By Topic

IBM Systems Journal

Issue 4 • Date 1984

Filter Results

Displaying Results 1 - 10 of 10
  • Preface

    Publication Year: 1984, Page(s): 308
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (958 KB)

    The protection of computing systems and the information they maintain and process has been of concern since the early days of computing. Summers provides an overview of computer security, including the concepts, techniques, and measures that may be applied to the protection of information systems assets. This paper offers the reader an excellent survey of both the technical and the administrative ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An overview of computer security

    Publication Year: 1984, Page(s):309 - 325
    Cited by:  Papers (5)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2146 KB)

    Presented is an overview of computer security, including concepts, techniques, and mea-sures relating to the protection of computing systems and the information they maintain against deliberate or accidental threats. Motivations for security measures are discussed. Security strategies are considered. Actions and events that threaten security are described, along with technical problems that can pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design of the REXX language

    Publication Year: 1984, Page(s):326 - 335
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1655 KB)

    One way of classifying computer languages is by two classes: languages needing skilled programmers, and personal languages used by an expanding population of general users. REstructured eXtended eXecutor (REXX) is a flexible personal language designed with particular attention to feedback from its users. It has proved to be effective and easy to use, yet it is sufficiently general and powerful to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An application analyzer

    Publication Year: 1984, Page(s):336 - 350
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1780 KB)

    An interactive tool, aimed at supporting the application user/analyst in specifying and analyzing a business area, is presented. The features of the tool, named the Application Analyzer/Experimental, are described both in their theoretical foundations and their actual implementation. A brief description of the architecture of the tool and its internal structure is given. A review of the main conce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance issues in local-area networks

    Publication Year: 1984, Page(s):351 - 374
    Cited by:  Papers (19)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2339 KB)

    This paper discusses several important performance problems in the design of local-area networks. The questions discussed relate to various aspects of architecture, design, and implementation: (1) the delay-throughput characteristics of the medium access protocols, (2) the performance of local-area networks on which a file server provides file storage and retrieval services to intelligent workstat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VM/370, Attached Processor, and multiprocessor performance study

    Publication Year: 1984, Page(s):375 - 385
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1645 KB)

    This paper discusses performance studies of Attached Processors, multiprocessors, and VM/370. A methodology for evaluating performance is discussed. Performance improvements are explained and evaluated. These studies played a role in a new option to the VM/System Product control program that is called the High Performance Option (HPO). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Book review

    Publication Year: 1984, Page(s):386 - 387
    IEEE is not the copyright holder of this material | PDF file iconPDF (934 KB)
    Freely Available from IEEE
  • Author Index 1975-1984

    Publication Year: 1984, Page(s):388 - 396
    IEEE is not the copyright holder of this material | PDF file iconPDF (1472 KB)
    Freely Available from IEEE
  • Subject Index 1975-1984

    Publication Year: 1984, Page(s):397 - 409
    IEEE is not the copyright holder of this material | PDF file iconPDF (1380 KB)
    Freely Available from IEEE
  • Contents of Volume 23, 1984

    Publication Year: 1984, Page(s): 410
    IEEE is not the copyright holder of this material | PDF file iconPDF (837 KB)
    Freely Available from IEEE

Aims & Scope

Throughout its history, the IBM Systems Journal has been devoted to software, software systems, and services, focusing on concepts, architectures, and the uses of software.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
John J. Ritsko
IBM T. J. Watson Research Center5