By Topic

IBM Systems Journal

Issue 1 • Date 1996

Filter Results

Displaying Results 1 - 7 of 7
  • Preface

    Publication Year: 1996 , Page(s): 2 - 3
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1009 KB)  

    This issue contains five papers on a variety of subjects: medical image processing using object technology, monitoring of computer network topology through events, IBM's Information Framework and its architecture, generation of applications for manufacturing, and access control in host-centric computing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An object-oriented system for 3D medical image analysis

    Publication Year: 1996 , Page(s): 4 - 24
    Cited by:  Papers (3)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (3217 KB)  

    As part of a European Commission-funded research project on medical image analysis, we have developed a system aimed at solving a real clinical problem: the outlining of the target volume and organs at risk for three-dimensional conformal radiation treatment planning. The clinical requirement is to make this process less tedious and time-consuming. We show how object-oriented design techniques can... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Event-driven network topology monitoring function

    Publication Year: 1996 , Page(s): 25 - 36
    Cited by:  Papers (1)  |  Patents (3)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1742 KB)  

    This paper discusses the design of a topology management application. The application monitors the topology of point-to-point networks in which each network node is required to contain only local trunk information. To build and continuously update the topology map, information must be collected from network nodes. The challenge is to do this in real time without adversely consuming network bandwid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Information FrameWork

    Publication Year: 1996 , Page(s): 37 - 68
    Cited by:  Papers (2)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (3163 KB)  

    John Zachman's framework for information systems architecture has been widely discussed since its publication in the IBM Systems Journal in 1987. This paper shows how the development of the Information FrameWork (IFW) has built upon the ideas presented by Zachman. However, the objectives and scope of IFW are broader than that of the original Zachman framework. IFW is described and compared with th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System generator for producing manufacturing applications

    Publication Year: 1996 , Page(s): 69 - 93
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (3274 KB)  

    The Application System Generator (ASG/pc) offers powerful capabilities for integrating the personal computer into problem-solving in manufacturing engineering. Implemented on Pentium™-class personal computers, it provides an easy-to-use, application-building platform for mathematically based solutions to a variety of engineering problems. The ASG/pc provides a master editor for incrementall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access control systems: From host-centric to network-centric computing

    Publication Year: 1996 , Page(s): 94 - 112
    Cited by:  Patents (6)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (2393 KB)  

    In this paper, we review the important theoretical models of computer access control systems. Using the IBM Multiple Virtual Storage (MVS) operating system as the example, we show how the principles expressed in these models can be implemented. The roots of user authentication and access control on MVS are examined, tracing the convergence of the requirement for controls with the development of ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Books

    Publication Year: 1996 , Page(s): 113 - 117
    Cited by:  Papers (94)
    Save to Project icon | PDF file iconPDF (1224 KB)  
    Freely Available from IEEE

Aims & Scope

Throughout its history, the IBM Systems Journal has been devoted to software, software systems, and services, focusing on concepts, architectures, and the uses of software.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
John J. Ritsko
IBM T. J. Watson Research Center5