By Topic

IBM Systems Journal

Issue 2 • Date 1975

Filter Results

Displaying Results 1 - 7 of 7
  • A program generator

    Publication Year: 1975, Page(s):102 - 133
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2351 KB)

    We believe that the data processing needs of a major medical center do not differ fundamentally from those of government or industry. Experience in our environment is that data processing is playing an increasingly prominent role in the full spectrum of services. Not only is the number of applications increasing, but they are also becoming more diverse and imaginative as users become more directly... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance measurement tools for VM/370

    Publication Year: 1975, Page(s):134 - 160
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2209 KB)

    The data collection, display, and analysis tools and techniques found desirable to support the smooth running of a VM/370 installation appear to be diverse, yet their use must be weel coordinated. In a summary, a user's productivity may be enhanced by linking the nature of his terminal activity to the performance of the system by making available to him measures of utilization and contention for m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Elements of queuing theory for system design

    Publication Year: 1975, Page(s):161 - 187
    Cited by:  Papers (1)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2027 KB)

    The practical examples of the use of queuing models in computer system design and analysis have introduced basic principles and applications of queuing theory. These principles may serve as a useful introduction or review. The cited references and general references may be used to build upon this foundation by their presentations of more complex models, such as those that analyze machine interfere... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical approach to computer system integrity

    Publication Year: 1975, Page(s):188 - 202
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1565 KB)

    In this paper, we have shown how a hierarchically structured operating system can provide substantially better software reliability and security than a conventional two-level multiprogramming operating system approach. A virtual machine facility, such as VM/370, makes it possible to convert a two-level conventional operating system into a three-level hierarchically structured operating system. Fur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authors

    Publication Year: 1975, Page(s):203 - 204
    IEEE is not the copyright holder of this material | PDF file iconPDF (883 KB)
    Freely Available from IEEE
  • Abstracts

    Publication Year: 1975, Page(s):205 - 207
    IEEE is not the copyright holder of this material | PDF file iconPDF (788 KB)
    Freely Available from IEEE
  • Errata [Erratum]

    Publication Year: 1975, Page(s): 208
    IEEE is not the copyright holder of this material | PDF file iconPDF (1017 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Throughout its history, the IBM Systems Journal has been devoted to software, software systems, and services, focusing on concepts, architectures, and the uses of software.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
John J. Ritsko
IBM T. J. Watson Research Center5