By Topic

IBM Systems Journal

Issue 2 • Date 1993

Filter Results

Displaying Results 1 - 8 of 8
  • Preface

    Publication Year: 1993, Page(s):230 - 231
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1218 KB)

    This issue contains five papers and a technical note on a variety of subjects, including box-structured methods, disk I/O wait time savings, project management, the Retail Application Architecture* (RAA*), computerized recognition of faces, and attacks on cryptographic control vectors. It also contains an index for 1989 through 1992. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Box-structured methods for systems development with objects

    Publication Year: 1993, Page(s):232 - 251
    Cited by:  Papers (7)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2377 KB)

    Box structures provide a rigorous and systematic process for performing systems development with objects. Box structures represent data abstractions as objects in three system views and combine the advantages of structured development with the advantages of object orientation. As data abstractions become more complex, the box structure usage hierarchy allows stepwise refinement of the system desig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • I/O subsystem configurations for ESA: New roles for processor storage

    Publication Year: 1993, Page(s):252 - 264
    Cited by:  Papers (1)  |  Patents (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1817 KB)

    I/O subsystem configurations are dictated by the storage and I/O requirements of the specific applications that use the disk hardware. Treating the latter requirement as a given, however, draws a boundary at the channel interface that is not well-suited to the capabilities of the Enterprise Systems Architecture (ESA). This architecture allows hardware expenditures in the I/O subsystem to be manage... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introduction of the project management discipline in a software development organization

    Publication Year: 1993, Page(s):265 - 277
    Cited by:  Papers (2)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2007 KB)

    An approach to the introduction of the project management discipline in a software development organization is presented, with emphasis on the aspects that can be generalized and adopted by other organizations under similar circumstances. The presentation includes the key elements of the approach taken, the maturity scale used to guide the introduction effort, a short description of the education ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building business and application systems with the Retail Application Architecture

    Publication Year: 1993, Page(s):278 - 306
    Cited by:  Papers (1)  |  Patents (9)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (3233 KB)

    An industry application architecture is a framework for integrating applications and databases and can also be used for analyzing and re-engineering the business of an enterprise as a whole, provided it is structured correctly. This paper describes the motivation, structure, and possible uses of the Retail Application Architecture™ (RAA™). The core of RAA is a set of generic enterpri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System for the recognition of human faces

    Publication Year: 1993, Page(s):307 - 320
    Cited by:  Papers (6)  |  Patents (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2192 KB)

    This paper describes a system for content-based retrieval of facial images from an image database. The system includes feature extraction based on expert-assisted feature selection, spatial feature measurement, feature and shape representation, feature information compression and organization, search procedures, and pattern-matching techniques. The system uses novel data structures to represent th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technical note: Complementarity attacks and control vectors

    Publication Year: 1993, Page(s):321 - 325
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1344 KB)

    A control vector is a data structure that specifies the nature and role of an associated cryptographic key. The control vector is checked by software and cryptographic hardware in order to limit the range of permissible operations to be undertaken with ciphertext produced with the key. The linking of the control vector and cryptographic key is such that attempts to modify, or substitute, control v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Books

    Publication Year: 1993, Page(s):326 - 330
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | PDF file iconPDF (1364 KB)
    Freely Available from IEEE

Aims & Scope

Throughout its history, the IBM Systems Journal has been devoted to software, software systems, and services, focusing on concepts, architectures, and the uses of software.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
John J. Ritsko
IBM T. J. Watson Research Center5