default search action
IBM Systems Journal, Volume 30, 1991
Volume 30, Number 1, 1991
- William T. Fischofer:
VM/ESA: A Single System for Centralized and Distributed Computing. 4-13 - Joseph M. Gdaniec, James P. Hennessy:
VM Data Spaces and ESA/XC Facilities. 14-33 - Damian L. Osisek, Kathryn M. Jackson, Peter H. Gum:
ESA/390 Interpretive-Execution Architecture, Foundation for VM/ESA. 34-51 - Richard L. Stone, T. Scott Nettleship, Jay Curtiss:
VM/ESA CMS Shared File System. 52-71 - Barbara A. Maslak, James M. Showalter, Thomas J. Szczygielski:
Coordinated Resource Recovery in VM/ESA. 72-89 - R. Bradley Bennett, William J. Bitner, Mark A. Musa, Michael K. Ainsworth:
Systems Management for Coordinated Resource Recovery. 90-106 - Cherie C. Barnes, Andrew Coleman, James M. Showalter, Michael L. Walker:
VM/ESA Support for Coordinated Recovery of Files. 107-125
Volume 30, Number 2, 1991
- Don B. Johnson, George M. Dolan, Michael J. Kelly, An V. Le, Stephen M. Matyas:
Common Cryptographic Architecture Cryptographic Application Programming Interface. 130-150 - Stephen M. Matyas:
Key Handling with Control Vectors. 151-174 - Stephen M. Matyas, An V. Le, Dennis G. Abraham:
A Key-Management Scheme Based on Control Vectors. 175-191 - Phil C. Yeh, Ronald M. Smith Sr.:
ESA/390 Integrated Cryptographic Facility: An Overview. 192-205 - Dennis G. Abraham, George M. Dolan, Glen P. Double, James V. Stevens:
Transaction Security System. 206-229 - Don B. Johnson, George M. Dolan:
Transaction Security System Extensions to the Common Cryptographic Architecture. 230-243
Volume 30, Number 3, 1991
- Steven C. Baade:
SNA Route Generation Using Traffic Patterns. 250-258 - Steven H. Goldberg, Jerome A. Mouton Jr.:
A Base for Portable Communications Software. 259-279 - Sorel Reisman, William A. Carr:
Perspectives on Multimedia Systems in Education. 280-295 - Richard J. Sahulka, Emily C. Plachy, Leslie J. Scarborough, Randolph G. Scarborough, Steven W. White:
FORTRAN for Clusters of IBM ES/3090 Multiprocessors. 296-311 - Ron Y. Pinter, Pnina Vortman, Zvi Weiss:
Partial Compilation of REXX. 312-321 - Dan T. Feriozi:
A C Programming Model for OS/2 Device Drivers. 322-335 - Norbert G. Lenz, Serge F. L. Saelens:
A Knowledge-Based System for MVS Dump Analysis. 336-350 - Stephen H. Kan:
Modeling and Software Development Quality. 351-362 - Patrick Brown:
Integrated Hypertext and Program Understanding Tools. 363-392
- Arthur Appel, Gennaro A. Cuomo, Edward A. Overly, John A. Walicki, Ralph E. Yozzo:
The WATINFO Face Server and Associated Utilities. 393-407
Volume 30, Number 4, 1991
- Adin D. Falkoff:
The IBM Family of APL Systems. 416-432 - James A. Brown, Harlan P. Crowder:
APL2: Getting Started. 433-445 - Michael T. Wheatley:
Extending the Domain of APL. 446-455 - Ray Trimble:
Storage Management in IBM APL Systems. 456-468 - John R. Jensen, Kirk A. Beaty:
Putting a New Face on APL2. 469-489 - Manuel Alfonseca, David Selby, Ron Wilks:
The APL IL Interpreter Generator. 490-497 - Robert G. Willhoft:
Parallel Expression in the APL2 Language. 498-512 - Stanley Jordan, Erik S. Friis:
The Foundations of Suitability of APL2 for Music. 513-526 - Aharon Aharon, Ayal Bar-David, Barry Dorfman, Emanuel Gofman, Moshe Leibowitz, Victor Schwartzburd:
Verification of the IBM RISC System/6000 by a Dynamic Biased Pseudo-Random Test Program Generator. 527-538 - Norman D. Thomson:
APL2 as a Specification Language for Statistics. 539-542 - Manuel Alfonseca:
Advanced Applications of APL: Logic Programming, Neural Networks, and Hypertext. 543-553 - Donald B. McIntyre:
Language as an Intellectual Tool: From Hieroglyphics to APL. 554-581 - Kenneth E. Iverson:
A Personal View of APL. 582-593
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.