du Plessis, C. | 1993 | SACJ 10 | 48-53 | Die empiriese evaluering van variasies van woordpassingsalgoritmes vir die bepaling van ekwivalente vanne in 'n genealogiese databasis | Genealogical database, word matching, name and surname matching | 93 |
Lamprecht, S.M. | 1993 | SACJ 10 | 37-47 | A simulation environment for evaluating distributed query processing algorithms | Distributed database, query processing, query optimization, simulation, performance evaluation | 92 |
Jordaan, D.B.; Hattingh, J.M.; Steyn, T. | 1993 | SACJ 10 | 32-36 | Die versoening vna konflikterende doelwitte in die databasisomgewing met behulp van regressiemetodes | Databasis, datamodel, databasisomgewing | 91 |
Norman, M.J.; Berman, S. | 1993 | SACJ 10 | 23-31 | SSDE: CASE in Education | Case tools, software engineering education, structured development | 90 |
Remenyi, D.S. | 1993 | SACJ 10 | 14-22 | The key issues in Information Management for the mid-1990s. Back to business basics through the commercialisation of the ISD. | Management issues, rightsizing, outsourcing, culture, change, partnership, systems ownership | 89 |
Mullany, M.; Dos Santos Gomes, A.; Miller, R. | 1993 | SACJ 10 | 8-13 | An enquiry into property-goal type definitions of the term "Information System" | Information system definition, information system properties, information system goals | 88 |
Parker-Nance, T.C.; Warren, P.R. | 1993 | SACJ 10 | 1-7 | Assessing the usability of computer systems | User interface, usability | 87 |
Maddux, R.D. | 1993 | SACJ 9 | 92-130 | A working relational model: the derivation of the Dijkstra-Scholten predicate transformer semantics from Tarski's axioms for the Peirce-Schroder calculus of relations | Relation algebras, semantics, relational, axiomatic, predicate transformers, preconditions | 86 |
Eisinger, N.; Ohlbach, H.J. | 1993 | SACJ 9 | 44-91 | Deduction systems based on resolution | Automated reasoning, deduction, resolution principle | 85 |
Gosleu, J.; Hulley, H.; Melton, A. | 1993 | SACJ 9 | 31-43 | Denotational semantics and domain theory | Semantics, meanings of programs, domains | 84 |
Zucker, J.; Pretorius, L. | 1993 | SACJ 9 | 3-30 | Introduction to computability theory | Computability, recursion, primitive recursion, church-turing thesis, recursive enumerability | 83 |
Labuschagne, W.A.; Van der Westhuizen, P.L. | 1992 | SACJ 8 | 77-86 | Logic programming: ideal vs practice | Logic programming, resolution, negation-as-failure, closed world assumption, completed database, stratified program | 82 |
Bradshaw, J. | 1992 | SACJ 8 | 70-76 | Qualitative reasoning: an introduction | Qualitative reasoning, process centered, component centered, constraint based | 81 |
Clarke, M.C. | 1992 | SACJ 8 | 63-69 | Social responsibility for computign professionals and students | University computing curricula, social impact of computing, computer ethics, professional responsibility | 80 |
Smith, D.C.; Newton, S.; Riley, M.J. | 1992 | SACJ 8 | 51-62 | An evaluation of the skill requirements of entry-level graduates in the Information Systems industry | IS skills, IS curricula, IS graduates, IS education | 79 |
Couger, J.D.; Smith, D.C. | 1992 | SACJ 8 | 46-51 | Evaluating the motivating environment for Information Systems personnel in South Africa compared to the United States (Part II) | Motivation, IS personnel, career paths, productivity | 78 |
Wheeler, G.; Kritzinger, P.S. | 1992 | SACJ 8 | 37-45 | PEW: a tool for the automated performance analysis of protocols | Computer networks, communication protocols, protocol engineering, performance evaluation, correctness of protocols | 77 |
Theron, H.; Cloete, I. | 1992 | SACJ 8 | 32-36 | Beam search in attribute-based concept induction | Learning from examples, beam search, pruning | 76 |
De Villiers, P.J.A. | 1992 | SACJ 8 | 24-31 | A model checker for transition systems | Verification, transition systems, branching time temporal logic, model checking | 75 |
Carson, D.I.; Oellermann, O.R. | 1992 | SACJ 8 | 12-23 | A new algorithm for finding an upper bound of the genus of a graph | PQ-trees, genus, circuit layouts | 74 |
Calitz, A.P.; De Kock, G. de V.; Venter, D.J.L. | 1992 | SACJ 8 | 4-11 | Selection criteria for first year Computer Science students | First year Computer Science student selection, selection criteria, matriculation results, Computer Science education | 73 |
Clayton, P.G. | 1992 | SACJ 7 | 90-96 | The CSP notation and its application to parallel processing | CSP, communicating sequential processes | 72 |
Jayasekera, U.; Phillips, N.C.K. | 1992 | SACJ 7 | 85-86 | An implementation of the parallel conditional | Language construct, conditional, guarded command | 71 |
Couger, J.D.; Smith, D.C. | 1992 | SACJ 7 | 79-84 | Evaluating the motivating environment for Information Systems personnel in South Africa compared to the United States (Part 1) | Motivation, IS personnel, career paths, productivity | 70 |
Oosthuizen, G.D.; Avenant, C. | 1992 | SACJ 7 | 72-78 | Integrating similarity-based and explanation-based learning | Artificial intelligence, machine learning | 69 |
Wood, P.T. | 1992 | SACJ 7 | 67-71 | Efficient evaluation of regular path programs | Deductive databases, logic programming, optimization, rule rewriting | 68 |
Viktor, H.L.; Rennhackkamp, M.H. | 1992 | SACJ 7 | 59-66 | Extending local recovery techniques for distributed databases | Database management, distributed database system, failures, recovery techniques, recovery | 67 |
Van Zijl, L.; Mitton, D. | 1992 | SACJ 7 | 44-58 | Using statecharts to design and specify a direct-manipulation user interface | Human-computer interface, X-Windows, reactive systems, statecharts | 66 |
Melville, S.W. | 1992 | SACJ 7 | 37-43 | Analysing routing strategies in sporadic networks | Sporadic networks, routing, meteor-burst communications | 65 |
Machanick, P. | 1992 | SACJ 7 | 27-36 | Design of an object-oriented framework for optimistic parallel simulation on shared-memory computers | Simulation, parallel processing, object-oriented programming | 64 |
MacGregor, K.J.; Campbell, R.H. | 1992 | SACJ 7 | 21-26 | The design and analysis of distributed virtual memory consistency protocols in an object-orientated operating system | None | 63 |
Brink, C.; Rewitzky, I. | 1992 | SACJ 7 | 11-20 | Modelling the algebra of weakest preconditions | Guarded commands, invariants, predicate transformers, weakest preconditions | 62 |
Clayton, P.G.; Wentworth, E.P.; Wells, G.C.; De-Heer-Menlah, F.K. | 1992 | SACJ 7 | 3-10 | An implementation of Linda Tuple space under the Helios operating system | Distributed systems, parallel processing, transputer, Linda, Helios | 61 |
Clayton, P.G. | 1992 | SACJ 6 | 90-96 | The CSP notation and its application to parallel processing | CSP, communicating sequential processes | 60 |
Jayasekera, U.; Phillips, N.C.K. | 1992 | SACJ 6 | 85-86 | An implementation of the parallel conditional | Language construct, conditional, guarded command | 59 |
Couger, J.D.; Smith, D.C. | 1992 | SACJ 6 | 79-84 | Evaluating the motivating environment for Information Systems personnel in South Africa compared to the United States (Part 1) | Motivation, IS personnel, career paths, productivity | 58 |
Oosthuizen, G.D.; Avenant, C. | 1992 | SACJ 6 | 72-78 | Integrating similarity-based and explanation-based learning | Artificial intelligence, machine learning | 57 |
Wood, P.T. | 1992 | SACJ 6 | 67-71 | Efficient evaluation of regular path programs | Deductive databases, logic programming, optimization, rule rewriting | 56 |
Viktor, H.L.; Rennhackkamp, M.H. | 1992 | SACJ 6 | 59-66 | Extending local recovery techniques for distributed databases | Database management, distributed database system, failures, recovery techniques, recovery | 55 |
Van Zijl, L.; Mitton, D. | 1992 | SACJ 6 | 44-58 | Using statecharts to design and specify a direct-manipulation user interface | Human-computer interface, X-Windows, reactive systems, statecharts | 54 |
Melville, S.W. | 1992 | SACJ 6 | 37-43 | Analysing routing strategies in sporadic networks | Sporadic networks, routing, meteor-burst communications | 53 |
Machanick, P. | 1992 | SACJ 6 | 27-36 | Design of an object-oriented framework for optimistic parallel simulation on shared-memory computers | Simulation, parallel processing, object-oriented programming | 52 |
MacGregor, K.J.; Campbell, R.H. | 1992 | SACJ 6 | 21-26 | The design and analysis of distributed virtual memory consistency protocols in an object-orientated operating system | None | 51 |
Brink, C.; Rewitzky, I. | 1992 | SACJ 6 | 11-20 | Modelling the algebra of weakest preconditions | Guarded commands, invariants, predicate transformers, weakest preconditions | 50 |
Clayton, P.G.; Wentworth, E.P.; Wells, G.C.; De-Heer-Menlah, F.K. | 1992 | SACJ 6 | 3-10 | An implementation of Linda Tuple space under the Helios operating system | Distributed systems, parallel processing, transputer, Linda, Helios | 49 |
Shaw, V. | 1991 | SACJ 5 | 75-76 | An update on UNINET-ZA: the Southern African academic and research network | None | 48 |
Crossman, T.D. | 1991 | SACJ 5 | 70-74 | A method of controlling quality of application software | Inspection teams, software quality, development costs, errors, egoless programming | 47 |
Caduri, A.; Kourie, D.G. | 1991 | SACJ 5 | 58-69 | Cost-effective visual simulation based on graphics workstations | Computer generated imagery, visual simulation, graphics workstation | 46 |
Von Solms, S.H.; Ehlers, E.M.; Enslin, D.J. | 1991 | SACJ 5 | 54-56 | Knowledge representation using formal grammars | None | 45 |
Hazelhurst, S.E. | 1991 | SACJ 5 | 44-53 | A Linda solution to the evolving philosophers problem | Change management, Linda, evolving philosophers problem, dining philosophers problem | 44 |
Sartori-Angus, A.G.; Neville, R. | 1991 | SACJ 5 | 39-43 | PEST - a mmicrocomputer Pascal base expert system shell | Artificial intelligence, expert systems, production systems | 43 |
Kambanis, J. | 1991 | SACJ 5 | 32-38 | Concept network framework for a multi-paradigm knowledge base | Knowledge base, associative networks | 42 |
Smith, T.H.C.; Meyer, T.W.S.; Leenen, L. | 1991 | SACJ 5 | 28-31 | An efficient primal simplex implementation for the continuous 2-matching problem | Matching, travelling salesman problem, linear programming | 41 |
Wessels, L.F.A.; Barnard, E.; Van Rooyen, E. | 1991 | SACJ 5 | 22-27 | The physical correlates of local minima | Neural networks, classifier, backpropagation, training, criterion function, decision boundaries, local minima | 40 |
Greyling, J.H.; Warren, P.R. | 1991 | SACJ 5 | 16-21 | An investigation in the separation of the application from its user interface | User interface, separation, Seeheim model, object oriented programming | 39 |
Du Plessis, J.P.; Messerschmidt, H.J. | 1991 | SACJ 5 | 9-15 | The placement of subprograms by an automatic programming system | Automatic programming, placement of subprograms, program derivation, programming system | 38 |
Barth, G. | 1991 | SACJ 5 | 4-8 | Why the fuss about neural networks? | None | 37 |
Tidwell, L.D. II; Schach, S.R. | 1991 | SACJ 4 | 81-84 | Automatic vectorization | Automatic vectorization, Cray Y-MP, FORGE, FORTRAN, supercomputer, vector machine | 36 |
Erlank, S.; Pelteret, D.; Meskin, M. | 1991 | SACJ 4 | 68-77 | An analysis of the usage of systems development methods in South Africa | System analysis, systems design, methodologies, CASE, systems development | 35 |
Smith, D.C.; Hansen, A.L.; Oosthuizen, N.C. | 1991 | SACJ 4 | 64-67 | A causal analysis of job turnover among systems analysts | System analyst, job turnover, staff shortages, remuneration | 34 |
Finnie, G.R. | 1991 | SACJ 4 | 55-63 | Knowledge-based selection and combination forecasting methods | Expert systems, abduction, forecasting, explanation | 33 |
Bosua, R.; Du Plessis, A.L. | 1991 | SACJ 4 | 46-54 | An ADA compatible specification language | Ada, object-based development methodology, object-relationship-property model, real-time systems, software engineering, specification language, software engineering environment (SEE) system encyclopedia manager (SEM) system, system development life cycle (SDLC) | 32 |
Clayton, P.G. | 1991 | SACJ 4 | 34-45 | An interrupt driven paradigm of concurrent programming | Concurrent notations, parallel processing, distributed processing | 31 |
Viktor, H.L.; Rennhackkamp, M.H. | 1991 | SACJ 4 | 25-33 | Database consistency under UNIX | Consistency, recovery, system failure, UNIX | 30 |
Philips, M.J.; Berman, S. | 1991 | SACJ 4 | 17-24 | The universal relation as a database interface | Universal relation, end-user systems, database navigation | 29 |
Cloete, I.; Theron, H. | 1991 | SACJ 4 | 10-16 | CID3: an extension of ID3 for attributes with ordered domains | Machine learning, induction, decision trees | 28 |
Barrow, J. | 1991 | SACJ 4 | 3-9 | Hypertext for browsing in computer aided learning | Browsing, CAL, discovery learning, structured hypertext | 27 |
Postma, S.W.; McGee, A. | 1990 | SACJ 3 | 53-58 | The fixpoint theorem in the Calculus | Octolisp, fixpoints, equisimultaneity, nondeterminism | 26 |
Pistorius, M.C.; Fallick, P.M. | 1990 | SACJ 3 | 72-75 | A review of the use of computers in education in Southern Africa: tertiary education | None | 25 |
Meumann, M.D.; Rennhackkamp, M.H. | 1990 | SACJ 3 | 23-29 | MINIX for a distributed database system | Distributed database managemnt system, operating system, MINIX | 24 |
Hoffman, P.K.; Smit, G de V | 1990 | SACJ 3 | 30-38 | A file server for a multi-transputer UNIX system | File servers, multiprocessor system, operating systems, satellite systems, transputer | 23 |
Hing, R.L. | 1990 | SACJ 3 | 61-71 | Review of mapping neural networks in classification systems | Neural networks, classificaiton systems, non-linearly separable functions, perception convergence algorithm, LMS rule, back-propagation | 22 |
Heidema, J.; Labuschagne, W.A. | 1990 | SACJ 3 | 39-44 | Data-dependence of semantic information | Information, probability, logic, clause, Boolean algebra, automorphism | 21 |
Du Plessis, C.J.; Rip, S.D.E.; Lay, P.M.Q. | 1990 | SACJ 3 | 5-18 | An exploratory study into communications between IS staff and users during requirement specification | Communications, requirement specifications, system developers | 20 |
Dempster, R. | 1990 | SACJ 3 | 45-52 | OCTOLISP: an experiment with data structures | Lamlbda expression, concurrency, parallellism | 19 |
Bruwer, P.J.S. | 1990 | SACJ 3 | 19-22 | Kritiese faktore vir die suksesvolle afhandeling van inligtingstelselprojekte | Information system, information system project | 18 |
Viljoen, H.C. | 1990 | SACJ 2 | 3-5 | Vth SA computer symposium | None | 17 |
Venter, B.H. | 1990 | SACJ 2 | 45-50 | Data structuring via functions | Data structures, functional data model, sets, lists, records | 16 |
Kritzinger, P.S.; Van Dijk, J. | 1990 | SACJ 2 | 23-30 | An Estelle compiler for a protocol development environment | Estelle, compilers, computer networks, specification languages | 15 |
Naccache de Paz, D. | 1990 | SACJ 2 | 12-16 | On the generation of permutations | Algorithm, permutation, generation, arrangement, rank, unrank | 14 |
Mende, J. | 1990 | SACJ 2 | 6-11 | Homological transfer: an information systems research method | None | 13 |
McCullagh, P.J.; Smit, G. de V. | 1990 | SACJ 2 | 39-44 | Implementing UNIX on the INMOS transputer | Multiprocessor, UNIX, distributed processing, transputer | 12 |
Goosen, H.A.; Cheriton, D.R. | 1990 | SACJ 2 | 31-38 | Predicting the performance of shared multiprocessor caches | Shared-memory multiprocessors, parallel processing | 11 |
Fallick, P.M.; Pistorius, M.C. | 1990 | SACJ 2 | 53-58 | A review of the use of computers in education in South Africa part 1: primary and high schools | None | 10 |
Buys, J.; Messerschmidt, H.J.; Botha, J.F. | 1990 | SACJ 2 | 17-22 | Coping with degeneracy in the computation of dirichlet tessellations | Tessellation triangulation, degeneracy | 9 |
Wood, P.T. | 1990 | SACJ 1 | 11-18 | Finding, regular paths in acyclic graphs | Algorithms, graph databases, finite state automata, query processing, regular expressions | 8 |
Rennhackkamp, M.H. | 1990 | SACJ 1 | 5-10 | The NRDNIX distributed database management system | Database management, distributed database system | 7 |
Oosthuizen, G.D. | 1990 | SACJ 1 | 31-35 | The use of a lattice for fast pattern matching | Knowledge processing, matching, clustering, indexing, information retrieval | 6 |
Murrell, H.C.; Carson, D. | 1990 | SACJ 1 | 36-42 | Image reconstruction via the Hartley transform | Reconstruction, tomography, Hartley transform | 5 |
Mueller, C.S.M. | 1990 | SACJ 1 | 19-23 | Programming using induction | Induction, programming, programming language constructs, verification | 4 |
Mende, J. | 1990 | SACJ 1 | 43-49 | Four major success criteria for information system design | Information systems, success criteria, design objectives, effectiveness, efficiency | 3 |
Mende, J. | 1990 | SACJ 1 | 50-58 | A multi-criteria partitioning technique for information system design | System design, partitioning, success criteria, effectiveness, efficiency, theorem-proving | 2 |
Kambanis, J. | 1990 | SACJ 1 | 24-30 | A design environment for semantic data models | Semantic data models, software engineering environments, data bases, hypertext | 1 |
Paijmans, H. | 1999 | SACJ 23 | 30-41 | Discriminators for authorship attribution | Authorship attribution, machine learning, information retrieval | 0 |
Nieuwoudt, C.; Botha, E.C. | 1999 | SACJ 23 | 85-91 | Connected digit recognition in Afrikaans using hidden Markov models | Connected digit recognition, duration modelling | 0 |
Kourie, D.G. | 1989 | QI 6, 4 | 174 | An approach to defining abstractions, refinements anda enrichments. | 150 | |
Lay, P.M.Q.; Atkinson, C.R. | 1989 | QI 6, 4 | 169-173 | The application of scientific method to information systems analysis | 149 | |
Finnie, G.R. | 1989 | QI 6, 4 | 162-168 | A Cooperating expert's framework for business expert system design | 148 | |
Machanick, P. | 1989 | QI 6, 4 | 153-161 | Software design to meet third world requirements: an experimental software engineering approach | 147 | |
MSc/PhD | 1989 | QI 6, 4 | 143-152 | Abstracts: MSc/PhD CONFERENCE HELD AT Dikololo in 1988 | 146 | |
Venter, B.H. | 1989 | QI 6, 4 | 139-142 | Reflections on the nature and future of computer science in Southern Africa | 145 | |
Anderssen, E.C.; Von Solms, S.H. | 1988 | QI 6, 3 | 129 | Frame clipping of polygons | 143 | |
Short, R. | 1988 | QI 6, 3 | 123-128 | Learning the first step in requirements specification | 142 | |
De Kock, G. de V | 1988 | QI 6, 3 | 119-122 | Die meting van sukses van naampassingsalgoritmes in 'n genealogiese databasis | 141 | |
Kourie, D.G.; Van den Heever, R.J. | 1988 | QI 6, 3 | 13-118 | Experiences in CSP trace generation | 140 | |
Postma, S.W.; Phillips, N.C.K. | 1988 | QI 6, 3 | 109-112 | The parallel conditional | 139 | |
Bruwer, P.J.S. | 1988 | QI 6, 3 | 104-108 | Ranking information system problems in a user environment | 138 | |
Smith, T.H.C. | 1988 | QI 6, 3 | 100-103 | Finding a cheap matching | 137 | |
McDonald, T. | 1988 | QI 6, 3 | 95-99 | A proposed computer network for researchers | 136 | |
Postma, S.W. | 1988 | QI 6, 2 | 89 | Traversible trees and forests | 134 | |
Orlowska, M.E. | 1988 | QI 6, 2 | 83-88 | On syntax and semantics related to incomplete information systems | 133 | |
Cooper, A.K. | 1988 | QI 6, 2 | 77-82 | A data structure for exchanging geographical information | 132 | |
Rennhackkamp, MH; Von Solms, SH | 1988 | QI 6, 2 | 70-76 | Modelling distributed database concurrency control overhead | 131 | |
Wagener, M.J.; De Kock, G DE v | 1988 | QI 6, 2 | 67-69 | Rekenaar spraaksintese: die omskakeling van teks na klank - 'n prestasiemeting | 130 | |
Mende, J. | 1988 | QI 6, 2 | 63-'66 | A classification of partitioning rules for information systems design | 129 | |
De Villiers, D.P.; Von Solms, S.H. | 1988 | QI 6, 1 | 54 | Using NLC-grammars to formalise the take/grant and send/receive security models | 127 | |
Smit, P.J. | 1988 | QI 6, 1 | 33-53 | The use of colour in raster graphics | 126 | |
Mende, J. | 1988 | QI 6, 1 | 28-32 | A structural model of information systems theory | 125 | |
Kritzinger, P.S. | 1988 | QI 6, 1 | 19-27 | Protocol performance using image protocols | 124 | |
Von Solms, S.H.; De Villiers, D.P. | 1988 | QI 6, 1 | 15-18 | Protection graph rewriting grammars and the take/grant security model | 123 | |
Venter, B.H. | 1988 | QI 6, 1 | 8-14 | A new general purpose operating system | 122 | |
Venter, B.H. | 1988 | QI 6, 1 | 2-7 | A detailed look at operating system processes | 121 | |
Du Plessis, A.L.; Bornman, C.H. | 1987 | QI 5, 3 | 67 | The ELSIM Langauge: an FSM based language for ELSIM SEE | 119 | |
Von Solms, S.H. | 1987 | QI 5, 3 | 51-66 | Generating relations using format grammars | 118 | |
Bruwer, P.J.S. | 1987 | QI 5, 3 | 44-50 | Strategic planning models for information systems | 117 | |
Crossman, T.D. | 1987 | QI 5, 3 | 36-43 | A comparison of academic and practitioner perceptions of the changing role of the systems analyst: an empirical study | 116 | |
Mende, J. | 1987 | QI 5, 3 | 32-35 | Three packaging rules for information system design | 115 | |
Bruwer, P.J.S. Groenewald, J.J. | 1987 | QI 5, 3 | 214-31 | A model to evaluate the success of information centres in organisations | 114 | |
Phillips, N.C.K.; Postma, S.W. | 1987 | QI 5, 3 | 21-23 | Pointers as a data type | 113 | |
Byron-Moore, S.P. | 1987 | QI 5, 3 | 13-20 | A program development environment for microcomputers | 112 | |
Orlowska, M.E. | 1987 | QI 5, 3 | 1-12 | Common approach to some informational systems | 111 | |
Clayton, P.G. | 1987 | QI 5, 2 | 63 | Hands-on microprogramming for computer science students | 109 | |
Finnie, G.R. | 1987 | QI 5, 2 | 56-62 | Novice attitude changes during a first course in computing: a case study | 108 | |
Scheepers, C.F. | 1987 | QI 5, 2 | 46-55 | Polygon shading on vector type devices | 107 | |
Bruwer, P.J.S. | 1987 | QI 5, 2 | 40-45 | User attitudes: main reason why information systems fail | 106 | |
Mueller, C.S.M. | 1987 | QI 5, 2 | 29-39 | Set-oriented functional style of programming | 105 | |
Ehlers, E.M.; Von Solms, S.H. | 1987 | QI 5, 2 | 23-28 | Random context structure grammars | 104 | |
Goosen, H.A.; Hoogendoorn, C.H. | 1987 | QI 5, 2 | 16-22 | A model for fault-tolerant computer systems | 103 | |
Anderssen, E.C.; Von Solms, S.H. | 1987 | QI 5, 2 | 7-15 | A CAI model of space and time with special reference to field battles | 102 | |
Wagener, M.J. | 1987 | QI 5, 2 | 1-6 | Rekenaar spraaksintese: die omskakeling van teks na klank | 101 | |
Van der Vegte, L.J. | 1987 | QI 5, 1 | 63 | The development of a syntax checker for LOTOS | 99 | |
Roos, J. | 1987 | QI 5, 1 | 51-62 | The protocol specification language ESTELLE | 98 | |
Podevyn, D. | 1987 | QI 5, 1 | 46-50 | Decision tables as a knwoledge representation formalism | 97 | |
Levieux, C. | 1987 | QI 5, 1 | 41-45 | Education rather than training | 96 | |
Hoogendoorn, C.H. | 1987 | QI 5, 1 | 36-40 | Experience with teaching software engineering | 95 | |
Pirow, P.C. | 1987 | QI 5, 1 | 23-35 | Research computeracy | 94 | |
Berman, S. | 1987 | QI 5, 1 | 19-22 | Semantic information management | 93 | |
Kritzinger, P.S. | 1987 | QI 5, 1 | 11-18 | Local area networks in perspective | 92 | |
Finnie, G.R. | 1987 | QI 5, 1 | 1-10 | On learning styles and novice computer use | 91 | |
Kourie, D.G. | 1986 | QI 4, 3 | 59 | A Partial RJE pad specification to illustrate LOTOS | 89 | |
Carey, C.W.; Hattingh, C.; Kourie, D.G.; Van den Heever, R.J.; Verkroost, R.F. | 1986 | QI 4, 3 | 45-58 | The development of an RJE/X.25 Pad: A case study | 88 | |
Ridler, R.F. | 1986 | QI 4, 3 | 39-44 | In praise of solid state discs | 87 | |
Byron-Moore, S.P. | 1986 | QI 4, 3 | 33-38 | What is wrong with CP/M? | 86 | |
Machanick, P. | 1986 | QI 4, 3 | 27-32 | Low-cost artificial intelligence research tools | 85 | |
Bruwer, P.J.S.; Hattingh, J.M. | 1986 | QI 4, 3 | 21-26 | Models to evaluate the state of computer facilities at South African universities | 84 | |
Van der Poel, K.G.; Bryson, L.R. | 1986 | QI 4, 3 | 13-20 | Protection of computerised private information: a comparative analysis | 83 | |
Berman, S.; Walker, L. | 1986 | QI 4, 3 | 7-12 | A high-level interface to a relational database system | 82 | |
Mende, J. | 1986 | QI 4, 3 | 1-6 | Laws and techniques of information systems | 81 | |
Berman, S. | 1986 | QI 4, 2 | 25 | A persistent programming language - preliminary report | 79 | |
Heng, A.K. | 1986 | QI 4, 2 | 23-24 | A summation problem | 78 | |
Heng, A.K. | 1986 | QI 4, 2 | 21-22 | Some remarks on deleting a node from a binary tree | 77 | |
Handley, C.C. | 1986 | QI 4, 2 | 15-20 | Finding all primes less than some maximum | 76 | |
Postma, S.W. | 1986 | QI 4, 2 | 7-14 | New CS syllabus at Natal (PMB) | 75 | |
Finnie, G.R. | 1986 | QI 4, 2 | 1-6 | Modeller: A DSS for experimental study of human-computer interaction | 74 | |
Phillips, N.C. | 1986 | QI 4, 1 | 21 | An alternative development of Vienna data structures | 72 | |
Bishop, J.M. | 1986 | QI 4, 1 | 11-20 | Ways of assessing programming skills | 71 | |
Dempster, R. | 1986 | QI 4, 1 | 5-10 | The SECD machine: an introduction | 70 | |
Mende, J. | 1986 | QI 4, 1 | 1-4 | Research directions in information systems | 69 | |
Machanick, P. | 1985 | QI 3, 3 | 30 | Tools for creating tools: programming in Artificial Intelligence | 67 | |
Sutcliffe, G. | 1985 | QI 3, 3 | 19-29 | A comparison of methods used to represent graphs on a computer | 66 | |
Short, R. | 1985 | QI 3, 3 | 14-18 | A consideration of formalisms in computing | 65 | |
Hirsch, M; Schach, S.R.; Van Biljon, W.R. | 1985 | QI 3, 3 | 9-13 | High-level debugging systems for Pascal: interpreter versus compiler | 64 | |
MacGregor, K.J. | 1985 | QI 3, 3 | 2-8 | Quo Vadis, computer science? | 63 | |
Postma, S.W. | 1984 | QI 3, 2 | 28 | New reading: a book review | 61 | |
McDermott, T.S. | 1984 | QI 3, 2 | 25-27 | Developing an intelligent editor for microcomputers | 60 | |
Wulf, S. | 1984 | QI 3, 2 | 23-24 | Specification and performance prediction fo 4th generation language run units | 59 | |
Pirow, P.C. | 1984 | QI 3, 2 | 21-22 | An adaptive response algorithm | 58 | |
Du Preez, L.S. | 1984 | QI 3, 2 | 15-20 | Software configuration management - a practical approach | 57 | |
Pino, J.A. | 1984 | QI 3, 2 | 11-14 | Migrations: a microcomputer-based generalised information retrieval system | 56 | |
Labuschagne, W.A.; Van Rooyen, H.O. | 1984 | QI 3, 2 | 7-10 | On a generalisation of Cayley diagrams | 55 | |
Postma, S.W. | 1984 | QI 3, 2 | 3-6 | Syllabi for computer science as a scientific discipline | 54 | |
Mueller, C.S.M. | 1984 | QI 3, 1 | 25 | Concurrency: an easier way to program | 52 | |
Kaplan, S.M. | 1984 | QI 3, 1 | 21-24 | A context sensitive metalanguage for intelligent editos | 51 | |
Turton, T. | 1984 | QI 3, 1 | 15-20 | A virtual multiprocessor computer design | 50 | |
Richfield, J.M. | 1984 | QI 3, 1 | 9-14 | Program design as the tool of preference in computer literacy education, experience, incentives, implications | 49 | |
Hunter, D.A. | 1984 | QI 3, 1 | 5-8 | Documenting a databse system with a database | 48 | |
Jablonski, J; Dijkman, H.J. | 1984 | QI 3, 1 | 1-4 | Very high speed graphics work-station | 47 | |
Cuthbertson, A.J.; Van Niekerk, I.J.; Turton, T. | 1983 | QI 2, 3 | 29 | A disk space management system | 45 | |
Berman, S | 1983 | QI 2, 3 | 25-28 | Add: The automated database design tool | 44 | |
Mann, R.J. | 1983 | QI 2, 3 | 21-24 | Analytical model of a mixed-workload MVS computer system | 43 | |
Wulf, S. | 1983 | QI 2, 3 | 19-20 | Modelling blocking on admission of tasks to computer | 42 | |
Currin, D.C. | 1983 | QI 2, 3 | 15-18 | Data structures for generalised network algorithms | 41 | |
Van Rooyen, H.O.; Weiermans, D.J. | 1983 | QI 2, 3 | 11-14 | Nebulas as structural data models | 40 | |
Schach, S.R. | 1983 | QI 2, 3 | 7-10 | An improved implementation of Grimbleby's algorithm | 39 | |
Bruwer, P.J.S. | 1983 | QI 2, 3 | 1-6 | Evaluating the performance of computer-based information systems using a restricted linear regression model | 38 | |
Van Rooyen, M.H. | 1983 | QI 2, 2 | 29 | Die definisie en implementasie van die taal Scrap | 36 | |
Popelas, J.M.; Calingaert, P. | 1983 | QI 2, 2 | 25-28 | Case-grammar representation of programming languages | 35 | |
Schach, S,R, | 1983 | QI 2, 2 | 19-24 | Datastructure traces | 34 | |
Visser, P. | 1983 | QI 2, 2 | 15-18 | Managing and documenting 10-20 man year projects | 33 | |
Wulf, S. | 1983 | QI 2, 2 | 11-14 | Restructuring of the conceptual schema to produce DBMS schemata | 32 | |
Hetzel, B.; Calingaert, P. | 1983 | QI 2, 2 | 7-10 | Detecting errors in computer programs | 31 | |
Van Niekerk, J.C. | 1983 | QI 2, 2 | 3-6 | Die operasionele enkelbedienermodel | 30 | |
Pirow, P. | 1982 | QI 2, 1 | 31 | The relative merits of two organisational behaviour models for structuring a managmeent information system. | 28 | |
Becker, R.I.; Perl, Y; Schach, S.R. | QI 2, 1 | 27-30 | An efficient implementation of an algorithm for min-max tree partitioning | 27 | ||
Schach, S.R. | 1982 | QI 2, 1 | 23-26 | An interactive graphical array trace | 26 | |
Roets, P.P. | 1982 | QI 2, 1 | 19-22 | Micro-code impelmentation of language interpreters | 25 | |
Finnie, G.R. | 1982 | QI 2, 1 | 13-18 | The design and microprogrammed implementation of a structured language machine | 24 | |
Linck, M.H. | 1982 | QI 2, 1 | 7-12 | A CSP Description of some parallel sorting algorithms | 23 | |
Postma, S.W. | 1982 | QI 2, 1 | 3-6 | The design objectives of Quadlisp | 22 | |
Scarrot, G.G. | 1980 | QI 1, 3 | 13-19 | Thirty years of information engines | 20 | |
Postma, S.W. | 1980 | QI 1, 3 | 7-12 | A high-level programming language for interactive lisp-like languages | 19 | |
Stein, D.M. | 1980 | QI 1, 3 | 1-6 | The memory organisation of future large processors | 18 | |
Christensen, A.H.J. | 1979 | QI 1, 2 | 44-48 | An algorithm for the approximation of surfaces and for the packing of volumes | 16 | |
Roets, P.P. | 1979 | QI 1, 2 | 41-43 | An algorithm for merging disk files in place | 15 | |
Danhof, K.J.; Smith, C.L. | 1979 | QI 1, 2 | 38-40 | The impact of microcomputers in computer science | 14 | |
Calingaert. P. | 1979 | QI 1, 2 | 34-37 | Teacher control in computer-assisted science | 13 | |
Turton, T. | 1979 | QI 1, 2 | 30-33 | The management of operating systems state data | 12 | |
Currin, D.C.; Bishop, J.M.; Varol, y.l. | 1979 | QI 1, 2 | 26-29 | The sequence abstraction in the implementation of EMILY | 11 | |
Williams, M.H. | 1979 | QI 1, 2 | 23-25 | Design principles of the language BPL | 10 | |
King, M.C.F.; Naude, G.; Von Solms, S.H. | 1979 | QI 1, 2 | 16-22 | Database design: choice of a methodology | 9 | |
Anderssen, E.C. | 1979 | QI 1, 2 | 12-15 | Rekenaarondersteunde onderhoud van programmatuurstelsels | 8 | |
Penzhordn, A. | 1979 | QI 1, 2 | 1-10 | Toepaslikheid van 'n analitiese model by die keuse van 'n lêerstruktuur vir 'n teksverwerkingstelsel | 7 | |
Radue, J.E. | 1979 | QI 1, 1 | 30-36 | Text compression techniques | 5 | |
Phillips, N.C.K. | 1979 | QI 1, 1 | 26-29 | The P-NP question and recent independence results | 4 | |
Pederby, N.J. | 1979 | QI 1, 1 | 17-25 | Distributed Computer Systems - a review | 3 | |
Heher, A.D. | 1979 | QI 1, 1 | 5-16 | Real-time interactive multiprogramming | 2 | |
Rodd, M.G. | 1979 | QI 1, 1 | 1-4 | A hardware based real-time operating system | 1 |