By Topic


Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $31
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)

In a computer system there is a wide spectrum of actions that are to be performed simultaneously in order to maximize throughput and minimize the response time of the system. The diversity of action and reaction which takes place in a large computer system presents serious problems to anyone trying to encompass that entire spectrum. No single theory of optimization-finding the best way to carry out an action to produce a specific result-embraces all the important aspects because each domain of application has unique characteristics that determine the most appropriate approach. There are many problems of long-standing interest which have eluded solution, partly because the problems have not been clearly defined and partly because the most significant parameters to be used in tractable models have not been identified. The eight papers in this issue introduce some important and novel concepts in the analysis and design of computer systems. New viewpoints have been developed for the analysis of significant aspects such as multiprocessing, multiprogramming, system communication, storage management, scheduling, and validation of simulation models. The concepts presented in this group of papers contain numerous warnings and restrictions, which serve to call attention to those aspects of the discussion that must be modified in order to represent in a more realistic manner the physical processes of existing systems. Success in the application of the described models depends on careful formulation by the user and an understanding of the assumptioas and restrictions involved in their use.

Note: The Institute of Electrical and Electronics Engineers, Incorporated is distributing this Article with permission of the International Business Machines Corporation (IBM) who is the exclusive owner. The recipient of this Article may not assign, sublicense, lease, rent or otherwise transfer, reproduce, prepare derivative works, publicly display or perform, or distribute the Article.  

Published in:

IBM Journal of Research and Development  (Volume:19 ,  Issue: 5 )