Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "2.63",
%%%     date            = "07 May 2022",
%%%     time            = "17:15:29 MDT",
%%%     filename        = "ibmsysj.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "56910 45923 195754 1906630",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography, BibTeX, IBM, IBM Systems
%%%                       Journal",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This file contains a COMPLETE bibliography of
%%%                        the IBM Systems Journal, covering all issues
%%%                        (1962--2008).  Besides articles, it includes
%%%                        book reviews, indexes, prefaces, referees,
%%%                        reprints, tables of contents, and complete
%%%                        cross-references between articles and
%%%                        comments on them in addenda, errata and
%%%                        letters to the editor.
%%%
%%%                        There is a 50-th anniversary collection of
%%%                        articles from IBM journals at
%%%
%%%                            http://www.research.ibm.com/journal/50th/
%%%
%%%                        In 2008, publication ceased.  In 2011, the
%%%                        journal archives were moved from IBM
%%%                        (although IBM employees still have access
%%%                        there) to the IEEE Xplore Digital Library:
%%%
%%%                            http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288519
%%%
%%%                        At version 2.63, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             1962 (   7)    1978 (  39)    1994 (  40)
%%%                             1963 (  24)    1979 (  44)    1995 (  50)
%%%                             1964 (  21)    1980 (  42)    1996 (  50)
%%%                             1965 (  27)    1981 (  37)    1997 (  39)
%%%                             1966 (  25)    1982 (  35)    1998 (  41)
%%%                             1967 (  31)    1983 (  34)    1999 (  48)
%%%                             1968 (  38)    1984 (  35)    2000 (  61)
%%%                             1969 (  30)    1985 (  31)    2001 (  59)
%%%                             1970 (  27)    1986 (  32)    2002 (  58)
%%%                             1971 (  26)    1987 (  32)    2003 (  61)
%%%                             1972 (  28)    1988 (  46)    2004 (  49)
%%%                             1973 (  34)    1989 (  48)    2005 (  61)
%%%                             1974 (  30)    1990 (  49)    2006 (  53)
%%%                             1975 (  33)    1991 (  45)    2007 (  57)
%%%                             1976 (  34)    1992 (  52)    2008 (  58)
%%%                             1977 (  38)    1993 (  45)
%%%
%%%                             Article:       1883
%%%                             Book:             1
%%%
%%%                             Total entries: 1884
%%%
%%%                        My thanks go to Gene F. Hoffnagle, editor of
%%%                        the IBM Systems Journal, who kindly donated
%%%                        copies of Volume 1 (all issues), and Volume
%%%                        28 (number 3), which were missing from the
%%%                        University of Utah library, allowing
%%%                        completion of the cross-checking of all
%%%                        entries against original journal issues, and
%%%                        completion of our library holdings for this
%%%                        journal.
%%%
%%%                        The initial draft was extracted from the ACM
%%%                        Computing Archive CD ROM for the 1980s, with
%%%                        manual corrections, and additions from the
%%%                        author's bibliography collections, from the
%%%                        American Mathematical Society MathSciNet
%%%                        database, and from a very large computer
%%%                        science bibliography collection on
%%%                        ftp.ira.uka.de in /pub/bibliography to
%%%                        which many people of have contributed.  The
%%%                        snapshot of this collection was taken on
%%%                        5-May-1994, and it consists of 441 BibTeX
%%%                        files, 2,672,675 lines, 205,289 entries,
%%%                        and 6,375 <at>String{} abbreviations,
%%%                        occupying 94.8MB of disk space.
%%%
%%%                        Recent additions have been extracted from
%%%                        material at WorldWideWeb URL
%%%                        http://www.research.ibm.com/journal;
%%%                        unfortunately, that otherwise very useful
%%%                        resource does not include article page
%%%                        ranges.  This bibliography will be used
%%%                        to remedy that deficiency.
%%%
%%%                        Version 1.14 saw the addition of a
%%%                        heavily-edited and corrected conversion of
%%%                        177 new entries from the results of a search
%%%                        in the OCLC Contents1st database.
%%%                        Regrettably, this database does not record
%%%                        final page numbers of journal articles..
%%%
%%%                        At version 2.00, the 356 entries in version
%%%                        1.17 were merged with 1112 extracted from a
%%%                        bibliography constructed independently from
%%%                        an OCR scan of the 1962--1995 cumulative
%%%                        index, to produce a bibliography which is
%%%                        believed now to be complete.  Many hours were
%%%                        then spent checking the bibliography against
%%%                        original journal issues to obtain missing
%%%                        final page numbers which are absent from the
%%%                        above-cited index.
%%%
%%%                        At version 2.05, the results of a search in
%%%                        the IEEE INSPEC (1989--1995) database were
%%%                        merged in, providing some missing
%%%                        abstracts, and some additional key/value
%%%                        pairs.
%%%
%%%                        At version 2.11, a search of the Compendex
%%%                        database for 1970--1989 produced additional
%%%                        information, including abstracts, for 298
%%%                        existing entries.
%%%
%%%                        IBM has given permission to include article
%%%                        abstracts in bibliographic databases, so
%%%                        these have been provided in some cases.
%%%                        Specifically, their copyright in files at URL
%%%                        http://www.research.ibm.com/journal/ says:
%%%
%%%                            (C) Copyright 1995 by International
%%%                            Business Machines Corporation. See
%%%                            individual articles for copying
%%%                            information. Table of Contents and
%%%                            ``Recent publications by IBM authors''
%%%                            may be freely copied and distributed in
%%%                            any form. ISSN 0018-8646. Printed in
%%%                            U.S.A.
%%%
%%%                        BibTeX citation tags are uniformly chosen as
%%%                        name:year:abbrev, where name is the family
%%%                        name of the first author or editor, year is a
%%%                        4-digit number, and abbrev is a 3-letter
%%%                        condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted in
%%%                        publication order, using the ``bibsort
%%%                        -byvolume'' utility.
%%%
%%%                        Abstracts of papers starting with Volume 33
%%%                        in 1994 are available via the WorldWide Web
%%%                        at URL http://www.ibm.com/, via the node
%%%                        path Research and Technology -> Technical
%%%                        Journals -> IBM Systems Journal.  All
%%%                        available abstracts have been included in
%%%                        the entries below.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
   "\input bibnames.sty "
 # "\input path.sty "
 # "\hyphenation{
      Shi-ba-mi-ya
      Sguazz-ero
  }"
 # "\ifx \undefined \TM \def \TM {${}^{\sc TM}$} \fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Publishers and their addresses:
@String{pub-IEEE                = "IEEE Computer Society Press"}
@String{pub-IEEE:adr            = "1109 Spring Street, Suite 300, Silver
                                   Spring, MD 20910, USA"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-IBM-SYS-J = "IBM Systems Journal"}

%%% ====================================================================
%%% Bibliography entries:  Most issues for this journal lack a month
%%% designation, so most entries have no month value either.
%%% Volumes 1 and 2 (1962--1963) had no issue number, just a month name.
@Article{Mugele:1962:POC,
  author =       "R. A. Mugele",
  title =        "A program for optimal control of nonlinear processes",
  journal =      j-IBM-SYS-J,
  volume =       "1",
  pages =        "2--17",
  month =        sep,
  year =         "1962",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat May 04 09:55:41 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Gordon:1962:GPS,
  author =       "G. Gordon",
  title =        "A general purpose systems simulator",
  journal =      j-IBM-SYS-J,
  volume =       "1",
  pages =        "18--32",
  month =        sep,
  year =         "1962",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Smith:1962:SSE,
  author =       "E. C. {Smith, Jr.}",
  title =        "Simulation in systems engineering",
  journal =      j-IBM-SYS-J,
  volume =       "1",
  pages =        "33--50",
  month =        sep,
  year =         "1962",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat May 04 09:57:27 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Montalbano:1962:TFC,
  author =       "M. Montalbano",
  title =        "Tables, flow charts and program logic",
  journal =      j-IBM-SYS-J,
  volume =       "1",
  pages =        "51--63",
  month =        sep,
  year =         "1962",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat May 04 09:57:29 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Baldwin:1962:MAL,
  author =       "F. R. Baldwin and W. B. Gibson and C. B. Poland",
  title =        "A multiprocessing approach to a large computer
                 system",
  journal =      j-IBM-SYS-J,
  volume =       "1",
  pages =        "64--76",
  month =        sep,
  year =         "1962",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Gomory:1962:NTP,
  author =       "R. E. Gomory",
  title =        "Note\emdash The trim problem",
  journal =      j-IBM-SYS-J,
  volume =       "1",
  pages =        "77--81",
  month =        sep,
  year =         "1962",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Gerson:1962:NMA,
  author =       "G. Gerson",
  title =        "Note\emdash On modifying the 1620 {ADD} table",
  journal =      j-IBM-SYS-J,
  volume =       "1",
  pages =        "82--83",
  month =        sep,
  year =         "1962",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat May 04 09:59:09 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Boyd:1963:EEM,
  author =       "D. F. Boyd and H. S. Krasnow",
  title =        "Economic evaluation of management information
                 systems",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "2--23",
  month =        mar,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Dimsdale:1963:CCM,
  author =       "B. Dimsdale",
  title =        "Computer construction of minimal project networks",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "24--36",
  month =        mar,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Turnburke:1963:SDP,
  author =       "V. P. {Turnburke, Jr.}",
  title =        "Sequential data processing design",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "37--48",
  month =        mar,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Kossack:1963:ORA,
  author =       "C. F. Kossack",
  title =        "Optimum response analysis",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "49--56",
  month =        mar,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Sternad:1963:PC,
  author =       "Nicholas Sternad",
  title =        "Programming considerations for the 7750",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "57--85",
  month =        mar,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Heising:1963:NRA,
  author =       "W. P. Heising",
  title =        "Note on random addressing techniques",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "112--116",
  month =        jun,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Iverson:1963:PNS,
  author =       "K. E. Iverson",
  title =        "Programming notation in systems design",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "117--128",
  month =        jun,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "APL",
  xxnumber =     "none",
}

@Article{Maranzana:1963:LSP,
  author =       "F. E. Maranzana",
  title =        "On the location of supply points to minimize
                 transportation costs",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "129--135",
  month =        jun,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Kossack:1963:SCT,
  author =       "C. F. Kossack",
  title =        "Statistical classification techniques",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "136--161",
  month =        jun,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Talmadge:1963:DIP,
  author =       "R. B. Talmadge",
  title =        "Design of an integrated programming and operating
                 system, Part {II}: The assembly program and its
                 language",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "162--181",
  month =        jun,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Griffith:1963:IAP,
  author =       "J. E. Griffith",
  title =        "An intrinsically addressed processing system",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "182--199",
  month =        sep # "\slash " # dec,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Dimsdale:1963:PES,
  author =       "B. Dimsdale and H. P. Flatt",
  title =        "Project evaluation and selection",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "200--217",
  month =        sep # "\slash " # dec,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Smith:1963:DCM,
  author =       "E. C. {Smith, Jr.}",
  title =        "A directly coupled multiprocessing system",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "218--229",
  month =        sep # "\slash " # dec,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Witt:1963:DSA,
  author =       "B. I. Witt",
  title =        "Dynamic storage allocation for a real-time system",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "230--239",
  month =        sep # "\slash " # dec,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Cole:1963:CLD,
  author =       "H. Cole and Y. Okaya and F. W. Chambers",
  title =        "A computer-operated laboratory data-taking system",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "240--247",
  month =        sep # "\slash " # dec,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Griffin:1963:PIS,
  author =       "J. S. {Griffin, Jr.} and J. H. {King, Jr.} and C. J.
                 Tunis",
  title =        "A pattern identification system using linear decision
                 functions",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "248--267",
  month =        sep # "\slash " # dec,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Church:1963:RGE,
  author =       "F. L. Church",
  title =        "Requirements generation, explosions, and bills of
                 material",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "268--287",
  month =        sep # "\slash " # dec,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Yagil:1963:GID,
  author =       "S. Yagil",
  title =        "Generation of input data for simulations",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "288--296",
  month =        sep # "\slash " # dec,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:35:00 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Anonymous:1963:DOS,
  author =       "Anonymous",
  title =        "Design of an operating system",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "297--297",
  month =        sep # "\slash " # dec,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:35:19 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Hedberg:1963:DIP,
  author =       "R. Hedberg",
  title =        "Design of an integrated programming and operating
                 system, Part {III}: The expanded function of the
                 loader",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "298--310",
  month =        sep # "\slash " # dec,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Larner:1963:DIP,
  author =       "R. Larner",
  title =        "Design of an integrated programming and operating
                 system, Part {IV}: The system's {FORTRAN} compiler",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "311--321",
  month =        sep # "\slash " # dec,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Dorrance:1963:DIP,
  author =       "R. T. Dorrance",
  title =        "Design of an integrated programming and operating
                 system, Part {V}: The system's {COBOL} compiler",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "322--327",
  month =        sep # "\slash " # dec,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Anonymous:1963:A,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  pages =        "328--330",
  month =        sep # "\slash " # dec,
  year =         "1963",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  xxnumber =     "none",
}

@Article{Buchholz:1963:FOA,
  author =       "Werner Buchholz",
  title =        "File Organization and Addressing",
  journal =      j-IBM-SYS-J,
  volume =       "2",
  number =       "1",
  pages =        "86--111",
  month =        jun,
  year =         "1963",
  CODEN =        "IBMSA7",
  DOI =          "https://doi.org/10.1147/sj.22.0086",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "Comprehensive survey of hashing, with a good
                 discussion of hash functions.",
  acknowledgement = ack-nhfb,
}

@Article{Delgalvis:1964:SRD,
  author =       "I. Delgalvis and G. Davison",
  title =        "Storage requirements for a data exchange",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "1",
  pages =        "2--13",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Blake:1964:SSD,
  author =       "K. Blake and G. Gordon",
  title =        "Systems simulation with digital computers",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "1",
  pages =        "14--21",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Efron:1964:GPD,
  author =       "R. Efron and G. Gordon",
  title =        "A general purpose digital simulator and examples of
                 its application, Part {I}: Description of the
                 simulator",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "1",
  pages =        "22--34",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Velasco:1964:GPD,
  author =       "C. R. Velasco",
  title =        "A general purpose digital simulator and examples of
                 its application, Part {II}: Simulation of a telephone
                 intercept system",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "1",
  pages =        "35--40",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Blum:1964:GPD,
  author =       "A. M. Blum",
  title =        "A general purpose digital simulator and examples of
                 its application, Part {III}: Digital simulation of
                 urban traffic",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "1",
  pages =        "41--50",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Boyd:1964:GPD,
  author =       "D. F. Boyd and H. S. Krasnow and A. C. R. Petit",
  title =        "A general purpose digital simulator and examples of
                 its application, Part {IV}: Simulation of an integrated
                 steel mill",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "1",
  pages =        "51--56",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Dimsdale:1964:DSL,
  author =       "B. Dimsdale and H. M. Markowitz",
  title =        "A description of the {SIMSCRIPT} language",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "1",
  pages =        "57--67",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Meggitt:1964:CCH,
  author =       "J. E. Meggitt",
  title =        "A character computer for high-level language
                 interpretation",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "1",
  pages =        "68--78",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{White:1964:DIP,
  author =       "B. White and J. Trimble",
  title =        "Design of an integrated programming and operating
                 system, Part {VI}: Implementation on the 7040\slash 44
                 data processing system",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "1",
  pages =        "79--94",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{ApSimon:1964:AGP,
  author =       "H. G. ApSimon",
  title =        "Algorithm for a gear-train problem",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "1",
  pages =        "95--103",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Scharfenberg:1964:CG,
  author =       "K. F. Scharfenberg and P. H. {Smith, Jr.} and R. D.
                 Villani",
  title =        "A concordance generator",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "1",
  pages =        "104--111",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1964:Aa,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "1",
  pages =        "112--114",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1964:CV,
  author =       "Anonymous",
  title =        "Contents of Volumes 1 \& 2",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "1",
  pages =        "115--116",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Blaauw:1964:SSPa,
  author =       "G. A. Blaauw and F. P. {Brooks, Jr.}",
  title =        "The structure of {SYSTEM\slash 360}, Part {I}: Outline
                 of the logical structure",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "2",
  pages =        "119--135",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Stevens:1964:SSP,
  author =       "W. Y. Stevens",
  title =        "The structure of {SYSTEM\slash 360}, Part {II}: System
                 implementations",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "2",
  pages =        "136--143",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Amdahl:1964:SSP,
  author =       "G. M. Amdahl",
  title =        "The structure of {SYSTEM\slash 360}, Part {III}:
                 Processing unit design considerations",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "2",
  pages =        "144--164",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Padegs:1964:SSP,
  author =       "A. Padegs",
  title =        "The structure of {SYSTEM\slash 360}, Part {IV}:
                 Channel design considerations",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "2",
  pages =        "165--180",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Blaauw:1964:SSPb,
  author =       "G. A. Blaauw",
  title =        "The structure of {SYSTEM\slash 360}, Part {V}:
                 Multisystem organization",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "2",
  pages =        "181--195",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1964:Ab,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "2",
  pages =        "196--196",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Falkoff:1964:FDS,
  author =       "A. D. Falkoff and K. E. Iverson and E. H. Sussenguth",
  title =        "A formal description of {SYSTEM\slash 360}",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "3",
  pages =        "198--261",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:30:12 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/032/falkoff.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1964:Ac,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "3",
  number =       "3",
  pages =        "263--263",
  year =         "1964",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Branin:1965:IPM,
  author =       "F. H. {Branin, Jr.} and L. V. Hall and J. Suez and R.
                 M. Carlitz and T. C. Chen",
  title =        "An interpretive program for matrix arithmetic",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "1",
  pages =        "2--24",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bresenham:1965:ACC,
  author =       "J. E. Bresenham",
  title =        "Algorithm for computer control of a digital plotter",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "1",
  pages =        "25--30",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 19:20:25 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "dot generation; line drawing; raster display; vector
                 generation",
}

@Article{Sweeney:1965:AFP,
  author =       "D. W. Sweeney",
  title =        "An analysis of floating-point addition",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "1",
  pages =        "31--42",
  year =         "1965",
  CODEN =        "IBMSA7",
  DOI =          "https://doi.org/10.1147/sj.41.0031",
  ISSN =         "0018-8670",
  bibdate =      "Thu Sep 15 18:42:42 1994",
  bibsource =    "ftp://garbo.uwasa.fi/pc/doc-soft/fpbibl18.zip;
                 http://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "Reprinted in
                 \cite[pp.~317--328]{Swartzlander:1990:CAa}.",
  URL =          "http://www.research.ibm.com/journal/sj/041/ibmsjIVRID.pdf",
  acknowledgement = ack-nj # "\slash " # ack-nhfb,
  fjournal =     "IBM Systems Journal",
  remark =       "Page 34, containing a critical table, was originally
                 missing from the PDF file, and this was finally
                 corrected by IBM in November 2008.",
  xxmonth =      "(none)",
}

@Article{Welch:1965:RPS,
  author =       "P. D. Welch",
  title =        "On the reliability of polymorphic systems",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "1",
  pages =        "43--52",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Shapiro:1965:TCW,
  author =       "S. Shapiro",
  title =        "A technique to control waiting time in a queue",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "1",
  pages =        "53--57",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ginzberg:1965:NTR,
  author =       "M. G. Ginzberg",
  title =        "Notes on testing real-time system programs",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "1",
  pages =        "58--72",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Haines:1965:SCF,
  author =       "L. H. Haines",
  title =        "Serial compilation and the 1401 {FORTRAN} compiler",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "1",
  pages =        "73--80",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1965:Aa,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "1",
  pages =        "81--82",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1965:CV,
  author =       "Anonymous",
  title =        "Contents of Volume Three",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "1",
  pages =        "83--84",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1965:EVT,
  author =       "Anonymous",
  title =        "Errata in Volume Three, Numbers Two and Three",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "1",
  pages =        "84--84",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1965:FAOa,
  author =       "Anonymous",
  title =        "Fabrication and assembly operations",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "2",
  pages =        "86--86",
  month =        jun,
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:36:42 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Baker:1965:FAO,
  author =       "C. T. Baker",
  title =        "Fabrication and assembly operations, Part 1: The
                 outlines of a control system",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "2",
  pages =        "87--93",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Calica:1965:FAOa,
  author =       "A. B. Calica",
  title =        "Fabrication and assembly operations, Part {II}:
                 Long-range planning techniques",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "2",
  pages =        "94--104",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Loewner:1965:FAO,
  author =       "P. G. Loewner",
  title =        "Fabrication and assembly operations, Part {III}:
                 Matrix methods for processing configuration data",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "2",
  pages =        "105--121",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Dzielinski:1965:FAO,
  author =       "B. P. Dzielinski",
  title =        "Fabrication and assembly operations, Part {IV}: Linear
                 programming in production planning",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "2",
  pages =        "122--135",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Held:1965:CDD,
  author =       "M. Held and R. M. Karp",
  title =        "The construction of discrete dynamic programming
                 algorithms",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "2",
  pages =        "136--147",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Yardeni:1965:ATC,
  author =       "L. A. Yardeni",
  title =        "Algorithms for traffic-signal control",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "2",
  pages =        "148--161",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Chang:1965:CCI,
  author =       "W. Chang and D. J. Wong",
  title =        "Computer channel interference analysis",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "2",
  pages =        "162--170",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1965:Ab,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "2",
  pages =        "171--172",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Herscovitch:1965:GEG,
  author =       "H. Herscovitch and T. H. Schneider",
  title =        "{GPSS III}\emdash an expanded general purpose
                 simulator",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "3",
  pages =        "174--183",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{McGee:1965:DPR,
  author =       "W. C. McGee",
  title =        "On dynamic program relocation",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "3",
  pages =        "184--199",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bitonti:1965:CLA,
  author =       "F. Bitonti and D. W. Cooper and D. N. Frayne and H. H.
                 Hansen",
  title =        "A computer-aided linkage analysis system",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "3",
  pages =        "200--223",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:38:07 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1965:FAOb,
  author =       "Anonymous",
  title =        "Fabrication and assembly operations",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "3",
  pages =        "224--244",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:38:13 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Calica:1965:FAOb,
  author =       "A. B. Calica",
  title =        "Fabrication and assembly operations, Part {V}:
                 Production order sequencing",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "3",
  pages =        "225--240",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gorenstein:1965:FAO,
  author =       "S. Gorenstein",
  title =        "Fabrication and assembly operations, Part {VI}:
                 Parameter values for sequencing control",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "3",
  pages =        "241--249",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Shapiro:1965:FAO,
  author =       "S. Shapiro",
  title =        "Fabrication and assembly operations, Part {VII}:
                 Adaptive control in production planning",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "3",
  pages =        "250--255",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1965:Ac,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "4",
  number =       "3",
  pages =        "256--257",
  year =         "1965",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Mealy:1966:FSO,
  author =       "G. H. Mealy",
  title =        "The functional structure of {OS\slash 360}, Part {I}:
                 Introductory survey",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "1",
  pages =        "3--11",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Witt:1966:FSO,
  author =       "B. I. Witt",
  title =        "The functional structure of {OS\slash 360}, Part {II}:
                 Job and task management",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "1",
  pages =        "12--29",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Clark:1966:FSO,
  author =       "W. A. Clark",
  title =        "The functional structure of {OS\slash 360}, Part
                 {III}: Data management",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "1",
  pages =        "30--51",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1966:Aa,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "1",
  pages =        "52--52",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1966:Ab,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "1",
  pages =        "53--59",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1966:CVF,
  author =       "Anonymous",
  title =        "Contents of Volume Four",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "1",
  pages =        "60--60",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Freeman:1966:MLD,
  author =       "D. N. Freeman",
  title =        "Macro language design for {SYSTEM\slash 360}",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "2",
  pages =        "62--77",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Belady:1966:SRA,
  author =       "L. A. Belady",
  title =        "A study of replacement algorithms for a
                 virtual-storage computer",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "2",
  pages =        "78--101",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Spielberg:1966:CEU,
  author =       "K. Spielberg",
  title =        "Computation of $e^x$ with the use of large tables",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "2",
  pages =        "102--114",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Chang:1966:QMS,
  author =       "W. Chang",
  title =        "A queuing model for a simple case of time sharing",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "2",
  pages =        "115--125",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1966:Ac,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "2",
  pages =        "126--126",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1966:Ad,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "2",
  pages =        "127--131",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Margopoulos:1966:TSD,
  author =       "W. P. Margopoulos and R. J. Williams",
  title =        "On teleprocessing system design, Part {I}:
                 Characteristic problems",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "3",
  pages =        "134--141",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Esau:1966:TSD,
  author =       "L. R. Esau and K. C. Williams",
  title =        "On teleprocessing system design, Part {II}: a method
                 for approximating the optimal network",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "3",
  pages =        "142--147",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bricault:1966:TSD,
  author =       "J. P. Bricault and I. Delgalvis",
  title =        "On teleprocessing system design, Part {III}: An
                 analysis of a request-queued buffer pool",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "3",
  pages =        "148--157",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Seaman:1966:TSDa,
  author =       "P. H. Seaman and R. A. Lind and T. L. Wilson",
  title =        "On teleprocessing system design, Part {IV}: An
                 analysis of auxiliary-storage activity",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "3",
  pages =        "158--170",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gay:1966:TSD,
  author =       "T. W. {Gay, Jr.}",
  title =        "On teleprocessing system design, Part {V}: a
                 technique for estimating channel interference",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "3",
  pages =        "171--174",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Seaman:1966:TSDb,
  author =       "P. H. Seaman",
  title =        "On teleprocessing system design, Part {VI}: The role
                 of digital simulation",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "3",
  pages =        "175--189",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:39:08 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1966:Ae,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "3",
  pages =        "190--191",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1966:Af,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "3",
  pages =        "192--200",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lewis:1966:CPS,
  author =       "P. A. W. Lewis",
  title =        "A computer program for the statistical analysis of
                 series of events",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "4",
  pages =        "202--225",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Radke:1966:MAM,
  author =       "C. E. Radke",
  title =        "Merge-sort analysis by matrix techniques",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "4",
  pages =        "226--247",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hahn:1966:KAE,
  author =       "S. G. Hahn and E. V. Hankam",
  title =        "Kernel analysis of elliptic partial differential
                 equations",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "4",
  pages =        "248--270",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1966:Ag,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "4",
  pages =        "271--271",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1966:Ah,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "5",
  number =       "4",
  pages =        "272--278",
  year =         "1966",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bender:1967:FDD,
  author =       "G. Bender and D. N. Freeman and J. D. Smith",
  title =        "Function and design of {DOS\slash 360} and {TOS\slash
                 360}",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "1",
  pages =        "2--21",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Cenfetelli:1967:DMC,
  author =       "A. R. Cenfetelli",
  title =        "Data management concepts for {DOS\slash 360} and
                 {TOS\slash 360}",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "1",
  pages =        "22--37",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ricour:1967:IDM,
  author =       "D. H. Ricour and V. Mei",
  title =        "Internal data management techniques for {DOS\slash
                 360}",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "1",
  pages =        "38--48",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Aron:1967:RSP,
  author =       "J. D. Aron",
  title =        "Real-time systems in perspective",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "1",
  pages =        "49--67",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1967:Ae,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "1",
  pages =        "68--68",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1967:Aa,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "1",
  pages =        "69--75",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1967:CVF,
  author =       "Anonymous",
  title =        "Contents of Volume Five",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "1",
  pages =        "76--76",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1967:EVF,
  author =       "Anonymous",
  title =        "Errata in Volume Five",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "1",
  pages =        "76--76",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Keeley:1967:AMS,
  author =       "J. F. Keeley",
  title =        "An application-oriented multiprocessing system, Part
                 {I}: Introduction",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "2",
  pages =        "78--79",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Blakeney:1967:AMS,
  author =       "G. R. Blakeney and L. F. Cudney and C. R. Eickhorn",
  title =        "An application-oriented multiprocessing system, Part
                 {II}: Design characteristics of the 9020 system",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "2",
  pages =        "80--94",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Devereaux:1967:AMS,
  author =       "J. A. Devereaux",
  title =        "An application-oriented multiprocessing system, Part
                 {III}: Control program features",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "2",
  pages =        "95--102",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lancto:1967:AMS,
  author =       "D. C. Lancto and R. L. Rockefeller",
  title =        "An application-oriented multiprocessing system, Part
                 {IV}: The operational error analysis program",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "2",
  pages =        "103--115",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Suda:1967:AMS,
  author =       "R. Suda",
  title =        "An application-oriented multiprocessing system, Part
                 {V}: The diagnostic monitor",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "2",
  pages =        "116--123",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Seward:1967:AMS,
  author =       "F. K. Seward",
  title =        "An application-oriented multiprocessing system, Part
                 {VI}: Programs for the intended application",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "2",
  pages =        "124--132",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:30:08 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1967:Af,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "2",
  pages =        "133--134",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:30:27 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1967:Ab,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "2",
  pages =        "135--140",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Shedler:1967:ERP,
  author =       "G. S. Shedler and M. M. Lehman",
  title =        "Evaluation of redundancy in a parallel algorithm",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "3",
  pages =        "142--149",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:30:40 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Mueller:1967:AGR,
  author =       "J. H. Mueller",
  title =        "Aspects of the {Gemini} real-time operating system",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "3",
  pages =        "150--162",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:40:09 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Montalbano:1967:HCC,
  author =       "M. Montalbano",
  title =        "High-speed calculation of the critical paths of large
                 networks",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "3",
  pages =        "163--191",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:40:23 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Galli:1967:ADV,
  author =       "E. J. Galli and H. Yamada",
  title =        "An automatic dictionary and the verification of
                 machine-readable text",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "3",
  pages =        "192--207",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1967:Ag,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "3",
  pages =        "208--208",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1967:Ac,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "3",
  pages =        "209--219",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Tucker:1967:MCS,
  author =       "S. G. Tucker",
  title =        "Microprogram control for {SYSTEM\slash 360}",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "4",
  pages =        "222--241",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Brennan:1967:TCS,
  author =       "R. D. Brennan and M. Y. Silberberg",
  title =        "Two continuous system modeling programs",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "4",
  pages =        "242--266",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Eisenbies:1967:CDD,
  author =       "J. L. Eisenbies",
  title =        "Conventions for digital data communication link
                 design",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "4",
  pages =        "267--302",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1967:Ah,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "4",
  pages =        "303--304",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1967:Ad,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "4",
  pages =        "305--312",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1967:CI,
  author =       "Anonymous",
  title =        "{Cumulative Indices}: 1962--1967",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "4",
  pages =        "313--313",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1967:TC,
  author =       "Anonymous",
  title =        "{Tables of Contents}: 1962--1967",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "4",
  pages =        "314--319",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1967:AI,
  author =       "Anonymous",
  title =        "{Author Index}: 1962--1967",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "4",
  pages =        "320--323",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1967:SI,
  author =       "Anonymous",
  title =        "{Subject Index}: 1962--1967",
  journal =      j-IBM-SYS-J,
  volume =       "6",
  number =       "4",
  pages =        "324--327",
  year =         "1967",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Conti:1968:SAS,
  author =       "C. J. Conti and D. H. Gibson and S. H. Pitkowsky",
  title =        "Structural aspects of the {SYSTEM}\slash 360 Model 85,
                 Part {I}: General organization",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "1",
  pages =        "2--14",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Liptay:1968:SAS,
  author =       "J. S. Liptay",
  title =        "Structural aspects of the {SYSTEM}\slash 360 Model 85,
                 Part {II}: The cache",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "1",
  pages =        "15--21",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Architectures; memory hierarchy",
}

@Article{Padegs:1968:SAS,
  author =       "A. Padegs",
  title =        "Structural aspects of the {SYSTEM}\slash 360 Model 85,
                 Part {III}: Extensions to floating-point architecture",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "1",
  pages =        "22--29",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{DeMatteis:1968:ELT,
  author =       "J. J. DeMatteis",
  title =        "An economic lot-sizing technique, Part {I}: The
                 part-period algorithm",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "1",
  pages =        "30--38",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Mendoza:1968:ELT,
  author =       "A. G. Mendoza",
  title =        "An economic lot-sizing technique, Part {II}:
                 Mathematical analysis of the part-period algorithm",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "1",
  pages =        "39--46",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Pierce:1968:MEL,
  author =       "J. F. Pierce",
  title =        "A multi-item economic lot-sizing problem",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "1",
  pages =        "47--66",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1968:Ac,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "1",
  pages =        "67--67",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1968:Aa,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "1",
  pages =        "68--71",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Havender:1968:ADM,
  author =       "J. W. Havender",
  title =        "Avoiding deadlock in multitasking systems",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "2",
  pages =        "74--84",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Stanley:1968:SGS,
  author =       "W. I. Stanley and H. F. Hertel",
  title =        "Statistics gathering and simulation for the {Apollo}
                 real-time operating system",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "2",
  pages =        "85--102",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hauth:1968:TTM,
  author =       "C. Hauth",
  title =        "Turnaround time for messages of differing priorities",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "2",
  pages =        "103--122",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Keefe:1968:HCP,
  author =       "D. D. Keefe",
  title =        "Hierarchical control programs for systems evaluation",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "2",
  pages =        "123--133",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1968:Ad,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "2",
  pages =        "134--134",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1968:Ab,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "2",
  pages =        "135--143",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Johnson:1968:IGD,
  author =       "C. I. Johnson",
  title =        "Interactive Graphics in Data Processing: Principles of
                 interactive systems",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "147--173",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:41:26 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1968:IGDa,
  author =       "Anonymous",
  title =        "Interactive Graphics in Data Processing: Display
                 concepts and structures",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "175--175",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:41:56 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Appel:1968:IGDa,
  author =       "A. Appel and T. P. Dankowski and R. L. Dougherty",
  title =        "Interactive Graphics in Data Processing: Aspects of
                 display technology",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "176--187",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ahuja:1968:IGDa,
  author =       "D. V. Ahuja and S. A. Coons",
  title =        "Interactive Graphics in Data Processing: Geometry for
                 construction and display",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "188--205",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ahuja:1968:IGDb,
  author =       "D. V. Ahuja",
  title =        "Interactive Graphics in Data Processing: An algorithm
                 for generating spline-like curves",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "206--217",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Baskin:1968:IGD,
  author =       "H. B. Baskin and S. P. Morse",
  title =        "Interactive Graphics in Data Processing: a
                 multilevel modeling structure for interactive graphic
                 design",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "218--228",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Symonds:1968:IGD,
  author =       "A. J. Symonds",
  title =        "Interactive Graphics in Data Processing:
                 Auxiliary-storage associative data structure for
                 {PL/I}",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "229--245",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1968:IGDb,
  author =       "Anonymous",
  title =        "Interactive Graphics in Data Processing: Language and
                 systems support",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "247--247",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:42:54 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Rully:1968:IGD,
  author =       "A. D. Rully",
  title =        "Interactive Graphics in Data Processing: a
                 subroutine package for {FORTRAN}",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "248--256",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Chen:1968:IGD,
  author =       "F. C. Chen and R. L. Dougherty",
  title =        "Interactive Graphics in Data Processing: a system
                 for implementing interactive applications",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "257--270",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Brown:1968:IGD,
  author =       "S. H. Brown",
  title =        "Interactive Graphics in Data Processing:
                 Conversational job control",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "271--280",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gagliano:1968:IGD,
  author =       "F. W. Gagliano and H. W. Thombs and R. E. Cornish",
  title =        "Interactive Graphics in Data Processing: a
                 conversational display capability",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "281--291",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Comba:1968:IGD,
  author =       "P. G. Comba",
  title =        "Interactive Graphics in Data Processing: a language
                 for three-dimensional geometry",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "292--307",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:44:07 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1968:IGDc,
  author =       "Anonymous",
  title =        "Interactive Graphics in Data Processing: Application
                 areas",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "309--309",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:44:55 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Appel:1968:IGDb,
  author =       "A. Appel",
  title =        "Interactive Graphics in Data Processing: Modeling in
                 three dimensions",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "310--321",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:44:05 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Okaya:1968:IGD,
  author =       "Y. Okaya",
  title =        "Interactive Graphics in Data Processing: Interactive
                 aspects of crystal structure analysis",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "322--330",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:45:59 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Jacobsen:1968:IGD,
  author =       "J. D. Jacobsen",
  title =        "Interactive Graphics in Data Processing: Geometric
                 relationships for retrieval of geographic information",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "331--341",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{McGee:1968:IGD,
  author =       "W. C. McGee and H. R. Penafiel and S. K. Howry",
  title =        "Interactive Graphics in Data Processing: Analysis and
                 display of physics data",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "342--354",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Creasy:1968:IGD,
  author =       "R. J. Creasy",
  title =        "Interactive Graphics in Data Processing: Neutron
                 cross-section evaluation",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "355--364",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lafuente:1968:IGD,
  author =       "J. M. Lafuente",
  title =        "Interactive Graphics in Data Processing: Cam design on
                 a graphics console",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "365--372",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Day:1968:IGD,
  author =       "C. W. Day and L. L. Zimmerman",
  title =        "Interactive Graphics in Data Processing:
                 Implementation and usage",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "373--381",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1968:Ae,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "382--385",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1968:AI,
  author =       "Anonymous",
  title =        "{Author Index}: 1962--1968",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "386--390",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1968:SI,
  author =       "Anonymous",
  title =        "{Subject Index}: 1962--1968",
  journal =      j-IBM-SYS-J,
  volume =       "7",
  number =       "3/4",
  pages =        "391--395",
  year =         "1968",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Henry:1969:HSD,
  author =       "W. R. Henry",
  title =        "Hierarchical structure for data management",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "1",
  pages =        "2--15",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gould:1969:GIG,
  author =       "R. L. Gould",
  title =        "{GPSS\slash 360}\emdash an improved general purpose
                 simulator",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "1",
  pages =        "16--27",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Wade:1969:TAU,
  author =       "R. D. Wade and G. P. Cawsey and R. A. K. Veber",
  title =        "A teleprocessing approach using standard equipment",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "1",
  pages =        "28--47",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Tang:1969:CEC,
  author =       "D. T. Tang and R. T. Chien",
  title =        "Coding for error control",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "1",
  pages =        "48--86",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1969:Ae,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "1",
  pages =        "87--87",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1969:Aa,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "1",
  pages =        "88--91",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hellerman:1969:SPT,
  author =       "H. Hellerman",
  title =        "Some principles of time-sharing scheduler strategies",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "2",
  pages =        "94--117",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ruggiero:1969:APS,
  author =       "J. F. Ruggiero and D. A. Coryell",
  title =        "An auxiliary processing system for array
                 calculations",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "2",
  pages =        "118--135",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lewis:1969:PNG,
  author =       "P. A. W. Lewis and A. S. Goodman and J. M. Miller",
  title =        "A pseudorandom number generator for the {SYSTEM\slash
                 360}",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "2",
  pages =        "136--146",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{White:1969:NAE,
  author =       "W. W. White and A. M. Bomberault",
  title =        "A network algorithm for empty freight car allocation",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "2",
  pages =        "147--169",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1969:Af,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "2",
  pages =        "170--171",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1969:Ab,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "2",
  pages =        "172--175",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Jephson:1969:TCD,
  author =       "J. S. Jephson and R. P. Mcquarrie and R. E.
                 Vogelsberg",
  title =        "A Three-Value Computer Design Verification System",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "3",
  pages =        "178--188",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Experimental three-value simulation system, composed
                 of series of computer programs, is designed for use as
                 engineering tool to verify large (5000 block) logic
                 designs prior to actual construction of hardware and
                 also ensures microprogram and logic compatibility in
                 microprogram-controlled machine; besides binary 1 and 0
                 values, simulator uses X value, which represents
                 unknown condition and is considered to occur during any
                 transition from one binary value to another; use of
                 this third value to represent transition allows
                 simulator to detect combinational hazards, critical
                 races, and feedback oscillations in machine design.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Systems J",
  keywords =     "circuits; computers; logic circuits",
}

@Article{Woodrum:1969:ISM,
  author =       "L. J. Woodrum",
  title =        "Internal Sorting with Minimal Comparing",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "3",
  pages =        "189--203",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See errata \cite{Anonymous:1970:ESM}",
  abstract =     "Ordering operator that leads to development of
                 algorithm for internal sorting is described; analysis
                 of algorithm is presented, together with discussion of
                 number of comparisons necessary for sorting; it is
                 shown that number of comparisons is close to
                 theoretically obtainable number; sorting algorithm is
                 variant of two-way merge.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Systems J",
  keywords =     "computers; programming",
}

@Article{Kolsky:1969:PFU,
  author =       "H. G. Kolsky",
  title =        "Problem formulation using {APL}",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "3",
  pages =        "204--219",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Stacy:1969:DES,
  author =       "E. W. Stacy and L. E. Hunsinger and J. F. Price",
  title =        "Determining economic sampling plans",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "3",
  pages =        "220--244",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1969:Ag,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "3",
  pages =        "245--246",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1969:Ac,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "3",
  pages =        "247--250",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Drummond:1969:PSP,
  author =       "M. E. {Drummond, Jr.}",
  title =        "A Perspective on System Performance Evaluation",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "4",
  pages =        "252--263",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Summary of the growing complexities in computing
                 systems and the effect of these complexities on system
                 performance evaluation. Evaluations based on
                 availability or work capability; advantages and
                 disadvantages of evaluation by classification,
                 comparison and time estimation. Application of test
                 results and the test data itself.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Systems J",
  keywords =     "computers; de; performance evaluation",
}

@Article{Seaman:1969:SOS,
  author =       "P. H. Seaman and R. C. Soucy",
  title =        "Simulating Operating Systems",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "4",
  pages =        "264--279",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Specialized modeling system, called the Computer
                 System Simulator, provides a language and a structure
                 specifically designed for modeling computer systems to
                 evaluate their performance; simulator provides general
                 equipment models, and user assembles a system from the
                 equipment models, specifies parameters to allow
                 simulation of his operating system functions, and
                 provides models of his application programs.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Systems J",
  keywords =     "computers; operating systems",
}

@Article{Cheng:1969:TDS,
  author =       "P. S. Cheng",
  title =        "Trace-driven system modeling",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "4",
  pages =        "280--289",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "In the trace-driven approach, data traced on a real
                 running system are used to drive the model;
                 experimental model based on this approach is used, to
                 study the effect on performance of various
                 multiprogramming and multiprocessing system design
                 choices. Model implementation is focused on those
                 aspects of the system contributing substantially to
                 total system performance.",
  acknowledgement = ack-nhfb,
  annote =       "The method described in the paper is to run the job
                 stream sequentially using the OS under which a trace
                 program can be executed. System activities that pertain
                 to the execution of a given job are collected in a
                 trace log. Then the data in the trace log is reduced to
                 the level of detail the system is to be simulated at.
                 The events present in the reduced trace log are used to
                 drive the event-based simulation.",
  journalabr =   "IBM Systems J",
  keywords =     "computer systems; computers; modeling techniques;
                 performance evaluation; simulation",
}

@Article{Bonner:1969:USM,
  author =       "A. J. Bonner",
  title =        "Using System Monitor Output to Improve Performance",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "4",
  pages =        "290--298",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Using monitor connected to the computer by measurement
                 probes, which accept status signals from the computer
                 being monitored, computing systems are analyzed from a
                 system performance profile, which shows usage of the
                 different system components, such as channels and
                 central processing units; profile indicates where a
                 system configuration or a program might be modified to
                 improve performance. The profile also suggests areas
                 where more detailed monitoring and analysis appear
                 promising.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Systems J",
  keywords =     "computers; fir; monitoring equipment; performance
                 evaluation; system monitoring",
}

@Article{Stanley:1969:MSO,
  author =       "W. I. Stanley",
  title =        "Measurement of System Operational Statistics",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "4",
  pages =        "299--308",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Special-purpose program called the job accounting
                 system is used for continuously gathering performance
                 data in a complex multijobbing environment. The program
                 takes advantage of computing system and support program
                 characteristics to count and time data processing
                 activities. The data gathered by the program enables
                 installation managers to measure the effects of
                 modifications to equipment and programming support
                 configurations and to define work loads.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Systems J",
  keywords =     "computer systems; computers; LUA; performance
                 evaluation",
}

@Article{Buchholz:1969:SJM,
  author =       "W. Buchholz",
  title =        "A Synthetic Job for Measuring System Performance",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "4",
  pages =        "309--318",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Job is a greatly simplified file maintenance
                 procedure, which exercises both the central processing
                 unit and major input\slash output devices, with
                 activity parameters being specified in a manner
                 independent of the system. A complete PL/I version is
                 shown as an example. It is conjectured that such a
                 synthetic job may evolve into a practical standard of
                 performance.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Systems J",
  keywords =     "computers; LGO; performance measurement",
}

@Article{Skinner:1969:ESC,
  author =       "C. E. Skinner and J. R. Asher",
  title =        "Effects of Storage Contention on System Performance",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "4",
  pages =        "319--333",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Mathematical model measures amount by which a
                 computer's speed is reduced when it time-shares storage
                 with other computers and I/O channels. The method can
                 be applied to any number of processors and\slash or
                 channels and storage units, although the complexity of
                 the solution does increase rapidly as the number of
                 processors increases. Explicit formulas and numerical
                 results are given for several special cases. The
                 results of a simulation of a shared-memory
                 multiprocessor are presented.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Systems J",
  keywords =     "dynamic memory management; multiprocessing;
                 performance evaluation; roe; time sharing",
}

@Article{Anonymous:1969:Ah,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "4",
  pages =        "334--335",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1969:Ad,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "4",
  pages =        "336--337",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1969:C,
  author =       "Anonymous",
  title =        "Contents: 1969",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "4",
  pages =        "338--338",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1969:AIa,
  author =       "Anonymous",
  title =        "Author index: 1962--1969",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "4",
  pages =        "339--344",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1969:AIb,
  author =       "Anonymous",
  title =        "Subject index: 1962--1969",
  journal =      j-IBM-SYS-J,
  volume =       "8",
  number =       "4",
  pages =        "345--349",
  year =         "1969",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Darga:1970:OIU,
  author =       "K. Darga",
  title =        "On-line inquiry under a small-system operating
                 system",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "1",
  pages =        "2--11",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Quarles:1970:TCP,
  author =       "D. R. Quarles",
  title =        "Trajectory Control Programs in Support of {Apollo}
                 Missions",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "1",
  pages =        "12--23",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A set of control programs, referred to as the
                 trajectory control programs, make use of features
                 provided by the operating system to enhance the
                 integrity and consistency of the output from some of
                 the mathematical programs. The objective is achieved by
                 an elaborate queue control process that continually
                 enables and disables various real-time queue control
                 blocks to regulate the independent-task processing. The
                 queue control techniques used in generating the
                 predicted trajectory and the subsequent use of the
                 trajectory data are described.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Systems J",
  keywords =     "computers; operating systems; orbits and trajectory;
                 space vehicles",
}

@Article{Newitt:1970:SRS,
  author =       "J. W. Newitt and A. Odarchenko",
  title =        "A Structure for Real-Time {Stenotype} Transcription",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "1",
  pages =        "24--35",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The experiments described are directed toward
                 designing a time-shared Stenotype transcription system
                 that produces English text from speech via the
                 Stenotype keyboard in real time. A content-addressing
                 algorithm for direct-access storage, requiring a single
                 access per retrieval, is presented. An existing
                 experimental Stenotype dictionary program is used to
                 implement on System/360 this algorithm and a
                 dictionary-compaction technique. Transcription analysis
                 indicates that the experimental design can reduce the
                 average transcription error rate to 6\%.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Systems J",
  keywords =     "algorithms; ATI; computers, programming; information
                 storage and retrieval; language processing",
}

@Article{Chang:1970:SQP,
  author =       "W. Chang",
  title =        "Single-Server Queuing Processes in Computing Systems",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "1",
  pages =        "36--71",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Applications of queuing models that may be
                 economically useful in computing system analysis are
                 reviewed. With emphasis on terminal-oriented systems
                 with priorities, methods are given for estimating such
                 average quantities as service time, waiting time, and
                 response time. Examples illustrate these methods and
                 their ranges of efficiency, beyond which simulation
                 techniques may be preferable.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Systems J",
  keywords =     "computers; EMI; queuing processes; systems
                 engineering",
}

@Article{Anonymous:1970:Ab,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "1",
  pages =        "72--72",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1970:Ac,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "1",
  pages =        "73--75",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Mattson:1970:ETS,
  author =       "R. L. Mattson and J. Gecsei and D. R. Slutz and I. L.
                 Traiger",
  title =        "Evaluation Techniques for Storage Hierarchies",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "2",
  pages =        "78--117",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A technique, called -`stack processing', is provided
                 for use in the cost performance evaluation of a large
                 class of storage hierarchies. An efficient method is
                 given for determining, in one pass of an address trace,
                 performance measures for a large class of demand-paged,
                 multilevel storage systems utilizing a variety of
                 mapping schemes and replacement algorithms.
                 Specifically, the procedure determines, for a given
                 address trace, the exact frequency of access to each
                 level of a hierarchy as a function of page size,
                 replacement algorithm, number of levels, and capacity
                 of each level. The technique depends on an algorithm
                 classification, called `stack algorithms', examples of
                 which are `least frequently used', `least recently
                 used', `optimal', and `random replacement' algorithms.
                 Techniques yield the exact access frequency to each
                 storage device, which can be used to estimate the
                 overall performance of actual storage hierarchies.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Syst J",
  keywords =     "computers; computers, memories; computers, operating
                 systems; computers, programming; data storage; dynamic
                 memory management; ENO; memory hierarchy, Performance
                 Evaluation: Experimental, memory hierarchy, Performance
                 Evaluation: Analytic",
}

@Article{Woodrum:1970:MFB,
  author =       "L. J. Woodrum",
  title =        "A model of floating buffering",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "2",
  pages =        "118--144",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Jacobs:1970:ISF,
  author =       "J. H. Jacobs and T. J. Dillon",
  title =        "Interactive {Saturn} Flight Program Simulator",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "2",
  pages =        "145--158",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The simulation tests all normal and perturbed launch
                 vehicle interactions with the mission computer and
                 programs to find and correct programming problems.
                 Using a graphics console, flight analysis execute
                 mission programs, make programming changes, and observe
                 and document the simulated reactions of the launch
                 vehicle. The onboard digital computer, which holds and
                 executes the mission program, is described. Also
                 presented are system components through which the
                 analyst interacts with the onboard program and
                 computer, interactive graphics system, laboratory
                 computer and programming, and Saturn simulation
                 programs, Interactive Saturn simulation is illustrated
                 by a typical mission.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Syst J",
  keywords =     "computers, graphics; computers, programming;
                 computers, simulation; simulators; space vehicles",
}

@Article{Anonymous:1970:Ad,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "2",
  pages =        "159--159",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1970:Ae,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "2",
  pages =        "160--162",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1970:ESM,
  author =       "Anonymous",
  title =        "Errata: ``{Internal} sorting with minimal
                 comparing''",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "2",
  pages =        "163--163",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Woodrum:1969:ISM}.",
  acknowledgement = ack-nhfb,
}

@Article{Elson:1970:CTL,
  author =       "M. Elson and S. T. Rake",
  title =        "Code-Generation Technique for Large-Language
                 Compilers",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "3",
  pages =        "166--188",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A solution is proposed to the problem of optimizing
                 code generation by a large-language compiler. A
                 high-level definitional language is used to define the
                 code mappings, and an interpreter executes the routines
                 in this language during the one-pass, text-driven
                 code-generation phase. The technique might also be
                 applied to extendable languages and shared-component
                 compilers. The solution is demonstrated with a
                 prototype compiler using PL/I as the source language.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Syst J",
}

@Article{Ryder:1970:HAT,
  author =       "K. D. Ryder",
  title =        "A Heuristic Approach to Task Dispatching",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "3",
  pages =        "189--198",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An experimental algorithm is described for allocating
                 use of a central processing unit to perform separate
                 data processing tasks in a multitasking system. The
                 algorithm, which may control only a subset of the tasks
                 being performed by the system, appears to improve run
                 time for some work loads. Tasks with a recent history
                 of using input\slash output facilities are given
                 preference. This heuristic treatment of tasks is
                 carried over to the algorithm itself, which modifies
                 its own characteristics based on its overall
                 effectiveness in handling the tasks under its
                 control.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Syst J",
}

@Article{Meyer:1970:VMT,
  author =       "R. A. Meyer and L. H. Seawright",
  title =        "A Virtual Machine Time-Sharing System",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "3",
  pages =        "199--218",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The ControlProgram-67\slash Cambridge Monitor System
                 (CP- 67\slash CMS) is a multiaccess system that manages
                 the resources of a computer set up for time-sharing
                 such that each (remote) user appears to have a
                 complete, dedicated computer at his disposal. This
                 concept is known as a virtual machine and allows each
                 user to select the operating system he wishes to run
                 because concurrent operation of several operating
                 systems is possible. The history and design objectives
                 of the system are discussed as well as its present
                 capabilities and some of the applications for its
                 use.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Syst J",
}

@Article{Luetje:1970:IAC,
  author =       "J. H. Luetje",
  title =        "Interactive Aeronautical Charting",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "3",
  pages =        "219--233",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A computer-assisted cartographic system maintains a
                 base of aeronautical data, allows editors (called chart
                 compilers) to interactively create and revise chart
                 manuscripts at a graphic console, and produces
                 transparencies suitable for printing graphic console,
                 and produces transparencies suitable for printing. A
                 simple output of the system is shown. The overall
                 system, described first, is a computer-aided version of
                 manual techniques. Included are the organization and
                 maintenance of the nongraphic data base, and methods
                 for translating individual chart data to visual
                 outputs. Emphasized are design details of the graphic
                 files, which are specific digital complications of
                 aeronautical data for individual charts.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Syst J",
}

@Article{Anonymous:1970:Af,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "3",
  pages =        "234--234",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1970:Ag,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "3",
  pages =        "235--238",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1970:AA,
  author =       "Anonymous",
  title =        "Acknowledgment of Authorship",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "3",
  pages =        "239--239",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hanford:1970:AGT,
  author =       "K. V. Hanford",
  title =        "Automatic Generation of Test Cases",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "4",
  pages =        "242--257",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Discussed is the `syntax machine,' a program for
                 automatically generating syntactically correct programs
                 (test cases) for checking compiler front ends. The
                 notion of `dynamic grammar' is introduced and is used
                 in a syntax-defining notation that provides for
                 contest-sensitivity. Examples demonstrate use of the
                 syntax machine.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Syst J",
}

@Article{Friedman:1970:APS,
  author =       "T. D. Friedman",
  title =        "The Authorization Problem in Shared Files",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "4",
  pages =        "258--280",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The problem of sharing information while protecting
                 proprietary data in large computer files is reviewed.
                 The author suggests certain guidelines for data
                 protection in general-purpose, time-sharing systems,
                 and develops a model of a secured shared file.
                 Operation of the system based on these guidelines is
                 discussed.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Syst J",
}

@Article{Day:1970:CAD,
  author =       "W. H. E. Day",
  title =        "Compiler Assignment of Data Items to Registers",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "4",
  pages =        "281--317",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper formulates as integer programming problems
                 three methods for assigning data items to registers in
                 the compilation process-the one-one, many-one, and
                 many-few global assignment methods. Three algorithms
                 are described for obtaining feasible solutions to the
                 many-one and many-few global assignment problems. One
                 provides an optimal solution. The others, which provide
                 good approximations, appear to be sufficiently fast for
                 inclusion in an optimizing compiler.",
  acknowledgement = ack-nhfb,
  journalabr =   "IBM Syst J",
}

@Article{Anonymous:1970:Ah,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "4",
  pages =        "318--318",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1970:Ai,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "4",
  pages =        "319--322",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1970:C,
  author =       "Anonymous",
  title =        "Contents: 1970",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "4",
  pages =        "323--323",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1970:FAI,
  author =       "Anonymous",
  title =        "Five-year author index",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "4",
  pages =        "324--327",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1970:FSI,
  author =       "Anonymous",
  title =        "Five-year subject index",
  journal =      j-IBM-SYS-J,
  volume =       "9",
  number =       "4",
  pages =        "328--331",
  year =         "1970",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Allen:1971:AFL,
  author =       "C. D. Allen",
  title =        "The application of formal logic to programs and
                 programming",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "1",
  pages =        "2--38",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  MRclass =      "68A10",
  MRnumber =     "45 #6534",
  bibdate =      "Wed Dec 4 12:50:21 MST 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  reviewer =     "J. Gruska",
}

@Article{Kuki:1971:FEL,
  author =       "H. Kuki and J. Ascoly",
  title =        "{FORTRAN} extended-precision library",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "1",
  pages =        "39--61",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Brewer:1971:ISS,
  author =       "A. C. Brewer",
  title =        "Interactive scheduling system",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "1",
  pages =        "62--79",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1971:Ae,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "1",
  pages =        "80--80",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1971:Aa,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "1",
  pages =        "81--83",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Neuhold:1971:FDP,
  author =       "E. J. Neuhold",
  title =        "The formal description of programming languages",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "2",
  pages =        "86--112",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:47:50 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Shedler:1971:SMP,
  author =       "G. S. Shedler and S. C. Yang",
  title =        "Simulation of a model of paging system performance",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "2",
  pages =        "113--128",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ferdinand:1971:AMI,
  author =       "A. E. Ferdinand",
  title =        "An analysis of the machine interference model",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "2",
  pages =        "129--142",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Belady:1971:CGS,
  author =       "L. A. Belady and M. W. Blasgen and C. J. Evangelisti
                 and R. D. Tennison",
  title =        "A computer graphics system for block diagram
                 problems",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "2",
  pages =        "143--161",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1971:Af,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "2",
  pages =        "162--163",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1971:Ab,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "2",
  pages =        "164--165",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hatfield:1971:PRV,
  author =       "D. J. Hatfield and J. Gerald",
  title =        "Program restructuring for virtual memory",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "3",
  pages =        "168--192",
  month =        mar,
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The automatic sector reordering technique discussed
                 brings noticeable improvements in paging performance
                 where there is room for improvement, reducing the
                 necessary working space (for a given number of
                 exceptions) by as much as one-third to one-half. The
                 page size for clustering bears a direct relationship to
                 the program sectors themselves. It has not proved
                 effective to cluster at the physical page site when the
                 average sector size is half as large or more. Finally,
                 the display of a virtual memory use pattern was shown
                 to be a good diagnostic tool.",
  acknowledgement = ack-nhfb,
  keywords =     "virtual memory, paging, sector placement problem,
                 automatic placement, monitoring, nearness matrix",
}

@Article{Bard:1971:PCM,
  author =       "Y. Bard",
  title =        "Performance criteria and measurement for a
                 time-sharing system",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "3",
  pages =        "193--216",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Black:1971:RTF,
  author =       "B. C. Black and D. C. Gazis",
  title =        "Real-time traffic flow optimization",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "3",
  pages =        "217--231",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gorenstein:1971:PEL,
  author =       "S. Gorenstein",
  title =        "Programming for economic lot-sizes with precedences
                 between items",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "3",
  pages =        "232--243",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lorin:1971:GBS,
  author =       "H. Lorin",
  title =        "A guided bibliography to sorting",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "3",
  pages =        "244--254",
  month =        mar,
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1971:Ag,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "3",
  pages =        "255--256",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1971:Ac,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "3",
  pages =        "257--258",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Wimbrow:1971:LIA,
  author =       "J. H. Wimbrow",
  title =        "A large-scale interactive administrative system",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "4",
  pages =        "260--282",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Margolin:1971:AFA,
  author =       "B. H. Margolin and R. P. Parmelee and M. Schatzoff",
  title =        "Analysis of free-storage algorithms",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "4",
  pages =        "283--304",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hanssmann:1971:MCC,
  author =       "F. Hanssmann and W. Kistler and H. Schulz",
  title =        "Modeling for computing center planning",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "4",
  pages =        "305--324",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1971:Ah,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "4",
  pages =        "325--326",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1971:Ad,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "4",
  pages =        "327--328",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1971:C,
  author =       "Anonymous",
  title =        "Contents: 1971",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "4",
  pages =        "329--329",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1971:FAI,
  author =       "Anonymous",
  title =        "Five-year author index",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "4",
  pages =        "330--333",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1971:FSI,
  author =       "Anonymous",
  title =        "Five-year subject index",
  journal =      j-IBM-SYS-J,
  volume =       "10",
  number =       "4",
  pages =        "334--337",
  year =         "1971",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hobgood:1972:EIS,
  author =       "W. S. Hobgood",
  title =        "Evaluation of an interactive-batch system network",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "1",
  pages =        "2--15",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Davies:1972:RM,
  author =       "P. M. Davies",
  title =        "Readings in microprogramming",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "1",
  pages =        "16--40",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Fromm:1972:SAL,
  author =       "J. E. Fromm and D. E. Schreiber",
  title =        "System aspects of large-problem computation and
                 display",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "1",
  pages =        "41--55",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Baker:1972:CPT,
  author =       "F. T. Baker",
  title =        "Chief Programmer Team Management of Production
                 Programming",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "1",
  pages =        "56--73",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Rettus:1972:ACD,
  author =       "R. C. Rettus and R. A. Smith",
  title =        "Accounting control of data processing",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "1",
  pages =        "74--92",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1972:Aa,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "1",
  pages =        "93--94",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1972:Ab,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "1",
  pages =        "95--96",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Parmelee:1972:VSV,
  author =       "R. P. Parmelee and T. I. Peterson and C. C. Tillman
                 and D. J. Hatfield",
  title =        "Virtual storage and virtual machine concepts",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "2",
  pages =        "99--130",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{McGrath:1972:VMC,
  author =       "M. McGrath",
  title =        "Virtual machine computing in an engineering
                 environment",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "2",
  pages =        "131--149",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Almond:1972:NCM,
  author =       "D. B. Almond",
  title =        "Numerical control for machining complex surfaces",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "2",
  pages =        "150--168",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Wahi:1972:GMB,
  author =       "P. N. Wahi",
  title =        "A general management business simulation in {APL}",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "2",
  pages =        "169--180",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See addendum \cite{Anonymous:1973:AGM}.",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1972:Ac,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "2",
  pages =        "181--182",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1972:Ad,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "2",
  pages =        "183--184",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Brown:1972:CDA,
  author =       "D. T. Brown and R. L. Eibsen and C. A. Thorn",
  title =        "Channel and direct access device architecture",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "3",
  pages =        "186--199",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  annote =       "IBM SYSTEMS JOURNAL, VOL 33, NO 4, 1994.",
}

@Article{Callaway:1972:UVS,
  author =       "P. H. Callaway and J. P. Considine and C. H.
                 Thompson",
  title =        "Uses of virtual storage systems in a scientific
                 environment",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "3",
  pages =        "200--218",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Streeter:1972:CES,
  author =       "D. N. Streeter",
  title =        "Cost-benefit evaluation of scientific computing
                 services",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "3",
  pages =        "219--233",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Pomeroy:1972:GPT,
  author =       "J. W. Pomeroy",
  title =        "A guide to programming tools and techniques",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "3",
  pages =        "234--254",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Rechtschaffen:1972:QSU,
  author =       "R. N. Rechtschaffen",
  title =        "Queuing simulation using a random number generator",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "3",
  pages =        "255--271",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1972:Ae,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "3",
  pages =        "272--273",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1972:Af,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "3",
  pages =        "274--275",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hagamen:1972:EVI,
  author =       "W. D. Hagamen and D. J. Linden and H. S. Long and J.
                 C. Weber",
  title =        "Encoding verbal information as unique numbers",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "4",
  pages =        "278--315",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anthony:1972:TDA,
  author =       "A. L. Anthony and H. K. Watson",
  title =        "Techniques for developing analytic models",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "4",
  pages =        "316--328",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Banham:1972:DFR,
  author =       "J. A. Banham and P. McClelland",
  title =        "Design features of a real-time check-clearing system",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "4",
  pages =        "329--349",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1972:Ag,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "4",
  pages =        "350--351",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1972:Ah,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "4",
  pages =        "352--353",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1972:C,
  author =       "Anonymous",
  title =        "Contents: 1971",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "4",
  pages =        "354--354",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1972:FAI,
  author =       "Anonymous",
  title =        "Five-year author index",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "4",
  pages =        "355--358",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1972:FSI,
  author =       "Anonymous",
  title =        "Five-year subject index",
  journal =      j-IBM-SYS-J,
  volume =       "11",
  number =       "4",
  pages =        "359--362",
  year =         "1972",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Orlicky:1973:NCM,
  author =       "Joseph A. Orlicky",
  title =        "Net Change Material Requirements Planning",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "1",
  pages =        "2--29",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Material requirements planning, a principal approach
                 to manufacturing inventory management, is discussed.
                 Defined and evaluated are concepts and characteristics
                 of net change, a method that facilitates replanning and
                 provides timely response to change in a
                 transaction-oriented system.",
  acknowledgement = ack-nhfb,
  classification = "911; 912; 913",
  journalabr =   "IBM Syst J",
  keywords =     "inventory control; operations research; production
                 control",
}

@Article{Senko:1973:DSAa,
  author =       "M. E. Senko and E. B. Altman and M. M. Astrahan and P.
                 L. Fehder",
  title =        "Data structures and accessing in data-base systems,
                 Part {I}: Evolution of information systems",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "1",
  pages =        "30--44",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A descriptive analysis of data-base information
                 systems is presented in three parts. Part 1 reviews the
                 evolution of data-base systems to reveal the direction
                 of their growth and applications. Emphasized are the
                 two primary functions of data-base systems: storage and
                 maintenance of structured information; presentation of
                 structured output information. Part 2 discusses the
                 structuring of information, and introduces a new
                 fundamental approach to this structuring. The approach
                 provides a stable information -oriented terminology for
                 relating the conceptual frameworks of existing systems
                 and future systems. Part 3 presents a framework, the
                 Data Independent Accessing Model (DIAM), for describing
                 information and its stored representations. The
                 generality of this framework allows the model to
                 describe most stored representations of existing
                 systems in detail. Over the long term, it can provide a
                 conceptual basis for systematic migration to systems
                 with new improved capabilities. Refs.",
  acknowledgement = ack-nhfb,
  classification = "723; 901",
  journalabr =   "IBM Syst J",
  keywords =     "data processing --- Data Structures; information
                 retrieval systems",
}

@Article{Senko:1973:DSAb,
  author =       "M. E. Senko and E. B. Altman and M. M. Astrahan and P.
                 L. Fehder",
  title =        "Data structures and accessing in data-base systems,
                 Part {II}: Information organization",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "1",
  pages =        "45--63",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Senko:1973:DSAc,
  author =       "M. E. Senko and E. B. Altman and M. M. Astrahan and P.
                 L. Fehder",
  title =        "Data structures and accessing in data-base systems,
                 Part {III}: Data representations and the data
                 independent accessing model",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "1",
  pages =        "64--93",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{McKay:1973:PCN,
  author =       "D. B. McKay and D. P. Karp",
  title =        "Protocol for a Computer Network",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "1",
  pages =        "94--105",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Computing system networks hold promise of increasing
                 system efficiency through the sharing of resources,
                 programs, and files. A protocol is required that
                 performs for the network a function analogous to that
                 performed by control blocks for operating systems.
                 Basic message-handling concepts and a protocol are
                 described that are compatible with a broad range of
                 network designs.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computers",
}

@Article{Anonymous:1973:Af,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "1",
  pages =        "106--107",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1973:Aa,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "1",
  pages =        "108--109",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1973:AGM,
  author =       "Anonymous",
  title =        "Addendum: ``{A} general management business simulation
                 in {APL}''",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "1",
  pages =        "109--109",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Wahi:1972:GMB}.",
  acknowledgement = ack-nhfb,
}

@Article{Kingston:1973:CFM,
  author =       "P. L. Kingston",
  title =        "Concepts of financial models",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "2",
  pages =        "113--125",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Dzielinski:1973:GFP,
  author =       "B. P. Dzielinski",
  title =        "A guide to financial planning tools and techniques",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "2",
  pages =        "126--144",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lande:1973:PS,
  author =       "H. F. Lande",
  title =        "Planning-data systems",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "2",
  pages =        "145--160",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gordon:1973:FMS,
  author =       "R. J. Gordon",
  title =        "Financial modeling on small systems",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "2",
  pages =        "161--171",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Brown:1973:ISB,
  author =       "J. F. Brown and D. W. Low",
  title =        "Interactive simulation for banking",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "2",
  pages =        "172--186",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Aiso:1973:FT,
  author =       "M. Aiso",
  title =        "Forecasting techniques",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "2",
  pages =        "187--209",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1973:Ag,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "2",
  pages =        "210--211",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1973:Ab,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "2",
  pages =        "212--214",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Morrison:1973:UPP,
  author =       "J. E. Morrison",
  title =        "User Program Performance in Virtual Storage Systems",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "3",
  pages =        "216--237",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Factors that affect the paging characteristics of user
                 programs in virtual storage systems are presented in
                 tutorial form. Measures are suggested that can be taken
                 to exploit the virtual storage concept at the source
                 language level in assembler. COBOL, FORTRAN, and
                 PL/I.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer metatheory --- Programming Theory; computer
                 systems programming; virtual storage systems",
}

@Article{Ravin:1973:IGS,
  author =       "J. Ravin and M. Schatzoff",
  title =        "An Interactive Graphics System for Analysis of
                 Business Decisions",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "3",
  pages =        "238--256",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An experimental system is described that enables the
                 user, through an intelligent graphics terminal, to
                 construct, modify, analyze, and store decision trees.
                 With this system, business decisions under uncertainty
                 can be analyzed. This paper discusses the system and
                 its capabilities. A brief discussion of decision
                 analysis is included, which represents an aspect of
                 financial modeling. A detailed description of the
                 system command structure is appended.",
  acknowledgement = ack-nhfb,
  classification = "723; 922",
  journalabr =   "IBM Syst J",
  keywords =     "computer graphics; computer programming; decision
                 theory and analysis",
}

@Article{Fredericksen:1973:DDC,
  author =       "D. H. Fredericksen",
  title =        "Describing Data in Computer Networks",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "3",
  pages =        "257--282",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Three major classes of data descriptor messages are
                 discussed (for language processors, for input\slash
                 output devices, and for resource allocation) that are
                 required by computer networks where the details depend
                 on the variety of systems in a network and on file
                 complexity. Three classes of networks, namely remote
                 job entry networks with compatible operating systems
                 and computers, networks for transmitting arbitrary data
                 sets between systems that have the same internal data
                 representation but different hardware and operating
                 systems, and networks for transmitting arbitrary data
                 sets between arbitrary systems are also discussed.
                 Requirements for the three classes of networks are
                 compared. Further details of networks of systems with
                 the same internal structures but different hardware and
                 operating systems are given.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems programming",
}

@Article{Streeter:1973:CDC,
  author =       "D. N. Streeter",
  title =        "Centralization or Dispersion of Computing Facilities",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "3",
  pages =        "283--301",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Cost factors involved in computing centers that tend
                 to motivate the centralization as opposed to the
                 decentralization of computing services are evaluated,
                 and a cost-minimization solution is presented. A
                 strategy is proposed and evaluated for linking large
                 regional service centers that perform standard
                 production services with satellite centers that perform
                 local personalized services. Techniques, including user
                 waiting, for evaluating the two characteristic service
                 types are emphasized.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data processing",
}

@Article{Bard:1973:EES,
  author =       "Y. Bard",
  title =        "Experimental Evaluation of System Performance",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "3",
  pages =        "302--314",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The performance of different features of system
                 software can be compared efficiently by means of rapid,
                 on-line switching between the versions. This technique
                 of on-line switching has been applied to determine the
                 effects of page replacement algorithm, time-slice
                 length, and user priority setting in the CP-67
                 time-sharing system.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer architecture; computer systems, digital",
}

@Article{Marks:1973:DCC,
  author =       "B. L. Marks",
  title =        "Design of a Checkout Compiler",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "3",
  pages =        "315--326",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The PL/I Checkout Compiler was designed to emphasize
                 programmer productivity in developing programs, even at
                 the expense of consuming extra machine resources. The
                 choices in the design of the compiler that resulted
                 from this emphasis are explained. The design is
                 constrained by the requirement that a subroutine
                 developed using this checkout compiler should be
                 capable of executing in conjunction with code generated
                 by a more conventional compiler. The execution
                 environment that supports this operation is
                 described.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems",
}

@Article{Anonymous:1973:Ac,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "3",
  pages =        "328--329",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1973:Ad,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "3",
  pages =        "330--330",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Uhrowczik:1973:DD,
  author =       "P. P. Uhrowczik",
  title =        "{Data Dictionary\slash Directories}",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "4",
  pages =        "332--350",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A Data Dictionary\slash Directory (DD/D) is described,
                 which provides a method of centralized control over
                 data management. It is a centralized repository of
                 information about data descriptions such as meaning,
                 relationships to other data, responsibility, origin,
                 usage, and format. This paper presents introductory
                 concepts of data dictionaries, their capabilities, and
                 an example implementation approach.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data processing",
}

@Article{Wagner:1973:IDC,
  author =       "R. E. Wagner",
  title =        "Indexing Design Considerations",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "4",
  pages =        "351--367",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See errata \cite{Anonymous:1974:E}.",
  abstract =     "This paper deals with the structure and use of indexes
                 that facilitate the retrieval and storage of records
                 based on a specific value, value range, or value
                 sequence of a given field of a record within one or
                 more data sets. Specifically, it examines general index
                 structures, maintenance, index entry compression, and
                 complex indexes as considered in the basic design of
                 VSA(Virtual Storage Access Methods). Under complex
                 indexes, indirect secondary indexes and indexes to
                 multiple data sets are considered.",
  acknowledgement = ack-nhfb,
  classification = "723; 901",
  journalabr =   "IBM Syst J",
  keywords =     "information retrieval systems",
}

@Article{Auslander:1973:FSI,
  author =       "M. A. Auslander and J. F. Jaffe",
  title =        "Function Structure of {IBM Virtual Storage Operating
                 Systems} --- 1 Influences of Dynamic Address
                 Translation on Operating System Technology",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "4",
  pages =        "368--381",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Early developments of storage management techniques
                 are presented, particularly those used in OS\slash 360.
                 Innovations introduced by systems that use dynamic
                 address translation are traced. The impact of these
                 techniques on current IBM System 370 Operating Systems
                 is described.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems; virtual storage systems",
}

@Article{Scherr:1973:FSI,
  author =       "A. L. Scherr",
  title =        "Functional Structure of {IBM Virtual Storage Operating
                 Systems} --- 2 {OS\slash VS2-2} Concepts and
                 Philosophies",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "4",
  pages =        "382--400",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The largest IBM programming effort since the
                 introduction of OS\slash 360, the virtual storage
                 operating system OS\slash VS2-2 has been designed to
                 integrate efficient support for interactive, data base,
                 and data communications applications. Discussed from
                 the point of view of its designers are tradeoffs,
                 options, and objectives of the architectural features
                 related to system parallelism, main storage
                 exploitation, system resource allocation, and system
                 recovery.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer architecture; computer operating systems",
}

@Article{Birch:1973:FSI,
  author =       "J. P. Birch",
  title =        "Functional Structure of {IBM Virtual Storage Operating
                 Systems} --- 3 Architecture and Design of {DOS\slash
                 VS}",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "4",
  pages =        "401--411",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An addressing space larger than main storage, as found
                 in System\slash 370 with virtual storage, challenges
                 the operating system architect to design a disk
                 operating (DOS\slash VS) for superior program execution
                 performance. Compared are the bases for program
                 execution by DOS\slash VS with those of the earlier
                 Disk Operating System. Increased system versatility is
                 presented in terms of storage management, channel
                 management, and program management.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer architecture; computer operating systems",
}

@Article{Anonymous:1973:Ah,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "4",
  pages =        "412--413",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1973:Ae,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "4",
  pages =        "414--415",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1973:C,
  author =       "Anonymous",
  title =        "Contents: 1973",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "4",
  pages =        "416--416",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1973:FAI,
  author =       "Anonymous",
  title =        "Five-year author index",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "4",
  pages =        "417--419",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1973:FSI,
  author =       "Anonymous",
  title =        "Five-year subject index",
  journal =      j-IBM-SYS-J,
  volume =       "12",
  number =       "4",
  pages =        "420--423",
  year =         "1973",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Boies:1974:UBI,
  author =       "S. J. Boies",
  title =        "User Behavior on an Interactive Computer System",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "1",
  pages =        "2--18",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper summarizes one aspect of an ongoing project
                 at the IBM T. J. Watson Research Center. The project
                 has as its goal a basic understanding of the behavioral
                 factors that limit and determine human performance in
                 interactive computer systems. Reported here is an
                 observational analysis of user interaction with a
                 complex interactive system, the IBM System\slash 360
                 Time Sharing System (TSS\slash 360). The paper is
                 divided into two sections. The first provides a brief
                 description of TSS\slash 360 and the method used in
                 this study. The balance of the paper reviews our
                 results relative to user behavior. Among the issues
                 discussed are the following: the duration and frequency
                 of terminal sessions; the use of language processors;
                 command usage; and user response time and its
                 determinants.",
  acknowledgement = ack-nhfb,
  annote =       "Discussed are observations on the usage of an
                 interactive computing system in a research environment.
                 Empirical data on the user behavior are discussed that
                 concern the duration and frequency of terminal
                 sessions,the use of language processors, user response
                 time, and command usage. Conclusions are (1) a large
                 number of users know and use only a few commands, or
                 the simplest form of the commands, (2) there were many
                 cases in which a user would issue a REDIT command while
                 operating in the TSS/360 state, or issue a TSS/360
                 command while operating in the REDIT state, (3) the
                 high usage of text-editing commands suggests the
                 importance of having a smoothly working text editor on
                 any general purpose interactive system, and (4) users
                 seldom need the interactive error correction features
                 of language processors (FORTRAN and Assembler
                 Language).",
  classification = "461; 723; 912",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems programming; systems science and
                 cybernetics --- Man Machine Systems",
}

@Article{Nahouraii:1974:DDS,
  author =       "E. Nahouraii",
  title =        "Direct-Access Device Simulation",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "1",
  pages =        "19--31",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An approach to simulating direct-access devices is
                 discussed. An experimental simulator provides the
                 capability to test newly developed I/O supervisors and
                 to test code for new or proposed devices without the
                 benefit of the actual device. This functional simulator
                 performs all of the search, data-movement, and
                 status-reporting functions of the device transparently
                 to the user. Data-driven (table) techniques enable the
                 user to simulate a number of direct-access devices (one
                 at a time) and measure their would-be performance.
                 Interactive options of the simulator enable the user to
                 check for errors and test the various error routines.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems programming; direct access
                 simulation",
}

@Article{MacKinnon:1974:AFE,
  author =       "R. A. MacKinnon",
  title =        "Advanced Function Extended with Tightly-Coupled
                 Multiprocessing",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "1",
  pages =        "32--59",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper describes hardware extensions to
                 System\slash 370 to provide multiprocessing. While the
                 emphasis is upon tightly-coupled implementation through
                 MP hardware and OS\slash VS2 Release 2, the
                 characteristics of loosely-coupled systems have been
                 sketched out for contrast. The comparison of IBM
                 multiprocessors has been included to provide a
                 rationale for the evolution of System\slash 370
                 multiprocessing architecture with significant
                 differences from and improvements upon prior
                 System\slash 360 implementation.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems programming; computers",
}

@Article{Arnold:1974:DTM,
  author =       "J. S. Arnold and D. P. Casey and R. H. McKinstry",
  title =        "Design of Tightly-Coupled Multiprocessing
                 Programming",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "1",
  pages =        "60--87",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Programming support of tightly-coupled multiprocessing
                 hardware is discussed, particularly the OS\slash VS2
                 Release 2 components: locking, service management, CPU
                 affinity, dispatching, and alternate CPU recovery.
                 These facilities improve the control program
                 utilization of the two-CPU environment in that it can
                 now run parallel disable functions. Also, spin time on
                 locks is reduced, and the new dispatchable unit allows
                 more parallelism in new system functions. Furthermore,
                 the system is able to recover from the loss of one of
                 the two CPUs.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems --- Program Processors;
                 computer systems programming",
}

@Article{Anonymous:1974:Ae,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "1",
  pages =        "88--89",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1974:Aa,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "1",
  pages =        "90--92",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Mancini:1974:PAS,
  author =       "R. J. Mancini",
  title =        "Performance Analysis for the {Skylab} Terminal
                 System",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "2",
  pages =        "94--114",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "System performance analysis techniques have been
                 applied to support the development of a
                 data-communication, data-base system. These techniques
                 have been applied continuously from the system planning
                 phase through system testing. Computer simulative
                 models and computer measurement tools were used in this
                 analysis. The preventive nature of performance analysis
                 often makes it difficult to assign actual cost savings
                 for performance problems that are avoided. This paper
                 has tried, through an illustrative system development
                 example, to show how one can improve the visibility and
                 control of a system development effort by applying
                 performance evaluation and analysis. Experience with
                 the Skylab Terminal System shows that system developers
                 can depend on predictive techniques and the kind of
                 analyses described to guide complex system development
                 efforts.",
  acknowledgement = ack-nhfb,
  classification = "655; 722",
  journalabr =   "IBM Syst J",
  keywords =     "satellites; Skylab",
}

@Article{Stevens:1974:SD,
  author =       "W. P. Stevens and G. J. Myers and L. L. Constantine",
  title =        "Structured Design",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "2",
  pages =        "115--139",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Considerations and techniques are proposed that reduce
                 the complexity of programs by dividing them into
                 functional modules. This can make it possible to create
                 complex systems from simple, independent, reusable
                 modules. Debugging and modifying programs,
                 reconfiguring I/O devices, and managing large
                 programming projects can all be greatly simplified.
                 And, as the module library grows, increasingly
                 sophisticated programs can be implemented using less
                 and less new code.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming",
}

@Article{Donnan:1974:SDL,
  author =       "R. A. Donnan and J. R. Kersey",
  title =        "Synchronous data link control: a perspective",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "2",
  pages =        "140--162",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Data link control requirements are discussed and
                 summarized. A generalized structure for a data link
                 control capable of meeting those requirements is
                 presented. Synchronous data link control (SDLC) is
                 given as a solution, evolving from the generalized
                 structure, to meet the requirements stated. Finally,
                 the significant attributes of SDLC are discussed and
                 summarized.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data processing",
}

@Article{Gecsei:1974:MES,
  author =       "J. Gecsei and J. A. Lukes",
  title =        "A Model for the Evaluation of Storage Hierarchies",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "2",
  pages =        "163--178",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A method is presented for quickly assessing many of
                 the technological and structural possibilities that
                 exist today for designing storage hierarchies. The
                 evaluation is based on a cycling queueing model of the
                 computer system and its programming environment, which
                 are taken into account by miss ratio curves.",
  acknowledgement = ack-nhfb,
  classification = "731",
  journalabr =   "IBM Syst J",
  keywords =     "information theory; queueing",
}

@Article{Anonymous:1974:Af,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "2",
  pages =        "179--180",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1974:Ab,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "2",
  pages =        "181--182",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1974:E,
  author =       "Anonymous",
  title =        "Errata: ``{Indexing} design considerations''",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "2",
  pages =        "183--183",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Wagner:1973:IDC}.",
  acknowledgement = ack-nhfb,
}

@Article{Keehn:1974:VDS,
  author =       "Daniel G. Keehn and John O. Lacy",
  title =        "{VSAM} Data Set Design Parameters",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "3",
  pages =        "186--212",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See correction \cite{Anonymous:1974:CDS} and errata
                 \cite{Anonymous:1974:EDS}.",
  abstract =     "A general description of the Virtual Storage Access
                 Method (VSAM) is followed by a qualitative discussion
                 of performance expectations. VSAM data-set design
                 parameters are discussed with respect to performance
                 tradeoffs. Analytic techniques are developed for
                 relating some of the VSAM performance sensitivities to
                 data set design parameters.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems; data processing",
}

@Article{Wheeler:1974:OCP,
  author =       "Thomas F. {Wheeler, Jr.}",
  title =        "{OS\slash VS1} Concepts and Philosophies",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "3",
  pages =        "213--229",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Dynamic address translation equipment is key to the
                 design of System\slash 370 central processing units,
                 and dynamic relocation is key to the design of
                 Operating System\slash Virtual Storage 1. Discussed are
                 the significance and implementation of these key
                 facilities in the supervisor and job scheduler
                 functions of virtual storage operating system. Within
                 the supervisor are presented system initiation, page
                 management, input\slash output supervisor, and storage
                 management. Within the job scheduler are discussed
                 queue management, the job entry subsystems, and remote
                 job entry services.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems",
}

@Article{McPhee:1974:OSI,
  author =       "William S. McPhee",
  title =        "Operating System Integrity in {OS\slash VS2}",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "3",
  pages =        "230--252",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "System integrity is a major step in the direction of
                 increased operating system security capability. This
                 paper provides an explanation of the system integrity
                 problem and how it relates to security. The general
                 classes of integrity problems\slash solutions are
                 discussed, and primary techniques used in VS2 Release 2
                 to correct or avoid integrity ``exposures'' are
                 presented. User procedural requirements necessary to
                 maintain system integrity, and the impact of system
                 integrity support on the overall system are also
                 addressed.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems",
}

@Article{Baily:1974:JES,
  author =       "James H. Baily and John A. Howard and Thomas J.
                 Szczygielski",
  title =        "The Job Entry Subsystem of {OS\slash VS1}",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "3",
  pages =        "253--269",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An extended facility of job management is discussed of
                 OS\slash VS1 (Operating System\slash Virtual Storage
                 1). Discussed is an extended facility of job management
                 for OS\slash VS1. This facility provides spooling and
                 scheduling in a virtual storage system. Its three major
                 components are peripheral services, central services,
                 and queue management. The paper outlines the input
                 required by the subsystem and discusses the general
                 functions of the subcomponents of JES1 (Job Entry
                 Subsystem 1) including, when appropriate, how the
                 functions were accomplished.",
  acknowledgement = ack-nhfb,
  classification = "713",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems",
}

@Article{Anonymous:1974:Ag,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "3",
  pages =        "270--270",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1974:Ac,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "3",
  pages =        "271--272",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lynch:1974:ORS,
  author =       "H. W. Lynch and J. B. Page",
  title =        "The {OS\slash VS2 Release 2 System Resources
                 Manager}",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "4",
  pages =        "274--291",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A new subcomponent is discussed of the control program
                 of the IBM OS\slash VS2 Release 2 operating system that
                 has been designed to use the resources of the system to
                 satisfy two distinct but potentially conflicting
                 performance objectives, i.e. response and throughput.
                 Termed the System Resources Manager, the subcomponent
                 controls performance by address space swapping through
                 the use of a swapping analysis algorithm and a workload
                 management algorithm.",
  acknowledgement = ack-nhfb,
  classification = "731",
  journalabr =   "IBM Syst J",
  keywords =     "control systems",
}

@Article{Ryder:1974:OPR,
  author =       "K. D. Ryder",
  title =        "Optimizing Program Replacement in Virtual Systems",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "4",
  pages =        "292--306",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An experimental algorithm for optimizing program
                 placement in virtual storage systems is described.
                 Interprogram linkages are monitored and subsequently
                 analyzed for frequency and proximity. The algorithm
                 evaluates this information within the context of a
                 paging environment. Programs lists that define the
                 optimum program placements are then generated.
                 Performance gains are also discussed.",
  acknowledgement = ack-nhfb,
  classification = "731",
  journalabr =   "IBM Syst J",
  keywords =     "control systems, optimal",
}

@Article{Cole:1974:SHL,
  author =       "H. Cole",
  title =        "{System/7} in a Hierarchical Laboratory Automation
                 System",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "4",
  pages =        "307--324",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An implementation of a three-level computer hierarchy
                 that provides a high degree of performance,
                 availability, and ease of use for laboratory automation
                 applications is described.",
  acknowledgement = ack-nhfb,
  classification = "732; 801; 802",
  journalabr =   "IBM Syst J",
  keywords =     "chemical laboratories; control, chemical variables",
}

@Article{Allen:1974:EPS,
  author =       "A. O. Allen",
  title =        "Elements of Probability for System Design",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "4",
  pages =        "325--348",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  MRclass =      "60K30",
  MRnumber =     "54 #14162",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Basic notions of probability theory are applied to
                 problems of performance of on-line real-time systems.
                 Frequently used is APL as both an analytical and as a
                 scratch pad in working out the examples.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems programming",
  reviewer =     "Erol Gelenbe",
}

@Article{Anonymous:1974:Ah,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "4",
  pages =        "349--349",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1974:Ad,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "4",
  pages =        "350--351",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1974:CDS,
  author =       "Anonymous",
  title =        "Correction: ``{VSAM} data set design parameters''",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "4",
  pages =        "352--352",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Keehn:1974:VDS}.",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1974:EDS,
  author =       "Anonymous",
  title =        "Erratum: ``{VSAM} data set design parameters''",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "4",
  pages =        "352--352",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Keehn:1974:VDS}.",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1974:C,
  author =       "Anonymous",
  title =        "Contents: 1974",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "4",
  pages =        "353--353",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1974:FAI,
  author =       "Anonymous",
  title =        "Five-year author index",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "4",
  pages =        "354--356",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1974:FSI,
  author =       "Anonymous",
  title =        "Five-year subject index",
  journal =      j-IBM-SYS-J,
  volume =       "13",
  number =       "4",
  pages =        "357--360",
  year =         "1974",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{McEnroe:1975:OSS,
  author =       "Paul V. McEnroe and Henry T. {Huth, Jr.} and Eugene A.
                 Moore and Walter W. {Morris, III}",
  title =        "Overview of the {Supermarket System} and the {Retail
                 Store System}",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "1",
  pages =        "3--15",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An introduction to the concepts of the Supermarket and
                 Retail Store Systems is presented. Discussed are the
                 objectives of the systems as they relate to the
                 problems of the merchandiser and the solution to those
                 problems in terms of specific system function and the
                 structure chosen to implement that function. The system
                 design philosophy pertaining to the terminals, store
                 controllers, host processors, and specialized I/O
                 devices is also discussed. Specific requirements of
                 each system are described.",
  acknowledgement = ack-nhfb,
  classification = "723; 911",
  journalabr =   "IBM Syst J",
  keywords =     "data processing, business --- Data Acquisition;
                 marketing",
}

@Article{Savir:1975:CDU,
  author =       "David Savir and George J. Laurer",
  title =        "The Characteristics and Decodability of the {Universal
                 Product Code} Symbol",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "1",
  pages =        "16--34",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The coding and symbol of the Universal Product Code
                 are described. The symbol code structure, format,
                 encodation technique, and characteristics with their
                 technical tradeoffs are discussed. The symbol is
                 analyzed and evaluated. Decodability is shown to depend
                 on the structure of the code and symbol, the size of
                 the symbol, the precision with which the symbol is
                 printed, the technique of scanning employed, the
                 accuracy with which measurements are made, the decoding
                 logic, and the physical operation of scanning. The
                 relationship between the scan pattern of a fixed head
                 scanner and symbol size is shown.",
  acknowledgement = ack-nhfb,
  classification = "723; 745; 822; 911",
  journalabr =   "IBM Syst J",
  keywords =     "codes, symbolic; food products --- Marketing; printing
                 --- Quality Control; universal product code",
}

@Article{Antonelli:1975:ROS,
  author =       "Douglas C. Antonelli",
  title =        "The Role of the Operator in the {Supermarket and
                 Retail Store Systems}",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "1",
  pages =        "35--45",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Some aspects of the role of the operator in the
                 Supermarket and Retail Store Systems are presented,
                 specifically with respect to the input of data to the
                 system. Major differences between the data input
                 requirements of a system for a supermarket and a system
                 for a retail store include the volume of data and the
                 rate of entry. These are discussed in terms of the
                 system requirements and the alternative methods of
                 implementation. Studies of wand entry for the Retail
                 Store System and fixed optical scanning for the
                 Supermarket System are also discussed.",
  acknowledgement = ack-nhfb,
  classification = "723; 911",
  journalabr =   "IBM Syst J",
  keywords =     "codes, symbolic --- Decoding; data processing,
                 business --- Data Acquisition; marketing",
}

@Article{Metz:1975:SPS,
  author =       "Walter C. {Metz, Jr.} and David Savir",
  title =        "Store performance studies for the {Supermarket
                 System}",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "1",
  pages =        "46--63",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Performance of the Supermarket System is measured by
                 throughput of the shoppers and the response time of the
                 system to messages generated during checkout. This
                 paper discusses some system design features adopted for
                 the purpose of meeting a performance objective and two
                 models developed for analyzing the throughput capacity
                 of the system.",
  acknowledgement = ack-nhfb,
  classification = "723; 911; 922",
  journalabr =   "IBM Syst J",
  keywords =     "data processing, business --- Data Acquisition;
                 marketing; probability --- Queueing Theory",
}

@Article{Berk:1975:DPC,
  author =       "Murray A. Berk and Curtis W. Dunbar and G. Carder
                 Hobson",
  title =        "Design and performance considerations for the {Retail
                 Store System}",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "1",
  pages =        "64--80",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The transactions in a retail system are a
                 comprehensive set of store applications. These
                 applications include point-of-sale operations and
                 back-room activities. Store performance is described by
                 the throughput rate of transactions and the delay in
                 the processing of any particular transaction. Two
                 techniques of performance analysis are discussed:
                 analytic evaluation and store simulation. An important
                 consideration is the annual operating cycle of the
                 store that indicates the amount and types of demands on
                 the system.",
  acknowledgement = ack-nhfb,
  classification = "723; 911",
  journalabr =   "IBM Syst J",
  keywords =     "data processing, business --- File Organization;
                 marketing",
}

@Article{Hippert:1975:RAS,
  author =       "Richard O. {Hippert, Jr.} and Lubos R. Palounek and
                 John Provetero and Ralph O. Skatrud",
  title =        "Reliability, availability, and serviceability design
                 considerations for the {Supermarket} and {Retail Store
                 Systems}",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "1",
  pages =        "81--95",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper discusses system considerations of error
                 recovery, prevention of data loss, and protection
                 against loss of function. Back-up techniques, problem
                 determination procedures, maintenance procedures, and
                 system features provided to facilitate their respective
                 uses are discussed. Avoidance of the interruption of
                 store operation is emphasized.",
  acknowledgement = ack-nhfb,
  classification = "723; 911; 913; 922",
  journalabr =   "IBM Syst J",
  keywords =     "data processing, business; marketing",
}

@Article{Anonymous:1975:Af,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "1",
  pages =        "96--97",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1975:Aa,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "1",
  pages =        "98--100",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hagamen:1975:PG,
  author =       "Wilbur D. Hagamen and D. J. Linden and K. F. Mai and
                 S. M. Newell and J. C. Weber",
  title =        "A Program Generator",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "2",
  pages =        "102--133",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A person-to-computer communication system for
                 application program writing by nonprogrammers is
                 discussed. Called A Program Generator (APG), the
                 interface system is built upon the authors' previous
                 developments of a tutorial system that is briefly
                 discussed. Principles and applications of APG are
                 presented and illustrated in terms of actual
                 applications.",
  acknowledgement = ack-nhfb,
  classification = "461; 462; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems programming; data processing ---
                 Hospital Applications; systems science and cybernetics
                 --- Man Machine Systems",
}

@Article{Callaway:1975:PMT,
  author =       "Peter H. Callaway",
  title =        "Performance Measurement Tools for {VM\slash 370}",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "2",
  pages =        "134--160",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "To support the smooth running of a Virtual Machine
                 Facility\slash 370 (VM\slash 370) installation,
                 performance measurements of various types are
                 desirable. This paper describes a range of measurement
                 facilities that have been developed for VM\slash 370
                 for use both on-line and off-line at the level of the
                 users (general user, operator, and system analyst) and
                 the installation management.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems",
}

@Article{Allen:1975:EQT,
  author =       "Arnold O. Allen",
  title =        "Elements of Queuing Theory for System Design",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "2",
  pages =        "161--187",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  MRclass =      "60K25",
  MRnumber =     "54 #14144",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See erratum \cite{Anonymous:1975:EQT}.",
  abstract =     "Reviewed are fundamental principles of queueing in
                 terms that apply to computing systems. After laying a
                 foundation of a minimum number of definitions, the
                 author provides a working familiarity with extended
                 principles and applications to system performance
                 estimation through the use of worked out examples.",
  acknowledgement = ack-nhfb,
  classification = "722; 922",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems programming --- Time Sharing
                 Programs; computer systems, digital --- Real Time
                 Operation; probability",
  reviewer =     "Erol Gelenbe",
}

@Article{Donovan:1975:HAC,
  author =       "John J. Donovan and S. E. Madnick",
  title =        "Hierarchical Approach to Computer System Integrity",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "2",
  pages =        "188--202",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See letters
                 \cite{Chandersekaran:1976:FVM,Donovan:1976:FAR}.",
  abstract =     "Security is an important factor if the programs of
                 independent and possibly error-prone or malicious users
                 are to coexist on the same computer system. In this
                 paper, it is shown that a hierarchically structured
                 operating system, such as produced by a virtual machine
                 system, that combines a virtual machine monitor with
                 several independent operating systems (VMM\slash OS),
                 provides substantially better software security than a
                 conventional two-level multiprogramming operating
                 system approach. This added protection is derived from
                 redundant security using independent mechanisms that
                 are inherent in the design of most VMM\slash OS
                 systems. Such a system can be obtained by exploiting
                 existing software resources.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems; computer systems
                 programming --- Time Sharing Programs",
}

@Article{Anonymous:1975:Ag,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "2",
  pages =        "203--204",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1975:Ab,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "2",
  pages =        "205--207",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1975:EQT,
  author =       "Anonymous",
  title =        "Erratum: ``{Elements} of queuing theory for system
                 design''",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "2",
  pages =        "208--208",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Allen:1975:EQT}.",
  acknowledgement = ack-nhfb,
}

@Article{Gladney:1975:ACM,
  author =       "Henry M. Gladney and Eldon L. Worley and James J.
                 Myers",
  title =        "An Access Control Mechanism for Computing Resources",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "3",
  pages =        "212--228",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The architecture of an access control mechanism for
                 the resources of an OS\slash 360 or VS\slash 370
                 computer system is presented. The use of this operating
                 system component for data base security and integrity
                 in a research and engineering environment is described.
                 The techniques described make possible controlled
                 access to the system's processing power, controlled
                 access to the database, decentralized authorization
                 responsibility, measuring dataset usage, and event
                 recording for automatic dataset migration, archiving,
                 and staging.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems; data processing ---
                 Security of Data",
}

@Article{Bjork:1975:GAT,
  author =       "Lawrence A. {Bjork, Jr.}",
  title =        "Generalized Audit Trail Requirements and Concepts for
                 Data Base Applications",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "3",
  pages =        "229--245",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Discussed is a data base audit trail. It is defined to
                 be a generalized recording of ``who did what to whom,
                 when, and in what sequence.'' This information is to be
                 used to satisfy system integrity, recovery, auditing,
                 and security requirements of advanced integrated data
                 base\slash data communications systems. This paper
                 hypothesizes what information must be retained in the
                 audit trail to permit recovery and audit later in time
                 and a scheme of organizing the contents of the audit
                 trail so as to provide the required functions at
                 minimum overhead.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems; computer systems
                 programming --- Supervisory and Executive Programs;
                 computers --- Data Communication Systems; data
                 processing --- Security of Data",
}

@Article{Anderson:1975:TVS,
  author =       "Harold A. {Anderson, Jr.} and Martin Reiser and George
                 L. Galati",
  title =        "Tuning a Virtual Storage System",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "3",
  pages =        "246--263",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A methodology for performance-tuning a virtual storage
                 system is discussed. This methodology encompasses
                 performance measurement, workload characterization,
                 performance evaluation, and planned experimentation.
                 Use of the methodology is illustrated by describing the
                 results of a case study involving the IBM Research
                 Division's TSS\slash 360 system.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems; computers --- Selection
                 and Evaluation",
}

@Article{Laird:1975:PPE,
  author =       "Jack A. Laird",
  title =        "Power Profile --- an Installation Management Tool",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "3",
  pages =        "264--271",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A method is described which is used to estimate the
                 electrical power required for a computer system and the
                 heat generated by it. The method is a program that
                 serves as an installation planning tool accessed
                 principally by installation planning representatives
                 through communication terminals.",
  acknowledgement = ack-nhfb,
  classification = "706; 722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computers",
}

@Article{Ghanem:1975:CCO,
  author =       "Sawsan B. Ghanem",
  title =        "Computing Center Optimization by a Pricing-Priority
                 Policy",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "3",
  pages =        "272--291",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  MRclass =      "90B35 (60K25)",
  MRnumber =     "52 #2565",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Included in the user's price-priority decision is his
                 cost of delay. Briefly discussed for the general case,
                 and shown in detail for the two-queue case, is the
                 principle that the total cost to users of the computing
                 service is minimized in a computing installation that
                 has a price-priority service policy.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computers",
  reviewer =     "John C. Gittins",
}

@Article{Streeter:1975:PCW,
  author =       "Donald N. Streeter",
  title =        "Productivity of Computer-Dependent Workers",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "3",
  pages =        "292--305",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Beginning with a description of various degrees of
                 computer dependency among workers, a model of the
                 worker-computer process is constructed. The model
                 demonstrates the characteristic forms of functional
                 dependencies and suggests ways in which these
                 dependencies can be evaluated. Key among the many
                 considerations discussed are such process
                 characteristics as system congestion, needs and habits
                 of users, and relative costs.",
  acknowledgement = ack-nhfb,
  classification = "723; 911; 912",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems --- Costs; computers",
}

@Article{Anonymous:1975:Ac,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "3",
  pages =        "306--307",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1975:Ad,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "3",
  pages =        "308--309",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1975:IR,
  author =       "Anonymous",
  title =        "Information on reprints",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "3",
  pages =        "310--310",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{McQuilken:1975:P,
  author =       "George McQuilken",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "4",
  pages =        "313--313",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gladney:1975:CIA,
  author =       "Henry M. Gladney and Dion L. Johnson and Richard L.
                 Stone",
  title =        "Computer Installation Accounting",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "4",
  pages =        "314--339",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper examines the function and design of an
                 accounting program package for a medium to large
                 computer installation. A specific implementation is
                 used to illustrate key points.",
  acknowledgement = ack-nhfb,
  classification = "722; 911",
  journalabr =   "IBM Syst J",
  keywords =     "computers",
}

@Article{Friedman:1975:ESC,
  author =       "Herman P. Friedman and Gerald Waldbaum",
  title =        "Evaluating System Changes Under Uncontrolled
                 Workloads: a Case Study",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "4",
  pages =        "340--352",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "When a change to a computer system is evaluated under
                 workload conditions that are not controlled, it is
                 necessary to estimate to what extent system performance
                 has been affected by the change and to what extent by
                 variations in the workload. This paper describes a
                 regression-analysis method by which such an estimate
                 was made for a particular computer program.",
  acknowledgement = ack-nhfb,
  classification = "723; 911",
  journalabr =   "IBM Syst J",
  keywords =     "computers",
}

@Article{Duke:1975:TCS,
  author =       "Melvin O. Duke",
  title =        "Testing in a Complex Systems Environment",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "4",
  pages =        "353--365",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The testing problems in a complex systems environment
                 are described with categorization by purpose of the
                 tests and objectives to be achieved. The approach to
                 testing and the methodology required to test adequately
                 in the various testing categories are presented. The
                 methodology described, together with appropriate
                 testing tools, can aid users in the migration to new
                 operating systems and new versions of subsystems, as
                 well as to accelerate their own application
                 development.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems; computers",
}

@Article{Bard:1975:PAV,
  author =       "Yonathan Bard",
  title =        "Performance Analysis of Virtual Memory Time-Sharing
                 Systems",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "4",
  pages =        "366--384",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The performance of VM\slash 370 systems is analyzed in
                 relation to the multiprogramming level and the user
                 work load. Saturation conditions are examined, and
                 methods for locating bottlenecks in the CPU, main
                 storage, paging, and I/O subsystems are given. The
                 paper also describes the data requirements, along with
                 techniques for data collection and reduction. The
                 techniques are illustrated with data from an actual
                 case study.",
  acknowledgement = ack-nhfb,
  classification = "723; 911",
  journalabr =   "IBM Syst J",
  keywords =     "computers",
}

@Article{Rogers:1975:SPV,
  author =       "John G. Rogers",
  title =        "Structured Programming for Virtual Storage Systems",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "4",
  pages =        "385--406",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The disciplines of structured programming and
                 programming for virtual storage are examined to show
                 how they affect each other. Considerations and
                 techniques are proposed that, when applied during the
                 process of structured design and coding, produce
                 programs that place fewer demands on the computer
                 storage resources. The techniques are illustrated by
                 example programs.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems --- Storage Allocation;
                 computer programming; structured programming; virtual
                 storage systems",
}

@Article{Anonymous:1975:Ah,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "4",
  pages =        "407--408",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1975:Ae,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "4",
  pages =        "409--410",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1975:C,
  author =       "Anonymous",
  title =        "Contents: 1975",
  journal =      j-IBM-SYS-J,
  volume =       "14",
  number =       "4",
  pages =        "411--411",
  year =         "1975",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{McQuilken:1976:Pa,
  author =       "George McQuilken",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "1",
  pages =        "2--3",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{McFadyen:1976:SNA,
  author =       "John H. McFadyen",
  title =        "{Systems Network Architecture}: An overview",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "1",
  pages =        "4--23",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See erratum \cite{Anonymous:1976:ENA}.",
  abstract =     "A method to unify network operations, known as Systems
                 Network Architecture (SNA), is discussed. SNA increases
                 network flexibility by clearly identifying and
                 separating the functional responsibilities of three
                 major functional layers: transmission management;
                 function management; and application. A key concept of
                 SNA is the structuring of each network node as a set of
                 well-defined layers. SNA defines an orderly flow of
                 information between an application program in a host
                 and either a terminal user or another application
                 program. To facilitate this communication and ease
                 application program development, an SNA network
                 insulates end users from the details of network
                 operation. An end user need only be aware of the
                 protocols and data formats required for interaction
                 with function management in his node. The products
                 developed for use in SNA networks are combinations of
                 hardware and programming whose design is based on the
                 architecture. Using some current implementations as
                 examples, this overview introduces the concepts on
                 which the architecture is based and broadly describes
                 the basic components of the structure.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer architecture; computer networks; computer
                 peripheral equipment",
}

@Article{Cullum:1976:TSS,
  author =       "Phillip G. Cullum",
  title =        "The Transmission Subsystem in {Systems Network
                 Architecture}",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "1",
  pages =        "24--38",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See erratum \cite{Anonymous:1976:ENA}.",
  abstract =     "Systems Network Architecture (SNA) is the set of
                 structural concepts and operational protocols
                 underlying IBM's Advanced Function for Communications
                 and the products supporting it. All functions required
                 to transfer the data from one end user to another are
                 supplied by the communication system components known
                 collectively as the transmission subsystem. These
                 components include data links, cluster controllers,
                 communications controllers, components in individual
                 terminals, and most of the functions in the host access
                 method. The end user specifies what is to be sent and
                 what are the parameters of transmission and is freed
                 from further concern with the details of transmission.
                 This paper examines the structure and the operation of
                 the SNA transmission subsystem, particularly the
                 routing of data through the network.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer peripheral equipment --- Remote Consoles;
                 computers",
}

@Article{Hobgood:1976:RNC,
  author =       "W. Sands Hobgood",
  title =        "The Role of the {Network Control Program} in {Systems
                 Network Architecture}",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "1",
  pages =        "39--52",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The Network Control Program\slash Virtual Storage
                 (NCP\slash VS) is found at the center of the current
                 implementation of the Systems Network Architecture
                 (SNA) communications system. NCP\slash VS resides in
                 the IBM 3704 or 3705 Communications Controller, a
                 machine well-suited to the distributed function
                 capability inherent in SNA. Even before SNA was
                 announced, the NCP had begun to support removal of
                 communications functions from the host (a job-oriented
                 general-purpose computer such as System\slash 370
                 virtual storage. ) On one side, NCP deals through the
                 Virtual Telecommunications Access Method (VTAM) with
                 application programs in the host computer, and on the
                 other side, NCP converses with a multiplicity of SNA
                 components including other network control programs. In
                 this paper, the communications network is examined from
                 the NCP vantage point; accordingly, the view is from
                 the inside looking outward toward the end users of the
                 system.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer architecture; computer systems, digital ---
                 Control Systems; computers",
}

@Article{Albrecht:1976:VTA,
  author =       "Harold R. Albrecht and Keith D. Ryder",
  title =        "The {Virtual Telecommunications Access Method}: a
                 {Systems Network Architecture} perspective",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "1",
  pages =        "53--80",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The Virtual Telecommunications Access Method (VTAM)
                 constitutes the main access method support in IBM's
                 Advanced Function for Communications. The architecture
                 that underlies the Advanced Function for Communications
                 is the Systems Network Architecture (SNA). This paper
                 focuses on the SNA functions implemented by VTAM,
                 discussing the components involved in some detail. Also
                 included is a brief discussion of the historical
                 factors that led to the conception of VTAM.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computers",
}

@Article{Raimondi:1976:LED,
  author =       "Donald L. Raimondi and Henry M. Gladney and Gerd
                 Hochweller and Robert W. Martin and Linda L. Spencer",
  title =        "{Labs/7} --- a Distributed Real-Time Operating
                 System",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "1",
  pages =        "81--101",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A hierarchical distributed real-time computing system,
                 LABS/7, provides facilities for attaching multiple IBM
                 System\slash 7s to a host System\slash 360 or
                 System\slash 370. LABS/7 consists of a multiprogramming
                 and multitasking supervisor for the System/7, a host
                 communication facility that supports multiple satellite
                 System\slash 7s, and a high-level real-time language
                 for user application development. The functional
                 characteristics of the system are reviewed, performance
                 is stated for well-defined situations, and experience
                 with the system is reviewed with reference to some
                 typical applications. LABS/7 is operational in a
                 variety of environments, including research,
                 development, manufacturing, and clinical.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems programming --- Multiprogramming;
                 computer systems, digital; distributed computing
                 systems",
}

@Article{Attanasio:1976:POS,
  author =       "C. Richard Attanasio and Peter W. Markstein and Ray J.
                 Phillips",
  title =        "Penetrating an Operating System: a Study of {VM\slash
                 370} Integrity",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "1",
  pages =        "102--116",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A team of penetrator-analysts was formed to attempt to
                 penetrate VM\slash 370, with the objective of obtaining
                 information to which they were not entitled, such as
                 passwords or data that belonged to other users. Lesser
                 goals were to acquire an unreasonably large share of
                 resources in order to deny service to other users, and
                 to obtain resources but escape accountability. The only
                 tool that was available to the penetration team was a
                 listing of the VM\slash 370 operating system code. The
                 method used in this study comprised the following
                 steps: modeling the system control structure; flaw
                 hypothesis generation; flaw hypothesis confirmation;
                 and flaw generalization. Details of the methodology and
                 results of penetration efforts are discussed.
                 Input\slash output was found to be involved in most of
                 the weaknesses discovered. Relative design simplicity
                 was found to be the source of greatest protection
                 against penetration efforts.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems; data processing",
}

@Article{Anonymous:1976:Ae,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "1",
  pages =        "117--119",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1976:Aa,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "1",
  pages =        "120--120",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{McQuilken:1976:Pb,
  author =       "George McQuilken",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "2",
  pages =        "123--123",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bryant:1976:ELQ,
  author =       "Peter Bryant and Fred W. {Giesin, Jr.} and Roger M.
                 Hayes",
  title =        "Experiments in Line Quality Monitoring",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "2",
  pages =        "124--142",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper describes an experimental line quality
                 monitoring (LQM) system, which has been in regular
                 operation in several IBM locations. The LWM system uses
                 a System/7 to gather information about the analog
                 phenomena that occur on telephone data transmission
                 lines. It gathers the information without taking the
                 lines out of service. Described are the ways in which
                 the information from the LQM system is used in daily
                 operations; for example, in one case, use of the LQM
                 system contributed to an increase in circuit
                 availability from 82 percent to 99 percent over a
                 one-month period.",
  acknowledgement = ack-nhfb,
  classification = "718",
  journalabr =   "IBM Syst J",
  keywords =     "data transmission equipment",
}

@Article{Stay:1976:HIP,
  author =       "James F. Stay",
  title =        "{HIPO} and Integrated Program Design",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "2",
  pages =        "143--154",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Hierarchical functional design, a single method and
                 format that allows an application system to be
                 specified from the highest functional level of a
                 conceptual design to the lowest detailed level in a
                 coded routine, is discussed. This integration of
                 several programming approaches combines structured
                 design, which incorporates techniques for converting a
                 problem description into a modular program structure,
                 and Hierarchy plus Input-Process-Output (HIPO), a
                 method of topdown systems design that was developed
                 originally as a program documentation tool. An accounts
                 payable application illustrates the hierarchical
                 function method.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming; structured programming",
}

@Article{VanLeer:1976:TDU,
  author =       "P. {Van Leer}",
  title =        "Top-Down Development Using a Program Design Language",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "2",
  pages =        "155--170",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A program design language --- a form of pseudocode ---
                 that has been used to organize, teach, document and
                 develop software systems is discussed. Used with other
                 programming technologies such as structured
                 walk-throughs, top-down implementation, and structured
                 programming, program design language has increased
                 programmer productivity. An example of top-down program
                 design illustrates the key steps in using the language:
                 determining the requirements, abstracting the
                 functions, expanding the functions, and verifying the
                 functions. The syntax of the language is described.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming",
}

@Article{Anonymous:1976:Af,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "2",
  pages =        "171--172",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1976:Ab,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "2",
  pages =        "173--173",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1976:ENA,
  author =       "Anonymous",
  title =        "Errata: ``{Systems Network Architecture}: An
                 overview'' and ``{The} transmission subsystem in
                 {Systems Network Architecture}''",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "2",
  pages =        "174--174",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Cullum:1976:TSS,McFadyen:1976:SNA}.",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1976:R,
  author =       "Anonymous",
  title =        "Reprints",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "2",
  pages =        "175--178",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{McQuilken:1976:Pc,
  author =       "George McQuilken",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "3",
  pages =        "180--181",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:49:30 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Fagan:1976:DCI,
  author =       "Michael E. Fagan",
  title =        "Design and Code Inspections to Reduce Errors in
                 Program Development",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "3",
  pages =        "182--211",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Process management in the production of programs
                 through the use of formal inspections of design and
                 code by programming teams is discussed. Inspection
                 participants, roles are defined. The manner in which
                 inspection data is categorized and made suitable for
                 process analysis is an important factor in attaining
                 the improvements. It is shown that by using inspection
                 results, a mechanism for initial error reduction
                 followed by ever-improving error rates can be
                 achieved.",
  acknowledgement = ack-nhfb,
  classification = "723; 912",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming; computer programming languages
                 --- Program Debugging; management; programming teams",
}

@Article{Myers:1976:CDF,
  author =       "Glenford J. Myers",
  title =        "Composite Design Facilities of Six Programming
                 Languages",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "3",
  pages =        "212--224",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Composite design is a program design technology that
                 has the aim of structuring a program into a hierarchy
                 of highly independent modules. Examined are
                 relationships between the methodology of composite
                 design and six widely used programming languages.
                 Strengths and weaknesses of composite design facilities
                 of these languages are discussed. Based on this
                 experience, language facilities for greater use of the
                 potential of composite design are suggested.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming --- Structured Programming;
                 computer programming languages; data processing ---
                 Data Structures",
}

@Article{Belady:1976:MLP,
  author =       "Laszio A. Belady and M. M. Lehman",
  title =        "A Model of Large Program Development",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "3",
  pages =        "225--252",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The development of OS\slash 360 system programming is
                 analyzed in the context of the general effort to
                 further the realization that a program, much as a
                 mathematical theorem, should and can be provable.
                 Statistical models are suggested based on the
                 assumption of programming evolution dynamics.",
  acknowledgement = ack-nhfb,
  classification = "723; 921; 922",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming --- Mathematical Models; computer
                 systems programming; dynamics; os/360; program
                 evolution; statistical methods",
}

@Article{Ashany:1976:DBS,
  author =       "R. Ashany and Michael Adamowicz",
  title =        "Data Base Systems",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "3",
  pages =        "253--263",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Beginning with early data base concepts, this paper
                 cites a selection of key references on hierarchical,
                 network, and relational data bases.",
  acknowledgement = ack-nhfb,
  classification = "723; 901",
  journalabr =   "IBM Syst J",
  keywords =     "data base systems; data processing; information
                 retrieval systems --- Bibliographies",
}

@Article{Chandersekaran:1976:FVM,
  author =       "C. S. Chandersekaran and K. S. Shankar",
  title =        "Forum: On virtual machine integrity",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "3",
  pages =        "264--269",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Donovan:1975:HAC,Donovan:1976:FAR}.",
  acknowledgement = ack-nhfb,
}

@Article{Donovan:1976:FAR,
  author =       "J. J. Donovan and S. E. Madnick",
  title =        "Forum: Authors' reply",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "3",
  pages =        "270--278",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Donovan:1975:HAC,Chandersekaran:1976:FVM}.",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1976:Ag,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "3",
  pages =        "279--279",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1976:Ac,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "3",
  pages =        "280--280",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{McQuilken:1976:Pd,
  author =       "George McQuilken",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "4",
  pages =        "282--284",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Todd:1976:PRT,
  author =       "Stephen J. P. Todd",
  title =        "The {Peterlee Relational Test Vehicle}\emdash a system
                 overview",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "4",
  pages =        "285--308",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A high-level data-base system, the Peterlee Relational
                 Test Vehicle (PRTV), provides flexible, interactive
                 data-base support and functional extensibility. The
                 user sees the system primarily through a programming
                 language called ISBL, which is designed for
                 manipulating bulk data held in relations. PRTV is not a
                 full-fledged data-base system, but rather an evolving
                 prototype which is expected to aid in solving some of
                 the problems that have been encountered in using
                 relational data bases. PRTV embodies research both in
                 data-base language design and in efficient
                 implementation techniques.",
  acknowledgement = ack-nhfb,
  classification = "723; 901",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming languages; data base systems;
                 data processing --- Data Handling; information
                 retrieval systems --- Design; information system base
                 languages; ISBL; Peterlee relational test vehicle",
}

@Article{Reiser:1976:IMC,
  author =       "Martin Reiser",
  title =        "Interactive Modeling of Computer Systems",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "4",
  pages =        "309--327",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The objectives of this paper are to introduce concepts
                 of the theory of queuing networks, to describe an APL
                 program --- called QNET4 --- for the solution of
                 queuing network problems, and to give examples of the
                 analysis of computer systems using the methods of
                 QNET4.",
  acknowledgement = ack-nhfb,
  classification = "723; 922",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital; probability --- Queueing
                 Theory",
}

@Article{Lewis:1976:SLC,
  author =       "Leslie J. Lewis",
  title =        "Service levels: a concept for the user and the
                 computer center",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "4",
  pages =        "328--357",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Service levels represent an important concept that can
                 be applied toward the solution of difficult problems
                 surrounding communications between users and providers
                 of data processing services. In this paper, this
                 concept is described in terms of the architecture,
                 which defines the scope and structure of service
                 information. The paper further translates the
                 architecture into data processing terminology by
                 presenting the data-base structure and data elements
                 related to service levels. The paper also addresses the
                 post-processing of the data base, a step essential to
                 properly communicating service-level information.",
  acknowledgement = ack-nhfb,
  classification = "722; 723; 912",
  journalabr =   "IBM Syst J",
  keywords =     "computer architecture; computer systems, digital ---
                 On Line Operation; data base systems; data processing
                 --- Batch Processing; interactive data processing;
                 management",
}

@Article{Hassitt:1976:AES,
  author =       "A. Hassitt and L. E. Lyon",
  title =        "An {APL} Emulator on {System\slash 370}",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "4",
  pages =        "358--378",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Emulation of an APL machine on a System\slash 370 is
                 exemplified by the APL Assist, a microprogram that
                 enables APL expressions and defined functions to be
                 executed at the hardware level. This paper discusses
                 what the APL Assist does, how it works, and the way it
                 interacts with System\slash 370 software. Execution
                 times for APL programs with and without the Assist are
                 compared.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "APL; computer architecture; computer operating systems
                 --- Program Interpreters; computer programming
                 languages --- Machine Orientation",
}

@Article{Anonymous:1976:Ah,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "4",
  pages =        "379--379",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1976:Ad,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "4",
  pages =        "380--383",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1976:C,
  author =       "Anonymous",
  title =        "Contents: 197",
  journal =      j-IBM-SYS-J,
  volume =       "15",
  number =       "4",
  pages =        "384--384",
  year =         "1976",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{McQuilken:1977:Pa,
  author =       "George McQuilken",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "1",
  pages =        "2--3",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Jones:1977:UDR,
  author =       "Alice U. Jones",
  title =        "A User-Oriented Data-Base Retrieval System",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "1",
  pages =        "4--17",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The Data Base Retrieval System (DBRS) is an
                 experimental, interactive system that provides
                 facilities for using a terminal to maintain information
                 in a data base and to generate reports from it. DBRS is
                 comprised of APL functions, and is designed to be used
                 by people who have little knowledge of APL. Major
                 facilities include: data-base definition; data entry,
                 update, and listing; arithmetic computation; selective
                 retrieval; and formatted report generation. This paper
                 describes DBRS and the rationale for various design
                 decisions and implementation considerations that
                 occurred during its development.",
  acknowledgement = ack-nhfb,
  classification = "723; 901",
  journalabr =   "IBM Syst J",
  keywords =     "APL; computer programming languages --- Procedure
                 Orientation; data base systems --- Design; information
                 retrieval systems",
}

@Article{Alfonseca:1977:AIS,
  author =       "Manuel Alfonseca and Maria L. Tavera and Ramon
                 Casajuana",
  title =        "An {APL} Interpreter and System for a Small Computer",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "1",
  pages =        "18--40",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The design and implementation of an experimental APL
                 system on the small, sensor-based System/7 is
                 described. Emphasis is placed on the solution to the
                 problem of fitting a full APL system into a small
                 computer. The system has been extended through an I/O
                 auxiliary processor to make it possible to use APL in
                 the management and control of the System/7 sensor-based
                 I/O operations.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "APL; computer operating systems; computer programming
                 languages --- Procedure Orientation; computer systems,
                 digital; computers, digital --- Special Purpose
                 Application",
}

@Article{Cole:1977:IRD,
  author =       "Henderson Cole and Anthony A. Guido",
  title =        "The {IBM} 5100 and the {Research Device
                 Coupler}\emdash {A} personal laboratory automation
                 system",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "1",
  pages =        "41--53",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Two experiments exemplify the use of a small
                 laboratory automation system, developed by using the
                 IBM 5100 Portable Computer in conjunction with the
                 Research Device Coupler. The system provides a
                 dedicated, high-level-language computer and a versatile
                 data acquisition and control interface for experiments
                 in which data rates do not exceed 9600 baud. APL and
                 BASIC are supported by the 5100. The RDC described in
                 the paper is a prototype of the IBM 7406 Device
                 Coupler.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer interfaces; computer systems, digital;
                 computers, digital --- Special Purpose Applications",
}

@Article{Walston:1977:MPM,
  author =       "Claude E. Walston and Charles P. Felix",
  title =        "A Method of Programming Measurement and Estimation",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "1",
  pages =        "54--73",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See letters
                 \cite{Halstead:1977:FLC,Walston:1977:FAR}.",
  abstract =     "This paper discusses research into programming
                 measurements, with emphasis on one phase of that
                 research: a search for a method of estimating
                 programming productivity. The method is aimed at
                 measuring the rate of production of lines of code by
                 projects, as influenced by a number of project
                 conditions and requirements.",
  acknowledgement = ack-nhfb,
  classification = "723; 922",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming; statistical methods ---
                 Applications",
}

@Article{Anonymous:1977:Ae,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "1",
  pages =        "74--75",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1977:Aa,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "1",
  pages =        "76--77",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1977:R,
  author =       "Anonymous",
  title =        "Reprints",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "1",
  pages =        "78--80",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{McQuilken:1977:Pb,
  author =       "George McQuilken",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "2",
  pages =        "82--83",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{McGee:1977:IMSa,
  author =       "William C. McGee",
  title =        "The Information Management System {IMS\slash VS}, Part
                 {I}: General Structure and Operation",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "2",
  pages =        "84--95",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The purpose of IMS\slash VS is to facilitate Data
                 Base\slash Data Communication applications. It is
                 primarily a host-language system, providing services
                 through common procedural languages. A generalized
                 query language is also provided, giving the system some
                 self-contained capability. The architecture, goals, and
                 objectives of IMS\slash VS are discussed in the context
                 of a status report on its current capabilities. The
                 discussion is illustrated with the installation at the
                 Automobile Club of Michigan.",
  acknowledgement = ack-nhfb,
  classification = "723; 901",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems programming; computers --- Data
                 Communications Systems; data base systems; IMS/VS;
                 information retrieval systems --- Design",
}

@Article{McGee:1977:IMSb,
  author =       "William C. McGee",
  title =        "The Information Management System {IMS\slash VS}, Part
                 {II}: Data Base Facilities",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "2",
  pages =        "96--122",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "IMS\slash VS provides the following two data structure
                 classes; structures perceived by the installation data
                 administrator (DA), and structures perceived by the
                 application programmer 9ap0, and structures perceived
                 by the application programmer (AP). This article deals
                 with the DA class. Its basic structure type is the
                 segment, a string of bytes. The DA class is basically
                 hierarchically organized but provides a logical
                 relationship facility that voids redundant data storage
                 and permits the representation of many-to-many
                 relations. The DA class also includes primary and
                 secondary index structures. For implementing DA
                 structures, a variety of implementation methods are
                 provided, ranging from sequential storage to storage by
                 randomizing algorithms. Reorganization and recovery
                 facilities are also provided through a number of
                 utility programs.",
  acknowledgement = ack-nhfb,
  classification = "723; 901",
  journalabr =   "IBM Syst J",
  keywords =     "data base systems; data processing --- Data
                 Structures; data storage, digital; IMS/VS; information
                 retrieval systems --- Design",
}

@Article{McGee:1977:IMSc,
  author =       "William C. McGee",
  title =        "The Information Management System {IMS\slash VS}, Part
                 {III}: Batch Processing Facilities",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "2",
  pages =        "123--135",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The Application Programmer (AP) class of structures in
                 IMS\slash VS perceived by the application programmer is
                 discussed. The batch processing facilities of the
                 IMS\slash VS Data Base System permit users to write
                 application programs in COBOL, PL/I, or System\slash
                 370 assembler language; to define these programs to the
                 system; and to execute them through batch executions of
                 the system. Application programs may issue calls to the
                 system to retrieve, modify, add, and delete data base
                 data. Application programs view data bases as sets of
                 hierarchic records, and transformations between this
                 view and the underlying data are carried out
                 automatically.",
  acknowledgement = ack-nhfb,
  classification = "723; 901",
  journalabr =   "IBM Syst J",
  keywords =     "data base systems; data processing --- Batch
                 Processing; IMS/VS; information retrieval systems ---
                 Design",
}

@Article{McGee:1977:IMSd,
  author =       "William C. McGee",
  title =        "The Information Management System {IMS\slash VS}, Part
                 {Iv}: Data Communication Facilities",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "2",
  pages =        "136--147",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The Data Communication facilities of IMS\slash VS are
                 described by first discussing facilities for defining
                 physical and logical networks. This is followed by a
                 description of logical network operation. Finally, the
                 security and editing facilities of the system are
                 discussed as well as facilities for controlling network
                 operations.",
  acknowledgement = ack-nhfb,
  classification = "722; 723; 901",
  journalabr =   "IBM Syst J",
  keywords =     "computers --- Data Communication Systems; data base
                 systems; IMS/VS; information retrieval systems ---
                 Design",
}

@Article{McGee:1977:IMSe,
  author =       "William C. McGee",
  title =        "The Information Management System {IMS\slash VS}, Part
                 {V}: Transaction Processing Facilities",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "2",
  pages =        "148--168",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A transaction is a message that is to be processed by
                 a user-written application program. IMS\slash VS
                 provides two general categories of transactions: Data
                 Communication (DC) transactions, which are processed by
                 facilities in the DC feature; and Fast Path (FP)
                 transactions, which are processed under the FP feature.
                 Transaction processing programs are discussed,
                 including their structure, the system services
                 available to them, and their definition to IMS\slash
                 VS. The scheduling of transaction processing programs
                 is then described. The article concludes with a
                 discussion of on-line executions and system monitoring
                 facilities.",
  acknowledgement = ack-nhfb,
  classification = "723; 901",
  journalabr =   "IBM Syst J",
  keywords =     "computers --- Data Communication Systems; data base
                 systems; data processing; IMS/VS; information retrieval
                 systems --- Design",
}

@Article{Siwiec:1977:HPD,
  author =       "Joseph E. Siwiec",
  title =        "High Performance {DB\slash DC} System",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "2",
  pages =        "169--195",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The evolution of a computerized airline reservation
                 system from its early form to the present version is
                 discussed. The system consists of the Programmed
                 Airline Reservation System (PARS) and its control
                 program called ACP. Data base allocation, accessing
                 techniques, and data communications are described.
                 Other applications of the special-purpose operating
                 system (ACP) are police car dispatching, car rental and
                 hotel reservations, credit authorization and loan\slash
                 payment processing.",
  acknowledgement = ack-nhfb,
  classification = "431; 723; 901",
  journalabr =   "IBM Syst J",
  keywords =     "acp; air transportation --- Reservation Systems;
                 computer operating systems; computers --- Data
                 Communication Systems; data base systems; information
                 retrieval systems --- Design; pars",
}

@Article{Jacobsen:1977:FCC,
  author =       "Tom Jacobsen",
  title =        "Forum: On compilability and composite design",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "2",
  pages =        "196--196",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1977:Af,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "2",
  pages =        "197--197",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1977:Ab,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "2",
  pages =        "198--201",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1977:Ba,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "2",
  pages =        "202--203",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{McQuilken:1977:Pc,
  author =       "George McQuilken",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "3",
  pages =        "206--207",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Senko:1977:DSD,
  author =       "M. E. Senko",
  title =        "Data Structures and Data Accessing in Data Base
                 Systems Past, Present, Future",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "3",
  pages =        "208--257",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A broad range of commercial and research data base
                 systems are analyzed. Common characteristics are
                 discussed. These systems, which have roots in older
                 filing systems and in punched card systems, are grouped
                 into the three categories of hierarchic, network, and
                 single-level models. Also presented is work on the
                 standardization of data base systems.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data base systems",
}

@Article{Eade:1977:CRS,
  author =       "D. J. Eade and P. Homan and J. H. Jones",
  title =        "{CICS\slash VS} and its Role in {Systems Network
                 Architecture}",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "3",
  pages =        "258--286",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Evolution of the Customer Information Control
                 System\slash Virtual Storage (CICS\slash VS) is
                 discussed, along with a description of how CICS\slash
                 VS manages a pre-SNA teleprocessing network. Following
                 a brief review of SNA (Systems Network Architecture),
                 the role of CICS\slash VS within an SNA environment is
                 described. The paper concludes by outlining SNA's
                 advantages to CICS\slash VS.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "CICS; computer systems, digital --- On Line Operation;
                 data base systems; data storage, digital --- Virtual",
}

@Article{Raver:1977:ALD,
  author =       "N. Raver and G. U. Hubbard",
  title =        "Automated Logical Data Base Design: Concepts and
                 Applications",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "3",
  pages =        "287--312",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper describes the design effort for an
                 integrated data base and then develops techniques for
                 automating significant portions of the labor. These
                 techniques have been incorporated in a program to
                 provide an effective data base design tool (Data Base
                 Design Aid) in current use. The processes involved with
                 this aid are discussed.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data base systems",
}

@Article{Anonymous:1977:Ag,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "3",
  pages =        "313--314",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1977:Ac,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "3",
  pages =        "315--315",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1977:Bb,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "3",
  pages =        "316--317",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{McQuilken:1977:R,
  author =       "George McQuilken",
  title =        "Referees",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "3",
  pages =        "318--319",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Thiel:1977:P,
  author =       "Connie A. Thiel",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "4",
  pages =        "322--323",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Zloof:1977:QEA,
  author =       "Moshe M. Zloof",
  title =        "{Query-by-Example}: a data base language",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "4",
  pages =        "324--343",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A high-level data base management language is
                 discussed that provides the user with a convenient and
                 unified interface to query, update, define, and control
                 a data base. When the user performs an operation
                 against the data base, he fills in an example of a
                 solution to that operation in skeleton tables that can
                 be associated with actual tables in the data base. The
                 system is currently being used experimentally for
                 various applications.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming languages; data base languages;
                 data base systems",
}

@Article{Heyne:1977:DTU,
  author =       "George F. Heyne and Chester J. Daniel",
  title =        "Design Techniques for a User Controlled {DB\slash DC}
                 System",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "4",
  pages =        "344--362",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The flexibility and usefulness of an integrated data
                 base can be limited by constraints inherent in the data
                 base management system. One such system, IBM's
                 Information Management System (IMS), has been extended
                 in terms of data independence, access control, data
                 integrity, and user communication by a group of
                 techniques integrated into an IMS application called
                 the Product Development Communication and Control
                 (PDCC) system. This paper describes the IMS extension
                 provided by PDCC and discusses the system's
                 implementation.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data base systems",
}

@Article{Blasgen:1977:SAR,
  author =       "Michael W. Blasgen and Kapali P. Eswaran",
  title =        "Storage and Access in Relational Data Bases",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "4",
  pages =        "363--377",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A model of storage and access to a relational data
                 base is presented. Using this model, four techniques
                 for evaluating a general relational query that involves
                 the operations of projection, restriction, and join are
                 compared on the basis of cost of accessing secondary
                 storage. The techniques are compared numerically and
                 analytically for various values of important
                 parameters. Results indicate that physical clustering
                 of logically adjacent items is a critical performance
                 parameter. In the absence of such clustering, methods
                 that depend on sorting the records themselves seem to
                 be the algorithm of choice.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data base systems",
}

@Article{Considine:1977:MMA,
  author =       "James P. Considine and James J. Myers",
  title =        "{MARC}: {MVS Archival Storage and Recovery} Program",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "4",
  pages =        "378--397",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A newly designed and implemented automated storage
                 hierarchy management system that operates under MVS is
                 described. The needs for economical archival storage
                 that at the same times makes possible the efficient
                 retrieval of users' data are reviewed. Discussed in
                 detail is the fulfillment of this requirement that is
                 provided by the automated management of MVS\slash TSO
                 on-line data storage space that includes the Mass
                 Storage System (MSS) and other storage devices in a
                 hierarchy. Experience with the system is summarized.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data base systems; mass storage systems; memory
                 hierarchy",
}

@Article{Sarrna:1977:IEM,
  author =       "K. S. Sarrna",
  title =        "An input-output econometric model",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "4",
  pages =        "398--420",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Halstead:1977:FLC,
  author =       "M. H. Halstead",
  title =        "Forum: On lines of code and readability",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "4",
  pages =        "421--422",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Walston:1977:MPM,Walston:1977:FAR}.",
  acknowledgement = ack-nhfb,
}

@Article{Walston:1977:FAR,
  author =       "C. E. Walston and C. P. Felix",
  title =        "Forum: Authors' reply",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "4",
  pages =        "422--423",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Walston:1977:MPM,Halstead:1977:FLC}.",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1977:Ah,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "4",
  pages =        "424--425",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1977:Ad,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "4",
  pages =        "426--427",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1977:C,
  author =       "Anonymous",
  title =        "Contents: 1977",
  journal =      j-IBM-SYS-J,
  volume =       "16",
  number =       "4",
  pages =        "428--428",
  year =         "1977",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Thiel:1978:Pa,
  author =       "Connie A. Thiel",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "1",
  pages =        "2--3",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{McCue:1978:IST,
  author =       "Gerald M. McCue",
  title =        "{IBM's Santa Teresa Laboratory}\emdash Architectural
                 design for program development",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "1",
  pages =        "4--25",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{deFreitas:1978:MTA,
  author =       "Simplicio Lopes {de Freitas} and Pierre J. Lavell",
  title =        "A Method for the Time Analysis of Programs",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "1",
  pages =        "26--38",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A technique for investigating the efficiency of
                 compiled programs is discussed. Based on research that
                 uses FORTRAN as a test subject, the method is more
                 widely applicable. Time analyses show programmers
                 points at which efficiencies may be increased. Also
                 discussed are uses of the technique for comparing the
                 efficiencies of compilers and languages, and for making
                 performance\slash cost analyses. Validation data are
                 presented for the method under several sets of
                 conditions.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programs",
}

@Article{Jones:1978:MPQ,
  author =       "T. Capers Jones",
  title =        "Measuring Programming Quality and Productivity",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "1",
  pages =        "39--63",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The unit-of-measure situation in programming is
                 discussed. An analysis of common units of measure for
                 assessing program quality and programmer productivity
                 reveals that some standard measures are intrinsically
                 paradoxical. Lines of code per programmer-month and
                 cost per defect are in this category. Attempts to go
                 beyond such paradoxical units as these are presented.
                 Also discussed is the usefulness of separating quality
                 measurements into measures of defect removal efficiency
                 and defect prevention, and the usefulness of separating
                 productivity measurements into work units and cost
                 units.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming",
}

@Article{Slate:1978:ECL,
  author =       "Laurel Slate and Kurt Spielberg",
  title =        "The {Extended Control Language} of {MPSX\slash 370}
                 and Possible Applications",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "1",
  pages =        "64--81",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Some large-scale linear and especially mixed-integer
                 programming problems, and the underlying practical
                 decision-making situations, have so far been solved
                 with only limited success. A new control language for
                 IBM's system MPSX-MIP\slash 370 permits recursive use
                 of the basic system and easy access to its elements,
                 and therefore appears to offer great potential for new
                 advances. The facilities of this language, called the
                 Extended Control Language, and the interfaces to the
                 system are discussed, and a number of representative
                 illustrative uses are given. A number of basic
                 applications of the system and possible heuristic and
                 algorithmic approaches to difficult problems are then
                 considered. These are often very large problems with
                 structure, which may now become more easily solvable or
                 tractable for the first time.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming languages; extended control
                 language",
}

@Article{Chen:1978:SIS,
  author =       "Richard L. Chen and Harlan Crowder and Ellis L.
                 Johnson",
  title =        "Solving the Installation Scheduling Problem Using
                 Mixed Integer Linear Programming",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "1",
  pages =        "82--91",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The installation scheduling problem involves finding a
                 program for installing a large number of sizes and
                 types of items (e.g., machines) over time so as to
                 optimize some measure (e.g., initial capital
                 investment), subject to various resource constraints.
                 Examples of this problem are scheduling the
                 installation of point-of-sale terminals in supermarket
                 and retail chains, and teller terminals in banks. The
                 installation scheduling problem has been formulated as
                 a mixed integer linear program and developed a computer
                 code for solving the model. By using techniques for
                 exploiting the special structure of the model, the
                 formulation allows rather quick solution times.",
  acknowledgement = ack-nhfb,
  classification = "723; 912; 921",
  journalabr =   "IBM Syst J",
  keywords =     "mathematical programming, linear; operations
                 research",
}

@Article{Anonymous:1978:Ae,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "1",
  pages =        "92--94",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1978:Aa,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "1",
  pages =        "95--96",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1978:R,
  author =       "Anonymous",
  title =        "Reprints",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "1",
  pages =        "97--102",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See erratum \cite{Anonymous:1978:E}.",
  acknowledgement = ack-nhfb,
}

@Article{Thiel:1978:Pb,
  author =       "Connie A. Thiel",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "2",
  pages =        "104--105",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ehrsam:1978:CKM,
  author =       "William F. Ehrsam and Stephen M. Matyas and Carl H.
                 Meyer and Walter L. Tuchman",
  title =        "A Cryptographic Key Management Scheme for Implementing
                 the {Data Encryption Standard}",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "2",
  pages =        "106--125",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Data being transmitted through a communications
                 network can be protected by cryptography. In a data
                 processing environment, cryptography is implemented by
                 an algorithm which utilizes a secret key, or sequence
                 of bits. Any key-controlled cryptographic algorithm,
                 such as the Data Encryption Standard, requires a
                 protocol for the management of its cryptographic keys.
                 The complexity of the key management protocol
                 ultimately depends on the level of functional
                 capability provided by the cryptographic system. This
                 paper discusses a possible key management scheme that
                 provides the support necessary to protect
                 communications between individual end users (end-to-end
                 encryption) and that also can be used to protect data
                 stored or transported on removable media.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data processing",
}

@Article{Matyas:1978:GDI,
  author =       "Stephen M. Matyas and Carl H. Meyer",
  title =        "Generation, Distribution, and Installation of
                 Cryptographic Keys",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "2",
  pages =        "126--137",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A key controlled cryptographic system requires a
                 mechanism for the safe and secure generation,
                 distribution, and installation of its cryptographic
                 keys. Possible key generation, distribution, and
                 installation procedures are discussed for the key
                 management scheme presented in an accompanying paper.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data processing",
}

@Article{Lennon:1978:CAI,
  author =       "Richard E. Lennon",
  title =        "Cryptography Architecture for Information Security",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "2",
  pages =        "138--150",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Information being transferred from point to point over
                 a public communications carrier or stored on portable
                 media can be protected, by the use of cryptography,
                 from accidental or intentional disclosure. Control
                 functions are required to ensure synchronization of the
                 process. In a communications environment, the control
                 functions become logically part of the network
                 architecture. IBM's Systems Network Architecture (SNA)
                 has been extended to allow the use of cryptography when
                 sensitive information is being processed. Architectural
                 similarities for the file environment are discussed.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks; data processing",
}

@Article{Gladney:1978:ACC,
  author =       "Henry M. Gladney",
  title =        "Administrative Control of Computing Service",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "2",
  pages =        "151--178",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The complexity of necessary administrative controls
                 for computer service exceeds the capabilities of
                 clerical methods. A practical method is presented for
                 describing the external administrative environment in a
                 data base which can be used by the operating system for
                 dynamic enforcement of limits. An attempt is made to
                 address consistently the different forms of data
                 processing that may be concurrent in a single
                 installation; included are general purpose time
                 sharing, transaction oriented computing, and scientific
                 computing. Described is the architecture of an
                 operating system component that could be regarded as
                 the interface between administrative security
                 mechanisms and the security features of the system
                 software.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer architecture; computer operating systems;
                 data processing",
}

@Article{Davies:1978:DPS,
  author =       "Charles T. {Davies, Jr.}",
  title =        "Data Processing Spheres of Control",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "2",
  pages =        "179--198",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An attempt is made to fill the need for better
                 definition of the audit and control aspects of data
                 processing applications and thereby provide a framework
                 for improving communications between systems analysts
                 and computer scientists. The concept of spheres of
                 control, which are logical boundaries that exist in all
                 data processing systems, is introduced. Included are
                 spheres of control that define process bounding for
                 such purposes as recovery, auditing, process
                 commitment, and algorithm (procedure) replacement.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data processing",
}

@Article{Anonymous:1978:Af,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "2",
  pages =        "199--200",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1978:Ab,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "2",
  pages =        "201--202",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1978:E,
  author =       "Anonymous",
  title =        "Erratum: ``{Reprints}''",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "2",
  pages =        "202--202",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Anonymous:1978:R}.",
  acknowledgement = ack-nhfb,
}

@Article{Thiel:1978:Pc,
  author =       "Connie Thiel",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "3",
  pages =        "204--205",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Crabtree:1978:JN,
  author =       "Robert P. Crabtree",
  title =        "Job Networking",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "3",
  pages =        "206--220",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A discussion is presented of the evolution of a
                 facility, generally called job networking, that permits
                 job-related information to be sent between programming
                 system components operating on computing systems that
                 are attached to a communications network. The
                 capabilities of the programs that implement this
                 facility are described along with the events that led
                 to its development, the value of the facility to the
                 user, and ways in which it can be extended to work with
                 other forms of communication networking.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks",
}

@Article{Simpson:1978:NJE,
  author =       "Richard O. Simpson and Grady H. Phillips",
  title =        "Network Job Entry Facility for {JES2}",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "3",
  pages =        "221--240",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Job entry subsystems have been developed to provide
                 operating systems with an interface for managing some
                 of the workload of computing facilities. One of the job
                 entry subsystems for OS\slash VS2 has been further
                 enhanced with the addition of a network job entry
                 facility that allows full access to a network of
                 computers in a manner consistent with a local
                 operation. The design objectives, implementation, and
                 extensions of that facility are discussed.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks",
}

@Article{Musgrave:1978:ECG,
  author =       "Joan Forrester Musgrave",
  title =        "Experiments in Computer-Aided Graphic Expression",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "3",
  pages =        "241--259",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A series of graphic design experiments using an
                 experimental color graphic display system is presented.
                 Design principles and capabilities of the experimental
                 color graphic display system are discussed from a
                 graphic designer's point of view. The system allows a
                 designer to choose freely among 128 different colors,
                 various form modes, and collage capabilities, including
                 image mixing. The designer need be neither a programmer
                 nor one who understands the technical aspects of the
                 system to use it creatively. Experimental results are
                 shown visually, some of which have been used as cover
                 designs for IBM publications.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer graphics",
}

@Article{McCrossin:1978:TDT,
  author =       "James M. McCrossin and Robert P. O'Hara and L. R.
                 Koster",
  title =        "Time-Sharing Display Terminal Session Manager",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "3",
  pages =        "260--275",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Display terminals, although faster than typewriter
                 devices, do not implicitly create records of the user's
                 interactive sessions. Based on the premise that a
                 display terminal session facility that also has the
                 record-keeping functions of typewriter terminals would
                 increase productivity, a research project was
                 undertaken that has resulted in the session manager
                 discussed. Experience with the system is summarized.",
  acknowledgement = ack-nhfb,
  annote =       "Based on the premise that a display terminal session
                 facility that also has the record-keeping functions of
                 typewriter terminals would increase productivity, a
                 research project was undertaken that has resulted in
                 the session manager discussed. The manager implements
                 multiple character streams and multiple windows.",
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer peripheral equipment; computer systems,
                 digital --- Time Sharing; display terminals",
}

@Article{Ford:1978:EPD,
  author =       "Julian B. Ford",
  title =        "Enhanced Problem Determination Capability for
                 Teleprocessing",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "3",
  pages =        "276--289",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Determining network problems is an important task that
                 can be difficult and even tedious. This capability has
                 been enhanced for teleprocessing users and service
                 personnel through service aids developed for their use.
                 The service aids gather error data and provide displays
                 that assist in analyzing system quality and in
                 determining specific problems. The evolution and
                 operation of these aids are described.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks; teleprocessing",
}

@Article{Beretvas:1978:PTO,
  author =       "Thomas Beretvas",
  title =        "Performance Tuning in {OS\slash VS2 MVS}",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "3",
  pages =        "290--313",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A procedure of observations is presented for the
                 coarse tuning of an MVS system by analyzing it into its
                 software and hardware components and increasing their
                 efficiency successively. The method involves
                 adjustments to swapping, the input-output load, the CPU
                 load, main storage, and the system resources manager.
                 Also discussed are performance measures necessary to
                 characterize a system, tools to tune a system, and
                 various aspects of data gathering and the effects of
                 adjustments on system parameters. Two illustrative case
                 histories are also given.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems",
}

@Article{Anonymous:1978:Ag,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "3",
  pages =        "314--315",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1978:Ac,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "3",
  pages =        "316--316",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1978:Ba,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "3",
  pages =        "317--320",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Thiel:1978:Pd,
  author =       "Connie Thiel",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "4",
  pages =        "322--323",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Scherr:1978:DDP,
  author =       "Allan L. Scherr",
  title =        "Distributed Data Processing",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "4",
  pages =        "324--343",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The factors that relate to organizations and their
                 data processing requirements and to the various
                 possible data processing configurations are examined.
                 Price-performance ratio, organizational needs, and
                 other factors that recommend the flexibility of
                 distributed data processing are discussed in detail.
                 Also discussed are possible distributed data processing
                 architectures choice criteria, communications, and
                 application and operating system design principles.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data processing",
}

@Article{Gravina:1978:NWB,
  author =       "Chris M. Gravina",
  title =        "{National Westminster Bank} Mass Storage Archiving",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "4",
  pages =        "344--358",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The problem of retrieving records at random from a
                 very large archival data base has not previously been
                 effectively soluble by data processing techniques. This
                 paper describes such an application, in which a large
                 bank in the United Kingdom uses the IBM 3850 Mass
                 Storage System for storing and retrieving customer
                 account statements.",
  acknowledgement = ack-nhfb,
  classification = "723; 901",
  journalabr =   "IBM Syst J",
  keywords =     "information science",
}

@Article{Smedley:1978:DSS,
  author =       "Bevan S. Smedley",
  title =        "The Development of Software Systems to Aid in Physical
                 Planning",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "4",
  pages =        "359--382",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Physical planning for geographic areas such as cities,
                 counties, or regions can be greatly simplified if the
                 planner can display the entity under consideration
                 together with land-use and socioeconomic data and can
                 interact easily with that data to modify the
                 presentation and redisplay it. Presented are a system
                 and a language to aid such physical planning and user
                 experience with the system and language. Further
                 research on graphic presentation, the incorporation of
                 models and statistical routines are also discussed.",
  acknowledgement = ack-nhfb,
  classification = "403; 723; 901",
  journalabr =   "IBM Syst J",
  keywords =     "regional planning; urban planning --- Computer
                 Applications",
}

@Article{Morrison:1978:DSL,
  author =       "J. Paul Morrison",
  title =        "Data Stream Linkage Mechanism",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "4",
  pages =        "383--408",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See letters
                 \cite{Levine:1979:FDS,Morrison:1979:FAR}.",
  abstract =     "Using a programming discipline called the Data Stream
                 Linkage Mechanism (DSLM), a program can be built by
                 linking program modules to form a network through which
                 data passes. The network is specified by the program
                 designer using a mixture of precoded and custom coded
                 modules. This linkage technique and the capabilities
                 that result from it constitute an approach to
                 programming that is radically different from
                 conventional techniques. It can increase the
                 productivity of programmers and can result in programs
                 that are easier to understand and to maintain.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming",
}

@Article{Kraemer:1978:PID,
  author =       "Wolfgang Kraemer",
  title =        "Performance Investigations with a {DOS\slash VS}-Based
                 Operating System Model",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "4",
  pages =        "409--443",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An operating system model is described that is based
                 mainly on the DOS\slash VS supervisor but also reflects
                 various design alternatives, providing a flexible tool
                 for operating system design and tuning. The model is
                 characterized by the subdivision of I/O activity into
                 normal I/O, page I/O, and fetch I/O, corresponding to
                 the different supervisor services involved. The model
                 has been evaluated by analytical queuing methods in a
                 set of APL functions that allow a flexible
                 specification of the supervisor, the configuration, and
                 the workload. Validation has been done by simulation
                 and by benchmarking of a real system. The main features
                 of this performance tool are described, and its
                 capabilities are illustrated by performance results
                 that show the impact of workload and various supervisor
                 changes on system performance.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems",
}

@Article{Chiu:1978:PMM,
  author =       "Willy W. Chiu and We-Min Chow",
  title =        "A Performance Model of {MVS}",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "4",
  pages =        "444--462",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A research case study of the development of a
                 performance model called PMOD, for the IBM OS\slash MVS
                 operating system is presented. The goal of the model is
                 to predict user response times and system performance
                 for different scheduling parameters, workloads, and
                 configurations, with reasonably simple input
                 requirements and fast run times. Both the validation
                 and usage of the model for capacity planning and system
                 tuning are discussed.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems",
}

@Article{Anonymous:1978:Ah,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "4",
  pages =        "463--464",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1978:Ad,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "4",
  pages =        "465--466",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1978:Bb,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "4",
  pages =        "467--469",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1978:C,
  author =       "Anonymous",
  title =        "Contents: 1978",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "4",
  pages =        "470--470",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Thiel:1979:Pa,
  author =       "Connie Thiel",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "1",
  pages =        "2--3",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:31:14 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Seawright:1979:VSM,
  author =       "L. H. Seawright and R. A. MacKinnon",
  title =        "{VM\slash 370}\emdash a study of multiplicity and
                 usefulness",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "1",
  pages =        "4--17",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://pages.cs.wisc.edu/~stjones/proj/vm_reading/ibmsj1801C.pdf",
  abstract =     "This paper is an overview of IBM's Virtual Machine
                 Facility/370. It describes the virtual machine concept
                 and its capabilities and implementation in VM/370. Two
                 components of VM/370 are discussed --- the control
                 program and the Conversational Monitor System. The
                 usefulness of VM/370 in multiple and diverse
                 environments is covered. New developments in VM/370
                 from hardware assists to system extensions, networking,
                 and handshaking are briefly described as an
                 introduction to the rest of the papers in this issue.",
  acknowledgement = ack-nhfb,
}

@Article{MacKinnon:1979:CVM,
  author =       "R. A. MacKinnon",
  title =        "The Changing Virtual Machine Environment: Interfaces
                 to Real Hardware, Virtual Hardware, and Other Virtual
                 Machines",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "1",
  pages =        "18--46",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A survey is presented of changes to virtual machine
                 interfaces, implementation, architecture, and
                 simulation techniques as they affect IBM System\slash
                 370 and 303X (3031, 3032, 3033) processors, the system
                 control program to which virtual machines interface,
                 and other virtual machines executing on the same real
                 computing system or elsewhere. New uses of virtual
                 machine subsystems are discussed as they relate to
                 inter-virtual-machine communication.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital",
}

@Article{Holley:1979:VAM,
  author =       "L. H. Holley and R. P. Parmelee and C. A. Salisbury
                 and D. N. Saul",
  title =        "{VM\slash 370} Asymmetric Multiprocessing",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "1",
  pages =        "47--70",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The design and implementation of VM\slash 370 attached
                 processor support is discussed from the point of view
                 of adding radical new function to an existing operating
                 system. Three major design decisions are described, and
                 performance is analyzed as it relates to those
                 decisions.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital",
}

@Article{Jensen:1979:FAC,
  author =       "R. M. Jensen",
  title =        "A Formal Approach for Communication Between Logically
                 Isolated Virtual Machines",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "1",
  pages =        "71--92",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The growing use of the virtual machine concept has
                 resulted in the necessity for communication between the
                 virtual machines. The design and operation of the
                 Virtual Machine Communication Facility is discussed as
                 an approach to offering such communication. The
                 facility is an interface allowing a logical connection
                 between two or more virtual machines. Potential
                 applications for this facility conclude the
                 discussion.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computers, digital",
}

@Article{Attanasio:1979:VCS,
  author =       "C. R. Attanasio",
  title =        "Virtual Control Storage --- Security Measures in
                 {VM\slash 370}",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "1",
  pages =        "93--110",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An experimental extension to VM\slash 370 is described
                 whereby a distinct execution and data domain (Virtual
                 Control Storage) is made available to virtual machines
                 that require access to a resource manager, without
                 requiring a change in the scheduling unit. Thus
                 scheduling overhead and delays are avoided when
                 transition is made between user program and resource
                 manager. A mechanism is described for exchanging data
                 between execution domains by means of address-space
                 mapping.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital",
}

@Article{Hendricks:1979:EVM,
  author =       "E. C. Hendricks and T. C. Hartmann",
  title =        "Evolution of a Virtual Machine Subsystem",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "1",
  pages =        "111--142",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Early investigation of virtual machine subsystem
                 flexibility centered on telecommunications support and
                 intercomputer networking and proceeded in two phases.
                 The first phase focused on an experimental program for
                 the virtual machine control program CP-67 that
                 supported remote work stations and pioneered
                 intercomputer spool communications. The results of that
                 effort inspired a second effort in the same area with
                 some significant redirection. This second phase
                 ultimately led to the remote spooling communications
                 subsystem component of VM\slash 370, the VM\slash 370
                 networking package (VNET), and a large network of
                 interactive computer systems within IBM. These phases
                 are discussed along with suggestions for several
                 continuing lines of work based on current results.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital",
}

@Article{Doherty:1979:MVS,
  author =       "W. J. Doherty and R. P. Kelisky",
  title =        "Managing {VM\slash CMS} Systems for User
                 Effectiveness",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "1",
  pages =        "143--163",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See letters \cite{Reich:1979:FMV,Doherty:1979:FAR}.",
  abstract =     "A computing center management methodology is discussed
                 based on the premise that the computer user's time and
                 work product are valuable. Experience in the use of
                 interactive systems in a research environment from 1965
                 to the present time is presented. Current user
                 experience and management of VM\slash CMS are
                 emphasized. The use of computers as tools for extending
                 users' powers of memory and logic and the development
                 of new methods of managing VM\slash CMS are discussed
                 in detail.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data processing",
}

@Article{Tetzlaff:1979:SSI,
  author =       "W. H. Tetzlaff",
  title =        "State Sampling of Interactive {VM\slash 370} Users",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "1",
  pages =        "164--180",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Sampling the state of interactive computer users of
                 hardware and programming in a time-sharing system leads
                 to an understanding of delays to users caused by
                 contention for resources. A discussion is presented of
                 user state sampling by means of a program called
                 VM\slash Monitor on the interactive time-sharing
                 system, VM\slash 370, although the methodology is
                 applicable to other time-sharing systems. Also
                 discussed are system bottleneck detection and secondary
                 tuning after bottlenecks have been found. Possible
                 extensions of the technique are also presented.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems programming",
}

@Article{Anonymous:1979:Ad,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "1",
  pages =        "181--184",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Thiel:1979:Pb,
  author =       "Connie Thiel",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "2",
  pages =        "186--187",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Branscomb:1979:CCP,
  author =       "L. M. Branscomb",
  title =        "Computing and communications\emdash {A} perspective of
                 the evolving environment",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "2",
  pages =        "189--201",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Green:1979:INA,
  author =       "Paul E. Green",
  title =        "An Introduction to Network Architectures and
                 Protocols",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "2",
  pages =        "202--222",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This tutorial paper is intended for the reader who is
                 unfamiliar with computer networks, to prepare him for
                 reading the more detailed technical literature on the
                 subject. The approach here is to start with an ordered
                 list of the functions that any network must provide in
                 tying two end users together, and then to indicate how
                 this leads naturally to layered peer protocols out of
                 which the architecture of a computer network is
                 constructed. After a discussion of a few block diagrams
                 of private (commercially provided) and public (common
                 carrier) networks, the layer and header structures of
                 SNA and DNA architectures and the X. 25 interface are
                 briefly described.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks",
}

@Article{Halsey:1979:PDN,
  author =       "John R. Halsey and Leslie E. Hardy and Leo F.
                 Powning",
  title =        "Public Data Networks: Their Evolution, Interfaces, and
                 Status",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "2",
  pages =        "223--243",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The development of PDNs from services based on the
                 analog telephone network to services using digital
                 techniques is traced. Some of the networks, their
                 characteristics, and the international network
                 interface recommendations are briefly described.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks",
}

@Article{Corr:1979:SEI,
  author =       "Frank P. Corr and Don H. Neal",
  title =        "{SNA} and Emerging International Standards",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "2",
  pages =        "244--262",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The interaction of Systems Network Architecture (SNA)
                 and the international standards now being developed is
                 discussed. A provisional architecture model is used as
                 the basis for discussion, and SNA is compared to each
                 level of the model.",
  acknowledgement = ack-nhfb,
  classification = "723; 902",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks; standards",
}

@Article{Gray:1979:SMN,
  author =       "James P. Gray and Tony B. McNeill",
  title =        "{SNA} Multiple-System Networking",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "2",
  pages =        "263--297",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Systems Network Architecture (SNA) has evolved from an
                 architecture that supported implementation of free
                 networks rooted in a System\slash 370 to an
                 architecture that supports multiple-system networks
                 with capabilities such as alternate paths and parallel
                 links. This paper describes the major SNA enhancements
                 that have been implemented for multiple-system
                 networks. As network configurations have become more
                 complex, the problems associated with network growth,
                 change, failures, recovery, and flow control have
                 required solutions that permit continuous network
                 operation. The SNA enhancements that address these
                 problems are also discussed.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks",
}

@Article{Ahuja:1979:RFC,
  author =       "Vijay Ahuja",
  title =        "Routing and flow control in {Systems Network
                 Architecture}",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "2",
  pages =        "298--314",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The multiple routing architecture of SNA is described.
                 An unrestricted data flow into the network can cause
                 long delays and buffer depletion. Network congestion
                 can be avoided by employing flow control mechanisms at
                 both the local (node) and global (network) levels. This
                 paper focuses on global flow control and describes the
                 adaptive traffic-pacing ``window'' size algorithm that
                 is the basis of the global flow control in SNA.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks",
}

@Article{Moore:1979:ELC,
  author =       "Roy S. Moore",
  title =        "Evolution of a Laboratory Communication Network",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "2",
  pages =        "315--332",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The IBM System Communications Division network is
                 described and used as an example to discuss some of the
                 practical problems associated with providing
                 computational and communication service to remote and
                 local user communities.",
  acknowledgement = ack-nhfb,
  classification = "716; 718; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks; computers, digital --- Data
                 Communication Systems",
}

@Article{Frazer:1979:PTI,
  author =       "W. D. Frazer",
  title =        "Potential technology implications for computers and
                 telecommunications in the 1980s",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "2",
  pages =        "333--347",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1979:Ae,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "2",
  pages =        "348--350",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1979:Aa,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "2",
  pages =        "351--352",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Thiel:1979:Pc,
  author =       "Connie Thiel",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "3",
  pages =        "354--355",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Stewart:1979:PAC,
  author =       "H. M. Stewart",
  title =        "Performance analysis of complex communications
                 systems",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "3",
  pages =        "356--373",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ziegler:1979:DIS,
  author =       "K. {Ziegler, Jr.}",
  title =        "A distributed information system study",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "3",
  pages =        "374--401",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Engel:1979:OCS,
  author =       "G. H. Engel and J. Groppuso and R. A. Lowenstein and
                 W. G. Traub",
  title =        "An office communications system",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "3",
  pages =        "402--431",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gruhn:1979:RPC,
  author =       "A. M. Gruhn and A. C. Hohl",
  title =        "A research perspective on computer-assisted office
                 work",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "3",
  pages =        "432--456",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Shah:1979:APE,
  author =       "M. J. Shah",
  title =        "Automatic programming for energy management using
                 sensor based computers",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "3",
  pages =        "457--469",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Levine:1979:FDS,
  author =       "John R. Levine",
  title =        "Forum: Data stream linkage and the {UNIX} system",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "3",
  pages =        "470--472",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Morrison:1978:DSL,Morrison:1979:FAR}.",
  acknowledgement = ack-nhfb,
}

@Article{Morrison:1979:FAR,
  author =       "J. Paul Morrison",
  title =        "Forum: Author's response",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "3",
  pages =        "473--475",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Morrison:1978:DSL,Levine:1979:FDS}.",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1979:Af,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "3",
  pages =        "476--478",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1979:Ab,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "3",
  pages =        "479--479",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Thiel:1979:Pd,
  author =       "Connie Thiel",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "4",
  pages =        "482--483",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Weingarten:1979:IAC,
  author =       "R. A. Weingarten",
  title =        "An integrated approach to centralized communications
                 network management",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "4",
  pages =        "484--506",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Kiely:1979:OSD,
  author =       "S. C. Kiely",
  title =        "An operating system for distributed processing\emdash
                 {DPPX}",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "4",
  pages =        "507--525",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Albrecht:1979:IFD,
  author =       "H. R. Albrecht and L. C. Thomason",
  title =        "{I/O} facilities of the {Distributed Processing
                 Programming Executive (DPPX)}",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "4",
  pages =        "526--546",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Fitzgerald:1979:DMD,
  author =       "A. K. Fitzgerald and B. F. Goodrich",
  title =        "Data Management for the {Distributed Processing
                 Programming Executive (DPPX)}",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "4",
  pages =        "547--564",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Waters:1979:DID,
  author =       "F. C. H. Waters",
  title =        "Design of the {IBM} 8100 {Data Base and Transaction
                 Management System}\emdash {DTMS}",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "4",
  pages =        "565--581",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lorin:1979:DPA,
  author =       "H. Lorin",
  title =        "Distributed processing: An assessment",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "4",
  pages =        "582--603",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Reich:1979:FMV,
  author =       "David L. Reich",
  title =        "Forum: Managing {VM\slash CMS} systems",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "4",
  pages =        "604--605",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Doherty:1979:MVS,Doherty:1979:FAR}.",
  acknowledgement = ack-nhfb,
}

@Article{Doherty:1979:FAR,
  author =       "W. J. Doherty and R. P. Kelisky",
  title =        "Forum: Authors' response",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "4",
  pages =        "605--607",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Doherty:1979:MVS,Reich:1979:FMV}.",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1979:Ag,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "4",
  pages =        "608--609",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1979:Ac,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "4",
  pages =        "610--611",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1979:B,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "4",
  pages =        "612--614",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1979:C,
  author =       "Anonymous",
  title =        "Contents: 1979",
  journal =      j-IBM-SYS-J,
  volume =       "18",
  number =       "4",
  pages =        "615--616",
  year =         "1979",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Thiel:1980:Pa,
  author =       "Connie Thiel",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "1",
  pages =        "2--3",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bronner:1980:OCP,
  author =       "L. Bronner",
  title =        "Overview of the capacity planning process for
                 production data processing",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "1",
  pages =        "4--27",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Cooper:1980:CPM,
  author =       "J. C. Cooper",
  title =        "A capacity planning methodology",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "1",
  pages =        "28--45",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Schiller:1980:SCP,
  author =       "Donald C. Schiller",
  title =        "System capacity and performance evaluation",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "1",
  pages =        "46--67",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The performance of MVS (Multiple Virtual Storage)
                 systems can be predicted for changes in workload and
                 environment by a marketing aid informally called SCAPE
                 (for System Capacity and Performance Evaluation).
                 Written in FORTRAN, the programs use simple queueing
                 formulas with empirical modifications. Response times
                 for complex workloads (IMS, CICS, TSO, and batch)
                 through the CPU and auxiliary storage are the graph
                 represent relationships among objects such as part-of,
                 attachment, constraint, and assembly. The nodes also
                 store positional relationships between objects and
                 physical properties such as material type. The user
                 designs objects by combining positive and negative
                 parameterized primitive volumes, for example, cubes and
                 cones, which are represented internally as polyhedra.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer simulation",
}

@Article{Seaman:1980:MCP,
  author =       "Phillip H. Seaman",
  title =        "Modeling Considerations for Predicting Performance of
                 {CICS\slash VS} Systems",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "1",
  pages =        "68--80",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Various aids and tools are used in capacity planning.
                 One such aid, an analytic model, is discussed. Both the
                 decisions made in the development of an aid and the way
                 the aid is used are examined. Characteristics of a good
                 planning aid are emphasized with the analytic model
                 serving as the example.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital",
}

@Article{Nguyen:1980:RDS,
  author =       "Hung C. Nguyen and Arnold Ockene and Richard Revell
                 and Walter J. Skwish",
  title =        "The Role of Detailed Simulation in Capacity Planning",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "1",
  pages =        "81--101",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A performance prediction method which predicts the
                 effects of changes in IBM 3790 and 8100 distributed
                 processing systems and in teleprocessing networks is
                 described. Such changes may involve system features
                 (such as line protocols), the introduction of new
                 applications, or volume growth in an otherwise static
                 system. The technique makes use of a detailed
                 simulator, informally called FIVE, in conjunction with
                 a system monitor and data analysis program. Its use can
                 make substantial performance information available at
                 relatively low cost.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital",
}

@Article{Schardt:1980:MTA,
  author =       "Richard M. Schardt",
  title =        "An {MVS} Tuning Approach",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "1",
  pages =        "102--119",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Experience contributes important knowledge in many
                 procedures. From the experience gained in tuning the
                 Multiple Virtual Storage (MVS) operating system, a set
                 of guidelines to help MVS installations avoid
                 performance problems are suggested, along with an
                 approach to tuning on MVS system. The guidelines can
                 help a performance analyst isolate the cause of a
                 performance problem. Not all possible problems that
                 might be encountered are included. It is found that
                 most MVS performance problems are a result of poor
                 workload management and are often related to I/O
                 activities.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems",
}

@Article{Leach:1980:SAU,
  author =       "Jack R. Leach and Robert D. Campenni",
  title =        "A Sidestream Approach Using a Small Processor as a
                 Tool for Managing Communication Systems",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "1",
  pages =        "120--139",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A management tool is described that reflects an
                 approach to communication systems management in which
                 the management functions are physically separated from
                 the host computers driving a communications network.
                 These management functions are packaged on a small IBM
                 processor base (i.e., sidestream processor) and
                 designed for use in a centralized network management
                 center environment. The management functions included
                 in this sidestream processor tool relate to problem
                 management, change management, project scheduling and
                 tracking, network control, and network configuration.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computers, digital",
}

@Article{Bird:1980:SM,
  author =       "R. A. Bird and C. A. Hofmann",
  title =        "Systems management",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "1",
  pages =        "140--159",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:16:29 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1980:Ab,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "1",
  pages =        "160--162",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1980:Aa,
  author =       "Anonymous",
  title =        "Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "1",
  pages =        "163--168",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Thiel:1980:Pb,
  author =       "Connie Thiel",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "2",
  pages =        "170--170",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Baker:1980:LDA,
  author =       "Charles T. Baker",
  title =        "Logical Distribution of Applications and Data",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "2",
  pages =        "171--191",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A distributed data processing system is composed of a
                 set of nodes that are interdependent yet capable of
                 operating autonomously. A procedure is described for
                 controlling the interdependencies and nodal autonomies
                 with a logical distribution of applications and their
                 data. The procedure is illustrated with data that were
                 obtained from an on-line operations planning and
                 control system at a steel mill.",
  acknowledgement = ack-nhfb,
  classification = "545; 723; 731",
  journalabr =   "IBM Syst J",
  keywords =     "data processing; iron and steel plants --- Control
                 Systems",
}

@Article{Harrison:1980:DPC,
  author =       "Edward S. Harrison",
  title =        "Distributed Processing Communications Software Support
                 for Operation Within an {SNA} Network",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "2",
  pages =        "192--207",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The distributed processing programming executive
                 (DPPX) operating system has network configuration
                 requirements placed on it. A discussion is presented of
                 those requirements and the way in which they are met,
                 including those that result from the various
                 configurations possible with a DPPX system. In
                 addition, the unique way in which terminal resources
                 are supported in DPPX and the dynamic approach to
                 resource definition in the DPPX system are described.
                 Finally, application definition and application usage
                 of the network configuration capabilities of DPPX are
                 discussed.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  keywords =     "computer operating systems; computer systems,
                 digital",
}

@Article{Yuval:1980:SCA,
  author =       "Asher Yuval",
  title =        "System Contention Analysis --- an Alternate Approach
                 to System Tuning",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "2",
  pages =        "208--228",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Many existing monitors that are intended to assist in
                 system tuning are based on the utilization approach
                 which focuses on the active time of the system
                 resources and activities and their users. An
                 alternative approach is presented based primarily on
                 the analysis of the contention in the system. The focus
                 here is on the queuing delay time of the users and
                 their activities when accessing the system resources.
                 Utilization and contention are two different ways of
                 looking at the system. The two approaches complement
                 each other, yet each may serve a different purpose or
                 address different performance objectives. A prototype
                 monitor was implemented on MVS (Multiple Virtual
                 Storage) to produce the information necessary to
                 continue investigations in contention analysis.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital",
}

@Article{Wood:1980:DBS,
  author =       "Christopher Wood and Eduardo B. Fernandez and Rita C.
                 Summers",
  title =        "Data Base Security: Requirements, Policies, and
                 Models",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "2",
  pages =        "229--252",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Some aspects of data base security are surveyed, with
                 emphasis on basic principles and ways to express
                 security requirements. Security policies and
                 theoretical models are considered in detail, and the
                 models are used to compare the security features of
                 some data base management systems.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data base systems; data processing --- Security of
                 Data",
}

@Article{Konheim:1980:ICP,
  author =       "Alan G. Konheim and Marian H. Mack and Robert K.
                 McNeill and Bryant Tuckerman and Gerald Waldbaum",
  title =        "The {IPS} Cryptographic Programs",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "2",
  pages =        "253--283",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Cryptographic methods of data protection have taken on
                 new importance as computers have become faster and as
                 strong cryptographic algorithms, such as the Data
                 Encryption Standard (DES), have become available. But a
                 standard encipherment technique is only the first step
                 in applying cryptography in a computing center. This
                 paper discusses the Information Protection System
                 (IPS), a set of cryptographic application programs
                 designed to use the DES algorithm in a working
                 computing center. In designing IPS, several important
                 augmentations of DES were formulated.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data processing; information protection system",
}

@Article{Anonymous:1980:Ac,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "2",
  pages =        "284--286",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1980:B,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "2",
  pages =        "287--288",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Thiel:1980:Pc,
  author =       "Connie Thiel",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "3",
  pages =        "290--291",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Burchi:1980:IGT,
  author =       "R. S. Burchi",
  title =        "Interactive graphics today",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "3",
  pages =        "292--313",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Weller:1980:SAG,
  author =       "D. L. Weller and E. D. Carlson and G. M. Giddings and
                 F. P. Palermo and R. Williams and S. N. Zilles",
  title =        "Software Architecture for Graphical Interaction",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "3",
  pages =        "314--330",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Existing graphical support is examined, and
                 requirements for high-level support of graphical
                 interaction are listed. The architecture of a prototype
                 system with high-level support for graphical
                 interaction is presented. This includes database
                 support for manipulating graphical data and
                 device-independent graphical support based on a
                 proposed standard for graphical interaction. Algorithms
                 are presented for identifying items selected from a
                 display by the user. Inclusion of a database management
                 system in graphical software support is shown to be
                 helpful in meeting the requirements of interactive
                 graphical application programs.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer graphics",
}

@Article{McManigal:1980:AIG,
  author =       "D. F. McManigal and D. A. Stevenson",
  title =        "Architecture of the {IBM} 3277 Graphics Attachment",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "3",
  pages =        "331--344",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The IBM 3277 Graphics Attachment is an interactive
                 computer graphics workstation using a dual-screen
                 concept. A storage display monitor is attached to an
                 IBM 3277 Display Station, the combination providing
                 low-cost, moderate-performance interactive graphics.
                 This paper describes the architecture of the Graphics
                 Attachment, both functional structure and rationale.
                 Non-architectural characteristics are also
                 considered.",
  acknowledgement = ack-nhfb,
  classification = "722",
  journalabr =   "IBM Syst J",
  keywords =     "computer peripheral equipment",
}

@Article{Shepherd:1980:EPM,
  author =       "B. J. Shepherd",
  title =        "Experimental Page Makeup of Text with Graphics on a
                 Raster Printer",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "3",
  pages =        "345--355",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An experimental character-graphic art program is
                 described that demonstrates the potential of the IBM
                 3800 for printing a restricted set of character-graphic
                 art documents. A special character set is outlined, as
                 well as an algorithm that selects those characters from
                 the set that best approximate any straight line. This
                 character-graphic algorithm permits line art to be
                 included in formatted text documents. There is no
                 manual artwork or paste-up in the document output.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer graphics",
}

@Article{Handelman:1980:HCG,
  author =       "S. W. Handelman",
  title =        "A High-Resolution Computer Graphics System",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "3",
  pages =        "356--366",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Discussed are a graphics system and a high-resolution
                 printer that provide scientists with a means of
                 producing camera-ready text and graphics. Techniques
                 are described for producing three types of graphics:
                 halftone pictures, line drawings, and solid-filled
                 areas. An overview of the software system is also
                 presented.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer graphics",
}

@Article{Niehoff:1980:AAP,
  author =       "W. H. Niehoff and A. L. Jones",
  title =        "An {APL} Approach to Presentation Graphics",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "3",
  pages =        "367--381",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Producing data in pictorial form is a type of computer
                 graphics application known as presentation graphics.
                 One approach that has been used for this type of
                 graphics is a graphic support package using APL as the
                 command language. Here discussed is the evolution of
                 this approach up to its currently available forms.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer graphics",
}

@Article{Bleher:1980:GIA,
  author =       "J. H. Bleher and P. G. Caspers and H. H. Henn and K.
                 Maerker",
  title =        "A Graphic Interactive Application Monitor",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "3",
  pages =        "382--402",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A comprehensive interactive graphic system is
                 described that provides an environment for development
                 and execution of graphic applications. It features an
                 interactive graphic command language, a hierarchical
                 structure of system, semantics, and storage, a
                 set-oriented data concept, and library facilities.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer graphics",
}

@Article{Anonymous:1980:Ad,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "3",
  pages =        "403--407",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1980:SRa,
  author =       "Anonymous",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "3",
  pages =        "408--410",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Thiel:1980:Pd,
  author =       "Connie A. Thiel",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "4",
  pages =        "412--413",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Mills:1980:MSE,
  author =       "H. D. Mills",
  title =        "The management of software engineering, Part {I}:
                 Principles of software engineering",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "4",
  pages =        "414--420",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:55:55 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{ONeill:1980:MSE,
  author =       "D. O'Neill",
  title =        "The management of software engineering, Part {II}:
                 Software engineering program",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "4",
  pages =        "421--431",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat May 04 13:34:56 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Linger:1980:MSE,
  author =       "R. C. Linger",
  title =        "The management of software engineering, Part {III}:
                 Software design practices",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "4",
  pages =        "432--450",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Dyer:1980:MSE,
  author =       "M. Dyer",
  title =        "The management of software engineering, Part {IV}:
                 Software development practices",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "4",
  pages =        "451--465",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Quinnan:1980:MSE,
  author =       "R. E. Quinnan",
  title =        "The management of software engineering, Part {V}:
                 Software engineering management practices",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "4",
  pages =        "466--477",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Mishelevich:1980:ADS,
  author =       "David J. Mishelevich and Don {Van Slyke}",
  title =        "Application Development System --- the Software
                 Architecture of the {IBM Health Care Support}\slash
                 {DL/I}-Patient Care System",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "4",
  pages =        "478--504",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Application development productivity is a broad-based
                 concern. A system answering this concern is the IBM
                 Health Care Support\slash DL/I-Patient Care System. The
                 system is of general importance because its application
                 development system architecture is not application
                 specific and thus can be used for the rapid development
                 of many types of on-line systems. The application
                 productivity has been clearly and successfully
                 demonstrated in the real working environment of the
                 Dallas County Hospital District (Parkland Memorial
                 Hospital) and other sites. This study provides an
                 architectural overview followed by a description with
                 an example of CRT (cathode ray tube) screen and print
                 format design and coding and an examination of a data
                 collection list to demonstrate the power of that
                 facility.",
  acknowledgement = ack-nhfb,
  classification = "461; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer software; health care",
}

@Article{Katz:1980:SCL,
  author =       "Shumel Katz and Lawrence J. Risman and Michael Rodeh",
  title =        "A System for Constructing Linear Programming Models",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "4",
  pages =        "505--520",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The use of linear programming is impeded by the effort
                 required to express a model as a matrix and to collect
                 and handle data. An experimental interactive system
                 called LPMODEL simplifies the development of linear
                 programming models. It frees the user from the
                 necessity of expressing the model as a matrix. LPMODEL
                 provides a nonprocedural language for constructing a
                 model in terminology that is natural to the problem,
                 using ordinary algebraic expressions. The design of the
                 system and its terminology and data base subsystems are
                 discussed. An informal description is given of the
                 modeling language which involves both ordinary
                 arithmetic operations and symbolic operations with
                 associated semantics. Experience with the system in
                 agricultural modeling is described.",
  acknowledgement = ack-nhfb,
  classification = "921",
  journalabr =   "IBM Syst J",
  keywords =     "mathematical programming, linear",
}

@Article{Gordon:1980:MAC,
  author =       "R. Douglas Gordon",
  title =        "The {Modular Application Customizing System}",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "4",
  pages =        "521--541",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A system for generating application program packages
                 for use on small computers can produce both
                 questionnaire-tailored packages for individual users
                 and standard packages for general distribution.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming",
}

@Article{Belady:1980:GED,
  author =       "Laszio A. Belady and Carlo J. Evangelisti and Leigh R.
                 Power",
  title =        "{GREENPRINT} --- a Graphic Representation of
                 Structured Programs",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "4",
  pages =        "542--553",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "To improve the readability of programs over existing
                 techniques, a new program representation termed
                 GREENPRINT has been developed and is discussed in this
                 paper. GREENPRINTs (the name taken from the phosphor
                 fluorescence of certain display terminals and
                 paralleling the term blueprints) are tree-structured
                 diagrams together with source code statements that
                 represent the control structure of programs. Discussed
                 in this study are the diagramming conventions, control
                 flow methodology, presentation graphics, and practical
                 experience with GREENPRINTs.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming",
}

@Article{Anonymous:1980:Ae,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "4",
  pages =        "554--557",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1980:SRb,
  author =       "Anonymous",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "4",
  pages =        "558--559",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1980:C,
  author =       "Anonymous",
  title =        "Contents: 1980",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "4",
  pages =        "560--561",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Thiel:1981:Pa,
  author =       "Connie A. Thiel",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "1",
  pages =        "2--3",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{DeSousa:1981:EII,
  author =       "M. R. DeSousa",
  title =        "Electronic information interchange in an office
                 environment",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "1",
  pages =        "4--22",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Sandberg:1981:PRD,
  author =       "G. Sandberg",
  title =        "A primer on relational data base concepts",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "1",
  pages =        "23--40",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  MRclass =      "68H05",
  MRnumber =     "81m:68083",
  bibdate =      "Wed Dec 4 12:50:21 MST 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Blasgen:1981:SRA,
  author =       "M. W. Blasgen and M. M. Astrahan and D. D. Chamberlin
                 and J. N. Gray and W. F. King and B. G. Lindsay and R.
                 A. Lorie and J. W. Mehl and T. G. Price and G. R.
                 Putzolu and M. Schkolnick and P. G. Selinger and D. R.
                 Slutz and H. R. Strong and I. L. Traiger and B. W. Wade
                 and R. A. Yost",
  title =        "{System R}: An architectural overview",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "1",
  pages =        "41--62",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  MRclass =      "68H05",
  MRnumber =     "81m:68079",
  bibdate =      "Wed Dec 4 12:50:21 MST 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Major:1981:PIP,
  author =       "J. B. Major",
  title =        "Processor, {I/O} path, and {DASD} configuration
                 capacity",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "1",
  pages =        "63--85",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Halpern:1981:USA,
  author =       "P. Halpern and J. W. Rettberg",
  title =        "User-definable software applied to a real-time ambient
                 air quality monitoring system",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "1",
  pages =        "86--103",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1981:Aa,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "1",
  pages =        "104--105",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1981:SRa,
  author =       "Anonymous",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "1",
  pages =        "106--107",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1981:AI,
  author =       "Anonymous",
  title =        "Author index: 1975--1981",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "1",
  pages =        "108--113",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1981:SI,
  author =       "Anonymous",
  title =        "Subject index: 1975--1981",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "1",
  pages =        "114--118",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Branscomb:1981:FHS,
  author =       "L. M. Branscomb",
  title =        "Foreword: The Human Side of Computers",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "2",
  pages =        "120--121",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Thiel:1981:Pb,
  author =       "Connie A. Thiel",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "2",
  pages =        "122--122",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hirsch:1981:PHF,
  author =       "R. S. Hirsch",
  title =        "Procedures of the {Human Factors Center at San Jose}",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "2",
  pages =        "123--171",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Judisch:1981:EMS,
  author =       "J. M. Judisch and B. A. Rupp and R. A. Dassinger",
  title =        "Effects of manual style on performance in education
                 and machine maintenance",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "2",
  pages =        "172--183",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Miller:1981:NLP,
  author =       "L. A. Miller",
  title =        "Natural Language Programming: {Styles}, Strategies,
                 and Contrasts",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "2",
  pages =        "184--215",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  review =       "ACM CR 8203-39149",
}

@Article{Ominsky:1981:HFD,
  author =       "M. Ominsky",
  title =        "Human factors in the development of a family of plant
                 data communications",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "2",
  pages =        "216--236",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Thomas:1981:HFC,
  author =       "J. C. Thomas and J. M. Carroll",
  title =        "Human factors in communication",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "2",
  pages =        "237--263",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1981:Ab,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "2",
  pages =        "264--265",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1981:SRb,
  author =       "Anonymous",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "2",
  pages =        "266--267",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Thiel:1981:Pc,
  author =       "Connie A. Thiel",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "3",
  pages =        "270--271",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Clark:1981:SST,
  author =       "I. A. Clark",
  title =        "Software Simulation as a Tool for Usable Product
                 Design",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "3",
  pages =        "272--293",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A design exercise performed by human factors
                 specialists is described. In this exercise a
                 front-of-screen simulation of the Interactive Chart
                 Utility was written before a working prototype was
                 available in order to draft and test a series of
                 on-line instructional (HELP) panels for incorporation
                 into the final product. Trials were run in which the
                 keyboard activity and utterances of naive subjects were
                 recorded for later action replay, before and after
                 redrafting the simulation. Three objective measures to
                 detect the resulting improvement are considered, and
                 the most robust identified.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer simulation; computer software",
}

@Article{Helander:1981:ISU,
  author =       "G. A. Helander",
  title =        "Improving System Usability for Business
                 Professionals",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "3",
  pages =        "294--305",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "As businesses increase their emphasis on productivity,
                 data processing departments face rising demand for
                 computer services from people with no data processing
                 training or background. A discussion is presented of
                 some usability considerations and how they were applied
                 in developing an end user system.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital",
}

@Article{Bethke:1981:IUP,
  author =       "F. J. Bethke and W. M. Dean and P. H. Kaiser and E.
                 Ort and F. H. Pessin",
  title =        "Improving the Usability of Programming Publications",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "3",
  pages =        "306--320",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A summary is presented of the work of a study group on
                 ways to improve the usability of publications that
                 support programming products. Task orientation, an
                 approach to providing, organizing, and packaging
                 information, is covered, together with innovations to
                 improve the usability of programming publications:
                 ease-of-use education, measurement of user opinion, and
                 incorporating usability into the publications
                 development process.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming; programming publications",
}

@Article{Gardner:1981:SAO,
  author =       "P. C. {Gardner, Jr.}",
  title =        "A System for the Automated Office Environment",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "3",
  pages =        "321--345",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A review of the history of an office system
                 application is presented, highlighting the learning
                 process that took place during its evolutionary
                 development. The general application architecture is
                 discussed with a specific focus on the use of virtual
                 machines. Functional details of the various components
                 are described, and the key distinction between office
                 systems and office automation is addressed. The study
                 also discusses usage of the system and points up some
                 of the benefits being realized by current users of a
                 prototype system in IBM. The application function
                 review details the electronic document distribution
                 capabilities of the system.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital; data processing --- Word
                 Processing; office automation",
}

@Article{Misra:1981:CAM,
  author =       "P. N. Misra",
  title =        "Capacity analysis of the {Mass Storage System}",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "3",
  pages =        "346--360",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Performance of the IBM 3850 Mass Storage System (MSS)
                 is analyzed with a view toward workload planning.
                 Simple analytical models are discussed. The notion of
                 staging capacity of the MSS is defined and analyzed.
                 The main result is a set of staging capacity curves
                 that define the processing ability of the MSS to stage
                 and destage data to support concurrent execution of the
                 user programs.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data storage, digital; mass storage system; queueing,
                 memory hierarchy, Devices, memory hierarchy,
                 Architectures",
}

@Article{Anonymous:1981:Ac,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "3",
  pages =        "361--362",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1981:SRc,
  author =       "Anonymous",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "3",
  pages =        "363--364",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1981:R,
  author =       "Anonymous",
  title =        "Referees",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "3",
  pages =        "365--367",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lacy:1981:P,
  author =       "John Lacy",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "4",
  pages =        "370--371",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Christensen:1981:PSS,
  author =       "Ken Christensen and George P. Fitsos and Charles P.
                 Smith",
  title =        "A Perspective on Software Science",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "4",
  pages =        "372--387",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This study provides an overview of a new approach to
                 the measurement of software. The measurements are based
                 on the count of operators and operands contained in a
                 program. The measurement methodologies are consistent
                 across programming language barriers. Practical
                 significance is discussed, and areas are identified for
                 additional research and validation.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer software",
}

@Article{Joslin:1981:SPF,
  author =       "Philip H. Joslin",
  title =        "{System Productivity Facility}",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "4",
  pages =        "388--406",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A discussion is presented of the purpose and design of
                 a program called the System Productivity Facility
                 (SPF). Perspective is provided by means of a brief
                 summary of the earlier Structured Programming Facility
                 (also termed SPF) and the requirements that led to a
                 transformation of the earlier program into a new
                 cross-system dialog manager. The new control facilities
                 are explained to illustrate how the dialog manager
                 supports a wide variety of interactive applications.
                 Ways in which application development is simplified in
                 the areas of data handling and display processing are
                 explored. The purpose of the new table and file
                 tailoring services is explained, and the error recovery
                 philosophy is described.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programs",
}

@Article{Thadhani:1981:IUP,
  author =       "A. J. Thadhani",
  title =        "Interactive User Productivity",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "4",
  pages =        "407--423",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Interactive user productivity is a measure of
                 effective communication between man and the computer.
                 Explored in this study is the relationship between
                 computer response time and user performance, and the
                 separation of user cost from system cost. Strategies
                 for effectively managing installations are presented
                 and discussed.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital",
}

@Article{Chess:1981:VRL,
  author =       "David M. Chess and Gerald Waldbaum",
  title =        "The {VM\slash 370 Resource Limiter}",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "4",
  pages =        "424--437",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The VM\slash 370 Resource Limiter (RESLIM), a facility
                 available on the computer systems of the IBM Thomas J.
                 Watson Research Center, enables users, user management,
                 and the site's Computing Center to monitor and control
                 usage of various computing resources. If a user's
                 consumption of a particular resource exceeds a
                 previously established limit, RESLIM takes actions
                 designed to improve system performance and resource
                 availability. Possible actions include degrading the
                 user's priority, forcing the user off the system, or
                 simply sending a warning message to the user and\slash
                 or other VM users.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital",
}

@Article{Encarnacao:1981:FGK,
  author =       "J. Encarnacao",
  title =        "Forum: Graphical Kernel System",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "4",
  pages =        "438--440",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1981:Ad,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "4",
  pages =        "441--442",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1981:SRd,
  author =       "Anonymous",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "4",
  pages =        "443--444",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1981:C,
  author =       "Anonymous",
  title =        "Contents: 1981",
  journal =      j-IBM-SYS-J,
  volume =       "20",
  number =       "4",
  pages =        "445--446",
  year =         "1981",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lacy:1982:Pa,
  author =       "John Lacy",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "1",
  pages =        "2--3",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Davis:1982:SIR,
  author =       "G. B. Davis",
  title =        "Strategies for Information Requirements
                 Determination",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "1",
  pages =        "4--30",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This study identifies two major levels of
                 requirements: the organizational information
                 requirements reflected in a planned portfolio of
                 applications and the detailed information requirements
                 to be implemented in a specific application. The
                 constraints on humans as information processors are
                 described in order to explain why ``asking'' users for
                 information requirements may not yield a complete,
                 correct set. Various strategies for obtaining
                 information requirements are explained. Examples are
                 given of methods that fit each strategy. A contingency
                 approach is then presented for selecting an information
                 requirements determination strategy. The contingency
                 approach is explained both for defining organizational
                 information requirements and for defining specific,
                 detailed requirements in the development of an
                 application.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data base systems; information systems",
}

@Article{Zachman:1982:BSP,
  author =       "J. A. Zachman",
  title =        "{Business Systems Planning} and {Business Information
                 Control Study}: a comparison",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "1",
  pages =        "31--53",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Business Systems Planning (BSP) and Business
                 Information Control Study (BICS) are two information
                 system planning study methodologies that specifically
                 employ enterprise analysis techniques in the course of
                 their analyses. Underlying the BSP and BICS analyses
                 are the data management problems that result from
                 systems design approaches that optimize the management
                 of technology at the expense of managing the data. In
                 comparing BSP and BICS, five similarities and five
                 differences are selected for discussion, and, finally,
                 the strengths and weaknesses of each methodology are
                 noted. The choice between using one or the other
                 methodology is strongly influenced by the immediate
                 intent of the study sponsor, tempered by the limiting
                 factors currently surrounding the BICS methodology.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data base systems; data processing, business",
}

@Article{Sakamoto:1982:SBS,
  author =       "J. G. Sakamoto and F. W. Ball",
  title =        "Supporting Business Systems Planning Studies with the
                 {DB\slash DC} Data Dictionary",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "1",
  pages =        "54--80",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A description is given of one approach for computer
                 assistance to such a study. The Extensibility facility
                 of the IBM db\slash dc Data Dictionary is shown to
                 satisfy the requirements for the capturing of and
                 subsequent reporting on BSP study data. The possibility
                 of extending this approach to follow-on software
                 development activities is discussed. General overviews
                 of the Business Systems Planning methodology and the
                 IBM db\slash dc Data Dictionary are also provided.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data base systems; information systems",
}

@Article{Newman:1982:TID,
  author =       "P. S. Newman",
  title =        "Towards an Integrated Development Environment",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "1",
  pages =        "81--107",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Problems of application-system cost, control, and
                 effectiveness can best be addressed by highly
                 consistent development and execution environments. This
                 study examines some relevant new approaches (systems
                 description languages, new data models, application
                 generators, and very-high-level languages), discusses
                 the need for additional integration, and outlines a
                 particular integration direction. This direction is
                 intended to illustrate both the kind of consolidation
                 needed and some of the problems involved.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer software",
}

@Article{Parker:1982:EIA,
  author =       "M. M. Parker",
  title =        "Enterprise Information Analysis: Cost-Benefit Analysis
                 and the Data-Managed System",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "1",
  pages =        "108--123",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This study explores the problems associated with
                 moving from a ``traditional'' (data processing)
                 financial justification of a system that is based
                 largely on measurable costs and benefits to a financial
                 justification of a system based largely on an
                 assessment of intangible costs and benefits,
                 technological change, and risk and uncertainty. A
                 taxonomy is provided which can be used to supplement
                 the value analysis found in the Business Systems
                 Planning methodology. Extensive references are included
                 as a guide to supplementary reading.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data processing, business",
}

@Article{Anonymous:1982:Aa,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "1",
  pages =        "124--125",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1982:SRa,
  author =       "Anonymous",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "1",
  pages =        "126--128",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lacy:1982:Pb,
  author =       "John Lacy",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "2",
  pages =        "130--130",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hammond:1982:MCI,
  author =       "Lynn W. Hammond",
  title =        "Management considerations for an {Information
                 Center}",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "2",
  pages =        "131--161",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A discussion is presented of what should be done in
                 setting up an Information Center as part of an
                 Information Systems group within a business
                 organization. The Information Center is defined,
                 including a user's viewpoint. Three key areas --- the
                 mission, organization and position, and staffing ---
                 are addressed. A procedure on how to initiate the
                 center is presented. In general, the paper shows what
                 an Information Center environment can be and how it
                 might fit into a business organization.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data processing",
}

@Article{Stevens:1982:HDF,
  author =       "Wayne P. Stevens",
  title =        "How Data Flow Can Improve Application Development
                 Productivity",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "2",
  pages =        "162--178",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This study presents the technique of data flow and how
                 it can substantially improve application development
                 productivity. Flows of data are the only connections
                 needed between functional components of a computer
                 program. Components which pass only data are so
                 independent that they can easily be shared and reused.
                 Such components can be developed independently, which
                 substantially reduces the complexity of development and
                 makes them much easier and faster to design, implement,
                 test, and change. Building programs in this way can
                 yield substantial increases in productivity over
                 developing monolithic programs or even structures of
                 called modules. The compatibility of data flow to
                 natural human views of applications and other parts of
                 data processing, such as distributed processing and
                 high-performance architectures, is also presented.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computers",
}

@Article{George:1982:SFC,
  author =       "Frederick D. George and Gerald E. Young",
  title =        "{SNA} Flow Control: Architecture and Implementation",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "2",
  pages =        "179--210",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "To allow better network utilization, Systems Network
                 Architecture (SNA), the IBM data communications
                 architecture, includes flow control procedures to guard
                 against data overrun to devices and to prevent network
                 congestion. The measurement of ``congestion'' used by
                 SNA to regulate traffic flow is performed by various
                 SNA products. This work describes the flow control
                 protocols in SNA and the implementation of these
                 protocols in the Network Control Program (ACF\slash
                 NCP\slash VS Release 3).",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks",
}

@Article{Pearsall:1982:TAE,
  author =       "Ronald J. Pearsall",
  title =        "Technique for Assessing External Design of Software",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "2",
  pages =        "211--219",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Discussed is a methodology of creating and using
                 scenarios to assess completeness, correctness,
                 consistency, and usability of the external design of
                 computer software. Scenarios are paper tests of the
                 specifications of software being designed. The approach
                 is an outside-in, user-oriented evaluation of programs.
                 The technique requires no machine time to perform the
                 evaluation. As a result, defects are identified and
                 changes are recommended early in the design phase of
                 software development, at the time when defect removal
                 costs are lowest.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer software",
}

@Article{Schick:1982:DIA,
  author =       "Thomas Schick and Robert F. Brockish",
  title =        "The {Document Interchange Architecture}: a Member of
                 a Family of Architectures in the {SNA} Environment",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "2",
  pages =        "220--244",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A wide variety of products for the office is now
                 available, permitting increased automation of office
                 procedures. To realize their full potential, these
                 products must be able to exchange information and
                 control requests with one another. A family of
                 architectures has been defined to satisfy this need.
                 This work provides an overview of this family of
                 architectures, including their relationship to one
                 another. One member of this family, the Document
                 Interchange Architecture, is described in some detail.
                 An example illustrates use of the family of
                 architectures in an office environment.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data processing, business",
}

@Article{Anonymous:1982:Ab,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "2",
  pages =        "245--246",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lacy:1982:Pc,
  author =       "John Lacy",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "3",
  pages =        "248--249",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Chamberlin:1982:JID,
  author =       "D. D. Chamberlin and O. P. Bertrand and M. J.
                 Goodfellow and J. C. King and D. R. Slutz and S. J. P.
                 Todd and B. W. Wade",
  title =        "{JANUS}: an Interactive Document Formatter Based on
                 Declarative Tags",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "3",
  pages =        "250--271",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A description is given of the architecture of an
                 experimental document composition system named JANUS,
                 which is intended to support authors of complex
                 documents containing mixtures of text and images. The
                 JANUS system is highly interactive, providing authors
                 with immediate feedback and direct electronic control
                 over page layouts, using a special two-display
                 workstation. Authors communicate with the system by
                 marking up their documents with high-level descriptive
                 ``tags''. A tag definition language is provided whereby
                 new tags may be defined and the format of each tagged
                 object may be controlled.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data processing",
}

@Article{Zloof:1982:OBL,
  author =       "M. M. Zloof",
  title =        "{Office-by-Example}: a business language that
                 unifies data and word processing and electronic mail",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "3",
  pages =        "272--304",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The age of the nonprogrammer user of computing systems
                 is at hand, bringing with it the special need of
                 persons who are professionals in their own right to
                 have easy ways to use a computing system. Through the
                 programming language discussed in this study,
                 executives and other office personnel can perform data
                 and word processing and communications via terminals.
                 This language, called Office-by-Example, provides rich
                 and powerful access to the computing system
                 computation, data base, communication, and display
                 facilities. Discussed and illustrated by examples are a
                 two-dimensional screen editor, triggers, and data
                 bases, as well as word processing, electronic mail,
                 customized menus, and application development.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming languages; data processing ---
                 Word Processing; electronic mail",
}

@Article{Heidorn:1982:ETS,
  author =       "G. E. Heidorn and K. Jensen and L. A. Miller and R. J.
                 Byrd and M. S. Chodorow",
  title =        "The {EPISTLE} Text-Critiquing System",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "3",
  pages =        "305--326",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The experimental EPISTLE system is intended to provide
                 ``intelligent'' functions for processing business
                 correspondence and other texts in an office
                 environment. This work focuses on the initial
                 objectives of the system: critiquing written materials
                 on points of grammar and style. The overall system is
                 described, with some details of the implementation, the
                 user interface, and the three levels of processing,
                 especially the syntactic parsing of sentences with a
                 computerized English grammar.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data processing",
}

@Article{Lum:1982:OOP,
  author =       "V. Y. Lum and D. M. Choy and N. C. Shu",
  title =        "{OPAS}: an Office Procedure Automation System",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "3",
  pages =        "327--350",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A discussion is presented of an experimental system
                 being developed to support office automation. The
                 emphasis of this study is on a technology that allows
                 people to automate their office and business
                 activities. Specifically, using forms as the interface,
                 the authors propose a powerful data manipulation and
                 restructuring facility that not only allows users to
                 extract and manipulate data in the forms, but can be
                 used to interface between new and existing applications
                 as well. Since business and office procedures are not
                 discrete activities, but a structured sequence of
                 activities, a means to define and execute procedures is
                 required. Such a means is described along with its
                 model and an example of its application.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data processing; office automation",
}

@Article{Bullen:1982:CSO,
  author =       "Christine V. Bullen and John L. Bennett and Eric D.
                 Carlson",
  title =        "A Case Study of Office Workstation Use",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "3",
  pages =        "351--369",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A description is given of the use of the Office
                 Analysis Methodology to study a research office
                 environment in order to determine requirements for an
                 advanced office workstation. The research site
                 environment is unique in providing an opportunity to
                 observe a natural growth pattern in the use of advanced
                 technology. Specific workstation requirements are
                 identified and are being implemented. Interesting
                 observations are reported in the following areas:
                 categories of secretarial work, use of existing
                 workstations, influence of a community of users, access
                 to shared services, and effects on productivity and
                 organizational behavior.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data processing",
}

@Article{Anonymous:1982:Ac,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "3",
  pages =        "370--374",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1982:SRb,
  author =       "Anonymous",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "3",
  pages =        "375--377",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1982:Ba,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "3",
  pages =        "378--379",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lacy:1982:Pd,
  author =       "John Lacy",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "4",
  pages =        "382--383",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Botterill:1982:DRS,
  author =       "J. Howard Botterill",
  title =        "The Design Rationale of the {System\slash 38} User
                 Interface",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "4",
  pages =        "384--423",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A discussion is presented of the rationale behind the
                 design of the software user interface of the
                 System\slash 38. A presentation is made of the design
                 approaches used to produce a highly usable interactive
                 system. The three primary system user interfaces are
                 also presented, showing how the approaches were used in
                 their design.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer interfaces; computer systems, digital ---
                 Interactive Operation",
}

@Article{Dean:1982:HCS,
  author =       "Morris Dean",
  title =        "How a Computer Should Talk to People",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "4",
  pages =        "424--453",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Consideration is given to the topic of things computer
                 programs or systems say to people --- in particular,
                 computer messages for users. Insights are presented
                 into the philosophy of creating good computer messages,
                 how people think and feel around computers, how to
                 analyze the situations in which people need a message,
                 what to say in a message and how to say it, why
                 imagination is invaluable for creating and evaluating
                 messages, what technical questions must be answered in
                 order to design and build a program or system that can
                 talk effectively to people.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming; computer systems, digital",
}

@Article{Deitch:1982:AQM,
  author =       "Martin Deitch",
  title =        "Analytic Queuing Model for {CICS} Capacity Planning",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "4",
  pages =        "454--470",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "In recent years there has been a growing need to
                 develop techniques and tools for computer installation
                 capacity planning. This study presents both a tool, in
                 the form of an analytic queuing model, and a
                 methodology for performance analysis and capacity
                 planning. Although general in its approach, the model
                 was developed specifically for the CICS\slash VS
                 environment.",
  acknowledgement = ack-nhfb,
  classification = "723; 922",
  journalabr =   "IBM Syst J",
  keywords =     "data processing; probability --- Queueing Theory",
}

@Article{Acker:1982:MDP,
  author =       "Robert D. Acker and Philip H. Seaman",
  title =        "Modeling Distributed Processing Across Multiple
                 {CICS\slash VS} Sites",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "4",
  pages =        "471--489",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Modeling is a useful method to aid a planner in
                 designing the interconnection of a number of systems
                 for distributed data processing. In the implementation
                 in this study, a computer-based model for sites using
                 CICS\slash VS is discussed. The model permits the
                 system definition to be adjusted, taking into account
                 such aspects as the number of sites, their
                 interconnections, and workloads, so that a satisfactory
                 configuration can be obtained.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital",
}

@Article{Strickland:1982:IES,
  author =       "Jimmy P. Strickland and Peter P. Uhrowczik and Vern L.
                 Watts",
  title =        "{IMS\slash VS}: an Evolving System",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "4",
  pages =        "490--510",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Recent advances in the following categories of
                 IMS\slash VS functions are discussed: Fast Path, Data
                 Sharing, System Logging, Data Base Recovery Control,
                 on-line changes in system environment, Intersystem
                 Communications, MVS Common Services Area usage, and
                 architectural restructuring.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "database systems",
}

@Article{Anonymous:1982:Ad,
  author =       "Anonymous",
  title =        "Authors",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "4",
  pages =        "511--513",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1982:SRc,
  author =       "Anonymous",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "4",
  pages =        "514--515",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1982:Bb,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "4",
  pages =        "516--520",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1982:C,
  author =       "Anonymous",
  title =        "Contents: 1982",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "4",
  pages =        "521--521",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1982:R,
  author =       "Anonymous",
  title =        "Reprints",
  journal =      j-IBM-SYS-J,
  volume =       "21",
  number =       "4",
  pages =        "522--528",
  year =         "1982",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anastassiou:1983:SVS,
  author =       "Dimitris Anastassiou and Hugh C. Jones and J. L.
                 Mitchell and William B. Pennebaker and Keith S.
                 Pennington and Marvin K. Brown",
  title =        "{Series/1}-Based Videoconferencing System",
  journal =      j-IBM-SYS-J,
  volume =       "22",
  number =       "1-2",
  pages =        "97--110",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Discussed is a new videoconferencing system that has
                 been developed and deployed at several locations. This
                 system transmits high-quality monochrome, freeze-frame
                 images over dial-up telephone lines between two (or
                 three) dedicated videoconferencing rooms. There are two
                 main system components. An IBM Series/1 provides
                 control, communication, data compression, and storage,
                 and a Grinnell GMR-270 image processing display system
                 implements image acquisition, processing, and video
                 buffering functions. Conference participants may choose
                 either a basically black and white rendering of an
                 image for fast transmission or a continuous-tone
                 rendering with a longer transmission time. Details are
                 given regarding the system configuration, function, and
                 operation.",
  acknowledgement = ack-nhfb,
  classification = "716",
  journalabr =   "IBM Syst J",
  keywords =     "telecommunication; videoconference",
}

@Article{Anonymous:1983:SRa,
  author =       "Anonymous",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "22",
  number =       "1/2",
  pages =        "165--166",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1983:SRb,
  author =       "Anonymous",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "22",
  number =       "4",
  pages =        "464--465",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1983:C,
  author =       "Anonymous",
  title =        "Contents: 1983",
  journal =      j-IBM-SYS-J,
  volume =       "22",
  number =       "4",
  pages =        "466--466",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lacy:1983:Pa,
  author =       "John Lacy",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "1/2",
  pages =        "2--3",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lacy:1983:Pd,
  author =       "John Lacy",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "1",
  pages =        "2--3",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Scherr:1983:PCC,
  author =       "A. L. Scherr",
  title =        "A perspective on communications and computing",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "1/2",
  pages =        "5--10",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Deaton:1983:XRR,
  author =       "George A. {Deaton, Jr.} and Richard A. {Hippert,
                 Jr.}",
  title =        "{X.25} and Related Recommendations in {IBM} Products",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "1-2",
  pages =        "11--29",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "IBM's use of Recommendation X. 25 and related
                 recommendations of the International Telegraph and
                 Telephone Consultative Committee is described. After
                 reviewing the development history of X. 25 and some of
                 the motivations for using it, the paper gives an
                 overview of packet-switched data networks. A brief
                 technical description is then given of Recommendation
                 X. 25 and some other recommendations used in
                 conjunction with X. 25. The architectural relationships
                 between X. 25 and IBM's Systems Network Architecture
                 (SNA) are described for packet-switched X. 25
                 connections between SNA nodes and for X. 25 connections
                 between SNA and non-SNA nodes. Specific elements of
                 Recommendation X. 25 used in SNA nodes are defined.
                 After several IBM products that support X. 25 and some
                 of the related recommendations are described, IBM's
                 equipment for testing the X. 25 interface is
                 discussed.",
  acknowledgement = ack-nhfb,
  classification = "723; 902",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks",
}

@Article{Moore:1983:TWL,
  author =       "Daniel J. Moore",
  title =        "Teletex --- a Worldwide Link Among Office Systems for
                 Electronic Document Exchange",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "1-2",
  pages =        "30--45",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Teletex is a new international telecommunication
                 service that provides direct electronic document
                 exchange between such office text machines as
                 electronic typewriters and word processors that are
                 equipped with transmitting and receiving storages.
                 Teletex is an international standard aimed at
                 integrating office products and worldwide
                 telecommunication. It represents a major step in the
                 development of the office of the future. This paper
                 traces the development of Teletex, describes its
                 characteristics, and looks at how this service may be
                 extended in the future.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "electronic mail",
}

@Article{Dixon:1983:TNL,
  author =       "Roy C. Dixon and Norman C. Strole and James D.
                 Markov",
  title =        "Token-Ring Network for Local Data Communications",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "1-2",
  pages =        "47--62",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper describes a local area network based on the
                 fundamental concepts of a token-ring. Two main ideas
                 are presented. The first idea concerns the physical
                 topology of the wiring network and its star-ring
                 organization. Next, the logical data flows are overlaid
                 on the physical network to provide control procedures
                 for exchanging data through the network. The resulting
                 system has unique features that produce a local area
                 network with good performance and reliability
                 characteristics.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks",
}

@Article{Mendelsohn:1983:RVF,
  author =       "Noah Mendelsohn and Mark H. Linehan and William J.
                 Anzick",
  title =        "Reflections on {VM\slash Pass-Through}: a Facility for
                 Interactive Networking",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "1-2",
  pages =        "63--79",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An introduction to Pass-Through networking describes
                 features of the system, supported configurations, and
                 use of Pass-Through within the IBM Corporation. A brief
                 history of Pass-Through's development is also provided.
                 Pass-Through is then used to motivate a technical
                 discussion of interactive network technology and
                 virtual machine subsystems. Topics covered include
                 appropriate use of the virtual machine environment,
                 choice of routing strategy, and performance
                 considerations.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks",
}

@Article{Fennel:1983:SCC,
  author =       "John W. {Fennel, Jr.} and Bruce D. Gobioff",
  title =        "Satellite Communications Controller",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "1-2",
  pages =        "81--95",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A satellite communications controller, which is a
                 component of satellite earth stations, establishes a
                 time division multiple access structure that provides
                 flexibility and efficiency in the use of satellite
                 transmission capacity. The controller blends digital,
                 computer, and communications technology to establish
                 precise timings required for system synchronization. It
                 also performs signal conversion and switching necessary
                 to transmit voice and business machine traffic over the
                 satellite. This paper discusses a particular satellite
                 communications system and the architecture and
                 implementation of the satellite communications
                 controller.",
  acknowledgement = ack-nhfb,
  classification = "716",
  journalabr =   "IBM Syst J",
  keywords =     "telecommunication systems, satellite relay",
}

@Article{Parr:1983:NHL,
  author =       "Francis N. Parr and Robert E. Strom",
  title =        "{NIL}: a High-Level Language for Distributed Systems
                 Programming",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "1-2",
  pages =        "111--127",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Network Implementation Language (NIL) is a high-level
                 programming language currently being used for the
                 implementation of prototype communication systems. NIL
                 is designed for writing executable architecture which
                 can be compiled into efficient code for the different
                 machines and run-time environments of a family of
                 communicating products. NIL's distinctive features
                 include (1) high-level primitive type families
                 supporting constructs needed for concurrent systems,
                 (2) facilities for decomposition of a system into
                 modules which can be dynamically installed and
                 interconnected, (3) compile-time typestate checking ---
                 a mechanism for enhancing language security without
                 incurring large execution-time overhead.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming languages; computer systems,
                 digital --- Distributed",
}

@Article{Sullivan:1983:CNM,
  author =       "Timothy P. Sullivan",
  title =        "Communications Network Management Enhancements for
                 {SNA} Networks: an Overview",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "1-2",
  pages =        "129--142",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Hierarchical growth and diversification of
                 communications networks have imposed new requirements
                 on Communications Network Management. This paper
                 presents the evolution to support included in IBM's
                 Systems Network Architecture to meet these needs. Four
                 main provisions of network management are discussed:
                 (1) the collection and presentation of downstream
                 network data on behalf of network resources by a
                 Threshold Analysis and Remote Access program; (2)
                 centralized network operator terminal access to local
                 and remote systems by a Terminal Access Facility; (3)
                 unsolicited alerting of the network operator by the
                 presentation of data from network resources by a
                 Network Problem Determination Application; and (4) the
                 collection and presentation of data for the logical
                 network by a Network Logical Data Manager.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks",
}

@Article{Garrigues:1983:ANM,
  author =       "Richard D. Garrigues",
  title =        "Application of Network Management at a Large Computing
                 Service",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "1-2",
  pages =        "143--164",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Productive operation of a large computer network
                 serving multiple user facilities in conjunction with
                 several host sites requires the use of network
                 management. As treated here, network management
                 includes an array of such methods as communication
                 systems management, problem management, change
                 management and inventory management. In this paper the
                 use of some of the management techniques is described
                 as they apply in an education support facility network.
                 The setup of the facility is first described; then some
                 of the techniques for managing its operation are
                 presented.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks",
}

@Article{Lacy:1983:Pb,
  author =       "John Lacy",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "3",
  pages =        "168--169",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Archibald:1983:ADP,
  author =       "J. L. Archibald and B. M. Leavenworth and L. R.
                 Power",
  title =        "Abstract Design and Program Translator: New Tools for
                 Software Design",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "3",
  pages =        "170--187",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Abstract Design And Program Translator (ADAPT) is an
                 integrated set of tools and approaches for the design
                 and development of software systems. Together they
                 include a module specification language and a system
                 design language for specifying module interfaces and
                 interconnections. This paper explains some of their
                 major features and illustrates their use in the design
                 of some examples --- a set of reusable software
                 components and a generalized editor system. Benefits of
                 the ADAPT approach are discussed, emphasizing
                 executable design and modifiability.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer software",
}

@Article{Pazel:1983:SAE,
  author =       "D. P. Pazel and A. Malhotra and H. M. Markowitz",
  title =        "The System Architecture of {EAS-E}: {An} Integrated
                 Programming and Data Base Language",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "3",
  pages =        "188--198",
  month =        mar,
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "EAS-E is an application development system based on an
                 entity-attribute-set view of system description. It
                 consists of a procedural language for manipulating data
                 base and main storage entities, and direct
                 (nonprocedural) facilities for interrogating and
                 updating data base entities. The EAS-E software itself
                 was implemented with the entity-attribute-set view.
                 This paper reviews some of the EAS-E features and
                 considers some of its implementation details. This
                 study is both an introduction to the EAS-E software
                 architecture and an example of the usefulness of the
                 entity-attribute-set view.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming languages; database systems",
}

@Article{Rogers:1983:SAC,
  author =       "G. R. Rogers",
  title =        "A Simple Architecture for Consistent Application
                 Program Design",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "3",
  pages =        "199--213",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This study addresses the architectural design aspects
                 of general business computer application programs
                 written in high-level procedural programming languages.
                 It puts forth design concepts for easily built,
                 maintainable programs and describes a unique approach
                 to program decomposition.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming",
}

@Article{Prager:1983:PAL,
  author =       "J. M. Prager",
  title =        "The {Project Automated Librarian}",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "3",
  pages =        "214--228",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The Project Automated Librarian (PAL) is a tool that
                 has been created to manage the logistical problems
                 inherent in a medium-sized software development
                 project. The main goals of PAL are to eliminate the
                 problems of simultaneous updates to software modules,
                 while allowing programmers access to the latest
                 possible versions of the software. PAL also seeks to
                 prevent the software from getting into an inconsistent
                 state that could prevent users from proceeding with
                 software development because of someone else's errors.
                 PAL is a general-purpose tool, in the sense that it
                 does not care what language or languages the system is
                 being written in. It makes backups, keeps version
                 information, and maintains documentation of changes.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer software",
}

@Article{Bird:1983:AGR,
  author =       "D. L. Bird and C. U. Munoz",
  title =        "Automatic Generation of Random Self-Checking Test
                 Cases",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "3",
  pages =        "228--245",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A technique of automatically generating random
                 software test cases is described. The nature of such
                 test cases ensures that they will execute to
                 completion, and their execution is predicted at the
                 time of generation. Wherever possible the test cases
                 are self-checking. At run-time their execution is
                 compared with the predicted execution. Also described
                 are implementations of the technique that have been
                 used to test various IBM programs --- PL/I language
                 processors, sort\slash merge programs, and Graphical
                 Data Display Manager alphanumeric and graphics
                 support.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer software",
}

@Article{Maurer:1983:FTI,
  author =       "M. E. Maurer",
  title =        "Full-Screen Testing of Interactive Applications",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "3",
  pages =        "246--261",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A description is given of the dialog test functions of
                 the Interactive System Productivity Facility\slash
                 Program Development Facility program product, with
                 emphasis on the full-screen design that makes it
                 unique. Perspective is provided by a brief summary of
                 the test facilities available in the predecessor System
                 Productivity Facility program product (SPF) and the
                 requirements that led to their enhancement.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming",
}

@Article{Misra:1983:SRA,
  author =       "P. N. Misra",
  title =        "Software Reliability Analysis",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "3",
  pages =        "262--270",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Methods proposed for software reliability prediction
                 are reviewed. A case study is then presented of the
                 analysis of failure data from a Space Shuttle software
                 project to predict the number of failures likely during
                 a mission, and the subsequent verification of these
                 predictions.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer software",
}

@Article{Power:1983:DUP,
  author =       "L. R. Power",
  title =        "Design and Use of a Program Execution Analyzer",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "3",
  pages =        "271--294",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Execution analyzers are used to improve the
                 performance of programs, operating systems, and
                 hardware systems. This study presents a general
                 overview of these tools, especially those designed for
                 use by application programmers. The design tradeoffs of
                 a wide variety of execution analyzers are examined. In
                 addition, the design and use of a new execution
                 analyzer are presented; its purpose is to assist in the
                 optimization of highly modular PL/I programs.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming",
}

@Article{Lacy:1983:Pc,
  author =       "John Lacy",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "296--297",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gray:1983:APC,
  author =       "J. P. Gray and P. J. Hansen and P. Homan and M. A.
                 Lerner and M. Pozefsky",
  title =        "Advanced Program-To-Program Communication in {SNA}",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "298--318",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Systems Network Architecture (SNA) defines the
                 behavior of networks of heterogeneous, loosely coupled
                 processors. A description is given of the development
                 of program-to-program communication services in SNA and
                 introduces Advanced Program-to-Program Communication
                 (APPC), the culmination of this development. Also
                 discussed is the use of APPC in the construction of
                 distributed services and shows that SNA with APPC and
                 other SNA services can be thought of as a distributed
                 operating system.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks; data transmission",
}

@Article{Housel:1983:SDS,
  author =       "B. C. Housel and C. J. Scopinich",
  title =        "{SNA} Distribution Services",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "319--343",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A description is given of the IBM SNA Distribution
                 Services (SNADS). SNA has focused on synchronous data
                 distribution. Along with the advent of office systems
                 and other distributed applications has come the
                 requirement to provide a common architecture for
                 interchanging data asynchronously among diverse systems
                 and products. SNA Distribution Services provides a
                 general asynchronous (delayed delivery) data
                 distribution facility for SNA applications. The initial
                 implementations are for office systems applications.
                 Discussed are objectives for an asynchronous data
                 distribution service, key architectural concepts, the
                 relationship between SNADS and the SNA synchronous
                 communication architecture, and the interface between
                 the distribution service and application transaction
                 programs.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks; data transmission",
}

@Article{Benjamin:1983:ISN,
  author =       "J. H. Benjamin and M. L. Hess and R. A. Weingarten and
                 W. R. Wheeler",
  title =        "Interconnecting {SNA} Networks",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "344--366",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Systems Network Architecture (SNA) allows terminals
                 and application programs to communicate with one
                 another using SNA entities called logical units. Until
                 now, these logical units have had to be in the same
                 network to communicate. This paper describes recently
                 introduced SNA network interconnection functions that
                 allow logical units in independent SNA networks to
                 communicate with one another. Each network is
                 configured, defined, and managed separately. By using
                 one or more facilities called gateways, networks can
                 remain independent while their logical units initiate,
                 use, and terminate internetwork sessions, without any
                 changes to themselves. A communications user need not
                 be aware that a session partner is in a separate
                 network.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks",
}

@Article{Ryder:1983:EAS,
  author =       "K. D. Ryder",
  title =        "An Experimental Address Space Isolation Technique for
                 {SNA} Networks",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "367--386",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The integration of computer networks has led to
                 increasingly large and complex configurations. This
                 integration has resulted in concern for the
                 availability of resources for the merged networks. An
                 experimental technique called TRAP has been developed
                 as a way to minimize the constraints on such networks.
                 It allows address space isolation between
                 interconnected networks. This paper discusses the
                 technique and its fundamental process of network
                 address translation.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks",
}

@Article{Weingarten:1983:LPD,
  author =       "R. A. Weingarten and E. E. Iacobucci",
  title =        "Logical Problem Determination for {SNA} Networks",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "387--403",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:18:11 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Problem determination on a Systems Network
                 Architecture network has dealt mostly with error
                 detection on physical network components. Adequate
                 logical error-detection mechanisms associated with the
                 logical network (software-related) errors have been
                 only recently provided with the announcement of a new
                 on-line interactive package called the Network Logical
                 Data Manager (NLDM). A discussion is presented of the
                 physical and logical network environments, logical
                 network problems, and functions provided by the two
                 releases of NLDM for logical problem determination.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks",
}

@Article{Bailey:1983:PAM,
  author =       "R. M. Bailey and R. C. Soucy",
  title =        "Performance and availability measurement of the {{IBM}
                 Information Network}",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "404--416",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A key requirement of a network service is the
                 management of specified service levels as perceived by
                 the end user. A capability for measuring and reporting
                 end user response time and availability is essential.
                 This paper describes measurement techniques to track
                 these key service-level attributes in the IBM
                 Information Network (IBM\slash IN). These techniques
                 apply to most complex SNA networks.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks",
}

@Article{Jaffe:1983:SRP,
  author =       "J. M. Jaffe and F. H. Moss and R. A. Weingarten",
  title =        "{SNA} Routing: Past, Present, and Possible Future",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "417--434",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A review is presented of the evolution of routing
                 mechanisms in IBM's Systems Network Architecture (SNA)
                 since its inception in 1974 to the present. Routing
                 mechanisms are related to changes in the application
                 and communications environment. Also discussed are
                 possible evolutionary paths that may be taken in the
                 future to address the problems of large heterogeneous
                 networks.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks",
}

@Article{Maruyama:1983:DRT,
  author =       "K. Maruyama",
  title =        "Defining Routing Tables for {SNA} Networks",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "435--450",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This study addresses three basic problems associated
                 with the definition process for the routing tables of
                 IBM's Systems Network Architecture (SNA). The paper
                 then introduces a program called the Routing Table
                 Generator (TRG) and describes how these problems were
                 solved with RTG. Also discussed are some approaches on
                 how to use RTG in managing routing tables for growing
                 networks.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks",
}

@Article{Grover:1983:WSF,
  author =       "G. A. Grover and K. Bharath-Kumar",
  title =        "Windows in the Sky --- Flow Control in {SNA} Networks
                 with Satellite Links",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "451--463",
  year =         "1983",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Geosynchronous communications satellites provide a
                 unique means of high-speed computer-to-computer
                 transmission of large volumes of data over long
                 distances. The physical distances involved in
                 transmitting to and from the satellites cause
                 relatively long propagation delays for messages. In
                 order that the high bandwidth be used effectively,
                 large quantities of data have to be transmitted before
                 pausing for an acknowledgment. This condition creates a
                 potential for some new and unique types of traffic
                 jams. This paper discusses these situations in the
                 context of Systems Network Architecture (SNA) networks.
                 In particular, the issues related to SNA's flow control
                 and traffic management facilities in the presence of
                 satellite links are discussed, along with potential
                 solutions to ensure efficient network operation.",
  acknowledgement = ack-nhfb,
  classification = "716; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks; telecommunication links,
                 satellite",
}

@Article{Beregi:1984:APS,
  author =       "William E. Beregi",
  title =        "Architecture Prototyping in the Software Engineering
                 Environment",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "1",
  pages =        "4--18",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The author explores a disciplined approach to software
                 development based on the use of formal specification
                 techniques to express software requirements and system
                 design. An examination is also made of how certain
                 techniques might be organized in a software
                 architecture prototyping facility that would be similar
                 to the Computer-Aided Design and Manufacturing (CADAM)
                 tools used in other engineering disciplines.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer software",
}

@Article{Thadhani:1984:FAP,
  author =       "Arvind J. Thadhani",
  title =        "Factors Affecting Programmer Productivity During
                 Application Development",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "1",
  pages =        "19--35",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The effects of good computer services on programmer
                 and project productivity during application program
                 development are examined. Programmers' terminal
                 activity and the nature of terminal work are analyzed.
                 The discussion includes the effects of short response
                 times, programmers' skills, and program complexity on
                 productivity.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming",
}

@Article{Lambert:1984:CSS,
  author =       "Geoffrey N. Lambert",
  title =        "A Comparative Study of System Response Time on Program
                 Developer Productivity",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "1",
  pages =        "36--43",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Skilled programmer time and computer time and
                 resources are valuable. Earlier studies had shown that
                 added computer resources can decrease system response
                 time and increase programmer productivity
                 significantly. A controlled study has been made to
                 determine whether that finding is true for the
                 particular conditions in another program development
                 organization. That study is reported. Programmer
                 productivity increased sixty-two percent with subsecond
                 system response time. A new finding is that individual
                 group project offices lead to greater efficiency than
                 large open rooms.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming",
}

@Article{Bozman:1984:AFA,
  author =       "Gerald Bozman and William Buco and Timothy P. Daly and
                 William H. Tetzlaff",
  title =        "Analysis of Free-Storage Algorithms --- Revisited",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "1",
  pages =        "44--64",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The subject of this study is the free-storage
                 management in the Virtual Machine\slash System Product
                 (VM\slash SP) system control program. As a part of this
                 study, simulations were done of established, and
                 proposed, dynamic storage algorithms for the VM\slash
                 SP operating system. Empirical evidence is given that
                 simplifying statistical assumptions about the
                 distribution of interarrival times and holding times
                 has high predictive ability. Algorithms such as
                 first-fit, modified first-fit, and best-fit are found
                 to be CPU-inefficient. Buddy systems are found to be
                 very fast but suffer from a high degree of internal
                 fragmentation.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming",
}

@Article{Gould:1984:SFO,
  author =       "John D. Gould and Stephen J. Boies",
  title =        "Speech Filing --- an Office System for Principals",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "1",
  pages =        "65--81",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Business people spend most of their time
                 communicating, or attempting to communicate, with
                 others. The authors briefly describe their ideas about
                 these communication activities and their resulting
                 problems, and then discuss an experimental tool
                 developed to help business people solve some of their
                 communication problems. This tool, called the Speed
                 Filing System, allows users to send messages to anybody
                 in the world and receive messages from anybody in the
                 world. The system offers powerful editing, filing,
                 retrieval, and message distribution and control
                 functions, using pushbutton telephones as the
                 terminals.",
  acknowledgement = ack-nhfb,
  classification = "718",
  journalabr =   "IBM Syst J",
  keywords =     "telecommunication",
}

@Article{Neal:1984:PME,
  author =       "Alan S. Neal and Roger M. Simons",
  title =        "Playback: a Method for Evaluating the Usability of
                 Software and its Documentation",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "1",
  pages =        "82--96",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Human factors evaluations of software products and
                 accompanying user publications must be conducted so
                 that developers can be certain that the target user
                 population can learn to use the product with a minimum
                 of difficulty and be able to perform the intended tasks
                 efficiently. A methodology is described for obtaining
                 objective measures of product usability by collecting
                 performance data on the user interface without
                 affecting the user or the system being evaluated. The
                 log of stored activity is later played back through the
                 host system for analysis.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer software",
}

@Article{Lacy:1984:Pa,
  author =       "John Lacy",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "2",
  pages =        "98--99",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Kahn:1984:OTR,
  author =       "S. Kahn",
  title =        "An overview of three relational data base products",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "2",
  pages =        "100--111",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Haderle:1984:IDO,
  author =       "Donald J. Haderle and Robert D. Jackson",
  title =        "{IBM} Database 2 Overview",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "2",
  pages =        "112--125",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "IBM Database 2 (DB2) is a data base management system
                 that supports the relational model of data. This paper
                 presents the major features of DB2 and discusses its
                 architecture and the relationship of DB2 with the host
                 operating system. These principles are illustrated by
                 an example.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems; database systems",
}

@Article{Sordi:1984:QMF,
  author =       "Joseph J. Sordi",
  title =        "The {Query Management Facility}",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "2",
  pages =        "126--150",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Data from a relational data base can be displayed in
                 reports, changed, and otherwise controlled using a
                 program called Query Management Facility (QMF). An
                 overview of this program is presented and is followed
                 by a discussion comparing equivalent forms of various
                 queries expressed in two distinctly different
                 languages. Both languages are designed for use with
                 relational data and are supported by QMF.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "database systems; query management facility",
}

@Article{Hammond:1984:TAM,
  author =       "Kenneth R. Hammond and Melvin R. Zimowski",
  title =        "{TSO Attach}: a multipurpose communication channel
                 to {IBM Database 2}",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "2",
  pages =        "151--164",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "TSO Attach provides IBM Database 2 capabilities in a
                 productive work environment that appears as a natural
                 extension of the Time Sharing Option (TSO) and the
                 Interactive System Productivity Facility (ISPF). It was
                 designed and built with careful consideration for the
                 varied complex user group for which it was intended.
                 Ease of use and ease of development and maintenance
                 were among the significant factors in the design. These
                 factors and others are addressed in this paper, which
                 discusses the basic design decisions made in building
                 the TSO Attachment Facility.",
  acknowledgement = ack-nhfb,
  classification = "716; 718; 723; 731",
  journalabr =   "IBM Syst J",
  keywords =     "data transmission; database systems; information
                 theory --- Communication Channels",
}

@Article{Dash:1984:IDI,
  author =       "Jnan R. Dash and Robert N. Ojala",
  title =        "{IBM Database 2} in an {Information Management System}
                 environment",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "2",
  pages =        "165--177",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Over the years, the IBM Information Management System
                 (IMS\slash VS) has been developed to meet expanding
                 user needs. During that time, a parallel development
                 has taken place. The relational data model grew from
                 Codd's original theory to a practical data base
                 prototype. Now a new data base management system, IBM
                 Database 2 (DB2), has been built on the relational
                 model. This study discusses the implementation and
                 design considerations for the integration of IMS and
                 DB2 from the user's viewpoint. It also presents the
                 attachment facilities from a design perspective.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "database systems",
}

@Article{Crus:1984:DRI,
  author =       "Richard A. Crus",
  title =        "Data Recovery in {IBM Database 2}",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "2",
  pages =        "178--188",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This study presents the various forms of data recovery
                 provided by IBM Database 2 (DB2). It describes the DB2
                 recovery log, introduces the notion of a unit of
                 recovery, and discusses the two-phase commit protocol
                 used by DB2. Furthermore, it describes what type of
                 information is logged, the DB2 checkpoint process, what
                 a compensation log record is, and how DB2 handles
                 undo\slash redo processing, media recovery, restart
                 after abnormal system termination, and data
                 unavailability.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data processing; database systems",
}

@Article{Cheng:1984:IDP,
  author =       "Josephine M. Cheng and Christopher R. Loosley and
                 Akira Shibamiya and Patricia S. Worthington",
  title =        "{IBM} Database 2 Performance: Design, Implementation,
                 and Tuning",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "2",
  pages =        "189--210",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The larger and more complex a relational data base,
                 the more efficient the data base management system must
                 be to maintain an acceptable level of performance. The
                 design and implementation of IBM Database 2 (DB2) have
                 been aimed toward this objective. Techniques for
                 achieving this key objective in DB2 are the subject of
                 this study. Presented are performance-related
                 strategies in query processing and performance-related
                 design tradeoffs. Data base and application design
                 options and their resolution for optimum performance
                 are also discussed. Also presented are techniques to
                 maintain performance by application monitoring and
                 tuning and DB2 system tuning.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "database systems",
}

@Article{Teng:1984:MID,
  author =       "J. Z. Teng and R. A. Gumaer",
  title =        "Managing {IBM Database 2} Buffers to Maximize
                 Performance",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "2",
  pages =        "211--218",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The relational data base system, IBM Database 2 (DB2),
                 has a component that manages data buffering. This study
                 describes the design considerations of the Buffer
                 Manager and the tradeoffs involved in managing the
                 allocation of DB2 buffers to maximize performance.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "database systems",
}

@Article{Anonymous:1984:SRa,
  author =       "Anonymous",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "2",
  pages =        "219--219",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lacy:1984:Pb,
  author =       "John Lacy",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "3",
  pages =        "222--223",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Branscomb:1984:EUS,
  author =       "Lewis M. Branscomb and John C. Thomas",
  title =        "Ease of use: a system design challenge",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "3",
  pages =        "224--235",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A discussion is presented of human factors and system
                 architecture. Guidelines are offered for what a system
                 should be like and how it should be developed. In
                 addition, the authors suggest ways in which advances in
                 research and education could result in systems with
                 better human factors.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer architecture; computer systems, digital",
}

@Article{Goldstein:1984:DCP,
  author =       "Barry C. Goldstein and Andrew R. Heller and Franklin
                 H. Moss and Irving Wladawsky-Berger",
  title =        "Directions in Cooperative Processing Between
                 Workstations and Hosts",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "3",
  pages =        "236--244",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Advancements in technology have provided us with the
                 availability of high-performance processors from the
                 high end of computing to the personal computer. In
                 addition, technology growth has enabled us to envision
                 sixteen megabytes of real storage for a personal
                 computer. As a result, we have witnessed not only a
                 tremendous growth at the high end of the computing
                 spectrum, but also the development of sophisticated
                 personal computers (e.g., the IBM PC XT\slash 370) with
                 real storage capacities approaching those of high-end
                 computers of a decade ago. Ths growth at both ends of
                 the computing spectrum has given us a choice. We can
                 either allow a clean separation to grow between
                 personal computer and host or provide a means by which
                 they cooperate in providing quality service to the user
                 without the complexity normally associated with
                 high-end systems. This study explores what such a
                 cooperation could mean.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital; computers, microprocessor;
                 personal computers",
}

@Article{Kozuh:1984:SCD,
  author =       "Frank T. Kozuh and David L. Livingston and Thomas C.
                 Spillman",
  title =        "{System\slash 370} Capability in a Desktop Computer",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "3",
  pages =        "245--254",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A desktop computer with System\slash 370 capability
                 was produced by enhancing the IBM Personal Computer XT
                 with additional hardware and developing software that
                 provides a compatible interface. The computer, the IBM
                 Personal Computer XT\slash 370, and this software allow
                 users to run most System\slash 370 Conversational
                 Monitor System application programs unaltered in a
                 desktop environment. The evolution of the development
                 and details of the function of the hardware and
                 software are described.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer software; computer systems, digital; desktop
                 computer",
}

@Article{Chess:1984:TCW,
  author =       "David M. Chess",
  title =        "A Tight Coupling of Workstations",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "3",
  pages =        "255--263",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The author addresses the problem of situations in
                 which people at physically distant locations must have
                 access to essentially the same computing environment at
                 the same time. That is, each user must be able to
                 provide input to whatever application or system is
                 active, and must be provided with all relevant output.
                 Common examples of this situation are demonstrations,
                 presentations, education, and troubleshooting. A
                 prototype system has been developed to study ways of
                 solving this problem in the microcomputer workstation
                 environment. The prototype allows users at two IBM
                 Personal Computers to share access to the computing
                 environment through the keyboard and the display screen
                 by tightly coupling the computers.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer software; computer systems, digital;
                 workstations",
}

@Article{Matick:1984:AID,
  author =       "Richard E. Matick and Daniel T. Ling",
  title =        "Architecture Implications in the Design of
                 Microprocessors",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "3",
  pages =        "264--280",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An examination is made of how architecture, the
                 definition of the instruction set and other facilities
                 that are available to the user, can influence the
                 implementation of a very large scale integration (VLSI)
                 microsystem. The instruction set affects the system
                 implementation in a number of direct ways. The
                 instruction formats determine the complexity of
                 instruction decoding. The addressing modes available
                 determine not only the hardware needed (multiported
                 register files or three-operand adders), but also the
                 complexity of the overall machine pipeline as greater
                 variability is introduced in the time it takes to
                 obtain an operand. Naturally, the actual operations
                 specified by the instructions determine the hardware
                 needed by the execution unit. In a less direct way, the
                 architecture also determines the memory bandwidth
                 required.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer architecture; computers, microprocessor",
}

@Article{Somerville:1984:UIC,
  author =       "Peter J. Somerville",
  title =        "Use of Images in Commercial and Office Systems",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "3",
  pages =        "281--296",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See erratum \cite{Anonymous:1985:EIC}.",
  abstract =     "An examination is made of some of the simpler
                 processing techniques that may usefully be performed on
                 bi-level (two-tone) images by a competent commercial
                 applications programmer if a few basic (although
                 complex internally) tools are provided. Such processes
                 include storage, indexing, changing resolution,
                 rotating, trimming, and then display and printing.
                 These processes can provide the facilities for an
                 enterprise to incorporate images and image data into
                 its office systems and into its main line-of-business
                 data processing applications.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "image processing",
}

@Article{Murray:1984:SCP,
  author =       "William H. Murray",
  title =        "Security Considerations for Personal Computers",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "3",
  pages =        "297--304",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The wide use of personal computers and general access
                 to telecommunications links have intensified the need
                 for computer security. Security practices as discussed
                 in this paper relate to protecting an organization's
                 personal computers as physical property, protecting the
                 organization's data and applications, and protecting
                 the organization itself. These matters are discussed
                 from the point of view of protection from the improper
                 use of personal computers.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "data processing; personal computers",
}

@Article{Anonymous:1984:SRb,
  author =       "Anonymous",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "3",
  pages =        "305--306",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lacy:1984:Pc,
  author =       "John Lacy",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "308--308",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Summers:1984:OCS,
  author =       "R. C. Summers",
  title =        "An Overview of Computer Security",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "309--325",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Presented is an overview of computer security,
                 including concepts, techniques, and measures relating
                 to the protection of computing systems and the
                 information they maintain against deliberate or
                 accidental threats. Motivations for security measures
                 are discussed. Security strategies are considered.
                 Actions and events that threaten security are
                 described, along with technical problems that can
                 prevent the computer from adequately dealing with
                 threats. Security models are surveyed. Specific
                 technical and administrative measures for promoting
                 security are described. Among the technical measures
                 discussed are design of secure systems, hardware and
                 operating systems, identification of users, encryption,
                 and access control packages. Administrative measures
                 include personnel, physical security of the computing
                 system, and auditing.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Los Angeles Scientific Cent, Los Angeles, CA,
                 USA",
  affiliationaddress = "IBM, Los Angeles Scientific Cent, Los Angeles,
                 CA, USA",
  classification = "723; 731",
  journalabr =   "IBM Syst J",
  keywords =     "data processing; encryption; process control ---
                 Computer Applications; security measures; security
                 model; Security of Data; security threat sources",
}

@Article{Cowlishaw:1984:DRL,
  author =       "M. F. Cowlishaw",
  title =        "The Design of the {REXX} Language",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "326--335",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "First published as IBM Hursley Technical Report
                 TR12.223, October 1983.",
  URL =          "http://www.research.ibm.com/journal/sj/234/ibmsj2304D.pdf",
  abstract =     "One way of classifying computer languages is by two
                 classes: languages needing skilled programmers, and
                 personal languages used by an expanding population of
                 general users. REstructured eXtended eXecutor (REXX) is
                 a flexible personal language designed with particular
                 attention to feedback from its users. It has proved to
                 be effective and easy to use, yet it is sufficiently
                 general and powerful to fulfill the needs of many
                 demanding professional applications. REXX is system and
                 hardware independent, so that it has been possible to
                 integrate it experimentally into several operating
                 systems. Here REXX is used for such purposes as command
                 and macro programming, prototyping, education, and
                 personal programming. This study introduces REXX and
                 describes the basic design principles that were
                 followed in developing it.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM UK Ltd, Scientific Cent, Winchester, Engl",
  affiliationaddress = "IBM UK Ltd, Scientific Cent, Winchester, Engl",
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "command program interpreters; computer operating
                 systems; computer programming languages; language
                 concepts; personal language; REXX language",
}

@Article{Ambrosetti:1984:AA,
  author =       "R. Ambrosetti and T. A. Ciriani and R. Pennacchi",
  title =        "An Application Analyzer",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "336--350",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An interactive tool, aimed at supporting the
                 application user\slash analyst in specifying and
                 analyzing a business area, is presented. The features
                 of the tool, named the Application Analyzer\slash
                 Experimental, are described both in their theoretical
                 foundations and their actual implementation. A brief
                 description of the architecture of the tool and its
                 internal structure is given. A review of the main
                 concepts of the application development area is also
                 included. The follow-on of the prototype described here
                 is the program offering known as System A.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Italy, Program Product Development Cent, Rome,
                 Italy",
  affiliationaddress = "IBM Italy, Program Product Development Cent,
                 Rome, Italy",
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "Algorithms; APAX design; application analyzer;
                 computer programming; computer software; data element;
                 syntax of the function",
}

@Article{Bux:1984:PIL,
  author =       "W. Bux",
  title =        "Performance Issues in Local-Area Networks",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "351--374",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This study discusses several important performance
                 problems in the design of local-area networks. The
                 questions discussed relate to various aspects of
                 architecture, design, and implementation: (1) the
                 delay-throughput characteristics of the medium access
                 protocols, (2) the performance of local-area networks
                 on which a file server provides file storage and
                 retrieval services to intelligent workstations, and (3)
                 timing problems in local-area network adapters. Since
                 the paper does not primarily address the performance
                 analyst, it is descriptive in nature; analytic details
                 are omitted in favor of a more intuitive explanation of
                 the relevant effects.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Research Div, Thomas J. Watson Research Cent,
                 Yorktown Heights, NY, USA",
  affiliationaddress = "IBM Research Div, Thomas J. Watson Research
                 Cent, Yorktown Heights, NY, USA",
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks; data transmission; file server;
                 Local Networks; local-area networks; network adapters;
                 through-put delay characteristics; workstations",
}

@Article{Tetzlaff:1984:VAP,
  author =       "W. H. Tetzlaff and W. M. Buco",
  title =        "{VM\slash 370}, Attached Processor, and Multiprocessor
                 Performance Study",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "375--385",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A discussion is presented of performance studies of
                 Attached Processors, multiprocessors, and VM\slash 370.
                 A methodology for evaluating performance is discussed.
                 Performance improvements are explained and evaluated.
                 These studies played a role in a new option to the
                 VM\slash System product control program that is called
                 the High Performance Option (HPO).",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Research Div, Thomas J. Watson Research Cent,
                 Yorktown Heights, NY, USA",
  affiliationaddress = "IBM Research Div, Thomas J. Watson Research
                 Cent, Yorktown Heights, NY, USA",
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "attached processor; computer programming ---
                 Algorithms; computer software; data collector; high
                 performance option (HPO); migration algorithms",
}

@Article{Bontempo:1984:BR,
  author =       "Charles J. Bontempo",
  title =        "Book review",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "386--387",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1984:AI,
  author =       "Anonymous",
  title =        "Author index: 1975--1984",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "388--396",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1984:SI,
  author =       "Anonymous",
  title =        "Subject index: 1975--1984",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "397--409",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1984:CV,
  author =       "Anonymous",
  title =        "Contents of Volume 23, 1984",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "410--410",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lacy:1985:P,
  author =       "John Lacy",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "1",
  pages =        "2--2",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Clarkson:1985:SGI,
  author =       "T. B. {Clarkson, III}",
  title =        "Standardized Graphics on the {IBM Personal Computer}",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "1",
  pages =        "3--13",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A graphics standard --- the Virtual Device Interface
                 (VDI) --- has been proposed for national use and is in
                 the process of being adopted. An implementation of the
                 VDI is currently available for the IBM Personal
                 Computer. This paper briefly traces the history of
                 graphics as used with personal computers, explores the
                 difficulties that standardization efforts have met,
                 explains the VDI model, and shows how this model
                 operates in the IBM Personal Computer environment to
                 make graphics a natural extension of the operating
                 system.",
  acknowledgement = ack-nhfb,
  affiliation =  "Graphic Software Systems Inc, Wilsonville, OR, USA",
  affiliationaddress = "Graphic Software Systems Inc, Wilsonville, OR,
                 USA",
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer graphics; computers, microprocessor; IBM
                 personal computer; Standards; virtual device
                 interface",
}

@Article{Duke:1985:PGC,
  author =       "K. A. Duke and W. A. Wall",
  title =        "A Professional Graphics Controller",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "1",
  pages =        "14--25",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The IBM Professional Graphics Controller and Display
                 were developed to meet the needs of engineers and
                 scientists for an improved graphics capability in the
                 personal computer environment. These units provide
                 graphics systems with improved function, resolution,
                 and color range, and at the same time they allow
                 existing productivity software to be executed in an
                 emulation mode. This paper describes the function and
                 discusses the design of the Professional Graphics
                 Controller.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Entry Systems Div, Boca Raton, FL, USA",
  affiliationaddress = "IBM, Entry Systems Div, Boca Raton, FL, USA",
  classification = "722",
  journalabr =   "IBM Syst J",
  keywords =     "computer peripheral equipment; computers,
                 microprocessor; display devices; Graphics; graphics
                 controller; IBM personal computer",
}

@Article{Korn:1985:EPC,
  author =       "P. A. Korn and J. P. McAdaragh and C. L. Tondo",
  title =        "Expanded Personal Computing Power and Capability",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "1",
  pages =        "26--36",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See erratum \cite{Korn:1986:EEP}.",
  abstract =     "Discussed is the XENIX Operating System for the IBM
                 Personal Computer AT. The operating system incorporates
                 capabilities of a maintenance operating system ---
                 multiusage, multitasking, file management and security,
                 program compilation, and networking. The XENIX shell
                 structure is introduced. Pipes and pipelining are
                 presented. The XENIX file structure is explained and
                 illustrated with examples. Software development and
                 text formatting are treated in detail. The ability to
                 compile C program code developed under XENIX and run it
                 on the IBM Personal Computer Disk Operating System is
                 explained.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Entry Systems Div, Boca Raton, FL, USA",
  affiliationaddress = "IBM, Entry Systems Div, Boca Raton, FL, USA",
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems; computers, microprocessor;
                 IBM personal computer; Xenix operating system",
}

@Article{Ryan:1985:CPL,
  author =       "R. R. Ryan and H. Spiller",
  title =        "The {C} Programming Language and a {C} Compiler",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "1",
  pages =        "37--48",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "In the last few years, the C programming language has
                 become one of the most widely used languages for
                 applications and systems software on microcomputer
                 systems. This paper describes the C language and its
                 history. It then presents a specific implementation of
                 C, the Microsoft C Compiler, which runs on the IBM
                 Personal Computer.",
  acknowledgement = ack-nhfb,
  affiliation =  "Microsoft Corp, Bellevue, WA, USA",
  affiliationaddress = "Microsoft Corp, Bellevue, WA, USA",
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "C compiler; C programming language; computer operating
                 systems --- Program Compilers; computer programming
                 languages",
}

@Article{Roberts:1985:DCI,
  author =       "M. L. Roberts and P. D. Griffiths",
  title =        "Design Considerations for {IBM Personal Computer
                 Professional Fortran}, an Optimizing Compiler",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "1",
  pages =        "49--60",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An optimizing FORTRAN compiler with power to handle
                 large applications at execution speeds comparable to
                 those of large computers has been implemented on the
                 IBM Personal Computer. This implementation is
                 described, with emphasis on the design decisions that
                 were considered in the development of the compiler.",
  acknowledgement = ack-nhfb,
  affiliation =  "Ryan-McFarland Corp, Rolling Hills, CA, USA",
  affiliationaddress = "Ryan-McFarland Corp, Rolling Hills, CA, USA",
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer operating systems; computer programming
                 languages --- fortran; computers, microprocessor; IBM
                 personal computer; optimizing fortran compilers;
                 Program Compilers",
}

@Article{Tavera:1985:ASI,
  author =       "M. L. Tavera and M. Alfonseca and J. Rojas",
  title =        "An {APL} System for the {IBM Personal Computer}",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "1",
  pages =        "61--70",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper discusses the design and building of an APL
                 interpreter for the IBM Personal Computer. Discussed is
                 the writing of the interpreter itself, which required
                 the use of an intermediate language designed by the
                 authors. This machine-independent language also made
                 possible the development of APL interpreters for two
                 other systems --- System\slash 370 and Series/1. The
                 particularizing of the interpreter required a compiler,
                 which in the case of the Personal Computer produced
                 Intel 8088 and 8087 assembly language code. The
                 matching of the APL interpreter to the operating system
                 (DOS) required an APL supervisor, which is also
                 discussed in this paper. The provision of the APL
                 character set presented problems, the solutions of
                 which are also presented. Other topics discussed are
                 the display, the keyboard, and the session manager.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Madrid Scientific Cent, Madrid, Spain",
  affiliationaddress = "IBM, Madrid Scientific Cent, Madrid, Spain",
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "APL interpreter; computer operating systems; computer
                 programming languages; computers, microprocessor; IBM
                 personal computer; Program Interpreters",
}

@Article{Anonymous:1985:EIC,
  author =       "Anonymous",
  title =        "Erratum: ``{Use} of images in commercial and office
                 systems''",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "1",
  pages =        "71--71",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Somerville:1984:UIC}.",
  acknowledgement = ack-nhfb,
}

@Article{Gershon:1985:Pa,
  author =       "Gary Gershon",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "2",
  pages =        "74--75",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Humphrey:1985:ILS,
  author =       "W. S. Humphrey",
  title =        "The {IBM} large-systems software development process:
                 Objectives and direction",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "2",
  pages =        "76--78",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Radice:1985:PPA,
  author =       "R. A. Radice and N. K. Roth and A. C. {O'Hara, Jr.}
                 and W. A. Ciarfella",
  title =        "A Programming Process Architecture",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "2",
  pages =        "79--90",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The Programming Process Architecture is a framework
                 describing required activities for an operational
                 process that can be used to develop system or
                 application software. The architecture includes process
                 management tasks, mechanisms for analysis and
                 development of the process, and product quality reviews
                 during the various stages of the development cycle. It
                 requires explicit entry criteria, validation, and exit
                 criteria for each task in the process, which combined
                 form the `essence' of the architecture. The
                 architecture describes requirements for a process
                 needing no new invention, but rather using the best
                 proven methodologies, techniques, and tools available
                 today. This paper describes the Programming Process
                 Architecture and its use, emphasizing the reasons for
                 its development.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Information Systems \& Storage Group,
                 Poughkeepsie, NY, USA",
  affiliationaddress = "IBM, Information Systems \& Storage Group,
                 Poughkeepsie, NY, USA",
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming; computer software; entry
                 criteria; exit criteria; programming process
                 architecture",
}

@Article{Radice:1985:PPS,
  author =       "R. A. Radice and J. T. Harding and P. E. Munnis and R.
                 W. Phillips",
  title =        "A Programming Process Study",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "2",
  pages =        "91--101",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A programming Site Study group was convened to look at
                 the work of eight large-system programming development
                 locations within IBM and to evaluate them according to
                 a set of process stages. Eleven attributes were applied
                 to each process stage. The process of the Site Studies
                 is directly transferable to software evaluations on any
                 project in the software industry, and it is believed
                 that the studies are the first step necessary in the
                 evolution of a consistently repeatable and dynamically
                 controllable process of improvement within the
                 industry. The phases of these studies and
                 implementation of the studies are described.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Information Systems \& Storage Group,
                 Poughkeepsie, NY, USA",
  affiliationaddress = "IBM, Information Systems \& Storage Group,
                 Poughkeepsie, NY, USA",
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming; computer software; maturity
                 grid; programming process",
}

@Article{Hoffnagle:1985:ASD,
  author =       "G. F. Hoffnagle and W. E. Beregi",
  title =        "Automating the Software Development Process",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "2",
  pages =        "102--120",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Demand for reliable software systems is stressing
                 software production capability, and automation is seen
                 as a practical approach to increasing productivity and
                 quality. Discussed in this paper are an approach and an
                 architecture for automating the software development
                 process. The concepts are developed from the viewpoint
                 of the needs of the software development process,
                 rather than that of established tools or technology. We
                 discuss why automation of software development must be
                 accomplished by evolutionary means. We define the
                 architecture of a software engineering support facility
                 to support long-term process experimentation,
                 evolution, and automation.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Information Systems \& Storage Group,
                 Poughkeepsie, NY, USA",
  affiliationaddress = "IBM, Information Systems \& Storage Group,
                 Poughkeepsie, NY, USA",
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming; computer software; life-cycle
                 phases; process mechanism (PM); tool portability",
}

@Article{Carpenter:1985:QEI,
  author =       "M. B. Carpenter and H. K. Hallman",
  title =        "Quality Emphasis at {IBM}'s {Software Engineering
                 Institute}",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "2",
  pages =        "121--133",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Improvements in quality and productivity in the
                 development of programs can be obtained by instructing
                 the programming development groups in the use of modern
                 software engineering methodology. To provide this
                 instruction for its employees, IBM has established a
                 Software Engineering Institute. Currently training in
                 the methodology is being offered through an education
                 program of the Institute known as the Software
                 Engineering Workshop. This paper describes the role of
                 the Institute, its background and offerings, and some
                 results obtained.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Corporate Technical Inst, Thornwood, NY, USA",
  affiliationaddress = "IBM, Corporate Technical Inst, Thornwood, NY,
                 USA",
  classification = "723; 913",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming; computer software --- Quality
                 Control; curriculum; Quality Control; software
                 engineering institute; zero defects",
}

@Article{Mays:1985:PRM,
  author =       "R. G. Mays and L. S. Orzech and W. A. Ciarfella and R.
                 W. Phillips",
  title =        "{PDM}: a requirements methodology for software
                 system enhancements",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "2",
  pages =        "134--149",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper describes the Planning and Design
                 Methodology (PDM), a requirements planning process that
                 supports the collection, analysis, documentation, and
                 tracking of software requirements. The process includes
                 requirements collection, definition of the underlying
                 problems, development of an external functional
                 description that addresses the problems, and
                 development of system and product designs from the
                 external functional descriptions. PDM has been applied
                 in three development areas with positive results.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Communication Products Div, Research Triangle
                 Park, NC, USA",
  affiliationaddress = "IBM, Communication Products Div, Research
                 Triangle Park, NC, USA",
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming; computer software; functional
                 specification; planning and design methodology;
                 product-level requirements",
}

@Article{Jones:1985:PAD,
  author =       "C. L. Jones",
  title =        "A Process-Integrated Approach to Defect Prevention",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "2",
  pages =        "150--167",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Recent efforts to improve quality in software have
                 concentrated on defect detection. This paper presents a
                 programming process methodology for using causal
                 analysis and feedback as a means for achieving quality
                 improvements and ultimately defect prevention. The
                 methodology emphasizes effective utilization of all
                 error data to prevent the recurrence of defects.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Communication Products Div, Research Triangle
                 Park, NC, USA",
  affiliationaddress = "IBM, Communication Products Div, Research
                 Triangle Park, NC, USA",
  classification = "723; 913",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming; computer software --- Quality
                 Control; defect detection; defect prevention; Quality
                 Control",
}

@Article{Flaherty:1985:PPP,
  author =       "M. J. Flaherty",
  title =        "Programming Process Productivity Measurement System
                 for {System\slash 370}",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "2",
  pages =        "168--175",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Discussed in this paper are the underlying principles
                 of a programmer productivity measuring system. The key
                 measures (or metrics) are people and lines of code.
                 Definitions of these metrics are refined and qualified,
                 according to the conditions under which they are used.
                 Presented also is a data base design for retaining and
                 retrieving these metrics under a wide variety of
                 applications and other circumstances. Depending on
                 definitions, applications, and other circumstances,
                 productivity measurements may differ widely. On the
                 other hand, after suitable productivity metrics have
                 been defined, consistency of application of the same
                 metrics yields comparable results from project to
                 project.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Information Systems \& Storage Group,
                 Poughkeepsie, NY, USA",
  affiliationaddress = "IBM, Information Systems \& Storage Group,
                 Poughkeepsie, NY, USA",
  classification = "723; 913",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems programming; lines of code (LOC);
                 productivity; productivity metric; programmer
                 productivity system",
}

@Article{Anonymous:1985:R,
  author =       "Anonymous",
  title =        "Referees",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "2",
  pages =        "176--177",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gershon:1985:Pb,
  author =       "Gary Gershon",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "3/4",
  pages =        "180--181",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Peck:1985:WSE,
  author =       "T. G. Peck",
  title =        "Worldwide Systems Engineering",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "3-4",
  pages =        "182--188",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "IBM systems engineering celebrates its 25th
                 anniversary in 1985. This paper provides a perspective
                 of the part systems engineering has played in the
                 success of IBM in the information processing business
                 during that 25-year period. The history of systems
                 engineering is briefly reviewed, and the similarities
                 and differences in worldwide systems engineer functions
                 are examined. The relationships among marketing,
                 systems engineering, and customers are discussed. Also
                 discussed are career paths for systems engineers.
                 Expectations and challenges for systems engineering in
                 the future are explored.",
  acknowledgement = ack-nhfb,
  classification = "722; 723; 911; 912",
  journalabr =   "IBM Syst J",
  keywords =     "computers, digital; engineering --- Professional
                 Aspects; history of systems engineering; IBM systems
                 engineering; marketing; systems engineering",
}

@Article{Boos:1985:HIM,
  author =       "W. Boos",
  title =        "{HONE}: the {IBM Marketing Support System}",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "3-4",
  pages =        "189--199",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "THe storage, retrieval, and dissemination of data
                 pertaining to a large, complex product line is made
                 possible by the Hands-On Network Environment (HONE)
                 discussed in this paper. HONE provides on-line
                 interactive support to marketing, systems, and
                 administrative personnel, and, most recently, to
                 customers. The evolution of HONE is presented.
                 Discussed in detail are new HONE distributed processing
                 capabilities now enabled under an advanced network
                 architecture. In that environment, the processing power
                 and data bases of HONE and other host systems will be
                 interconnected and support the speed and processing
                 autonomy of IBM Personal Computers as workstations.",
  acknowledgement = ack-nhfb,
  classification = "722; 723; 903; 911",
  journalabr =   "IBM Syst J",
  keywords =     "Computer Applications; computer systems, digital ---
                 Applications; hands-on-network environment; hone; IBM
                 marketing support system; information retrieval
                 systems; marketing",
}

@Article{Agassi:1985:PCD,
  author =       "S. Agassi",
  title =        "Performance Considerations for a Distributed Data
                 Processing System Designed for High Availability",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "3-4",
  pages =        "200--212",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The high-availability requirements of computerized
                 systems that are needed to meet the objectives of the
                 organization are being acknowledged more and more by
                 the data processing community. The paper presents the
                 planning process for a distributed data processing
                 system designed to meet high availability requirements.
                 This process was performed as a systems engineering
                 activity in order to assess the feasibility of the
                 presented approach, which was proposed to a customer.",
  acknowledgement = ack-nhfb,
  classification = "722; 723; 912",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital --- Distributed; data
                 processing; distributed data processing system; high
                 availability; Planning; systems engineering",
}

@Article{Hein:1985:ISM,
  author =       "K. P. Hein",
  title =        "Information System Model and Architecture Generator",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "3-4",
  pages =        "213--235",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The Business Systems Planning (BSP) methodology
                 provides an enterprise-wide strategic Information
                 Systems plan, but it is still at an abstraction level
                 that leaves the traditional gap between `requirements'
                 and implementations untouched. The Information System
                 Model and Architecture Generator (ISMOD) tool
                 complements and enhances BSP by mechanizing the
                 planning process, thus providing a facility to narrow
                 this gap by allowing orderly and consistent
                 top-to-bottom architectural decomposition of the
                 enterprise environment. It is an enterprise planning
                 vehicle and not an implementation system, but it is the
                 first critical component to support an integrated
                 systems architecture effort. It automates and, to a
                 large extent, formalizes a laborious requirements
                 documentation process preceding code development, and
                 it does this `top to bottom' from a global,
                 enterprise-wide, information requirements viewpoint.
                 This paper discusses the overall architectural concepts
                 of integrated data systems development, the place of
                 ISMOD within it, and the specific facilities,
                 techniques, and information provided by the system.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "business systems planning; computer systems, digital;
                 database systems --- Planning; information system model
                 and architecture generator; information systems
                 planning; Planning; shared-data systems",
}

@Article{Ghiotti:1985:SIU,
  author =       "M. M. Ghiotti",
  title =        "Single-System Interface Using the {IBM 3270-PC}",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "3-4",
  pages =        "236--247",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Many businesses use a variety of terminal types
                 connected to central host computers. Presented here is
                 a rationale and the experience gained with a single
                 terminal type --- the IBM 3270-PC --- interconnected
                 with hosts via the Application Program Interface to
                 achieve enhanced user efficiency.",
  acknowledgement = ack-nhfb,
  classification = "722",
  journalabr =   "IBM Syst J",
  keywords =     "computer interfaces; computer peripheral equipment;
                 IBM 3270-pc; single-system interface",
}

@Article{Newton:1985:SPP,
  author =       "J. Newton",
  title =        "Strategies for Problem Prevention",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "3-4",
  pages =        "248--263",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A philosophy of preventing problems from occurring in
                 a data processing installation rather than reacting to
                 problems is becoming increasingly necessary. The
                 institution of comprehensive and formally managed
                 testing strategies is an important step in this
                 direction. Such strategies are discussed, and it is
                 shown that they also support disaster backup\slash
                 recovery plans.",
  acknowledgement = ack-nhfb,
  classification = "722; 723; 912",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital --- Management; data
                 processing; data processing installation; disaster
                 backup/recovery plans; Management; problem prevention",
}

@Article{Yelavich:1985:CIC,
  author =       "B. M. Yelavich",
  title =        "Customer Information Control System --- an Evolving
                 System Facility",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "3-4",
  pages =        "264--278",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An overview of the present CICS architecture is
                 presented. The evolution of that original design is
                 discussed. CICS is now a transaction management system
                 that accommodates database management, operating
                 systems, and input and output devices as well as
                 hardware of increasing amounts and complexity. User
                 needs, past and present, are analyzed with a view
                 toward understanding how CICS might evolve in the
                 future.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer architecture; computer software; customer
                 information control system; database management;
                 transaction management system",
}

@Article{Brooks:1985:AHA,
  author =       "R. C. Brooks",
  title =        "Approach to High Availability in High-Transaction-Rate
                 Systems",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "3-4",
  pages =        "279--293",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "In business enterprises, it is important that high
                 availability be maintained in the computer systems used
                 by the enterprises, particularly in systems that have
                 high transaction rates. A way of maintaining high
                 availability is discussed, including the implementation
                 that should be undertaken and the design issues
                 involved. Some additional steps for further
                 improvements are also offered.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "availability; computer systems, digital; data
                 processing --- Reliability; database systems; high
                 transaction-rate systems; online systems; Reliability",
}

@Article{Buckelew:1985:SPG,
  author =       "B. R. Buckelew",
  title =        "The System Planning Grid: a Model for Building
                 Integrated Information Systems",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "3-4",
  pages =        "294--306",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Information systems have evolved as a result of
                 technological advances and the increasing demand for
                 information. Over the past few years, systems that
                 developed separately are being forced to merge. This
                 paper describes a model for building a set of
                 integrated architectural guidelines to ensure that a
                 `system' is being built. The use of the System Planning
                 Grid as a model for setting product standards and
                 organization responsibilities is also discussed.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital; data processing, business
                 --- Planning; integrated information systems; Planning;
                 system planning grid",
}

@Article{Mudie:1985:ITA,
  author =       "M. W. Mudie and D. J. Schafer",
  title =        "Information Technology Architecture for Change",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "3-4",
  pages =        "307--315",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper defines a technology architecture for
                 information processing in large corporations. It
                 describes a matrix of processing environments
                 consisting of three processing types: production,
                 decision support, and office; three processing
                 locations: centralized, departmental, and workstation;
                 and a methodology for implementing applications in
                 those environments. Key to the architecture is a
                 supporting framework comprising the communications
                 network, a data service function, an office services
                 function, enabling software, and support organizations.
                 This approach is designed to provide an integrated
                 information system to support organizations whose
                 business environment is changing, and where
                 flexibility, responsiveness to change, and cost
                 effectiveness are vital. The approach is representative
                 of methods used by systems engineers in assisting
                 customers to decide on a system configuration that best
                 suits their needs.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital; data processing, business;
                 information systems architecture; integrated
                 information system; processing environments",
}

@Article{Grossman:1985:CSD,
  author =       "C. P. Grossman",
  title =        "Cache-{DASD} Storage Design for Improving System
                 Performance",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "3-4",
  pages =        "316--334",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper discusses three examples of a cache-DASD
                 storage design. Precursors and developments leading up
                 to the IBM 3880 Storage Control Subsystems are
                 presented. The development of storage hierarchies is
                 discussed, and the role of cache control units in the
                 storage hierarchy is reviewed. Design and
                 implementations are presented. Other topics discussed
                 are cache management, performance of the subsystem, and
                 experience using the subsystem. It is shown that a
                 cache as a high-speed intermediary between the
                 processor and DASD is a major and effective step toward
                 matching processor speed and DASD speed.",
  acknowledgement = ack-nhfb,
  classification = "722",
  journalabr =   "IBM Syst J",
  keywords =     "cache management; cache-DASD storage design; computer
                 systems, digital --- Performance; data storage units;
                 Design; IBM 3880 storage control subsystems; memory
                 management; storage hierarchies",
}

@Article{Anonymous:1985:C,
  author =       "Anonymous",
  title =        "Contents: 1985",
  journal =      j-IBM-SYS-J,
  volume =       "24",
  number =       "3/4",
  pages =        "335--335",
  year =         "1985",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gershon:1986:Pa,
  author =       "Gary Gershon",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "1",
  pages =        "2--3",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Tucker:1986:ISO,
  author =       "S. G. Tucker",
  title =        "The {IBM 3090 System}: an Overview",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "1",
  pages =        "4--19",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The first part of this paper places the IBM 3090
                 system in historical perspective with respect to its
                 predecessors. Treated briefly are the technology and
                 the design process, both of which were critical to the
                 development of the 3090. Presented in detail is the
                 3090 system itself, with emphasis on its features that
                 differ from those of prior systems.",
  acknowledgement = ack-nhfb,
  classification = "713; 722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer architecture; computer systems, digital;
                 cycle; expanded storage; IBM 3090; integrated circuits
                 --- Applications; Reviews; vector facility",
}

@Article{Singh:1986:IPB,
  author =       "Y. Singh and G. M. King and J. W. Anderson",
  title =        "{IBM} 3090 performance: a balanced system approach",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "1",
  pages =        "20--35",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The IBM 3090 system represents the highest level of
                 system performance offered by IBM to date. To realize
                 the full performance potential of this system, it is
                 essential to maintain a balance among its various
                 components. The major components of the system are the
                 processor(s), storage, I/O, and the software that
                 manages the system resources. Their performance
                 attributes are discussed and their effect on system
                 performance illustrated by laboratory benchmark
                 measurements for the MVS and VM operating systems.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "benchmark measurements; computer operating systems ---
                 Measurements; computer systems, digital; IBM 3090; MVS
                 operating system; Performance; VM operating system",
}

@Article{Gibson:1986:ESP,
  author =       "D. H. Gibson and D. W. Rain and H. F. Walsh",
  title =        "Engineering and Scientific Processing on the {IBM}
                 3090",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "1",
  pages =        "36--50",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The IBM 3090 processor implementation of the
                 System\slash 370 Vector Architecture represents a major
                 new system design for engineering and scientific
                 processing, featuring both scalar and vector capability
                 in a uniprocessor and in a dyadic and four-way parallel
                 processing environment. The history of large-scale
                 scientific processing is reviewed, leading to a
                 statement of current requirements. The design
                 objectives for scalar, parallel, and vector
                 capabilities are identified, followed by a summary of
                 the resulting 3090 features. Selected highlights of the
                 vector hardware are given, followed by a summary of the
                 supporting software. The paper concludes with a
                 discussion of performance, beginning with the
                 identification of suitable applications. An example is
                 given of one application utilizing each of the three
                 capabilities: scalar, parallel, and vector. Several of
                 the most important performance parameters are
                 identified.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer architecture; computer hardware; computer
                 software; computer systems, digital; data processing
                 --- Natural Sciences Applications; engineering data
                 processing; IBM 3090; Performance; system/370 vector
                 architecture",
}

@Article{Buchholz:1986:ISV,
  author =       "W. Buchholz",
  title =        "The {IBM System\slash 370} Vector Architecture",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "1",
  pages =        "51--62",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Discussed in the instruction-set architecture of the
                 IBM System\slash 370 vector facility, a compatible
                 extension of the System\slash 370 architecture. Both
                 the base system, which is a general-purpose
                 System\slash 370 processor, and the optional vector
                 facility employ a register type of organization. Data
                 formats are the same, arithmetic operations produce
                 exactly the same results, arithmetic exceptions are
                 handled in the same way, and instructions are precisely
                 interruptible for page faults and other causes in the
                 same manner as those of the base system. This approach
                 permits substantially increased performance on
                 vectorizable programs with only a modest increase in
                 hardware and software, while retaining the ability to
                 run existing nonvector programs unchanged.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer architecture; computer hardware; computer
                 software; computer systems, digital; IBM system/370;
                 vector architecture",
}

@Article{Clark:1986:VSP,
  author =       "R. S. Clark and T. L. Wilson",
  title =        "Vector System Performance of the {IBM} 3090",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "1",
  pages =        "63--82",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Performance of the Vector Facility of the IBM 3090
                 processor is discussed. The paper has two parts, the
                 first presenting factors affecting performance
                 measurement of the Vector Facility and the criteria for
                 its design. In the second part, use of the 3090 storage
                 hierarchy to support the vector processing
                 implementation is the main aspect of the discussion.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital; data storage units; IBM
                 3090; Performance; storage hierarchy; vector facility",
}

@Article{Gottschalk:1986:SUP,
  author =       "K. D. Gottschalk",
  title =        "The {System Usability Process} for {Network Management
                 Products}",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "1",
  pages =        "83--91",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper presents an overview of a process for
                 system usability. The process is a systematic series of
                 activities and procedures designed to improve the
                 usability of software network management products. The
                 elements of the process are given and future directions
                 for evaluating usability described.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks; computer software --- Design;
                 Management; network management products; system
                 usability process",
}

@Article{Percival:1986:NMS,
  author =       "L. C. Percival and S. K. Johnson",
  title =        "Network Management Software Usability Test Design and
                 Implementation",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "1",
  pages =        "92--104",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The approach used at one of IBM's development sites
                 for usability testing is somewhat different from
                 methods used elsewhere. The approach was developed
                 specifically for testing of software communications
                 products as one aspect of the System Usability Process.
                 The test design and implementation are described.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks; computer software --- Testing;
                 Management; network management; software usability",
}

@Article{Koved:1986:IAS,
  author =       "L. Koved and G. Waldbaum",
  title =        "Improving Availability of Software Subsystems Through
                 On-Line Error Detection",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "1",
  pages =        "105--115",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A VM\slash 370 program called Auditor detects faults
                 in the operation of computer software subsystems and
                 attempts to restore service as quickly as possible.
                 Through a series of periodic tests, Auditor diagnoses
                 whether these subsystems are operating properly. When
                 faults are detected, service restoration procedures are
                 automatically called, and the persons responsible for
                 the subsystems are notified. The various types of
                 faults are recorded for subsequent analysis.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "auditor; computer software; computer systems, digital
                 --- Fault Tolerant Capability; on-line error detection;
                 Reliability; software subsystems; VM/370 program",
}

@Article{Kravitz:1986:WMC,
  author =       "J. K. Kravitz and D. Lieber and F. H. Robbins and J.
                 M. Palermo",
  title =        "Workstations and Mainframe Computers Working
                 Together",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "1",
  pages =        "116--128",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The history and design philosophy of a research
                 project that produced a prototype software package are
                 described. The package provides cooperation between
                 large-scale mainframe computing systems and personal
                 desktop workstations. Also discussed are the features
                 of PC\slash VM Bond, the product that grew out of the
                 research project.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer software; computer systems, digital ---
                 Design; Design; intelligent workstations; mainframe
                 computers; PC/VM bond",
}

@Article{Anonymous:1986:SR,
  author =       "{Anonymous}",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "1",
  pages =        "129--129",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Korn:1986:EEP,
  author =       "P. A. Korn and J. P. McAdaragh and C. L. Tondo",
  title =        "Erratum: ``{Expanded} personal computing power and
                 capability''",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "1",
  pages =        "130--130",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Korn:1985:EPC}.",
  acknowledgement = ack-nhfb,
}

@Article{Gershon:1986:Pb,
  author =       "Gary Gershon",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "2",
  pages =        "132--133",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Symonds:1986:IIK,
  author =       "A. J. Symonds",
  title =        "Introduction to {IBM}'s Knowledge-Systems Products",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "2",
  pages =        "134--146",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The industrialization of artificial intelligence is
                 believed by many to be a technology that will
                 contribute to a new generation of `smart' computer
                 systems. Technical managers who are users or suppliers
                 of computer systems are trying to understand how the
                 technology can help them, and they are finding it an
                 elusive subject to grasp. This introductory papers
                 starts with a technology overview that aims to address
                 this need for understanding and providing a suitable
                 background for the papers that follow in this issue.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "artificial intelligence; automatic reasoning; computer
                 programming languages; computer systems, digital ---
                 Research; database systems; knowledge systems; Reviews;
                 symbolic processing",
}

@Article{Hodil:1986:KSC,
  author =       "E. D. Hodil and C. W. Butler and G. L. Richardson",
  title =        "Knowledge-Based Systems in the Commercial
                 Environment",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "2",
  pages =        "147--158",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Artificial intelligence systems have been implemented
                 in the LISP programming language on specialized
                 hardware. The experimental nature of early systems has
                 allowed many of them the luxury of having little or no
                 interface to existing hardware, software, or data. In
                 this paper, arguments are presented to demonstrate the
                 feasibility of implementing knowledge-based systems
                 using traditional hardware and software. Also, an
                 architecture is proposed for knowledge-based shell
                 systems that is compatible with the software
                 development environment of large commercial information
                 systems organizations.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "artificial intelligence; commercial environment;
                 computer architecture; computer hardware ---
                 Applications; computer software --- Applications;
                 Expert Systems; knowledge-based systems",
}

@Article{Milliken:1986:YAO,
  author =       "K. R. Milliken and A. V. Cruise and R. L. Ennis and A.
                 J. Finkel and J. L. Hellerstein and D. J. Loeb and D.
                 A. Klein and M. J. Masullo and H. M. {Van Woerkom} and
                 N. B. Waite",
  title =        "{YES\slash MVS} and the Automation of Operations for
                 Large Computer Complexes",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "2",
  pages =        "159--180",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 21 19:26:48 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The Yorktown Expert System\slash MVS Manager (known as
                 YES\slash MVS) is an experimental expert system that
                 assists with the operation of a large computer complex.
                 This paper discusses characteristics of the domain of
                 large computing system operation that have been
                 illuminated by experience with the first system,
                 YES\slash MVS I, and it describes the modifications in
                 the design of YES\slash MVS II that are an outgrowth of
                 the YES\slash MVS I experience.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "artificial intelligence; computer systems, digital;
                 YES/MVS; Yorktown Expert System/MVS manager",
}

@Article{Voelker:1986:GKE,
  author =       "J. A. Voelker and G. B. Ratica",
  title =        "The Genesis of a Knowledge-Based Expert System",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "2",
  pages =        "181--189",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper discusses the genesis, development, and
                 testing of a knowledge-based expert system called the
                 Contract Support Services consultant. This system aids
                 in the process of estimating, bidding, and preparing
                 agreements for certain services required for the
                 rearrangement, relocation, discontinuance, and
                 reinstallation of IBM equipment. The goals in
                 developing the prototype of the Contract Support
                 Services Consultant were to capture the knowledge and
                 experience of experts and make them available to
                 nonexperts in a convenient, consistent way. The result
                 is a system that improves the accuracy, consistency,
                 and timeliness of the estimates and bids.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "artificial intelligence; computer systems, digital;
                 contract support services consultant; Expert Systems;
                 knowledge-based systems",
}

@Article{Wilson:1986:PAP,
  author =       "W. G. Wilson",
  title =        "{Prolog} for Applications Programming",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "2",
  pages =        "190--206",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper discusses the problems and benefits of
                 using the Prolog language to write application
                 programs. Much attention is currently focused on
                 expert-systems shells which play a role in artificial
                 intelligence (AI) systems similar to that of
                 application generators in more conventional
                 applications. The Prolog programming language embodies
                 many of the features found in these shells, while
                 providing a relatively general and complete programming
                 language. MVS performance tuning is used as an
                 application that typifies a broad class of applications
                 suitable for implementation in this language. Some of
                 the difficulties that had to be overcome to use the
                 language are presented, with their solutions.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "applications programming; artificial intelligence ---
                 Expert Systems; computer programming; computer
                 programming languages; expert-systems shells; Prolog;
                 theorem proving",
}

@Article{Hagamen:1986:NRK,
  author =       "W. D. Hagamen and M. Gardy",
  title =        "The Numeric Representation of Knowledge and Logic ---
                 Two Artificial Intelligence Applications in Medical
                 Education",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "2",
  pages =        "207--235",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "MEDCAT (medical diagnosis, consultation, and teaching)
                 is a program that makes diagnoses from empiric data
                 stored in patient records, explains its reasoning in
                 response to questions (consultant mode), and uses its
                 logical and communicative skills to instruct medical
                 students in the proper approach to medical diagnosis
                 (student mode). MEDCAT's reasoning can be modified by
                 free-format discussion with physicians. CATS
                 (computerized anatomical teaching system) is an
                 entirely separate program designed to teach gross
                 anatomy. Like MEDCAT, it has a consultant mode that the
                 students may use to explore the program's reasoning,
                 and a student mode in which the program takes the
                 initiative. A prominent feature of CATS is its ability
                 to discover meaningful general principles that reduce
                 the need for memorization.",
  acknowledgement = ack-nhfb,
  classification = "461; 723; 901",
  journalabr =   "IBM Syst J",
  keywords =     "artificial intelligence --- Expert Systems; biomedical
                 engineering; cats; Computer Aided Diagnosis; education
                 --- Computer Applications; MEDCAT; medical education;
                 natural-language interface",
}

@Article{Burns:1986:PIE,
  author =       "N. A. Burns and T. J. Ashford and C. T. Iwaskiw and R.
                 P. Starbird and R. L. Flagg",
  title =        "The {Portable Inference Engine}: Fitting significant
                 expertise into small systems",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "2",
  pages =        "236--243",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The Portable Inference Engine (PIE) is the nucleus of
                 an expert system that allows the segmentation of rules
                 in order to utilize large knowledge bases in limited
                 memory. If the expert-systems rules can be divided into
                 segments of highly related rules with little
                 interaction among those segments, such knowledge-base
                 segments can then be paged in and out of memory on
                 demand. PIE gathers information by querying the user
                 and executing internal procedures in order to conclude
                 goals.",
  acknowledgement = ack-nhfb,
  classification = "722; 732",
  journalabr =   "IBM Syst J",
  keywords =     "artificial intelligence; computer architecture; Expert
                 Systems; large knowledge bases; portable inference
                 engine; rule segmentation",
}

@Article{Ohms:1986:CPD,
  author =       "B. G. Ohms",
  title =        "Computer Processing of Dates Outside the {Twentieth
                 Century}",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "2",
  pages =        "244--251",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper presents practical solutions to problems
                 envisioned in extending computer processing of dates
                 beyond the twentieth century. Many data processing
                 managers are concerned with processing cross-century
                 dates, and in doing so using existing systems, with a
                 minimum of disruption to normal operations. The use of
                 existing date formats can eliminate the need for
                 massive system modifications. Methods of using existing
                 date formats across century boundaries are explained.
                 The use of a format termed the Lilian date format in
                 honor of Luigi Lilio, the inventor of the Gregorian
                 calendar, is introduced. The requirements for an
                 effective date-processing algorithm are presented.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming --- Algorithms; data processing;
                 date processing; Lilian date format",
}

@Article{Gershon:1986:Pc,
  author =       "Gary Gershon",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "3",
  pages =        "254--255",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lorin:1986:SAT,
  author =       "H. Lorin",
  title =        "Systems Architecture in Transition --- an Overview",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "3-4",
  pages =        "256--273",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper undertakes to describe topics of current
                 interest in the evolution of computing structures. It
                 discusses various unit structures that may emerge as
                 the economics and capabilities of technology relax more
                 and more constraints. Of particular interest is the
                 internal structure of a central computing complex, the
                 relation of computing elements and I/O elements, and
                 the maturity of the I/O elements. The paper also
                 suggests that the structures found within a single
                 computing unit may be realized across larger elements
                 more widely dispersed. Hardware and software issues are
                 addressed.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "central computing complex; computer architecture;
                 computer hardware; computer software; computer systems,
                 digital --- Reviews; internal structure; Reviews",
}

@Article{Matick:1986:IMS,
  author =       "R. E. Matick",
  title =        "Impact of Memory Systems on Computer Architecture and
                 System Organization",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "3-4",
  pages =        "274--305",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The largest part of computer architecture, in both the
                 central processing unit and the overall system is
                 directly influenced by the types of memory systems
                 available. This paper demonstrates this relationship
                 and shows how it has affected computer architecture
                 over the years. Two approaches are used, the first
                 being a direct look at how specific architectures
                 attempt to circumvent the limitations of the associated
                 memory system. This includes such topics as the
                 internal architecture of CPUs: memory hierarchies and
                 virtual memory, I/O architecture, file structuring, and
                 database architecture. Second, a gedanken (thought)
                 experiment is used to predict future trends.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer architecture; data processing --- File
                 Organization; data storage units; database systems; I/O
                 architecture; memory hierarchies; memory systems;
                 virtual memory",
}

@Article{Doherty:1986:CTH,
  author =       "W. J. Doherty and W. G. Pope",
  title =        "Computing as a Tool for Human Augmentation",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "3-4",
  pages =        "306--320",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The IBM Thomas J. Watson Research Center in Yorktown,
                 New York, has experienced a factor of twenty times
                 increase in the past ten years in the amount of time
                 its people spend using computers interactively in their
                 work. This is twice the penetration rate of television
                 in the 1950s. A similar degree of penetration is
                 expected to happen in the rest of industry in the next
                 ten years. That will mean a major departure from
                 traditional data processing, with computers being used
                 as tools to augment the users' abilities in all phases
                 of their work. Examples of human augmentation, as seen
                 in the work of several researchers, are offered in this
                 paper. The integration of large numbers of personal
                 workstations into this environment has given us new
                 understanding of how to work. The causes, impediments,
                 and consequences of these changes are described, with
                 emphasis on human requirements for bandwidth, response
                 time, tools, on-line storage, and computing capacity.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer systems, digital; computer use; data
                 processing --- Human Factors; human augmentation;
                 Interactive Operation; personal workstations;
                 technology --- Economic and Sociological Effects",
}

@Article{Henry:1986:ISA,
  author =       "G. G. Henry",
  title =        "{IBM} Small-System Architecture and Design --- Past,
                 Present, and Future",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "3-4",
  pages =        "321--333",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A selection of IBM's small-system architectures and
                 design approaches are reviewed. Then current
                 architectures are discussed, with an emphasis on the RT
                 Personal Computer. A brief presentation of trends in
                 small systems is provided.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer architecture; computers, personal --- Design;
                 small computer systems; small-system architecture",
}

@Article{Goldberg:1986:SEE,
  author =       "R. Goldberg",
  title =        "Software Engineering: an Emerging Discipline",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "3-4",
  pages =        "334--353",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Software engineering is an emerging discipline whose
                 goal is to produce reliable software products in a
                 cost-effective manner. This discipline is evolving
                 rapidly as the challenges faced by its practitioners
                 keep extending their skills. This paper gives a quick
                 tour of the main ideas and thrusts that have driven
                 software engineering in its fist 25 years and attempts
                 to look ahead at the next set of advances.",
  acknowledgement = ack-nhfb,
  classification = "723",
  journalabr =   "IBM Syst J",
  keywords =     "computer programming; computer software; Software
                 Engineering; software reliability; technology
                 transfer",
}

@Article{Bennett:1986:TBA,
  author =       "J. L. Bennett",
  title =        "Tools for Building Advanced User Interfaces",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "3-4",
  pages =        "354--368",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The design of the user interface has an important
                 bearing on the knowledge users must have to accomplish
                 work through the user-computer interface. Recognition
                 of this fact is leading to the development of User
                 Interface Management Systems (UIMSs). A UIMS is a
                 design concept for separating the details of user
                 interaction from the details of advanced applications.
                 This paper shows how UIMS research and research into
                 the representation of user process knowledge (i.e.,
                 user how-to-do-skills) can help developers understand
                 issues involving ease of learning and ease of use. This
                 parallel progress in UIMS development and in user
                 modeling makes it easier to build high-quality advanced
                 user interfaces.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer interfaces; computer software --- Human
                 Factors; Design; systems development; user interface
                 management systems",
}

@Article{Aschenbrenner:1986:OSI,
  author =       "J. R. Aschenbrenner",
  title =        "Open Systems Interconnection",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "3-4",
  pages =        "369--379",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper briefly defines what OSI is, the
                 interrelationships of the various standards bodies, and
                 the goals and benefits to users, vendors, country post
                 telephone and telegraph bodies, common carriers, and
                 governments. The IBM view of OSI and how it relates to
                 Systems Network Architecture is also discussed.",
  acknowledgement = ack-nhfb,
  classification = "718; 722; 723; 902",
  journalabr =   "IBM Syst J",
  keywords =     "computer architecture; computer networks ---
                 Standards; data transmission; open systems
                 interconnection; OSI standards; Standards; systems
                 network architecture",
}

@Article{Kasson:1986:AVT,
  author =       "J. M. Kasson",
  title =        "Advanced Voice\slash Data Telephone Switching System",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "3-4",
  pages =        "380--398",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper describes a voice\slash data
                 circuit-switching system known as the ROLM CBX II. The
                 paper first discusses what the ROLM CBX II family does,
                 describing the most important functions and relating
                 them to popular voice and data applications. The second
                 section describes how the CBX II works, delineating the
                 architecture and giving some details of the system
                 implementation. The final section offers an assessment
                 of what the CBX II and similar products might become in
                 the future.",
  acknowledgement = ack-nhfb,
  classification = "718",
  journalabr =   "IBM Syst J",
  keywords =     "digital communication systems --- Voice/Data
                 Integrated Services; Rolm CBX II; switching systems;
                 voice/data circuit-switching",
}

@Article{Mayadas:1986:EPD,
  author =       "A. F. Mayadas and R. C. Durbeck and W. D. Hinsberg and
                 J. M. McCrossin",
  title =        "The Evolution of Printers and Displays",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "3-4",
  pages =        "399--416",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Printer and display technologies have undergone
                 remarkable changes since the beginning of the computer
                 era. In this paper we trace the evolution of these two
                 types of I/O devices, from the middle of the 1940s to
                 the present, and show how computer system evolution has
                 influenced the designs and technologies of I/O
                 devices.",
  acknowledgement = ack-nhfb,
  classification = "722; 741",
  journalabr =   "IBM Syst J",
  keywords =     "computer peripheral equipment; computer system
                 evolution; display devices; I/O devices",
}

@Article{Anonymous:1986:CV,
  author =       "Anonymous",
  title =        "Contents of Volume 25, 1988",
  journal =      j-IBM-SYS-J,
  volume =       "25",
  number =       "3/4",
  pages =        "417--417",
  year =         "1986",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gershon:1987:Pa,
  author =       "Gary Gershon",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "1",
  pages =        "2--3",
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Scherr:1987:SNS,
  author =       "Allan L. Scherr",
  title =        "Structures for Networks of Systems",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "1",
  pages =        "4--12",
  month =        jan,
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper describes how systems will be
                 interconnected in the future, the roles that they will
                 play, and the trade-offs that affect these roles.
                 Starting with a general model for structuring a network
                 of systems, general trade-offs in cost and performance
                 are discussed relative to where functions are placed in
                 the network. Several general principles for data and
                 function placement in a network of systems are derived
                 from these trade-offs. The optimal roles for each of
                 several layers of a network of systems are discussed.",
  acknowledgement = ack-nhfb,
  classification = "716; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks --- Performance; Data Handling; data
                 processing, business; design; distributed systems;
                 economics; management; performance; structuring;
                 trade-offs",
  review =       "ACM CR 8802-0084",
  subject =      "C.2.1 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design \\ K.6.2 Computing Milieux, MANAGEMENT OF
                 COMPUTING AND INFORMATION SYSTEMS, Installation
                 Management, Computing equipment management \\ C.4
                 Computer Systems Organization, PERFORMANCE OF SYSTEMS,
                 Performance attributes",
}

@Article{Sundstrom:1987:SCR,
  author =       "Robert J. Sundstrom and James B. {Staton, III} and
                 Gary D. Schultz and Matthew L. Hess and George A.
                 {Deaton, Jr.} and Leo J. Cole and Robert M. Amy",
  title =        "{SNA}: Current Requirements and Direction",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "1",
  pages =        "13--36",
  month =        jan,
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Since its announcement in 1974, Systems Network
                 Architecture (SNA) has evolved in terms of its
                 functional content, configurational flexibility, and
                 network management services. This paper briefly traces
                 this progress to the present and examines the more
                 recent advances in greater detail. It then discusses
                 known requirements for enhanced application and
                 transaction services, for additional provisions for
                 very large networks, for continuing adaptation of
                 small-system and transmission media advances, for
                 inclusion of additional management capabilities, and
                 for further integration of network standards.",
  acknowledgement = ack-nhfb,
  classification = "716; 722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer architecture; computer networks ---
                 Performance; design; distribution services; management;
                 peripheral nodes; Reviews; systems network;
                 transmission media",
  subject =      "C.2.1 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, SNA \\ K.2 Computing Milieux, HISTORY OF
                 COMPUTING, Systems",
}

@Article{Green:1987:PDC,
  author =       "Paul E. {Green, Jr.} and Dominique N. Godard",
  title =        "Prospects and Design Choices for Integrated Private
                 Networks",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "1",
  pages =        "37--54",
  month =        jan,
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper reviews some of the choices that will be
                 available in the next few years, as the much-discussed
                 move toward implementing voice and data integration
                 within a single wide-area integrated private network
                 proceeds. A discussion is given of requirements the
                 network ought to satisfy for its users. Two
                 particularly promising approaches, fast packet
                 switching (FPS) and hybrid switching (HS), are defined,
                 and specimen design points for FPS and HS are
                 postulated, so that the two can be compared.",
  acknowledgement = ack-nhfb,
  classification = "716; 722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks; computer systems, digital ---
                 Design; data transmission --- Packet Switching; design;
                 Design; fast switching; hybrid switching; performance;
                 voice integration",
  subject =      "C.2.0 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General, ISDN \\ C.2.1
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Network Architecture and Design",
}

@Article{Korein:1987:R,
  author =       "James U. Korein and Jahuda Ish-Shalom",
  title =        "Robotics",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "1",
  pages =        "55--95",
  month =        jan,
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper is a survey that is intended to give the
                 reader an introduction to some issues and problems in
                 the field of robotics today. The first section
                 discusses industrial applications of robotics and the
                 requirements they engender. A substantial section is
                 included on robot programming, including programming
                 languages, motion programming, and techniques. This is
                 followed by a section on trajectory planning. Issues in
                 both robot-level trajectory planning and task-level
                 trajectory planning are discussed.",
  acknowledgement = ack-nhfb,
  classification = "721; 723; 731",
  journalabr =   "IBM Syst J",
  keywords =     "artificial intelligence --- Expert Systems; design;
                 languages; motion programming; performance; Reviews;
                 robot programming; robotics --- Vision Systems; robots,
                 industrial; trajectory planning",
  review =       "ACM CR 8801-0039",
  subject =      "I.2.9 Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Robotics \\ J.7 Computer Applications,
                 COMPUTERS IN OTHER SYSTEMS, Command and control",
}

@Article{Selinger:1987:DT,
  author =       "Patricia G. Selinger",
  title =        "Database Technology",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "1",
  pages =        "96--106",
  month =        jan,
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Computers were originally invented and used to ease
                 and automate the task of computation. As a side effect,
                 the technology needed for storing data was also
                 invented to provide the computational engine with input
                 data and allow it to output results. The means of
                 permanently storing data included punched cards, tape,
                 and disks. Over the years, database technology has
                 evolved through at least three generations to a diverse
                 and sophisticated set of data management tools, as
                 discussed in this paper.",
  acknowledgement = ack-nhfb,
  classification = "716; 722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "access methods; computers --- Data Communication
                 Equipment; data transmission equipment --- Performance;
                 database systems; languages; logging; mainframe;
                 management; Reviews; transaction",
  review =       "ACM CR 8803-0213",
  subject =      "H.2.0 Information Systems, DATABASE MANAGEMENT,
                 General \\ K.2 Computing Milieux, HISTORY OF COMPUTING,
                 Systems",
}

@Article{Hopkins:1987:PIS,
  author =       "Martin E. Hopkins",
  title =        "A Perspective on the 801\slash {Reduced Instruction
                 Set Computer}",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "1",
  pages =        "107--121",
  month =        jan,
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "In 1975, work began at the Thomas J. Watson Research
                 Center on an experimental minicomputer. This project,
                 termed the 801 project, questioned the trend toward
                 complexity in computer architecture. It was observed
                 that most of the complex instructions were seldom used.
                 Thus, a computer could be designed with only simple
                 instructions without drastically increasing the path
                 length or number of instructions required to implement
                 an application. This paper describes the background and
                 evolution of these ideas in the context of the 801
                 experimental minicomputer project.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "addressing modes; computer architecture; computer
                 graphics --- Interactive; computers, minicomputer ---
                 Applications; data flow; design; experimentation;
                 Microprogramming; performance; range checking",
  review =       "ACM CR 8802-0080",
  subject =      "C.1.1 Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Single Data Stream Architectures, RISC
                 \\ C.0 Computer Systems Organization, GENERAL,
                 Instruction set design \\ C.5.2 Computer Systems
                 Organization, COMPUTER SYSTEM IMPLEMENTATION,
                 Minicomputers",
}

@Article{Goldstein:1987:DCI,
  author =       "Barry C. Goldstein and Jeffrey M. Jaffe",
  title =        "Data Communications: the Implications of Communication
                 Systems for Protocol Design",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "1",
  pages =        "122--137",
  month =        jan,
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The construction of a communication network
                 architecture, specifying protocols by which systems
                 communicate, is a complex art. Much has been written
                 about the optimal protocols for theoretical models of
                 systems. This paper points out that protocol design
                 must depend on the `nuts and bolts' of the systems
                 which implement the protocols. Numerous examples are
                 provided to support this thesis. The paper also briefly
                 discusses other issues that influence protocol design
                 and draws lessons for standards activities.",
  acknowledgement = ack-nhfb,
  classification = "716; 722; 723",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks; computers --- Data Communication
                 Equipment; computing systems; coupling design; data
                 link; design; network architecture; Protocols;
                 standardization",
  review =       "ACM CR 8802-0085",
  subject =      "C.2.2 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
                 Protocol architecture \\ C.2.0 Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, General,
                 Data communications",
}

@Article{Chess:1987:LCC,
  author =       "David M. Chess and Mike Cowlishaw",
  title =        "A large-scale computer conferencing system",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "1",
  pages =        "138--153",
  month =        jan,
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design",
  review =       "ACM CR 8710-0886",
  subject =      "H.4.3 Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Communications Applications,
                 Teleconferencing \\ H.4.3 Information Systems,
                 INFORMATION SYSTEMS APPLICATIONS, Communications
                 Applications, TOOLS \\ H.2.1 Information Systems,
                 DATABASE MANAGEMENT, Logical Design",
}

@Article{Gershon:1987:Pb,
  author =       "Gary Gershon",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "2",
  pages =        "156--156",
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Sy:1987:OI,
  author =       "K. K. Sy and M. O. Shiobara and M. Yamaguchi and Y.
                 Kobayashi and S. Shukuya and T. Tomatsu",
  title =        "{OSI-SNA} interconnections",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "2",
  pages =        "157--173",
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; standardization",
  subject =      "C.2.1 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, OSI \\ C.2.1 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, SNA \\ K.1 Computing Milieux, THE COMPUTER
                 INDUSTRY, Standards",
}

@Article{Farrell:1987:VIC,
  author =       "E. J. Farrell",
  title =        "Visual interpretation of complex data",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "2",
  pages =        "174--200",
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design",
  subject =      "I.4.0 Computing Methodologies, IMAGE PROCESSING,
                 General, Image displays \\ I.3.3 Computing
                 Methodologies, COMPUTER GRAPHICS, Picture/Image
                 Generation, Display algorithms \\ I.6.m Computing
                 Methodologies, SIMULATION AND MODELING, Miscellaneous
                 \\ I.3.7 Computing Methodologies, COMPUTER GRAPHICS,
                 Three-Dimensional Graphics and Realism, Animation",
}

@Article{Halpern:1987:IPS,
  author =       "P. Halpern and S. M. Roberts and L. Lopez",
  title =        "An incidence-matrix-driven panel system for the {IBM}
                 {PC}",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "2",
  pages =        "201--214",
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; human factors; languages; theory",
  subject =      "K.8 Computing Milieux, PERSONAL COMPUTING, IBM PC \\
                 D.2.2 Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, User interfaces \\ G.2.2 Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Network
                 problems",
}

@Article{Tetzlaff:1987:PPV,
  author =       "W. H. Tetzlaff and T. Beretvas and W. M. Buco and J.
                 Greenberg and D. R. Patterson and G. A. Spivak",
  title =        "A page-swapping prototype for {VM\slash HPO}",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "2",
  pages =        "215--230",
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design; experimentation; measurement;
                 performance",
  subject =      "D.4.2 Software, OPERATING SYSTEMS, Storage Management,
                 Virtual memory",
}

@Article{Anonymous:1987:SRa,
  author =       "Anonymous",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "2",
  pages =        "231--231",
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gershon:1987:Pc,
  author =       "Gary Gershon",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "3",
  pages =        "234--234",
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Schutt:1987:MHS,
  author =       "Thomas E. Sch{\"u}tt and James B. {Staton, III} and
                 Wilhelm F. Racke",
  title =        "Message handling systems based on the {CCITT X.400}
                 recommendations",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "3",
  pages =        "235--254",
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; management; standardization",
  subject =      "H.4.3 Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Communications Applications, Electronic
                 mail \\ C.2.0 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General, Data
                 communications \\ K.1 Computing Milieux, THE COMPUTER
                 INDUSTRY, Standards",
}

@Article{Fleischmann:1987:SII,
  author =       "Albert Fleischmann and Seung-tae Chin and Wolfgang
                 Effelsberg",
  title =        "Specification and implementation of an {ISO} session
                 layer",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "3",
  pages =        "255--275",
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; standardization",
  subject =      "C.2.1 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, OSI \\ C.2.2 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols \\
                 K.1 Computing Milieux, THE COMPUTER INDUSTRY,
                 Standards",
}

@Article{Zachman:1987:FIS,
  author =       "John A. Zachman",
  title =        "A framework for information systems architecture",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "3",
  pages =        "276--292",
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; management",
  subject =      "H.1.0 Information Systems, MODELS AND PRINCIPLES,
                 General",
}

@Article{Harrison:1987:SSF,
  author =       "E. S. Harrison and E. J. Schmitt",
  title =        "The structure of {System\slash 88}, a fault-tolerant
                 computer",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "3",
  pages =        "293--318",
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design",
  subject =      "C.4 Computer Systems Organization, PERFORMANCE OF
                 SYSTEMS \\ C.5.m Computer Systems Organization,
                 COMPUTER SYSTEM IMPLEMENTATION, Miscellaneous",
}

@Article{Anonymous:1987:Ba,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "3",
  pages =        "319--321",
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1987:SRb,
  author =       "Anonymous",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "3",
  pages =        "322--322",
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gershon:1987:Pd,
  author =       "Gary Gershon",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "4",
  pages =        "324--325",
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Loucks:1987:AIE,
  author =       "L. K. Loucks and C. H. Sauer",
  title =        "{Advanced Interactive Executive (AIX)} operating
                 system overview",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "4",
  pages =        "326--345",
  month =        dec,
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "http://technologists.com/sauer/Advanced%20Interactive%20Executive%20(AIX)%20Operating%20System%20Overview.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "design; performance",
  subject =      "K.8 Computing Milieux, PERSONAL COMPUTING, IBM PC \\
                 D.4.0 Software, OPERATING SYSTEMS, General \\ D.4.7
                 Software, OPERATING SYSTEMS, Organization and Design,
                 Interactive systems",
}

@Article{Simpson:1987:IRP,
  author =       "R. O. Simpson and P. D. Hester",
  title =        "The {IBM RT PC ROMP} processor and memory management
                 unit architecture",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "4",
  pages =        "346--360",
  month =        dec,
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; performance",
  subject =      "K.8 Computing Milieux, PERSONAL COMPUTING, IBM PC \\
                 B.7.1 Hardware, INTEGRATED CIRCUITS, Types and Design
                 Styles, Microprocessors and microcomputers",
}

@Article{Cordell:1987:AIE,
  author =       "R. Q. {Cordell, II} and M. Misra and R. F. Wolfe",
  title =        "{Advanced Interactive Executive} program development
                 environment",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "4",
  pages =        "361--382",
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design",
  subject =      "D.4.0 Software, OPERATING SYSTEMS, General \\ K.8
                 Computing Milieux, PERSONAL COMPUTING, IBM PC \\ D.4.7
                 Software, OPERATING SYSTEMS, Organization and Design,
                 Interactive systems",
}

@Article{Waters:1987:AUE,
  author =       "F. C. H. Waters and R. G. Bias and P. L.
                 Smith-Kerker",
  title =        "{AIX} usability enhancements and human factors",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "4",
  pages =        "383--394",
  month =        dec,
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; human factors; performance",
  subject =      "D.4.0 Software, OPERATING SYSTEMS, General \\ K.8
                 Computing Milieux, PERSONAL COMPUTING, IBM PC \\ H.1.2
                 Information Systems, MODELS AND PRINCIPLES,
                 User/Machine Systems, Human factors \\ D.2.2 Software,
                 SOFTWARE ENGINEERING, Tools and Techniques, User
                 interfaces",
}

@Article{Mills:1987:BSI,
  author =       "H. D. Mills and R. C. Linger and A. R. Hevner",
  title =        "Box structured information systems",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "4",
  pages =        "395--413",
  month =        dec,
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; management; verification",
  subject =      "H.2.m Information Systems, DATABASE MANAGEMENT,
                 Miscellaneous",
}

@Article{Green:1987:PAP,
  author =       "P. E. {Green, Jr.} and R. J. Chappuis and J. D. Fisher
                 and P. S. Frosch and C. E. Wood",
  title =        "A perspective on {Advanced Peer-to-Peer Networking}",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "4",
  pages =        "414--428",
  month =        dec,
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; standardization",
  subject =      "C.2.0 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General, Data
                 communications \\ C.2.1 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, SNA",
}

@Article{Sultan:1987:ISA,
  author =       "R. A. Sultan and P. Kermani and G. A. Grover and T. P.
                 Barzilai and A. E. Baratz",
  title =        "Implementing {System\slash 36 Advanced Peer-to-Peer
                 Networking}",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "4",
  pages =        "429--452",
  month =        dec,
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:31:32 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; standardization",
  subject =      "C.2.0 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General, Data
                 communications \\ C.2.1 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, SNA",
}

@Article{Anonymous:1987:Bb,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "4",
  pages =        "453--454",
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1987:CV,
  author =       "Anonymous",
  title =        "Contents of Volume 26, 1987",
  journal =      j-IBM-SYS-J,
  volume =       "26",
  number =       "4",
  pages =        "455--455",
  year =         "1987",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1988:CIA,
  author =       "Anonymous",
  title =        "Cumulative index: Authors \emdash{} Subjects \emdash{}
                 Abstracts",
  journal =      j-IBM-SYS-J,
  volume =       "27S",
  number =       "1",
  pages =        "1--49",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "No volume or issue number, but bound with volume 27.",
  acknowledgement = ack-nhfb,
}

@Article{Gershon:1988:Pa,
  author =       "Gary Gershon",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "1",
  pages =        "2--2",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Rose:1988:SNM,
  author =       "D. B. Rose and J. E. Munn",
  title =        "{SNA} network management directions",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "1",
  pages =        "3--14",
  month =        jan,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; management; performance",
  subject =      "C.2.1 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, SNA \\ C.2.3 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Operations,
                 Network management",
}

@Article{Moore:1988:USA,
  author =       "R. E. Moore",
  title =        "Utilizing the {SNA} alert in the management of
                 multivendor networks",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "1",
  pages =        "15--31",
  month =        jan,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; management",
  subject =      "C.2.1 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, SNA \\ C.2.3 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Operations,
                 Network management",
}

@Article{Ahmadi:1988:N,
  author =       "M. Ahmadi and J. H. Chou and G. Gafka",
  title =        "{NetView\slash PC}",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "1",
  pages =        "32--44",
  month =        jan,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; management",
  subject =      "C.2.1 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, SNA \\ K.8 Computing Milieux, PERSONAL
                 COMPUTING, IBM PC \\ C.2.3 Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Network
                 Operations, Network management",
}

@Article{Kanyuh:1988:INM,
  author =       "D. Kanyuh",
  title =        "An integrated network management product",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "1",
  pages =        "45--59",
  month =        jan,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; management",
  subject =      "C.2.3 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Operations,
                 Network management \\ C.2.3 Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Network
                 Operations, Network monitoring",
}

@Article{Devlin:1988:ABI,
  author =       "B. A. Devlin and P. T. Murphy",
  title =        "An architecture for a business and information
                 system",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "1",
  pages =        "60--80",
  month =        jan,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; human factors; management; performance",
  subject =      "C.1.3 Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Other Architecture Styles, Data-flow
                 architectures \\ H.2.m Information Systems, DATABASE
                 MANAGEMENT, Miscellaneous \\ H.1.2 Information Systems,
                 MODELS AND PRINCIPLES, User/Machine Systems, Human
                 factors \\ J.1 Computer Applications, ADMINISTRATIVE
                 DATA PROCESSING, Business \\ H.2.4 Information Systems,
                 DATABASE MANAGEMENT, Systems, Transaction processing",
}

@Article{Anonymous:1988:Ba,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "1",
  pages =        "81--85",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gershon:1988:Pb,
  author =       "Gary Gershon",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "2",
  pages =        "88--89",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Kogan:1988:DOS,
  author =       "Michael S. Kogan and Freeman L. {Rawson, III}",
  title =        "The design of {Operating System/2}",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "2",
  pages =        "90--104",
  month =        jun,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design",
  subject =      "D.4.0 Software, OPERATING SYSTEMS, General, OS/2",
}

@Article{Chang:1988:OED,
  author =       "P. Y. Chang and W. W. Myre",
  title =        "{OS/2 EE} database manager overview and technical
                 highlights",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "2",
  pages =        "105--118",
  month =        jun,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; languages; management",
  subject =      "D.4.0 Software, OPERATING SYSTEMS, General, OS/2 \\
                 H.2.3 Information Systems, DATABASE MANAGEMENT,
                 Languages, SQL",
}

@Article{Watson:1988:OQM,
  author =       "S. L. Watson",
  title =        "{OS/2} query manager overview and prompted interface",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "2",
  pages =        "119--133",
  month =        jun,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; human factors; languages; management",
  subject =      "H.2.4 Information Systems, DATABASE MANAGEMENT,
                 Systems, Query processing \\ H.2.3 Information Systems,
                 DATABASE MANAGEMENT, Languages, SQL \\ D.4.0 Software,
                 OPERATING SYSTEMS, General, OS/2 \\ D.2.2 Software,
                 SOFTWARE ENGINEERING, Tools and Techniques, User
                 interfaces",
}

@Article{Cook:1988:WOS,
  author =       "R. L. Cook and F. L. {Rawson, III} and J. A. Tunkel
                 and R. L. Williams",
  title =        "Writing an {Operating System/2} application",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "2",
  pages =        "134--157",
  month =        jun,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; performance; reliability",
  subject =      "D.4.0 Software, OPERATING SYSTEMS, General, DOS \\
                 D.4.0 Software, OPERATING SYSTEMS, General, OS/2",
}

@Article{Sales:1988:CNG,
  author =       "R. Sales",
  title =        "{COBOL/2}: The next generation in applications
                 programming",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "2",
  pages =        "158--169",
  month =        jun,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; languages",
  subject =      "D.3.4 Software, PROGRAMMING LANGUAGES, Processors,
                 Compilers \\ D.2.5 Software, SOFTWARE ENGINEERING,
                 Testing and Debugging, Debugging aids",
}

@Article{Mizell:1988:UDD,
  author =       "A. M. Mizell",
  title =        "Understanding device drivers in {Operating System/2}",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "2",
  pages =        "170--184",
  month =        jun,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design",
  subject =      "D.4.0 Software, OPERATING SYSTEMS, General, OS/2 \\
                 D.4.1 Software, OPERATING SYSTEMS, Process Management
                 \\ D.4.7 Software, OPERATING SYSTEMS, Organization and
                 Design",
}

@Article{Thompson:1988:VDC,
  author =       "S. Thompson",
  title =        "{VGA}\emdash Design choices for a new video
                 subsystem",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "2",
  pages =        "185--197",
  month =        jun,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; measurement; performance",
  subject =      "K.8 Computing Milieux, PERSONAL COMPUTING \\ I.3.1
                 Computing Methodologies, COMPUTER GRAPHICS, Hardware
                 architecture",
}

@Article{Sykes:1988:RIC,
  author =       "S. C. G. Sykes",
  title =        "The {Realtime Interface Co-Processor Multiport/2}
                 adapter",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "2",
  pages =        "198--205",
  month =        jun,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; performance",
  subject =      "C.1.m Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Miscellaneous \\ C.3 Computer Systems
                 Organization, SPECIAL-PURPOSE AND APPLICATION-BASED
                 SYSTEMS, Real-time systems \\ C.4 Computer Systems
                 Organization, PERFORMANCE OF SYSTEMS, Design studies",
}

@Article{Griffee:1988:ITF,
  author =       "A. W. Griffee and C. A. Casey",
  title =        "An introduction to typographic fonts and digital font
                 resources",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "2",
  pages =        "206--218",
  month =        jun,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; documentation; human factors; languages",
  review =       "ACM CR 9003-0202",
  subject =      "B.4.2 Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
                 Input/Output Devices, Data terminals and printers \\
                 J.7 Computer Applications, COMPUTERS IN OTHER SYSTEMS,
                 Publishing",
}

@Article{deBry:1988:AFP,
  author =       "R. K. deBry and B. G. Platte",
  title =        "{Advanced Function Printing}: a tutorial",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "2",
  pages =        "219--233",
  month =        jun,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; documentation; languages",
  subject =      "B.4.2 Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
                 Input/Output Devices, Data terminals and printers \\
                 J.7 Computer Applications, COMPUTERS IN OTHER SYSTEMS,
                 Publishing",
}

@Article{deBry:1988:AAF,
  author =       "R. K. deBry and B. G. Platte and C. L. Berinato and J.
                 W. Marlin",
  title =        "Architectures of {Advanced Function Printing}",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "2",
  pages =        "234--245",
  month =        jun,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  keywords =     "design; documentation; languages",
  subject =      "B.4.2 Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
                 Input/Output Devices, Data terminals and printers \\
                 J.7 Computer Applications, COMPUTERS IN OTHER SYSTEMS,
                 Publishing",
}

@Article{Anonymous:1988:Bb,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "2",
  pages =        "246--246",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gershon:1988:Pc,
  author =       "Gary Gershon",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "3",
  pages =        "248--249",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Wheeler:1988:ISA,
  author =       "E. F. Wheeler and A. G. Ganek",
  title =        "Introduction to {Systems Application Architecture}",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "3",
  pages =        "250--263",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Systems Application Architecture is a framework in
                 which applications are developed so that they run
                 consistently on major IBM computing systems. The paper
                 presents the motivation and requirements for this
                 framework and describes the main elements of its
                 structure. It also discusses the effect on current
                 processing technologies and on application
                 development.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Purchase, NY, USA",
  classification = "C6115 (Programming support); C6150J (Operating
                 systems)",
  keywords =     "Application development; design, Systems Application
                 Architecture; IBM computing systems; Processing
                 technologies",
  language =     "English",
  pubcountry =   "USA",
  subject =      "D.m Software, MISCELLANEOUS \\ C.2.0 Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, General,
                 Data communications",
  thesaurus =    "IBM computers; Network operating systems; Programming
                 environments; Software portability",
}

@Article{Ahuja:1988:CCS,
  author =       "V. Ahuja",
  title =        "{Common Communications Support} in {Systems
                 Application Architecture}",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "3",
  pages =        "264--280",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Application execution in a Systems Application
                 Architecture (SAA) network depends on the underlying
                 capability of the network to obtain reliable
                 connectivity and orderly data exchange among its system
                 components. The objectives of SAA are distributed
                 applications, distributed processing, and distributed
                 data, which are achieved through interconnected SAA
                 systems supporting appropriate interfaces and
                 architectures. The Common Communications Support of SAA
                 affords this capability by utilizing a number of
                 Systems Network Architecture communication
                 architectures and international standards. These
                 architectures provide useful data interchange within
                 SAA components by providing services ranging from
                 managing data links to specifying data streams for user
                 applications. The paper discusses the role of Common
                 Communications Support and the means for SAA users to
                 access this support, and provides an overview of the
                 functions and roles of various component architectures
                 of Common Communications Support, along with their
                 interrelationships.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Commun. Products Div., Research Triangle Park, NC,
                 USA",
  classification = "C6150J (Operating systems)",
  keywords =     "Common Communications Support; Connectivity; Data
                 exchange; design, Systems Application Architecture;
                 Distributed applications; Distributed data; Distributed
                 processing; Network",
  language =     "English",
  pubcountry =   "USA",
  subject =      "D.m Software, MISCELLANEOUS \\ C.2.0 Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, General,
                 Data communications",
  thesaurus =    "IBM computers; Network operating systems; Software
                 portability",
}

@Article{Berry:1988:CUA,
  author =       "R. E. Berry",
  title =        "{Common User Access} --- a consistent and usable
                 human-computer interface for the {SAA} environments",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "3",
  pages =        "281--300",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Systems application architecture (SAA) will allow
                 customers to apply their investments in their computer
                 operations across IBM's three major computing
                 environments that exhibit unique characteristics in
                 terms of architecture, workstations, operating systems,
                 and system services. User experience is one of these
                 investments. The Common User Access (CUA) establishes a
                 degree of standardization that is compatible with the
                 differences in the three environments and that supports
                 transfer of users' experiences. CUA is based on a
                 user-interface architecture that identifies fundamental
                 elements of structure. The intent is to provide a
                 transfer of users' conceptual-level learning across
                 different and evolving technologies. CUA specifies
                 user-interface components and guidelines to be used by
                 application designers and it provides a basis for
                 programming development tool specifications.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Entry Syst. Div., Austin, TX, USA",
  classification = "C6115 (Programming support); C6150J (Operating
                 systems); C6180 (User interfaces)",
  keywords =     "Application designers; Common User Access;
                 Conceptual-level learning; design, Human-computer
                 interface; human factors; Operating systems;
                 Programming development tool specifications; SAA
                 environments; System services; Systems application
                 architecture; Workstations",
  language =     "English",
  pubcountry =   "USA",
  subject =      "D.2.2 Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, User interfaces \\ D.m Software,
                 MISCELLANEOUS \\ C.2.0 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General, Data
                 communications \\ H.1.2 Information Systems, MODELS AND
                 PRINCIPLES, User/Machine Systems, Human factors",
  thesaurus =    "IBM computers; Network operating systems; Programming
                 environments; User interfaces",
}

@Article{Wolford:1988:AES,
  author =       "D. E. Wolford",
  title =        "Application enabling in {SAA}",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "3",
  pages =        "301--305",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The Common Programming Interface (CPI), one of the
                 four key elements of Systems Application Architecture,
                 comprises a growing set of programming languages and
                 services. The CPI indirectly offers end-user access
                 through the Common User Access by providing the
                 application developer with the necessary interfaces.
                 The CPI addresses the application development
                 requirement for portability of applications and
                 programmer skills. As the CPI continues to expand, it
                 addresses the requirements for access to host data
                 through intelligent workstations and for transparent
                 access to remote data and applications.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Gen. Products Div., San Jose, CA, USA",
  classification = "C6115 (Programming support); C6150J (Operating
                 systems)",
  keywords =     "Application developer; Application development
                 requirement; Common Programming Interface; Common User
                 Access; design, SAA; End-user access; Intelligent
                 workstations; languages; Portability; Programmer
                 skills; Programming languages; Remote data; Systems
                 Application Architecture; Transparent access",
  language =     "English",
  pubcountry =   "USA",
  subject =      "D.m Software, MISCELLANEOUS \\ C.2.0 Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, General,
                 Data communications",
  thesaurus =    "IBM computers; Network operating systems; Programming
                 environments; Software portability",
}

@Article{Uhlir:1988:EUI,
  author =       "S. Uhlir",
  title =        "Enabling the user interface",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "3",
  pages =        "306--314",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Presenting a consistent interface to the user is one
                 of the objectives of Systems Application Architecture
                 (SAA). The development of SAA applications is
                 simplified by providing enabling interfaces which help
                 an application developer support the SAA user
                 interface. Rather than providing a single-level
                 enabling interface, SAA offers a spectrum of levels
                 spread over two interfaces: the SAA Presentation
                 Interface and the SAA Dialog Interface. This gives the
                 application developer the freedom to choose the
                 appropriate level of interface for the application.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Gen. Products Div., San Jose, CA, USA",
  classification = "C6115 (Programming support); C6150J (Operating
                 systems); C6180 (User interfaces)",
  keywords =     "Application developer; design, User interface; human
                 factors; SAA Dialog Interface; SAA Presentation
                 Interface; Systems Application Architecture; User
                 interface",
  language =     "English",
  pubcountry =   "USA",
  subject =      "D.2.2 Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, User interfaces \\ H.1.2 Information
                 Systems, MODELS AND PRINCIPLES, User/Machine Systems,
                 Human factors \\ D.m Software, MISCELLANEOUS \\ C.2.0
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, General, Data communications",
  thesaurus =    "IBM computers; Network operating systems; Programming
                 environments; User interfaces",
}

@Article{Buchwald:1988:IAS,
  author =       "L. A. Buchwald and R. W. Davison and W. P. Stevens",
  title =        "Integrating applications with {SAA}",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "3",
  pages =        "315--324",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Advances in computing technology and reductions in
                 development cost have greatly increased the number of
                 people who use computers, and have expanded the number
                 and types of applications available to them. People
                 want their applications to share data and to be
                 consistent with one another with respect to terminology
                 and appearance. They also frequently need access to
                 applications and data on computers in other locations;
                 the computers may be models and types that these
                 persons do not normally use. Integrating application
                 functions in a seamless environment is an important
                 step toward satisfying some of these requirements. The
                 paper discusses what integrated applications are, why
                 they are valuable, and how Systems Application
                 Architecture (SAA) can make it easier to develop
                 them.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Application Syst. Div., Milford, CT, USA",
  classification = "C6115 (Programming support); C6150J (Operating
                 systems)",
  keywords =     "Appearance; design, Computing technology; Development
                 cost; Integrated applications; Seamless environment;
                 Share data; Systems Application Architecture;
                 Terminology",
  language =     "English",
  pubcountry =   "USA",
  subject =      "D.m Software, MISCELLANEOUS \\ C.2.0 Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, General,
                 Data communications",
  thesaurus =    "IBM computers; Network operating systems; Programming
                 environments",
}

@Article{Dunfee:1988:DSA,
  author =       "W. P. Dunfee and J. D. McGehe and R. C. Rauf and K. O.
                 Shipp",
  title =        "Designing {SAA} applications and user interfaces",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "3",
  pages =        "325--347",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:18:23 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Describes a framework for developing applications that
                 conform to Systems Application Architecture (SAA). The
                 paper shows a high-level approach to creating a design;
                 it gives examples of early modeling work with the user
                 interface; and it appraises SAA through the eyes of
                 several system designers. The usability of user
                 interfaces has been evaluated through the modeling of
                 office tasks. That experience is described, showing the
                 influence of the SAA Common User Access (CUA) on the
                 model and the influence of the model on CUA. A design
                 for distributed applications that fit within the SAA
                 framework and the influence of SAA on the design of
                 integrated distributed applications are discussed.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Syst. Products Div., White Plains, NY, USA",
  classification = "C6115 (Programming support); C6150J (Operating
                 systems); C6180 (User interfaces)",
  keywords =     "Common User Access; design; High-level approach;
                 Integrated distributed applications, human factors;
                 Office tasks; System designers; Systems Application
                 Architecture; Usability; User interfaces",
  language =     "English",
  pubcountry =   "USA",
  subject =      "D.m Software, MISCELLANEOUS \\ C.2.0 Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, General,
                 Data communications \\ D.2.2 Software, SOFTWARE
                 ENGINEERING, Tools and Techniques, User interfaces \\
                 H.1.2 Information Systems, MODELS AND PRINCIPLES,
                 User/Machine Systems, Human factors",
  thesaurus =    "IBM computers; Network operating systems; Programming
                 environments; User interfaces",
}

@Article{Demers:1988:DFS,
  author =       "R. A. Demers",
  title =        "Distributed files for {SAA}",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "3",
  pages =        "348--361",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Files are still a major way of storing data in
                 computer systems, and they are a significant part of
                 the information to be handled by the distributed
                 processing networks that are developing. Systems
                 Application Architecture is supporting distributed
                 files. The goals, benefits, and problems of providing
                 this support are discussed, along with the role of
                 Distributed Data Management architecture.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Application Bus. Syst., Rochester, MN, USA",
  classification = "C6150J (Operating systems); C6160B (Distributed
                 DBMS)",
  keywords =     "design, Computer systems; Distributed Data Management
                 architecture; Distributed files; Distributed processing
                 networks; Systems Application Architecture",
  language =     "English",
  pubcountry =   "USA",
  subject =      "D.m Software, MISCELLANEOUS \\ C.2.0 Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, General,
                 Data communications \\ D.4.3 Software, OPERATING
                 SYSTEMS, File Systems Management, Distributed file
                 systems",
  thesaurus =    "Distributed databases; IBM computers; Network
                 operating systems",
}

@Article{Reinsch:1988:DDS,
  author =       "R. Reinsch",
  title =        "Distributed database for {SAA}",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "3",
  pages =        "362--369",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Describes, in general terms, distributed database and
                 its relationship to Systems Application Architecture
                 (SAA). It shows the importance to effective
                 distribution of IBM's Structured Query Language (SQL),
                 the database element of the Systems Application
                 Architecture Common Programming Interface (SAA CPI).
                 The paper defines five levels of distribution, showing
                 how each fits real-world application requirements.
                 Finally, it outlines the magnitude of the task.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Programming Syst. Div., San Jose, CA, USA",
  classification = "C6150J (Operating systems); C6160B (Distributed
                 DBMS)",
  keywords =     "Common Programming Interface; design, Distributed
                 database; languages; Real-world application
                 requirements; Structured Query Language; Systems
                 Application Architecture",
  language =     "English",
  pubcountry =   "USA",
  subject =      "D.m Software, MISCELLANEOUS \\ C.2.0 Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, General,
                 Data communications \\ H.2.4 Information Systems,
                 DATABASE MANAGEMENT, Systems, Distributed systems \\
                 H.2.3 Information Systems, DATABASE MANAGEMENT,
                 Languages, SQL",
  thesaurus =    "Distributed databases; IBM computers; Network
                 operating systems; Programming environments",
}

@Article{Scherr:1988:SDP,
  author =       "A. L. Scherr",
  title =        "{SAA} distributed processing",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "3",
  pages =        "370--383",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Discussed are motivations for distributed versus
                 centralized data processing, the relative advantages of
                 each, and the trade-offs involved as they relate to
                 Systems Applications Architecture (SAA). Presented is a
                 taxonomy of the various approaches to designing
                 applications to operate in a distributed manner. SAA
                 support for these modes is described. The management of
                 an enterprise-wide network of systems is discussed.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Application Syst. Div., Milford, CT, USA",
  classification = "C6150J (Operating systems)",
  keywords =     "design, Distributed processing; Enterprise-wide
                 network; Systems Applications Architecture",
  language =     "English",
  pubcountry =   "USA",
  subject =      "D.m Software, MISCELLANEOUS \\ C.2.0 Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, General,
                 Data communications",
  thesaurus =    "Distributed processing; IBM computers; Network
                 operating systems",
}

@Article{Haynes:1988:CSP,
  author =       "W. K. Haynes and M. E. Dewell and P. J. Herman",
  title =        "The {Cross System Product} application generator: An
                 evolution",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "3",
  pages =        "384--390",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An application generator is a generalized application
                 development tool with which professional programmers
                 develop applications using a fourth-generation
                 language. The paper describes the requirements that led
                 to the Cross System Product application generator, and
                 how the product progressed from a single-environment
                 product to the current multienvironment product. Also
                 described are how the Cross System Product fits within
                 Systems Application Architecture and how that may
                 affect the future of the Cross System Product.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Programming Syst. Dev. Lab., Cary, NC, USA",
  classification = "C6115 (Programming support)",
  keywords =     "design, Application generator; Fourth-generation
                 language; languages; Multienvironment product; Systems
                 Application Architecture",
  language =     "English",
  pubcountry =   "USA",
  subject =      "D.m Software, MISCELLANEOUS \\ C.2.0 Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, General,
                 Data communications \\ D.2.1 Software, SOFTWARE
                 ENGINEERING, Requirements/Specifications, Tools",
  thesaurus =    "Application generators; IBM computers; Software
                 portability",
}

@Article{Gershon:1988:Pd,
  author =       "Gary Gershon",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "4",
  pages =        "392--392",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Prairie:1988:IDT,
  author =       "P. L. Prairie and A. H. Weis",
  title =        "{IBM}'s directions in technical computing",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "4",
  pages =        "393--403",
  month =        nov,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Technical computing comprises hardware systems,
                 software, tools, communications networks, and
                 applications to significantly increase productivity and
                 competitiveness. A technical computing structure (TCS)
                 is described which provides a framework and IBM's
                 direction to integrate these elements, including both
                 IBM offerings and industry standards to support the
                 technical end user. Also discussed are some of the
                 special studies undertaken to improve development
                 programs for this environment.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Kingston, NY, USA",
  classification = "C0310 (EDP management); C5620 (Computer networks and
                 techniques); C6115 (Programming support)",
  keywords =     "Communications networks; design, Hardware systems;
                 Industry standards; Software, tools; standardization;
                 Technical computing structure; Technical end user",
  language =     "English",
  pubcountry =   "USA",
  subject =      "C.5.m Computer Systems Organization, COMPUTER SYSTEM
                 IMPLEMENTATION, Miscellaneous \\ K.1 Computing Milieux,
                 THE COMPUTER INDUSTRY, Standards",
  thesaurus =    "Computer networks; Research and development
                 management; Software tools",
}

@Article{McComb:1988:ESS,
  author =       "J. McComb and S. Schmidt",
  title =        "{Engineering and Scientific Subroutine Library} for
                 the {IBM 3090 Vector Facility}",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "4",
  pages =        "404--415",
  month =        nov,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The Engineering and Scientific Subroutine Library
                 (ESSL) provides FORTRAN, Assembler, and APL2
                 application programmers with a high-performance set of
                 mathematical subroutines which take advantage of the
                 performance gains offered by the IBM 3090 Vector
                 Facility. This paper describes the contents of ESSL and
                 presents some of the techniques that were used to
                 develop high-performance vector subroutines. Other key
                 design considerations such as accuracy, ease of use,
                 and error handling are also discussed. This information
                 should be useful to anyone developing programs for the
                 IBM 3090 Vector Facility.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Kingston, NY, USA",
  classification = "C4100 (Numerical analysis); C6115 (Programming
                 support); C6130 (Data handling techniques); C7310
                 (Mathematics)",
  keywords =     "APL2; Assembler; design, Mathematics computing;
                 Engineering and Scientific Subroutine Library; Error
                 handling; ESSL; FORTRAN; IBM 3090 Vector Facility;
                 Mathematical subroutines; Numerical analysis;
                 performance; theory; Vector subroutines",
  language =     "English",
  pubcountry =   "USA",
  subject =      "J.2 Computer Applications, PHYSICAL SCIENCES AND
                 ENGINEERING \\ D.2.2 Software, SOFTWARE ENGINEERING,
                 Tools and Techniques, Software libraries",
  thesaurus =    "Data handling; IBM computers; Mathematics computing;
                 Numerical analysis; Software tools",
}

@Article{Toomey:1988:IPF,
  author =       "L. J. Toomey and E. C. Plachy and R. G. Scarborough
                 and R. J. Sahulka and J. F. Shaw and A. W. Shannon",
  title =        "{IBM Parallel FORTRAN}",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "4",
  pages =        "416--435",
  month =        nov,
  year =         "1988",
  CODEN =        "IBMSA7",
  DOI =          "https://doi.org/10.1147/sj.274.0416",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "IBM Parallel FORTRAN is a compiler and library for
                 writing and executing parallel programs. It provides
                 language extensions for explicitly programming in
                 parallel, and it also provides compiler enhancements
                 for automatically generating both parallel and vector
                 code. Parallel FORTRAN offers a language for parallel
                 programming that is independent of the machine
                 configuration and the operating system. The combination
                 of Parallel FORTRAN and IBM 3090 multiprocessors can
                 provide a significant reduction in turnaround time for
                 applications.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Kingston, NY, USA",
  classification = "C6140D (High level languages); C6150C (Compilers,
                 interpreters and other processors)",
  keywords =     "Compiler; design, IBM Parallel FORTRAN; Language
                 extensions; languages; Parallel programming; Parallel
                 programs; performance; theory",
  language =     "English",
  pubcountry =   "USA",
  subject =      "D.3.2 Software, PROGRAMMING LANGUAGES, Language
                 Classifications, FORTRAN \\ F.1.2 Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism \\ D.3.4 Software, PROGRAMMING
                 LANGUAGES, Processors, Compilers \\ D.2.2 Software,
                 SOFTWARE ENGINEERING, Tools and Techniques, Software
                 libraries",
  thesaurus =    "FORTRAN; Parallel programming; Program compilers",
}

@Article{So:1988:PLV,
  author =       "K. So and V. Zecca",
  title =        "Program locality of vectorized applications running on
                 the {IBM} 3090 with {Vector Facility}",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "4",
  pages =        "436--452",
  month =        nov,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An Instruction-level simulator is used to study the
                 program locality of large scientific applications. The
                 simulator, which models an IBM 3090 processor with
                 Vector Facility and a cache, was developed to help a
                 programmer improve the performance of an application
                 through better understanding and use of the Vector
                 Facility and the memory hierarchy of the IBM 3090
                 system. The main observations on a set of scientific
                 applications are as follows: although the applications
                 have different characteristics of memory accesses and
                 vectorization, their program locality is high enough to
                 take advantage of conventional cache structures; the
                 cache hit ratio of the vector execution can be quite
                 different from (but not significantly lower than) that
                 of the scalar execution of the same application; and
                 the application programs that are written to optimize
                 the use of the memory hierarchy in the system generally
                 result in higher cache hit ratios than the others. The
                 cache performance of these applications with respect to
                 various cache parameters is also presented. In
                 particular, the study finds that the cache structure of
                 the IBM 3090 is well suited for large scientific
                 applications.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Res. Div., Yorktown Heights, NY, USA",
  classification = "C5440 (Multiprocessor systems and techniques); C5470
                 (Performance evaluation and testing); C7430 (Computer
                 engineering)",
  keywords =     "Cache performance; Conventional cache structures;
                 design, Instruction-level simulator; IBM 3090;
                 measurement; performance; Scientific applications;
                 Vector Facility",
  language =     "English",
  pubcountry =   "USA",
  subject =      "C.4 Computer Systems Organization, PERFORMANCE OF
                 SYSTEMS \\ C.5.3 Computer Systems Organization,
                 COMPUTER SYSTEM IMPLEMENTATION, Microcomputers \\ B.3.2
                 Hardware, MEMORY STRUCTURES, Design Styles, Cache
                 memories",
  thesaurus =    "Buffer storage; IBM computers; Parallel machines;
                 Performance evaluation; Virtual machines",
}

@Article{Samukawa:1988:PSI,
  author =       "H. Samukawa",
  title =        "Programming style on the {IBM 3090 Vector Facility}
                 considering both performance and flexibility",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "4",
  pages =        "453--474",
  month =        nov,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:23:11 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "To obtain high performance from the IBM 3090 Vector
                 Facility, one must investigate vector instruction
                 constructs in terms of the loop context of the
                 application algorithm. The author exemplifies the
                 method by linear algebra subroutines for basic matrix
                 operations and a linear equation solver. In these
                 examples, the author clarifies the mathematical meaning
                 that each loop is computed by analyzing the loops in
                 terms of a generic algorithm. This analysis helps to
                 achieve optimal loop selection. The author obtains
                 additional performance gain by considering cache
                 capacity. These procedures suggest that there are three
                 levels of performance classification. They also show
                 that program structure yields great benefits in terms
                 of performance and generality of the program.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Japan Ltd., Tokyo, Japan",
  classification = "C4140 (Linear algebra); C6110 (Systems analysis and
                 programming); C6130 (Data handling techniques); C7310
                 (Mathematics)",
  keywords =     "algorithms; Cache capacity; design; IBM 3090 Vector
                 Facility; Linear algebra subroutines; Linear equation
                 solver; Loop context; Matrix operations; Parallel
                 programming; performance; Performance classification;
                 Vector instruction constructs",
  language =     "English",
  pubcountry =   "USA",
  subject =      "C.5.3 Computer Systems Organization, COMPUTER SYSTEM
                 IMPLEMENTATION, Microcomputers \\ C.1.2 Computer
                 Systems Organization, PROCESSOR ARCHITECTURES, Multiple
                 Data Stream Architectures (Multiprocessors), Array and
                 vector processors \\ C.4 Computer Systems Organization,
                 PERFORMANCE OF SYSTEMS \\ D.1.m Software, PROGRAMMING
                 TECHNIQUES, Miscellaneous",
  thesaurus =    "IBM computers; Linear algebra; Mathematics computing;
                 Matrix algebra; Parallel programming; Symbol
                 manipulation",
}

@Article{Clementi:1988:IPP,
  author =       "E. Clementi and D. Logan and J. Saarinen",
  title =        "{ICAP}\slash 3090: parallel processing for large-scale
                 scientific and engineering problems",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "4",
  pages =        "475--509",
  month =        nov,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Described is the ICAP/3090 (for loosely coupled array
                 of processors) parallel processing system. General
                 parallel processing performance issues that determine
                 the success of all
                 multiple-instruction/multiple-data-stream parallel
                 computing systems are examined in the context of
                 large-scale scientific and engineering problems.
                 Experiments with previous ICAP parallel processing
                 systems that have made possible the present design of
                 ICAP/3090 are also described.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Kingston, NY, USA",
  classification = "C5440 (Multiprocessor systems and techniques); C5470
                 (Performance evaluation and testing); C7300 (Natural
                 sciences); C7400 (Engineering)",
  keywords =     "algorithms; design, IBM; Engineering computing;
                 experimentation; ICAP/3090; Loosely coupled array;
                 measurement; Parallel processing; performance;
                 Performance issues; Scientific computing; theory",
  language =     "English",
  pubcountry =   "USA",
  subject =      "C.1.2 Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors), Parallel processors \\ C.4 Computer
                 Systems Organization, PERFORMANCE OF SYSTEMS",
  thesaurus =    "Engineering computing; IBM computers; Natural sciences
                 computing; Parallel machines; Performance evaluation",
}

@Article{Kamel:1988:SCI,
  author =       "A. Kamel and M. Kindelan and P. Sguazzero",
  title =        "Seismic computations on the {IBM} 3090 {Vector
                 Multiprocessor}",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "4",
  pages =        "510--527",
  month =        nov,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Computerized seismic prospecting is an echo-ranging
                 technique usually targeted at accurate mapping of oil
                 and gas reservoirs. A complementary tool in relating
                 seismic data to the earth's inhomogeneities is provided
                 by seismic numerical models, which assume a subsurface
                 structure and compute the seismic data which would be
                 collected in a field survey, by solving the direct
                 problem of exploration geophysics. This paper describes
                 a vectorized and parallelized implementation of a
                 two-dimensional seismic elastic model on the IBM 3090
                 VF Vector Multiprocessor. An implementation of a
                 parallel seismic migration algorithm is then described.
                 The paper also reports performance data for a
                 vector/parallel implementation on the IBM 3090 of some
                 typical seismic velocity estimation algorithms. The
                 three problems chosen are representative of a wide
                 class of geophysical computations, and the results
                 summarized show their suitability for efficient
                 implementation on the IBM 3090 Vector Multiprocessor;
                 combined vector/parallel speedups in the range 15-25
                 are in fact observed.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Bergen Sci. Center, Norway",
  classification = "A9130R (Explosion seismology); A9365 (Data
                 acquisition, processing and storage); A9385
                 (Instrumentation and techniques for geophysical,
                 hydrospheric and lower atmosphere research); C5440
                 (Multiprocessor systems and techniques); C5470
                 (Performance evaluation and testing); C7340
                 (Geophysics)",
  keywords =     "algorithms; design, Geophysics computing;
                 Echo-ranging; Exploration geophysics; IBM 3090 Vector
                 Multiprocessor; measurement; Parallel seismic migration
                 algorithm; performance; Performance data; Seismic
                 elastic model; Seismic numerical models; Seismic
                 prospecting; theory; Velocity estimation",
  language =     "English",
  pubcountry =   "USA",
  subject =      "C.1.2 Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors), Array and vector processors \\ J.2
                 Computer Applications, PHYSICAL SCIENCES AND
                 ENGINEERING, Earth and atmospheric sciences \\ G.1.0
                 Mathematics of Computing, NUMERICAL ANALYSIS, General,
                 Parallel algorithms",
  thesaurus =    "Geophysical prospecting; Geophysics computing; IBM
                 computers; Parallel machines; Parallel programming;
                 Performance evaluation; Seismology",
}

@Article{Sakaki:1988:EUI,
  author =       "M. Sakaki and H. Samukawa and N. Honjou",
  title =        "Effective utilization of {IBM} 3090 large virtual
                 storage in the numerically intensive computations of
                 {\em ab initio\/} molecular orbitals",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "4",
  pages =        "528--540",
  month =        nov,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A new level of storage hierarchy, called expanded
                 storage and available on the IBM 3090 system, is
                 utilized by the MVS/XA operating system as high-speed
                 paging equipment, allowing a user to hold application
                 data in large virtual storage. To exploit the large
                 virtual storage capability of the IBM 3090, a new
                 application technique was developed for numerically
                 intensive computations of ab initio molecular orbitals
                 where high-speed transfer of a vast amount of
                 intermediate data is a common requirement of most
                 application programs. An application program running
                 under MVS/XA was modified so that it could handle a
                 vast amount of intermediate data in large virtual
                 storage combined with expanded storage, achieving a 4-
                 to 10-fold improvement in turnaround time at a CPU
                 rate-determining step (SCF step) in medium-sized
                 molecules.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Japan Ltd., Tokyo, Japan",
  classification = "A3115 (General mathematical and computational
                 developments); C6120 (File organisation); C6150J
                 (Operating systems); C7320 (Physics and Chemistry)",
  keywords =     "Ab initio molecular orbitals; CPU rate-determining
                 step; design, Physics computing; Expanded storage; IBM
                 3090; measurement; MVS/XA operating system; Numerically
                 intensive computations; Paging; performance; SCF step;
                 theory; Virtual storage",
  language =     "English",
  pubcountry =   "USA",
  subject =      "B.3.2 Hardware, MEMORY STRUCTURES, Design Styles,
                 Virtual memory \\ C.1.2 Computer Systems Organization,
                 PROCESSOR ARCHITECTURES, Multiple Data Stream
                 Architectures (Multiprocessors), Array and vector
                 processors \\ J.2 Computer Applications, PHYSICAL
                 SCIENCES AND ENGINEERING, Chemistry \\ C.4 Computer
                 Systems Organization, PERFORMANCE OF SYSTEMS",
  thesaurus =    "Ab initio calculations; IBM computers; Molecular
                 orbitals calculations; Operating systems [computers];
                 Physics computing; Storage allocation; Virtual
                 storage",
}

@Article{Angeleri:1988:PII,
  author =       "P. Angeleri and D. F. Lozupone and F. Piccolo and J.
                 Clinckemaillie",
  title =        "{PAM-CRASH} on the {IBM 3090\slash VF}: an integrated
                 environment of crash analysis",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "4",
  pages =        "541--560",
  month =        nov,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:58:06 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "PAM-CRASH is an industrial code developed by
                 Engineering Systems International (ESI) SA and designed
                 specifically for automotive crashworthiness analysis.
                 The authors discuss the problems encountered and
                 describe the solutions provided for an efficient
                 migration of the code on the IBM 3090/VF system. Runs
                 on actual test cases have shown a vector/scalar speedup
                 between 2.7 and 3.5. Moreover, the authors present the
                 program modifications they have introduced in order to
                 exploit parallel processing using the Multitasking
                 Facility of the VS FORTRAN compiler. Performance
                 results for 3090/VF systems, from the Model 200E to the
                 Model 600E, are given. Finally, the authors describe
                 the restructuring of the graphic processors, PRE-3D and
                 DAISY, to allow an effective use of the IBM 5080
                 Graphics System capabilities in providing an integrated
                 design environment for crash analysis.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Eur. Center for Sci. and Eng. Comput., Rome,
                 Italy",
  classification = "C5470 (Performance evaluation and testing); C6110
                 (Systems analysis and programming); C7440 (Civil and
                 mechanical engineering)",
  keywords =     "algorithms; Automobiles; Automotive crashworthiness
                 analysis; Crash analysis, performance; DAISY; design;
                 Engineering Systems International; Finite element
                 analysis; Graphic processors; IBM 3090/VF system; IBM
                 5080 Graphics System; Industrial code; measurement;
                 Model 200E; Model 600E; Multitasking Facility;
                 PAM-CRASH; Parallel processing; Parallel programming;
                 Performance evaluation; PRE-3D; VS FORTRAN compiler",
  language =     "English",
  pubcountry =   "USA",
  subject =      "C.3 Computer Systems Organization, SPECIAL-PURPOSE AND
                 APPLICATION-BASED SYSTEMS, Microprocessor/Microcomputer
                 applications \\ C.4 Computer Systems Organization,
                 PERFORMANCE OF SYSTEMS \\ I.4.9 Computing
                 Methodologies, IMAGE PROCESSING, Applications \\ J.2
                 Computer Applications, PHYSICAL SCIENCES AND
                 ENGINEERING, Engineering",
  thesaurus =    "Automobile industry; Automobiles; Finite element
                 analysis; IBM computers; Parallel programming;
                 Performance evaluation",
}

@Article{Halpern:1988:ICD,
  author =       "P. Halpern and J. V. Dave",
  title =        "Interactive computations and display of
                 characteristics of the radiation scattered by a sphere:
                 {A} demonstration for {PS/2 Model} 80",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "4",
  pages =        "561--569",
  month =        nov,
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The Personal System/2 (PS/2) Model 80 with its math
                 coprocessor provides a considerable amount of computing
                 power which can be used with advantage to solve
                 technical problems interactively at a standalone
                 workstation. To demonstrate this capability, a
                 scientific program routinely used in diverse
                 disciplines requiring significant computing power was
                 modified to run on the PS/2 Model 80. It computes and
                 displays variations of the specific intensity and
                 degree of polarization of the electromagnetic radiation
                 scattered by a sphere of given refractive index. For a
                 sphere of size parameter of 100, about 475000
                 double-precision floating-point calculations are
                 performed and the results displayed in graphic format
                 in less than ten seconds. The selected algorithm is
                 routinely used in several different disciplines such as
                 astronomy, atmospheric optics, chemical engineering,
                 colloidal chemistry, and remote sensing. Because it
                 requires the evaluation of spherical Bessel functions
                 with complex arguments, and derivatives of the Legendre
                 polynomials, it was selected as a representative
                 problem of numerically intensive computing.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Palo Alto Sci. Center, CA, USA",
  classification = "C4130 (Interpolation and function approximation);
                 C4170 (Differential equations); C6130 (Data handling
                 techniques); C7320 (Physics and Chemistry)",
  keywords =     "algorithms; design, IBM; Electromagnetic radiation;
                 Legendre polynomials; Math coprocessor; measurement;
                 Numerically intensive computing; performance; Personal
                 System/2; Physics computing; PS/2 Model 80; Radiation;
                 Refractive index; Scientific program; Specific
                 intensity; Spherical Bessel functions; theory",
  language =     "English",
  pubcountry =   "USA",
  subject =      "K.8 Computing Milieux, PERSONAL COMPUTING, IBM PC \\
                 J.2 Computer Applications, PHYSICAL SCIENCES AND
                 ENGINEERING, Physics \\ I.4.9 Computing Methodologies,
                 IMAGE PROCESSING, Applications",
  thesaurus =    "Bessel functions; Electromagnetic wave scattering; IBM
                 computers; Microcomputer applications; Physics
                 computing; Polynomials; Symbol manipulation",
}

@Article{Anonymous:1988:Bc,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "4",
  pages =        "570--572",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1988:CV,
  author =       "Anonymous",
  title =        "Contents of Volume 27, 1988",
  journal =      j-IBM-SYS-J,
  volume =       "27",
  number =       "4",
  pages =        "573--573",
  year =         "1988",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Davis:1989:P,
  author =       "Al Davis and Murray Heims and George Stierhoff",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "1",
  pages =        "2--3",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Aken:1989:LSE,
  author =       "B. R. {Aken, Jr.}",
  title =        "Large systems and {Enterprise Systems Architecture}",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "1",
  pages =        "4--14",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:58:06 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A number of diverse factors have influenced the
                 development of IBM's Enterprise Systems Architecture.
                 They range from the compatibility and migration
                 considerations so important for preserving customer
                 investments in existing applications and data, to new
                 functional and capacity requirements of customers, to
                 the implications of emerging technologies and the
                 projection of these into the systems environments of
                 the future. This paper conveys a broad perspective on
                 important factors that will influence the large-systems
                 environment of the future, and relates those factors to
                 the key elements of the ESA/370 architectural
                 enhancements.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Poughkeepsie, NY, USA",
  classification = "C5220 (Computer architecture); C5420 (Mainframes and
                 minicomputers)",
  keywords =     "Architectural enhancements; Capacity requirements;
                 Computer architecture; Enterprise Systems Architecture;
                 ESA/370; Large-systems environment; Mainframes",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer architecture; IBM computers; Mainframes",
}

@Article{Scalzi:1989:ESA,
  author =       "C. A. Scalzi and A. G. Ganek and R. J. Schmalz",
  title =        "{Enterprise Systems Architecture\slash 370}: an
                 architecture for multiple virtual space access and
                 authorization",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "1",
  pages =        "15--38",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:58:06 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The Enterprise Systems Architecture/370 provides a
                 significant step in the IBM System/370 evolution by
                 providing new capabilities for virtual addressing and
                 program linkage across multiple address spaces. This
                 paper reviews the evolution that led to this advance
                 and illuminates the goals, such as eliminating growth
                 constraints and improving security, integrity,
                 reliability and performance, that have guided it. The
                 major architectural capabilities are discussed, along
                 with the system environments in which they are useful.
                 The rationale for design choices is presented and
                 related to issues of performance, access authorization,
                 and constraints relief.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Poughkeepsie, NY, USA",
  classification = "C5220 (Computer architecture); C5420 (Mainframes and
                 minicomputers); C6120 (File organisation); C6150J
                 (Operating systems)",
  keywords =     "Access authorization; Enterprise Systems
                 Architecture/370; IBM; IBM System/370; Mainframes;
                 Multiple address spaces; Multiple virtual space access;
                 Performance; Program linkage; Reliability; Security;
                 System environments; Virtual addressing",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer architecture; Data integrity; IBM computers;
                 Mainframes; Multiprogramming; Software reliability;
                 Storage allocation; Virtual storage",
}

@Article{Plambeck:1989:CES,
  author =       "K. E. Plambeck",
  title =        "Concepts of {Enterprise Systems Architecture\slash
                 370}",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "1",
  pages =        "39--61",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Enterprise Systems Architecture/370 (ESA/370) is the
                 next step in the architectural evolution of IBM's large
                 processors from System/360 to System/370 to System/370
                 Extended Architecture (370-XA). ESA/370 includes all of
                 the facilities of 370-XA and also significant new
                 facilities. It greatly increases the amount of apparent
                 main storage that is readily available for use. It
                 provides for more efficient secure program linkage,
                 with increased status saving and restoring, among
                 hierarchically or nonhierarchically organized programs.
                 It allows improved control program efficiency.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Poughkeepsie, NY, USA",
  classification = "C5220 (Computer architecture); C5420 (Mainframes and
                 minicomputers); C6120 (File organisation); C6150J
                 (Operating systems)",
  keywords =     "370-XA; Control program efficiency; Dual address
                 space; Enterprise Systems Architecture/370; ESA/370;
                 IBM; Main storage; Mainframes; Program linkage;
                 System/360; System/370; System/370 Extended
                 Architecture",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer architecture; IBM computers; Mainframes;
                 Storage allocation; Virtual storage",
}

@Article{Cohen:1989:SHE,
  author =       "E. I. Cohen and G. M. King and J. T. Brady",
  title =        "Storage hierarchies ({Enterprise Systems
                 Architecture\slash 370})",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "1",
  pages =        "62--76",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:58:06 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The storage hierarchy is a natural structure, given
                 the set of available technologies and their price and
                 performance characteristics. The physical structure of
                 the storage subsystem is described, and the flow of
                 data through the system is traced. The concept of a
                 storage hierarchy is discussed, and the specific
                 components of the IBM storage hierarchy from the
                 processor high-speed buffer (HSB) to the online DASD
                 configuration are described in detail. Trade-offs
                 between technologies and the interactions among the
                 levels of the hierarchy are discussed. In particular,
                 the importance of the I/O boundary, processor storage
                 volatility, and data sharing are highlighted. A
                 continuous increase in virtual storage capacity can be
                 seen in the evolution of large-scale operating systems,
                 and MVS/ESA now provides the ultimate virtual capacity
                 and function. New virtual structures available in
                 MVS/ESA are discussed, and their relationship to the
                 storage hierarchy is studied. The importance of storage
                 to the performance and cost of a large processing
                 system leads to a discussion of guidelines for storage
                 configuration and data placement within the
                 hierarchy.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Poughkeepsie, NY, USA",
  classification = "C5220 (Computer architecture); C5320 (Digital
                 storage); C6120 (File organisation); C6150J (Operating
                 systems)",
  keywords =     "DASD; Data placement; Data sharing; Enterprise Systems
                 Architecture/370; High-speed buffer; I/O boundary; IBM;
                 Large-scale operating systems; Mainframes; MVS/ESA;
                 Processor storage volatility; Storage allocation;
                 Storage configuration; Storage hierarchy; Storage
                 subsystem; Virtual storage",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Buffer storage; Computer architecture; IBM computers;
                 Magnetic disc storage; Mainframes; Storage allocation;
                 Virtual storage",
}

@Article{Gelb:1989:SS,
  author =       "J. P. Gelb",
  title =        "System-managed storage",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "1",
  pages =        "77--103",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "In early 1988, IBM announced the Data Facility Storage
                 Management Subsystem (DFSMS), comprising functions in
                 MVS/DFP, other products in the Data Facility family,
                 and RACF. This announcement constituted a major step in
                 the realization of system-managed storage. The need for
                 system-managed storage was established in the late
                 1970s and early 1980s, through growing customer
                 requirements in the management of external storage
                 space, performance, availability, and device
                 installability within and across systems in these
                 customers' installations. The concept of system-managed
                 storage is an evolutionary one, culminating in a
                 resource manager for external storage that separates
                 the logical view of data from physical device
                 characteristics, simplifies interfaces for the use and
                 administration of storage, integrates the functions of
                 storage management products, and provides a synergy of
                 hardware and software functions to effect complex wide
                 management of external storage resources, as discussed
                 in this paper.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Gen. Products Div., San Jose, CA, USA",
  classification = "C6120 (File organisation); C6150J (Operating
                 systems)",
  keywords =     "Data Facility Storage Management Subsystem; DFSMS;
                 External storage; IBM; MVS/DFP; RACF; Resource manager;
                 Storage management; System-managed storage",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Storage allocation; Storage management; Virtual
                 storage",
}

@Article{Borden:1989:MOS,
  author =       "T. L. Borden and J. P. Hennessy and J. W. Rymarczyk",
  title =        "Multiple operating systems on one processor complex",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "1",
  pages =        "104--123",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "As large computing systems continue to grow in
                 capacity and to offer improved price/performance, there
                 is an increasing requirement to consolidate systems
                 onto one processor complex. This paper describes the
                 reasons why users need to run multiple operating
                 systems today, provides a brief history of IBM's
                 partitioning products, and introduces the Processor
                 Resource Systems Manager, a machine feature on the IBM
                 3090 Model E and ES/3090 Model S processors that
                 provides users with a flexible and efficient capability
                 to run multiple operating systems on a single processor
                 complex.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Poughkeepsie, NY, USA",
  classification = "C6120 (File organisation); C6150J (Operating
                 systems)",
  keywords =     "ES/3090 Model S processors; IBM 3090 Model E; Large
                 computing systems; Multiple operating systems; One
                 processor complex; Processor Resource Systems Manager;
                 Storage management",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Multiprocessing programs; Operating systems
                 [computers]; Storage management",
}

@Article{Clark:1989:FEM,
  author =       "C. E. Clark",
  title =        "The facilities and evolution of {MVS\slash ESA}
                 (operating system)",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "1",
  pages =        "124--150",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "As new processors were developed with new
                 capabilities, the Multiple Virtual Storage (MVS)
                 operating system was modified and enhanced to utilize
                 the latest advances. The most recently available
                 processors are structured on Enterprise Systems
                 Architecture, and MVS has evolved to be a part of this
                 architecture as MVS/ESA. This paper describes the
                 changes that occurred in MVS and the facilities that
                 are currently available to support users of the latest
                 processors.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Poughkeepsie, NY, USA",
  classification = "C6120 (File organisation); C6150J (Operating
                 systems)",
  keywords =     "Enterprise Systems Architecture; IBM; Mainframes;
                 Multiple Virtual Storage; MVS/ESA; Operating system;
                 Storage allocation; Virtual storage",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Operating systems [computers]; Storage
                 allocation; Virtual storage",
}

@Article{Rubsam:1989:MDS,
  author =       "K. G. Rubsam",
  title =        "{MVS} data services",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "1",
  pages =        "151--164",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The IBM Enterprise Systems Architecture/370 vastly
                 increases the potential virtual addressability
                 available to both system and application programs. The
                 I/O model and the application model of permanent data
                 are discussed to illustrate how large virtual
                 addressability can be used to simplify application
                 programs and improve performance. New MVS services that
                 exploit the architecture are described. Also described
                 are data window services, which are callable from
                 high-level languages and provide the capability to
                 manage very large permanent and temporary objects in
                 virtual storage.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Poughkeepsie, NY, USA",
  classification = "C6120 (File organisation); C6150J (Operating
                 systems)",
  keywords =     "Application model; Data window services; Enterprise
                 Systems Architecture/370; High-level languages; I/O
                 model; IBM; Multiprogramming; MVS services; Virtual
                 addressability; Virtual storage",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Input-output programs;
                 Multiprogramming; Operating systems [computers];
                 Storage allocation; Virtual storage",
}

@Article{Bozman:1989:VSM,
  author =       "G. P. Bozman",
  title =        "{VM\slash XA SP2} minidisk cache",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "1",
  pages =        "165--174",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Given the growing disparity between CPU power and the
                 speed of secondary storage, a data cache exploiting
                 large processor storage has the potential to improve
                 response time dramatically in many situations. The
                 VM/XA SP2 minidisk cache facility, the result of
                 research activity on the characteristics of interactive
                 file-system activity, uses expanded storage to cache
                 input/output to minidisks on the Conversational Monitor
                 System. The size of the cache is dynamically adjusted
                 by an arbitration process to optimize system
                 performance. Several other functions improve the
                 performance of the cache during periods of unusual I/O
                 loads.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Res. Div., T. J. Watson Res. Center, Yorktown
                 Heights, NY, USA",
  classification = "C5320C (Storage on moving magnetic media); C5320G
                 (Semiconductor storage); C6150J (Operating systems)",
  keywords =     "Conversational Monitor System; CPU power; Data cache;
                 Expanded storage; I/O loads; IBM; Input/output;
                 Interactive file-system activity; Large processor
                 storage; Response time; Secondary storage; System
                 performance; Virtual Machine/Extended Architecture;
                 VM/XA SP2 minidisk cache",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Buffer storage; IBM computers; Magnetic disc storage;
                 Storage allocation; Storage management",
}

@Article{Blandy:1989:VSM,
  author =       "G. O. Blandy and S. R. Newson",
  title =        "{VM\slash XA} storage management",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "1",
  pages =        "175--191",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The VM/XA System Product manages the vast amounts of
                 real and expanded storage available on the new
                 Enterprise Systems Architecture/370 processors for both
                 guest use and support of internal operating system
                 functions. The management algorithms are examined, and
                 the rationale for their selection is presented.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Kingston, NY, USA",
  classification = "C5220 (Computer architecture); C5420 (Mainframes and
                 minicomputers); C6120 (File organisation); C6150J
                 (Operating systems)",
  keywords =     "Enterprise Systems Architecture/370; Expanded storage;
                 Guest use; IBM; Internal operating system functions;
                 Mainframes; Storage management; Virtual machines;
                 VM/XA",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer architecture; IBM computers; Mainframes;
                 Storage allocation; Storage management; Virtual
                 machines; Virtual storage",
}

@Article{Anonymous:1989:Ba,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "1",
  pages =        "192--192",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1989:Pa,
  author =       "Gene Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "2",
  pages =        "194--195",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Grossman:1989:EDS,
  author =       "C. P. Grossman",
  title =        "Evolution of the {DASD} storage control",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "2",
  pages =        "196--226",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Identifies the major requirements and design for
                 storage controls and describes how these requirements
                 have been met over time. It also describes the
                 interplay of the three critical components of a
                 subsystem: hardware technology, micro-code and
                 software.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Gen. Products Div., Tucson, AZ, USA",
  classification = "C5320 (Digital storage); C6120 (File organisation)",
  keywords =     "DASD storage control; Hardware technology; Micro-code;
                 Software; Subsystem",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Digital storage; Storage management",
}

@Article{Summers:1989:LDS,
  author =       "R. C. Summers",
  title =        "Local-area distributed systems",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "2",
  pages =        "227--240",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Advances in computing and networking have led to the
                 use of local-area distributed systems. The following
                 are example configurations: workstations and file
                 servers, multiple computers that present the image of a
                 single computer, and heterogeneous workstations and
                 mainframes that cooperate loosely. The paper focuses on
                 the system software. It first discusses the forces
                 leading to distributed systems and the obstacles to
                 realizing the full value of the systems. Discussed also
                 are common current uses of local-area distributed
                 systems. Concepts and models are introduced.
                 Requirements for user and program interfaces and for
                 administration are presented, as well as major design
                 attributes and design issues. Systems that represent
                 the main approaches are described.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Los Angeles Sci. Center, CA, USA",
  classification = "B6210L (Computer communications); C5620L (Local area
                 networks); C6150 (Systems software); C6180 (User
                 interfaces)",
  keywords =     "Administration; Cooperate; Design attributes; Design
                 issues; File servers; Heterogeneous workstations;
                 Local-area distributed systems; Mainframes; Multiple
                 computers; Networking; Program interfaces; System
                 software; User interfaces",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Local area networks; Systems software; User
                 interfaces",
}

@Article{Ashfield:1989:SFM,
  author =       "J. C. Ashfield and D. B. Cybrynski",
  title =        "System-independent file management and distribution
                 services",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "2",
  pages =        "241--259",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The paper describes the role of the agent in invoking
                 the file transfer and the role of the SNA/FS server in
                 fetching and storing a file. It also describes the
                 SNA/FS architecture for uniquely naming files and data
                 objects. One example of an SNA/DS agent that uses the
                 SNA/FS server is the change management category of
                 SNA/Management Services.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Commun. Syst., Research Triangle Park, NC, USA",
  classification = "B6210L (Computer communications); C5620 (Computer
                 networks and techniques); C5630 (Networking equipment);
                 C6120 (File organisation)",
  keywords =     "Agent; Change management category; Data objects;
                 Distribution services; Fetching; File transfer; SNA/FS
                 architecture; SNA/FS server; SNA/Management Services;
                 Storing; System independent file management",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "File organisation; File servers",
}

@Article{Ballard:1989:MCS,
  author =       "C. P. Ballard and L. Farfara and B. J. Heldke",
  title =        "Managing changes in {SNA} networks",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "2",
  pages =        "260--273",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Systems network architecture/management services
                 (SNA/MS) has been enhanced to give network users change
                 management capabilities. The first IBM products
                 implementing change management are NetView distribution
                 manager R2 and the 3174 control unit with the central
                 site change management microcode function. The paper
                 describes the design selected and the functions
                 provided: retrieve, send, delete, install,
                 send-and-install, remove, accept, and activate. It also
                 describes how SNA/MS makes use of another new SNA
                 component designed for it-SNA/file services.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Italy Telecommun. Dev. Center, Rome, Italy",
  classification = "B6210L (Computer communications); C5620 (Computer
                 networks and techniques)",
  keywords =     "3174 Control unit; Accept; Activate; Central site
                 change management microcode function; Delete; Install;
                 NetView distribution manager; R2; Remove; Retrieve;
                 Send; Send-and-install; SNA/file services; SNA/MS;
                 Systems network architecture/management services",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer networks; Telecommunication network
                 management",
}

@Article{Hoernes:1989:RT,
  author =       "G. E. Hoernes",
  title =        "{REXX} on {TSO/E}",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "2",
  pages =        "274--293",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:58:06 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "REXX is a programming language, primarily designed for
                 ease of use. First implemented on the conversational
                 monitor system (CMS), REXX has been implemented on TSO
                 Extensions (TSO/E) as a new command language, yet it
                 contains all of the elements of a new full-function
                 language. After a brief definition of the main elements
                 of the REXX language, the paper discusses why REXX was
                 implemented on TSO/E, some alternative designs which
                 were considered, and how the final design integrates
                 the new language into the existing TSO/E structure, yet
                 allows REXX programs to be interpreted in any multiple
                 virtual storage (MVS) address space, even outside the
                 TSO/E environment. The paper also introduces the TSO/E
                 data stack which is similar to the stack implemented in
                 CMS, and describes how the definition of the CMS stack
                 had to be extended to allow REXX programs executing
                 concurrently on different MVS tasks to either share or
                 not share the data stack. Throughout the paper,
                 compatibility with other systems application
                 architecture environments, particularly CMS, and
                 performance considerations are discussed.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Poughkeepsie, NY, USA",
  classification = "C6140D (High level languages)",
  keywords =     "Address space; CMS stack; Command language;
                 Conversational monitor system; Data stack; Multiple
                 virtual storage; MVS; Performance considerations;
                 Programming language; Restructured extended executor
                 language; REXX; Systems application architecture
                 environments; TSO Extensions; TSO/E",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "High level languages",
}

@Article{Corbi:1989:PUC,
  author =       "T. A. Corbi",
  title =        "Program understanding: Challenge for the 1990s",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "2",
  pages =        "294--306",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "In the program understanding project at IBM's Research
                 Division, work began in late 1986 on tools which could
                 help programmers to two key areas: static analysis
                 (reading the code) and dynamic analysis (running the
                 code). The history and background which motivated and
                 which led to the start of this research on tools to
                 assist programmers in understanding existing program
                 code is reported.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Poughkeepsie, NY, USA",
  classification = "C6115 (Programming support)",
  keywords =     "Dynamic analysis; History; Program code; Program
                 understanding project; Reading the code; Running the
                 code; Static analysis; Tools",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Software tools",
}

@Article{Pazel:1989:DIG,
  author =       "D. P. Pazel",
  title =        "{DS-Viewer}\emdash An interactive graphical data
                 structure presentation facility",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "2",
  pages =        "307--323",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "DS-Viewer is a tool that is the result of a research
                 project in data structure presentation within a program
                 state. This tool addresses two distinct issues in this
                 area: (1) to effectively present data structures
                 themselves for a given program state and (2) to present
                 groups of data structures and their interrelationships
                 as described by their pointer definitions. Graphical
                 presentations were developed to address these issues.
                 For the data structure presentation, the user is
                 provided a display window for any single data structure
                 instance formatted with its fields and field values.
                 Flexibility in display is provided by allowing the user
                 a choice from the various value formats for each field.
                 For groups of data structure instances, a graphical
                 drawing space is provided in which pictures of these
                 data structure instances and their interrelationships
                 are drawn as blocks and arrows. The computer assists
                 the user in drawing such a picture by describing its
                 components, allowing the user to choose which to draw
                 and to construct as much of the picture as desired.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Res. Div., Thomas J. Watson Res. Center, Yorktown
                 Heights, NY, USA",
  classification = "C6115 (Programming support); C6120 (File
                 organisation); C6130B (Graphics techniques)",
  keywords =     "Arrows; Blocks; Choice; Display window; DS-Viewer;
                 Field values; Graphical drawing space; Interactive
                 graphical data structure presentation facility;
                 Interrelationships; Pointer definitions; Program state;
                 Research project; Tool; Value formats",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer graphics; Data structures; Software tools",
}

@Article{Cleveland:1989:PUS,
  author =       "L. Cleveland",
  title =        "A program understanding support environment",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "2",
  pages =        "324--344",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Software maintenance represents the largest cost
                 element in the life of a software system, and the
                 process of understanding the software system utilizes
                 50 percent of the time spent on software maintenance.
                 Thus there is a need for tools to aid the program
                 understanding task. The tool described program
                 understanding support environment (PUNS)-provides the
                 needed environment. Here the program understanding task
                 is supported with multiple views of the program and a
                 simple strategy for moving between views and exploring
                 a particular view in depth. PUNS consists of a
                 repository component that loads and manages a
                 repository of information about the program to be
                 understood and a user interface component that presents
                 the information in the repository, utilizing graphics
                 to emphasize the relationships and allowing the user to
                 move among the pieces of information quickly and
                 easily.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Res. Div., Thomas J. Watson Res. Center, Yorktown
                 Heights, NY, USA",
  classification = "C6115 (Programming support)",
  keywords =     "Program understanding support environment; PUNS;
                 Repository component; Software maintenance; User
                 interface",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Programming environments; Software tools",
}

@Article{Agarwal:1989:TNE,
  author =       "R. C. Agarwal and F. G. Gustavson and J. McComb and S.
                 Schmidt",
  title =        "Technical note: Engineering and scientific subroutine
                 library release 3 for {IBM ES\slash 3090} vector
                 multiprocessors",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "2",
  pages =        "345--350",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:58:06 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This technical note should be read in conjunction with
                 the paper by McComb and Schmidt (see ibid., vol.27,
                 no.4, p.404-415, 1988) which describes the engineering
                 and scientific subroutine library through Release 2. In
                 this technical note, which is an addendum to that
                 paper, the authors briefly describe some of the new
                 features in Release 3 and indicate some of the
                 techniques used to optimize vector and parallel
                 performance.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Res. Div., Thomas J. Watson Res. Center, Yorktown
                 Heights, NY, USA",
  classification = "C7300 (Natural sciences); C7400 (Engineering)",
  keywords =     "Engineering and scientific subroutine library; IBM
                 ES/3090 vector multiprocessors; Release 3",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Engineering computing; Natural sciences computing;
                 Subroutines",
}

@Article{Anonymous:1989:Bb,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "2",
  pages =        "351--356",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1989:Pb,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "3",
  pages =        "358--359",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat May 04 10:02:04 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Schleicher:1989:SOA,
  author =       "D. L. Schleicher and R. L. Taylor",
  title =        "System overview of the {Application System\slash
                 400}",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "3",
  pages =        "360--375",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:23:17 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Describes IBM's recently available general-purpose
                 midrange computers-the Application System/400, the
                 basic intentions of the product, the significant
                 factors setting forth system requirements, the primary
                 design themes incorporated in the implementation of
                 those requirements, and a description of some of the
                 key system components. However, the paper is not
                 intended to provide a complete system description.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Purchase, NY, USA",
  classification = "C5220 (Computer architecture); C5420 (Mainframes and
                 minicomputers)",
  keywords =     "Application System/400; AS/400; Design themes; General
                 purpose computers; IBM; Key system components; Midrange
                 computers; System requirements",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer architecture; IBM computers; Mainframes",
}

@Article{Pine:1989:DTV,
  author =       "B. J. {Pine, II}",
  title =        "Design, test, and validation of the {Application
                 System\slash 400} through early user involvement",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "3",
  pages =        "376--385",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:52:45 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The Application System/400 (AS/400) is the culmination
                 of a development effort requiring seven million lines
                 of code. Key challenges to its development were those
                 of ensuring that the system had been designed correctly
                 and thoroughly tested, that IBM Business Partners were
                 ready for its introduction together with their
                 applications, and that IBM marketing representatives
                 and systems engineers were trained and knowledgeable on
                 the system. The author discusses how these challenges
                 were met through the involvement of customers, Business
                 Partners, vendors, and systems engineers in the
                 development of the AS/400 system so as to positively
                 affect its design and quality.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Rochester, MN, USA",
  classification = "C5420 (Mainframes and minicomputers)",
  keywords =     "Application System/400; Development; IBM Business
                 Partners; Systems engineers; Test; User involvement;
                 Validation",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Mainframes",
}

@Article{Sulack:1989:NDR,
  author =       "R. A. Sulack and R. J. Lindner and D. N. Dietz",
  title =        "A new development rhythm for {AS}\slash 400 software",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "3",
  pages =        "386--406",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:52:45 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Synchronizing the software development process with
                 hardware development and user involvement programs
                 yielded a product offering that met the user
                 requirements with a significantly reduced development
                 cycle. The authors emphasize the key elements of
                 Application System/400 (AS/400) software development
                 that contributed to synchronization and project
                 success. It is intended to produce an awareness of the
                 elements that set this project apart from most
                 others.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Rochester, MN, USA",
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques); C6150 (Systems
                 software)",
  keywords =     "AS/400 software; Development cycle; Software
                 development process; Synchronization",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Software engineering; Systems
                 software",
}

@Article{Clark:1989:ASP,
  author =       "B. E. Clark and M. J. Corrigan",
  title =        "{Application System\slash 400} performance
                 characteristics",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "3",
  pages =        "407--423",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The operating system for Application System/400
                 (AS/400) provides an unprecedented breadth of function
                 and system services in a single, integrated system. The
                 majority of functions are implemented on top of
                 abstract, high-level machine interface in a
                 hardware-independent manner, using many architectural
                 characteristics normally associated with poor
                 performance. Despite these architectural and functional
                 traits of the operating system, the AS/400 exhibits
                 excellent price and performance characteristics for
                 commercial applications and is a competitive system in
                 the mid-range commercial application arena. A number of
                 design and optimization techniques, many of them unique
                 or innovative, were incorporated into the AS/400 to
                 achieve a combination of advanced design, function, and
                 performance and are the main subjects discussed.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Rochester, MN, USA",
  classification = "C5470 (Performance evaluation and testing); C6150J
                 (Operating systems)",
  keywords =     "Application System/400; Architectural characteristics;
                 AS/400; High-level machine interface; Operating system;
                 Performance characteristics",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Operating systems [computers];
                 Performance evaluation",
}

@Article{Charland:1989:ASH,
  author =       "D. A. Charland",
  title =        "The {Application System\slash 400} help
                 facility\emdash design philosophy and considerations",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "3",
  pages =        "424--442",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The design of the Application System/400 (AS/400)
                 system help facility was based on the philosophy that
                 users must be able to quickly access the specific
                 information needed to complete their immediate task.
                 This philosophy, reinforced by experience with help
                 information on earlier IBM systems, resulted in a
                 modular help facility that provides two major types of
                 assistance. Contextual information based on cursor
                 position is provided for each panel. This contextual
                 help is supplemented by an index of how-to-do-it and
                 what-it-means information that can be searched by users
                 in their own words.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Rochester, MN, USA",
  classification = "C6150E (General utility programs)",
  keywords =     "Application System/400; AS/400; Contextual help;
                 Design philosophy; Help facility; Index",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Utility programs",
}

@Article{Botterill:1989:DRA,
  author =       "J. H. Botterill",
  title =        "Design rationale of the {AS}\slash 400 user
                 interface",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "3",
  pages =        "443--464",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:52:45 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Discusses the design rationale of the software user
                 interface of the Application System/400 (AS/400). The
                 author presents the design approaches used to produce
                 the interface of this interactive system.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Rochester, MN, USA",
  classification = "C6180 (User interfaces)",
  keywords =     "AS/400; Design rationale; Interactive system; User
                 interface",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; User interfaces",
}

@Article{TenDyke:1989:OP,
  author =       "R. P. {Ten Dyke} and J. C. Kunz",
  title =        "Object-oriented programming",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "3",
  pages =        "465--478",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Object-oriented programming involves a new way of
                 thinking about and programming applications. The
                 thought process and techniques are introduced through a
                 discussion of the language Smalltalk and through an
                 illustrative example. These concepts are extended to a
                 hybrid functional language, object-oriented system,
                 KEE, and illustrated through the use of knowledge-based
                 system examples.",
  acknowledgement = ack-nhfb,
  classification = "C6110 (Systems analysis and programming); C6140D
                 (High level languages); C6170 (Expert systems)",
  keywords =     "Hybrid functional language; KEE; Knowledge-based
                 system; Object-oriented programming; Object-oriented
                 system; Smalltalk; Techniques; Thought process",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Knowledge based systems; Object-oriented programming;
                 Smalltalk",
}

@Article{dArielli:1989:MMS,
  author =       "L. d'Arielli",
  title =        "A message management system for personal computers",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "3",
  pages =        "479--493",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Presents a design for a message management system that
                 reduces the coding effort for the application
                 developer, gives the user greater control over the
                 treatment of application messages, and eliminates many
                 problems of translation. Any message may be directed to
                 one or more devices (screen, printer) and/or files
                 (log, activity), with the ability to exclude message
                 elements (e.g. date and time) from being sent to any
                 output destination, or to exclude a destination
                 altogether. Because the message-handling code and
                 message texts are separated from one another and from
                 the application code, the developer need only issue a
                 message identifier and set the associated variable
                 values. The message identifier contains codes for both
                 class and severity, and the developer provides default
                 selection criteria that the user can modify. These
                 tables of selection criteria provide a simple yet
                 highly flexible means of determining where each message
                 will be sent and in what form.",
  acknowledgement = ack-nhfb,
  affiliation =  "Field Syst. Center, IBM, Rome, Italy",
  classification = "C6150J (Operating systems)",
  keywords =     "Default selection criteria; Message identifier;
                 Message management system; Message texts;
                 Message-handling; Personal computers",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Microcomputers; Supervisory programs",
}

@Article{Haims:1989:B,
  author =       "Murray J. Haims",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "3",
  pages =        "494--494",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat May 04 10:06:20 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1989:R,
  author =       "Anonymous",
  title =        "Referees",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "3",
  pages =        "495--496",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat May 04 10:07:03 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1989:Pc,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "4",
  pages =        "500--501",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Kolsky:1989:HCI,
  author =       "H. G. Kolsky and R. A. MacKinnon",
  title =        "History and contributions of the {IBM Scientific
                 Centers}",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "4",
  pages =        "502--524",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The IBM Scientific Centers are celebrating their
                 twenty-fifth anniversary. These worldwide Centers are
                 autonomous organizations that provide IBM with the
                 ability to respond rapidly to the evolution of computer
                 technology for IBM and for its scientific customers.
                 During the past quarter century, these Centers have
                 provided technical leadership in almost every branch of
                 computer science. Today, the 17 individual Centers
                 continue to explore new technical areas and provide
                 significant contributions. This paper has three parts:
                 an introduction to the mission, scope, and history of
                 the Centers; a description of each Center's charter,
                 history, and accomplishments; and an extended list of
                 selected publications for each Center.",
  acknowledgement = ack-nhfb,
  affiliation =  "Dept. of Comput. Eng., California Univ., Santa Cruz,
                 CA, USA",
  classification = "C0200 (General computer topics)",
  keywords =     "Charter; Computer science; Computer technology;
                 History; IBM Scientific Centers",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "DP industry; History",
}

@Article{Shu:1989:VPP,
  author =       "N. C. Shu",
  title =        "Visual programming: Perspectives and approaches",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "4",
  pages =        "525--547",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Visual programming tackles the problem of bringing
                 computing facilities to people who do not have
                 extensive computer training by using visual (i.e.,
                 nonlinear) representations in the programming process.
                 In this paper, the author first defines visual
                 programming and briefly discusses its many facets. The
                 purpose is to lay a conceptual background so that
                 common understanding can be established and various
                 aspects of visual programming can be focused on and
                 examined. The author then concentrates on visual
                 programming languages, namely, languages that enable
                 the users to `program' with visual expressions.
                 Examples are used to illustrate three fundamentally
                 different approaches: diagrammatic, iconic, and form
                 based. Finally, the author shows that FORMAL, a system
                 developed and implemented at the IBM Los Angeles
                 Scientific Center, not only captures the spirit of
                 visual programming languages but also has the
                 capability to automate a wide variety of common data
                 processing applications.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Los Angeles Sci. Centre, Santa Monica, CA, USA",
  classification = "C6110 (Systems analysis and programming); C6130B
                 (Graphics techniques); C6140D (High level languages);
                 C6180 (User interfaces)",
  keywords =     "Computing facilities; Data processing applications;
                 Diagrammatic approach; Form based approach; FORMAL;
                 Iconic approach; Nonlinear representations; Programming
                 languages; User interfaces; Visual programming",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer graphics; High level languages; Programming;
                 Reviews; User interfaces",
}

@Article{Burridge:1989:WSM,
  author =       "J. M. Burridge and B. M. Collins and B. N. Galton and
                 A. R. Halbert and T. R. Heywood and W. H. Latham and R.
                 W. Phippen and P. Quarendon and P. Reilly and M. W.
                 Ricketts and J. Simmons and S. J. P. Todd and A. G. N.
                 Walter and J. R. Woodwark",
  title =        "The {WINSOM} solid modeller and its application to
                 data visualization",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "4",
  pages =        "548--568",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The IBM United Kingdom Scientific Centre's Winchester
                 Solid Modelling system (WINSOM) is a set-theoretic,
                 constructive solid geometry (CSG) modeller based on
                 recursive division techniques. It specializes in
                 handling complex models and provides graphical
                 facilities intended for engineering applications. This
                 paper describes WINSOM and some of the many programs
                 that are linked to it, and gives examples of their
                 application to problems of data visualization.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM UK Sci. Centre, Winchester, UK",
  classification = "C1160 (Combinatorial mathematics); C6130B (Graphics
                 techniques); C7400 (Engineering)",
  keywords =     "Complex models; Constructive solid geometry; Data
                 visualization; Engineering applications; Graphical
                 facilities; Recursive division; Set theory; Winchester
                 Solid Modelling system; WINSOM",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Engineering graphics; Set theory; Solid modelling",
}

@Article{Reilly:1989:DVA,
  author =       "P. Reilly",
  title =        "Data visualization in archaeology",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "4",
  pages =        "569--579",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Archaeological field work produces vast amounts of
                 three-dimensionally recorded data which can only be
                 analysed using computers. Developments in
                 data-visualization techniques are continually
                 increasing the volume and complexity of data that can
                 be studied meaningfully. In particular, three systems
                 developed at the IBM United Kingdom Scientific Centre
                 have been applied in a wide variety of archaeological
                 situations: a graphics-database system called the
                 Winchester Graphics System (WGS), IBM's IAX (Image
                 Applications Executive) image processing system, and
                 the Winchester Solid Modelling system called WINSOM. It
                 has been shown that these systems not only permit
                 well-known problems to be answered in new and
                 interesting ways but have freed archaeologists to
                 explore previously undiscovered avenues of research.
                 The techniques developed using these systems also have
                 major implications for education and training.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM UK Sci. Centre, Winchester, UK",
  classification = "C6130B (Graphics techniques); C7820 (Humanities)",
  keywords =     "Archaeology; Data visualization; Education;
                 Graphics-database system; IAX; IBM; Image Applications
                 Executive; Image processing system; Three-dimensionally
                 recorded data; Training; Winchester Graphics System;
                 Winchester Solid Modelling system; WINSOM",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Archaeology; Computer graphics",
}

@Article{deLima:1989:GIE,
  author =       "A. H. V. de Lima and R. C. B. Martins and R. Stern and
                 L. M. F. Carneiro",
  title =        "{GARDEN}\emdash An integrated and evolving environment
                 for {ULSI\slash VLSI CAD} applications",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "4",
  pages =        "580--599",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The design and specification of efficient and powerful
                 ultra large scale integration/very large scale
                 integration (ULSI/VLSI) computer-aided design (CAD)
                 systems to deal with the current integrated circuit
                 manufacturing technology is beyond the capabilities of
                 the usual software development methodologies. This
                 paper presents GARDEN, an integrated ULSI/VLSI design
                 environment conceived to cope with problems in the
                 evolution of the computing environment. It also
                 highlights the utilization of the Vienna Development
                 Methodology (VDM) for the specification, design,
                 implementation, and maintenance-in short, all of the
                 software life cycle-of this CAD system, under
                 development at the IBM Brazil Rio Scientific Center.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Brazil, Sci. Centre, Rio de Janeiro, Brazil",
  classification = "B1130B (Computer-aided circuit analysis and design);
                 B2570 (Semiconductor integrated circuits); C6110B
                 (Software engineering techniques); C7410D (Electronic
                 engineering)",
  keywords =     "Computer-aided design; GARDEN; Gate Array Design
                 Environment; Integrated circuit manufacturing
                 technology; Software development methodologies;
                 Software life cycle; ULSI/VLSI CAD applications; VDM;
                 Vienna Development Methodology",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Circuit CAD; Software engineering; VLSI",
}

@Article{ElSadany:1989:AMS,
  author =       "T. A. El-Sadany and M. A. Hashish",
  title =        "An {Arabic} morphological system",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "4",
  pages =        "600--612",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:52:45 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Nowadays, computers are used in every field in the
                 Arab countries of the Middle East. Software systems
                 developed for the European languages are not convenient
                 for the use of Arabic because of the nature of the
                 language and its writing system. Problems arise when
                 trying to use existing software systems, such as
                 spelling checkers and business and office systems, with
                 the Arabic language. These problems are attributable to
                 the fact that the difference between Arabic and the
                 European languages exists not only in character shapes
                 and direction of writing, but also in language
                 structure. In order to successfully use Arabic in
                 software systems, one must analyze the Arabic language
                 word structure-that is, carry out a morphological
                 analysis. Most of the written Arabic texts are
                 non-vowelized, which may lead to ambiguity in meaning
                 or mispronunciation. Moreover, vowelization cannot be
                 avoided in many applications, such as speech synthesis
                 by machines and educational books for children. A
                 two-way Arabic morphological system
                 (analysis/generation) capable of dealing with
                 vowelized, semi-vowelized, and nonvowelized Arabic
                 words was developed at the IBM Cairo Scientific Center.
                 The system also has the ability to vowelize
                 nonvowelized words. this system consists of three
                 separate modules: computational lexicon, Arabic grammar
                 model module, and analyzer/generator module. The
                 grammar module contains, among others, morphophonemic
                 and morphographemic rules formulated using the
                 conventional generative grammar. Moreover, the
                 developed system covers all of the Arabic language.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Egypt, Cairo Sci. Centre, Giza, Egypt",
  classification = "C7820 (Humanities)",
  keywords =     "Ambiguity; Analyzer/generator module; Arabic language;
                 Arabic morphological system; Character shapes;
                 Computational lexicon; Generative grammar; Grammar
                 model; Language structure; Mispronunciation;
                 Morphographemic rules; Morphological analysis;
                 Morphophonemic rules; Speech synthesis; Vowelization;
                 Word structure; Writing system",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Character sets; Grammars; Languages; Linguistics",
}

@Article{Koide:1989:DMC,
  author =       "A. Koide",
  title =        "Designing molecules and crystals by computer",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "4",
  pages =        "613--627",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An in-depth overview of computer-aided chemical design
                 is presented through a discussion of three systems that
                 the author has developed: the Molecular Design Support
                 System, MolWorld, and the Molecular Orbital Graphics
                 System. The first is considered as an example of the
                 kernel of a simulation system for industrial research
                 and development. The chemical formula interpreter and
                 three-dimensional molecular geometry generator of
                 MolWorld are discussed as a compact realization of
                 intelligence. Finally, the use of visualized molecular
                 electronic structures in relation to chemical reactions
                 is considered in the discussion of the Molecular
                 Orbital Graphics System.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Japan Ltd., Sci. Centre, Tokyo, Japan",
  classification = "A3115 (General mathematical and computational
                 developments); A3120 (Specific calculations and
                 results); A3520B (General molecular conformation and
                 symmetry; C6130B (Graphics techniques); C7320 (Physics
                 and Chemistry); stereochemistry)",
  keywords =     "Chemical formula interpreter; Chemical reactions;
                 Computer-aided chemical design; Crystal design;
                 Industrial research and development; Molecular Design
                 Support System; Molecular Orbital Graphics System;
                 MolWorld; Simulation system kernel; Three-dimensional
                 molecular geometry generator; Visualized molecular
                 electronic structures",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "CAD; Chemical reactions; Chemistry computing; Computer
                 graphics; Crystals; Digital simulation; Molecular
                 configurations; Molecular electronic states; Molecular
                 orbitals calculations",
}

@Article{Gongla:1989:SKS,
  author =       "P. Gongla and G. Sakamoto and A. Back-Hock and P.
                 Goldweic and L. Ramos and R. C. Sprowls and C.-K. Kim",
  title =        "{S}*{P}*{A}*{R}*{K}: a knowledge-based system for
                 identifying competitive uses of information
                 technology",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "4",
  pages =        "628--645",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The use of information and information technology
                 (IIT) as a strategic tool to gain competitive advantage
                 has become increasingly significant in recent years.
                 Numerous examples of how firms are using IIT to improve
                 their competitive positions are highlighted in both
                 popular and academic literature. Although the potential
                 competitive benefits of IIT are generally recognized by
                 business and I/S executives, there is a great gap
                 between recognizing such value and applying the
                 technology effectively. To help bridge this gap, a
                 group at the IBM Los Angeles Scientific Center has
                 developed a knowledge-based system facilitator, called
                 S*P*A*R*K. The system is designed to help business and
                 I/S managers identify competitive applications of IIT
                 to help them be creative in generating a range of IIT
                 alternatives. This paper provides an overview of
                 S*P*A*R*K, including the conceptual frameworks used for
                 knowledge sources, the design philosophy, functions,
                 and implementation approaches. Examples from a database
                 of competitive applications of IIT are also presented
                 to provide a flavor of the S*P*A*R*K facilitative
                 processes.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Los Angeles Sci. Centre, Santa Monica, CA, USA",
  classification = "C0310 (EDP management); C6170 (Expert systems);
                 C7100 (Business and administration)",
  keywords =     "Competitive uses; Conceptual frameworks; Design
                 philosophy; Implementation approaches; Information
                 technology; Knowledge sources; Knowledge-based system;
                 S*P*A*R*K",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Administrative data processing; Commerce; DP
                 management; Knowledge based systems",
}

@Article{Gazdag:1989:CCS,
  author =       "J. Gazdag and H.-H. Wang",
  title =        "Concurrent computing by sequential staging of tasks",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "4",
  pages =        "646--660",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Described is a new approach to parallel formulation of
                 scientific problems on shared-memory multiprocessors
                 such as the IBM ES/3090 system. The class of problems
                 considered is characterized by repetitive operations
                 applied over the computational domain D. In each such
                 operation, some fields of interest are extrapolated or
                 advanced by an amount of Delta tau. The integration
                 variable tau may be time, distance, or iteration
                 sequence number, depending on the problem under
                 consideration. An extensively studied approach to
                 parallel formulation of such computational problems is
                 based on domain decomposition, which attempts to
                 partition the domain of integration into many pieces,
                 then construct the global solution from these local
                 solutions. Thus, domain decomposition methods are
                 confined to D alone at a single tau level. An inquiry
                 into the possibilities of formulating parallel tasks in
                 tau, or more significantly in the D* tau domain, opens
                 up new horizons and untapped opportunities. The aim of
                 this paper is to detail an approach to exploit this tau
                 domain parallelism that will be referred to as
                 sequential staging of tasks (SST). Concurrency is
                 realized by means of ordering the tasks sequentially
                 and executing them in a partially overlapped or
                 pipelined manner. The SST approach can yield remarkable
                 speedup for jobs requiring intensive paging I/O, even
                 when a single processor is available for executing
                 multiple tasks. Noteworthy features of the SST method
                 are demonstrated and highlighted by using results
                 obtained from computer experiments performed with a
                 numerical solution method of the Poisson equation and
                 migration of seismic reflection data.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Palo Alto Sci. Centre, CA, USA",
  classification = "C5440 (Multiprocessor systems and techniques)",
  keywords =     "Computational domain; Concurrent computing; Domain
                 decomposition; IBM ES/3090 system; Integration
                 variable; Numerical solution method; Parallel tasks;
                 Partially overlapped tasks; Pipeline execution; Poisson
                 equation; Repetitive operations; Scientific problems;
                 Seismic reflection data; Sequential task staging;
                 Shared-memory multiprocessors; Speedup",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Parallel processing; Pipeline processing",
}

@Article{Dadam:1989:AIM,
  author =       "P. Dadam and V. Linnemann",
  title =        "{Advanced Information Management} ({AIM}): advanced
                 database technology for integrated applications",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "4",
  pages =        "661--681",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:52:45 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The Advanced Information Management (AIM) project is
                 currently one of the main activities at the IBM
                 Scientific Center in Heidelberg. The main purpose of
                 the project is to understand the database requirements
                 and respective solutions for advanced integrated
                 applications such as computer-integrated manufacturing
                 and the computer-integrated office. These application
                 areas require an advanced database technology which is
                 able to manage a large variety of data of various types
                 in a consistent and efficient way. The underlying
                 database technology should support not only simple
                 numbers and simple tables used in business
                 administration, but also large complex structured
                 objects, including text, image, and voice data, in a
                 uniform way. This paper describes the background,
                 goals, and accomplishments of the AIM project. It also
                 provides an overview of the design goals, the
                 implementation, and the underlying concepts of AIM-P,
                 an experimental database management system under
                 development in the AIM project.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Heidelberg Sci. Centre, West Germany",
  classification = "C6160 (Database management systems (DBMS)); C7000
                 (Computer applications)",
  keywords =     "Advanced database technology; Advanced Information
                 Management project; AIM-P; Business administration;
                 Complex structured objects; Computer-integrated
                 manufacturing; Computer-integrated office; Database
                 management system; Design goals; Implementation;
                 Integrated applications",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Database management systems; Manufacturing computer
                 control; Manufacturing data processing; Office
                 automation",
}

@Article{Latham:1989:TNC,
  author =       "W. H. Latham and S. J. P. Todd",
  title =        "Technical note: Computer sculpture",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "4",
  pages =        "682--688",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:52:45 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This technical note illustrates the graphic techniques
                 used to generate the cover of this issue of IBM systems
                 Journal. It should be read in conjunction with the
                 paper on WINSOM (ibid., vol.28, no.4, p.548) which
                 describes the computer program used to generate the
                 computer sculptures.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM UK Sci. Centre, Winchester, UK",
  classification = "C6130B (Graphics techniques); C7820 (Humanities)",
  keywords =     "Computer sculptures; Graphic techniques; WINSOM",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Art; Computer graphics",
}

@Article{Anonymous:1989:Bc,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "4",
  pages =        "689--691",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1989:CV,
  author =       "Anonymous",
  title =        "Contents of Volume 28, 1989",
  journal =      j-IBM-SYS-J,
  volume =       "28",
  number =       "4",
  pages =        "692--692",
  year =         "1989",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1990:Pa,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "1",
  pages =        "2--3",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Mays:1990:EDP,
  author =       "R. G. Mays and C. L. Jones and G. J. Holloway and D.
                 P. Studinski",
  title =        "Experiences with {Defect Prevention}",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "1",
  pages =        "4--32",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Defect prevention is the process of improving quality
                 and productivity by preventing the injection of defects
                 into a product. It consists of four elements integrated
                 into the development process: (1) causal analysis
                 meetings to identify the root cause of defects and
                 suggest preventive actions; (2) an action team to
                 implement the preventive actions; (3) kickoff meetings
                 to increase awareness of quality issues specific to
                 each development stage; and (4) data collection and
                 tracking of associated data. The defect prevention
                 process has been successfully implemented in a variety
                 of organizations within IBM, some for more than six
                 years. The paper discusses the steps needed to
                 implement this process and the results that may be
                 obtained. Data on quality, process costs, benefits, and
                 practical experiences are also presented. Insights into
                 the nature of programming errors and the application of
                 this process to a variety of working environments are
                 discussed.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Commun. Syst., Research Triangle Park, NC, USA",
  classification = "C0310F (Software development management)",
  keywords =     "Action team; Causal analysis meetings; Data
                 collection; Defect prevention; Defects; Development
                 stage; IBM; Kickoff meetings; Process costs;
                 Productivity; Programming errors; Quality; Quality
                 issues",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "DP management; IBM computers; Quality control;
                 Software engineering",
}

@Article{Gale:1990:IDP,
  author =       "J. L. Gale and J. R. Tirso and C. A. Burchfield",
  title =        "Implementing the {Defect Prevention Process} in the
                 {MVS} Interactive programming organization",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "1",
  pages =        "33--43",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A process for preventing defects has been gaining
                 momentum in the IBM Corporation as a way to improve
                 quality and increase productivity. The Communications
                 Programming Laboratory has been implementing the
                 process for the past six years and has realized a 54
                 percent reduction in errors. The paper documents
                 experiences at the IBM Myers Corners Laboratory MVS
                 interactive programming area in putting the defect
                 prevention process theories into practice. The paper
                 begins with the proposal to adopt the defect prevention
                 process at the Myers Corners Laboratory in
                 Poughkeepsie, New York, and experiences thus far. Other
                 organizations can benefit from these experiences by
                 understanding how the defect prevention process can be
                 adapted to best meet the needs of any organization.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Corp., Poughkeepsie, NY, USA",
  classification = "C0310F (Software development management)",
  keywords =     "Defect prevention process; IBM Corporation; MVS
                 interactive programming organization; Productivity;
                 Quality",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "DP management; IBM computers; Quality control;
                 Software engineering",
}

@Article{Franklin:1990:EAD,
  author =       "S. M. Franklin and A. M. Peters",
  title =        "Effective application development for {Presentation
                 Manager} programs",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "1",
  pages =        "44--58",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The OS/2 Presentation Manager provides an integrated
                 graphical, windowing user interface to IBM's OS/2
                 operating system. The paper addresses a primary area of
                 interest for Presentation Manager application
                 developers: the use and development of user controls. A
                 control in the Presentation Manager environment is a
                 program object with a programming interface and
                 application function. The structure and interfaces
                 between controls and the system are described in order
                 to provide an understanding of the correct procedure
                 for programming the Presentation Manager efficiently.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Application Solutions Div., Roanoke, TX, USA",
  classification = "C6150J (Operating systems); C6180 (User
                 interfaces)",
  keywords =     "Application development; Application function; OS/2
                 operating system; Presentation Manager programs;
                 Program object; Programming interface; User controls;
                 Windowing user interface",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Operating systems [computers]; User interfaces",
}

@Article{Odom:1990:UBS,
  author =       "J. E. Odom",
  title =        "Using box structures for definition of requirements
                 specifications",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "1",
  pages =        "59--78",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Box structures provide a stepwise refinement and
                 verification methodology for information systems
                 analysis and design. They are especially useful for
                 recording and decomposing requirements specifications.
                 The benefits of using the structures center around
                 making the requirements clear to readers, helping to
                 make the requirements complete, and providing an
                 artifact that will enhance the traceability of the
                 requirements. The paper describes the methodology of
                 applying box structures and presents an example of
                 their use in the definition of requirements
                 specifications.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM US Educ., Thornwood, NY, USA",
  classification = "C6110B (Software engineering techniques)",
  keywords =     "Box structures; Information systems analysis;
                 Requirements specifications; Stepwise refinement;
                 Traceability; Verification methodology",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Formal specification; Systems analysis",
}

@Article{Tagg:1990:ITS,
  author =       "B. S. Tagg",
  title =        "Implementing tool support for box structures",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "1",
  pages =        "79--89",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Describes a feasibility study to implement partial
                 tool support for the graphical component of the box
                 structure methodology (BSM). By following the defined
                 strategy and process, an existing computer-aided
                 software engineering (CASE) environment has been
                 extended with a customizer to provide support for the
                 box definition graphics (BDG) component of BSM. The
                 critical functions required from a CASE environment are
                 also described to provide a background for selecting
                 one of the various implementations available today.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Enterprise Syst. Div., Suffern, NY, USA",
  classification = "C6110B (Software engineering techniques); C6115
                 (Programming support)",
  keywords =     "Box definition graphics; Box structure methodology;
                 Box structures; CASE; Computer-aided software
                 engineering; Feasibility study; Graphical component;
                 Requirements specification; Tool support",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Formal specification; Software engineering; Software
                 tools",
}

@Article{Abraham:1990:PDI,
  author =       "R. Abraham and B. F. Goodrich",
  title =        "Porting {DPPX} from the {IBM} 8100 to the {IBM
                 ES\slash 9370}: Feasibility and overview",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "1",
  pages =        "90--105",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The DPPX/SP operating system was converted from its
                 original implementation on the IBM 8100 Information
                 System architecture to a new implementation-DPPX/370-on
                 the System/370 architecture of the ES/9370 Information
                 System processors. Portability was not an original
                 design objective for DPPX, and yet the conversion of
                 the operating system was straightforward and
                 successful. The paper investigates the design
                 fundamentals and technical approaches that led to the
                 successful porting of DPPX/SP to the ES/9370.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Ind. Sector Div., Atlanta, GA, USA",
  classification = "C6150J (Operating systems)",
  keywords =     "DPPX/370; DPPX/SP operating system; ES/9370
                 Information System processors; IBM 8100; IBM 8100
                 Information System architecture; IBM ES/9370;
                 System/370 architecture",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Operating systems [computers]; Software
                 portability",
}

@Article{Goodrich:1990:PDI,
  author =       "C. Goodrich and M. B. Loughlin",
  title =        "Porting {DPPX} from the {IBM} 8100 to the {IBM
                 ES\slash 9370}: Migration",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "1",
  pages =        "106--123",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Explains the development of the migration process by
                 which applications running on a network of DPPX/SP
                 systems would migrate to a network of DPPX/370 systems.
                 DPPX/SP is a centrally managed, distributed processing
                 system designed to run on the IBM 8100 family of
                 processors. DPPX/370 is the DPPX/SP system ported to
                 the IBM ES/9370 family of processors. The paper
                 outlines the strategies, the technical problems
                 encountered and their solutions, customer
                 participation, and testing. Finally, it provides
                 recommendations on how the process might have been
                 improved.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Kingston, NY, USA",
  classification = "C0310F (Software development management); C6150J
                 (Operating systems)",
  keywords =     "Applications; Customer participation; Distributed
                 processing system; DPPX/370 systems; DPPX/SP systems;
                 IBM 8100; IBM ES/9370; Migration process; Technical
                 problems; Testing",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "DP management; IBM computers; Operating systems
                 [computers]; Software portability",
}

@Article{Boehm:1990:PDI,
  author =       "G. E. Boehm and A. M. Palmiotti and D. P. Zingaretti",
  title =        "Porting {DPPX} from the {IBM} 8100 to the {IBM
                 ES\slash 9370}: Installation and testing",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "1",
  pages =        "124--140",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Describes the software tools, testing activities, and
                 testing methods that were used to port the DPPX/SP
                 operating system from its original implementation on
                 the IBM 8100 Information System to its new
                 implementation on the IBM ES/9370 Information System.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Kingston Programming Lab., NY, USA",
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques); C6150J (Operating
                 systems)",
  keywords =     "DPPX; DPPX/SP operating system; IBM 8100; IBM ES/9370;
                 Software tools; Testing activities; Testing methods",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "DP management; Operating systems [computers]; Program
                 testing; Software portability; Software tools",
}

@Article{Prager:1990:RIU,
  author =       "J. M. Prager and D. M. Lamberti and D. L. Gardner and
                 S. R. Balzac",
  title =        "{REASON}: An intelligent user assistant for
                 interactive environments",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "1",
  pages =        "141--164",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The provision of intelligent user assistance has been
                 an ongoing problem in designing computer interfaces.
                 Interactive computing environments must support expert
                 as well as novice users when providing advice for error
                 correction and answers to questions directed to a
                 system. To address these issues, the authors have
                 investigated the application of fairly well-understood
                 artificial intelligence techniques in novel ways to
                 provide intelligent help. The paper describes the
                 design methodology used to build REASON, an intelligent
                 user-assistant prototype for a windowed, multitasking
                 environment. REASON's central component is an inference
                 engine that solves problems arising from a user's
                 activity. When the user makes one of several different
                 kinds of errors, the inference engine offers
                 dynamically generated suggestions about what the user
                 might have intended. The user can also query REASON
                 using natural language. In addition to providing
                 suggestions of corrected input or answers to questions,
                 REASON can provide two complementary types of
                 explanations of these responses, derived from the
                 inferences that led to them.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Cambridge Sci. Center, MA, USA",
  classification = "C6150J (Operating systems); C6170 (Expert systems);
                 C6180N (Natural language processing)",
  keywords =     "Advice; Artificial intelligence; Computer interfaces;
                 Error correction; Inference engine; Intelligent help;
                 Intelligent user assistant; Interactive environments;
                 Natural language; REASON",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Expert systems; Inference mechanisms; Natural
                 languages; Operating systems [computers]; User
                 interfaces",
}

@Article{Anonymous:1990:Ba,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "1",
  pages =        "165--166",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1990:Pb,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "2",
  pages =        "168--169",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Mercurio:1990:ACS,
  author =       "V. J. Mercurio and B. F. Meyers and A. M. Nisbet and
                 G. Radin",
  title =        "{AD\slash Cycle} strategy and architecture",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "2",
  pages =        "170--188",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:52:45 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Over the years, IBM has made progress in resolving
                 many of the issues that deal with improving application
                 development (AD) productivity and quality. Systems
                 Application Architecture, together with IBM's recently
                 announced AD/Cycle direction, provides a platform for
                 even greater progress. The authors address the IBM
                 strategy that supports AD/Cycle and give an overview of
                 the major components of the AD/Cycle architecture. In
                 essence, the AD/Cycle architecture is an infrastructure
                 of services and interfaces to enable integration of
                 application development tools across the life cycle.
                 AD/Cycle components are: user interface, workstation
                 services, work management, AD tools, tool services,
                 repository and library services and AD information
                 model.",
  acknowledgement = ack-nhfb,
  classification = "C0310F (Software development management); C6110
                 (Systems analysis and programming); C6115 (Programming
                 support); C6180 (User interfaces)",
  keywords =     "AD information model; AD tools; AD/Cycle architecture;
                 AD/Cycle components; AD/Cycle direction; Application
                 development tools; IBM strategy; Infrastructure;
                 Library services; Life cycle; Repository services;
                 Systems Application Architecture; Tool services; User
                 interface; Work management; Workstation services",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Application generators; DP industry; IBM computers;
                 Software tools; Systems analysis; User interfaces",
}

@Article{Chroust:1990:RWM,
  author =       "G. Chroust and H. Goldmann and O. Gschwandtner",
  title =        "The role of work management in application
                 development",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "2",
  pages =        "189--208",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "For software applications exhibiting a certain
                 complexity, the quality of a product can only be
                 guaranteed by a methodological approach, using
                 appropriate administration and tools. The methodology
                 and administration must be manifested in a well-defined
                 and well-observed application development process. The
                 process must integrate the human activity, the tools
                 and the intermediate and final work products into a
                 coherent flow of actions. In this regard, the
                 development of applications follows patterns that are
                 well established in other industries where an
                 application development (AD) process model is defined
                 and then executed via an interpretation mechanism. The
                 complexity of the development process makes it
                 necessary to support and integrate all of its aspects
                 by means of online interactive computer support.
                 Computer-aided process support in the general sense is
                 called work management. The authors explain the
                 concepts of an application development process model
                 and of work management for application development
                 under AD/Cycle and its relation to project
                 management.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Programming Syst. Vienna, Austria",
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques); C6115 (Programming
                 support)",
  keywords =     "AD/Cycle; Administration; Application development
                 process model; Complexity; Computer-aided process
                 support; Development process; Final work products;
                 Human activity; Interpretation mechanism;
                 Methodological approach; Online interactive computer
                 support; Project management; Software applications;
                 Software quality; Tools; Well-observed application
                 development process; Work management",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Application generators; IBM computers; Project
                 engineering; Quality control; Software reliability;
                 Systems analysis",
}

@Article{Sagawa:1990:RMT,
  author =       "J. M. Sagawa",
  title =        "{Repository Manager} technology (specifications
                 manager)",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "2",
  pages =        "209--227",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See erratum \cite{Anonymous:1990:EMT}.",
  abstract =     "IBM's Repository Manager enables specifications
                 involved in the program application development process
                 to be managed. On the basis of the technology, the
                 Repository Manager/MVS was developed as a product. The
                 primary concepts and services of the technology are
                 introduced and specific aspects of the product and its
                 operation are discussed. A discussion of what is
                 involved in designing and implementing a tool is also
                 included.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Programming Syst., San Jose, CA, USA",
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques); C6115 (Programming
                 support)",
  keywords =     "Program application development process; Repository
                 Manager/MVS; RM; SAA strategy; Specifications; Tool
                 design; Tool implementation",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Formal specification; IBM computers; Software tools;
                 Systems analysis",
}

@Article{Matthews:1990:DMS,
  author =       "R. W. Matthews and W. C. McGee",
  title =        "Data modeling for software development",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "2",
  pages =        "228--235",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "One of the motivations for the use of a facility such
                 as the IBM Repository Manager in an information
                 processing system is to centralize the information
                 needed for the development of software. What this
                 information is and how it is interrelated is defined in
                 the underlying data model. The authors discuss the
                 kinds of information required for software development
                 and offer some suggestions on how the data model should
                 be organized and implemented.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Programming Syst., San Jose, CA, USA",
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques); C6115 (Programming
                 support)",
  keywords =     "Data modeling; IBM Repository Manager; Information
                 processing system; Software development; Underlying
                 data model",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Application generators; Software engineering; Systems
                 analysis",
}

@Article{Artim:1990:UIS,
  author =       "J. M. Artim and J. M. Hary and F. J. Spickhoff",
  title =        "User interface services in {AD\slash Cycle}",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "2",
  pages =        "236--249",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:52:45 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Significant progress has been made in the effort to
                 separate programmers from the management of data
                 storage. By comparison, the window of a workstation is
                 still managed and controlled in great detail by the
                 typical programmer. In AD/Cycle, user interface
                 services define a set of services that assist in the
                 management of the displays on the workstation. These
                 services also help increase the productivity of the
                 tool builder by enforcing common user access rules and
                 guidelines, and raise the level of consistency of user
                 displays of the tools in AD/Cycle.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Programming Syst. San Jose, CA, USA",
  classification = "C6115 (Programming support); C6130B (Graphics
                 techniques); C6180 (User interfaces)",
  keywords =     "AD/Cycle; Common user access rules; Consistency; Data
                 storage; Tool builder; User displays; User interface
                 services; Workstation",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Application generators; Computer graphics; IBM
                 computers; User interfaces; Workstations",
}

@Article{Hein:1990:DNP,
  author =       "K. P. Hein",
  title =        "{DevelopMate}: a new paradigm for information system
                 enabling",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "2",
  pages =        "250--264",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:23:44 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A discussion is given on a new approach to the use of
                 information systems that is based on enterprise
                 information system modelling concepts. This approach is
                 primarily oriented to the enterprise expert, who is
                 considered to be the individual most familiar with the
                 functioning of a particular area of the enterprise
                 information system. The approach is not primarily
                 oriented toward the data processing professional. The
                 author discusses the phases of the approach and how the
                 DevelopMate software product supports some of those
                 phases.",
  acknowledgement = ack-nhfb,
  affiliation =  "Santa Teresa Lab., San Jose, CA, USA",
  classification = "C6110B (Software engineering techniques); C6115
                 (Programming support)",
  keywords =     "Data processing professional; DevelopMate software
                 product; Enterprise expert; Enterprise information
                 system modelling concepts; Information system
                 enabling",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Automatic programming; IBM computers; Software
                 packages; Software tools; Systems analysis",
}

@Article{Dewell:1990:CSP,
  author =       "M. E. Dewell",
  title =        "{Cross System Product} application generator:
                 Application design",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "2",
  pages =        "265--273",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Some techniques that can be used for Cross System
                 Product/Application Development (CSP/AD) application
                 design are described. CSP/AD is an application
                 development tool for professional programmers. A
                 well-designed application is obtained by using proven
                 principles of structural analysis, structured design
                 and structured programming. An understanding of these
                 principles and the application definition constructs
                 provided by Cross System Product/Application
                 Development is necessary for the CSP/AD application
                 designer. Application design for CSP/AD is accomplished
                 by using a combination of techniques for data design,
                 application design and application program design. For
                 each of these design techniques there exist formal,
                 accepted practices and methodologies that may be used.
                 These techniques are described, and methods that have
                 proven successful for designing CSP/AD applications are
                 presented.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Programming Syst., Cary, NC, USA",
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques); C6115 (Programming
                 support)",
  keywords =     "Accepted practices; Application definition constructs;
                 Application design; Application designer; Application
                 development tool; Application generator; Cross System
                 Product/Application Development; CSP/AD; Data design;
                 Design techniques; Professional programmers; Program
                 design; Structural analysis; Structured design;
                 Structured programming; Well-designed application",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Application generators; IBM computers; Software
                 packages; Structured programming; Systems analysis",
}

@Article{Hembry:1990:KSA,
  author =       "D. M. Hembry",
  title =        "Knowledge-based systems in the {AD\slash Cycle}
                 environment",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "2",
  pages =        "274--286",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:52:45 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A discussion is given on how, over the last decade
                 (1980-90), knowledge-based systems have evolved into a
                 viable technology for building commercial data
                 processing applications and how increasing attention
                 has been paid to incorporating these applications into
                 commercial data processing environments. A logical
                 conclusion of this direction is the capability to build
                 knowledge-based applications that are full Systems
                 Application Architecture (SAA) applications. As this
                 conclusion is approached, a requirement emerges that
                 the knowledge-based development process be integrated
                 with the application development environment provided
                 by the other SAA language and service components. The
                 integrated environment must provide high customer
                 productivity in the development of applications that
                 use knowledge-based technology and must support a
                 spectrum of development scenarios, ranging from the
                 most basic to those involving complex applications and
                 large development teams. The author explores how
                 knowledge-based products can address these requirements
                 by integrating their development facilities with
                 AD/Cycle.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Programming Syst., Menlo Park, CA, USA",
  classification = "C6110B (Software engineering techniques); C6115
                 (Programming support); C6170 (Expert systems)",
  keywords =     "AD/Cycle environment; Application development
                 environment; Commercial data processing applications;
                 Commercial data processing environments; Development
                 facilities; Development scenarios; Full Systems
                 Application Architecture; High customer productivity;
                 Integrated environment; Knowledge-based applications;
                 Knowledge-based development process; Knowledge-based
                 technology; SAA language",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Application generators; IBM computers; Knowledge based
                 systems; Programming environments; Systems analysis",
}

@Article{Faulk:1990:SDD,
  author =       "R. D. Faulk and F. Goertzel Gustavson",
  title =        "Segmenting discrete data representing continuous
                 speech input",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "2",
  pages =        "287--296",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A probabilistic method for segmenting continuous
                 speech into lexical units is described. The algorithm
                 assumes initial conversion of the continuous speech
                 signal to a discrete representation over some suitable
                 alphabet. The problem of determining such alphabets is
                 not considered. Experiments used keyed input in
                 English, French, German and Russian. The authors
                 hypothesize that the low error rates obtained in the
                 experiments can also be achieved with data representing
                 actual speech. They discuss an area of linguistic
                 science and outline a method for investigating it.",
  acknowledgement = ack-nhfb,
  classification = "B6130 (Speech analysis and processing techniques);
                 C1250B (Character recognition); C6180N (Natural
                 language processing); C7820 (Humanities)",
  keywords =     "Alphabet; Continuous speech input; Continuous speech
                 signal; Discrete data segmentation; Discrete
                 representation; English; Error rates; French; German;
                 Keyed input; Lexical units; Linguistic science;
                 Probabilistic method; Russian",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Linguistics; Natural languages; Probability; Speech
                 analysis and processing; Speech recognition",
}

@Article{Anonymous:1990:Bb,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "2",
  pages =        "297--298",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1990:Pc,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "3",
  pages =        "302--303",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Kingman:1990:OIS,
  author =       "L. C. {Kingman, III} and R. E. Lambert and R. P.
                 Steen",
  title =        "Operational image systems: a new opportunity",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "3",
  pages =        "304--312",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Within the span of a few years, image processing has
                 evolved from an esoteric, expensive technology to an
                 indispensable tool used by modern businesses to manage
                 the overwhelming flood of paperwork. Some of the
                 background for this evolution and the development of
                 the IBM system solution for image processing,
                 Image-Plus, are described.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Applications Solutions Div., New York, NY, USA",
  classification = "C5260B (Computer vision and picture processing);
                 C7100 (Business and administration)",
  keywords =     "Businesses; IBM system; Image processing; Image-Plus;
                 Operational image systems; Paperwork",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computerised picture processing; Document image
                 processing",
}

@Article{Helms:1990:IIT,
  author =       "R. M. Helms",
  title =        "Introduction to image technology",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "3",
  pages =        "313--332",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Business today is wrestling with mountains of paper
                 that must be moved, filed, located, and moved again
                 from person to person. Often the paper must be stored
                 for extended periods of time, sometimes as long as
                 seven or more years. The long-term storage of paper
                 records is becoming more and more costly. An image
                 system not only makes the document capture, retention,
                 and retrieval process more cost efficient, but also
                 makes it a faster service to the users. The paper
                 explains the basic concepts of image processing in
                 business.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Canada Lab., North York, Ont., Canada",
  classification = "C5260B (Computer vision and picture processing);
                 C7100 (Business and administration)",
  keywords =     "Business; Document capture; Document retention;
                 Document retrieval; Image processing; Image system;
                 Image technology; Long-term storage; Paper records",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computerised picture processing; Document image
                 processing",
}

@Article{Hakeda:1990:IOC,
  author =       "Y. Hakeda",
  title =        "The {Image Object Content Architecture}",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "3",
  pages =        "333--342",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A wide variety of applications and products designed
                 for image processing have been introduced into the
                 market in recent years. In order to encompass different
                 applications and products in a single image processing
                 system and to allow image data to be exchanged and
                 interpreted consistently throughout the system, IBM has
                 introduced the Image Object Content Architecture
                 (IOCA). The paper discusses requirements for the
                 architecture, concepts of the architecture, use of the
                 architecture in the different data stream environments
                 used by image processing systems and the IOCA function
                 sets that have been defined for interchange within
                 Systems Application Architecture environments.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM World Trade Asia Corp., Kanagawa-ken, Japan",
  classification = "C5260B (Computer vision and picture processing);
                 C6155 (Computer communications software); C7100
                 (Business and administration)",
  keywords =     "Architecture; Data stream environments; IBM; Image
                 data; Image Object Content Architecture; Image
                 processing systems; IOCA function sets; Systems
                 Application Architecture environments",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer communications software; Computerised picture
                 processing; Document image processing; IBM computers",
}

@Article{Plesums:1990:LIS,
  author =       "C. A. Plesums and R. W. Bartels",
  title =        "Large-scale image systems: {USAA} case study",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "3",
  pages =        "343--355",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A large-scale, optical disk-based, operational image
                 system for office-size documents has been implemented
                 to support an insurance customer service application.
                 Images stored on optical disk can be displayed on any
                 of the more than 1400 workstations or printed on any of
                 22 printers. This system was the prototype for the IBM
                 MVS/ESA ImagePlus product. Each day over 25000 pages of
                 incoming mail are scanned, stored, and delivered to
                 users for processing. In addition, computer-generated
                 data are stored for display or print on image-stored
                 overlay forms. The system is described in the context
                 of any large-scale office document application. The
                 paper includes some of the business factors that
                 created an environment for success and the business
                 issues that led to the development of the system. It
                 discusses the discoveries and lessons learned from use
                 of two pilot systems. It is concluded that the present
                 level of technology makes this a good time to move
                 forward with the installation of large-scale
                 operational document image systems.",
  acknowledgement = ack-nhfb,
  affiliation =  "USAA Inf. Services, San Antonio, TX, USA",
  classification = "C5260B (Computer vision and picture processing);
                 C7120 (Finance)",
  keywords =     "Business; Computer-generated data; IBM MVS/ESA
                 ImagePlus; Image-stored overlay forms; Incoming mail;
                 Insurance customer service application; Large-scale
                 office document; Large-scale operational document image
                 systems; Office-size documents; Optical disk-based
                 document image systems; USAA",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computerised picture processing; Document image
                 processing; Insurance data processing",
}

@Article{Avers:1990:IMA,
  author =       "C. D. Avers and R. E. Probst",
  title =        "{ImagePlus} as a model for application solution
                 development",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "3",
  pages =        "356--370",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An early effort by IBM to use system integration
                 services to assist in solving complex problems for
                 commercial customers involved developing an image
                 system for USAA, a large financial services
                 association. USAA had well-defined and stringent
                 requirements for a policy services application that
                 required enhancements to existing products to provide
                 the necessary function and performance. Key problems
                 solved included managing a storage hierarchy to handle
                 image size objects, the use of optical storage as a
                 low-cost storage medium, and the capability to compress
                 and decompress images rapidly at a workstation to allow
                 high-speed paging through documents. Additionally, the
                 registering and indexing of documents and management of
                 work flow and recovery issues were undertaken. The
                 effort was a good example of the new role of
                 application solution development in that the solution
                 was developed in conjunction with a specific customer,
                 but has developed into a product. The particular
                 solution described in the paper became IBM's ImagePlus
                 MVS/ESA product. Although the specific technical issues
                 were different, the same methodology was used to
                 develop ImagePlus for the System/36 and Application
                 System/400.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Federal Sector Div., Bethesda, MD, USA",
  classification = "C5260B (Computer vision and picture processing);
                 C7120 (Finance)",
  keywords =     "Application solution development; Compress;
                 Decompress; Documents; Financial services association;
                 High-speed paging; IBM; Image size objects; Image
                 system; ImagePlus MVS/ESA; Indexing; Optical storage;
                 Policy services application; Recovery; Registering;
                 Storage hierarchy; System integration services; USAA;
                 Work flow; Workstation",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computerised picture processing; Document image
                 processing; IBM computers; Insurance data processing;
                 Systems analysis",
}

@Article{Morris:1990:ISC,
  author =       "H. M. Morris and R. H. Orth",
  title =        "Image system communications",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "3",
  pages =        "371--383",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Discusses the communication requirements to support
                 the IBM ImagePlus system. The analysis and approach
                 discussed are based on the experience gained in
                 installing the initial ImagePlus systems at several
                 business enterprises.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Application Solutions Div., Gaithersburg, MD,
                 USA",
  classification = "C5260B (Computer vision and picture processing);
                 C6155 (Computer communications software); C7100
                 (Business and administration)",
  keywords =     "Business enterprises; IBM ImagePlus system; Image
                 system communications",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer communications software; Computerised picture
                 processing; Document image processing; IBM computers",
}

@Article{Harding:1990:OSH,
  author =       "W. B. Harding and C. M. Clark and C. L. Gallo and H.
                 Tang",
  title =        "Object storage hierarchy management",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "3",
  pages =        "384--397",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The Object Access Method (OAM) component of MVS/Data
                 Facility Product is responsible for the storage
                 retrieval, and management of objects in IBM MVS/ESA
                 ImagePlus systems and in other applications. The OAM
                 Storage Management Component is the subcomponent of OAM
                 that provides storage management for objects stored
                 within an object storage hierarchy. Storage management
                 is a cyclic procedure which assures that data are
                 stored in conformity to a policy defined by the data
                 processing storage administrator. During a storage
                 management cycle, the OAM Storage Management Component
                 (OSMC) selects objects for processing based on
                 requirements for backup, expiration, or service level
                 changes. The paper describes the concepts of object
                 storage management using a storage hierarchy that
                 contains DASD and optical disk storage.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Gen. Products Div., Tucson, AZ, USA",
  classification = "C6120 (File organisation)",
  keywords =     "Backup; Cyclic procedure; DASD; Expiration; IBM
                 MVS/ESA ImagePlus systems; MVS/Data Facility Product;
                 OAM Storage Management Component; Object Access Method;
                 Object storage hierarchy; Object storage management;
                 Optical disk storage; Retrieval; Service level changes;
                 Storage hierarchy; Storage management",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Storage management",
}

@Article{Anderson:1990:IWP,
  author =       "G. B. Anderson and B. P. Gross and S. M. Lewis and J.
                 A. Reimer",
  title =        "{{ImagePlus} Workstation Program}",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "3",
  pages =        "398--407",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The IBM's ImagePlus system is designed to permit the
                 capture, storage, management, and retrieval of
                 documents through digital imaging. The ImagePlus
                 Workstation Program is that portion of the ImagePlus
                 system that controls the user's workstation. The paper
                 describes the challenges that were posed in designing
                 an ImagePlus Workstation, and the approach taken by the
                 development group to solve them. The primary design
                 goal was to deliver operational performance for image
                 processing in a cost-effective workstation, while
                 permitting the user maximal control in viewing and
                 manipulating scanned documents. The solution chosen
                 implemented a Personal System/2 workstation that
                 operates with a System/36, Application System/400, or
                 System/370 Multiple Virtual Storage host.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Canada Lab., Don Mills, Ont., Canada",
  classification = "C5260B (Computer vision and picture processing);
                 C6150J (Operating systems); C7100 (Business and
                 administration)",
  keywords =     "Application System/400; Capture; Digital imaging;
                 IBM's ImagePlus system; Image processing; ImagePlus
                 Workstation Program; Management; Personal System/2
                 workstation; Retrieval; Scanned documents; Storage;
                 System/36; System/370 Multiple Virtual Storage host",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Document image processing; IBM computers; Operating
                 systems [computers]",
}

@Article{Ryman:1990:PSI,
  author =       "A. Ryman",
  title =        "Personal systems image application architecture:
                 Lessons learned from the {ImagEdit} program",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "3",
  pages =        "408--420",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Discusses the problems relevant to personal systems
                 image application architecture and how these problems
                 were solved in the ImagEdit program. A virtual array
                 manager (VAM) consisting of a virtual memory manager
                 (VMM) and an access scheduler was used to solve the
                 data management problem. The VAM divided each image
                 into segments and transferred them to the VMM for
                 storage. These segments were swapped between memory and
                 disk in response to a sequence of access requests,
                 controlled by the access scheduler using
                 performance-maximizing heuristics. Object-oriented
                 design was used to address the functional complexity
                 problem. The processing functions were divided into two
                 classes. The data-stream class included scanning,
                 printing, and filing, with each data-stream function
                 decomposed into a series of demand-driven pipe objects.
                 The editing class included cut and paste, textual and
                 graphical annotation and freehand drawing.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Canada Centre for Adv. Studies, North York, NY,
                 USA",
  classification = "C5260B (Computer vision and picture processing);
                 C6110B (Software engineering techniques); C6120 (File
                 organisation); C7100 (Business and administration)",
  keywords =     "Access requests; Access scheduler; Cut; Data
                 management problem; Data-stream class; Demand-driven
                 pipe objects; Editing class; Filing; Freehand drawing;
                 Functional complexity problem; Graphical annotation;
                 ImagEdit program; Object-oriented design; Paste;
                 Performance-maximizing heuristics; Personal systems
                 image application architecture; Printing; Processing
                 functions; Scanning; Segments; Textual annotation;
                 Virtual array manager; Virtual memory manager",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Document image processing; Software engineering;
                 Virtual storage",
}

@Article{Dinan:1990:IHP,
  author =       "R. F. Dinan and L. D. Painter and R. R. Rodite",
  title =        "{ImagePlus High Performance Transaction System}",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "3",
  pages =        "421--434",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The need for a cost-effective method for handling,
                 processing, storing, and retrieving transaction
                 documents combined with the availability of hardware
                 and software technologies capable of satisfying this
                 need are the basis for the High Performance Transaction
                 System discussed. The particular transactions discussed
                 are bank checks, the volumes surpassing 50 billion per
                 year and continuing to grow. Other transactions might
                 be the handling of such documents as bill remittances,
                 tax documents, mail-order forms, census forms, and many
                 other similar applications. The paper discusses the
                 system design, hardware and software architectures, and
                 performance of the ImagePlus High Performance
                 Transaction System.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Services Sector Div., Charlotte, NC, USA",
  classification = "C5260B (Computer vision and picture processing);
                 C7120 (Finance)",
  keywords =     "Bank checks; Bill remittances; Census forms; Document
                 handling; Document processing; Document retrieval;
                 Document storage; ImagePlus High Performance
                 Transaction System; Mail-order forms; Tax documents;
                 Transaction documents",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Bank data processing; Document image processing; IBM
                 computers; Transaction processing",
}

@Article{Casey:1990:IFP,
  author =       "R. G. Casey and D. R. Ferguson",
  title =        "{Intelligent Forms Processing}",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "3",
  pages =        "435--450",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The automatic reading of optically scanned forms
                 consists of two major components: extraction of the
                 data image from the form and interpretation of the
                 image as coded alphanumerics. The second component is
                 also known as optical character recognition, or OCR.
                 The authors have implemented a method for entry of a
                 wide variety of forms that contain machine-printed data
                 and that are often produced in business environments.
                 The function, called Intelligent Forms Processing
                 (IFP), accepts conventional forms that call for
                 information to be printed in designated blank areas,
                 but in which the information may exceed boundaries due
                 to poor registration during printing. The IFP system
                 uses a setup phase to create a model of each form that
                 is to be read. Scanned forms containing data are
                 compared against the matching form model. Special
                 algorithms are employed to extract data fields while
                 removing background printing intersecting the data. The
                 extracted data images are interpreted by an OCR process
                 that reads typical monospace fonts. New fonts may be
                 added easily in a separate design mode. If the data are
                 alphabetic, a lexicon may be assembled to define the
                 possible entries.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Res. Div., San Jose, CA, USA",
  classification = "C5260B (Computer vision and picture processing);
                 C7100 (Business and administration)",
  keywords =     "Automatic reading; Business environments; Coded
                 alphanumerics; Data image extraction; Designated blank
                 areas; Image interpretation; Intelligent Forms
                 Processing; Lexicon; Machine-printed data; OCR; Optical
                 character recognition; Optically scanned forms; Typical
                 monospace fonts",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Document image processing; Optical character
                 recognition",
}

@Article{Addink:1990:AIS,
  author =       "M. Addink and J. J. Mullen",
  title =        "{AS}\slash 400 {ImagePlus} system view",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "3",
  pages =        "451--466",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:47:47 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The AS/400 ImagePlus system provides an imaging
                 environment for departmental installations of up to 256
                 workstations. This system combines the image-handling
                 capabilities of the IBM ImagePlus Workstation Program,
                 the user interface and case/folder processing of the
                 AS/400 Workfolder Application Facility with the image
                 storage and retrieval capabilities of the optical
                 storage support subsystem. All together, these
                 facilities provide a highly configurable system capable
                 of handling high volumes of transactions.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Application Solution Div., Gaithersburg, MD, USA",
  classification = "C5260B (Computer vision and picture processing);
                 C7100 (Business and administration)",
  keywords =     "AS/400 ImagePlus system; AS/400 Workfolder Application
                 Facility; Case/folder processing; Configurable system;
                 Departmental installations; IBM ImagePlus Workstation
                 Program; Image retrieval; Image storage;
                 Image-handling; Imaging environment; Optical storage
                 support subsystem; Transactions; User interface",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Document image processing; IBM computers",
}

@Article{Perry:1990:EGI,
  author =       "B. T. Perry and B. A. Wester and W. W. Baker and J. F.
                 Kemmis",
  title =        "Experience gained in implementing {ImagePlus}",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "3",
  pages =        "467--488",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "An ImagePlus internal use program (IUP) was
                 established in IBM to assist users inside the company
                 with their initial application selection and their
                 training, procedure definition, and prototype system
                 installation, as well as their initial use of the
                 system on a regular working basis. The paper discusses
                 the experience gained from identifying, selecting, and
                 preparing several areas within IBM for an ImagePlus
                 system. The experience begins with establishment of IUP
                 objectives and guidelines, continues through the
                 account nomination and selection process used to
                 identify and select the application, and ends with
                 identification of the justification or business case
                 process and some of the major elements considered in
                 the justification for the purchase of a system. A
                 detailed description of several internal operations
                 that have installed an ImagePlus system is given. In
                 conclusion, ImagePlus as an application enabler is
                 discussed.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM US Marketing and Services, Research Triangle Park,
                 NC, USA",
  classification = "C5260B (Computer vision and picture processing);
                 C7100 (Business and administration)",
  keywords =     "Application enabler; Application selection; IBM;
                 ImagePlus internal use program; Procedure definition;
                 Prototype system installation; Training",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Document image processing; IBM computers",
}

@Article{Anonymous:1990:Bc,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "3",
  pages =        "489--490",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1990:Pd,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "4",
  pages =        "492--493",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Moore:1990:MPD,
  author =       "D. J. Moore",
  title =        "Multimedia presentation development using the {Audio
                 Visual Connection}",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "4",
  pages =        "494--508",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Describes the technology behind the creation of
                 multimedia presentations using a new IBM program
                 product, the Audio Visual Connection (AVC). The
                 multimedia approach represents a major innovation in
                 computer technology involving new concepts such as the
                 digitization of audio and video, the involvement of the
                 Musical Instrument Digital Interface (MIDI), and the
                 creation of a multimedia story. Two hardware adapters
                 support the AVC: the Audio Capture and Playback Adapter
                 and the Video Capture Adapter. When used with these
                 adapters, the AVC digitizes both stereo audio and color
                 video, performs powerful edit and synchronization
                 functions, defines an interactive user environment, and
                 creates a multimedia presentation using standard IBM
                 Personal System/2 hardware. Additional input is
                 available from MIDI song files, screen capture, and
                 non-AVC image systems. Final results range from passive
                 presentations to interactive applications to
                 sophisticated database front ends.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Entry Syst. Div., Austin, TX, USA",
  classification = "C7230 (Publishing and reproduction)",
  keywords =     "Audio Capture and Playback Adapter; Audio Visual
                 Connection; AVC; Color video; Database front ends;
                 Digitization; IBM Personal System/2; IBM program;
                 Interactive user environment; MIDI; MIDI song files;
                 Multimedia presentations; Multimedia story; Musical
                 Instrument Digital Interface; Passive presentations;
                 Screen capture; Stereo audio; Synchronization; Video
                 Capture Adapter",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Interactive video; Microcomputer
                 applications; Multimedia systems",
}

@Article{Katz:1990:BEM,
  author =       "R. L. Katz",
  title =        "Business\slash enterprise modeling",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "4",
  pages =        "509--525",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:47:47 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Reports on pertinent aspects of business/enterprise
                 modeling studies that were conducted with nine IBM
                 customers using what are now called computer-aided
                 software engineering (CASE) tools. The model
                 definitions (dimensions) used in the studies correspond
                 exactly to many of the dimensions used by AD/Cycle,
                 DevelopMate, and the Repository Manager. Compelling
                 business reasons for conducting the studies are
                 identified.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Enterprise Syst., Suffern, NY, USA",
  classification = "C0310F (Software development management); C6115
                 (Programming support)",
  keywords =     "AD/Cycle; Business/enterprise modeling; Computer-aided
                 software engineering; DevelopMate; IBM customers;
                 Management; Model definitions; Repository Manager",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "DP management; Software tools",
}

@Article{Comba:1990:ECI,
  author =       "P. G. Comba",
  title =        "Exponentiation cryptosystems on the {IBM PC}",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "4",
  pages =        "526--538",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Several cryptosystems based on exponentiation have
                 been proposed. Some of these are of the public key
                 variety and offer notable advantages in cryptographic
                 key management, both for secret communication and for
                 message authentication. The need for extensive
                 arithmetic calculations with very large integers
                 (hundreds of digits long) is a drawback of these
                 systems. The paper describes a set of experimental
                 programs that were developed to demonstrate that
                 exponentiation cryptosystems can be efficiently
                 implemented on the IBM Personal Computer (PC). The
                 programs are organized into four layers, comprising
                 procedures for: multiple precision integer arithmetic,
                 modular exponentiation, prime number generation and
                 testing, and cryptographic key generation. The major
                 emphasis is on methods and techniques for improving
                 execution speed. The items discussed include: the use
                 of a specialized squaring procedure; a recursive
                 splitting method to speed up squaring and
                 multiplication; the computation of residues by using
                 multiplication instead of division; the efficient
                 encoding of residue information; and the use of
                 thresholds to select the most effective primality
                 testing algorithm for a given size number. Timing
                 results are presented and discussed. Finally, the paper
                 discusses the advantages of a mixed system that
                 combines the superior key management capabilities
                 inherent in public key cryptosystems with the much
                 higher bulk-encryption speed obtainable with the Data
                 Encryption Algorithm.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Cambridge Sci. Center, MA, USA",
  classification = "B6120B (Codes); C6130 (Data handling techniques)",
  keywords =     "Bulk-encryption speed; Cryptographic key management;
                 Cryptosystems; Data Encryption Algorithm; Execution
                 speed; Exponentiation; IBM Personal Computer; Message
                 authentication; Multiple precision integer arithmetic;
                 Primality testing algorithm; Prime number generation;
                 Public key; Recursive splitting method; Residues;
                 Secret communication; Specialized squaring procedure",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Cryptography; IBM computers; Microcomputer
                 applications",
}

@Article{Hirao:1990:ERD,
  author =       "T. Hirao",
  title =        "Extension of the relational database semantic
                 processing model",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "4",
  pages =        "539--550",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A data model consists of three parts: (1) a data
                 definition that represents the information in an
                 understandable manner; (2) a definition of the
                 constraints that must hold for the information to be
                 valid; and (3) a definition of operations that can be
                 performed on the information. Current database
                 management systems do not allow explicit specification
                 of all three parts of the data model. The paper gives
                 an approach that extends current database management
                 systems through a technique called
                 pre-precompilation.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Japan Ltd., Tokyo, Japan",
  classification = "C6160D (Relational DBMS)",
  keywords =     "Data definition; Database management systems;
                 Deductive databases; Explicit specification;
                 Pre-precompilation; Relational database semantic
                 processing model",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Deductive databases; Relational databases",
}

@Article{Britcher:1990:RSC,
  author =       "R. N. Britcher",
  title =        "Re-engineering software: a case study",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "4",
  pages =        "551--567",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "In 1986, the Federal Aviation Administration formed a
                 contract with three companies to re-engineer a major
                 portion of the New York terminal approach control
                 (TRACON) application software-the software that
                 supports air traffic control in the New York City and
                 Newark, New Jersey, area. The paper discusses the
                 techniques used to successfully re-engineer the
                 software to run on an IBM System/370, illustrating that
                 real-time software can be logically converted from one
                 computer to another, reliably and cost-effectively.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Federal Sector Div., Rockville, MD, USA",
  classification = "C6110B (Software engineering techniques); C7190
                 (Other fields); C7420 (Control engineering)",
  keywords =     "Air traffic control; Federal Aviation Administration;
                 IBM System/370; New York City; New York terminal
                 approach control; Newark; Real-time software; TRACON",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Air traffic computer control; Real-time systems;
                 Software engineering; Software portability",
}

@Article{Davis:1990:GAI,
  author =       "A. G. Davis and J. R. Friedman and M. J. Haims and G.
                 C. Stierhoff",
  title =        "Guidelines for authors of the {IBM Systems Journal}",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "4",
  pages =        "568--574",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1990:Bd,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "4",
  pages =        "575--576",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1990:CV,
  author =       "Anonymous",
  title =        "Contents of Volume 29, 1990",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "4",
  pages =        "577--577",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1990:R,
  author =       "Anonymous",
  title =        "Reprints",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "4",
  pages =        "578--582",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1990:EMT,
  author =       "Anonymous",
  title =        "Erratum: ``{Repository Manager} technology''",
  journal =      j-IBM-SYS-J,
  volume =       "29",
  number =       "4",
  pages =        "583--583",
  year =         "1990",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Sagawa:1990:RMT}.",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1991:Pa,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "1",
  pages =        "2--3",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Fischofer:1991:VSS,
  author =       "W. T. Fischofer",
  title =        "{VM\slash ESA}: a single system for centralized and
                 distributed computing",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "1",
  pages =        "4--13",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The rapid evolution of distributed and personal
                 systems in recent years has not diminished the
                 importance of centralized computing. Today, systems at
                 all levels need to operate in networked configurations
                 to allow users and applications to access and
                 manipulate data from anywhere with full integrity and
                 optimal performance. Virtual Machine/Enterprise Systems
                 Architecture (VM/ESA) satisfies this requirement as a
                 single VM product that has been designed for both
                 centralized and distributed computing. The author
                 describes how VM/ESA builds on IBM's reputation for
                 virtual machine performance, function, and flexibility
                 to form an ideal solution base for the 1990s.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Endicott Programming Lab., NY, USA",
  classification = "C6150J (Operating systems)",
  keywords =     "Centralized computing; Distributed computing; IBM;
                 Networked configurations; Virtual machine performance;
                 Virtual Machine/Enterprise Systems Architecture;
                 VM/ESA",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Network operating systems; Virtual
                 machines",
}

@Article{Gdaniec:1991:VDS,
  author =       "J. M. Gdaniec and J. P. Hennessy",
  title =        "{VM} data spaces and {ESA\slash XC} facilities",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "1",
  pages =        "14--33",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:47:47 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Release 1.1 of the Virtual Machine/Enterprise Systems
                 Architecture (VM/ESA) operating system introduces a new
                 function called VM Data Spaces, provided through a new
                 virtual-machine architecture called Enterprise Systems
                 Architecture/Extended Configuration (ESA/XC). ESA/XC is
                 the strategic VM/ESA virtual-machine environment for
                 Conversational Monitor System (CMS) users and services
                 virtual machines requiring large amounts of storage or
                 advanced data-sharing capabilities. ESA/XC includes all
                 of the facilities of System/370 Extended Architecture
                 (370-XA) that are used by CMS or server programs and is
                 therefore upward compatible for CMS or server programs
                 currently running in 370-XA virtual machines. As an
                 introduction to the VM Data Spaces function, the paper
                 describes the ESA/XC virtual-machine architecture and
                 presents an overview of the VM/ESA services provided in
                 support of the ESA/XC architecture.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Endicott, NY, USA",
  classification = "C6150J (Operating systems)",
  keywords =     "Conversational Monitor System; Enterprise Systems
                 Architecture/Extended Configuration; ESA/XC; Operating
                 system; System/370 Extended Architecture; Virtual
                 Machine/Enterprise Systems Architecture;
                 Virtual-machine architecture; Virtual-machine
                 environment; VM data spaces; VM/ESA",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Operating systems [computers]; Virtual
                 machines",
}

@Article{Osisek:1991:EIA,
  author =       "D. L. Osisek and K. M. Jackson and P. H. Gum",
  title =        "{ESA}\slash 390 interpretive-execution architecture,
                 foundation for {VM\slash ESA}",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "1",
  pages =        "34--51",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:47:47 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The interpretive-execution facility of Enterprise
                 Systems Architecture/390 (ESA/390) provides an
                 instruction for the execution of virtual machines. This
                 instruction, called Start interpretive execution (SIE),
                 was initially created, for virtualizing either
                 System/370 or 370-XA architectures, and was used later
                 for virtualizing ESA/370 and ESA/390 architectures. SIE
                 has evolved to provide capabilities for a number of
                 specialized performance environments. Most recently it
                 provides for the unique requirements of Enterprise
                 Systems Architecture/Extended Configuration (ESA/XC)
                 virtual-machine architecture. This comprehensive set of
                 capabilities in the architecture serves as the platform
                 for the ability of VM/ESA to provide functions in
                 virtual machines for end users and system servers. The
                 paper describes the evolution of SIE and outlines use
                 of the various capabilities in VM/ESA.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Endicott, NY, USA",
  classification = "C6150J (Operating systems)",
  keywords =     "Enterprise Systems Architecture/390; Enterprise
                 Systems Architecture/Extended Configuration; ESA/390
                 interpretive-execution architecture; SIE; Start
                 interpretive execution; Virtual-machine architecture;
                 VM/ESA",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Operating systems [computers]; Virtual
                 machines",
}

@Article{Stone:1991:VCS,
  author =       "R. L. Stone and T. S. Nettleship and J. Curtiss",
  title =        "{VM\slash ESA CMS Shared File System}",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "1",
  pages =        "52--71",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:47:47 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Discussed is work toward satisfying requirements on
                 the Conversational Monitor System (CMS) in the areas of
                 data sharing and physical DASD space sharing. This work
                 advances the present CMS file system design. Described
                 is the CMS Shared File System (SFS), which was designed
                 to satisfy the data sharing and physical DASD space
                 sharing requirements by providing a pool of DASD space
                 that is shared among multiple users. DASD space
                 assigned to the pool is easily extended, and read/write
                 sharing of individual files is allowed. Also discussed
                 is SFS security, usage of Virtual Machine/Enterprise
                 Systems Architecture (VM/ESA) data spaces for single
                 system performance, and coordinated resource recovery
                 to provide file data integrity in the distributed
                 environment.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Endicott, NY, USA",
  classification = "C6120 (File organisation); C6150J (Operating
                 systems)",
  keywords =     "Conversational Monitor System; Data sharing; Data
                 spaces; File data integrity; Multiple users; Physical
                 DASD space sharing; Resource recovery; SFS security;
                 Virtual Machine/Enterprise Systems Architecture; VM/ESA
                 CMS Shared File System",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "File organisation; IBM computers; Operating systems
                 [computers]; Virtual machines",
}

@Article{Maslak:1991:CRR,
  author =       "B. A. Maslak and J. M. Showalter and T. J.
                 Szczygielski",
  title =        "{Coordinated Resource Recovery} in {VM\slash ESA}",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "1",
  pages =        "72--89",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A system service for coordinated recovery of resources
                 is a critical function needed for distributed
                 processing environments because applications need to
                 provide for data integrity while the location of the
                 data and processes are transparent to the application.
                 VM is the first IBM operating system to provide
                 Coordinated Resource Recovery as a system service
                 rather than as a service provided by unique
                 environments running on the operating system, and the
                 VM Common Programming Interface-Communications and
                 Shared File System are the first subsystems to utilize
                 the service. The paper is an overview of why and how VM
                 provided Coordinated Resource Recovery (CRR). CRR is
                 the implementation of the Systems Application
                 Architecture (SAA) resource recovery interface within
                 Virtual Machine/Enterprise Systems Architecture
                 (VM/ESA). This coordinated sync point system service
                 allows one or more applications or subsystems to update
                 multiple resources and to request that all updates be
                 committed or backed out together.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Endicott, NY, USA",
  classification = "C6150J (Operating systems)",
  keywords =     "Coordinated Resource Recovery; Data integrity;
                 Distributed processing environments; IBM operating
                 system; Resource recovery interface; Shared File
                 System; Sync point system service; System service;
                 Systems Application Architecture; Virtual
                 Machine/Enterprise Systems Architecture; VM Common
                 Programming Interface-Communications",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Operating systems [computers]; Virtual
                 machines",
}

@Article{Bennett:1991:SMC,
  author =       "R. B. Bennett and W. J. Bitner and M. A. Musa and M.
                 K. Ainsworth",
  title =        "Systems management for {Coordinated Resource
                 Recovery}",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "1",
  pages =        "90--106",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Coordinated Resource Recovery is a Virtual
                 Machine/Enterprise Systems Architecture (VM/ESA)
                 function for providing consistency of changes to
                 multiple resources in environments that include
                 distributed applications. It provides a uniform
                 solution for applications to the problem of resource
                 consistency. Systems management of Coordinated Resource
                 Recovery in VM/ESA (CRR) is the set of system services
                 and interfaces that support both automatic and manual
                 procedures for managing CRR installation, performance,
                 and recovery, as well as resource manager and
                 application participation. Much of systems management
                 is focused on application recovery from occasional
                 failures of the procedures for coordinating consistent
                 resource changes. The paper describes several key
                 aspects of CRR systems management, including the CRR
                 recovery log, facilities for minimizing manual
                 intervention when failures occur, performance
                 considerations, and application participation in
                 recovery.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Endicott, NY, USA",
  classification = "C6150J (Operating systems)",
  keywords =     "Application recovery; Coordinated Resource Recovery;
                 CRR recovery log; CRR systems management; Interfaces;
                 Multiple resources; Resource consistency; System
                 services; Virtual Machine/Enterprise Systems
                 Architecture; VM/ESA",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Operating systems [computers]; Virtual
                 machines",
}

@Article{Barnes:1991:VES,
  author =       "C. C. Barnes and A. Coleman and J. M. Showalter and M.
                 L. Walker",
  title =        "{VM\slash ESA} support for coordinated recovery of
                 files",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "1",
  pages =        "107--125",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:47:47 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The paper discusses the concepts and facilities of the
                 Shared File System (SFS) support for Virtual
                 Machine/Enterprise Systems Architecture (VM/ESA)
                 Coordinated Resource Recovery (CRR). It includes
                 background information on limitations that lead to SFS
                 support for coordination of file recovery functions.
                 The level of support provided by the Virtual
                 Machine/System Product (VM/SP) Release 6 SFS support is
                 identified and contrasted with the support provided in
                 VM/ESA. The paper contains an overview of the system
                 structure and the rationale for the support and is a
                 discussion from the overall perspective of the total
                 system environment and system processing for resource
                 recovery. After the concepts and structure of VM/ESA
                 SFS support are introduced, the paper discusses the
                 specific technology involved in providing SFS support
                 for Coordinated Resource Recovery.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Endicott, NY, USA",
  classification = "C6150J (Operating systems)",
  keywords =     "Coordinated Resource Recovery; File recovery
                 functions; Shared File System; Virtual
                 Machine/Enterprise Systems Architecture; Virtual
                 Machine/System Product",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Operating systems [computers]; Virtual
                 machines",
}

@Article{Hoffnagle:1991:Pb,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "2",
  pages =        "128--129",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Johnson:1991:CCA,
  author =       "D. B. Johnson and G. M. Dolan and M. J. Kelly and A.
                 V. Le and S. M. Matyas",
  title =        "{Common Cryptographic Architecture Cryptographic
                 Application Programming Interface}",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "2",
  pages =        "130--150",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Cryptography is considered by many users to be a
                 complicated subject. An architecture for a
                 cryptographic application programming interface
                 simplifies customer use of cryptographic services by
                 helping to ensure compliance with national and
                 international standards and by providing intuitive
                 high-level services that may be implemented on a broad
                 range of operating systems and underlying hardware.
                 This paper gives an overview of the design rationale of
                 the recently announced common cryptographic
                 architecture cryptographic application programming
                 interface and gives typical application scenarios
                 showing methods of using the services described in the
                 architecture to meet security requirements.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Federal Sector Div., Manassas, VA, USA",
  classification = "C6130 (Data handling techniques); C6180 (User
                 interfaces)",
  keywords =     "Cryptographic architecture cryptographic application
                 programming interface; Design rationale; Intuitive
                 high-level services; Operating systems; Overview;
                 Security requirements; Standards",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Cryptography; User interfaces",
}

@Article{Matyas:1991:KHC,
  author =       "S. M. Matyas",
  title =        "Key handling with control vectors",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "2",
  pages =        "151--174",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A method is presented for controlling cryptographic
                 key usage based on control vectors. Each cryptographic
                 key has an associated control vector that defines the
                 permitted uses of the key within the cryptographic
                 system. At key generation, the control vector is
                 cryptographically coupled to the key via a special
                 encryption process. Each encrypted key and control
                 vector is stored and distributed within the
                 cryptographic system as a single token. Decryption of a
                 key requires respecification of the control vector. As
                 part of the decryption process, the cryptographic
                 hardware also verifies that the requested use of the
                 key is authorized by the control vector. This paper
                 focuses mainly on the use of control vectors in
                 cryptosystems based on the data encryption algorithm.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Federal Sector Div., Manassas, VA, USA",
  classification = "C6130 (Data handling techniques)",
  keywords =     "Associated control vector; Control vectors;
                 Cryptographic key usage; Cryptographic system;
                 Decryption; Encryption process",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Cryptography",
}

@Article{Matyas:1991:KSB,
  author =       "S. M. Matyas and A. V. Le and D. G. Abraham",
  title =        "A key-management scheme based on control vectors",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "2",
  pages =        "175--191",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper presents a cryptographic key-management
                 scheme based on control vectors. This is a new concept
                 that permits cryptographic keys belonging to a
                 cryptographic system to be easily, securely, and
                 efficiently controlled. The new key-management
                 scheme-built on the cryptographic architecture and key
                 management implemented in a prior set of IBM
                 cryptographic products-has been implemented in the
                 newly announced IBM Transaction Security System.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Federal Sector Div., Manassas, VA, USA",
  classification = "C6130 (Data handling techniques)",
  keywords =     "Control vectors; IBM cryptographic products; IBM
                 Transaction Security System; Key-management scheme",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Cryptography; Standards",
}

@Article{Yeh:1991:EIC,
  author =       "P. C. Yeh and R. M. {Smith, Sr.}",
  title =        "{ESA}\slash 390 integrated cryptographic facility:
                 {An} overview",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "2",
  pages =        "192--205",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:47:47 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "This paper reviews the objectives of the Enterprise
                 Systems Architecture/390 (ESA/390) integrated
                 cryptographic facility. It presents the cryptographic
                 key-management scheme, summarizes key elements and
                 unique characteristics of the facility, and describes
                 the physical security provided by the first ESA/390
                 implementation.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Data Syst. Div., Poughkeepsie, NY, USA",
  classification = "C6130 (Data handling techniques)",
  keywords =     "Enterprise Systems Architecture/390; ESA/390; ESA/390
                 integrated cryptographic facility; Key-management
                 scheme; Overview; Physical security",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Cryptography",
}

@Article{Abraham:1991:TSS,
  author =       "D. G. Abraham and G. M. Dolan and G. P. Double and J.
                 V. Stevens",
  title =        "{Transaction Security System}",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "2",
  pages =        "206--229",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See erratum \cite{Anonymous:1991:ESS}.",
  abstract =     "Components of previous security systems were designed
                 independently from one another and were often difficult
                 to integrate. Described is the recently available IBM
                 transaction security system. It implements the common
                 cryptographic architecture and offers a comprehensive
                 set of security products that allow users to implement
                 end-to-end secure systems with IBM components. The
                 system includes a mainframe host-attached network
                 security processor, high-performance encryption
                 adapters for the IBM personal computer and Personal
                 System/2. Micro Channel, an RS-232 attached security
                 interface unit, and a credit-card size state-of-the-art
                 personal security card containing a high-performance
                 microprocessor. The application programming interface
                 provides common programming in the host and the
                 workstation and supports all of the systems application
                 architecture languages except REXX and RPG.
                 Applications may be written to run on multiple virtual
                 storage (MVS) and PC DOS operating systems.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Services Sector Div., Charlotte, NC, USA",
  classification = "C6130 (Data handling techniques)",
  keywords =     "Application programming interface; Common
                 cryptographic architecture; Encryption adapters;
                 End-to-end secure systems; IBM transaction security
                 system; Multiple virtual storage; PC DOS operating
                 systems; REXX; RPG; RS-232 attached security interface
                 unit; Security products; Systems application
                 architecture languages; Transaction security system",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Security of data; Transaction processing",
}

@Article{Johnson:1991:TSS,
  author =       "D. B. Johnson and G. M. Dolan",
  title =        "{Transaction Security System} extensions to the
                 {Common Cryptographic Architecture}",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "2",
  pages =        "230--243",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A well-designed application program interface for a
                 line of cryptographic products simplifies customer use
                 of cryptographic services by helping to ensure
                 compliance with national and international standards
                 and by providing intuitive high-level services that may
                 be implemented on disparate systems. The common
                 cryptographic architecture is IBM's strategic
                 cryptographic architecture. The transaction security
                 system implements the common cryptographic architecture
                 in full. Furthermore, the transaction security system
                 has implemented extensions to the architecture to
                 address additional customer requirements. This paper
                 gives the design rationale for some of the additional
                 cryptographic functionality in the transaction security
                 system beyond that mandated by the common cryptographic
                 architecture.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Federal Sector Div., Manassas, VA, USA",
  classification = "C6130 (Data handling techniques)",
  keywords =     "Application program interface; Common cryptographic
                 architecture; Standards; Transaction security system",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Cryptography; Transaction processing",
}

@Article{Anonymous:1991:Ba,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "2",
  pages =        "244--245",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1991:Pc,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "3",
  pages =        "248--249",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Baade:1991:SRG,
  author =       "S. C. Baade",
  title =        "{SNA} route generation using traffic patterns",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "3",
  pages =        "250--258",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Describes a procedure used by the IBM Information
                 Network to generate optimum routes for a complex
                 Systems Network Architecture (SNA) network by utilizing
                 communication traffic patterns. The Route Table
                 Generator and an understanding of customer locations
                 and available facilities had been the basis for route
                 generation. However, this approach became overwhelming
                 as the network grew. The lack of flexibility required
                 an increasing need to manually override generated
                 routes. The resulting approach could not ensure that
                 network delay had been minimized. The Network Design
                 and Analysis (NETDA) tool was used as a solution. NETDA
                 orders routes based on static indicators such as number
                 of hops, route distance, and speed of the path
                 components. However, NETDA also selects optimal routes
                 based on network traffic patterns. Traffic data were
                 easily incorporated into NETDA, and the IBM Information
                 Network has optimized its SNA routing using NETDA and
                 actual traffic data. The process was challenging
                 because of the number of network components involved
                 and the difficulty in obtaining portions of the traffic
                 data. The use of NETDA for route generation is
                 discussed, and the data collection methodology is
                 described. Network component utilization and network
                 delay changes are reviewed as a means of showing the
                 benefits of such optimizations.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Inf. Network, Tampa, FL, USA",
  classification = "B6210L (Computer communications); C5620 (Computer
                 networks and techniques)",
  keywords =     "Available facilities; Communication traffic patterns;
                 Customer locations; Data collection methodology; IBM
                 Information Network; Manual overriding; NETDA; Network
                 component utilization; Network delay; Network Design
                 and Analysis; Optimal routes; Optimizations; Route
                 ordering; Route Table Generator; SNA route generation;
                 Static indicators; Systems Network Architecture",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer networks; Delays; Optimisation;
                 Telecommunication traffic",
}

@Article{Goldberg:1991:BPC,
  author =       "S. H. Goldberg and J. A. {Mouton, Jr.}",
  title =        "A base for portable communications software",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "3",
  pages =        "259--279",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:47:47 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The emerging international standards for
                 interconnecting computers will be important in IBM's
                 future plans. The Open Systems Interconnection (OSI)
                 protocols are already part of IBM's Systems Application
                 Architecture (SAA), implying that they will be
                 implemented across the dissimilar SAA operating
                 systems. Building these complex OSI protocols is
                 costly, and additional expense is involved in verifying
                 conformance and interoperation with other systems.
                 `Porting' a common implementation of these protocols to
                 all SAA systems offers major cost savings, but the
                 differences between systems and the need for
                 high-performance, robust implementations poses
                 problems. The OSI/Communications Subsystem Base solves
                 many of these problems in a general way that may apply
                 to other layered protocols and other systems. The Base
                 provides all necessary operating system services to
                 support the layered communications protocol machines of
                 OSI and allows access to the I/O services of the native
                 operating system as required. This paper discusses the
                 sophisticated communications-oriented environment
                 provided by the OSI-Communications Subsystem Base,
                 which includes multiple threads, back-pressure flow
                 control, resource monitoring, layer modularity, and
                 steps to minimize process switches and data copying.
                 The paper is addressed primarily to systems engineers
                 and communications architects interested in OSI and
                 portability in general.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Commun. Syst., Palo Alto, CA, USA",
  classification = "B6210L (Computer communications); C6110B (Software
                 engineering techniques); C6150J (Operating systems);
                 C6155 (Computer communications software)",
  keywords =     "Back-pressure flow control; Conformance; Cost savings;
                 Data copying; I/O services; IBM; International
                 standards; Interoperation; Layer modularity; Layered
                 communications protocol machines; Multiple threads;
                 Open Systems Interconnection; OSI protocols;
                 OSI/Communications Subsystem Base; Portable
                 communications software; Process switches; Resource
                 monitoring; Robust implementations; SAA operating
                 systems; Systems Application Architecture",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer communications software; Network operating
                 systems; Open systems; Protocols; Software
                 portability",
}

@Article{Reisman:1991:PMS,
  author =       "S. Reisman and W. A. Carr",
  title =        "Perspectives on multimedia systems in education",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "3",
  pages =        "280--295",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Although multimedia or interactive video seemed
                 revolutionary in the early and mid-1980s, its
                 application to individualized instruction followed
                 clearly defined evolutionary paths. Forms of
                 individualized instruction leading up to multimedia
                 instruction are described, and a review of the
                 integration of individualized instruction into a
                 standard education curriculum is included. Discussed is
                 a jointly-defined effort between IBM and the California
                 State University that demonstrated: (1) the benefits of
                 a parallel course-development and course-implementation
                 approach, (2) the superiority of multimedia over
                 traditional instruction in the subject area tested, and
                 (3) very low-cost development of quality multimedia
                 courses. A projection by IBM for its own internal
                 education program indicates that by the year 2000 not
                 only will individualized instruction become fully
                 integrated into IBM's education curriculum, but it will
                 become the dominant approach, encompassing within it
                 many aspects of traditional instruction. The continuing
                 integration of individualized instruction with other
                 technologies and advances in digital full-motion
                 capabilities can help make multimedia instruction not
                 only independent of time and place, but more engrossing
                 and enjoyable as well.",
  acknowledgement = ack-nhfb,
  affiliation =  "Dept. of Manage. Sci., California State Univ.,
                 Fullerton, CA, USA",
  classification = "B0120 (Education and training); B6430H (Video
                 recording); C0200 (General computer topics); C7810C
                 (Computer-aided instruction)",
  keywords =     "Course-development; Course-implementation; Curriculum;
                 Digital full-motion capabilities; Education; IBM;
                 Individualized instruction; Interactive video;
                 Multimedia systems",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer aided instruction; DP industry; Educational
                 courses; Interactive video; Multimedia systems",
}

@Article{Sahulka:1991:FCI,
  author =       "R. J. Sahulka and E. C. Plachy and L. J. Scarborough
                 and R. G. Scarborough and S. W. White",
  title =        "{FORTRAN} for clusters of {IBM ES\slash 3090}
                 multiprocessors",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "3",
  pages =        "296--311",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "IBM Clustered FORTRAN is a combination of software and
                 hardware that allows two IBM Enterprise System/3090
                 multiprocessors to be physically connected as a cluster
                 and allows FORTRAN jobs to execute in parallel across
                 all of the processors of the cluster. The FORTRAN
                 compiler and library provided as part of the Clustered
                 FORTRAN are used for writing and executing the parallel
                 programs in this hybrid environment of distributed and
                 shared-memory systems. The compiler provides language
                 extensions for explicit programming in parallel, as
                 well as the ability to automatically generate both
                 parallel and vector code. The Clustered FORTRAN
                 language allows users to write parallel applications
                 that are independent of the machine configuration and
                 operating system. This paper describes the execution
                 environment, compiler and library, gives some
                 variations of programming matrix multiplication, and
                 shows that a performance of one GigaFLOPS can be
                 achieved using Clustered FORTRAN.",
  acknowledgement = ack-nhfb,
  classification = "C5440 (Multiprocessor systems and techniques);
                 C6140D (High level languages); C6150C (Compilers,
                 interpreters and other processors)",
  keywords =     "1 GFLOPS; Configuration independent applications;
                 Distributed systems; Enterprise System/3090; Execution
                 environment; FORTRAN compiler; FORTRAN library; Hybrid
                 environment; IBM Clustered FORTRAN; IBM ES/3090
                 multiprocessors; Language extensions; Matrix
                 multiplication; Parallel programs; Shared-memory
                 systems; Vector code",
  language =     "English",
  numericalindex = "Computer speed 1.0E+09 FLOPS",
  pubcountry =   "USA",
  thesaurus =    "Distributed processing; FORTRAN; IBM computers;
                 Mathematics computing; Matrix algebra; Multiprocessing
                 systems; Parallel languages; Parallel machines; Program
                 compilers; Subroutines",
}

@Article{Pinter:1991:PCR,
  author =       "R. Y. Pinter and P. Vortman and Z. Weiss",
  title =        "Partial compilation of {REXX}",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "3",
  pages =        "312--321",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A comprehensive set of compilation techniques for
                 coping with various dynamic features of the REXX
                 programming language are described. Among them are a
                 novel symbol table structure, a multiple representation
                 method for type-free objects, and a number of run-time
                 acceleration techniques. Most of the work can be
                 unified under the general principle of delayed
                 execution, which is applicable in other situations as
                 well. Significant performance gains were observed in an
                 experimental setting, and these results led to the
                 decision to develop IBM's recently announced REXX
                 compiler product.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Sci. and Technol., Technion City, Haifa, Israel",
  classification = "C6150C (Compilers, interpreters and other
                 processors)",
  keywords =     "Delayed execution; Dynamic features; IBM; Multiple
                 representation method; Partial compilation; Performance
                 gains; REXX compiler product; REXX programming
                 language; Run-time acceleration techniques; Symbol
                 table structure; Type-free objects",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Delays; High level languages; Performance evaluation;
                 Program compilers",
}

@Article{Feriozi:1991:CPM,
  author =       "D. T. Feriozi",
  title =        "A {C} programming model for {OS/2} device drivers",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "3",
  pages =        "322--335",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:47:47 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5438.",
  abstract =     "The recent growth in the number of new and different
                 types of devices for use with personal computers has
                 challenged software engineers to plan new and better
                 ways of developing software to run the devices. For
                 Operating System/2 device drivers, an improvement would
                 be to code in a high-level language rather than to use
                 assembly language. A practical and proven method of
                 writing OS/2 device drivers in the C programming
                 language is presented. The C language was chosen
                 because of its documented suitability as a systems
                 programming language and because of its universal
                 availability for use on small systems.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Entry Syst. Div., Boca Raton, FL, USA",
  classification = "C6110 (Systems analysis and programming); C6150J
                 (Operating systems)",
  keywords =     "Availability; C programming model; Operating System/2;
                 OS/2 device drivers; Personal computers; Systems
                 programming",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "C language; Microcomputer applications; Operating
                 systems [computers]; Programming",
}

@Article{Lenz:1991:KSM,
  author =       "N. G. Lenz and S. F. L. Saelens",
  title =        "A knowledge-based system for {MVS} dump analysis",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "3",
  pages =        "336--350",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A new domain in software problem determination can be
                 automated by means of this knowledge-based system. The
                 system imitates a human problem solver by using the
                 same tools and the same diagnostic approach as the
                 experts use, including the processing of human-readable
                 data. The application is fully integrated within the
                 target Multiple Virtual Storage (MVS) operating system
                 to ensure user acceptance. A large variety of knowledge
                 is contained in the system, ranging from
                 pattern-recognition knowledge to basic MVS knowledge
                 and problem-solving strategies. The diagnostic approach
                 is based on a model of software problem situations and
                 on diagnostic reasoning methods adopted from the
                 medical application domain. The goal of the project was
                 to solve a significant part of the problem resolution
                 process automatically, rather than to build yet another
                 tool for use in software problem determination. This
                 system is a first step to further automation in this
                 area.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Germany, Boeblingen, Germany",
  classification = "C6150G (Diagnostic, testing, debugging and
                 evaluating systems); C6150J (Operating systems); C6170
                 (Expert systems)",
  keywords =     "Diagnostic reasoning methods; Human-readable data;
                 Knowledge-based system; Multiple Virtual Storage; MVS
                 dump analysis; Operating system; Pattern-recognition
                 knowledge; Problem-solving strategies; Software problem
                 determination; User acceptance",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Knowledge based systems; Operating systems
                 [computers]; Problem solving; Program diagnostics;
                 Virtual storage",
}

@Article{Kan:1991:MSD,
  author =       "S. H. Kan",
  title =        "Modeling and software development quality",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "3",
  pages =        "351--362",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Summarizes the models used by a large software
                 development organization for estimating software
                 reliability and managing software development quality.
                 The role of modeling in software quality improvement is
                 illustrated. Implementation of the models, reliability
                 of the estimates, predictive validity, and the nature
                 of data are discussed.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Application Bus. Syst., Rochester, MN, USA",
  classification = "C6110B (Software engineering techniques)",
  keywords =     "Modeling; Predictive validity; Software development
                 quality; Software quality improvement; Software
                 reliability",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Modelling; Quality control; Software reliability",
}

@Article{Brown:1991:IHP,
  author =       "P. Brown",
  title =        "Integrated hypertext and program understanding tools",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "3",
  pages =        "363--392",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Describes some concepts and issues related to software
                 tools integration. Questions regarding data integration
                 and functional integration between tools are identified
                 and discussed. Some techniques for handling large
                 volumes of data are briefly described. A prototype tool
                 is described in which hypertext links are automatically
                 created between program analysis data and hypertex
                 documentation. With this tool, end users can freely
                 move between source code views and related
                 documentation. A common annotation feature lets
                 software developers and information developers share
                 information and synchronize maintenance activities in a
                 single tools environment.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Enterprise Syst. Div., Suffern, NY, USA",
  classification = "C6115 (Programming support); C6130D (Document
                 processing techniques); C6160Z (Other DBMS)",
  keywords =     "Annotation; Data handling techniques; Data
                 integration; Documentation; Functional integration;
                 Hypertext; Information development; Information
                 sharing; Program analysis data; Program understanding
                 tools; Software development; Software maintenance
                 activities synchronization; Software tools integration;
                 Source code views",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Hypermedia; Software tools; System documentation",
}

@Article{Appel:1991:TNW,
  author =       "A. Appel and G. A. Cuomo and E. A. Overly and J. A.
                 Walicki and R. E. Yozzo",
  title =        "Technical note: The {WATINFO} face server and
                 associated utilities",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "3",
  pages =        "393--407",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:47:47 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "WATINFO is a TCP/IP server that operates at the IBM
                 Thomas J. Watson Research Center, to provide VM-based
                 information about services and personnel at the IBM
                 Yorktown Research site. Client programs have been
                 written for Operating System/2 (OS/2) and Advanced
                 Interactive Executive (AIX). An advanced feature of
                 WATINFO is the display of images, when appropriate, in
                 combination with other data. The images are supported
                 by a face server, which fetches image data from a
                 library of face images. The format of the face images
                 is small-256 by 256 by one bit-and is transmitted
                 rapidly to a variety of displays. The face library can
                 be used for other purposes: inclusion of images in
                 documents, the preparation of image labels, and the
                 construction of an image telephone book.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Res. Div., Thomas J. Watson Res. Center, Yorktown
                 Heights, NY, USA",
  classification = "C5260B (Computer vision and picture processing);
                 C5620L (Local area networks); C6160Z (Other DBMS)",
  keywords =     "256 Pixel; 64 Kpixel; Advanced Interactive Executive;
                 AIX; Client programs; Documents; Face images; IBM;
                 Image labels; Image telephone book; OS/2; Personnel;
                 Services information; TCP/IP server; Utilities;
                 VM-based information; WATINFO face server",
  language =     "English",
  numericalindex = "Picture size 2.56E+02 pixel; Picture size 6.6E+04
                 pixel",
  pubcountry =   "USA",
  thesaurus =    "Computerised picture processing; Database management
                 systems; DP industry; File servers; Personnel; Utility
                 programs",
}

@Article{Anonymous:1991:Bb,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "3",
  pages =        "408--412",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1991:Pd,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "4",
  pages =        "414--415",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Falkoff:1991:IFA,
  author =       "A. D. Falkoff",
  title =        "The {IBM} family of {APL} systems",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "4",
  pages =        "416--432",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The developmental history of IBM subfamilies of APL
                 systems is traced, focusing on the inter-relationships
                 among them and the methods of implementation used by
                 the various groups involved. The language itself, and
                 the way its evolution was managed, are also considered
                 as factors influencing the development process. A chart
                 is included that illustrates the evolution of mainframe
                 and small machine programming products supporting APL,
                 beginning in 1964 up to the present time.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Res. Div., Thomas J. Watson Res. Center, Yorktown
                 Heights, NY, USA",
  classification = "C5400 (Analogue and digital computers and systems);
                 C6110 (Systems analysis and programming); C6140D (High
                 level languages)",
  keywords =     "APL systems; Development process; Developmental
                 history; IBM subfamilies; Inter-relationships;
                 Language; Mainframe; Small machine programming
                 products",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "APL; History; IBM computers; Programming",
}

@Article{Brown:1991:AGS,
  author =       "J. A. Brown and H. P. Crowder",
  title =        "{APL2}: Getting started",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "4",
  pages =        "433--445",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "APL is a concise and economical notation for
                 expressing computational algorithms and procedures. The
                 authors introduce the main ideas of APL2, an IBM
                 implementation of APL, and illustrate the programming
                 style with some graphical examples. More specifically,
                 they introduce the key APL2 concepts of arrays,
                 functions, and operators and how they relate and
                 interact in a unique problem-solving environment.
                 Several examples are provided that show how solutions
                 to some interesting problems can be expressed precisely
                 and concisely.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Santa Teresa Lab., San Jose, CA, USA",
  classification = "C6110 (Systems analysis and programming); C6120
                 (File organisation); C6130B (Graphics techniques);
                 C6140D (High level languages)",
  keywords =     "APL; APL2; Arrays; Computational algorithms;
                 Economical notation; Functions; Graphical examples; IBM
                 implementation; Operators; Problem-solving environment;
                 Programming style",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "APL; Computer graphics; Data structures; IBM
                 computers; Programming",
}

@Article{Wheatley:1991:EDA,
  author =       "M. T. Wheatley",
  title =        "Extending the domain of {APL}",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "4",
  pages =        "446--455",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Connectivity mechanisms between APL and other
                 languages and applications available on a modern
                 computer system are explored. The design,
                 implementation, and application of APL facilities such
                 as shared variables, auxiliary processors, external
                 names, file subsystems and namespaces, as they are
                 implemented in IBM's APL2 product, are discussed and
                 compared.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Santa Teresa Lab., San Jose, CA, USA",
  classification = "C6110B (Software engineering techniques); C6140D
                 (High level languages)",
  keywords =     "APL; APL2 product; Auxiliary processors; Connectivity
                 mechanisms; External names; File subsystems; Modern
                 computer system; Namespaces; Shared variables",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "APL; IBM computers; Software portability",
}

@Article{Trimble:1991:SMI,
  author =       "R. Trimble",
  title =        "Storage management in {IBM APL} systems",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "4",
  pages =        "456--468",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "APL systems have traditionally used specialized
                 storage management schemes that avoid storage
                 fragmentation by `garbage collection,' moving live data
                 as needed to collect unused storage into a single area.
                 This was very effective on systems with a small amount
                 of real storage addressed directly. It has become less
                 effective on today's systems with virtual addressing
                 and large amounts of virtual storage. Both traditional
                 schemes of storage management and a recently
                 implemented replacement for them are described. The
                 focus is on implementations for IBM mainframe
                 hardware.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Santa Teresa Lab., San Jose, CA, USA",
  classification = "C5420 (Mainframes and minicomputers); C6110 (Systems
                 analysis and programming); C6120 (File organisation);
                 C6140D (High level languages)",
  keywords =     "Garbage collection; IBM mainframe hardware; Live data;
                 Specialized storage management schemes; Traditional
                 schemes; Unused storage; Virtual addressing; Virtual
                 storage",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "APL; IBM computers; Mainframes; Programming; Storage
                 management; Virtual storage",
}

@Article{Jensen:1991:PNF,
  author =       "J. R. Jensen and K. A. Beaty",
  title =        "Putting a new face on {APL2}",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "4",
  pages =        "469--489",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "APL2/X is an interface between APL2 and the X Window
                 System, but at the IBM Cambridge Scientific Center.
                 This interface enables the full set of the X Window
                 System Xlib calls and the related data structures to be
                 used directly from programs written in APL2, thereby
                 providing APL2 with a true, full-function windowing
                 environment. The interface also deals with the broader
                 and more general issue of how to call C programs from
                 APL2. The interface and the experience of building it
                 are described in some detail.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Cambridge Sci. Center, MA, USA",
  classification = "C6130B (Graphics techniques); C6140D (High level
                 languages); C6155 (Computer communications software);
                 C6180G (Graphical user interfaces)",
  keywords =     "APL2; APL2/X; C programs; Data structures;
                 Full-function windowing environment; Interface; X
                 Window System; Xlib calls",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "APL; C language; Computer interfaces; Graphical user
                 interfaces",
}

@Article{Alfonseca:1991:AIG,
  author =       "M. Alfonseca and D. Selby and R. Wilks",
  title =        "The {APL IL Interpreter Generator}",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "4",
  pages =        "490--497",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The objective of the APL IL Interpreter Generator is
                 to solve the problem of creating APL interpreters for
                 different machines at a minimum cost. The objective has
                 been accomplished by writing an APL interpreter in a
                 specially designed programming language (IL) that has
                 very low semantics but high-level syntax. The
                 interpreter is translated to each target machine
                 language by easily built compilers that produce
                 high-performance code. The authors describe IL, the APL
                 interpreters written in IL, and the final systems
                 generated for seven different target machines and
                 operating systems. Some of these systems have been
                 generated in an extremely short time.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Software Technol. Lab., Madrid, Spain",
  classification = "C6140D (High level languages); C6150C (Compilers,
                 interpreters and other processors)",
  keywords =     "APL IL Interpreter Generator; Compilers; High-level
                 syntax; High-performance code; Low semantics; Specially
                 designed programming language; Target machine
                 language",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "APL; Program compilers; Program interpreters",
}

@Article{Willhoft:1991:PEA,
  author =       "R. G. Willhoft",
  title =        "Parallel expression in the {APL2} language",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "4",
  pages =        "498--512",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A report is given on an investigation of parallel
                 expression and execution in the APL2 language. The
                 study covers a historical, theoretical, and empirical
                 viewpoint. The parallel nature of APL is traced from
                 its foundations in the Iverson notation to problems in
                 executing APL on parallel hardware. The author
                 discusses features of the APL language and its current
                 implementations that limit taking advantage of parallel
                 expressions. A survey of related topics from the work
                 on APL compilers is also included. Each APL2 language
                 construct is examined for potential parallel
                 expression. The operations are grouped based on the
                 possible parallelism exhibited by each operation, and
                 the possible implementation of each group is discussed.
                 Three APL2 applications are explored to determine the
                 actual parallelism expressed in `real' APL2 code. These
                 applications are chosen from distinct areas: graphics,
                 database systems, and user interactive systems. The
                 actual data passed as arguments to every operation are
                 dynamically examined, and the information is collected
                 for analysis. The data are summarized and results of
                 the study are discussed.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Inf. Syst. Div., Endicott, NY, USA",
  classification = "C6110P (Parallel programming); C6140D (High level
                 languages); C6150C (Compilers, interpreters and other
                 processors)",
  keywords =     "APL compilers; APL2 applications; APL2 code; APL2
                 language; APL2 language construct; Database systems;
                 Graphics; Iverson notation; Parallel expression;
                 Parallel hardware; User interactive systems",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "APL; Parallel algorithms; Parallel languages; Parallel
                 programming; Program compilers",
}

@Article{Jordan:1991:FSA,
  author =       "Stanley Jordan and Erik S. Friis",
  title =        "The foundations of suitability of {APL2} for music",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "4",
  pages =        "513--526",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "APL is commonly used in scientific and quantitative
                 applications, such as engineering and finance, but
                 there has been little acceptance so far in artistic and
                 symbolic applications, such as music. The author
                 demonstrates the suitability of APL2, a dialect of APL,
                 as a powerful tool for the building of music-oriented
                 software. The interactive interpreter, flexible
                 built-in primitive functions and operators, and the
                 independence from the details of the hardware are
                 attractive features for music programmers. With APL2, a
                 user can interactively create and transform complex
                 informational structures. Thus, it is not only a
                 formidable language for implementing music software,
                 but also a valuable notation for representing the music
                 itself.",
  acknowledgement = ack-nhfb,
  classification = "C6120 (File organisation); C6140D (High level
                 languages); C6150C (Compilers, interpreters and other
                 processors); C7820 (Humanities)",
  keywords =     "APL; APL2; Complex informational structures;
                 Engineering; Finance; Flexible built-in primitive
                 functions; Interactive interpreter; Music programmers;
                 Music-oriented software; Quantitative applications;
                 Symbolic applications",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "APL; Data structures; Music; Program interpreters;
                 Programming",
}

@Article{Aharon:1991:VIR,
  author =       "A. Aharon and A. Bar-David and B. Dorfman and E.
                 Gofman and M. Leibowitz and V. Schwartzburd",
  title =        "Verification of the {IBM RISC System\slash 6000} by a
                 dynamic biased pseudo-random test program generator",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "4",
  pages =        "527--538",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Verification of a computer that implements a new
                 architecture is especially difficult since no approved
                 functional test cases are available. The logic design
                 of the IBM RISC system/6000 was verified mainly by a
                 specially developed random test program generator
                 (RTPG), which was used from the early stages of the
                 design until its successful completion. APL was chosen
                 for the RISC System/6000 RTPG implementation after
                 considering the suitability of this programming
                 language for modeling computer architectures, the very
                 tight schedule, and the highly changeable environment
                 in which RTPG would operate.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Israel Sci. and Technol. Ltd., Haifa, Israel",
  classification = "C4240 (Programming and algorithm theory); C5470
                 (Performance evaluation and testing); C6140D (High
                 level languages); C6150G (Diagnostic, testing,
                 debugging and evaluating systems); C7430 (Computer
                 engineering)",
  keywords =     "Computer architectures; Functional test cases; IBM
                 RISC system/6000; Logic design; Programming language;
                 Pseudo-random test program generator; RTPG
                 implementation; Specially developed random test program
                 generator; Tight schedule",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "APL; IBM computers; Performance evaluation; Program
                 verification; Virtual machines",
}

@Article{Thomson:1991:ASL,
  author =       "N. D. Thomson",
  title =        "{APL2} as a specification language for statistics",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "4",
  pages =        "539--542",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "APL has had a dedicated following for many years among
                 some sections of the academic and industrial
                 statistical communities. One of its greatest strengths
                 is its value as a specification language. Not only can
                 algorithms be described consistently and unambiguously,
                 but also, given an appropriate interpreter, the
                 specifications can be immediately executed. A group of
                 academic and industrial statisticians in the United
                 Kingdom recognized these capabilities and embarked on a
                 project called ASL (APL Statistics Library) with the
                 support of the British APL Association. ASL aims to
                 provide a collection of coherent APL functions for
                 widely used statistical calculations, thereby creating
                 standards for the unambiguous expression of statistical
                 algorithms. A natural consequence of this is that
                 discussions of more complex algorithms and methods can
                 occur without the need to revisit and redefine basic
                 functions and the ways in which they interpret data.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM UK Labs., Winchester, UK",
  classification = "C6140D (High level languages); C7310 (Mathematics)",
  keywords =     "APL functions; APL Statistics Library; ASL; British
                 APL Association; Industrial statisticians;
                 Specification language; Standards; Statistical
                 algorithms; Statistical calculations; United Kingdom",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "APL; Specification languages; Statistical analysis;
                 Subroutines",
}

@Article{Alfonseca:1991:AAA,
  author =       "M. Alfonseca",
  title =        "Advanced applications of {APL}: logic programming,
                 neural networks, and hypertext",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "4",
  pages =        "543--553",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A review is given of the work of the author on the
                 application of the APL and APL2 programming languages
                 to logic programming, emulation of neural networks, and
                 the programming of hypertext applications.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Software Technol. Lab., Madrid, Spain",
  classification = "C5290 (Neural computing techniques); C6110L (Logic
                 programming); C6140D (High level languages); C6160Z
                 (Other DBMS); C6170 (Expert systems); C7430 (Computer
                 engineering)",
  keywords =     "APL2 programming languages; Hypertext applications;
                 Logic programming; Neural networks",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "APL; Hypermedia; Logic programming; Neural nets;
                 Virtual machines",
}

@Article{McIntyre:1991:LIT,
  author =       "D. B. McIntyre",
  title =        "Language as an intellectual tool: From hieroglyphics
                 to {APL}",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "4",
  pages =        "554--581",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "One learns elementary mathematics before understanding
                 the source of its symbols and procedures, which
                 therefore appear, incorrectly, to have been decreed
                 ready-made. Language and reason are intimately related,
                 and the embodiment of an idea in a symbol may be
                 essential to its comprehension. APL unifies algebra
                 into a single consistent notation; it allows one to
                 exploit the powerful concepts of functions and
                 operators; and it helps one to escape from the tyranny
                 of scalars by giving one the tools to think in terms of
                 arrays, or multiple quantity. APL has an intellectual
                 consistency that is a source of satisfaction and
                 pleasure. The author traces the history of symbols from
                 hieroglyphics to APL.",
  acknowledgement = ack-nhfb,
  affiliation =  "Luachmhor, Perth, UK",
  classification = "C0200 (General computer topics); C6140D (High level
                 languages)",
  keywords =     "Arrays; Consistent notation; Elementary mathematics;
                 Hieroglyphics; Intellectual consistency; Multiple
                 quantity",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "APL; History; Linguistics",
}

@Article{Iverson:1991:PVA,
  author =       "K. E. Iverson",
  title =        "A personal view of {APL}",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "4",
  pages =        "582--593",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A personal view is given of the development of several
                 influential dialects of APL: APL2 and J. The discussion
                 traces the evolution of the treatment of arrays,
                 functions, and operators, as well as function
                 definition, grammar, terminology, and spelling.",
  acknowledgement = ack-nhfb,
  classification = "C6110 (Systems analysis and programming); C6120
                 (File organisation); C6140D (High level languages)",
  keywords =     "APL; APL2; Arrays; Function definition; Functions;
                 Grammar; J; Operators; Spelling; Terminology",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "APL; Data structures; Programming",
}

@Article{Anonymous:1991:Bc,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "4",
  pages =        "594--596",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1991:CV,
  author =       "Anonymous",
  title =        "Contents of Volume 30, 1991",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "4",
  pages =        "597--597",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1991:ESS,
  author =       "Anonymous",
  title =        "Erratum: ``{Transaction Security System}''",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "4",
  pages =        "598--598",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "See \cite{Abraham:1991:TSS}.",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1992:Pa,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "1",
  pages =        "2--3",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Wilson:1992:IIO,
  author =       "D. G. Wilson and B. D. Rudin",
  title =        "Introduction to the {IBM Optimization Subroutine
                 Library}",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "1",
  pages =        "4--10",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:43:33 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Introduces the IBM Optimization Subroutine Library
                 (OSL). Developed as a result of a partnership between
                 several IBM research and development groups, OSL
                 provides a suite of tools for manipulating the models
                 and solving the resulting minimization and maximization
                 problems of mathematical optimization. The problems
                 that OSL addresses include: linear, quadratic,
                 mixed-integer, and pure network programming problems.
                 OSL includes solvers based on the classical simplex
                 method and on newer interior point methods. Because a
                 user-supplied driver program coordinates the problem
                 solution, and because of the `mix and match' philosophy
                 of OSL, a user may, within rather wide limits,
                 individually tailor a technique to solve a particular
                 problem. This paper concludes that OSL is something new
                 in optimization software.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Kingston, NY, USA",
  classification = "C1180 (Optimisation techniques); C4140 (Linear
                 algebra); C7310 (Mathematics)",
  keywords =     "Classical simplex method; Driver program; IBM
                 Optimization Subroutine Library; Interior point
                 methods; Linear programming; Mathematical optimization;
                 Maximization; Minimization; Mixed-integer programming;
                 Network programming problems; OSL; Quadratic
                 programming",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Linear algebra; Mathematical programming; Mathematics
                 computing; Minimisation; Subroutines",
}

@Article{Forrest:1992:ISM,
  author =       "J. J. H. Forrest and J. A. Tomlin",
  title =        "Implementing the simplex method for the {Optimization
                 Subroutine Library}",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "1",
  pages =        "11--25",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5457.",
  abstract =     "Describes the simplex algorithm and briefly discusses
                 the interaction of the detailed implementation of the
                 algorithm with changes in computer hardware. The
                 authors give one example of the design changes needed
                 to implement the method efficiently for the IBM 3090
                 vector architecture. For the later RISC System/6000
                 implementation, it was necessary to rethink this yet
                 again. Finally they discuss the issue of robustness and
                 the steps that were taken to give maximum reliability
                 in the simplex algorithm in the IBM Optimization
                 Subroutine Library.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Res. Div., Thomas J. Watson Res. Center, Yorktown
                 Heights, NY, USA",
  classification = "C1180 (Optimisation techniques); C4140 (Linear
                 algebra); C7310 (Mathematics)",
  keywords =     "Computer hardware; IBM 3090 vector architecture; IBM
                 Optimization Subroutine Library; Linear programming;
                 OSL; RISC System/6000; Simplex algorithm",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Linear algebra; Linear programming; Mathematics
                 computing; Parallel processing; Subroutines",
}

@Article{Forrest:1992:IIP,
  author =       "J. J. H. Forrest and J. A. Tomlin",
  title =        "Implementing interior point linear programming methods
                 in the {Optimization Subroutine Library}",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "1",
  pages =        "26--38",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5458.",
  abstract =     "Discusses the implementation of interior point
                 (barrier) methods for linear programming within the
                 framework of the IBM Optimization Subroutine Library.
                 This class of methods uses quite different
                 computational kernels than the traditional simplex
                 method. In particular, the matrices one must deal with
                 are symmetric and, although still sparse, are
                 considerably denser than those assumed in simplex
                 implementations. Severe rank deficiency must also be
                 accommodated, making it difficult to use off-the-shelf
                 library routines. These features have particular
                 implications for the exploitation of the newer IBM
                 machine architectural features. In particular, interior
                 methods can benefit greatly from use of vector
                 architectures on the IBM 3090 series computers and
                 super-scalar processing on the RISC System/6000
                 series.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Res. Div., Thomas J. Watson Res. Center, Yorktown
                 Heights, NY, USA",
  classification = "C1180 (Optimisation techniques); C4140 (Linear
                 algebra)",
  keywords =     "Computational kernels; IBM 3090; IBM machine; IBM
                 Optimization Subroutine Library; Interior point linear
                 programming methods; Linear algebra; OSL; RISC
                 System/6000; Simplex method; Super-scalar processing;
                 Vector architectures",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Linear algebra; Linear programming; Parallel
                 processing; Subroutines",
}

@Article{Jensen:1992:DMQ,
  author =       "D. L. Jensen and A. J. King",
  title =        "A decomposition method for quadratic programming",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "1",
  pages =        "39--48",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5459.",
  abstract =     "Discusses the algorithms used in the IBM Optimization
                 Subroutine Library for the solution of convex quadratic
                 programming problems. The basic simplex algorithm for
                 convex quadratic programming is described. The authors
                 show how the simplex method for linear programming can
                 be used in a decomposition crash procedure to obtain a
                 good initial basic solution for the quadratic
                 programming algorithm. They show how this solution may
                 be used as a starting solution for the simplex-based
                 algorithm. Besides its ability to obtain good starting
                 solutions, this procedure has several additional
                 properties. It can be used directly to find an optimal
                 solution to a quadratic program instead of simply
                 finding a good initial solution; it provides both upper
                 and lower bounds on the objective function value as the
                 algorithm proceeds; it reduces the complexity of
                 intermediate calculations; it avoids certain numerical
                 difficulties that arise in quadratic, but not linear
                 programming.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Res. Div., Thomas J. Watson Res. Center, Yorktown
                 Heights, NY, USA",
  classification = "C1180 (Optimisation techniques); C4140 (Linear
                 algebra)",
  keywords =     "Convex quadratic programming problems; Decomposition
                 crash procedure; IBM Optimization Subroutine Library;
                 Linear algebra; Linear programming; Objective function
                 value; OSL; Simplex algorithm",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Linear algebra; Linear programming; Quadratic
                 programming; Subroutines",
}

@Article{Minkoff:1992:SAO,
  author =       "A. S. Minkoff",
  title =        "A systematic approach to {OSL} application
                 programming",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "1",
  pages =        "49--61",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5460.",
  abstract =     "The Optimization Subroutine Library (OSL) provides
                 powerful tools for solving mathematical programming
                 problems, and permits the integration of these tools
                 into larger applications. In order to access the
                 computational power, an application must translate data
                 between forms used in the rest of the application and
                 the form in which the data can be manipulated by OSL.
                 OSL does not currently offer tools to aid in this
                 translation. The purpose of this paper is to provide a
                 systematic approach for translating symbolic
                 representations of mathematical programming problems
                 into computer code that performs all necessary
                 interactions with both OSL and the rest of the
                 application.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Corp., New York, NY, USA",
  classification = "C1180 (Optimisation techniques); C7310
                 (Mathematics)",
  keywords =     "Computational power; IBM; Linear algebra; Mathematical
                 programming; Optimization Subroutine Library; OSL;
                 Symbolic representations",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Linear algebra; Mathematical programming; Mathematics
                 computing; Subroutines",
}

@Article{Jensen:1992:FGI,
  author =       "D. L. Jensen and A. J. King",
  title =        "{Frontier}: a graphical interface for portfolio
                 optimization in a piecewise linear-quadratic risk
                 framework",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "1",
  pages =        "62--70",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5461.",
  abstract =     "Frontier is a pilot graphical user interface for
                 portfolio optimization built for the new IBM
                 workstation, the RISC System/6000, out of basic
                 X-windows and OSL utilities. The program asks the user
                 to select a piecewise linear-quadratic risk measure,
                 draws a risk/reward efficient frontier, and permits the
                 user to examine the efficient frontier using zoom and
                 histogram display facilities. This paper describes the
                 interfaces and discusses possible extensions.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Res. Div., Thomas J. Watson Res. Center, Yorktown
                 Heights, NY, USA",
  classification = "C1180 (Optimisation techniques); C6180G (Graphical
                 user interfaces)",
  keywords =     "Frontier; Graphical user interface; Histogram display
                 facilities; IBM workstation; Linear-quadratic risk
                 measure; Optimization Subroutine Library; OSL;
                 Portfolio optimization; RISC System/6000; X-windows;
                 Zoom",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Graphical user interfaces; Mathematics computing;
                 Optimisation; Parallel processing; Subroutines",
}

@Article{Anbil:1992:GAC,
  author =       "R. Anbil and R. Tanga and E. L. Johnson",
  title =        "A global approach to crew-pairing optimization",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "1",
  pages =        "71--78",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5462.",
  abstract =     "The problem addressed in this paper is crew-pairing
                 optimization in airline flight planning: finding tours
                 of duty (pairings) that are legal and cover every
                 flight leg at the least cost. The legal rules and cost
                 of a pairing are determined by complex Federal Aviation
                 Agency and contractual requirements. In addition, the
                 problem is made more difficult by the hub-and-spoke
                 system used by airlines that multiplies the possible
                 ways a pairing can link flight legs. The
                 state-of-the-art crew-pairing TRIP system of American
                 Airlines uses subproblem optimization and, as is true
                 for other crew-scheduling systems, may not be able to
                 improve a solution even though a better one exists. It
                 reports on the methodology developed during a joint
                 study by IBM and American Airlines Decision
                 Technologies to use the IBM Optimization Subroutine
                 Library in conjunction with TRIP to improve on
                 crew-pairing solutions by taking a global approach. The
                 resulting improvements have been a reduction of 5 to 11
                 percent in excess crew cost. Estimated total savings
                 are five million dollars per year.",
  acknowledgement = ack-nhfb,
  affiliation =  "American Airlines Decision Technol., Dallas, TX, USA",
  classification = "C1180 (Optimisation techniques); C7185 (Other
                 service industries)",
  keywords =     "Airline flight planning; Contractual requirements;
                 Crew-pairing optimization; Federal Aviation Agency;
                 Hub-and-spoke system; IBM Optimization Subroutine
                 Library; Subproblem optimization; TRIP system",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Optimisation; Subroutines; Travel industry",
}

@Article{Johnson:1992:RDF,
  author =       "E. L. Johnson and G. L. Nemhauser",
  title =        "Recent developments and future directions in
                 mathematical programming",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "1",
  pages =        "79--93",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5463.",
  abstract =     "Advances in mathematical programming methodology have
                 included: development of interior methods competing
                 with the simplex method, improved simplex codes, vastly
                 improved performance for mixed-integer programming
                 using strong linear programming formulations, and a
                 renewed interest in decomposition. In addition, use of
                 vector and parallel processing has improved performance
                 and influenced algorithmic developments. One sees the
                 acceleration of better methods and improved codes
                 moving together with faster, lower-cost, and more
                 interesting hardware into a variety of application
                 areas, thereby opening up new demands for greater
                 function of optimization codes. These new functions
                 might include, for example, more powerful nonlinear
                 codes, decomposition techniques taking advantage of
                 network and other problem-dependent structures, and
                 mixed-integer capability in quadratic and general
                 nonlinear problems. Stochastic scenario programming and
                 multitime-period problems are becoming solvable and
                 open up applications and algorithmic challenges. The
                 IBM Optimization Subroutine Library has helped to
                 accelerate these changes but will have to continue to
                 change and expand in ways that are touched upon in this
                 paper.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Res. Div., Thomas J. Watson Res. Center, Yorktown
                 Heights, NY, USA",
  classification = "C1180 (Optimisation techniques)",
  keywords =     "Decomposition; IBM Optimization Subroutine Library;
                 Interior methods; Linear programming; Mathematical
                 programming methodology; Mixed-integer programming;
                 Multitime-period problems; Nonlinear codes;
                 Optimization codes; Parallel processing; Simplex
                 method; Stochastic scenario programming; Vector
                 processing",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Mathematical programming; Parallel processing;
                 Subroutines",
}

@Article{Hazony:1992:CSE,
  author =       "Y. Hazony and L. Zeidner",
  title =        "Customized systems for engineering applications",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "1",
  pages =        "94--113",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5464.",
  abstract =     "An APL2-based high-productivity software development
                 environment is shown to enable small teams of two or
                 three persons to build complex engineering software
                 systems. The productivity and flexibility of such small
                 teams, equipped with this environment, enables them to
                 build customized engineering application systems
                 economically. These customized systems are far more
                 useful for the particular applications they address
                 than are the generic systems that are commonly produced
                 by large software-development groups. A customized
                 engineering application system is described,
                 illustrating the productivity of the two APL2-based
                 computer-aided software engineering (CASE) tools used
                 for its implementation and long-term software
                 maintenance. The system is presented in some detail, to
                 demonstrate its sophistication and thus provide a
                 measure of the productivity of the software-development
                 environment. The two CASE tools that comprise this
                 software-development environment are used to build
                 interactive graphical application systems, and to build
                 systems for applications that require or can benefit
                 from distributed cooperative processing. A list of some
                 customized application systems built using the
                 described environment is provided, along with estimates
                 of the implementation efforts. The features of APL2
                 that play a key role in the effectiveness of these
                 tools are also discussed.",
  acknowledgement = ack-nhfb,
  affiliation =  "Coll. of Eng., Boston Univ., MA, USA",
  classification = "C6110B (Software engineering techniques); C6115
                 (Programming support); C6170 (Expert systems)",
  keywords =     "APL2; CASE tools; Computer-aided software engineering;
                 Distributed cooperative processing; Engineering
                 software; Expert System Generator; Interactive
                 graphical application systems; Server Network
                 Generator; Software development environment; Software
                 maintenance",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Application generators; Expert systems; Interactive
                 systems; Software maintenance; Software tools",
}

@Article{Feriozi:1992:SMO,
  author =       "D. T. Feriozi",
  title =        "A split model for {OS/2 SCSI} device drivers",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "1",
  pages =        "114--122",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:43:33 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5465.",
  abstract =     "The concept of splitting one logical device driver
                 into two or more physical units is presented. The
                 specific case of an Operating System/2 (OS/2) SCSI
                 (Small Computer System Interface) device driver is used
                 as an example. The primary reason for splitting the
                 device driver is to reduce the development effort
                 required to produce new SCSI device drivers. Common
                 code is isolated in a separate driver in order to
                 prevent its reinvention as each new SCSI device becomes
                 available. Additional benefits are that the overall
                 device driver size is reduced, and the performance of
                 the SCSI subsystem is enhanced. The complete separation
                 of the upper- and lower-level drivers provides the
                 ability to replace one of the device drivers without
                 affecting any of the other components of the system.
                 This is particularly important because it enables
                 backward compatibility for older device drivers, while
                 allowing for the support of emerging technology.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Entry Syst. Div., Boca Raton, FL, USA",
  classification = "C6150J (Operating systems)",
  keywords =     "Logical device driver; Operating System/2; OS/2;
                 Peripheral device; SCSI; Small Computer System
                 Interface",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer interfaces; Computer peripheral equipment;
                 Operating systems [computers]",
}

@Article{Grossman:1992:RDS,
  author =       "C. P. Grossman",
  title =        "Role of the {DASD} storage control in an {Enterprise
                 Systems Connection} environment",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "1",
  pages =        "123--146",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5466.",
  abstract =     "Compares the Enterprise Systems Connection
                 Architecture (ESCON), with its use of fiber optic
                 cables, to the parallel channel architecture introduced
                 with System/360. The paper also describes many of the
                 reasons for the introduction of ESCON. The ESCON
                 implementation for the IBM 3990 Storage Control is
                 described in some detail, including a description of
                 nonsynchronous operation. It concludes with a
                 discussion of some of the benefits of ESCON for a 3990
                 installation, performance considerations, and migration
                 considerations.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Storage Syst. Products Div., Tucson, AZ, USA",
  classification = "C5220P (Parallel architecture); C5320C (Storage on
                 moving magnetic media); C5440 (Multiprocessor systems
                 and techniques)",
  keywords =     "Computer installation; Enterprise Systems Connection
                 Architecture; ESCON; Fiber optic cables; IBM 3990
                 Storage Control; Nonsynchronous operation; Parallel
                 channel architecture; System migration; System
                 performance; System/360",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Magnetic disc storage; Parallel architectures;
                 Parallel machines; Performance evaluation",
}

@Article{Anonymous:1992:Ba,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "1",
  pages =        "147--149",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1992:Pb,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "2",
  pages =        "152--153",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Szabat:1992:INM,
  author =       "M. M. Szabat and G. E. Meyer",
  title =        "{IBM} network management strategy",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "2",
  pages =        "154--160",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5467.",
  abstract =     "A description is given of some major directions at IBM
                 with respect to network management. The authors
                 describe the network management environment and discuss
                 four key initiatives of IBM's SystemView network
                 management strategy. This strategy provides integrated
                 applications and services, broadens the scope of
                 network management products, provides open access to
                 multivendor products, and delivers and supports
                 complete solutions for customers.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Networking Syst., Research Triangle Park, NC,
                 USA",
  classification = "B6210C (Network management); C5620 (Computer
                 networks and techniques)",
  keywords =     "IBM; Integrated applications; Multivendor products;
                 Network management environment; Network management
                 products; Open access; SystemView network management
                 strategy",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer networks; DP industry; IBM computers;
                 Standards; Telecommunication network management",
}

@Article{Cypser:1992:EOC,
  author =       "R. J. Cypser",
  title =        "Evolution of an open communications architecture",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "2",
  pages =        "161--188",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5468.",
  abstract =     "An overview of the current IBM communications paradigm
                 for interconnecting computer networks is presented.
                 Emphasis is on the incorporation of multiprotocol,
                 multivendor facilities in an integrated architecture.
                 The author presents an overview of key elements of the
                 evolving communications architecture.",
  acknowledgement = ack-nhfb,
  classification = "B6150M (Protocols); B6210L (Computer
                 communications); C5620 (Computer networks and
                 techniques); C5640 (Protocols)",
  keywords =     "Communications architecture; IBM communications
                 paradigm; Integrated architecture; Interconnecting
                 computer networks; Multiprotocol; Multivendor
                 facilities",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer networks; Open systems; Protocols;
                 Standards",
}

@Article{Stevenson:1992:MMN,
  author =       "J. G. Stevenson",
  title =        "Management of multivendor networks",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "2",
  pages =        "189--205",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5469.",
  abstract =     "Technical advances in multivendor network management
                 capabilities allow customers to effectively manage
                 their networks. Packaged offerings such as NetView
                 Extra simplify the ability to take advantage of these
                 new capabilities. The author describes the multivendor
                 environment, customer network management requirements,
                 IBM's initial approach to responding to these
                 requirements, and enhancements needed to provide
                 additional management offerings that automatically
                 handle failures, including detection, bypass and
                 recovery, vendor notification and restoration of the
                 repaired resource into service.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Networking Syst., Research Triangle Park, NC,
                 USA",
  classification = "B6210C (Network management); B6210L (Computer
                 communications); C5620 (Computer networks and
                 techniques); C5670 (Network performance); C6150G
                 (Diagnostic, testing, debugging and evaluating
                 systems)",
  keywords =     "Bypass; Customer network management requirements;
                 Detection; Failures; IBM approach; Multivendor network
                 management capabilities; NetView Extra; Recovery;
                 Vendor notification",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer networks; Failure analysis; System recovery;
                 Telecommunication network management",
}

@Article{Irlbeck:1992:NSA,
  author =       "B. W. Irlbeck",
  title =        "Network and system automation and remote system
                 operation",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "2",
  pages =        "206--222",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5470.",
  abstract =     "The rapid growth in the size and complexity of today's
                 information system networks highlights the importance
                 of automation and remote system operation in managing
                 these networks. Version 2 Release 2 of the NetView
                 program provides improved facilities in these two areas
                 to assist enterprises in consolidating their operations
                 staff in central locations and managing their
                 information systems more efficiently and reliably. The
                 author describes the systems network architecture (SNA)
                 framework for remote system operation and the NetView
                 remote operations platform, including the LU 6.2 data
                 transport mechanisms and related management services
                 applications. Extensions to the NetView automation
                 platform that permit automation based directly on the
                 receipt of SNA alerts or other structured data are
                 described. In addition, enhancements that improve the
                 performance, usability, and functional capabilities of
                 the NetView automation table are discussed.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Networking Syst., Research Triangle Park, NC,
                 USA",
  classification = "B6210L (Computer communications); C3370L (Remote
                 signalling, dispatching and safety devices); C5620
                 (Computer networks and techniques); C5690 (Other data
                 communication equipment and techniques); C7410F
                 (Communications); C7420 (Control engineering)",
  keywords =     "Central locations; Data transport mechanisms;
                 Information system networks; Management services
                 applications; NetView automation table; NetView
                 program; NetView remote operations platform; Operations
                 staff; Remote system operation; SNA; SNA alerts;
                 Structured data; Systems network architecture",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer networks; Data communication systems;
                 Standards; Telecommunications computer control;
                 Telecontrol",
}

@Article{Gottschalk:1992:NVR,
  author =       "K. D. Gottschalk",
  title =        "{NetView Version 2 Release 3 Graphic Monitor
                 Facility}: Network management graphics support for the
                 1990s",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "2",
  pages =        "223--251",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5471.",
  abstract =     "The NetView version 2 release 3 Graphic Monitor
                 Facility provides an Operating System/2 (OS/2)
                 workstation-based graphics user interface for NetView
                 that permits an operator to view graphically and
                 control via generic commands both systems network
                 architecture (SNA) and non-SNA networks. The author
                 describes the major new capabilities of the NetView
                 V2R3 Graphic Monitor Facility, discusses its structure
                 at a high level, and describes in some detail the new
                 support in this release for graphic views of various
                 types of networks, simplified commands for controlling
                 these networks, and the manner in which non-SNA
                 networks are supported.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Networking Syst., Research Triangle Park, NC,
                 USA",
  classification = "B6210C (Network management); B6210L (Computer
                 communications); C5690 (Other data communication
                 equipment and techniques); C6130B (Graphics
                 techniques); C6180G (Graphical user interfaces); C7410F
                 (Communications)",
  keywords =     "Generic commands; Graphic views; NetView V2R3 Graphic
                 Monitor Facility; NetView version 2 release 3 Graphic
                 Monitor Facility; Non-SNA networks; Operating System/2;
                 OS/2; Simplified commands; Systems network
                 architecture; Workstation-based graphics user
                 interface",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Data communication systems; Graphical user interfaces;
                 Software packages; Standards; Telecommunication network
                 management; Telecommunications computing",
}

@Article{Finkel:1992:RCI,
  author =       "A. J. Finkel and S. B. Calo",
  title =        "{RODM}: a control information base",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "2",
  pages =        "252--269",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5472.",
  abstract =     "Operational management of computers and computer
                 networks was formerly performed exclusively by an
                 operator or a team of operators equipped only with
                 consoles for the display of status messages. To meet
                 future challenges, however, a structured approach to
                 systems and network management and associated
                 automation will be necessary. The amount and complexity
                 of the status information needed for control and
                 coordination will make it unlikely that operators will
                 be able to keep up with such needs unaided. This
                 control information must be made available to a family
                 of systems and network management applications
                 (including operator display programs). The NetView
                 Resource Object Data Manager (RODM) is designed to
                 facilitate the storage and retrieval of control
                 information. It provides services for defining a
                 structured data model of a computer system. The control
                 information is not kept simply in the form of messages,
                 but instead the data are organized into units called
                 objects. This allows the model to effectively capture
                 interrelationships and dependencies as well as status
                 information.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Res. Div., Thomas J. Watson Res. Center, Yorktown
                 Heights, NY, USA",
  classification = "B6210C (Network management); B6210L (Computer
                 communications); C5620 (Computer networks and
                 techniques); C5690 (Other data communication equipment
                 and techniques); C7250L (Non-bibliographic systems);
                 C7410F (Communications); C7420 (Control engineering)",
  keywords =     "Computer networks; Computer system; Control
                 information; NetView Resource Object Data Manager;
                 Network management; Network management applications;
                 Operator display programs; Retrieval; RODM; Status
                 information; Structured approach; Structured data
                 model",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer networks; Information retrieval systems;
                 Telecommunication network management;
                 Telecommunications computer control",
}

@Article{Chou:1992:AN,
  author =       "J. H. Chou and C. R. Buckman and T. Hemp and A.
                 Himwich and F. Niemi",
  title =        "{AIX NetView\slash 6000}",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "2",
  pages =        "270--285",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:43:33 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  note =         "G321-5473.",
  abstract =     "AIX NetView/6000 is a network management system that
                 manages simple network management protocol (SNMP)
                 devices developed by IBM and other vendors. It provides
                 configuration, fault, and performance applications
                 integrated into an advanced end-user interface (EUI),
                 which incorporates a graphic display of network
                 topology and performance as well as system management
                 functions accessible from both graphic and
                 character-based devices. An application builder and
                 event configurator allow users to generate performance
                 applications and provide automation of management tasks
                 specific to their networks. In addition to providing
                 stand-alone distributed network management, AIX
                 NetView/6000 also provides a bidirectional connection
                 to IBM's mainframe-based NetView product to enable
                 central management of the enterprise network from
                 System/370 and System/390 NetView.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Corp., Research Triangle Park, NC, USA",
  classification = "B6150M (Protocols); B6210C (Network management);
                 C5640 (Protocols); C5670 (Network performance); C6180
                 (User interfaces)",
  keywords =     "Advanced end-user interface; AIX NetView/6000;
                 Application builder; Bidirectional connection; Central
                 management; Character-based devices; Enterprise
                 network; EUI; Event configurator; Graphic display;
                 Mainframe-based NetView product; Management tasks;
                 Network management system; Network topology;
                 Performance applications; Simple network management
                 protocol; Stand-alone distributed network management;
                 System management functions; System/370; System/390
                 NetView",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Performance evaluation; Protocols;
                 Software packages; Telecommunication network
                 management; User interfaces",
}

@Article{Temoshenko:1992:MSP,
  author =       "L. Temoshenko",
  title =        "Managing session performance using the {NetView
                 Performance Monitor}",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "2",
  pages =        "286--299",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5474.",
  abstract =     "Managing the performance of network devices and their
                 interaction with host applications is a complex task
                 that entails the collection and reduction of
                 information related to the underlying session.
                 Depending on the specific management task at hand,
                 differing types, correlations, and formattings of
                 session performance measurements are required. The
                 NetView Performance Monitor has a flexible set of
                 facilities that can be used to provide the information
                 needed to manage session performance. Its facilities to
                 collect, correlate, and present session performance
                 measurement are discussed in relation to typical
                 network management tasks.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Networking Syst., Research Triangle Park, NC,
                 USA",
  classification = "B6210C (Network management); C5470 (Performance
                 evaluation and testing); C5670 (Network performance)",
  keywords =     "Host applications; NetView Performance Monitor;
                 Network devices; Session performance measurements;
                 Specific management task; Typical network management
                 tasks",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Performance evaluation; Software packages;
                 Telecommunication network management",
}

@Article{Jennings:1992:EFR,
  author =       "T. Jennings",
  title =        "Estimating the fault rate function",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "2",
  pages =        "300--312",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5475.",
  abstract =     "Paging activity can be a major factor in determining
                 whether a software workload will run on a given
                 computer system. A program's paging behavior is
                 difficult to predict because it depends not only on the
                 workload processed by the program, but also on the
                 level of storage contention of the processor. A
                 program's fault rate function relates storage
                 allocation to the page fault rate experienced while
                 processing a given workload. Thus, with the workload
                 defined, the fault rate function can be used to see how
                 the program's storage allocation is affected by varying
                 levels of storage contention, represented by varying
                 fault rates. The author presents a technique to
                 represent program workloads and estimate the fault rate
                 function, and describes how these results can be used
                 in analyzing program performance.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Networking Syst., NC, USA",
  classification = "C6120 (File organisation); C6150G (Diagnostic,
                 testing, debugging and evaluating systems); C6150J
                 (Operating systems)",
  keywords =     "Computer system; Fault rate function; Page fault rate;
                 Paging behavior; Program performance; Program
                 workloads; Software workload; Storage allocation;
                 Storage contention; Workload processed",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Performance evaluation; Storage allocation; System
                 recovery; Virtual storage",
}

@Article{Janson:1992:ADO,
  author =       "P. Janson and R. Molva and S. Zatti",
  title =        "Architectural directions for opening {IBM} networks:
                 The case of {OSI}",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "2",
  pages =        "313--335",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5476.",
  abstract =     "A discussion is given on the results of a research
                 project that developed an architectural framework for
                 integrating non-IBM network architectures to the
                 reference model and node structures of IBM's systems
                 network architecture (SNA). The unique features of the
                 selected integration approach allow multiple protocol
                 stacks to coexist and interoperate within the same
                 computer, to share use of common physical network
                 ports, links, and switching nodes and to be accessed
                 and managed through homogeneous interfaces. The
                 architectural framework was developed for the specific
                 purpose of integrating the Open Systems Interconnection
                 (OSI) Reference Model to that of SNA, but its basic
                 philosophy and key aspects turn out to be generally
                 applicable to the integration of other network
                 technologies as well, such as TCP/IP or NetBIOS.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Res. Div., Zurich Res. Lab., Switzerland",
  classification = "B6150M (Protocols); B6210L (Computer
                 communications); C5620 (Computer networks and
                 techniques); C5640 (Protocols)",
  keywords =     "Architectural framework; Common physical network
                 ports; Homogeneous interfaces; IBM networks;
                 Integration approach; Multiple protocol stacks;
                 NetBIOS; Node structures; Non-IBM network
                 architectures; Open Systems Interconnection; OSI;
                 Reference model; Research project; Switching nodes;
                 Systems network architecture; TCP/IP",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Open systems; Protocols; Standards",
}

@Article{Allen:1992:SMS,
  author =       "M. O. Allen and S. L. Benedict",
  title =        "{SNA} Management Services architecture for {APPN}
                 networks",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "2",
  pages =        "336--352",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5477.",
  abstract =     "The introduction of advanced peer-to-peer networking
                 (APPN) provides for a more flexible systems network
                 architecture (SNA) environment: end-user systems
                 (physical units, or PUs) at the edge of a routing
                 network no longer need a predefined relationship with a
                 system services control point (SSCP) for network
                 control purposes. This new flexibility creates
                 challenges for SNA Management Services, however, since
                 the SSCP-PU relationship provided a vehicle for network
                 management as well as network control. To meet the
                 needs of this peer-to-peer environment, the SNA
                 Management Services architecture was extended to
                 provide a management infrastructure that replaces the
                 previous SSCP-PU relationship, and at the same time
                 provides for much greater flexibility. This new
                 infrastructure consists of a formalization of the
                 focal-point/entry-point concept in the architecture and
                 a transport technique for management services data that
                 utilizes the facilities of advanced program-to-program
                 communications (APPC) rather than the SSCP-PU session.
                 Together this provides for a management structure in a
                 peer network.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Networking Syst., Research Triangle Park, NC,
                 USA",
  classification = "B6150M (Protocols); B6210C (Network management);
                 C5620 (Computer networks and techniques); C5640
                 (Protocols); C5670 (Network performance)",
  keywords =     "Advanced peer-to-peer networking; Advanced
                 program-to-program communications; APPC; End-user
                 systems; Flexible systems network architecture;
                 Focal-point/entry-point concept; Management
                 infrastructure; Management services data; Network
                 control purposes; Peer-to-peer environment; Physical
                 units; PUs; Routing network; SNA Management Services;
                 SSCP-PU relationship; System services control point;
                 Transport technique",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer networks; IBM computers; Protocols;
                 Standards; Telecommunication network management",
}

@Article{Zatti:1992:NRI,
  author =       "S. Zatti and J. Ashfield and J. Baker and E. Miller",
  title =        "Naming and registration for {IBM} distributed
                 systems",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "2",
  pages =        "353--380",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5478.",
  abstract =     "A description is given of a proposal to name objects
                 and resources in distributed environments; each object
                 or resource can be located, accessed, communicated
                 with, operated on, managed, or secured using the same,
                 unique name. The solution proposed includes
                 registration mechanisms necessary to ensure name
                 uniqueness. The scheme is based on existing standards,
                 mainly Open System Interconnection (OSI) distinguished
                 names; whenever standards disagree, the preference goes
                 to the alternative that offers the widest usage across
                 all protocols. Clear, consistent naming guidelines are
                 given that would enable IBM customers who have
                 purchased IBM networking and system management products
                 to name their resources so that their administrative
                 processes and IBM's products and protocols can support
                 those resources effectively. A method is suggested to
                 encompass existing name spaces in a single, worldwide
                 naming space and a migration path is sketched. The
                 interoperation of different protocols across network
                 boundaries using the same naming constructs is shown by
                 means of several scenarios. The naming and addressing
                 scheme proposed requires nothing new or different from
                 the already defined standards, but allows
                 interoperation among them by using a subset of each.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Res. Div., Zurich Res. Lab., Switzerland",
  classification = "B6210L (Computer communications); C5620 (Computer
                 networks and techniques)",
  keywords =     "Addressing scheme; Administrative processes;
                 Consistent naming guidelines; Distinguished names;
                 Distributed environments; IBM customers; IBM
                 networking; Interoperation; Migration path; Name
                 spaces; Name uniqueness; Naming constructs; Network
                 boundaries; Open System Interconnection; Registration
                 mechanisms; System management products; Worldwide
                 naming space",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Open systems; Standards",
}

@Article{Voss:1992:ADA,
  author =       "F. W. Voss",
  title =        "{APPC\slash MVS} distributed application support",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "2",
  pages =        "381--408",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5479.",
  abstract =     "Advanced program-to-program communication for multiple
                 virtual storage (APPC/MVS) is a major evolutionary
                 change to MVS for applications that need to connect and
                 communicate across the enterprise. APPC/MVS is an
                 implementation of systems network architecture (SNA) LU
                 6.2 session-defined protocol. This new MVS environment
                 includes services to enhance the creation, execution,
                 and management of MVS peer-to-peer and client/server
                 applications. In addition to providing connectivity and
                 communications services, APPC/MVS also has scheduling
                 facilities for managing concurrent work originating
                 from other systems in the enterprise network. The
                 objective of the author is to survey these facilities
                 by examples of usage and by relationships to existing
                 MVS services. Topics include various types of
                 distributed models and approaches, design
                 considerations and characteristics that represent
                 candidates for an APPC/MVS implementation.
                 Relationships of the APPC/MVS environment with the
                 Customer Information Control System/Enterprise Systems
                 Architecture (CICS/ESA), Information Management
                 System/Enterprise Systems Architecture Transaction
                 Manager (IMS/ESA TM), Time Sharing Option Extensions
                 (TSO/E), batch environments are included.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Enterprise Syst., Poughkeepsie, NY, USA",
  classification = "B6150M (Protocols); B6210L (Computer
                 communications); C5620 (Computer networks and
                 techniques); C5640 (Protocols); C6120 (File
                 organisation)",
  keywords =     "APPC/MVS; Batch environments; CICS/ESA; Client/server
                 applications; Communications services; Concurrent work;
                 Connectivity; Customer Information Control
                 System/Enterprise Systems Architecture; Design
                 considerations; Distributed application support;
                 Distributed models; Enterprise network; Evolutionary
                 change; IMS/ESA TM; Information Management
                 System/Enterprise Systems Architecture Transaction
                 Manager; Multiple virtual storage; MVS environment; MVS
                 peer-to-peer; Scheduling facilities; Session-defined
                 protocol; SNA; Systems network architecture; Time
                 Sharing Option Extensions; TSO/E",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer networks; Protocols; Standards; Virtual
                 storage",
}

@Article{Anonymous:1992:Bb,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "2",
  pages =        "409--410",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1992:Pc,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "3",
  pages =        "412--413",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Berry:1992:ECU,
  author =       "R. E. Berry and C. J. Reeves",
  title =        "The evolution of the {Common User Access Workplace
                 Model}",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "3",
  pages =        "414--428",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5480.",
  acknowledgement = ack-nhfb,
}

@Article{Berry:1992:DMC,
  author =       "R. E. Berry",
  title =        "The designer's model of the {CUA} Workplace",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "3",
  pages =        "429--458",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5481.",
  acknowledgement = ack-nhfb,
}

@Article{Demers:1992:IID,
  author =       "R. A. Demers and J. D. Fisher and S. S. Gaitonde and
                 R. R. Sanders",
  title =        "Inside {IBM}'s {Distributed Data Management}
                 architecture",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "3",
  pages =        "459--487",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5482.",
  acknowledgement = ack-nhfb,
}

@Article{Demers:1992:DDC,
  author =       "R. A. Demers and K. Yamaguchi",
  title =        "Data description and conversion architecture",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "3",
  pages =        "488--515",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5483.",
  acknowledgement = ack-nhfb,
}

@Article{Deinhart:1992:SDF,
  author =       "K. Deinhart",
  title =        "{SAA} distributed file access to the {CICS}
                 environment",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "3",
  pages =        "516--534",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5484.",
  acknowledgement = ack-nhfb,
}

@Article{Berggren:1992:BMT,
  author =       "C. Berggren",
  title =        "The {BiProcessor}: a merger of two architectures",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "3",
  pages =        "535--549",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5485.",
  acknowledgement = ack-nhfb,
}

@Article{Arfman:1992:PAS,
  author =       "J. M. Arfman and P. Roden",
  title =        "{Project Athena}: Supporting distributed computing at
                 {MIT}",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "3",
  pages =        "550--563",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5486.",
  acknowledgement = ack-nhfb,
}

@Article{Rofrano:1992:DCD,
  author =       "J. J. {Rofrano, Jr.}",
  title =        "Design considerations for distributed applications",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "3",
  pages =        "564--589",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5487.",
  acknowledgement = ack-nhfb,
}

@Article{Sowa:1992:EFF,
  author =       "J. F. Sowa and J. A. Zachman",
  title =        "Extending and formalizing the framework for
                 information systems architecture",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "3",
  pages =        "590--616",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5488.",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1992:Pd,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "4",
  pages =        "618--619",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Elliott:1992:IIS,
  author =       "P. J. Elliott and J. M. Knapman and W. Schlegel",
  title =        "Interactive image segmentation for radiation treatment
                 planning",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "4",
  pages =        "620--634",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5489.",
  abstract =     "COVIRA (COmputer Vision in RAdiology) is a project in
                 the European Community's Advanced Informatics in
                 Medicine program. The goal is to improve the diagnosis
                 and planning of treatment (radiotherapy) for patients
                 with brain tumors and other diseases. The aim of
                 radiotherapy is to provide a high dose of radiation to
                 a tumor while sparing as much as possible of the
                 surrounding health tissue. A necessary first step is
                 defining the target volume and organs at risk by
                 manually outlining the required contours on magnetic
                 resonance or computed tomography scans. For a full
                 three-dimensional plan this is time-consuming, as 40 or
                 more scans are used. Computer image segmentation speeds
                 up the process, and a method that combines information
                 from edge and region detectors is described.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM UK Sci. Center, Winchester, UK",
  classification = "B7520C (Radiation therapy); C5260B (Computer vision
                 and picture processing); C7330 (Biology and medicine)",
  keywords =     "COVIRA; Image segmentation; Radiation treatment
                 planning; Radiotherapy",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Image segmentation; Medical image processing;
                 Radiation therapy",
}

@Article{Hovorka:1992:CPN,
  author =       "R. Hovorka and S. Andreassen and J. J. Benn and K. G.
                 Olesen and E. R. Carson",
  title =        "Causal probabilistic network modeling\emdash An
                 illustration of its role in the management of chronic
                 diseases",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "4",
  pages =        "635--648",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5490.",
  abstract =     "Describes the role of the novel technique of causal
                 probabilistic network (CPN) modeling as an approach to
                 tackling control system problems typified by that of
                 the administration of treatment to the patient
                 suffering from a chronic disease such as diabetes.
                 Three roles of a CPN are discussed. First, since
                 diabetes arises as a consequence of impaired control of
                 carbohydrate metabolism, the ability of a CPN to
                 represent the uncertainty of a physiologically-based
                 model is described. Second, its ability to make robust
                 estimates of the parameters of the metabolic model is
                 presented, and finally, in conjunction with decision
                 theory approaches, its ability to compare alternative
                 therapies and advise on insulin therapy for patients
                 with insulin-dependent diabetes mellitus is
                 illustrated.",
  acknowledgement = ack-nhfb,
  affiliation =  "City Univ., London, UK",
  classification = "C6170 (Expert systems); C7330 (Biology and
                 medicine)",
  keywords =     "Carbohydrate metabolism; Causal probabilistic network;
                 Chronic diseases; Diabetes; Insulin therapy; Robust
                 estimates",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Knowledge based systems; Medical computing; Patient
                 treatment; Physiological models",
}

@Article{Dauphin:1992:ETR,
  author =       "M. Dauphin and M. M. Marques and A. P. Mullery and P.
                 Rodier",
  title =        "The {European} telecommunications research and
                 development program {RACE} and its software project
                 {SPECS}",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "4",
  pages =        "649--667",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5491.",
  abstract =     "Presents the RACE program and the objectives and
                 achievements of SPECS, a representative RACE project.
                 The European Commission has set up the research and
                 development program RACE for the preparation and
                 promotion of an integrated broadband communication
                 system in Europe. The SPECS project develops methods
                 and techniques for the development of the complex
                 software needed by this communication system. Its
                 approach is the use of formal methods and maximum
                 automation. A unique feature of this approach is the
                 support of multiple specification languages, including
                 the ability to mix specification languages within a
                 given system design.",
  acknowledgement = ack-nhfb,
  affiliation =  "Compagnie IBM France, La Gaude, France",
  classification = "C6110 (Systems analysis and programming); C7410F
                 (Communications)",
  keywords =     "Multiple specification languages; RACE program;
                 Research and development program; Software; Software
                 development; SPECS",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Broadband networks; Research initiatives;
                 Specification languages; Telecommunications computing",
}

@Article{Binding:1992:CCL,
  author =       "C. Binding and W. Bouma and M. Dauphin and G. Karjoth
                 and Y. Yang",
  title =        "A common compiler for {LOTOS} and {SDL}
                 specifications",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "4",
  pages =        "668--690",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5492.",
  abstract =     "Describes a translation of LOTOS and SDL specification
                 languages into executable code, as it was prototyped in
                 the Specification and Programming Environment for
                 Communication Software (SPECS) project under the
                 Research and Development in Advanced Communications in
                 Europe (RACE) program. Both languages are translated
                 into a common intermediate representation in the form
                 of a network of state machines with both synchronous
                 and asynchronous communications. By a series of
                 transformations that make full use of the equivalence
                 relations defined on LOTOS processes, this translation
                 solves unique problems stemming from the highly
                 abstract nature of LOTOS. The common intermediate
                 representation is mapped into C code that can be
                 executed in a specific run-time environment,
                 implemented on a UNIX-like operating system. SPECS has
                 also developed a pragmatic approach to represent
                 implementable data types in the algebraic framework of
                 LOTOS and SDL, based on a set of predefined type
                 constructors.",
  acknowledgement = ack-nhfb,
  affiliation =  "Union Bank of Switzerland, Zurich, Switzerland",
  classification = "C6140D (High level languages); C6150C (Compilers,
                 interpreters and other processors)",
  keywords =     "Common intermediate representation; LOTOS; RACE; SDL;
                 Specification languages; SPECS; Translated",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Program compilers; Specification languages",
}

@Article{Oshisanwo:1992:ROS,
  author =       "A. O. Oshisanwo and M. D. Chapman and M. Key and A. P.
                 Mullery and J. Saint-Blancat",
  title =        "The {RACE} open services architecture project",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "4",
  pages =        "691--710",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:36:36 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5493.",
  abstract =     "The specification and implementation of current
                 telecommunication services tend to be intimately bound
                 to a specific network architecture. Moreover, within
                 the service software interactions between the logical
                 modules are not always explicit, accessible, or
                 uniform, and tend to be optimized for a particular
                 service. This is exemplified by the difficulty
                 experienced in integrating equipment from multiple
                 vendors, and has resulted in telecommunication systems
                 that cannot rapidly exploit the advantages of new
                 technology or respond to changing customer
                 requirements. In addition, current telecommunication
                 services tend not to be viewed as an integral whole,
                 whereby user, control, and management aspects of a
                 service are developed independently from one another.
                 Separate development can lead to problems of
                 inconsistency if shared data are not updated correctly.
                 The RACE Open Services Architecture (ROSA) project was
                 established to address these problems. This paper
                 presents an overview of the approach taken in the ROSA
                 project.",
  acknowledgement = ack-nhfb,
  affiliation =  "British Telecom Labs., Ipswich, UK",
  classification = "B6210 (Telecommunication applications)",
  keywords =     "Open services architecture; RACE; ROSA project;
                 Telecommunication services",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Broadband networks; Open systems; Research
                 initiatives",
}

@Article{Geihs:1992:STM,
  author =       "K. Geihs and P. Fran{\c{c}}ois and D. Griffin and C.
                 Kaas-Petersen and A. Mann",
  title =        "Service and traffic management for {IBCN}",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "4",
  pages =        "711--727",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5494.",
  abstract =     "The future Integrated Broadband Communications Network
                 (IBCN) will provide high-speed communication
                 capabilities that support a variety of existing and new
                 services. The management of such a complex environment
                 requires innovative management systems. NEMESYS is a
                 project within the European Commission's Research and
                 Development in Advanced Communications in Europe (RACE)
                 program. The project goals are to demonstrate and
                 evaluate the use of advanced information processing
                 techniques for quality-of-service and traffic
                 management. To reach these goals, a series of
                 experimental prototypes are being built. The paper
                 describes the assumptions, objectives, and approach of
                 NEMESYS, and in particular, the design and
                 implementation of an experiment that investigates
                 services and traffic management techniques in a
                 simulated asynchronous transfer mode environment.
                 Because the project is not yet finished, some
                 preliminary results are presented.",
  acknowledgement = ack-nhfb,
  affiliation =  "Frankfurt Univ., Germany",
  classification = "B6210C (Network management); B6210M (ISDN)",
  keywords =     "IBCN; Integrated Broadband Communications Network;
                 Management; NEMESYS; Service management; Traffic
                 management",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Broadband networks; ISDN; Telecommunication network
                 management",
}

@Article{Fanderl:1992:ODA,
  author =       "H. Fanderl and K. Fischer and J. Kamper",
  title =        "The {Open Document Architecture}: From standardization
                 to the market",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "4",
  pages =        "728--754",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5495.",
  abstract =     "The Open Document Architecture (ODA) was developed in
                 the mid-1980s by several standardization bodies. It is
                 now a stable set of international standards for the
                 interchange of compound documents consisting of text,
                 image, and graphic content. Since 1985 the
                 standardization process has been accompanied by
                 European industrial cooperation projects in order to
                 get early experience with the standard and to develop
                 technologies implementing the standard. IBM's European
                 Networking Center has participated in the projects and
                 has prototyped enhancements to OfficeVision platforms
                 to allow the interchange of ODA documents between
                 OfficeVision applications and applications running on
                 other vendor platforms. In the paper, the ODA
                 technology is described, experiences of interworking in
                 heterogeneous environments are given, and the role of
                 cooperating with project partners is outlined.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Eur. Networking Center, Heidelberg, Germany",
  classification = "C6130E (Data interchange)",
  keywords =     "IBM; Image; Interchange of compound documents; ODA;
                 OfficeVision; Open Document Architecture;
                 Standardization; Text",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer networks; Electronic data interchange",
}

@Article{Benichou:1992:PAI,
  author =       "M. B{\'{e}}nichou and H. Beringer and J.-M. Gauthier
                 and C. Beierle",
  title =        "{Prolog} at {IBM}: An advanced and evolving
                 application development technology",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "4",
  pages =        "755--773",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5496.",
  abstract =     "Prolog is a powerful programming language, based on
                 logic, that originated and matured in Europe. The paper
                 shows that Prolog is becoming one of the key tools for
                 the entire application development community. The
                 authors explain how the unique properties of Prolog
                 give it many advantages over classical languages. Then
                 they show that the language is sufficiently mature
                 technically so that numerous industrial Prolog products
                 are now available. In particular, IBM offers the
                 Systems Application Architecture (SAA/sup TM/) AD/Cycle
                 Prolog product family, which provides a combination of
                 logic programming and object programming facilities.",
  acknowledgement = ack-nhfb,
  affiliation =  "Compagnie IBM France, Fontenay ss Bois, France",
  classification = "C6140D (High level languages)",
  keywords =     "AD/Cycle Prolog product family; Logic programming;
                 Object programming; Programming language; Prolog;
                 Prolog products; Systems Application Architecture",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "PROLOG",
}

@Article{Papetti:1992:ICE,
  author =       "F. Papetti and S. Golini and M. Maggiore and S. Succi
                 and P. Gaillard and J.-M. Perez",
  title =        "Internal combustion engine design on {IBM} platforms",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "4",
  pages =        "774--787",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5497.",
  abstract =     "Computer simulation of fluid flow and combustion in
                 diesel engines is rapidly gaining an increasing
                 popularity within the automotive industry, becoming
                 recognized as a cost-effective tool for cutting design
                 cycle time. The paper shows how an advanced computing
                 environment for numerically intensive applications,
                 entirely based upon IBM platforms, can be profitably
                 exploited within the framework of a joint project with
                 industrial partners, in this case R{\'e}nault Vehicules
                 Industriels. The computing environment has been applied
                 to the code KIVA-II, a computer program for numerical
                 combustion developed at Los Alamos National
                 Laboratory.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Eur. Center for Sci. and Eng. Comput., Rome,
                 Italy",
  classification = "C7440 (Civil and mechanical engineering)",
  keywords =     "Diesel engines; Fluid flow; IC engine design; KIVA-II;
                 R{\'e}nault Vehicules Industriels",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Automobile industry; CAD; Data visualisation; Flow
                 simulation; Internal combustion engines; Mechanical
                 engineering computing",
}

@Article{Hebeker:1992:NSR,
  author =       "F. K. Hebeker and R. R. Maly and S. U. Schoeffel",
  title =        "Numerical simulation of reactive flow on the {IBM
                 ES\slash 3090} vector multiprocessor",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "4",
  pages =        "788--797",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:36:36 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5498.",
  abstract =     "Prohibiting knock damage in internal combustion
                 engines presents severe restrictions for engineers.
                 Laboratory experiments are expensive or even
                 impossible; nevertheless, numerical attempts that
                 employ supercomputers have been rarely undertaken. The
                 numerical approach described in the paper combines a
                 recent shock-capturing finite-volume scheme for the
                 compressible Navier Stokes equations, with
                 semi-implicit treatment of the chemical source terms.
                 An algorithm is described and validated by experiment
                 that is optimally adapted to vector and parallel
                 computers. The algorithm has been implemented on the
                 IBM Enterprise System/3090/sup TM/ (ES/3090/sup TM/)
                 Vector Multiprocessor. Performance measurements are
                 discussed. The potential of the code is illustrated by
                 an example: formation of pseudo shock waves due to
                 interaction of a shock wave with turbulent boundary
                 layer flow.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Germany, Heidelberg, Germany",
  classification = "C7440 (Civil and mechanical engineering)",
  keywords =     "Boundary layer flow; Compressible Navier Stokes
                 equations; ES/3090/sup TM/; Finite-volume scheme; IBM
                 Enterprise System/3090/sup TM/; Internal combustion
                 engines; Knock damage; Reactive flow; Vector
                 Multiprocessor",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Flow simulation; Internal combustion engines;
                 Mechanical engineering computing; Navier--Stokes
                 equations; Parallel algorithms",
}

@Article{Aukrust:1992:MSN,
  author =       "T. Aukrust and J. M. Oberhuber and E. J. Farrell and
                 P. M. Haugan",
  title =        "A modeling study of the {North Atlantic} with emphasis
                 on the {Greenland-Iceland-Norwegian Sea}",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "4",
  pages =        "798--810",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5499.",
  abstract =     "Presents the results of a modeling study that
                 addresses the circulation and convection of ocean
                 currents. A possible change in the global climate due
                 to human-induced increase of atmospheric CO/sub 2/ and
                 other greenhouse gases is one of the major
                 environmental challenges in our time. In order to get
                 more insight into this problem, one needs to better
                 understand the various components of the climate system
                 and how they interact. Due to the large heat capacity
                 of the global ocean, the magnitude, delay, and regional
                 distribution of a potential global warming are to a
                 large extent determined by exchanges of heat between
                 the upper ocean and the world's deep ocean. An
                 important process in this regard is deep water
                 formation due to convection. The North Atlantic and the
                 Greenland-Iceland-Norwegian Sea are particularly
                 important regions for this process. Major parts of the
                 circulation in this area are simulated by a coupled
                 ice-ocean model that also includes the entire Arctic
                 Ocean.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Bergen, Norway",
  classification = "A9210L (Turbulence, diffusion, mixing, and
                 convection); A9210M (Thermohaline structure and
                 circulation); A9330M (Atlantic Ocean); A9330R (Regional
                 seas); C7340 (Geophysics)",
  keywords =     "Circulation; Convection; Greenland-Iceland-Norwegian
                 Sea; North Atlantic; Ocean currents",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Geophysics computing; Oceanographic regions",
}

@Article{Anonymous:1992:Bc,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "4",
  pages =        "811--815",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1992:CV,
  author =       "Anonymous",
  title =        "Contents of Volume 31, 1992",
  journal =      j-IBM-SYS-J,
  volume =       "31",
  number =       "4",
  pages =        "816--817",
  year =         "1992",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1993:Pa,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "1",
  pages =        "2--3",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Henderson:1993:SAL,
  author =       "J. C. Henderson and N. Venkatraman",
  title =        "Strategic alignment: Leveraging information technology
                 for transforming organizations",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "1",
  pages =        "4--16",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5500.",
  abstract =     "It is clear that even though information technology
                 (I/T) has evolved from its traditional orientation of
                 administrative support toward a more strategic role
                 within an organization, there is still a glaring lack
                 of fundamental frameworks within which to understand
                 the potential of I/T for tomorrow's organizations. The
                 authors develop a model for conceptualizing and
                 directing the emerging area of strategic management of
                 information technology. This model, termed the
                 strategic alignment model is defined in terms of four
                 fundamental domains of strategic choice: business
                 strategies, information technology strategy,
                 organizational infrastructure and processes, and
                 information technology infrastructure and
                 processes-each with its own underlying dimensions. The
                 authors illustrate the power of this model in terms of
                 two fundamental characteristics of strategic
                 management: strategic fit (the interrelationships
                 between external and internal components) and
                 functional integration (integration between business
                 and functional domains). More specifically, they derive
                 four perspectives of alignment with specific
                 implications for guiding management practice in this
                 importance area.",
  acknowledgement = ack-nhfb,
  affiliation =  "Sch. of Manage., Boston Univ., MA, USA",
  classification = "C0310 (EDP management); C7100 (Business and
                 administration)",
  keywords =     "Business strategies; Functional domains; Functional
                 integration; Fundamental frameworks; Information
                 technology infrastructure; Information technology
                 strategy; IT strategy; Management practice;
                 Organizational infrastructure; Strategic alignment
                 model; Strategic choice; Strategic fit; Strategic
                 management; Strategic role; Traditional orientation",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "DP management; Information systems",
}

@Article{Keen:1993:ITM,
  author =       "P. G. W. Keen",
  title =        "Information technology and the management difference:
                 {A} fusion map",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "1",
  pages =        "17--39",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5501.",
  abstract =     "When every leading firm in an industry has access to
                 the same information technology resource, the
                 management difference determines competitive advantage
                 or disadvantage. The management challenge is to make
                 sure that business processes, people, and technology
                 are meshed, instead of being dealt with as separate
                 elements in planning and implementation. The author
                 presents a framework for senior executives to use in
                 order to lead the deployment of information technology
                 (I/T) without having to know how it is managed and to
                 ensure the fusion of business processes, people, and
                 technology. The `fusion map' approach that focuses on
                 the steps that precede and enable strategy, has been
                 applied in a number of companies. Factors are
                 identified that make I/T a frequent destabilizer of
                 basic logistics in an industry.",
  acknowledgement = ack-nhfb,
  affiliation =  "Fordham Univ., New York, NY, USA",
  classification = "C0310 (EDP management)",
  keywords =     "Basic logistics; Business processes; Competitive
                 advantage; Fusion map; I/T; Information technology
                 resource; Leading firm; Management challenge;
                 Management difference; Senior executives",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "DP management; Human factors; Professional aspects",
}

@Article{Boynton:1993:NCS,
  author =       "A. C. Boynton and B. Victor and B. J. {Pine, II}",
  title =        "New competitive strategies: challenges to
                 organizations and information technology",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "1",
  pages =        "40--64",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:36:36 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5502.",
  abstract =     "The old competitive strategies of invention and mass
                 production no longer work in an increasingly turbulent
                 business environment. Successful firms are implementing
                 the new competitive strategies of continuous
                 improvement (constant process improvement) and mass
                 customization-a dynamic flow of goods and services via
                 a stable set of processes. The article provides a
                 `lens' through which managers can assess their firm's
                 current competitive position, builds vision for where
                 they must be in the future, and craft a transformation
                 strategy to turn that future vision into reality.",
  acknowledgement = ack-nhfb,
  affiliation =  "Int. Inst. for Manage. Dev., Lausanne, Switzerland",
  classification = "C0230 (Economic, social and political aspects);
                 C0310 (EDP management); C7100 (Business and
                 administration)",
  keywords =     "Competitive position; Competitive strategies; Constant
                 process improvement; Continuous improvement; Dynamic
                 flow; Future vision; Mass customization; Transformation
                 strategy; Turbulent business environment",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Administrative data processing; Commerce; DP
                 management; Technological forecasting",
}

@Article{Davidson:1993:BRT,
  author =       "W. H. Davidson",
  title =        "Beyond re-engineering: The three phases of business
                 transformation",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "1",
  pages =        "65--79",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5503.",
  abstract =     "New information-technology-base capabilities make it
                 possible to achieve systematic and dramatic gains in
                 business performance. Re-engineering offers one method
                 to access these gains, but a broader process of
                 business transformation explored can give enterprises a
                 greater range of benefits. This three-phase
                 transformation process starts with structured
                 automation and re-engineering efforts, builds on new
                 infrastructure and capabilities to enhance and extend
                 the original business, and then redefines it to create
                 new businesses.",
  acknowledgement = ack-nhfb,
  classification = "C0310F (Software development management); C7100
                 (Business and administration)",
  keywords =     "Business performance; Business transformation;
                 Information-technology-base capabilities;
                 Infrastructure; Re-engineering efforts; Structured
                 automation; Three-phase transformation process",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Administrative data processing; Commerce; Software
                 maintenance; Systems analysis",
}

@Article{Scherr:1993:NAB,
  author =       "A. L. Scherr",
  title =        "A new approach to business processes",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "1",
  pages =        "80--98",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5504.",
  abstract =     "A methodology is presented for analyzing and designing
                 the processes that an enterprise uses to conduct its
                 business. The methodology builds upon traditional
                 approaches to business process definition by adding the
                 dimension of people's accountabilities: their roles,
                 relationships, and agreements. The approach presented
                 allows for unique insights into customer satisfaction,
                 employee empowerment, and quality. It also provides a
                 basis for spanning the concerns of both business people
                 and information technologies responsible for providing
                 business process automation.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Consulting Group, Milford, CT, USA",
  classification = "C0230 (Economic, social and political aspects);
                 C6180 (User interfaces); C7100 (Business and
                 administration)",
  keywords =     "Business people; Business process automation; Business
                 process definition; Customer satisfaction; Employee
                 empowerment; Information technologies; Traditional
                 approaches; Unique insights",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Administrative data processing; Commerce; Employment;
                 Human factors; Personnel; User interfaces",
}

@Article{Glazer:1993:MVI,
  author =       "R. Glazer",
  title =        "Measuring the value of information: The
                 information-intensive organization",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "1",
  pages =        "99--110",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5505.",
  abstract =     "It is suggested that firms that successfully integrate
                 an information technology (I/T) strategy with their
                 business strategies do so by focusing on the
                 information itself, rather than on technology, as the
                 real carrier of value and source of competitive
                 advantage. A primary mechanism by which a firm becomes
                 an information-intensive firm is the implementation of
                 a procedure for measuring the `value of its information
                 assets' V(I). The author presents a methodology for
                 measuring the value of information in the firm. He also
                 describes the application of that methodology in an
                 actual case study and discusses some consequences of
                 being able to compare organizations with respect to
                 their relative levels of information intensity.",
  acknowledgement = ack-nhfb,
  affiliation =  "Walter A. Haas Sch. of Bus., California Univ., CA,
                 USA",
  classification = "C0310 (EDP management); C7100 (Business and
                 administration)",
  keywords =     "Actual case study; Business strategies; Competitive
                 advantage; Information assets; Information intensity;
                 Information-intensive firm",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Administrative data processing; Commerce; DP
                 management; Performance evaluation",
}

@Article{Konzynski:1993:SCE,
  author =       "B. R. Konsynski",
  title =        "Strategic control in the extended enterprise",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "1",
  pages =        "111--142",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:36:36 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5506.",
  abstract =     "The strategic role of information systems in
                 `extending' the enterprise is examined. A number of
                 issues emerge as essential considerations in the
                 strategic alignment of the investment in information
                 technology and business strategy. Information
                 technologies transform organizational boundaries,
                 interorganizational relations, and marketplace
                 competitive and cooperative practice. The author
                 presents a framework of strategic control that guides
                 the planning and execution of these investments in
                 information technology for business transformation,
                 seeking increased understanding and influence. Emerging
                 information technologies change the limits of what is
                 possible in the leverage of strategic control through
                 transformation of boundaries, relations, and markets.",
  acknowledgement = ack-nhfb,
  affiliation =  "Emory Bus. Sch., Emory Univ., Atlanta, GA, USA",
  classification = "C0310 (EDP management); C7100 (Business and
                 administration)",
  keywords =     "Business strategy; Business transformation;
                 Cooperative practice; Enterprise; Extended enterprise;
                 Information systems; Information technology;
                 Interorganizational relations; Marketplace;
                 Organizational boundaries; Strategic alignment;
                 Strategic control; Strategic role",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Commerce; DP management; Information systems",
}

@Article{Ives:1993:GBD,
  author =       "B. Ives and S. L. Jarvenpaa and R. O. Mason",
  title =        "Global business drivers: Aligning information
                 technology to global business strategy",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "1",
  pages =        "143--161",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5507.",
  abstract =     "The alignment of worldwide computer-based information
                 systems and integrated business strategies is critical
                 to the success of multinational firms in a highly
                 competitive global market. Information technology (I/T)
                 solutions are explored that drive firms toward making
                 economic decisions based on worldwide distributed
                 knowledge. These solutions focus on a number of
                 entities (or global business drivers) that identify
                 where a firm can benefit most from the management and
                 application of the technology. A variety of approaches
                 for overcoming the barriers and risks of applying this
                 technology are also discussed.",
  acknowledgement = ack-nhfb,
  affiliation =  "Cox Sch. of Bus., Southern Methodist Univ., Dallas,
                 TX, USA",
  classification = "C0310 (EDP management); C7100 (Business and
                 administration)",
  keywords =     "Economic decisions; Global business drivers; Global
                 business strategy; Highly competitive global market;
                 Integrated business strategies; Multinational firms;
                 Worldwide computer-based information systems; Worldwide
                 distributed knowledge",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Commerce; DP management; Information systems",
}

@Article{Broadbent:1993:IBI,
  author =       "M. Broadbent and P. Weill",
  title =        "Improving business and information strategy alignment:
                 Learning from the banking industry",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "1",
  pages =        "162--179",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5508.",
  abstract =     "An empirical study that explored business and
                 information strategy alignment in the
                 information-intensive and competitive Australian
                 banking industry is featured. The aim of the study was
                 to identity organizational practices that contribute to
                 and enhance such alignment. Multiple sources of
                 information were used to collect data about business
                 and information strategies from the major firms
                 dominating Australian banking. Sources included written
                 and interview-based information, strategic planning
                 documentation, and annual reports. Evidence was sought
                 for the alignment of business and information
                 strategies through the use of information and
                 information technology that provided a comparative
                 advantage to an organization over its competitors. The
                 firm-wide strategy-formation processes of the banks,
                 rather than their information systems (I/S)
                 methodology, was central to the alignment of business
                 and information strategies. The interdependence of
                 firm-wide processes I/S factors are emphasized in a
                 strategic alignment model that summarizes the findings
                 of the study. The authors conclude with a discussion of
                 the management implications and requirements for action
                 in both firm-wide strategy and I/S areas. The results
                 of this study in the banking industry are pertinent to
                 other industries where information technology and
                 systems are playing an increasingly strategic role.",
  acknowledgement = ack-nhfb,
  affiliation =  "Graduate Sch. of Manage., Melbourne Univ, Carlton,
                 Vic., Australia",
  classification = "C0310 (EDP management); C7120 (Finance)",
  keywords =     "Annual reports; Comparative advantage; Competitive
                 Australian banking industry; Empirical study; Firm-wide
                 strategy-formation processes; I/S areas; I/S factors;
                 Information strategies; Information strategy alignment;
                 Information systems; Information technology;
                 Information-intensive; Interview-based information;
                 Management implications; Organizational practices;
                 Strategic alignment model; Strategic planning
                 documentation; Strategic role",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Bank data processing; DP management; Information
                 systems",
}

@Article{Norden:1993:QTS,
  author =       "P. V. Norden",
  title =        "Quantitative techniques in strategic alignment",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "1",
  pages =        "180--197",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "There is increasing evidence in both the business and
                 technical literature that the operations and strategy
                 processes of many organizations have been aided
                 materially by visualization and modeling techniques.
                 Application of quantitative methods has progressed from
                 relatively well-structured operations to the more
                 speculative aspects of strategy and policy formation.
                 In retrospect, however, the most valuable contribution
                 of modeling has been greater insight: a clearer
                 understanding of the situations and prospects at hand
                 that the mere act of model formulation often provided
                 the planner. The author illustrates some
                 characteristics of the modeling process, and explores
                 the applicability of quantitative techniques to
                 strategic alignment opportunities, such as current
                 pressures to reduce the `cycle time' of many enterprise
                 functions.",
  acknowledgement = ack-nhfb,
  affiliation =  "Dept. of Ind. Eng. and Oper. Res., Columbia Univ., New
                 York, NY, USA",
  classification = "C0310 (EDP management); C6185 (Simulation
                 techniques); C7100 (Business and administration)",
  keywords =     "Enterprise functions; Model formulation; Modeling
                 process; Modeling techniques; Policy formation;
                 Quantitative methods; Quantitative techniques;
                 Speculative aspects; Strategic alignment opportunities;
                 Strategy processes; Visualization",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Administrative data processing; Commerce; Digital
                 simulation; DP management",
}

@Article{Luftman:1993:TEA,
  author =       "J. N. Luftman and P. R. Lewis and S. H. Oldach",
  title =        "Transforming the enterprise: The alignment of business
                 and information technology strategies",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "1",
  pages =        "198--221",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5510.",
  abstract =     "The strategic use of information technology (I/T) is
                 now and has been a fundamental issue for every
                 business. In essence (I/T) can alter the basic nature
                 of an industry. The effective and efficient utilization
                 of information technology requires the alignment of the
                 I/T strategies with the business strategies, something
                 that was not done successfully in the past with
                 traditional approaches. New methods and approaches are
                 now available. The strategic alignment framework
                 applies the strategic alignment model to reflect the
                 view that business success depends on the linkage of
                 business strategy information technology strategy,
                 organizational infrastructure and processes, and I/T
                 infrastructure and processes, and I/T infrastructure
                 and processes. The authors look at why it may not be
                 sufficient to work on any one of these areas in
                 isolation or to only harmonize business strategy and
                 information technology. One reason is that, often, too
                 much attention is placed on technology, rather than
                 business, management, and organizational issues. The
                 objective is to build an organizational structure and
                 set of business processes that reflect the
                 interdependence of enterprise strategy and information
                 technology capabilities. The attention paid to the
                 linkage of information technology to the enterprise can
                 significantly affect the competitiveness and efficiency
                 of the business. The essential issue is how information
                 technology can enable the achievement of competitive
                 and strategic advantage for the enterprise.",
  acknowledgement = ack-nhfb,
  affiliation =  "Adv. Bus. Inst., IBM Consulting Group, Palisades, NY,
                 USA",
  classification = "C0310 (EDP management); C6185 (Simulation
                 techniques); C7100 (Business and administration)",
  keywords =     "Business strategies; Business strategy; Business
                 success; Enterprise strategy; I/T infrastructure; I/T
                 strategies; Information technology capabilities;
                 Information technology strategy; Interdependence;
                 Organizational infrastructure; Organizational
                 structure; Strategic advantage; Strategic alignment
                 framework; Strategic alignment model; Strategic use",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Digital simulation; DP management; Information
                 systems",
}

@Article{Anonymous:1993:Ba,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "1",
  pages =        "222--227",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1993:Pb,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "2",
  pages =        "230--231",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hevner:1993:BMS,
  author =       "A. R. Hevner and H. D. Mills",
  title =        "Box-structured methods for systems development with
                 objects",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "2",
  pages =        "232--251",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5511.",
  abstract =     "Box structures provide a rigorous and systematic
                 process for performing systems development with
                 objects. Box structures represent data abstractions as
                 objects in three system views and combine the
                 advantages of structured development with the
                 advantages of object orientation. As data abstractions
                 become more complex, the box structure usage hierarchy
                 allows stepwise refinement of the system design with
                 referential transparency and verification at every
                 step. An integrated development environment based on
                 box structures supports flexible object-based systems
                 development patterns. The authors present a classic
                 example of object-based systems development using box
                 structures.",
  acknowledgement = ack-nhfb,
  affiliation =  "Coll. of Bus. and Manage., Maryland Univ., MD, USA",
  classification = "C6110J (Object-oriented programming)",
  keywords =     "Box structures; Data abstractions; Environment;
                 Integrated development; Object orientation;
                 Object-based systems development; Objects; Referential
                 transparency; Structured development; System design;
                 System views; Systems development; Verification",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Abstract data types; Object-oriented methods;
                 Structured programming",
}

@Article{McNutt:1993:ISC,
  author =       "B. McNutt",
  title =        "{I/O} subsystem configurations for {ESA}. {New} roles
                 for processor storage",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "2",
  pages =        "252--264",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5512.",
  abstract =     "I/O subsystem configurations are dictated by the
                 storage and I/O requirements of the specific
                 applications that use the disk hardware. Treating the
                 latter requirement as a given, however, draws a
                 boundary at the channel interface that is not
                 well-suited to the capabilities of the Enterprise
                 Systems Architecture (ESA). The architecture allows
                 hardware expenditures in the I/O subsystem to be
                 managed, while at the same time improving transaction
                 response time and system throughput capability, by a
                 strategy of processor buffering coupled with storage
                 control cache. The key is to control the aggregate time
                 per transaction spent waiting for physical disk motion.
                 The paper investigates how to think about and
                 accomplish such an objective. A case study, based on
                 data collected at large multiple virtual storage
                 installation, is used to investigate the potential
                 types and amounts of memory use by individual files,
                 both in storage control cache and in processor buffers.
                 The mechanism of interaction between the two memory
                 types is then examined and modeled so as to develop
                 broad guidelines for how best to deploy an overall
                 memory budget. These guidelines tend to contradict the
                 usual metrics of storage control cache effectiveness,
                 underscoring the need for an adjustment in pre-ESA
                 paradigms.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM ADSTAR, San Jose, CA, USA",
  classification = "C5310 (Storage system design); C5470 (Performance
                 evaluation and testing)",
  keywords =     "Channel interface; Disk hardware; Enterprise Systems
                 Architecture; ESA; I/O subsystem configurations; Memory
                 budget; Multiple virtual storage installation;
                 Processor buffering; Processor storage; Storage control
                 cache; Storage control cache effectiveness; System
                 throughput; Transaction response time",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Buffer storage; IBM computers; Memory architecture;
                 Performance evaluation; Virtual storage",
}

@Article{Raz:1993:IPM,
  author =       "T. Raz",
  title =        "Introduction of the project management discipline in a
                 software development organization",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "2",
  pages =        "265--277",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5513.",
  abstract =     "An approach to the introduction of the project
                 management discipline in a software development
                 organization is presented, with emphasis on the aspects
                 that can be generalized and adopted by other
                 organizations under similar circumstances. The
                 presentation includes the key elements of the approach
                 taken, the maturity scale used to guide the
                 introduction effort, a short description of the
                 education program developed specifically for this case,
                 a methodology for developing project models, and the
                 staff and support structure put in place. The paper
                 concludes by reporting the initial experience and
                 noting directions for future development.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Programming Syst., Roanoke, TX, USA",
  classification = "C0310F (Software development management)",
  keywords =     "Education program; Introduction effort; Maturity
                 scale; Project management; Project models; Software
                 development; Support structure",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Project management; Software engineering",
}

@Article{Stecher:1993:BBA,
  author =       "P. Stecher",
  title =        "Building business and application systems with the
                 {Retail Application Architecture}",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "2",
  pages =        "278--306",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5514.",
  abstract =     "An industry application architecture is a framework
                 for integrating applications and databases and can also
                 be used for analyzing and re-engineering the business
                 of an enterprise as a whole, provided it is structured
                 correctly. The paper describes the motivation,
                 structure, and possible uses of the Retail Application
                 Architecture (RAA). The core of RAA is a set of generic
                 enterprise models for companies in the retail and
                 wholesale distribution industry. RAA is oriented as
                 much to the business expert as to the information
                 systems (I/S) department. The goal of RAA is to
                 contribute to the task of building sound business
                 systems in a more efficient and effective manner.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Eurocoordination, Paris La Defense, France",
  classification = "C7180 (Retailing and distribution)",
  keywords =     "Application systems; Business expert; Business
                 systems; Databases; Generic enterprise models; Industry
                 application architecture; RAA; Retail Application
                 Architecture; Wholesale distribution",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Commerce; Distributive data processing; IBM computers;
                 Retail data processing",
}

@Article{Kamel:1993:SRH,
  author =       "M. S. Kamel and H. C. Shen and A. K. C. Wong and R. I.
                 Campeanu",
  title =        "System for the recognition of human faces",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "2",
  pages =        "307--320",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5515.",
  abstract =     "The paper describes a system for content-based
                 retrieval of facial images from an image database. The
                 system includes feature extraction based on
                 expert-assisted feature selection, spatial feature
                 measurement, feature and shape representation, feature
                 information compression, and organization, search
                 procedures, and pattern-matching techniques. The system
                 uses novel data structures to represent the extracted
                 information. These structures include attributed graphs
                 for representing local features and their
                 relationships, n-tuple of mixed mode data, and highly
                 compressed feature codes. For the retrieval phase, a
                 knowledge-directed search technique that uses a
                 hypothesis refinement approach extracts specific
                 features for candidate identification and retrieval.
                 The overall system, the components, and the methodology
                 are described. The system has been implemented on an
                 IBM Personal System/2 running Operating System/2.
                 Examples demonstrating the performance of the system
                 are included.",
  acknowledgement = ack-nhfb,
  affiliation =  "Waterloo Univ., Ont., Canada",
  classification = "C5260B (Computer vision and picture processing);
                 C6120 (File organisation); C6160S (Spatial and
                 pictorial databases); C6170 (Expert systems)",
  keywords =     "Attributed graphs; Compressed feature codes;
                 Content-based retrieval; Data structures;
                 Expert-assisted feature selection; Facial images;
                 Feature extraction; Feature information compression;
                 Human faces; Hypothesis refinement; IBM Personal
                 System/2; Image database; Knowledge-directed search
                 technique; Operating System/2; Pattern-matching; Search
                 procedures; Shape representation; Spacial feature
                 measurement",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Face recognition; Feature extraction; IBM computers;
                 Image coding; Knowledge based systems; Microcomputer
                 applications; Query processing; Spatial data
                 structures; Visual databases",
}

@Article{Longley:1993:TNC,
  author =       "D. Longley and S. M. Matyas",
  title =        "Technical note: Complementarity attacks and control
                 vectors",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "2",
  pages =        "321--325",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:36:36 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A control vector is a data structure that specifies
                 the nature and role of an associated cryptographic key.
                 The control vector is checked by software and
                 cryptographic hardware in order to limit the range of
                 permissible operations to be undertaken with ciphertext
                 produced with the key. The linking of the control
                 vector and cryptographic key is such that attempts to
                 modify, or substitute, control vectors will cause the
                 subsequent processing to operate with a corrupted key,
                 and hence ensure protection of data encrypted with the
                 genuine key. A potential attack on the control vector
                 approach is described in which the complement of the
                 control vector is substituted. The manner in which such
                 attacks are thwarted by the IBM implementation of
                 control vectors is also described.",
  acknowledgement = ack-nhfb,
  affiliation =  "Queensland Univ. of Technol., Brisbane, Qld.,
                 Australia",
  classification = "B6120B (Codes); C6120 (File organisation); C6130S
                 (Data security)",
  keywords =     "Ciphertext; Complementary attacks; Control vectors;
                 Cryptographic key; Data structure; IBM; Permissible
                 operations",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Cryptography; Data structures",
}

@Article{Anonymous:1993:Bb,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "2",
  pages =        "326--330",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1993:I,
  author =       "Anonymous",
  title =        "Index: 1989--1992",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "2",
  pages =        "331--344",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1993:A,
  author =       "Anonymous",
  title =        "Abstracts: 1989--1992",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "2",
  pages =        "345--372",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1993:Pc,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "3",
  pages =        "374--375",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Saracelli:1993:PAS,
  author =       "K. D. Saracelli and K. F. Bandat",
  title =        "Process automation in software application
                 development",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "3",
  pages =        "376--396",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5517.",
  abstract =     "Over the years, the field of application development
                 (AD) has evolved from that of an art form to being more
                 of a science, hence the emergence of concepts such as
                 information engineering. In engineering and scientific
                 fields, the value of process definition and management
                 has long been known. This paper discusses the
                 requirements for managing the AD process and
                 establishes the need for automated assistance for these
                 management activities. Considerations for an automated
                 system to manage the process are presented, and the
                 benefits to be realized by such an implementation are
                 then discussed.",
  acknowledgement = ack-nhfb,
  classification = "C6110B (Software engineering techniques); C7420
                 (Control engineering)",
  keywords =     "Automated assistance; Information engineering; Process
                 automation; Process definition; Software application
                 development",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Process computer control; Software engineering",
}

@Article{Hough:1993:RDE,
  author =       "D. Hough",
  title =        "{Rapid Delivery}: An evolutionary approach for
                 application development",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "3",
  pages =        "397--419",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5518.",
  abstract =     "From a historical vantage point, large application
                 development projects are frequently at risk of failure.
                 Applications are typically developed using a monolithic
                 development approach. Monolithic approaches generally
                 feature business-user-defined requirements that are
                 incorporated in the application but not evident until
                 the resulting application has been implemented. To
                 effectively produce new information systems, innovative
                 methods must be utilized. This paper provides
                 information about one of these, rapid delivery-a method
                 for developing applications that can evolve over time.
                 To fully understand the principles of rapid delivery, a
                 discussion is included that illuminates a
                 three-dimensional application model and its variations.
                 The application model helps in understanding
                 application segmentation, a technique used in rapid
                 delivery to break applications into a variety of
                 functional capabilities. After the development of each
                 application segment has been completed, it is
                 implemented to provide immediate benefit to the
                 enterprise; each application segment is added to the
                 evolving application and its every-expanding
                 capabilities. The result of using rapid delivery is an
                 enhanced ability to build applications that better
                 support the enterprise through a continuous stream of
                 delivered requirements, a reduction in the possibility
                 of project failure, and a diminished likelihood of
                 runaway projects.",
  acknowledgement = ack-nhfb,
  classification = "C6110B (Software engineering techniques)",
  keywords =     "Application development; Application segment;
                 Business-user-defined requirements; Evolutionary
                 approach; Information systems; Three-dimensional
                 application model",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Software engineering",
}

@Article{Cockburn:1993:IOA,
  author =       "A. A. R. Cockburn",
  title =        "The impact of object-orientation on application
                 development",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "3",
  pages =        "420--444",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5519.",
  abstract =     "Object-orientation introduces new deliverables,
                 notations, techniques, activities, and tools.
                 Application development consists not only of these
                 items but also of work segmentation scheduling, and
                 managing the sharing and evolution of deliverables.
                 This paper breaks application development into three
                 major components: construction, coordination, and
                 evolution, with the topic of reuse receiving extra
                 attention. It highlights four aspects of
                 object-orientation having impact: encapsulation,
                 anthropomorphic design, reuse with extensibility, and
                 incremental and iterative development.",
  acknowledgement = ack-nhfb,
  classification = "C6110B (Software engineering techniques); C6110J
                 (Object-oriented programming)",
  keywords =     "Anthropomorphic design; Application development;
                 Construction; Coordination; Deliverables;
                 Encapsulation; Iterative development; Notations;
                 Object-orientation; Reuse; Work segmentation
                 scheduling",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Object-oriented programming; Software engineering",
}

@Article{Walrad:1993:MKA,
  author =       "C. Walrad and E. Moss",
  title =        "Measurement: the key to application development
                 quality",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "3",
  pages =        "445--460",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:36:36 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5520.",
  abstract =     "Application development quality and productivity have
                 been identified as being among the top ten concerns of
                 information systems (I/S) executives in both 1991 and
                 1992. This paper discusses the role of measurement in
                 pursuit of I/S application development quality and
                 productivity. The relationships between productivity,
                 quality, and measurement are described, classes of
                 measures are identified, and `dominant measures' are
                 grouped according to the maturity levels defined by the
                 Software Engineering Institute's Capability Maturity
                 Model for Software. Also discussed are the
                 organizational and cultural issues associated with
                 instituting a measurement process.",
  acknowledgement = ack-nhfb,
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques)",
  keywords =     "Application development quality; Classes of measures;
                 Cultural issues; Dominant measures; Information
                 systems; Software quality measurement",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Quality control; Software quality",
}

@Article{Le:1993:PKE,
  author =       "A. V. Le and S. M. Matyas and D. B. Johnson and J. D.
                 Wilkins",
  title =        "A public key extension to the {Common Cryptographic
                 Architecture}",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "3",
  pages =        "461--485",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5521.",
  abstract =     "A new method for extending the IBM Common
                 Cryptographic Architecture (CCA) to include public key
                 cryptography is presented. The public key extension
                 provides nonrepudiation via digital signatures and an
                 electronic means to distribute data encryption
                 algorithm (DEA) key-encrypting keys in a hybrid data
                 encryption algorithm-public key algorithm (DEA-PKA)
                 cryptographic system. The improvements are based on a
                 novel method for extending the control vector concept
                 used in the IBM Common Cryptographic Architecture. Four
                 new key types that separate the public and private key
                 pairs into four classes according to their broad uses
                 within the cryptographic system are defined. The public
                 key extension to the CCA is implemented in the IBM
                 Transaction Security System (TSS). This paper discusses
                 both the public key extension to the CCA and the TSS
                 implementation of this architectural extension.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Federal Syst. Co., Manassas, VA, USA",
  classification = "C6130S (Data security)",
  keywords =     "Common Cryptographic Architecture; Control vector
                 concept; Data encryption algorithm; Digital signatures;
                 Hybrid data encryption algorithm; IBM Common
                 Cryptographic Architecture; IBM Transaction Security
                 System; Nonrepudiation; Public key extension",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Public key cryptography; Transaction processing",
}

@Article{Wothke:1993:MBA,
  author =       "K. Wothke",
  title =        "Morphologically based automatic phonetic
                 transcription",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "3",
  pages =        "486--511",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5522.",
  abstract =     "A system is described that automatically generates
                 phonetic transcriptions for German orthographic words.
                 The entire generative process consists of two main
                 steps. In the first step, the system segments the words
                 into their morphs, or prefixes, stems, and suffixes.
                 This segmentation is very important for the
                 transcription of German words, because the
                 pronunciation of the letters depends also on their
                 morphological environment. In the second step, the
                 system transcribes the morphologically segmented words.
                 Several transcriptions can be generated per word, thus
                 permitting the system to take pronunciation variants
                 into account. This feature results from the application
                 area of the system, which is the provision of phonetic
                 reference units for an automatic large-vocabulary
                 speech recognition system. Statistical evaluations show
                 that the transcription system has an excellent
                 linguistic performance: more than 99 percent of the
                 segmented words obtain a correct segmentation in the
                 first step, and more than 98 percent of the words
                 receive a correct phonetic transcription in the second
                 step.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Heidelberg Sci. Center, Germany",
  classification = "B6130 (Speech analysis and processing techniques);
                 C5260S (Speech processing); C6180N (Natural language
                 processing)",
  keywords =     "Automatic large-vocabulary speech recognition system;
                 German orthographic words; Linguistic performance;
                 Morphologically based automatic phonetic transcription;
                 Morphs; Phonetic reference units; Prefixes; Stems;
                 Suffixes",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Speech analysis and processing; Speech recognition",
}

@Article{Gladney:1993:SSI,
  author =       "H. M. Gladney",
  title =        "A storage subsystem for image and records management",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "3",
  pages =        "512--540",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5523.",
  abstract =     "Digital storage and communications are becoming cost
                 effective for massive collections of document images
                 with access not only for nearby users but also for
                 those who are hundreds of miles from their libraries.
                 The document storage subsystem (DocSS) provides generic
                 library services such as searching, storage, and
                 retrieval of document pages and sharing of objects with
                 appropriate data security and integrity safeguards. A
                 library session has three components: a manager of
                 remote catalogs, a set of managers of large-object
                 stores, and a manager of cache services. DocSS supports
                 all kinds of page data-text, pictures, spreadsheets,
                 graphics, programs-and can be extended to audio and
                 video data. Document models can be built as DocSS
                 applications; the paper describes a folder manager as
                 an example. What differentiates DocSS among digital
                 library projects is its approach to data distribution
                 over wide area networks, its client-server approach to
                 the heterogeneous environment, and its synergism with
                 other components of evolving open systems.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Almaden Res. Center, San Jose, CA, USA",
  classification = "C6130S (Data security); C7100 (Business and
                 administration); C7104 (Office automation); C7250
                 (Information storage and retrieval)",
  keywords =     "Cache services; Client-server approach; Data
                 distribution; Data security; Folder manager; Generic
                 library services; Graphics; Image and records
                 management; Integrity safeguards; Pictures; Remote
                 catalogs; Spreadsheets; Storage subsystem; Text; Wide
                 area networks",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Data integrity; Digital storage; Document image
                 processing; Information storage",
}

@Article{Anonymous:1993:Bc,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "3",
  pages =        "541--542",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1993:R,
  author =       "Anonymous",
  title =        "Referees",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "3",
  pages =        "543--544",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1993:Pd,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "4",
  pages =        "546--547",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Griss:1993:SRL,
  author =       "M. L. Griss",
  title =        "Software reuse: From library to factory",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "4",
  pages =        "548--566",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5524.",
  abstract =     "Systematic software reuse is a key business strategy
                 that software managers can employ to dramatically
                 improve their software development processes, to
                 decrease time-to-market and costs, and to improve
                 product quality. Effective reuse requires much more
                 than just code and library technology. We have learned
                 that careful consideration must be given to people,
                 process, and technology. One approach to the systematic
                 integration of these three elements is the concept of
                 the software factory. At Hewlett--Packard Co., we have
                 initiated a multifaceted corporate reuse program to
                 help introduce the best practices of systematic reuse
                 into the company, complemented by multidisciplinary
                 research to investigate and develop better methods for
                 domain-specific, reuse-based software engineering. This
                 essay discusses our experiences. Key aspects include
                 domain specific kits, business modeling, organization
                 design, and technology infrastructure for a flexible
                 software factory.",
  acknowledgement = ack-nhfb,
  affiliation =  "Hewlett--Packard Co., Palo Alto, CA, USA",
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques)",
  keywords =     "Business modeling; Costs; Domain specific kits;
                 Domain-specific reuse-based software engineering;
                 Flexible software factory; Key business strategy;
                 Multifaceted corporate reuse program; Organization
                 design; Product quality; Software development
                 processes; Systematic software reuse; Technology
                 infrastructure; Time-to-market",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "DP management; Software reusability",
}

@Article{Poulin:1993:BCS,
  author =       "J. S. Poulin and J. M. Caruso and D. R. Hancock",
  title =        "The business case for software reuse",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "4",
  pages =        "567--594",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5525.",
  abstract =     "To remain competitive, software development
                 organizations must reduce cycle time and cost, while at
                 the same time adding function and improving quality.
                 One potential solution lies in software reuse. Because
                 software reuse is not free, we must weigh the potential
                 benefits against the expenditures of time and resources
                 required to identify and integrate reusable software
                 into products. We first introduce software reuse
                 concepts and examine the cost-benefit trade-offs of
                 software reuse investments. We then provide a set of
                 metrics used by IBM to accurately reflect the effort
                 saved by reuse. We define reuse metrics that
                 distinguish the savings and benefits from those already
                 gained through accepted software engineering
                 techniques. When used with the return-on-investment
                 (ROI) model, these metrics can effectively establish a
                 sound business justification for reuse and can help
                 assess the success of organizational reuse programs.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Corp., Owego, NY, USA",
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques)",
  keywords =     "Business justification; Cost-benefit trade-offs; Cycle
                 time; Metrics; Organizational reuse programs; Quality;
                 Return-on-investment model; Reusable software; Software
                 development organizations; Software engineering
                 techniques; Software reuse",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Software cost estimation; Software metrics; Software
                 reusability",
}

@Article{Wasmund:1993:ICS,
  author =       "M. Wasmund",
  title =        "Implementing {Critical Success Factors} in software
                 reuse",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "4",
  pages =        "595--611",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5526.",
  abstract =     "Software reuse is one of several technologies that can
                 improve quality and effectiveness of software
                 development. The introduction of a reuse infrastructure
                 within an existing organization and the associated
                 modification of employee behavior and processes is a
                 complex interdisciplinary task. The structuring and
                 monitoring of several coordinated activities is
                 required in order to be successful. This paper
                 describes a practical application of the critical
                 success factors method on reuse technology insertion
                 into the software development process. The critical
                 success factors method has proved to be a useful means
                 for the introduction of software reuse concepts.
                 Application of the method and results are discussed in
                 detail, concluding with lessons learned and
                 recommendations for similar efforts.",
  acknowledgement = ack-nhfb,
  affiliation =  "Software Eng. Tools Dept., IBM Deutschland GmbH,
                 Boeblingen, Germany",
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques)",
  keywords =     "Critical success factors method; Employee behavior;
                 Quality; Reuse infrastructure; Software development;
                 Software reuse",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "DP management; Software reusability",
}

@Article{Tirso:1993:TFM,
  author =       "J. R. Tirso and H. Gregorius",
  title =        "Technical forum: Management of reuse at {IBM}",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "4",
  pages =        "612--615",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:24:00 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "To be successful, software reuse requires changes in
                 technology, process, and the software development
                 culture. Few major breakthroughs are necessary to
                 exploit software reuse today. Certain attributes of
                 software make it easier to reuse, and object-oriented
                 methodologies certainly facilitate reuse. However,
                 these are not necessary for reuse to take place. Our
                 experience shows that reuse can be accomplished
                 successfully in existing products using existing
                 techniques and knowledge. The progress being made in
                 this effort within IBM is very promising. When the
                 Reuse Technology Support Center was formed, it was
                 originally targeting five sites for support during that
                 first year. Currently there are close to 30 sites
                 worldwide involved with the Support Center. As may be
                 expected in such a large effort, the results are mixed.
                 The best programs are showing savings in the millions
                 of dollars and reuse has accounted for 20 to 30 percent
                 of the software. Some organizations have applied reuse
                 to allow them to include in their products a
                 functionality for which they had no prior capacity.
                 Some organizations are using high-quality reusable
                 parts, such as the building blocks from IBM Boblingen,
                 to actually improve their products. There have been
                 cases where the finely-tuned correct data abstractions
                 provided by the building blocks have exhibited better
                 performance characteristics than custom built data
                 structures. These projects have benefited from the
                 reduced maintenance costs as well as the improved
                 performance gained.",
  acknowledgement = ack-nhfb,
  affiliation =  "Personal Software Products Div., IBM Corp., Boca
                 Raton, FL, USA",
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques)",
  keywords =     "Custom built data structures; Finely-tuned correct
                 data abstractions; Improved performance; Maintenance
                 costs; Object-oriented methodologies; Software
                 development culture; Software reuse",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "DP management; Software reusability",
}

@Article{Yglesias:1993:TFI,
  author =       "K. P. Yglesias",
  title =        "Technical forum: Information reuse parallels software
                 reuse",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "4",
  pages =        "615--620",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:27:15 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Reusing information products can extend the effects
                 and benefits of the traditional corporate code reuse
                 program. Just as organizations leverage their software
                 modules and components in new applications, pieces of
                 information in such forms as text, graphics, and
                 hypermedia can find homes in subsequent products.
                 However, although software reuse has managed some
                 successes, information reuse remains in its infancy.
                 The need to establish a supporting organizational
                 framework, tools, and standards continues to pose
                 technical obstacles to information reuse. This article
                 outlines how the information reuse program at IBM built
                 on our software reuse experiences and begins to address
                 these obstacles. Although relatively young, information
                 reuse is a key part of our development process and
                 reuse program.",
  acknowledgement = ack-nhfb,
  affiliation =  "Large Scale Comput. Div., IBM Corp., Poughkeepsie, NY,
                 USA",
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques)",
  keywords =     "Corporate code reuse program; Graphics; Hypermedia;
                 Information product; Information reuse; Organizational
                 framework; Standards; Text; Tools",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "DP management; Information use; Software reusability;
                 System documentation",
}

@Article{Bauer:1993:TFA,
  author =       "D. Bauer",
  title =        "Technical forum: a reusable parts center",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "4",
  pages =        "620--624",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "The Reuse Technology Support Center was established to
                 coordinate and manage the reuse activities within IBM.
                 One component of the established reuse organization was
                 a Reusable Parts Technology Center in Boblingen,
                 Germany, with the mission to develop reusable software
                 parts and to advance the state-of-the-art in software
                 reuse. This article describes how the parts center
                 evolved and what experiences were gained by this
                 effort. During the creation and the establishment of
                 the parts center, our group discovered what language
                 features and what infrastructure were needed to enable
                 the building and the distribution of reusable
                 components. Many of the problems we had to solve were
                 caused by the inadequate support of reuse through the
                 language we initially used. Significant progress was
                 achieved when object-oriented languages like C++, which
                 support reuse inherently, became available. Our
                 experience showed that it is not enough to use an
                 object-oriented language to make reuse happen, but
                 high-quality class libraries are essential to get the
                 desired productivity improvements.",
  acknowledgement = ack-nhfb,
  affiliation =  "Large Scale Comput. Div., IBM Deutschland GmbH,
                 Boeblingen, Germany",
  classification = "C0310 (EDP management); C6110B (Software engineering
                 techniques)",
  keywords =     "C++; High-quality class libraries; IBM;
                 Infrastructure; Language features; Object-oriented
                 languages; Productivity; Reusable parts center;
                 Reusable Parts Technology Center; Reuse Technology
                 Support Center; Software reuse",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Research and development management; Software
                 reusability",
}

@Article{Shedletsky:1993:ARD,
  author =       "J. J. Shedletsky and J. J. Rofrano",
  title =        "Application reference designs for distributed
                 systems",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "4",
  pages =        "625--646",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5527.",
  abstract =     "This paper is based on the findings and conclusions of
                 a client/server work group that was commissioned in
                 1991 to report IBM's technical strategy for
                 client/server computing. Although there are countless
                 variations for designing applications and
                 interconnecting components in a distributed
                 environment, there seems to be a finite number of
                 variations that represent what a large majority of
                 customers want to build. The intent of the work group
                 was to explore the possibility of defining a set of
                 application `reference designs,' which would represent
                 the distributed designs that customers are building
                 today or want to build in the near future. This paper
                 documents the customer scenarios, the reference designs
                 that represent them and the requirements that were
                 generated for the underlying system software. The work
                 group concluded that the reference designs described
                 herein represent our best working assumption about
                 `where customers are going' with distributed
                 application designs. The discussion should give those
                 who have not yet begun to exploit distributed systems a
                 starting point and considerations for their design
                 work.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Corp., Somers, NY, USA",
  classification = "B6210L (Computer communications); C5620L (Local area
                 networks); C6150N (Distributed systems)",
  keywords =     "Application reference designs; Client/server
                 computing; Client/server work group; Distributed
                 application designs; Distributed systems;
                 Interconnecting components; System software",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Distributed processing; Local area networks; Network
                 operating systems",
}

@Article{deBry:1993:AFP,
  author =       "R. K. deBry and M. W. Munger",
  title =        "{Advanced Function Printing}\emdash From print to
                 presentation",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "4",
  pages =        "647--664",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5528.",
  abstract =     "The strength of advanced function printing (AFP) is
                 due largely to the architectures that form its
                 foundation. The architectures on which AFP is based
                 have been developed over the last 12 years and have
                 influenced the development of standards, competitive
                 architectures, and, most importantly, software inside
                 and outside IBM. Customers are demanding a more
                 comprehensive view of printing that includes easy
                 creation, viewing, and even specialized editing of
                 printable documents. These `next generation'
                 requirements are now being satisfied by software
                 products that are based on the existing architecture.
                 This paper describes some of these products and how
                 they use the architecture, and describes possible
                 future directions for AFP and related technologies.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Corp., Boulder, CO, USA",
  classification = "C5550 (Printers, plotters and other hard-copy output
                 devices); C6130D (Document processing techniques);
                 C6150E (General utility programs)",
  keywords =     "Advanced function printing; AFP; Competitive
                 architectures; IBM; Printable documents; Software
                 products; Standards",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Character sets; Document handling; Printing; Utility
                 programs",
}

@Article{Howarth:1993:CEA,
  author =       "R. J. Howarth and B. G. Platte",
  title =        "The continuing evolution of {Advanced Function
                 Printing}",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "4",
  pages =        "665--683",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5529.",
  abstract =     "Advanced function printing (AFP) has become one of the
                 de facto printing standards. It is a broad architecture
                 to support printing across an entire enterprise and
                 encompasses IBM architectures as well as industry
                 standards. AFP had its beginnings in the IBM System/370
                 environment in 1984 and has since expanded to include
                 midrange and local area network systems. Recently the
                 capabilities of AFP have been extended beyond printing
                 to include on-line viewing and management of
                 presentation data. This paper traces the continuing
                 evolution of AFP and its usage and how it is addressing
                 the presentation requirements of businesses in the
                 1990s.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Corp., Boulder, CO, USA",
  classification = "C5550 (Printers, plotters and other hard-copy output
                 devices); C6130D (Document processing techniques);
                 C6150E (General utility programs)",
  keywords =     "Advanced function printing; IBM architectures; IBM
                 System/370 environment; Industry standards; Local area
                 network; Presentation data; Printing standards",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Character sets; Document handling; Printing; Utility
                 programs",
}

@Article{Anonymous:1993:Bd,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "4",
  pages =        "684--686",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1993:CV,
  author =       "Anonymous",
  title =        "Contents of Volume 32, 1993",
  journal =      j-IBM-SYS-J,
  volume =       "32",
  number =       "4",
  pages =        "687--687",
  year =         "1993",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1994:Pa,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "1",
  pages =        "2--3",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj33-1.html#one",
  acknowledgement = ack-nhfb,
}

@Article{Kan:1994:SQO,
  author =       "S. H. Kan and V. R. Basili and L. N. Shapiro",
  title =        "Software quality: {An} overview from the perspective
                 of total quality management",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "1",
  pages =        "4--19",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5530.",
  URL =          "http://www.research.ibm.com/journal/sj33-1.html#two",
  abstract =     "This essay presents a tutorial that discusses software
                 quality in the context of total quality management
                 (TQM). Beginning with a historical perspective of
                 software engineering, the tutorial examines the
                 definition of software quality and discusses TQM as a
                 management philosophy along with its key elements:
                 customer focus, process improvement, the human side of
                 quality, and data, measurement, and analysis. It then
                 focuses on the software- development specifics and the
                 advancements made on many fronts that are related to
                 each of the TQM elements. In conclusion, key directions
                 for software quality improvements are summarized.",
  acknowledgement = ack-nhfb,
  affiliation =  "AS/400 Div., IBM Corp., Rochester, MN, USA",
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques)",
  keywords =     "Customer focus; Historical perspective; Human side;
                 Management philosophy; Software engineering; Software
                 quality; Software-development; Total quality
                 management; TQM; Tutorial",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "DP management; Software quality",
}

@Article{Mays:1994:FSB,
  author =       "R. G. Mays",
  title =        "Forging a silver bullet from the essence of software",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "1",
  pages =        "20--45",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5531.",
  URL =          "http://www.research.ibm.com/journal/sj33-1.html#three",
  abstract =     "Most improvements in software development technology
                 have occurred by eliminating the accidental aspects of
                 the technology. Further progress now depends on
                 addressing the essence of software. Fred Brooks (F. P.
                 Brooks, No Silver Bullet: Essence and Accidents of
                 Software Engineering, Computer, vol. 20, No. 4,
                 p.10-19, April 1987) has characterized the essence of
                 software as a complex construct of interlocking
                 concepts. He concludes that no silver bullet will
                 magically reduce the essential conceptual complexity of
                 software. This paper expands on Brooks's definition to
                 lay a foundation for forging a possible silver bullet.
                 The three essential attributes of software entities are
                 discussed from which a number of consequences arise in
                 software development (1) conceptual content, (2)
                 representation, and (3) multiple subdomains. Four basic
                 approaches to develop technologies are proposed that
                 directly address the essential attributes. Although
                 some of these technologies require additional
                 development or testing, they present the most promise
                 for forging a silver bullet. Among them, design
                 reabstraction addresses the most difficult attribute,
                 multiple subdomains, and the most difficult
                 consequence, enhancing existing code, making it the
                 best prospect.",
  acknowledgement = ack-nhfb,
  affiliation =  "Networking Software Div., IBM Corp., Research Triangle
                 Park, NC, USA",
  classification = "C6110B (Software engineering techniques)",
  keywords =     "Conceptual complexity; Conceptual content; Design
                 reabstraction; Essence of software; Multiple
                 subdomains; Representation; Silver bullet; Software
                 development; Software development technology",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Software engineering; Software metrics",
}

@Article{Billings:1994:JMS,
  author =       "C. Billings and J. Clifton and B. Kolkhorst and E. Lee
                 and W. B. Wingert",
  title =        "Journey to a mature software process",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "1",
  pages =        "46--61",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5532.",
  URL =          "http://www.research.ibm.com/journal/sj33-1.html#four",
  abstract =     "Development process maturity is strongly linked to the
                 success or failure of software projects. As the word
                 ``maturity'' implies, time and effort are necessary to
                 gain it. The Space Shuttle Onboard Software project has
                 been in existence for nearly 20 years. In 1989 the
                 project was rated at the highest level of the Software
                 Engineering Institute's Capability Maturity Model. The
                 high-quality software produced by the project is
                 directly linked to its maturity. This paper focuses on
                 the experiences of the Space Shuttle Onboard Software
                 project in the journey to process maturity and the
                 factors that have made it successful.",
  acknowledgement = ack-nhfb,
  affiliation =  "Federal Syst. Co., IBM Corp., Houston, TX, USA",
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques); C7460 (Aerospace
                 engineering)",
  keywords =     "Capability Maturity Model; Development process
                 maturity; High-quality software; Mature software
                 process; Process maturity; Software Engineering
                 Institute; Software project failure; Software project
                 success; Space Shuttle Onboard Software project; Time",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Aerospace computing; Project management; Software
                 quality; Space vehicles",
}

@Article{Kan:1994:ASQ,
  author =       "S. H. Kan and S. D. Dull and D. N. Amundson and R. J.
                 Lindner and R. J. Hedger",
  title =        "{AS}\slash 400 software quality management",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "1",
  pages =        "62--88",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:31:53 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5533.",
  URL =          "http://www.research.ibm.com/journal/sj33-1.html#five",
  abstract =     "This paper describes the software quality management
                 system for the Application System/400 (AS/400) computer
                 system. Key elements of the quality management system
                 such as customer satisfaction, product quality,
                 continuous process improvement, and people are
                 discussed. Based on empirical data, progress in several
                 quality parameters of the AS/400 software system are
                 examined. The quality action road map that describes
                 the various quality actions that were deployed is
                 presented, as are the other elements that enabled the
                 implementation of the quality management system.",
  acknowledgement = ack-nhfb,
  affiliation =  "AS/400 Div., IBM Corp., Rochester, MN, USA",
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques)",
  keywords =     "Application System/400; AS/400; Continuous process
                 improvement; Customer satisfaction; People; Product
                 quality; Quality action road map; Software quality
                 management system",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Human factors; IBM computers; Project management;
                 Software quality",
}

@Article{Hausler:1994:ACS,
  author =       "P. A. Hausler and R. C. Linger and C. J. Trammell",
  title =        "Adopting {Cleanroom} software engineering with a
                 phased approach",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "1",
  pages =        "89--109",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5534.",
  URL =          "http://www.research.ibm.com/journal/sj33-1.html#six",
  abstract =     "Cleanroom software engineering is a theory-based,
                 team-oriented engineering process for developing very
                 high quality software under statistical quality
                 control. The Cleanroom process combines formal methods
                 of object-based box structure specification and design,
                 function-theoretic correctness verification, and
                 statistical usage testing for reliability certification
                 to produce software approaching zero defects.
                 Management of the Cleanroom process is based on a life
                 cycle of development and certification of a pipeline of
                 user-function increments that accumulate into the final
                 product. Teams in IBM and other organizations that use
                 the process are achieving remarkable quality results
                 with high productivity. A phased implementation of the
                 Cleanroom process enables quality and productivity
                 improvements with an increased control of change. An
                 introductory implementation involves the application of
                 Cleanroom principles without the full formality of the
                 process; full implementation involves the comprehensive
                 use of formal Cleanroom methods; and advanced
                 implementation optimizes the process through additional
                 formal methods, reuse, and continual improvement. The
                 AOEXPERT/MVS* project, the largest IBM Cleanroom effort
                 to date, successfully applied an introductory level of
                 implementation. This paper presents both the
                 implementation strategy and the project results.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Corp., Bethesda, MD, USA",
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques); C6115 (Programming
                 support); C6150G (Diagnostic, testing, debugging and
                 evaluating systems)",
  keywords =     "AOEXPERT/MVS project; Cleanroom software engineering;
                 Function-theoretic correctness verification; IBM
                 project; Object-based box structure specification;
                 Phased approach; Reliability certification; Software
                 reuse; Statistical quality control; Statistical usage
                 testing; System design; Theory-based team-oriented
                 engineering process; Very high quality software",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Formal specification; Program testing; Software
                 quality; Software reliability; Software reusability",
}

@Article{OHare:1994:RAS,
  author =       "A. B. O'Hare and E. W. Troan",
  title =        "{RE-Analyzer}: From source code to structured
                 analysis",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "1",
  pages =        "110--130",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj33-1.html#seven",
  abstract =     "The RE-Analyzer is an automated, reverse engineering
                 system providing a high level of integration with a
                 computer-aided software engineering (CASE) tool.
                 Specifically, legacy code is transformed into
                 abstractions within a structured analysis methodology.
                 The abstractions are based on data flow diagrams, state
                 transition diagrams, and entity-relationship data
                 models. Since the resulting abstractions can be browsed
                 and modified within a CASE tool environment, a broad
                 range of software engineering activities are supported,
                 including program understanding, reengineering, and
                 redocumentation. In addition, diagram complexity is
                 reduced through the application of control
                 partitioning: an algorithmic technique for managing
                 complexity by partitioning source code modules into
                 smaller yet semantically coherent units. This approach
                 also preserves the information content of the original
                 source code. It is in contrast to other reverse
                 engineering techniques that produce only structure
                 charts and thus suffer from loss of information,
                 unmanaged complexity, and a lack of correspondence to
                 structured analysis abstractions. The RE-Analyzer has
                 been implemented and currently supports the reverse
                 engineering of software written in the C language. It
                 has been integrated with a CASE tool based on the VIEWS
                 method.",
  acknowledgement = ack-nhfb,
  affiliation =  "Networking Hardware Div., IBM Corp., Research Triangle
                 Park, NC, USA",
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques); C6115 (Programming
                 support)",
  keywords =     "C language; CASE; CASE tool; Computer-aided software
                 engineering; Control partitioning; Data flow diagrams;
                 Diagram complexity; Entity-relationship data models;
                 Legacy code; Program understanding; RE-Analyzer;
                 Redocumentation; Reengineering; Reverse engineering;
                 Reverse engineering system; Source code; State
                 transition diagrams; Structure charts; Structured
                 analysis; Structured analysis methodology; VIEWS
                 method",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "C language; Diagrams; Entity-relationship modelling;
                 Software engineering; Software tools",
}

@Article{Capper:1994:IOO,
  author =       "Nigel P. Capper and Roger J. Colgate and Jim C. Hunter
                 and Martin F. James",
  title =        "The impact of object-oriented technology on software
                 quality: {Three} case histories",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "1",
  pages =        "131--157",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:31:53 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5536.",
  URL =          "http://www.research.ibm.com/journal/sj33-1.html#eight",
  abstract =     "Techniques to obtain software quality are examined
                 from the experiences of three very different
                 object-oriented projects carried out by IBM Information
                 Solutions Limited in 1991 and 1992. Object-oriented
                 programming systems are sold on the promise of improved
                 productivity from object reuse and a high level of code
                 modularity. Yet it is precisely these aspects that also
                 lead to their greatest benefit, namely improved
                 software quality. In this paper, lessons learned from
                 the three projects are described and compared,
                 indicating approaches to consider in using
                 object-oriented technology.",
  acknowledgement = ack-nhfb,
  affiliation =  "Inf. Solutions Ltd., IBM Corp., Portsmouth, UK",
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques); C6110J
                 (Object-oriented programming)",
  keywords =     "Case histories; Code modularity; IBM Information
                 Solutions Limited; Object reuse; Object-oriented
                 programming systems; Object-oriented technology;
                 Productivity; Software quality",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Object-oriented programming; Software quality;
                 Software reusability",
}

@Article{Yakhnis:1994:DPU,
  author =       "V. R. Yakhnis and J. A. Farrell and S. S. Shultz",
  title =        "Deriving programs using generic algorithms",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "1",
  pages =        "158--181",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5537.",
  URL =          "http://www.research.ibm.com/journal/sj33-1.html#nine",
  abstract =     "We suggest a new approach to the derivation of
                 programs from their specifications. The formal
                 derivation and proof of programs as is practiced today
                 is a very powerful tool for the development of
                 high-quality software. However, its application by the
                 software development community has been slowed by the
                 amount of mathematical expertise needed to apply these
                 formal methods to complex projects and by the lack of
                 reuse within the framework of program derivation. To
                 address these problems, we have developed an approach
                 to formal derivation that employs the new concept of
                 generic algorithms. A generic algorithm is one that has
                 (1) a formal specification, (2) a proof that it
                 satisfies this specification, and (3) generic
                 identifiers representing types and operations. It may
                 have embedded program specifications or pseudocode
                 instructions describing the next steps in the stepwise
                 refinement process. Using generic algorithms, most
                 software developers need to know only how to pick and
                 adapt them, rather than perform more technically
                 challenging tasks such as finding loop invariants and
                 deriving loop programs. The adaptation consists of
                 replacing the generic identifiers by concrete types and
                 operations. Since each generic algorithm can be used in
                 the derivation of many different programs, this new
                 methodology provides the developer with a form of reuse
                 of program derivation techniques, correctness proofs,
                 and formal specifications.",
  abstract-2 =   "We suggest a new approach to the derivation of
                 programs from their specifications. This approach to
                 formal derivation employs the new concept of generic
                 algorithms. A generic algorithm is one that has: a
                 formal specification, a proof that it satisfies this
                 specification, and generic identifiers representing
                 types and operations. It may have embedded program
                 specifications or pseudocode instructions describing
                 the next steps in the stepwise refinement process.
                 Using generic algorithms, most software developers need
                 to know only how to pick and adapt them, rather than
                 perform more technically challenging tasks such as
                 finding loop invariants and deriving loop programs. The
                 adaptation consists of replacing the generic
                 identifiers by concrete types and operations. Since
                 each generic algorithm can be used in the derivation of
                 many different programs, this new methodology provides
                 the developer with a form of reuse of program
                 derivation techniques, correctness proofs, and formal
                 specifications.",
  acknowledgement = ack-nhfb,
  affiliation =  "Large Scale Comput. Div., IBM Corp., Endicott, NY,
                 USA",
  classification = "C4240 (Programming and algorithm theory); C6110B
                 (Software engineering techniques); C6120 (File
                 organisation); C6150G (Diagnostic, testing, debugging
                 and evaluating systems)",
  keywords =     "Concrete types; Correctness proofs; Embedded program
                 specifications; Formal derivation; Formal
                 specification; Generic algorithms; Generic identifiers;
                 Program derivation techniques; Proof; Pseudocode
                 instructions; Reuse; Software developers; Stepwise
                 refinement process",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Data structures; Formal specification; Program
                 verification; Programming theory",
}

@Article{Bhandari:1994:IPI,
  author =       "I. Bhandari and M. J. Halliday and J. Chaar and R.
                 Chillarege and K. Jones and J. S. Atkinson and C.
                 Lepori-Costello and P. Y. Jasper and E. D. Tarver and
                 C. C. Lewis and M. Yonezawa",
  title =        "In-process improvement through defect data
                 interpretation",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "1",
  pages =        "182--214",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:31:53 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5538.",
  URL =          "http://www.research.ibm.com/journal/sj33-1.html#ten",
  abstract =     "An approach that involves both automatic and human
                 interpretation to correct the software production
                 process during development is becoming important in IBM
                 as a means to improve quality and productivity. A key
                 step of the approach is the interpretation of defect
                 data by the project team. This paper uses examples of
                 such correction to evaluate and evolve the approach,
                 and to inform and teach those who will use the approach
                 in software development. The methodology is shown to
                 benefit different kinds of projects beyond what can be
                 achieved by current practices, and the collection of
                 examples discussed represents the experiences of using
                 a model of correction.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Thomas J. Watson Res. Center, Yorktown Heights,
                 NY, USA",
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques); C6150G (Diagnostic,
                 testing, debugging and evaluating systems)",
  keywords =     "Correction model; Defect data interpretation; Human
                 interpretation; IBM; In-process improvement;
                 Productivity; Project team; Quality; Software
                 development; Software production process",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Project management; Software quality;
                 Software reliability; System recovery",
}

@Article{Bencher:1994:PQI,
  author =       "D. L. Bencher",
  title =        "Technical forum: Programming quality improvement in
                 {IBM}",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "1",
  pages =        "215--219",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:31:53 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj33-1.html",
  abstract =     "A management system was established in IBM to improve
                 the quality of its software products, It represents a
                 nontraditional approach to quality improvement. The
                 approach is based on empowering programming development
                 teams, guided by a set of principles that were defined
                 by the programming community and driven by aggressive
                 goals established to improve quality and enhance
                 customer satisfaction. In turn the experiences of the
                 newly empowered teams led to a set of good programming
                 practices that were shared across the programming
                 community in IBM. The result has not only been a
                 dramatic improvement in the quality of IBM's program
                 products, but also the fostering of a work environment
                 based on creativity and excellence that engenders pride
                 of ownership for work performed.",
  acknowledgement = ack-nhfb,
  affiliation =  "Software Solutions Div., IBM Corp., Somers, NY, USA",
  classification = "C0310F (Software development management); C6110B
                 (Software engineering techniques)",
  keywords =     "Customer satisfaction; Good programming practices;
                 IBM; IBM program products; Nontraditional approach;
                 Programming community; Programming development teams;
                 Programming quality improvement; Software products;
                 Work environment",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Programming; Quality control; Software
                 quality; Software reliability",
}

@Article{Watkins:1994:TNR,
  author =       "A. J. Watkins",
  title =        "Technical note: On reliability modeling and software
                 quality",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "1",
  pages =        "220--222",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:31:53 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5539.",
  URL =          "http://www.research.ibm.com/journal/sj33-1.html#twelve",
  abstract =     "The note continues the recent discussion on
                 reliability modeling and its application in software
                 development by S. H. Kan (see ibid., no. 3, p. 351-62,
                 1991). We focus on the initial stages of a reliability
                 modeling process, as decisions here will often
                 influence the later stages of an analysis. We also
                 outline the use of the two-parameter Weibull
                 distribution as a fundamental part of the modeling
                 process, the estimation from field data of the
                 parameters thus introduced, the interpretation of these
                 results and further assessment possible with the field
                 data, and the potential consequence for subsequent
                 stages of the modeling process.",
  acknowledgement = ack-nhfb,
  affiliation =  "European Bus. Manage. Sch., Univ. Coll. of Swansea,
                 UK",
  classification = "C0310F (Software development management); C1140Z
                 (Other and miscellaneous)",
  keywords =     "Field data; Modeling process; Reliability modeling;
                 Software development; Software quality; Two-parameter
                 Weibull distribution",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Probability; Quality control; Software quality;
                 Software reliability",
}

@Article{Naeger:1994:BDI,
  author =       "R. D. Naeger",
  title =        "Books: {{\em Designing Interactive Multimedia\/}} by
                 {Arch C. Luther}",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "1",
  pages =        "223--224",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:32:20 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj33-2.html",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1994:Pb,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "2",
  pages =        "226--227",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj33-2.html#one",
  acknowledgement = ack-nhfb,
}

@Article{Bustamente:1994:DSA,
  author =       "G. G. Bustamente and K. Sorenson",
  title =        "Decision support at {Land's End} --- an evolution",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "2",
  pages =        "228--238",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5540.",
  URL =          "http://www.research.ibm.com/journal/sj33-2.html#two",
  abstract =     "A decision support system with over one billion rows
                 of data has been developed at Lands' End using the IBM
                 DATABASE 2* (DB2*) relational database management
                 system. This corporate database is a subset of an
                 Information Warehouse* framework and functions as both
                 a decision support system server and an application
                 enabler. The corporate database uses operational data
                 gathered from order processing and customer mailing
                 systems. Weekly processes reformat these real-time data
                 for loading into the corporate database. This paper
                 discusses some of the business requirements that guided
                 the development of the corporate database, and also
                 describes the database design process, tool selection,
                 and implementation experiences.",
  acknowledgement = ack-nhfb,
  affiliation =  "Land's End Inf. Services, Dodgeville, WI, USA",
  classification = "C6160D (Relational DBMS); C7102 (Decision support
                 systems)",
  keywords =     "Application enabler; Business requirements; Customer
                 mailing systems; Decision support system; IBM DATABASE
                 2; Implementation; Information Warehouse framework;
                 Order processing; Relational database management
                 system; Tool selection",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Decision support systems; Relational databases",
}

@Article{Schlatter:1994:BOM,
  author =       "M. Schlatter and R. Furegati and F. Jeger and H.
                 Schneider and H. Streckeisen",
  title =        "The {Business Object Management System}",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "2",
  pages =        "239--263",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5541.",
  URL =          "http://www.research.ibm.com/journal/sj33-2.html#three",
  abstract =     "The Business Object Management System (BOMS) is a
                 distributed resource manager that generalizes and
                 extends the concepts of shared corporate information to
                 include not only data that are structured such that the
                 data can be held in relational tables but also
                 generalized, complex business information objects. BOMS
                 allows enterprises to store, manage, and query the
                 totality of their documents, business transaction
                 records, images, etc., in a uniform and consistent way.
                 With this system, businesses can make more effective
                 use of information that has in the past been
                 inaccessible to thorough and systematic queries and
                 that could not be integrated effectively into existing
                 or new business processes. BOMS is targeted toward very
                 large collections of information objects (on the order
                 of a billion objects, equivalent to terabytes of data)
                 and allows enterprises to unlock information treasures
                 that would otherwise remain hidden in collections of
                 that size. BOMS is influenced by theoretical concepts,
                 such as object-orientation and hypermedia, but relies
                 on proven relational database and transaction
                 processing concepts. BOMS has been implemented with
                 DATABASE 2* (DB2*) and Customer Information Control
                 System/Enterprise Systems Architecture (CICS/ESA*) and
                 has been in productive use since 1991.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Switzerland, Zurich, Switzerland",
  classification = "C6150J (Operating systems); C6160D (Relational
                 DBMS); C7102 (Decision support systems)",
  keywords =     "Business Object Management System; Business
                 transaction records; Customer Information Control
                 System/Enterprise Systems Architecture; Distributed
                 resource manager; Hypermedia; Images;
                 Object-orientation; Relational database; Relational
                 tables; Shared corporate information; Transaction
                 processing",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Decision support systems; Relational databases;
                 Transaction processing",
}

@Article{Cheng:1994:ERD,
  author =       "J. M. Cheng and N. M. Mattos and D. D. Chamberlin and
                 L. G. DeMichiel",
  title =        "Extending relational database technology for new
                 applications",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "2",
  pages =        "264--279",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5542.",
  URL =          "http://www.research.ibm.com/journal/sj33-2.html#four",
  abstract =     "Relational database systems have been very successful
                 in meeting the needs of today's commercial
                 applications. However, emerging applications in
                 disciplines such as engineering design are now
                 generating new requirements for database functionality
                 and performance. This paper describes a set of
                 extensions to relational database technology, designed
                 to meet the requirements of the new generation of
                 applications. These extensions include a rich and
                 extensible type subsystem that is tightly integrated
                 into the Structured Query Language (SQL), a rules
                 subsystem to enforce global database semantics, and a
                 variety of performance enhancements. Many of the
                 extensions described here have been prototyped at the
                 IBM Database Technology Institute and in research
                 projects at the IBM Almaden Research Center in order to
                 demonstrate their feasibility and to validate their
                 design. Furthermore, many of these extensions are now
                 under consideration as part of the evolving American
                 National Standards Institute/International Organization
                 for Standardization (ANSI/ISO) standard for the SQL
                 database language.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Software Solutions Div., San Jose, CA, USA",
  classification = "C6140D (High level languages); C6160D (Relational
                 DBMS)",
  keywords =     "ANSI; Database functionality; Engineering design;
                 Performance; Relational database technology; Rules
                 subsystem; SO; Standard; Structured Query Language;
                 Type subsystem",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Relational databases; SQL; Standards",
}

@Article{Alfred:1994:MLO,
  author =       "C. Alfred",
  title =        "Maximizing leverage from an object database",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "2",
  pages =        "280--299",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5543.",
  URL =          "http://www.research.ibm.com/journal/sj33-2.html#five",
  abstract =     "With increasing frequency, object database management
                 systems (ODBMSs) are being used as a persistent storage
                 framework for applications. This paper shows that ODBMS
                 frameworks provide a natural repository for supporting
                 object-oriented systems, because they store and manage
                 objects as their atomic units. In addition, these
                 frameworks can offer a great deal of leverage to the
                 developers of applications with the integration of two
                 distinct paradigm shifts: the object-oriented
                 development model, and the direct-reference storage
                 model. Software developers who understand the
                 implications of both paradigm shifts are more likely to
                 use the technology effectively and realize most or all
                 of the potential leverage. Highlighted is ObjectStore**
                 from Object Design, Inc., which is available as part of
                 the IBM object database solution.",
  acknowledgement = ack-nhfb,
  affiliation =  "Object Design Inc., Burlington, MA, USA",
  classification = "C6120 (File organisation); C6160J (Object-oriented
                 databases)",
  keywords =     "Atomic units; Direct-reference storage model; Natural
                 repository; Object database management systems;
                 ObjectStore; Persistent storage framework",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Object-oriented databases; Storage management",
}

@Article{Singleton:1994:DAW,
  author =       "J. P. Singleton and M. M. Schwartz",
  title =        "Data access within the {Information Warehouse}
                 framework",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "2",
  pages =        "300--325",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5544.",
  URL =          "http://www.research.ibm.com/journal/sj33-2.html#six",
  abstract =     "IBM's Information Warehouse* framework provides a
                 basis for satisfying enterprise requirements for
                 effective use of business data resources. It includes
                 an architecture that defines the structure and
                 interfaces for integrated solutions and includes
                 products and services that can be used to create
                 solutions. This paper uses the Information Warehouse
                 architecture as a context to describe software
                 components that can be used for direct access to
                 formatted business data in a heterogeneous systems
                 environment. Concepts of independence between software
                 components and how this independence can provide
                 flexibility for change are discussed. The integration
                 of software from multiple vendors to create effective
                 solutions is a key emphasis of this paper.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Software Solutions, San Jose, CA, USA",
  classification = "C6160 (Database management systems (DBMS)); C7250
                 (Information storage and retrieval)",
  keywords =     "Business data resources; Enterprise requirements;
                 Heterogeneous systems environment; IBM's Information
                 Warehouse framework; Multiple vendors; Software
                 components; Software integration",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Database management systems; Information retrieval
                 systems",
}

@Article{Leymann:1994:MBP,
  author =       "F. Leymann and W. Altenhuber",
  title =        "Managing business processes as an information
                 resource",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "2",
  pages =        "326--348",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5545.",
  URL =          "http://www.research.ibm.com/journal/sj33-2.html#seven",
  abstract =     "The relevance of business processes as a major asset
                 of an enterprise is more and more accepted: Business
                 processes prescribe the way in which the resources of
                 an enterprise are used, i.e., they describe how an
                 enterprise will achieve its business goals.
                 Organizations typically prescribe how business
                 processes have to be performed, and they seek
                 information technology that supports these processes.
                 We describe a system that supports the two fundamental
                 aspects of business process management, namely the
                 modeling of processes and their execution. The
                 meta-model of our system deals with models of business
                 processes as weighted, colored, directed graphs of
                 activities; execution is performed by navigation
                 through the graphs according to a well-defined set of
                 rules. The architecture consists of a distributed
                 system with a client/server structure, and stores its
                 data in an object-oriented database system.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM German Software Dev. Lab., Boblingen, Germany",
  classification = "C6160J (Object-oriented databases); C7100 (Business
                 and administration)",
  keywords =     "Business processes management; Client/server
                 structure; Directed graphs; Distributed system;
                 Information resource; Information technology;
                 Meta-model; Object-oriented database system",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Object-oriented databases; Office automation",
}

@Article{Mohan:1994:PRD,
  author =       "C. Mohan and H. Pirahesh and W. G. Tang and Y. Wang",
  title =        "Parallelism in relational database management
                 systems",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "2",
  pages =        "349--371",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5546.",
  URL =          "http://www.research.ibm.com/journal/sj33-2.html#eight",
  abstract =     "In order to provide real-time responses to complex
                 queries involving large volumes of data, it has become
                 necessary to exploit parallelism in query processing.
                 This paper addresses the issues and solutions relating
                 to intraquery parallelism in a relational database
                 management system (DBMS). We provide a broad framework
                 for the study of the numerous issues that need to be
                 addressed in supporting parallelism efficiently and
                 flexibly. The alternatives for a parallel architecture
                 system are discussed, followed by the focus on how a
                 query can be parallelized and how that affects load
                 balancing of the different tasks created. The final
                 part of the paper contains information about how the
                 IBM DATABASE 2* (DB2*) Version 3 product provides
                 support for I/O parallelism to reduce response time for
                 data-intensive queries.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Almaden Res. Centre, San Jose, CA, USA",
  classification = "C6160D (Relational DBMS); C7250 (Information storage
                 and retrieval)",
  keywords =     "Complex queries; Data-intensive queries; IBM DATABASE
                 2; Parallelism; Query processing; Real-time responses;
                 Relational database management systems; Version 3",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Query processing; Relational databases",
}

@Article{McQuilken:1994:BDC,
  author =       "George McQuilken",
  title =        "Books: {{\em Distributed Computing Environments\/}} by
                 {Daniel Cerutti} and {Donna Pierson}",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "2",
  pages =        "372--373",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:33:14 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj33-2.html",
  acknowledgement = ack-nhfb,
}

@Article{Lorin:1994:BEC,
  author =       "Harold Lorin",
  title =        "Books: {{\em Enterprise Computing}} and {{\em
                 Implementing the Enterprise\/}} by {Alan R. Simon}",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "2",
  pages =        "373--375",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:33:00 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj33-2.html",
  acknowledgement = ack-nhfb,
}

@Article{Lorin:1994:BCD,
  author =       "Harold Lorin",
  title =        "Books: {{\em Centralized and Distributed Operating
                 Systems\/}} by {Gary J. Nutt}",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "2",
  pages =        "375--377",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:33:03 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj33-2.html",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1994:Pc,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "3",
  pages =        "380--381",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj33-3.html#one",
  acknowledgement = ack-nhfb,
}

@Article{Slonim:1994:CAS,
  author =       "J. Slonim and M. A. Bauer and P.-{\AA}. Larson and J.
                 Schwarz and C. Butler and E. B. Buss and D. Sabbah",
  title =        "The {Centre for Advanced Studies}: a model for
                 applied research and development",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "3",
  pages =        "382--398",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5547.",
  URL =          "http://www.research.ibm.com/journal/sj33-3.html#two",
  abstract =     "The Centre for Advanced Studies (CAS) is an applied
                 research centre formed in 1990 within the IBM Toronto
                 Software Solutions Laboratory. Its primary aim is to
                 facilitate the transfer of research ideas into the
                 various product groups of the laboratory. Although we
                 are still learning how to make CAS operate more
                 effectively, and it is too early to assess its
                 long-term success, the model for CAS has proved to be
                 workable. The primary partners, namely the IBM Toronto
                 Software Solutions Laboratory, the IBM research
                 community, universities in North America, and
                 government agencies that support collaborative
                 research, have found it a viable approach. As an
                 overview, this essay provides some background to the
                 formation of the centre, describes some of the
                 challenges deemed important in defining the role of the
                 centre, identifies a number of principles that are used
                 to guide its formation and current operation, and
                 reports on its progress. We conclude with a discussion
                 of some lessons learned in the operation of the centre
                 to date and identify future activities and directions
                 for the centre.",
  acknowledgement = ack-nhfb,
  affiliation =  "Software Solutions Div., IBM Canada Ltd., North York,
                 Ont., Canada",
  classification = "C0200 (General computer topics); C0310 (EDP
                 management)",
  keywords =     "Applied research; Applied research centre; CAS; Centre
                 for Advanced Studies; Collaborative research; Future
                 activities; Government agencies; IBM Toronto Software
                 Solutions Laboratory; Long-term success; Product
                 groups; Research ideas",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "DP industry; Research and development management",
}

@Article{Bauer:1994:DSA,
  author =       "M. A. Bauer and N. Coburn and D. L. Erickson and P. J.
                 Finnigan and J. W. Hong and P.-A. Larson and J. Pachl
                 and J. Slonim and D. J. Taylor and T. J. Teorey",
  title =        "A distributed system architecture for a distributed
                 application environment",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "3",
  pages =        "399--425",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5548.",
  URL =          "http://www.research.ibm.com/journal/sj33-3.html#three",
  abstract =     "Advances in communications technology, development of
                 powerful desktop workstations, and increased user
                 demands for sophisticated applications are rapidly
                 changing computing from a traditional centralized model
                 to a distributed one. The tools and services for
                 supporting the design, development, deployment, and
                 management of applications in such an environment must
                 change as well. This paper is concerned with the
                 architecture and framework of services required to
                 support distributed applications through this evolution
                 to new environments. In particular, the paper outlines
                 our rationale for a peer-to-peer view of distributed
                 systems, presents motivation for our research
                 directions, describes an architecture, and reports on
                 some preliminary experiences with a prototype system.",
  acknowledgement = ack-nhfb,
  affiliation =  "Dept. of Comput. Sci., Univ. of Western Ontario,
                 London, Ont., Canada",
  classification = "C0310 (EDP management); C5220P (Parallel
                 architecture); C5620 (Computer networks and
                 techniques); C6150N (Distributed systems)",
  keywords =     "Communications technology; Distributed application
                 environment; Distributed system architecture; New
                 environments; Peer-to-peer view; Powerful desktop
                 workstations; Prototype system; Research directions;
                 Sophisticated applications; User demands",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Distributed processing; Research and development
                 management",
}

@Article{Bauer:1994:RAD,
  author =       "M. A. Bauer and P. J. Finnigan and J. W. Hong and J.
                 A. Rolia and T. J. Teorey and G. A. Winters",
  title =        "Reference architecture for distributed systems
                 management",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "3",
  pages =        "426--444",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5549.",
  URL =          "http://www.research.ibm.com/journal/sj33-3.html#four",
  abstract =     "Management of computing systems is needed to ensure
                 efficient use of resources and provide reliable and
                 timely service to users. Distributed systems are much
                 more difficult to manage because of their size and
                 complexity, and they require a new approach. A
                 reference architecture for distributed systems
                 management is proposed that integrates system
                 monitoring, information management, and system modeling
                 techniques. Three classes of system
                 management---network services and devices, operating
                 system services and resources, and user applications
                 are defined within this framework, and a detailed
                 hospital application is presented to clarify the
                 requirements for managing applications. It is argued
                 that the performance management of distributed
                 applications must be considered from all three
                 perspectives. Several management prototypes under study
                 within the COnsortium for Research on Distributed
                 Systems (CORDS) are described to illustrate how such an
                 architecture could be realized.",
  acknowledgement = ack-nhfb,
  affiliation =  "Dept. of Comput. Sci., Univ. of Western Ontario,
                 London, Ont., Canada",
  classification = "B6210C (Network management); B6210L (Computer
                 communications); C5620 (Computer networks and
                 techniques); C6150G (Diagnostic, testing, debugging and
                 evaluating systems); C6150N (Distributed systems);
                 C7140 (Medical administration)",
  keywords =     "Consortium for Research on Distributed Systems; CORDS;
                 Distributed applications; Distributed systems
                 management; Hospital application; Information
                 management; Network services; Operating system
                 services; Performance management; Reference
                 architecture; System modeling techniques; System
                 monitoring; Timely service; User applications",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Distributed processing; Medical administrative data
                 processing; System monitoring; Telecommunication
                 network management",
}

@Article{Tai:1994:EPB,
  author =       "K.-C. Tai and M. A. Vouk and A. M. Paradkar and P.
                 Lu",
  title =        "Evaluation of a predicate-based software testing
                 strategy",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "3",
  pages =        "445--457",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5550.",
  URL =          "http://www.research.ibm.com/journal/sj33-3.html#five",
  abstract =     "In this paper, we report the results of four empirical
                 studies for evaluating a predicate-based software
                 testing strategy, called BOR (Boolean operator)
                 testing. The BOR testing strategy focuses on the
                 detection of Boolean operator faults in a predicate,
                 including incorrect AND/OR operators and missing or
                 extra NOT operators. Our empirical studies involved
                 comparisons of BOR testing with several other
                 predicate-based testing strategies, using Boolean
                 expressions, a real-time control system, and a set of
                 N-version programs. For program-based test generation,
                 BOR testing was applied to predicates in a program. For
                 specification-based test generation, BOR testing was
                 applied to cause-effect graphs representing software
                 specification. The results of our studies indicate that
                 BOR testing is practical and effective for both
                 specification- and program-based test generation.",
  acknowledgement = ack-nhfb,
  affiliation =  "Dept. of Comput. Sci., North Carolina State Univ.,
                 Raleigh, NC, USA",
  classification = "C6110B (Software engineering techniques); C6150G
                 (Diagnostic, testing, debugging and evaluating
                 systems)",
  keywords =     "Boolean operator; BOR; BOR testing strategy;
                 Cause-effect graphs; Incorrect AND/OR operators;
                 N-version programs; NOT operators; Predicate-based
                 software testing strategy; Real-time control system;
                 Software specification; Specification-based test
                 generation",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Boolean functions; Formal specification; Program
                 testing",
}

@Article{Consens:1994:AAH,
  author =       "M. P. Consens and F. Ch. Eigler and M. Z. Hasan and A.
                 O. Mendelzon and E. G. Noik and A. G. Ryman and D.
                 Vista",
  title =        "Architecture and applications of the Hy${}+$
                 visualization system",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "3",
  pages =        "458--476",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5551.",
  URL =          "http://www.research.ibm.com/journal/sj33-3.html#six",
  abstract =     "The Hy${}+$ system is a generic visualization tool
                 that supports a novel visual query language called
                 GraphLog. In Hy${}+$, visualizations are based on a
                 graphical formalism that allows comprehensible
                 representations of databases, queries, and query
                 answers to be interactively manipulated. This paper
                 describes the design, architecture, and features of
                 Hy${}+$ with a number of applications in software
                 engineering and network management.",
  acknowledgement = ack-nhfb,
  affiliation =  "Dept. of Comput. Sci., Waterloo Univ., Ont., Canada",
  classification = "C6140D (High level languages); C6160 (Database
                 management systems (DBMS)); C6180 (User interfaces)",
  keywords =     "Generic visualization tool; Graphical formalism;
                 GraphLog; Hy/sup +/ visualization system; Network
                 management; Software engineering; Visual query
                 language",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Database management systems; Query languages; Query
                 processing; Software engineering; User interfaces;
                 Visual languages",
}

@Article{Buss:1994:IRE,
  author =       "E. Buss and R. {De Mori} and W. M. Gentleman and J.
                 Henshaw and H. Johnson and K. Kontogiannis and E. Merlo
                 and H. A. Muller and J. Mylopoulos and S. Paul and A.
                 Prakash and M. Stanley and S. R. Tilley and J. Troster
                 and K. Wong",
  title =        "Investigating reverse engineering technologies for the
                 {CAS} program understanding project",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "3",
  pages =        "477--500",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5552.",
  URL =          "http://www.research.ibm.com/journal/sj33-3.html#seven",
  abstract =     "Corporations face mounting maintenance and
                 re-engineering costs for large legacy systems. Evolving
                 over several years, these systems embody substantial
                 corporate knowledge, including requirements, design
                 decisions, and business rules. Such knowledge is
                 difficult to recover after many years of operation,
                 evolution, and personnel change. To address the problem
                 of program understanding, software engineers are
                 spending an ever-growing amount of effort on reverse
                 engineering technologies. This paper describes the
                 scope and results of an ongoing research project on
                 program understanding undertaken by the IBM Toronto
                 Software Solutions Laboratory Centre for Advanced
                 Studies (CAS). The project involves a team from CAS and
                 five research groups working cooperatively on
                 complementary reverse engineering approaches. All the
                 groups are using the source code of SQL/DS* (a
                 multimillion-line relational database system) as the
                 reference legacy system. Also discussed is an approach
                 adopted to integrate the various tools under a single
                 reverse engineering environment.",
  acknowledgement = ack-nhfb,
  affiliation =  "Software Solutions Div., IBM Canada Ltd., North York,
                 Ont., Canada",
  classification = "C6110B (Software engineering techniques); C6115
                 (Programming support); C6150G (Diagnostic, testing,
                 debugging and evaluating systems)",
  keywords =     "Business roles; CAS program understanding project;
                 Corporate knowledge; Design decisions; Legacy systems;
                 Personnel change; Program understanding; Relational
                 database system; Requirements; Reverse engineering
                 environment; Reverse engineering technologies; SQL/DS",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Program diagnostics; Software maintenance; Software
                 tools; Systems analysis",
}

@Article{Heineman:1994:ETS,
  author =       "G. T. Heineman and J. E. Botsford and G. Caldiera and
                 G. E. Kaiser and M. I. Kellner and N. H. Madhavji",
  title =        "Emerging technologies that support a software process
                 life cycle",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "3",
  pages =        "501--529",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5553.",
  URL =          "http://www.research.ibm.com/journal/sj33-3.html#eight",
  abstract =     "The goal of developing quality software can be
                 achieved by focusing on the improvement of both product
                 quality and process quality. While the traditional
                 focus has been on product quality, there is an
                 increased awareness of the benefits of improving the
                 quality of the processes used to develop and support
                 those products. These processes are key elements in
                 understanding and improving the practice of software
                 engineering. In this paper, existing objectives for the
                 development and application of models of software
                 processes are restated, and current research sponsored
                 by the IBM Centre for Advanced Studies (CAS) is
                 discussed as it applies to furthering each of the
                 objectives. A framework is also presented that relates
                 the research work to the various sectors of a software
                 process life cycle. The on-going research involves four
                 universities, CAS, and collaboration with IBM Toronto
                 Laboratory developers.",
  acknowledgement = ack-nhfb,
  affiliation =  "Dept. of Comput. Sci., Columbia Univ., New York, NY,
                 USA",
  classification = "C6110B (Software engineering techniques); C6115
                 (Programming support)",
  keywords =     "Code reviews; IBM Centre for Advanced Studies; Process
                 quality; Product quality; Quality software; Software
                 engineering; Software process life cycle",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Software engineering; Software quality; Software
                 tools",
}

@Article{Watson:1994:BVC,
  author =       "D. Watson",
  title =        "Books: {{\em Visual Cues: Practical Data
                 Visualization\/}} by {Peter R. Keller} and {Mary M.
                 Keller}",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "3",
  pages =        "530--531",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:33:23 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj33-3.html",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1994:Pd,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "4",
  pages =        "536--536",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj33-4.html#one",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1994:UI,
  author =       "Anonymous",
  title =        "Using the index",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "4",
  pages =        "537--537",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1994:AI,
  author =       "Anonymous",
  title =        "Author index: 1962--1994",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "4",
  pages =        "540--562",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1994:SI,
  author =       "Anonymous",
  title =        "Subject index: 1962--1994",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "4",
  pages =        "564--587",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1994:A,
  author =       "Anonymous",
  title =        "Abstracts: 1962--1994",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "4",
  pages =        "590--689",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Davis:1994:AGI,
  author =       "A. G. Davis and J. R. Friedman and C. R. Seddon",
  title =        "Author guidelines for the {IBM Systems Journal}",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "4",
  pages =        "692--699",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "G321-5554.",
  URL =          "http://www.research.ibm.com/journal/sjaulong.html",
  acknowledgement = ack-nhfb,
}

@Article{Stierhoff:1994:SR,
  author =       "George C. Stierhoff",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "33",
  number =       "4",
  pages =        "700--701",
  year =         "1994",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1995:Pa,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "1",
  pages =        "2--3",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-1.html#one",
  acknowledgement = ack-nhfb,
}

@Article{DiAngelo:1995:CPB,
  author =       "M. F. DiAngelo and C. J. Petrun",
  title =        "Collecting product-based usability requirements",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "1",
  pages =        "4--19",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-1.html#two",
  abstract =     "Customer requirements play an essential role in
                 product development. Accurate definition and assessment
                 of customer needs and wants form the basis for product
                 offerings. Functional requirements have always been
                 central to product definition, and several methods are
                 available to determine required function. Emphasis on
                 product usability and the end-user interface is
                 continuing to increase as computer products are more
                 widely used. This paper describes a
                 requirements-gathering methodology that focuses on
                 usability and user requirements. The `customer
                 requirements and task specification method' was
                 developed over the last six years to meet the growing
                 need for more precise user requirements. Each of the
                 major steps is discussed, as is the role of
                 computer-supported cooperative work techniques. Summary
                 findings from a broad cross-section of customers are
                 presented.",
  acknowledgement = ack-nhfb,
  affiliation =  "Intelligent Commun. Div., IBM Corp., Boca Raton, FL,
                 USA",
  classification = "C0200 (General computer topics); C0310 (EDP
                 management)",
  keywords =     "Computer products; Computer-supported cooperative
                 work; Customer requirements; End-user interface;
                 Functional requirements; Product definition; Product
                 development; Product-based usability requirements;
                 Requirements-gathering methodology; Task specification;
                 User requirements",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "DP industry; DP management; Groupware; Marketing;
                 Product development; User centred design",
}

@Article{Schoch:1995:RSC,
  author =       "D. J. Schoch and P. A. Laplante",
  title =        "A real-time systems context for the framework for
                 information systems architecture",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "1",
  pages =        "20--38",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:27:05 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-1.html#three",
  abstract =     "In this paper we review the framework for information
                 systems architecture first introduced by J. A. Zachman
                 (ibid., vol. 26, no. 3, pp. 276--292, 1987) and show
                 how it can be applied in the context of real-time
                 systems. Discussions are included throughout the paper
                 to convey some of the characteristics unique to
                 real-time systems and to point out areas of special
                 architectural concern.",
  acknowledgement = ack-nhfb,
  affiliation =  "AT and T Cor., Morristown, NJ, USA",
  classification = "C6110B (Software engineering techniques)",
  keywords =     "Information systems architecture; Real-time systems",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Information systems; Real-time systems; Software
                 engineering",
}

@Article{Attaluri:1995:CMP,
  author =       "G. K. Attaluri and D. P. Bradshaw and N. Coburn and P.
                 A. Larson and P. Martin and A. Silberschatz and J.
                 Slonim and Q. Zhu",
  title =        "The {CORDS} multidatabase project",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "1",
  pages =        "39--62",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-1.html#four",
  abstract =     "In virtually every organization, data are stored in a
                 variety of ways and managed by different database and
                 file systems. Applications requiring data from multiple
                 sources must recognize and deal with the specifics of
                 each data source and must also perform any necessary
                 data integration. The objective of a multidatabase
                 system is to provide application developers and end
                 users with an integrated view of and a uniform
                 interface to all the required data. The view and the
                 interface should be independent of where the data are
                 stored and how the data are managed. CORDS (COnsortium
                 for Research on Distributed Systems) is a research
                 project focused on distributed applications. As part of
                 this project, we are designing and prototyping a
                 multidatabase system. This paper provides an overview
                 of the system architecture and describes the approaches
                 taken in the following areas: management of catalog
                 information, schema integration, global query
                 optimization, (distributed) transaction management, and
                 interactions with component data sources. The prototype
                 system gives application developers a view of a single
                 relational database system. Currently supported
                 component data sources include several relational
                 database systems, a hierarchical database system, and a
                 network database system.",
  acknowledgement = ack-nhfb,
  affiliation =  "Dept. of Comput. Sci., Waterloo Univ., Ont., Canada",
  classification = "C0310F (Software development management); C6160B
                 (Distributed databases)",
  keywords =     "Application developers; Catalog information
                 management; Component data source interactions; CORDS
                 multidatabase project; Distributed applications;
                 Distributed transaction management; Global query
                 optimization; Hierarchical database system; Integrated
                 view; Network database system; Prototyping; Relational
                 database system; Schema integration; System
                 architecture; Uniform interface",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Cataloguing; Distributed databases; Query processing;
                 Research initiatives; Software development management;
                 Software prototyping; Transaction processing",
}

@Article{Debelack:1995:NGA,
  author =       "A. S. Debelack and J. D. Dehn and L. L. Muchinsky and
                 D. M. Smith",
  title =        "Next generation air traffic control automation",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "1",
  pages =        "63--77",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-1.html#five",
  abstract =     "The automation of air traffic control (ATC)
                 applications has challenged the technologies
                 traditionally used for building and testing large data
                 processing systems. These systems are characterized by
                 complex applications, extensive external and user
                 interfaces, and rapidly changing functional
                 requirements. The Advanced Automation System (AAS) of
                 the Federal Aviation Administration combines high
                 availability, extensibility, and extraordinary
                 functionality into a single distributed system, running
                 at multiple locations. By requirement, the AAS must
                 execute continuously without error, without
                 interruption for upgrades or maintenance, and with the
                 complete trust and confidence of air traffic
                 controllers using it at over twenty centers. Each ATC
                 center uses the same application software coupled with
                 varying quantities of hardware and an extensive base of
                 data to tailor the center to its unique geography and
                 operational procedures. In this paper, we describe the
                 characteristics and architecture of the AAS and focus
                 on key mechanisms of availability and extensibility.",
  acknowledgement = ack-nhfb,
  affiliation =  "Loral Federal Syst., Rockville, MD, USA",
  classification = "C3360L (Aerospace control); C6150N (Distributed
                 systems software); C6180 (User interfaces); C7420
                 (Control engineering computing); C7460 (Aerospace
                 engineering computing)",
  keywords =     "Advanced Automation System; Air traffic control
                 automation; Availability; Continuous operation;
                 Distributed system; Extensibility; External interfaces;
                 Federal Aviation Administration; Functional
                 requirements; Large data processing systems;
                 Operational procedures; Trustable system; User
                 interfaces",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Air traffic control; Distributed processing; User
                 interfaces",
}

@Article{Elofson:1995:IAE,
  author =       "G. Elofson",
  title =        "Intelligent agents extend knowledge-based systems
                 feasibility",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "1",
  pages =        "78--95",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-1.html#six",
  abstract =     "Episodic classification problems are the transient
                 responsibilities of the knowledge worker---growing and
                 then receding in importance over time. Typically,
                 episodic classification problems do not conform to
                 traditional expert system solutions, and they require
                 specialized architectures to offer decision support and
                 increased span of control for those individuals whose
                 task is expediting the problems. This paper describes a
                 system for addressing episodic classification problems,
                 giving appropriate functional and technical detail, and
                 continues by illustrating the effectiveness of the
                 system through a case study of use of the system.",
  acknowledgement = ack-nhfb,
  affiliation =  "Emory Bus. Sch., Emory Univ., Atlanta, GA, USA",
  classification = "C6170 (Expert systems); C7102 (Decision support
                 systems)",
  keywords =     "Case study; Decision support; Effectiveness; Episodic
                 classification problems; Expert system solutions;
                 Intelligent agents; Knowledge worker; Knowledge-based
                 systems feasibility; Span of control; Specialized
                 architectures; Transient responsibilities",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Decision support systems; Knowledge based systems;
                 Pattern classification",
}

@Article{Hayne:1995:EOG,
  author =       "S. C. Hayne and M. Pendergast",
  title =        "Experiences with object-oriented group support
                 software development",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "1",
  pages =        "96--119",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:27:05 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-1.html#seven",
  abstract =     "This paper describes practical design and
                 implementation experiences gained when creating Group
                 Support Systems (GSS) in a networked personal computer
                 environment. Examples of GSS based on the shared
                 context model and implemented using C, C++, and Actor
                 languages are presented. Graphical user interfaces and
                 multitasking extend traditional methods for supporting
                 group work. An object-oriented communication system is
                 introduced comprised of objects that provide support
                 for all inter- and intraprocessor communications
                 between the GSS applications. Multiple levels of data
                 service are provided to maintain shared data,
                 coordinate user views, and transmit cursor positions in
                 a convenient and efficient manner. The applications
                 presented not only demonstrate the viability of
                 implementing GSS on personal computer-based systems,
                 but also show the ability to develop complex
                 applications in different programming environments that
                 make use of common routines. The unique properties of
                 the object-oriented paradigm greatly facilitate the
                 creation and use of Group Support Systems.",
  acknowledgement = ack-nhfb,
  affiliation =  "Bus. Programs, Arizona State Univ., Phoenix, AZ, USA",
  classification = "C6110J (Object-oriented programming); C6115
                 (Programming support); C6130G (Groupware); C6180G
                 (Graphical user interfaces); C7102 (Decision support
                 systems)",
  keywords =     "Actor language; C language; C++ language; Common
                 routines; Coordinated user views; Cursor positions;
                 Graphical user interfaces; Group support systems;
                 Interprocessor communications; Intraprocessor
                 communications; Multiple data service levels;
                 Multitasking; Networked personal computer environment;
                 Object-oriented communication system; Object-oriented
                 group support software development; Programming
                 environments; Shared context model",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Graphical user interfaces; Group decision support
                 systems; Multiprogramming; Object-oriented programming;
                 Programming environments",
}

@Article{Arjomandi:1995:ACI,
  author =       "E. Arjomandi and W. O'Farrell and I. Kalas and G.
                 Koblents and F. C. Eigler and G. R. Gao",
  title =        "{ABC}++: concurrency by inheritance in {C}++",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "1",
  pages =        "120--137",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:27:05 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-1.html#eight",
  abstract =     "Many attempts have been made to add concurrency to
                 C++, often by extensive compiler extensions, but much
                 of the work has not exploited the power of C++. This
                 paper shows how the object-oriented facilities of C++
                 are powerful enough to encapsulate concurrency creation
                 and control. We have developed a concurrent C++-based
                 prototype system (ABC++) and describe how we can
                 provide, with a standard compiler, almost all of the
                 functionality offered by a new or extended language.
                 Active objects, object distribution, selective method
                 acceptance, and synchronous and asynchronous object
                 interaction are supported. Concurrency control and
                 synchronization are encapsulated at the active object
                 level. The goal of ABC++ is to allow users to write
                 concurrent programs without dealing with explicit
                 synchronization and mutual exclusion constructs, with
                 as few restrictions on the use of C++ as possible.
                 ABC++ can be implemented on either a shared memory
                 multiprocessor or a cluster of homogeneous
                 workstations. It is presently implemented on a network
                 of RISC System/6000 processors and on the IBM Scalable
                 POWERparallel System 1 (SP1).",
  acknowledgement = ack-nhfb,
  affiliation =  "Dept. of Comput. Sci., York Univ., North York, Ont.,
                 Canada",
  classification = "C6110J (Object-oriented programming); C6140D (High
                 level languages); C6150C (Compilers, interpreters and
                 other processors); C6150N (Distributed systems
                 software)",
  keywords =     "ABC++; Active objects; Asynchronous object
                 interaction; C++ language; Concurrency control;
                 Concurrency creation; Encapsulation; Homogeneous
                 workstation cluster; Inheritance; ISM Scalable
                 POWERparallel System 1; Object distribution;
                 Object-oriented facilities; RISC System/6000
                 processors; Selective method acceptance; Shared memory
                 multiprocessor; Standard compiler; Synchronization;
                 Synchronous object interaction",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "C language; Concurrency control; Data encapsulation;
                 IBM computers; Inheritance; Object-oriented languages;
                 Program compilers; Reduced instruction set computing;
                 Synchronisation",
}

@Article{Colosimo:1995:TFT,
  author =       "J. A. Colosimo",
  title =        "Technical forum: {The} role of {IBM's Open Blueprint}
                 approach in distributed computing",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "1",
  pages =        "138--141",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 09:21:58 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-1.html",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1995:Pb,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "2",
  pages =        "144--145",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "Issue Order No. G321-0120",
  URL =          "http://www.research.ibm.com/journal/sj34-1.html#one",
  abstract =     "The growth of technical and commercial applications
                 for high-performance computing, combined with the
                 decline in the price of computers overall and the need
                 to deliver new capabilities quickly, has led to the
                 emergence of parallel computers and parallel computing.
                 The newest of the desired applications include digital
                 libraries, transaction processing, decision support,
                 advanced multimedia, high-bandwidth networks, and data
                 mining. Current high-performance applications from
                 business and science also need a path to effective use
                 of parallel computing. IBM has addressed this broad new
                 territory with solutions that are general purpose and
                 scalable and that operate readily within existing
                 technical and commercial computing environments. These
                 solutions are built on the firm foundation of RISC
                 System\slash 6000* workstation microprocessors with the
                 AIX* operating system or on the well-established
                 System\slash 390* enterprise servers. The former
                 solution --- the IBM Scalable POWERparallel Systems*
                 --- is the focus of this special issue. \par The
                 availability of this new family of parallel systems has
                 led to the resurgence of existing applications that
                 previously ran only on mainframes and to the
                 development of new applications in science and business
                 that were not practical before. This issue contains an
                 introductory essay and eight papers on the hardware,
                 software, and systems that comprise the POWERparallel*
                 SP1* and SP2* environments. We are indebted to Z.
                 Barzilai and J. Moulic of the Thomas J. Watson Research
                 Center, IBM Research Division, in Yorktown Heights, New
                 York, for their efforts in laying the groundwork for
                 this issue. We are also indebted to M. Snir and G. S.
                 Almasi, also of the Thomas J. Watson Research Center,
                 for their coordination and development of these papers.
                 \par The creation of new technologies, approaches,
                 systems, and user opportunities is a mix of technical
                 advances and customer needs, some of which are
                 available or anticipated and some not. In an essay
                 intended to serve as an introduction, Wladawsky-Berger
                 relates the recent history of the technology and user
                 needs that made the IBM Scalable POWERparallel Systems
                 both practical for IBM to build on a short schedule and
                 advantageous for customers to have. Fundamentally, the
                 approach augments the family of systems based on RISC
                 System\slash 6000 and AIX, so as to build on and add to
                 the powerful technologies already developed and provide
                 a scalable suite of systems solutions for customers,
                 whether or not they already use those technologies.
                 (Reprint Order No. G321-5562) \par The technology and
                 architecture that form the more recent and advanced SP2
                 scalable parallel system are described in a paper by
                 Agerwala et al. Seven principles for development of the
                 SP2 are presented as a focus for understanding the
                 evolution from scientifically oriented parallel systems
                 to ones that deal effectively with both scientific and
                 commercial applications. The key systems alternatives,
                 competitive choices, SP2 choices, and rationale are
                 explained. The authors also provide a system overview,
                 explain the system components, and briefly discuss
                 system performance using well-known benchmarks.
                 (Reprint Order No. G321-5563) \par In order to bind a
                 collection of processors that share work and
                 communicate effectively at high speeds, there must be a
                 high-performance switch. As parallel systems have
                 become more powerful and flexible, such switches have
                 evolved into sophisticated components, with high
                 bandwidth and reliability concerns of their own, plus
                 responsibility for relieving the processors of as many
                 communication tasks as possible. The paper by Stunkel
                 et al. presents the SP2 High-Performance Switch and its
                 architecture, topology, adapter approach, performance,
                 and support software. (Reprint Order No. G321-5564)
                 \par The effective use of parallel computing systems
                 depends on software that takes advantage of the
                 multiple, communicating processors. Snir et al.
                 describe the software development and execution
                 capabilities created for the SP2 that allow programmers
                 to exploit the power and flexibility of the parallel
                 programming model with minimal or no code dependence on
                 the specific SP2 system used for execution. In
                 particular, the authors present the new Message-Passing
                 Library that supports the communications paradigm of
                 the SP2 and the new IBM Parallel Operating Environment
                 that supports parallel program development and
                 execution on the SP2. (Reprint Order No. G321-5565)
                 \par Software developers for parallel computing also
                 require a file system that allows effective use of
                 resources in parallel and provides file services for
                 the entire parallel system. The file system for the SP
                 family, known as the AIX Parallel I/O File System,
                 provides parallel access to partitioned files through
                 portability, large file support, ease of use, and
                 reliability. The authors, Corbett et al., provide the
                 technical rationale and the developmental history for
                 this file system, largely built on the Vesta file
                 system project. (Reprint Order No. G321-5566) \par
                 Gropp and Lusk relate their experiences migrating to
                 and using an early 128-node SP1 at the Argonne National
                 Laboratory and the subsequent migration to SP2 software
                 running on SP1 nodes. Their conclusions provide useful
                 information for other users and feedback for SP
                 developers. They stress the speed with which the
                 migrations can be accomplished --- in days --- and the
                 effective coexistence of high performance, parallelism,
                 and portability. (Reprint Order No. G321-5567) \par The
                 next two papers focus on the effectiveness of the SP2
                 as demonstrated through implementations of the
                 Numerical Aerodynamic Simulation (NAS) benchmarks.
                 These benchmarks were developed by the National
                 Aeronautics and Space Administration (NASA)
                 specifically to test parallel supercomputing
                 environments. In the first paper, Agarwal et al. show
                 the parallel implementation of the five NAS kernel
                 benchmarks. The results are compared with those of
                 three other scalable parallel systems, revealing that
                 the SP2 outperforms the others, often by wide margins.
                 (Reprint Order No. G321-5568) \par In the second paper
                 on NAS benchmarks for the SP2, Naik describes the
                 parallel implementation of the NAS Parallel Benchmark
                 BT (Block Tridiagonal), which is designed to test the
                 effectiveness of distributed memory systems. These
                 tests, compared with those for two other systems, show
                 results at the top of the range and almost always
                 exceeding results for the others. They also show the
                 delivered power in various situations, measured in
                 billions of floating-point instructions per second
                 (GFLOPS). (Reprint Order No. G321-5569) \par One aspect
                 of high-performance systems that is especially
                 important for commercial applications is the
                 availability of equally high-performance database
                 management systems. In this paper, Baru et al. describe
                 DB2* Parallel Edition, the DB2 product that answers
                 this requirement, executing all vital functions in
                 parallel. The architecture and execution model of DB2
                 Parallel Edition provide processor and disk storage
                 scalability, large database capacity, query
                 optimization, execution time optimization, favorable
                 transaction properties, parallel utilities, and
                 reorganization for load balancing. Performance figures
                 are shown for various complex queries within SP2
                 operating environments. (Reprint Order No. G321-5570)
                 \par We are pleased to announce that, as a service to
                 authors, we now provide an informational page for
                 authors just ahead of the inside back cover. Also, as a
                 service to readers, we recently expanded and
                 reorganized our information about subscriptions and
                 electronic access, and moved it to the inside back
                 cover. \par The next issue of the Journal will be a
                 special issue on computer networking. \par Gene F.
                 Hoffnagle Editor",
  acknowledgement = ack-nhfb,
}

@Article{WladawskyBerger:1995:PPP,
  author =       "I. Wladawsky-Berger",
  title =        "The power and promise of parallel computing",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "2",
  pages =        "146--151",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:22:47 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-2.html#two",
  abstract =     "The use of parallel computing is reaching into both
                 the technical and the commercial computing
                 environments. The success of IBM in this broad area is
                 based on the introduction of flexible and
                 general-purpose families of scalable processors. I
                 highlight the history of one of those families that
                 includes the IBM scalable POWERparallel SP1 and SP2
                 systems. I also describe how these systems were rapidly
                 developed and moved to market, and illustrate how some
                 customers are using them in their businesses.",
  acknowledgement = ack-nhfb,
  classification = "C5440 (Multiprocessing systems)",
  keywords =     "Businesses; Commercial computing; Customers;
                 General-purpose scalable processors; History; IBM; IBM
                 scalable systems; Parallel computing; POWERparallel;
                 SP1; SP2",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "DP industry; General purpose computers; History; IBM
                 computers; Parallel machines; Reconfigurable
                 architectures",
}

@Article{Agerwala:1995:SSA,
  author =       "T. Agerwala and J. L. Martin and J. H. Mirza and D. C.
                 Sadler and D. M. Dias and M. Snir",
  title =        "{SP2} system architecture",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "2",
  pages =        "152--184",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-2.html#three",
  abstract =     "Scalable parallel systems are increasingly being used
                 today to address existing and emerging application
                 areas that require performance levels significantly
                 beyond what symmetric multiprocessors are capable of
                 providing. These areas include traditional technical
                 computing applications, commercial computing
                 applications such as decision support and transaction
                 processing, and emerging areas such as ``grand
                 challenge'' applications, digital libraries, and video
                 production and distribution. The IBM SP2* is a
                 general-purpose scalable parallel system designed to
                 address a wide range of these applications. This paper
                 gives an overview of the architecture and structure of
                 SP2, discusses the rationale for the significant system
                 design decisions that were made, indicates the extent
                 to which key objectives were met, and identifies future
                 system challenges and advanced technology development
                 areas.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Power Parallel Div., Poughkeepsie, NY, USA",
  classification = "C5220P (Parallel architecture); C5440
                 (Multiprocessing systems)",
  keywords =     "Commercial computing; Decision support; Digital
                 libraries; Future system challenges; General-purpose
                 scalable parallel system; IBM SP2 system architecture;
                 Parallel architecture; Performance levels; Scalable
                 parallel systems; Symmetric multiprocessors; System
                 design; Technical computing applications; Transaction
                 processing; Video production",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "General purpose computers; IBM computers; Parallel
                 architectures; Parallel machines; Performance
                 evaluation",
}

@Article{Stunkel:1995:SHP,
  author =       "C. B. Stunkel and D. G. Shea and B. Abali and M. G.
                 Atkins and C. A. Bender and D. G. Grice and P.
                 Hochschild and D. J. Joseph and B. J. Nathanson and R.
                 A. Swetz and R. F. Stucke and M. Tsao and P. R.
                 Varker",
  title =        "The {SP2} high performance switch",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "2",
  pages =        "185--204",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:22:47 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-2.html#four",
  abstract =     "The heart of an IBM SP2* system is the
                 High-Performance Switch, which is a low-latency,
                 high-bandwidth switching network that binds together
                 RISC System/6000* processors. The switch incorporates a
                 unique combination of topology and architectural
                 features to scale aggregate bandwidth, enhance
                 reliability, and simplify cabling. It is a
                 bidirectional multistage interconnect subsystem driven
                 by a common oscillator, and delivers both data and
                 service packets over the same links. Switching elements
                 contain a dynamically allocated shared buffer for
                 storing blocked packet flits. The switch is constructed
                 primarily from switching elements (the Vulcan switch
                 chip) and adapters (the SP2 communication adapter). The
                 SP2 communication adapter uses a variety of techniques
                 to improve bandwidth and offload communication tasks
                 from the node processor. This paper examines the switch
                 architecture and presents an overview of its support
                 software.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Thomas J. Watson Res. Center, Yorktown Heights,
                 NY, USA",
  classification = "C4230M (Multiprocessor interconnection); C5220P
                 (Parallel architecture); C5440 (Multiprocessing
                 systems); C6150N (Distributed systems software)",
  keywords =     "Aggregate bandwidth; Architectural features;
                 Bidirectional multistage interconnect subsystem;
                 Blocked packet flits; Cabling; Common oscillator;
                 Communication adapter; Dynamically allocated shared
                 buffer; IBM SP2 system; Low-latency high-bandwidth
                 switching network; Reliability; RISC System/6000
                 processors; SP2 communication adapter; SP2 high
                 performance switch; Topology; Vulcan switch chip",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Multistage interconnection networks;
                 Parallel architectures; Parallel machines; Performance
                 evaluation; Shared memory systems",
}

@Article{Snir:1995:CSP,
  author =       "M. Snir and P. Hochschild and D. D. Frye and K. J.
                 Gildea",
  title =        "The communication software and parallel environment of
                 the {IBM SP2}",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "2",
  pages =        "205--221",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-2.html#five",
  abstract =     "This paper describes the software available on the IBM
                 SP2* for parallel program development and execution. It
                 presents the rationale for the design of the
                 Message-Passing Library used on the SP2, outlines its
                 current implementation, and gives information on
                 performance. In addition, the paper describes the
                 programming environment and the program development
                 tools available for developing and executing parallel
                 codes.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Thomas J. Watson Res. Center, Yorktown Heights,
                 NY, USA",
  classification = "C6110P (Parallel programming); C6115 (Programming
                 support); C6150N (Distributed systems software); C6155
                 (Computer communications software)",
  keywords =     "Communication software; IBM scalable POWERparallel
                 system 9076 SP2; IBM SP2; Large-scale parallel
                 applications; Message passing library; Parallel codes;
                 Parallel environment; Parallel program development;
                 Performance; Program development tools; Programming
                 environment",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer communications software; Message passing;
                 Parallel programming; Programming environments",
}

@Article{Corbett:1995:PFS,
  author =       "P. F. Corbett and D. G. Feitelson and J.-P. Prost and
                 G. S. Almasi and S. J. Baylor and A. S. Bolmarcich and
                 Y. Hsu and J. Satran and M. Snir and R. Colao and B. D.
                 Herr and J. Kavaky and T. R. Morgan and A. Zlotek",
  title =        "Parallel file systems for the {IBM SP} computers",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "2",
  pages =        "222--248",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-2.html#six",
  abstract =     "Parallel computer architectures require innovative
                 software solutions to utilize their capabilities. This
                 statement is true for system software no less than for
                 application programs. File system development for the
                 IBM SP product line of computers started with the Vesta
                 research project, which introduced the ideas of
                 parallel access to partitioned files. This technology
                 was then integrated with a conventional Advanced
                 Interactive Executive* (AIX*) environment to create the
                 IBM AIX Parallel I/O File System product. We describe
                 the design and implementation of Vesta, including user
                 interfaces and enhancements to the control environment
                 needed to run the system. Changes to the basic design
                 that were made as part of the AIX Parallel I/O File
                 System are identified and justified.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Thomas J. Watson Res. Center, Yorktown Heights,
                 NY, USA",
  classification = "C5220P (Parallel architecture); C5440
                 (Multiprocessing systems); C6110P (Parallel
                 programming); C6120 (File organisation); C6180 (User
                 interfaces)",
  keywords =     "AIX environment; Control environment; Conventional
                 Advanced Interactive Executive; File system
                 development; IBM AIX Parallel I/O File System; IBM SP
                 computers; Parallel access; Parallel computer
                 architectures; Parallel file systems; Partitioned
                 files; System software; User interfaces; Vesta research
                 project",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "File organisation; IBM computers; Memory architecture;
                 Parallel architectures; Parallel machines; Parallel
                 programming; User interfaces",
}

@Article{Gropp:1995:EIS,
  author =       "W. D. Gropp and E. Lusk",
  title =        "Experiences with the {IBM SP1}",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "2",
  pages =        "249--262",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-2.html#seven",
  abstract =     "One of the first IBM parallel processing
                 computers---the SP1*---and the largest, with 128 nodes,
                 was installed in 1993 at Argonne National Laboratory.
                 It took only days, not months, to prepare for and
                 migrate applications to this parallel supercomputer,
                 demonstrating that high performance, parallelism, and
                 portability can coexist. This paper describes the early
                 experiences with the SP1 at Argonne, which provide
                 lessons for supercomputer system designers and users
                 alike. We explore what features of software technology
                 and system architecture enabled immediate and
                 successful use of the SP1. The paper concludes with a
                 brief indication of why the move to the SP2* software
                 environment using the SP2 communication adapters, the
                 use of the emerging Message-Passing Interface standard,
                 and the continued use of the SP1 processors have been
                 successful.",
  acknowledgement = ack-nhfb,
  affiliation =  "Div. of Math. and Comput. Sci., Argonne Nat. Lab., IL,
                 USA",
  classification = "C5220P (Parallel architecture); C5440
                 (Multiprocessing systems); C6110P (Parallel
                 programming); C6150N (Distributed systems software)",
  keywords =     "High performance; IBM parallel processing computers;
                 IBM SP1; Message passing interface standard; Parallel
                 supercomputer; Parallelism; Portability; Software
                 technology; SP1 processors; SP2 communication adapters;
                 SP2 software environment; Supercomputer system
                 designers; System architecture",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Message passing; Parallel
                 architectures; Parallel machines; Parallel
                 programming",
}

@Article{Agarwal:1995:HPI,
  author =       "R. C. Agarwal and B. Alpern and L. Carter and F. G.
                 Gustavson and D. J. Klepacki and R. Lawrence and M.
                 Zubair",
  title =        "High-performance parallel implementations of the {NAS}
                 kernel benchmarks on the {IBM SP2}",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "2",
  pages =        "263--272",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-2.html#eight",
  abstract =     "Recently, researchers at NASA Ames have defined a set
                 of computational benchmarks designed to measure the
                 performance of parallel supercomputers. In this paper,
                 we describe the parallel implementation of the five
                 kernel benchmarks from this suite on the IBM SP2*, a
                 scalable, distributed memory parallel computer.
                 High-performance implementations of these kernels have
                 been obtained by mapping the computation of these
                 kernels to the underlying architecture of the SP2
                 machine. Performance results for the SP2 are compared
                 with publicly available results for other
                 high-performance computers.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Thomas J. Watson Res. Center, Yorktown Heights,
                 NY, USA",
  classification = "C5220P (Parallel architecture); C5440
                 (Multiprocessing systems); C5470 (Performance
                 evaluation and testing); C6110P (Parallel programming);
                 C6150G (Diagnostic, testing, debugging and evaluating
                 systems)",
  keywords =     "Computational benchmarks; Distributed memory parallel
                 computer; High performance implementations;
                 High-performance parallel implementations; IBM SP2;
                 Kernel benchmarks; NAS kernel benchmarks; Parallel
                 implementation; Parallel supercomputers; SP2 machine",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Distributed memory systems; Parallel machines;
                 Parallel programming; Performance evaluation; Program
                 testing",
}

@Article{Naik:1995:SIN,
  author =       "V. K. Naik",
  title =        "A scalable implementation of the {NAS Parallel
                 Benchmark BT} on distributed memory systems",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "2",
  pages =        "273--291",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-2.html#nine",
  abstract =     "In this paper, we describe an efficient and scalable
                 implementation of the NAS Parallel Benchmark BT
                 suitable for distributed memory systems such as the IBM
                 Scalable POWERparallel Systems*. After describing the
                 parallelization and data partitioning methods used, we
                 outline some of the optimization steps used to realize
                 good performance on individual processors and to reduce
                 the communication overheads on the IBM SP1* and SP2*
                 systems. We present performance results on up to 128
                 nodes of the SP1, and on the SP2 with wide nodes. We
                 describe the performance on the standard Class A and
                 Class B problem sets. To show the scalability of our
                 parallelization methods, we present the performance of
                 two additional data sets.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Thomas J. Watson Res. Center, Yorktown Heights,
                 NY, USA",
  classification = "C5220P (Parallel architecture); C5440
                 (Multiprocessing systems); C5470 (Performance
                 evaluation and testing); C6110P (Parallel programming);
                 C6150G (Diagnostic, testing, debugging and evaluating
                 systems)",
  keywords =     "Class B problem sets; Communication overheads; Data
                 partitioning methods; Data sets; Distributed memory
                 systems; IBM Scalable POWERparallel Systems; IBM SP1;
                 NAS Parallel Benchmark BT; Optimization steps;
                 Parallelization methods; Performance results; Scalable
                 implementation; SP2 systems; Standard Class A",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Distributed memory systems; IBM computers; Parallel
                 machines; Parallel programming; Performance evaluation;
                 Program testing",
}

@Article{Baru:1995:DPE,
  author =       "C. K. Baru and G. Fecteau and A. Goyal and H. Hsiao
                 and A. Jhingran and S. Padmanabhan and G. P. Copeland
                 and W. G. Wilson",
  title =        "{DB2 Parallel Edition}",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "2",
  pages =        "292--322",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-2.html#ten",
  abstract =     "The rate of increase in database size and
                 response-time requirements has outpaced advancements in
                 processor and mass storage technology. One way to
                 satisfy the increasing demand for processing power and
                 input/output bandwidth in database applications is to
                 have a number of processors, loosely or tightly
                 coupled, serving database requests concurrently.
                 Technologies developed during the last decade have made
                 commercial parallel database systems a reality, and
                 these systems have made an inroad into the stronghold
                 of traditionally mainframe-based large database
                 applications. This paper describes the DB2* Parallel
                 Edition product that evolved from a prototype developed
                 at IBM Research in Hawthorne, New York, and now is
                 being jointly developed with the IBM Toronto
                 laboratory.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Toronto Lab., North Ontario, Ont., Canada",
  classification = "C6110P (Parallel programming); C6160B (Distributed
                 databases)",
  keywords =     "Commercial parallel database systems; Database size;
                 DB2 Parallel Edition; IBM Research; Input/output
                 bandwidth; Mass storage technology; Processing power;
                 Response time requirements",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Distributed databases; IBM computers; Parallel
                 programming",
}

@Article{Craft:1995:BGC,
  author =       "D. J. Craft",
  title =        "Books: ``{Managing Gigabytes: Compressing and Indexing
                 Documents and Images}'', by {Ian H. Witten}, {Alistair
                 Moffat}, and {Timothy C. Bell}",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "2",
  pages =        "323--324",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:33:53 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Cavin:1995:BMG,
  author =       "J. M. Cavin",
  title =        "Books: ``{Asynchronous Transfer Mode: Solution for
                 Broadband ISDN}'', {Second Edition}, by {Martin de
                 Prycker}",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "2",
  pages =        "324--325",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:33:43 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1995:Pc,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "3",
  pages =        "328--329",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-3.html#one",
  abstract =     "The field of computer networks has seen explosive
                 growth in technologies and products over the past
                 decade. More and more users and networking systems have
                 joined an interconnected world of communications,
                 unconstrained by time and distance. Such explosive
                 growth has led to many different solutions to the
                 inevitable complexity of large networks, and those
                 solutions are not always compatible. In 1992, IBM
                 introduced the Networking Blueprint, followed in 1994
                 by the more comprehensive and encompassing Open
                 Blueprint*, as a way to absorb the differences and
                 create for users and systems a network that appears
                 seamless, homogeneous, and directly accessible, while
                 the networks remain open, heterogeneous, and
                 distributed. \par The Open Blueprint is an architecture
                 and framework, rather than a product or system. It
                 defines the ways in which component products and
                 services can be built that are compatible and provide
                 users with a seamless view of data and networks. The
                 architectural scheme must be filled in with real
                 products and services, cooperating to provide the view
                 specified by the architecture. This issue contains ten
                 papers on a variety of technologies and systems that
                 are compatible with the Open Blueprint. We are indebted
                 to G. D. Schultz of the IBM Networking Hardware
                 Division in Research Triangle Park, North Carolina, for
                 his considerable efforts in creating, developing, and
                 preparing this issue. \par One aspect of heterogeneous
                 networks that can be hidden from users and networks of
                 users is the plethora of network protocols that have
                 been developed and are now ingrained in applications
                 and systems. These protocols --- semantic and syntactic
                 rules for the behavior of communicating functional
                 units --- have spread across environments and media
                 with widely differing characteristics and technical
                 requirements. Hess, Lorrain, and McGee use the Open
                 Blueprint as a framework for discussing multiple
                 protocols and how they can be joined in a seamless way
                 through standardization, convergence, and coexistence.
                 They also provide a description of asynchronous
                 transfer mode (ATM), an advanced high-speed
                 multiprotocol technology. \par Christensen et al.
                 describe another aspect of networks --- the domain of
                 local area networks (LANs). Unbeknownst to many users,
                 LANs have progressed through three generations and are
                 embarking on a fourth, leaving the simple image of a
                 connected loop of machinery far behind, while
                 preserving the appearance of a loop for users and
                 connected machines. The authors discuss the evolution
                 of LANs in order to set the stage for describing the
                 fourth generation: LAN switching and the emergence of
                 virtual LANs, which greatly increase apparent resources
                 and allow LANs to cover large distances, without
                 changing the user's hardware. \par Among the latest
                 developments in harnessing the power of large and
                 distributed networks is the asynchronous transfer mode
                 (ATM). ATM networks provide common support for data,
                 voice, video, and other network traffic, while
                 supporting both wide area and local area networks. The
                 paper by Sultan and Basso is a tutorial and a
                 description of ATM technology and relevant IBM
                 products. \par One example of a newer and more flexible
                 network medium and protocol is described by Bauchot and
                 Lanne in their paper on the IBM Wireless Radio
                 Frequency (RF) LAN and its medium access control (MAC)
                 protocol. High performance, short latency, and
                 frequency hopping are provided by the adaptive nature
                 of the MAC protocol, without sacrificing security, data
                 compression, interference management, and attachment to
                 existing LAN environments. \par The complexity of some
                 protocols, such as IBM's Systems Network Architecture
                 (SNA) and Network Basic Input\slash Output System
                 (NetBIOS*), has led to specialization and a subsequent
                 lack of standardization among network routers that
                 handle these popular protocols. Recently, proposals
                 have been made for standardizing around data link
                 switching (DLSw), which is already being implemented by
                 various vendors. Gayek describes DLSw as a wide area
                 network standard, compares it with earlier
                 technologies, and speculates on future extensions and
                 directions. \par Bird et al. explore the history,
                 recent enhancements, and likely future of the Advanced
                 Peer-to-Peer Networking* (APPN*) architecture.
                 High-performance routing is cited and described as an
                 example of how APPN is evolving to meet the needs of
                 ever faster networks and expanding customer
                 requirements, under the watchful gaze of an industry
                 consortium of APPN vendors. The paper also discusses
                 such advanced areas as central directories, border
                 nodes, dependent logical unit (LU) requesters,
                 high-performance routing, and switched technology. \par
                 Underlying one of today's best known and largest
                 networks --- the Internet --- is Transmission Control
                 Protocol\slash Internet Protocol (TCP\slash IP).
                 Britton, Tavs, and Bournas present the implications of
                 the rapid growth in use of the Internet for the future
                 of TCP\slash IP, while relating TCP\slash IP to the
                 direction and technology of Open Blueprint. As the
                 authors state, TCP\slash IP already supports 50 700
                 networks and 4.8 million host systems in 89 countries.
                 So, its future and that of the Internet are of
                 considerable interest to its current users, industry,
                 academia, and IBM. Capacity, speed, and function must
                 grow to anticipate future waves of networks, hosts, and
                 users. \par One of the inhibiting factors in the growth
                 and flexibility of software systems in complex
                 environments (like current networks) is the
                 dependencies that are designed into software and then
                 persist and are hard to remove. The better model for
                 flexible and portable software is
                 application-independent interfaces and protocols that
                 allow software to operate without regard for the
                 underlying structures. Pozefsky et al. explore this
                 concept in the context of networks, focusing on the
                 Multiprotocol Transport Networking (MPTN) architecture.
                 One significant provision of MPTN allows current
                 applications to execute unmodified on any existing
                 protocol. MPTN is implemented today in the IBM AnyNet*
                 family of products. \par For the network application
                 programmer, access to a portable and effective common
                 programming interface is vital to portability and reuse
                 of software across network architectures and protocols.
                 Arnette et al. present the Common Programming Interface
                 for Communications (CPI-C), describe the conversational
                 services available to programs, and provide examples of
                 CPI-C use for program-to-program communication. \par
                 Aldred et al. focus on an area that still presents a
                 significant challenge for network architects:
                 multimedia for real-time collaboration across networks.
                 The authors discuss the challenge and requirements,
                 along with existing standards, and describe the IBM
                 Lakes architecture, which is designed to address these
                 needs and provide for significant future technical
                 enhancement. \par The next issue of the Journal will be
                 a special issue related to this one, covering aspects
                 of Networking BroadBand Services (NBBS). \par Gene F.
                 Hoffnagle Editor",
  acknowledgement = ack-nhfb,
}

@Article{Hess:1995:MNB,
  author =       "M. L. Hess and J. A. Lorrain and G. R. McGee",
  title =        "Multiprotocol networking --- a blueprint",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "3",
  pages =        "330--346",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:22:47 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-3.html#two",
  abstract =     "IBM's Open Blueprint* is used as a framework for
                 discussing recent developments in communications with
                 particular emphasis on multiprotocol networking. The
                 major parts of the Open Blueprint that pertain to
                 networking are described, indicating advancements in
                 user networks, networking standards, and their
                 underlying technologies. Asynchronous transfer mode is
                 shown to have special significance both for today's
                 multiprotocol networks and tomorrow's multimedia
                 networks.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Networking Hardware Div., Research Triangle Park,
                 NC, USA",
  classification = "B6150M (Protocols); B6210L (Computer
                 communications); C5620 (Computer networks and
                 techniques); C5640 (Protocols)",
  keywords =     "Asynchronous transfer mode; Computer network; IBM Open
                 Blueprint; Multimedia networks; Multiprotocol
                 networking; Networking standards; User networks",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Asynchronous transfer mode; Computer networks;
                 Multimedia communication; Open systems; Protocols;
                 Telecommunication standards",
}

@Article{Christensen:1995:LAN,
  author =       "K. J. Christensen and L. C. Haas and F. E. Noel and N.
                 C. Strole",
  title =        "Local area networks --- Evolving from shared to
                 switched access",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "3",
  pages =        "347--374",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:22:47 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-3.html#three",
  abstract =     "Local area networks (LANs) have become pervasive in
                 their application to business, government, and academic
                 data communications. In the United States alone, by
                 1993 there were over three million LANs installed. This
                 paper describes how advances in structured cabling
                 systems and electronics concentrated in the wiring
                 closet have enabled the evolution of LANs toward a
                 dedicated bandwidth model. Due to the growing number of
                 users, LANs are required to provide increased data
                 capacity and improved management capabilities. These
                 user requirements are being met by increased functions
                 in the electronic wiring closet that include fault
                 isolation, remote network management, increased
                 aggregate bandwidth, and virtual LAN capabilities. This
                 paper focuses on present and future user requirements
                 and the influences of emerging LAN switching
                 technologies on already installed LANs.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Networking Hardware Div., Research Triangle Park,
                 NC, USA",
  classification = "B6150C (Communication switching); B6210L (Computer
                 communications); C5620L (Local area networks)",
  keywords =     "Data capacity; Data communications; Dedicated
                 bandwidth model; Fault isolation; Increased aggregate
                 bandwidth; LAN switching; Local area networks; Remote
                 network management; Shared access; Structured cabling
                 systems; Switched access; United States; User
                 requirements; Virtual LAN",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer network management; Fault diagnosis; Local
                 area networks; Packet switching; Telecommunication
                 cables",
}

@Article{Sultan:1995:API,
  author =       "R. A. Sultan and C. Basso",
  title =        "{ATM}: Paving the information superhighway",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "3",
  pages =        "375--389",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-3.html#four",
  abstract =     "A new generation of networking requirements is fueling
                 the growth of a cell-based communications technology
                 known as the asynchronous transfer mode (ATM). ATM
                 technology allows the integration of voice, video,
                 traditional data, and other traffic types on a single
                 network. ATM offers a unique opportunity to deploy the
                 same standardized networking technology in both the
                 wide-area and local-area environments. IBM has
                 introduced a family of products that provides a
                 complete ATM solution for customers. The products
                 support ATM standards, allowing the products to
                 interwork with devices from other vendors. This paper
                 provides a tutorial on ATM technology and an overview
                 of the IBM ATM product family. The IBM 8260 Intelligent
                 Switching Hub is described as a representative ATM
                 product.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Thomas J. Watson Res. Center, Yorktown Heights,
                 NY, USA",
  classification = "B6150C (Communication switching); B6210L (Computer
                 communications); B6230 (Switching centres and
                 equipment); C5620W (Other computer networks)",
  keywords =     "Asynchronous transfer mode; ATM; Broadband network;
                 Cell-based communications; IBM 8260; IBM ATM product
                 family; Information superhighway; Intelligent Switching
                 Hub; Local-area network; Network traffic; Networking
                 requirements; Standardized networking; Wide-area
                 network",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Asynchronous transfer mode; Broadband networks; IBM
                 computers; Telecommunication traffic; Wide area
                 networks",
}

@Article{Bauchot:1995:IWR,
  author =       "F. J. Bauchot and F. Lanne",
  title =        "{IBM} Wireless {RF LAN} design and architecture",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "3",
  pages =        "390--408",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sun Sep 15 05:22:47 MDT 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-3.html#five",
  abstract =     "This paper describes the medium access control (MAC)
                 protocol and the network integration of the IBM
                 Wireless Radio Frequency (RF) Local Area Network (LAN)
                 product. The MAC protocol is an adaptive, hybrid scheme
                 relying on reservation-based and contention-based
                 methods. It provides sustained high performances, both
                 for light and heavy traffic conditions. Some control
                 services of the wireless channel are also described:
                 security, data compression, and interference
                 management. The network integration is achieved by
                 relying on the industry standards Open Driver Interface
                 (ODI**) and Network Driver Interface Specification
                 (NDIS). Wireless connectivity can either provide an
                 extension of an existing cabled network or result in a
                 stand-alone wireless network.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM France, La Gaude, France",
  classification = "B6150M (Protocols); B6210L (Computer
                 communications); B6250 (Radio links and equipment);
                 C5620L (Local area networks); C5640 (Protocols); C5670
                 (Network performance)",
  keywords =     "Cabled network; Contention-based methods; High
                 performance; IBM Wireless Radio Frequency Local Area
                 Network; IBM Wireless RF LAN; Industry standards;
                 Interference management; Local area network design; MAC
                 protocol; Medium access control; Network Driver
                 Interface Specification; Network traffic; Open Driver
                 Interface; Reservation-based methods; Security data
                 compression; Stand-alone wireless network",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Access protocols; Data compression; IBM computers;
                 Performance evaluation; Security of data;
                 Telecommunication standards; Telecommunication traffic;
                 Wireless LAN",
}

@Article{Gayek:1995:DLS,
  author =       "P. W. Gayek",
  title =        "Data link switching: Present and future",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "3",
  pages =        "409--429",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-3.html#six",
  abstract =     "The integration of computer networks has made it
                 increasingly important for networking equipment to
                 simultaneously handle a variety of data communications
                 protocols. Networking products known as routers have
                 proven themselves capable of handling many
                 multiprotocol networking requirements, but have had
                 difficulty addressing some important network
                 configurations. Two of the most widely implemented
                 protocols, IBM's Systems Network Architecture (SNA) and
                 Network Basic Input/Output System (NetBIOS*), have
                 characteristics that make it difficult for routers to
                 support them in the same way as routers support other
                 protocols. Networking vendors have devised a number of
                 methods for transporting SNA and NetBIOS data traffic,
                 but these methods have been largely nonstandard and
                 have had other disadvantages. Data link switching
                 (DLSw), initially developed by IBM, has attracted
                 considerable interest among router vendors as a
                 standard way to handle SNA and NetBIOS traffic and
                 avoid some of the problems of earlier methods. A
                 multivendor interest group within an IBM-sponsored
                 forum on Advanced Peer-to-Peer Networking* has
                 developed and recently issued a standard DLSw
                 specification. This paper briefly compares DLSw to the
                 technologies that preceded it, provides a tutorial of
                 the Version 1 DLSw standard, and discusses possible
                 directions in which DLSw may evolve.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Networking Hardware Div., Research Triangle Park,
                 NC, USA",
  classification = "B6150M (Protocols); B6210L (Computer
                 communications); B6230 (Switching centres and
                 equipment); C5620 (Computer networks and techniques);
                 C5640 (Protocols)",
  keywords =     "Advanced Peer-to-Peer Networking; Computer networks;
                 Data communications protocols; Data link switching;
                 DLSw specification; DLSw standard; Multiprotocol
                 networking; NetBIOS; Network Basic Input/Output System;
                 Network configurations; Networking equipment; Routers;
                 SNA; Systems Network Architecture",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer networks; IBM computers; Open systems;
                 Protocols; Telecommunication network routing;
                 Telecommunication standards; Telecommunication
                 switching; Telecommunication traffic",
}

@Article{Bird:1995:AAA,
  author =       "B. R. Bird and C. Brotman and R. Case and G. Dudley
                 and R. E. Moore and M. Peters",
  title =        "Advances in {APPN} architecture",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "3",
  pages =        "430--451",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-3.html#seven",
  abstract =     "In this paper, we discuss the evolving environment and
                 requirements for the Advanced Peer-to-Peer Networking*
                 (APPN*) architecture and the accommodation of these
                 changes in basic directory, topology, and configuration
                 services, as well as in application transport
                 capabilities. We use high-performance routing, a recent
                 APPN extension, as an example of the adaptation of the
                 architecture to emerging high-speed communication
                 facilities and the increasing trend to multiprotocol
                 networks. Finally, we discuss some extensions to
                 switched support and network management in APPN and
                 speculate on possible future considerations.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Networking Hardware Div., Research Triangle Park,
                 NC, USA",
  classification = "B6210L (Computer communications); C5620 (Computer
                 networks and techniques); C5670 (Network performance)",
  keywords =     "Advanced Peer-to-Peer Networking architecture;
                 Application transport; APPN architecture; High speed
                 communication; High-performance routing; IBM;
                 Multiprotocol networks; Network configuration services;
                 Network directory; Network management; Network
                 topology; Switched support",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer networks; IBM computers; Performance
                 evaluation; Protocols; Telecommunication network
                 routing",
}

@Article{Britton:1995:TNG,
  author =       "E. G. Britton and J. Tavs and R. Bournas",
  title =        "{TCP\slash IP}: The next generation",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "3",
  pages =        "452--471",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-3.html#eight",
  abstract =     "After tracing the evolution of Transmission Control
                 Protocol/Internet Protocol (TCP/IP) from its academic
                 and government research heritage to its current
                 commercial use, we survey new directions in TCP/IP. We
                 explore the issues that derive from growth in scale and
                 function, which are prompting the Internet community to
                 assess significant changes in the protocol suite. We
                 relate these issues to the IBM Open Blueprint*. Much as
                 the IBM Personal Computer brought computing to millions
                 of people, the Internet service of the IBM Global
                 Network and IBM's Internet Connection products are
                 bringing networking to millions of people and are
                 changing how customers are transacting business among
                 themselves and with IBM.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Networking Software Div., Research Triangle Park,
                 NC, USA",
  classification = "B6150M (Protocols); B6210L (Computer
                 communications); C5620W (Other computer networks);
                 C5640 (Protocols)",
  keywords =     "Academic research; Commercial use; Government
                 research; IBM Global Network; IBM Open Blueprint; IBM
                 personal computer; Internet Connection; Protocol suite;
                 TCP/IP; Transmission Control Protocol/Internet
                 Protocol",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "IBM computers; Internet; Transport protocols; Wide
                 area networks",
}

@Article{Pozefsky:1995:MTN,
  author =       "D. Pozefsky and R. Turner and A. K. Edwards and S.
                 Sarkar and J. Mathew and G. Bollella and K. Tracey and
                 D. Poirier and J. Fetvedt and W. S. Hobgood and W. A.
                 Doeringer and D. Dykeman",
  title =        "{Multiprotocol Transport Networking}: Eliminating
                 application dependencies on communications protocols",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "3",
  pages =        "472--500",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-3.html#nine",
  abstract =     "The Multiprotocol Transport Networking (MPTN)
                 architecture is a general solution that breaks the
                 binding between distributed applications and
                 communications protocols. The MPTN architecture enables
                 existing applications to run unmodified over any
                 communications protocol. In this paper, we first
                 present the trends in networking that resulted in
                 today's networks supporting multiple communications
                 protocols. Next, we describe the classes of problems
                 this support causes. The MPTN architecture is described
                 and presented as a solution to many of these problems.
                 We also present several alternative solutions to the
                 multiple communications protocol problem and compare
                 them to the MPTN solution. Last, we describe the IBM
                 AnyNet* family of products that implement the MPTN
                 architecture.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Networking Software Div., Research Triangle Park,
                 NC, USA",
  classification = "B6150M (Protocols); B6210L (Computer
                 communications); C5620 (Computer networks and
                 techniques); C5640 (Protocols)",
  keywords =     "Application dependencies; Communications protocols;
                 Distributed application; IBM AnyNet; MPTN architecture;
                 Multiprotocol Transport Networking",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer networks; IBM computers; Open systems;
                 Protocols",
}

@Article{Arnette:1995:CAD,
  author =       "W. S. Arnette and A. D. Kshemkalyani and W. B. Riley
                 and J. P. Sanders and P. J. Schwaller and J. C. Terrien
                 and J. Q. Walker",
  title =        "{CPI-C}: An {API} for distributed applications",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "3",
  pages =        "501--518",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-3.html#ten",
  abstract =     "Distributed applications have fostered the
                 standardization of application programming interfaces
                 for the underlying communication services. Three
                 popular communication models---remote procedure calls,
                 messaging and queuing, and conversations---support
                 distributed applications across different networking
                 protocols and physical media. Access to the
                 conversational services of Advanced Program-to-Program
                 Communication and Open Systems
                 Interconnection-Distributed Transaction Processing is
                 provided by the Common Programming Interface for
                 Communications (CPI-C), a standard, easy-to-use
                 interface for communication programming. This paper
                 introduces the basic concepts of CPI-C, describes the
                 conversation services available to programs, and
                 presents examples of CPI-C programming.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Networking Software Div., Research Triangle Park,
                 NC, USA",
  classification = "C5620 (Computer networks and techniques); C6150J
                 (Operating systems); C6150N (Distributed systems
                 software)",
  keywords =     "Advanced Program-to-Program Communication; API;
                 Application programming interfaces; Common Programming
                 Interface for Communications; Communication programming
                 interface; Communication services; Conversation
                 services; Conversations; CPI-C; Distributed
                 applications; Messaging; Networking protocols; Open
                 Systems Interconnection-Distributed Transaction
                 Processing; OSI DTP; Queuing; Remote procedure calls;
                 Standardization",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Application program interfaces; Open systems;
                 Protocols; Remote procedure calls; Standardisation;
                 Transaction processing",
}

@Article{Aldred:1995:AMC,
  author =       "B. K. Aldred and G. W. Bonsall and H. S. Lambert and
                 H. D. Mitchell",
  title =        "An architecture for multimedia communication and
                 real-time collaboration",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "3",
  pages =        "519--543",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-3.html#eleven",
  abstract =     "The paper presents the requirements for real-time
                 multimedia communication in a collaborative environment
                 and describes how the requirements can be met through
                 the IBM Lakes architecture. The initiatives of the
                 ITU-T through the T.120 series of recommendations are
                 described, and the interoperability of Lakes with these
                 recommendations is discussed.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM UK Labs. Ltd., Hursley, UK",
  classification = "B6210L (Computer communications); B6210R (Multimedia
                 communications); C5620 (Computer networks and
                 techniques); C6130G (Groupware); C6130M (Multimedia)",
  keywords =     "IBM Lakes architecture; Interoperability; ITU-T;
                 Multimedia communication; Real-time collaboration;
                 Recommendations; Requirements; T.120 series",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Computer networks; Groupware; IBM computers;
                 Multimedia communication; Multimedia computing; Open
                 systems; Real-time systems",
}

@Article{Beck:1995:BPE,
  author =       "Kent Beck",
  title =        "Books: ``{Design Patterns: Elements of Reusable
                 Object-Oriented Software}'', by {Erich Gamma}, {Richard
                 Helm}, {Ralph Johnson}, and {John Vlissides}",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "3",
  pages =        "544--545",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:33:59 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Clements:1995:BDP,
  author =       "Paul C. Clements",
  title =        "Books: ``{The Mythical Man-Month --- Essays on
                 Software Engineering}'', 20th Anniversary Edition, by
                 {Frederick P. Brooks, Jr.}",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "3",
  pages =        "545--547",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Sep 30 14:55:12 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1995:Pd,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "4",
  pages =        "552--553",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "Issue Order No. G321-0122.",
  URL =          "http://www.research.ibm.com/journal/sj34-4.html#one",
  abstract =     "An essential ingredient in the movement of large
                 amounts of data on worldwide digital networks is
                 agreement on and computer support for internationally
                 recognized architectures for broadband communications
                 services. IBM has contributed to the development of
                 international standards for asynchronous transfer mode
                 (ATM), which underlies much of the effort to produce
                 systems for broadband computer communications and
                 digital networks. IBM's high-speed, multimedia
                 networking architecture and products, based on the ATM
                 architecture, are known by the term Networking
                 BroadBand Services (NBBS) and fit under the umbrella of
                 IBM's Open Blueprint*. \par This issue contains an
                 introductory essay on ATM and NBBS and ten papers on
                 the NBBS approach, architecture, technologies, and
                 products. In combination with the previous issue of the
                 Journal on network technologies and systems, this issue
                 shows the direction IBM has taken in delivering
                 architecture, systems, and products for worldwide
                 digital communications. We are indebted to M. R.
                 Wiggins of the IBM Networking Hardware Division in
                 Research Triangle Park, North Carolina, for his
                 contributions to the creation, development, and
                 preparation of this issue. \par The development of
                 high-performance networks is driven by demand for high
                 levels of network integration, transparent
                 connectivity, high capacity, high speed, and lower
                 costs. Cohen and Abensour, in an introductory essay,
                 discuss those needs, describe the ATM architecture as a
                 response to those needs, and present IBM's strategy for
                 fulfilling the ATM architectural requirements. \par
                 Budhiraja et al. show in their paper, multicasting
                 requires an architecture and protocols that support
                 definition and control of the set of recipients and
                 provide high-speed and high-quality network
                 connections. NBBS contains a multicast architecture
                 that meets these requirements, for which the authors
                 supply an overview. \par Ahmadi et al. discuss a
                 further aspect of networks in general and ATM networks
                 in particular: traffic management. Included in this
                 broad term are such important and fundamental tasks as
                 path selection, bandwidth allocation, administration of
                 service guarantees, and various other connection-,
                 packet-, and cell-level controls. In this paper the
                 authors describe the associated NBBS features and their
                 interaction. \par Selection of network paths and links
                 for high-speed and, notably, multimedia applications
                 with quality-of-service guarantees and constraints is
                 the subject of a paper by Tedijanto et al. Since the
                 resulting selection is a nonpolynomial- (NP-) complete
                 problem, the authors describe their heuristic algorithm
                 for determining an effective path. The algorithm has
                 features such as connection and preemption priorities
                 and the use of primary and secondary paths. \par
                 Network control protocols have traditionally assumed
                 relatively slow and error-prone networks. Today's
                 high-speed and reliable networks are more effectively
                 served by protocols that take advantage of those
                 characteristics. Peyravian et al., in their paper,
                 present their work on the new Rapid Transport Protocol,
                 designed to provide fast and effective distributed
                 network control for point-to-point and multicast
                 communications and in use as part of NBBS. \par
                 Immanual et al. describe the impact of the many current
                 network protocols on the ability of networks to operate
                 effectively. In NBBS the solution to this technical
                 issue resides in the access services of the NBBS
                 transport functions, using the model of access agents
                 that exploit NBBS features to effectively deal with
                 multiple network protocols, while shielding users from
                 detailed knowledge of how this is accomplished. The
                 authors demonstrate their approach through examples of
                 access agents. \par Onvural et al. present two
                 challenges to the effective utilization of the ATM
                 architecture and its technologies: the development of
                 network control services meeting ATM standards without
                 performance degradation, and efficient implementation
                 of the ATM standards themselves. The authors give the
                 current status of the standards, discuss the NBBS
                 response, and describe efficient implementations of the
                 standards in NBBS. \par In order to control and limit
                 the network complexity visible at each node of an NBBS
                 network, the notion of an NBBS access node has been
                 developed. Unlike an intermediate node, an access node
                 can only operate at the edge of the network map and can
                 therefore effectively minimize its knowledge and
                 support of the rest of the network, without detracting
                 from the size or effectiveness of the network as a
                 whole. Budhiraja et al. present the NBBS access node
                 and describe its architecture and function. \par
                 High-speed switching is a critical part of broadcast
                 networking. Lebizay et al. describe the architecture
                 and technology of the IBM transport network node and
                 explain how it supports the NBBS architecture. The
                 transport node platform uses switching technology
                 designed to avoid congestion and prevent loss of data.
                 The technology used for the switch's input and output
                 modular adapters allows them to be configured for port,
                 trunk, server, or control functions. The authors show
                 the effectiveness of the technology by showing hardware
                 and software performance figures. \par Modern networks
                 necessarily contain extensive capabilities for network
                 management, and NBBS is no exception. The paper by Owen
                 describes the overall NBBS approach and a number of
                 specific functions in the course of discussing such
                 concerns as network operation, use, accounting,
                 topology, performance, names, and fault management.
                 Owen's work incorporates the Common Management
                 Information Protocol (CMIP) and the Simple Network
                 Management Protocol (SNMP) standards. \par The next
                 issue of the Journal will present papers on medical
                 imaging, IBM's Information FrameWork, Resource Access
                 Control Facility (RACF*), and other topics. \par Gene
                 F. Hoffnagle Editor",
  acknowledgement = ack-nhfb,
}

@Article{Cohen:1995:ASI,
  author =       "M. E. Cohen and D. S. Abensour",
  title =        "An {ATM} strategy for {IBM} networking systems",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "4",
  pages =        "554--563",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-4.html#two",
  abstract =     "Advances in networking technology have created new
                 opportunities for information presentation. In turn,
                 new opportunities have created new demands for
                 bandwidth and services, and the need for a new kind of
                 networking. In this essay we explore the kind of
                 networking that is needed, explain how the asynchronous
                 transfer mode (ATM) technology answers that need, and
                 discuss IBM's strategy for providing networking
                 services built around ATM technology.",
  acknowledgement = ack-nhfb,
}

@Article{Marin:1995:ONA,
  author =       "G. A. Marin and C. P. Immanuel and P. F. Chimento and
                 I. S. Gopal",
  title =        "Overview of the {NBBS} architecture",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "4",
  pages =        "564--589",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-4.html#three",
  abstract =     "Networking BroadBand Services (NBBS) architecture has
                 been developed by IBM to meet the requirements of
                 high-speed networking. These include addressing
                 problems caused by emerging multimedia applications
                 with extremely high bandwidth requirements and
                 quality-of-service guarantees, as well as those of
                 supporting a variety of existing protocols and
                 interfaces. This paper offers an overview of NBBS and
                 provides insight into the technology and structure of
                 the architecture. Included is a synopsis of the driving
                 forces behind the architecture and a summary of how the
                 challenges of this new environment are addressed.",
  acknowledgement = ack-nhfb,
}

@Article{Budhiraja:1995:MNC,
  author =       "N. Budhiraja and M. Gopal and M. Gupta and E. A.
                 Hervatic and S. J. Nadas and P. A. Stirpe",
  title =        "Multicast network connection architecture",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "4",
  pages =        "590--603",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-4.html#four",
  abstract =     "IBM Networking BroadBand Services (NBBS) is a
                 comprehensive networking architecture designed for
                 high-speed networks. To meet the demands of multicast
                 communication applications, e.g., video on demand,
                 software distribution, and video conferencing, NBBS
                 multicast services provide support for efficient
                 best-effort and guaranteed quality-of-service (QOS)
                 multipoint network connections. The NBBS multicast
                 services consist of set management services and
                 multicast network connection services. Set management
                 services provide the ability to create and manage
                 groups of users who are interested in participating in
                 multicast activities. Multicast network connection
                 services use the group membership information provided
                 by set management services to support multiple network
                 connections per group and to provide supporting
                 services such as nondisruptive path switching, path
                 preemption, and bandwidth management. The multicast
                 network connection services support the multicast
                 signaling requirements defined by the asynchronous
                 transfer mode user-to-network interface (ATM UNI)
                 specifications. This paper gives an overview of the
                 NBBS multicast connection services. Set concepts are
                 introduced, an overview of set management protocols is
                 given, and the value of set management services in
                 establishing multicast network connections is
                 explained. Finally, multicast network connection
                 protocols that establish, maintain, and terminate
                 multicast network connections are described.",
  acknowledgement = ack-nhfb,
}

@Article{Ahmadi:1995:NTM,
  author =       "H. Ahmadi and P. F. Chimento and R. A. Guerin and L.
                 Gun and B. Lin and R. O. Onvural and T. E. Tedijanto",
  title =        "{NBBS} traffic management overview",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "4",
  pages =        "604--628",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-4.html#five",
  abstract =     "In this paper, we describe an integrated set of
                 procedures used for bandwidth management and congestion
                 control in high-speed packet-switched networks such as
                 asynchronous transfer mode (ATM), which are part of
                 IBM's Networking BroadBand Services (NBBS)
                 architecture. These controls are designed to support a
                 wide variety of services with different characteristics
                 in the network and operate at different time scales:
                 connection-level controls such as path selection,
                 admission control and bandwidth allocation, and
                 packet-level controls that discriminate between packets
                 from different connections to support multiple levels
                 of service guarantees. Connection-level controls are
                 applied at connection setup time and are based on the
                 connection characterization and the network state at
                 that time. They perform efficient allocation of
                 resources to ensure performance guarantees for
                 connections while achieving high utilization of network
                 resources. Various packet-level controls developed
                 include access or rate control and intermediate node
                 buffer management and scheduling. For connections that
                 do not require explicit service guarantees, NBBS offers
                 an available bit rate service. This service mostly
                 relies on packet-level control in the form of an
                 end-to-end rate-based flow control algorithm that
                 regulates the flow of traffic into the network. This
                 paper, in addition to providing an overview of the
                 different mechanisms used for traffic management in
                 NBBS, highlights how they interact to ensure efficient
                 network operation.",
  acknowledgement = ack-nhfb,
}

@Article{Tedijanto:1995:NPS,
  author =       "T. E. Tedijanto and R. O. Onvural and D. C. Verma and
                 L. Gun and R. A. Guerin",
  title =        "{NBBS} path selection framework",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "4",
  pages =        "629--639",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-4.html#six",
  abstract =     "This paper describes the path selection function in
                 Networking BroadBand Services (NBBS), which is IBM's
                 architecture for high-speed, multimedia networks. The
                 distinguishing feature of a multimedia network is its
                 ability to integrate different applications with
                 different traffic characteristics and service
                 requirements in the network, such as voice, video, and
                 data. In order to meet their service requirements, it
                 is necessary for the network to provide unique
                 quality-of-service (QOS) guarantees to each
                 application. QOS guarantees, specified as multiple
                 end-to-end performance objectives, translate into path
                 and link constraints in the shortest path routing
                 problem. For a general cost function, shortest path
                 routing subject to path constraints is known to be a
                 nonpolynomial- (NP-) complete problem. The NBBS path
                 selection algorithm, a heuristic solution based on the
                 Bellman-Ford algorithm, has a polynomial order of
                 complexity. The algorithm finds a minimum hop path
                 satisfying an end-to-end delay (or delay variation)
                 constraint, that in most cases also optimizes a load
                 balancing function. To reduce the number of path
                 constraints, other QOS requirements such as packet loss
                 ratio are implemented as a link constraint. The notion
                 of primary and secondary links is used to minimize the
                 long-term overall call blocking probability by
                 dynamically limiting the hop count of a given path. The
                 path selection algorithm developed for point-to-point
                 connections is described first, followed by its
                 extension to the case of point-to-multipoint
                 connections.",
  acknowledgement = ack-nhfb,
}

@Article{Peyravian:1995:ETD,
  author =       "M. Peyravian and R. Bodner and C.-S. Chow and M.
                 Kaplan",
  title =        "Efficient transport and distribution of network
                 control information in {NBBS}",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "4",
  pages =        "640--658",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-4.html#seven",
  abstract =     "With the advances in fiber-based transmission systems
                 that operate at gigabit rates and with the introduction
                 of high-speed networks, the course of communication and
                 computer technologies has changed forever. This change
                 requires that new attention be focused first on the
                 creation, then on the control of networks, which now
                 contain high-speed links and integrate heterogeneous
                 traffic. IBM's Networking BroadBand Services (NBBS)
                 architecture has been designed to enable this
                 networking revolution and, in particular, is designed
                 for the high-speed, multimedia networks needed by
                 emerging applications. In this paper, we present the
                 Rapid Transport Protocol (RTP). Its simple and
                 efficient mechanisms enable NBBS control information to
                 be transported and distributed, taking advantage of
                 high-speed links by eliminating as much nodal
                 processing as possible. RTP provides point-to-point and
                 point-to-multipoint transport services with a reliable
                 delivery option. In addition, we present a simple and
                 efficient mechanism for fast dissemination of
                 time-critical network configuration and path update
                 messages to every node in an NBBS network, making use
                 of RTP.",
  acknowledgement = ack-nhfb,
}

@Article{Immanuel:1995:ASN,
  author =       "C. P. Immanuel and G. M. Kump and H. J. Sandick and D.
                 A. Sinicrope and K. V. Vu",
  title =        "Access services for the {Networking BroadBand
                 Services} architecture",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "4",
  pages =        "659--671",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-4.html#eight",
  abstract =     "This paper describes how Networking BroadBand Services
                 (NBBS) provides multiple protocol support over emerging
                 high-bandwidth networks. It describes the problems
                 associated with handling these multiple protocols that
                 are seen now more than ever in the emerging
                 asynchronous transfer mode (ATM) infrastructure. The
                 paper addresses the access services of NBBS and how the
                 NBBS transport functions are used to provide these
                 access services. A detailed example of one access
                 service component is given to provide the reader with a
                 feeling for typical access services issues. Brief
                 examples of access services are given to show how the
                 concepts described are being used.",
  acknowledgement = ack-nhfb,
}

@Article{Onvural:1995:EAN,
  author =       "R. O. Onvural and H. J. Sandick and G. M. Kump and E.
                 A. Hervatic and P. F. Chimento",
  title =        "Enabling {ATM} networks",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "4",
  pages =        "672--693",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-4.html#nine",
  abstract =     "Asynchronous transfer mode (ATM) is the primary
                 candidate technology for emerging high-speed networks.
                 ATM standardization provides the basic framework for
                 building ATM networks. Although the development of ATM
                 standards and the availability of high-speed links in
                 the network is essential, what really matters is how
                 ATM networks are enabled so as to integrate different
                 services with different traffic characteristics and
                 service requirements. Two important contributions to
                 this integration are the development of network control
                 services complementing ATM standards while achieving
                 high utilization of network resources and the efficient
                 implementation of the ATM standards in the network. In
                 this paper, we present a short overview of the current
                 status of ATM standards, discuss how various control
                 services that were developed in IBM's Networking
                 BroadBand Services architecture complement the ATM
                 standards, and provide an overview of various functions
                 included in the architecture for their efficient
                 implementation.",
  acknowledgement = ack-nhfb,
}

@Article{Budhiraja:1995:NAN,
  author =       "N. Budhiraja and M. Gopal and M. Gupta and E. A.
                 Hervatic and S. J. Nadas and P. A. Stirpe and L. A.
                 Tomek and D. C. Verma",
  title =        "The {NBBS} access node",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "4",
  pages =        "694--704",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-4.html#ten",
  abstract =     "Networking Broadband Services (NBBS) is an advanced
                 wide-area-networking architecture that provides a rich
                 set of services to support emerging applications for
                 which quality of service and bandwidth reservation are
                 critical, as well as legacy applications. The advanced
                 features provided by the NBBS architecture require that
                 each network node maintain a fully replicated topology
                 database. As the size of the network increases, the
                 network control costs at each network node become
                 prohibitively high. The NBBS access node is a low-cost
                 end node that introduces a hierarchical structure to
                 the NBBS architecture, holding down network control
                 costs while allowing the network to increase in size.
                 The access node contains a subset of NBBS services. It
                 is restricted to the periphery of the network and does
                 not perform intermediate-node switching functions. It
                 provides access to the NBBS backbone network by
                 negotiating a relationship with an immediately attached
                 network node (server network node) to obtain full NBBS
                 services. In this paper, we discuss the requirements
                 for the NBBS access node, examine the relationship
                 between the access node and the server network node,
                 and provide an overview of the access node
                 architecture.",
  acknowledgement = ack-nhfb,
}

@Article{Lebizay:1995:HTN,
  author =       "G. Lebizay and C. Galand and D. Chevalier and F.
                 Barre",
  title =        "A high-performance transport network platform",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "4",
  pages =        "705--724",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-4.html#eleven",
  abstract =     "This paper introduces the architecture and the
                 technology of the new IBM transport network offering,
                 which supports both fixed-length and variable-length
                 packet switching. After a review of the broadband
                 networking environment and the requirements it makes on
                 the transport network, the transport network node is
                 described. The hardware and software architecture is
                 described, and performance figures are reported showing
                 that the switch can handle a mix of traffic while
                 sustaining maximum throughput.",
  acknowledgement = ack-nhfb,
}

@Article{Owen:1995:NNM,
  author =       "S. A. Owen",
  title =        "{NBBS} network management",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "4",
  pages =        "725--750",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj34-4.html#twelve",
  abstract =     "Network management for Networking BroadBand Services (
                 NBBS), a general-purpose, multiprotocol, high-speed
                 transport backbone is discussed. The paper begins with
                 the objectives and the key choices made in the
                 development of the network management solution. The
                 managed environment for high-speed transport networks
                 and some features of the NBBS architecture that have
                 influenced the network management solution are
                 described, along with the relationship between the
                 network manager and the managed target system agent,
                 the actual communication environment for the Nways*
                 Switch Manager. The relationship between the Network
                 Management Workstation and an NBBS node acting as a
                 network management agent is presented. The use of
                 managed object classes to provide a Management
                 Information Base (MIB) that may be accessed by a
                 manager using the Common Management Information
                 Protocol (CMIP) to manage NBBS networks is then
                 discussed. Management application models for
                 accounting, configuration, topology, performance, and
                 fault management for NBBS are illustrated, showing how
                 they relate to the NBBS managed objects. The paper
                 concludes with a look at future directions for the NBBS
                 management solution.",
  acknowledgement = ack-nhfb,
}

@Article{Vetter:1995:BCN,
  author =       "R. J. Vetter",
  title =        "Books: ``{Routing in Communications Networks}'',
                 {Martha Streenstrup, Editor}",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "4",
  pages =        "751--752",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:34:26 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Johnson:1995:BSP,
  author =       "D. B. Johnson",
  title =        "Books: ``{Network Security: Private Communication in a
                 Public World}'', by {Charlie Kaufman}, {Radia Perlman},
                 and {Mike Speciner}",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "4",
  pages =        "752--753",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 18:34:21 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1995:SR,
  author =       "Anonymous",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "4",
  pages =        "754--757",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Mar 18 14:35:57 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1995:CV,
  author =       "Anonymous",
  title =        "Contents of Volume 34, 1995",
  journal =      j-IBM-SYS-J,
  volume =       "34",
  number =       "4",
  pages =        "758--759",
  year =         "1995",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Mar 18 14:35:57 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1996:Pa,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "1",
  pages =        "2--3",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 25 12:39:01 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  note =         "Issue Order No. G321-0123",
  URL =          "http://www.research.ibm.com/journal/sj35-1.html#one",
  abstract =     "This issue contains five papers on a variety of
                 subjects: medical image processing using object
                 technology, monitoring of computer network topology
                 through events, IBM's Information FrameWork and its
                 architecture, generation of applications for
                 manufacturing, and access control in host-centric
                 computing. \par The first paper, by Elliott et al.,
                 describes and illustrates how object technology is
                 being used to create an easily modified system for
                 image analysis of medical scans in three dimensions.
                 Such systems are important for precise targeting of
                 radiation treatments. The flexibility provided here
                 allows production and testing of alternate approaches
                 for analyzing the images. The authors show how their
                 system is constructed, explain alternate analysis
                 systems and associated algorithms that have been
                 successfully incorporated for clinical testing, and
                 provide insights into the practical aspects of image
                 analysis for clinicians. \par One of the challenges of
                 network management is to closely monitor and adjust the
                 network configuration, or topology, without significant
                 loss of network bandwidth and performance to the
                 monitoring functions themselves. Chao and Tsun explore
                 an event-driven approach for monitoring point-to-point
                 networks that only requires nodes to keep information
                 about neighboring nodes. Their approach uses polling
                 and event monitoring, saves bandwidth over approaches
                 that only use polling, and maintains a map and history
                 of the network's topology. The existence of a map, and
                 its continuous updating, greatly eases the tasks of the
                 network operators. \par In a paper by Evernden, the
                 framework and architectural concepts built around John
                 Zachman's information systems architecture (ISA) are
                 broadened and deepened to provide a more comprehensive
                 Information FrameWork (IFW). In particular, the focus
                 is shifted to information and its management as a vital
                 business asset. The IFW contains three views of
                 information: organization, business, and technical. IFW
                 also has six dimensions: information types, levels of
                 constraint, content, transformation over time,
                 ownership, and methodology chains, which the author
                 refers to as routemaps. Considerable information is
                 provided that relates IFW to ISA and compares their
                 characteristics. \par Automation of manufacturing
                 engineering can be largely automated itself, according
                 to Hazony. He has developed a problem-solving platform
                 for engineering that is intended to allow rapid and
                 easy conceptualization, design, and implementation of
                 manufacturing systems. This system generator runs on
                 commercially available personal computers. The author
                 presents the mathematical and technical foundations,
                 the generator design, and examples of its use. The key
                 design point of the Application System Generator on the
                 personal computer (ASG/PC) is the complete integration
                 of the seamless-design-to-manufacture (SDTM) process.
                 \par Over the years, sophisticated mechanisms have been
                 developed for controlling access in host-centric
                 systems. The authors of the next paper, Benantar,
                 Guski, and Troidle, provide a review of the key
                 theoretical models for such access control. Then they
                 use IBM's Multiple Virtual Storage (MVS) operating
                 system and the Resource Access Control Facility (RACF*)
                 as examples, showing how the models can be applied to
                 host-centric and network-centric computing
                 environments. The authors describe administration,
                 security contexts, resource access, and auditing and
                 reporting. \par As the Journal begins its 35th year, we
                 would like to acknowledge the support of readers,
                 authors, and referees that makes such a long history
                 possible. We thank you and encourage you to continue
                 your interest and participation in this publication. We
                 point out that in 1995 we published 37 papers and one
                 Technical Forum, and we offered the work of a record
                 177 authors in the third largest volume ever, at 760
                 pages. It also seems appropriate at such a time to
                 state a few facts that sometimes escape us as we focus
                 on a single paper, theme, or special issue. First, this
                 publication is a quarterly refereed technical journal,
                 which means \par that the integrity of each paper is
                 ensured by a process that depends upon peer reviews of
                 content, currency, and value by recognized experts
                 within and outside IBM. Second, it is intended for the
                 software and systems professional and applied research
                 community worldwide. The papers are written for a
                 technically aware readership, and we welcome
                 submissions by knowledgeable authors around the globe,
                 within and outside IBM. Third, the Journal has over
                 60,000 subscribers worldwide. Of those, approximately,
                 two-thirds are technical professionals and researchers
                 outside IBM; one-third are IBM employees; two-thirds
                 are in the United States; and one-third are in other
                 countries. \par The next issue of the Journal will be a
                 special issue on object technology. \par Gene F.
                 Hoffnagle Editor",
  acknowledgement = ack-nhfb,
}

@Article{Elliott:1996:OSM,
  author =       "P. J. Elliott and J. Diedrichsen and K. J. Goodson and
                 R. Riste-Smith and G. J. Sivewright",
  title =        "An object-oriented system for {3D} medical image
                 analysis",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "1",
  pages =        "4--24",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 10:10:14 MST 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj35-1.html#two",
  abstract =     "As part of a European Commission-funded research
                 project on medical image analysis, we have developed a
                 system aimed at solving a real clinical problem: the
                 outlining of the target volume and organs at risk for
                 three-dimensional conformal radiation treatment
                 planning. The clinical requirement is to make this
                 process less tedious and time-consuming. We show how
                 object-oriented design techniques can be used to good
                 effect in a collaborative project such as this, so that
                 image segmentation and other algorithms from a number
                 of different partners in the consortium can be
                 integrated into one system, for comparative evaluation
                 by the clinical partners. We describe in some detail
                 two of these algorithms, one a straightforward region
                 and volume grower, in which particular attention has
                 been paid to adapting the user interface to suit
                 clinical needs, and the other an interactive tool using
                 b-spline surface patches for direct three-dimensional
                 segmentation. We report on the clinical feedback we
                 have received, which indicates that the most
                 technically advanced algorithms are not necessarily the
                 most useful from a clinician's point of view.",
  acknowledgement = ack-nhfb,
}

@Article{Chao:1996:ENT,
  author =       "W. Chao and W. Tsun",
  title =        "Event-driven network topology monitoring function",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "1",
  pages =        "25--36",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 10:10:14 MST 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj35-1.html#three",
  abstract =     "This paper discusses the design of a topology
                 management application. The application monitors the
                 topology of point-to-point networks in which each
                 network node is required to contain only local trunk
                 information. To build and continuously update the
                 topology map, information must be collected from
                 network nodes. The challenge is to do this in real time
                 without adversely consuming network bandwidth. By
                 defining a clear set of conditions to determine whether
                 polling or event monitoring should be used, this design
                 makes it possible to realize the advantage of
                 monitoring network topology by processing events. With
                 the use of event monitoring, first, consumption of
                 network bandwidth by network management traffic can be
                 significantly reduced compared to a pure polling
                 approach, and second, the topology map represents a
                 continuous topology history.",
  acknowledgement = ack-nhfb,
}

@Article{Evernden:1996:IF,
  author =       "R. Evernden",
  title =        "The {Information FrameWork}",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "1",
  pages =        "37--68",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 10:10:14 MST 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj35-1.html#four",
  abstract =     "John Zachman's framework for information systems
                 architecture has been widely discussed since its
                 publication in the IBM Systems Journal in 1987. This
                 paper shows how the development of the Information
                 FrameWork (IFW) has built upon the ideas presented by
                 Zachman. However, the objectives and scope of IFW are
                 broader than that of the original Zachman framework.
                 IFW is described and compared with the original Zachman
                 structure, showing the evolution, changes, and the
                 rationale behind the changes based on experiences from
                 within the financial services industry. This paper also
                 shows how the structure of IFW has been populated by
                 industry-wide models and supported by a distinctive
                 methodology. A detailed discussion of each of the six
                 dimensions of the IFW architecture is presented.",
  acknowledgement = ack-nhfb,
}

@Article{Hazony:1996:SGP,
  author =       "Y. Hazony",
  title =        "System generator for producing manufacturing
                 applications",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "1",
  pages =        "69--93",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 10:10:14 MST 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj35-1.html#five",
  abstract =     "The Application System Generator (ASG/PC) offers
                 powerful capabilities for integrating the personal
                 computer into problem-solving in manufacturing
                 engineering. Implemented on Pentium**-class personal
                 computers, it provides an easy-to-use,
                 application-building platform for mathematically based
                 solutions to a variety of engineering problems. The
                 ASG/PC provides a master editor for incrementally
                 developing the complete environment of an entire
                 application. Such an application may entail hundreds of
                 programs, most of which are automatically generated.
                 These programs also include color-coded textual and
                 graphic screen interactions, keyboard control, file
                 management, and access to auxiliary equipment. The
                 ASG/PC is designed for use by the application-domain
                 engineer who will also be the end user of the
                 technology. Facilities are provided for the integration
                 of components developed through teamwork. Two
                 applications of the ASG/PC are described: one is in the
                 domain of rapid-response machining; the second is a
                 system for rapid analysis and redesign of the factory
                 floor. The ASG/PC was designed to facilitate an
                 incremental, self-learning process.",
  acknowledgement = ack-nhfb,
}

@Article{Benantar:1996:ACS,
  author =       "M. Benantar and R. Guski and K. M. Troidle",
  title =        "Access control systems: From host-centric to
                 network-centric computing",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "1",
  pages =        "94--112",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 10:10:14 MST 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj35-1.html#six",
  abstract =     "In this paper, we review the important theoretical
                 models of computer access control systems. Using the
                 IBM Multiple Virtual Storage (MVS) operating system as
                 the example, we show how the principles expressed in
                 these models can be implemented. The roots of user
                 authentication and access control on MVS are examined,
                 tracing the convergence of the requirement for controls
                 with the development of appropriate software. The paper
                 also highlights security and auditing features unique
                 to the host-centric computing model and discusses how
                 these existing technologies might be applied to the
                 security problems presented by the newer networking
                 computing models. Finally, we look to the future and
                 suggest the environment that will result when the
                 host-centric computing model for security and access
                 control is interoperated with the networking computing
                 models.",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1996:BIR,
  author =       "Anonymous",
  title =        "Books: {``Doing IT Right: Technology, Business, and
                 Risk of Computing'', by Harold Lorin (ISBN
                 1-884777-09-0), reviewed by Robert M. Orfali. ``The
                 Essential Distributed Objects Survival Guide'', by
                 Robert Orfali, Dan Harkey, and Jeri Edwards (ISBN
                 0-471-12993-3), reviewed by Harold Lorin. ``Secrets of
                 Software Quality: 40 Innovations from IBM'', by Craig
                 Kaplan, Ralph Clark, and Victor Tang, (ISBN
                 0-07-911795-3). Reviewed by Stephen H. Kan}",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "1",
  pages =        "113--116",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 20 10:10:14 MST 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1996:Pb,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "2",
  pages =        "122--123",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:28:44 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj35-2.html#one",
  abstract =     "Issue Order No. G321-0124 \par Objects,
                 object-oriented techniques, and object technology have
                 altered the software development landscape for software
                 professionals and, more slowly, altered the cost,
                 quality, and timeliness of modified and new systems for
                 users and customers. Objects are the latest and most
                 effective means so far for creating software that is
                 easy to develop, relatively error-free, portable,
                 reusable, and serves as a continually evolving platform
                 for yet more advanced software capabilities. \par This
                 issue contains an introductory essay on the evolution
                 of object technology, six papers on various facets of
                 object technology and its use, and a technical note on
                 supertypes and subjects. We are indebted to J. R. Babb
                 of the IBM Software Solutions Division in Somers, New
                 York, for his contributions to the early planning and
                 coordination of this issue and to G. Radin of the IBM
                 Research Division in Yorktown Heights, New York, for
                 his noteworthy efforts in coordinating and developing
                 this issue. \par The existence of object technology
                 owes much to a long line of preceding technologies that
                 evolved into what we see and use today. Object
                 technology represents the latest and best approach to
                 achieving software productivity, quality,
                 maintainability, reuse, and effective development.
                 Radin, in an introductory essay, describes aspects of
                 object technology that demonstrate its power for
                 software development and developers, while reflecting
                 on the historical precedents and evolutionary trail.
                 \par The ability to create information systems that
                 serve enterprises depends on both an inside view of
                 those systems, such as is supplied by architecture and
                 engineering, and an outside or user view. As McDavid
                 shows in his paper, this outside view is fundamentally
                 dependent on an understanding of the enterprise as an
                 information system, communicating through
                 domain-specific languages. The result is business
                 language analysis. The effect is improvement in the
                 link between the application domain (the enterprise)
                 and domain-sensitive object technologies. \par Budinsky
                 et al. provide the architecture for and a description
                 of a software tool for automatic translation of
                 object-oriented design patterns into code, based on
                 design patterns taken from the current literature on
                 the subject. The architecture emphasizes speed of tool
                 development and enhancement, flexibility in adding and
                 changing functions, ease of specification of the
                 design-to-code translations, and ease of use of the
                 tool and its results, among other goals. The tool is
                 new and much remains to be learned from users and
                 incorporated from the ever-expanding breadth and depth
                 of design patterns. \par The storage of application
                 data in one or more of the many database management
                 systems has become problematic for the application
                 programmer and is the subject of a paper by Reinwald et
                 al. The authors present a shared memory-resident cache
                 as an extension to IBM's DB2* Common Server for AIX*
                 that provides a means for storing objects within a
                 relational database management system. While a number
                 of types of data are discussed, the paper uses C++
                 objects as an example of how common data storage can be
                 achieved without affecting the underlying objects. \par
                 Benantar, Blakley, and Nadalin explore the requirements
                 for and architecture of the run-time Object Security
                 Service (OSS), a part of IBM's Distributed SOM (System
                 Object Model) environment. OSS handles authentication,
                 authorization, client/server association, and other
                 security functions, while taking advantage of existing
                 security mechanisms. OSS provides these services to end
                 users and application developers transparently,
                 seamlessly, and independently of other underlying and
                 coexisting services. \par One difficulty in achieving
                 high-quality software is the lack of software metrics
                 that can be viewed in real time, as the software is
                 being developed. Burbeck approaches this problem in the
                 broad context of general real-time metrics and then in
                 the specific context of complexity metrics for
                 object-oriented software development in Smalltalk. The
                 author searches out metrics that can be readily
                 determined from code and are measurable in real time,
                 resulting in seven complexity metrics. Advice is given
                 regarding the value and use of these metrics in
                 practice. \par Davis, Grimes, and Knoles address the
                 technological response to the need for international
                 use of text in global applications that have only one
                 physical, binary form. They further consider the
                 localization aspects (language, time, date formats,
                 etc.) that must be adequately handled by these global
                 applications. Their context for discussion is the
                 globalization features of Taligent's CommonPoint**
                 application system for development of documents and
                 object-oriented applications, and the Unicode**
                 international character encoding standard. \par In a
                 technical note, Harrison et al. describe their recent
                 work on combining the capabilities of dynamic
                 supertypes and subjects (from subject-oriented
                 programming) that they have separately developed. This
                 first look at the combination shows how specification
                 and development of object-oriented software would be
                 enhanced, especially for large, complex systems. The
                 combined approach is intended to provide a natural way
                 to encompass the entire software development life
                 cycle. \par The next issue of the Journal will be a
                 special double issue (Volume 35, Numbers 3 and 4 as one
                 issue) on the current projects of the Massachusetts
                 Institute of Technology (MIT) Media Lab, famous for its
                 work on multimedia and now exploring many new fields of
                 future-oriented computerization.",
  acknowledgement = ack-nhfb,
}

@Article{Radin:1996:OTP,
  author =       "G. Radin",
  title =        "Object technology in perspective",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "2",
  pages =        "124--127",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:31:20 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj35-2.html#two",
  abstract =     "Since its beginnings half a century ago, the
                 technology applied to the development of software has
                 continually evolved. Object technology is the result of
                 a long progression of improvements, from the closed
                 subroutine, through structured development techniques
                 and data abstractions, to object-oriented languages,
                 design patterns, and frameworks. In this essay, the
                 author reflects on this evolution, specifically in the
                 areas of development productivity, software
                 maintainability, and paradigm consistency.",
  acknowledgement = ack-nhfb,
}

@Article{McDavid:1996:BLA,
  author =       "D. W. McDavid",
  title =        "Business language analysis for object-oriented
                 information systems",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "2",
  pages =        "128--150",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:29:13 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj35-2.html#three",
  abstract =     "Business language analysis grows out of a philosophy
                 that treats business organizations as living systems. A
                 key concern is the meaning of business information that
                 provides adaptive survival advantage and strategic
                 leverage. Popular object-oriented methodologies
                 correctly recognize the need to identify business
                 objects by analyzing the problem domain. The approach
                 described in this paper fills in the details that are
                 implied, but not specified by other methods. It builds
                 a business language model that clarifies both the
                 content and structure of the terminology actually used
                 in the business. Simple examples of business language
                 analyses are given. Deeper insight is offered in a
                 discussion of lexical semantic and category theory and
                 in the proposed notion of business language patterns.",
  acknowledgement = ack-nhfb,
}

@Article{Budinsky:1996:ACG,
  author =       "F. J. Budinsky and M. A. Finnie and J. M. Vlissides
                 and P. S. Yu",
  title =        "Automatic code generation from design patterns",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "2",
  pages =        "151--171",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:28:01 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj35-2.html#four",
  abstract =     "Design patterns raise the abstraction level at which
                 people design and communicate design of object-oriented
                 software. However, the mechanics of implementing design
                 patterns is left to the programmer. This paper
                 describes the architecture and implementation of a tool
                 that automates the implementation of design patterns.
                 The user of the tool supplies application-specific
                 information for a given pattern, from which the tool
                 generates all the pattern-prescribed code
                 automatically. The tool has a distributed architecture
                 that lends itself to implementation with off-the-shelf
                 components.",
  acknowledgement = ack-nhfb,
}

@Article{Reinwald:1996:SUO,
  author =       "B. Reinwald and T. J. Lehman and H. Pirahesh and V.
                 Gottemukkala",
  title =        "Storing and using objects in a relational database",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "2",
  pages =        "172--191",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:31:28 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj35-2.html#five",
  abstract =     "In today's heterogeneous development environments,
                 application programmers have the responsibility to
                 segment their application data and to store those data
                 in different types of stores. That means relational
                 data will be stored in RDBMSs (relational database
                 management systems), C++ objects in OODBMSs
                 (object-oriented database management systems), SOM
                 (System Object Model) objects in OMG (Object Management
                 Group) persistent stores, and OpenDoc** or OLE**
                 (Object Linking and Embedding) compound documents in
                 document files. In addition, application programmers
                 must deal with multiple server systems with different
                 query languages as well as large amounts of
                 heterogeneous data. This paper describes SMRC (shared
                 memory-resident cache), an RDBMS extender that provides
                 the ability to store objects created in external type
                 systems like C++ or SOM in a relational database,
                 coresident with existing relational or other
                 heterogeneous data. Using SMRC, applications can store
                 and retrieve objects via SQL (structured query
                 language), and invoke methods on the objects, without
                 requiring any modifications to the original object
                 definitions. Furthermore, the stored objects fully
                 participate in all the characteristic features of the
                 underlying relational database, e.g., transactions,
                 backup, and authorization. SMRC is implemented on top
                 of IBM's DB2* Common Server for AIX* relational
                 database system and heavily exploits the DB2
                 user-defined types (UDTs), user-defined functions
                 (UDFs), and large objects (LOBs) technology. In this
                 paper, the C++ type system is used as a sample external
                 type system to exemplify the SMRC approach, i.e.,
                 storing C++ objects in relational databases. Similar
                 efforts are required for SOM or OLE objects.",
  acknowledgement = ack-nhfb,
}

@Article{Benantar:1996:AOS,
  author =       "M. Benantar and B. Blakley and A. J. Nadalin",
  title =        "Approach to object security in {Distributed SOM}",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "2",
  pages =        "192--203",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:27:28 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj35-2.html#six",
  abstract =     "We briefly review the IBM System Object Model (SOM,
                 incorporated in SOMobjects**) and Distributed SOM
                 (DSOM). We then describe the base DSOM security
                 architecture characterized by the presence of the
                 Object Security Service (OSS) framework in the DSOM
                 run-time environment. Depending on its implementation,
                 this framework can be wrapped around procedural
                 security service providers, thus taking advantage of
                 existing security mechanisms. Subsequently we elaborate
                 on the OSS elements for authentication and
                 authorization and how they relate to the DSOM Object
                 Request Broker (ORB**) on the one hand, and to the
                 client and server applications on the other hand. We
                 discuss the DSOM approach to object access control and
                 present a novel method for enforcing it.",
  acknowledgement = ack-nhfb,
}

@Article{Burbeck:1996:RCM,
  author =       "S. L. Burbeck",
  title =        "Real-time complexity metrics for {Smalltalk} methods",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "2",
  pages =        "204--226",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:28:14 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj35-2.html#seven",
  abstract =     "This paper presents the rationale for ubiquitous and
                 immediate metric feedback on the com- plexity of
                 Smalltalk methods whenever they are viewed or changed.
                 It also presents seven metrics for Smalltalk methods
                 that can be quickly and easily determined from the code
                 and are suitable for real-time feedback. For each of
                 these metrics, there is a description, an explanation
                 of how it is determined and why it is related to
                 complexity, and suggestions for how to improve code
                 that receives a poor rating for the metric.",
  acknowledgement = ack-nhfb,
}

@Article{Davis:1996:CGS,
  author =       "M. E. Davis and J. D. Grimes and D. J. Knoles",
  title =        "Creating global software: Text handling and
                 localization in {Taligent's CommonPoint} application
                 system",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "2",
  pages =        "227--243",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:28:27 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj35-2.html#eight",
  abstract =     "Developing software that can be used across global
                 enterprises is one of the many challenges of today's
                 information technology systems. Taligent's
                 CommonPoint** application system eases this problem by
                 providing a foundation for fully global software, based
                 on object-oriented frameworks and the Unicode**
                 character encoding standard. This paper describes
                 Taligent's Unicode implementation and the CommonPoint
                 text and international frameworks. It discusses how the
                 CommonPoint system can be used to build international
                 software and some of the advantages of object-oriented
                 technology.",
  acknowledgement = ack-nhfb,
}

@Article{Harrison:1996:TND,
  author =       "W. H. Harrison and H. Kilov and H. L. Ossher and I.
                 Simmonds",
  title =        "Technical note --- From dynamic supertypes to
                 subjects: a natural way to specify and develop
                 systems",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "2",
  pages =        "244--256",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:28:37 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj35-2.html#nine",
  abstract =     "When we understand, specify, and develop systems, we
                 use certain concepts and constructs to deal with
                 complexity. Object-oriented (OO) approaches provide
                 good ways for doing so. However, many existing OO
                 approaches (perhaps based on object models used in
                 existing OO languages) cannot solve important problems
                 encountered in large and complex systems. For example,
                 we often have to deal with properties of ``things''
                 that cannot be represented in a neat hierarchy. Some of
                 these properties may significantly change with time.
                 Moreover, many of these properties refer to collections
                 of objects without identifying a single object as
                 ``owner'' of each property. The authors of this
                 technical note have separately proposed approaches for
                 solving these problems, but at very different stages of
                 the development life cycle. However, the underlying
                 concepts of these approaches are so close that they can
                 be successfully combined to provide a common solution
                 that encompasses all stages of the life cycle.",
  acknowledgement = ack-nhfb,
}

@Article{Rackmales:1996:BSO,
  author =       "Bernard A. Rackmales",
  title =        "Books: {{\em Succeeding with Objects: Decision
                 Frameworks for Project Management}, by Adele Goldberg
                 and Kenneth S. Rubin (ISBN 0-201-62878-3)} Reviewed",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "2",
  pages =        "257--258",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:29:22 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj35-2.html",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1996:Pc,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "265--265",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:31:39 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Negroponte:1996:AS,
  author =       "N. Negroponte",
  title =        "Asparagus Soup",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "266--268",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:31:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lippman:1996:PV,
  author =       "A. Lippman",
  title =        "Post-modern video",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "269--271",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:44 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lippman:1996:MBE,
  author =       "A. Lippman and R. Kermode",
  title =        "Media Banks: Entertainment and the {Internet}",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "272--291",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:45 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Picard:1996:SMV,
  author =       "R. W. Picard",
  title =        "A society of models for video and image libraries",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "292--312",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bender:1996:TDH,
  author =       "W. Bender and D. Gruhl and N. Morimoto and A. Liu",
  title =        "Techniques for data hiding",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "313--336",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bove:1996:MBO,
  author =       "V. M. {Bove, Jr.}",
  title =        "Multimedia based on object models: Some whys and
                 hows",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "337--348",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lucente:1996:CHB,
  author =       "M. Lucente",
  title =        "Computational holographic bandwidth compression",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "349--366",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bender:1996:CP,
  author =       "W. Bender",
  title =        "Community and personalization",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "367--368",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bender:1996:ECH,
  author =       "W. Bender and P. Chesnais and S. Elo and A. Shaw and
                 M. Shaw",
  title =        "Enriching communities: {Harbingers} of news in the
                 future",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "369--380",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Haase:1996:FRK,
  author =       "K. Haase",
  title =        "{FramerD}: Representing knowledge in the large",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "381--397",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Orwant:1996:WBU,
  author =       "J. Orwant",
  title =        "For want of a bit the user was lost: Cheap user
                 modeling",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "398--416",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Evard:1996:CIN,
  author =       "M. Evard",
  title =        "Children's interests in news: On-line opportunities",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "417--430",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Resnick:1996:CCP,
  author =       "M. Resnick and N. Rusk",
  title =        "The {Computer Clubhouse}: Preparing for life in a
                 digital world",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "431--440",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Resnick:1996:TTW,
  author =       "M. Resnick",
  title =        "Things to think with",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "441--442",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Resnick:1996:PBT,
  author =       "M. Resnick and F. Martin and R. Sargent and B.
                 Silverman",
  title =        "Programmable Bricks: {Toys} to think with",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "443--452",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Schmandt:1996:UAS,
  author =       "C. Schmandt and D. Roy",
  title =        "Using acoustic structure in a hand-held audio playback
                 device",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "453--472",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Paradiso:1996:IBS,
  author =       "J. A. Paradiso",
  title =        "The interactive balloon: {Sensing}, actuation and
                 behavior in a common object",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "473--487",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Borovoy:1996:TBC,
  author =       "R. Borovoy and M. McDonald and F. Martin and M.
                 Resnick",
  title =        "Things that blink: {Computationally} augmented name
                 tags",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "488--496",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bender:1996:DEI,
  author =       "W. Bender and R. MacNeil",
  title =        "Design of electronic information",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "497--498",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Musgrave:1996:EDG,
  author =       "J. F. Musgrave and M. R. Cooper",
  title =        "Experiments in digital graphic design",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "499--513",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Small:1996:NLB,
  author =       "D. Small",
  title =        "Navigating large bodies of text",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "514--525",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Jacobson:1996:CDC,
  author =       "N. Jacobson and W. Bender",
  title =        "Color as a determined communication",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "526--538",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lieberman:1996:IAS,
  author =       "H. Lieberman and D. Maulsby",
  title =        "Instructible agents: {Software} that just keeps
                 getting better",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "539--556",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Massey:1996:SSP,
  author =       "M. Massey and W. Bender",
  title =        "Salient stills: {Process} and practice",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "557--574",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gershenfeld:1996:PM,
  author =       "N. Gershenfeld",
  title =        "Physics and media",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "575--576",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gershenfeld:1996:SET,
  author =       "N. Gershenfeld",
  title =        "Signal entropy and the thermodynamics of computation",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "577--586",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Smith:1996:FME,
  author =       "J. R. Smith",
  title =        "Field mice: {Extracting} hand geometry from electric
                 field measurements",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "587--608",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Zimmerman:1996:PAN,
  author =       "T. G. Zimmerman",
  title =        "{Personal Area Networks}: {Near-field} intrabody
                 communication",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "609--617",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Starner:1996:HWC,
  author =       "T. Starner",
  title =        "Human-powered wearable computing",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "618--629",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Fletcher:1996:FTM,
  author =       "R. Fletcher",
  title =        "Force transduction materials for human-technology
                 interfaces",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "630--638",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Verplaetse:1996:IPD,
  author =       "C. Verplaetse",
  title =        "Inertial proproceptive devices: {Self-motion-sending}
                 toys and tools",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "639--650",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1996:CV,
  author =       "Anonymous",
  title =        "Contents of Volume 35, 1996",
  journal =      j-IBM-SYS-J,
  volume =       "35",
  number =       "3\&4",
  pages =        "651--652",
  month =        "",
  year =         "1996",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jan 09 09:34:48 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1997:Pa,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "1",
  pages =        "??--??",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/361/preface.html",
  acknowledgement = ack-nhfb,
}

@Article{Bieberstein:1997:ADE,
  author =       "N. Bieberstein",
  title =        "Application development as an engineering discipline:
                 {Revolution} or evolution?",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "1",
  pages =        "??--??",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/361/bieberstein.html",
  acknowledgement = ack-nhfb,
}

@Article{Prins:1997:FTB,
  author =       "R. Prins and A. Blokdijk and N. E. {van Oosterom}",
  title =        "Family traits in business objects and their
                 applications",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "1",
  pages =        "??--??",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/361/prins.html",
  acknowledgement = ack-nhfb,
}

@Article{Lindsey:1997:BTO,
  author =       "A. H. Lindsey and P. R. Hoffman",
  title =        "Bridging traditional and object technologies:
                 {Creating} transitional applications",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "1",
  pages =        "??--??",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/361/lindsey.html",
  acknowledgement = ack-nhfb,
}

@Article{Flint:1997:CJP,
  author =       "E. S. Flint",
  title =        "The {COBOL} jigsaw puzzle: {Fitting} object-oriented
                 and legacy applications together",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "1",
  pages =        "??--??",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/361/flint.html",
  acknowledgement = ack-nhfb,
}

@Article{Srinivasan:1997:OPO,
  author =       "V. Srinivasan and D. T. Chang",
  title =        "Object persistence in object-oriented applications",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "1",
  pages =        "??--??",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/361/srinivasan.html",
  acknowledgement = ack-nhfb,
}

@Article{Meier:1997:DDC,
  author =       "M. Meier and H. Pan and G. Y. Fuh",
  title =        "Debugging {DB2\slash CS} client\slash server
                 applications",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "1",
  pages =        "??--??",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/361/meier.html",
  acknowledgement = ack-nhfb,
}

@Article{Leymann:1997:WBA,
  author =       "F. Leymann and D. Roller",
  title =        "Workflow-based applications",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "1",
  pages =        "??--??",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/361/leymann.html",
  acknowledgement = ack-nhfb,
}

@Article{Guinan:1997:EUA,
  author =       "P. J. Guinan and J. G. Cooprider and S. Sawyer",
  title =        "The effective use of automated application development
                 tools",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "1",
  pages =        "??--??",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/361/guinan.html",
  acknowledgement = ack-nhfb,
}

@Article{Potok:1997:EBM,
  author =       "T. E. Potok and M. A. Vouk",
  title =        "The effects of the business model on object-oriented
                 software development productivity",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "1",
  pages =        "??--??",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/361/potok.html",
  acknowledgement = ack-nhfb,
}

@Article{Connolly:1997:TFI,
  author =       "D. Connolly",
  title =        "Technical forum: {IBM}'s electronic commerce solution:
                 {CommercePOINT}",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "1",
  pages =        "??--??",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/361/connolly.html",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1997:Pb,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "2",
  pages =        "170--171",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/362/preface.html",
  acknowledgement = ack-nhfb,
}

@Article{Nick:1997:CTP,
  author =       "J. M. Nick and B. B. Moore and J.-Y. Chung and N. S.
                 Bowen",
  title =        "{S/390} cluster technology: {Parallel Sysplex}",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "2",
  pages =        "172--201",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/362/nick.html",
  acknowledgement = ack-nhfb,
}

@Article{Bowen:1997:LFP,
  author =       "N. S. Bowen and D. A. Elko and J. F. Isenberg and G.
                 W. Wang",
  title =        "A locking facility for parallel systems",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "2",
  pages =        "202--220",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/362/bowen.html",
  acknowledgement = ack-nhfb,
}

@Article{King:1997:CAP,
  author =       "G. M. King and D. M. Dias and P. S. Yu",
  title =        "Cluster architectures and {S/390 Parallel Sysplex}
                 scalability",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "2",
  pages =        "221--241",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/362/king.html",
  acknowledgement = ack-nhfb,
}

@Article{Aman:1997:AAM,
  author =       "J. Aman and C. K. Eilert and D. Emmes and P. Yocom and
                 D. Dillenberger",
  title =        "Adaptive algorithms for managing a distributed data
                 processing workload",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "2",
  pages =        "242--283",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/362/aman.html",
  acknowledgement = ack-nhfb,
}

@Article{Bowen:1997:APS,
  author =       "N. S. Bowen and J. Antognini and R. D. Regan and N. C.
                 Matsakis",
  title =        "Availability in parallel systems: {Automatic} process
                 restart",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "2",
  pages =        "284--300",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/362/antognini.html",
  acknowledgement = ack-nhfb,
}

@Article{Johnson:1997:ISM,
  author =       "P. Johnson",
  title =        "The importance of systems management for a {Parallel
                 Sysplex}",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "2",
  pages =        "301--326",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/362/johnson.html",
  acknowledgement = ack-nhfb,
}

@Article{Josten:1997:DUC,
  author =       "J. W. Josten and C. Mohan and I. Narang and J. Z.
                 Teng",
  title =        "{DB2}'s use of the coupling facility for data
                 sharing",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "2",
  pages =        "327--351",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/362/josten.html",
  acknowledgement = ack-nhfb,
}

@Article{Banks:1997:ECE,
  author =       "T. Banks and K. E. Davies and C. Moxey",
  title =        "The evolution of {CICS/ESA} in the sysplex
                 environment",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "2",
  pages =        "352--360",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/362/banks.html",
  acknowledgement = ack-nhfb,
}

@Article{Strickland:1997:VRL,
  author =       "J. P. Strickland",
  title =        "{VSAM} record-level data sharing",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "2",
  pages =        "361--371",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/362/strickland.html",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1997:Pc,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "3",
  pages =        "372--373",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/363/preface.html",
  acknowledgement = ack-nhfb,
}

@Article{Kienzle:1997:MFS,
  author =       "M. G. Kienzle and R. R. Berbec and G. P. Bozman and C.
                 K. Eilert and M. Eshel and R. Mansell",
  title =        "Multimedia file serving with the {OS/390 LAN Server}",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "3",
  pages =        "374--392",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/363/kienzle.html",
  acknowledgement = ack-nhfb,
}

@Article{Dan:1997:MRM,
  author =       "A. Dan and S. Dulin and S. Marcotte and D. Sitaram",
  title =        "Multimedia resource management in {OS/390 LAN
                 Server}",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "3",
  pages =        "393--410",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/363/dan.html",
  acknowledgement = ack-nhfb,
}

@Article{Sockut:1997:MLR,
  author =       "G. H. Sockut and T. A. Beavin and C.-C. Chang",
  title =        "A method for on-line reorganization of a database",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "3",
  pages =        "411--436",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/363/sockut.html",
  acknowledgement = ack-nhfb,
}

@Article{Arnold:1997:TFI,
  author =       "V. D. Arnold and R. J. Bosch and E. F. Dumstorff and
                 P. J. Helfrich and T. C. Hung and V. M. Johnson and R.
                 F. Persik and P. D. Whidden",
  title =        "Technical forum: {IBM} Business Frameworks: {San
                 Francisco} project technical overview",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "3",
  pages =        "437--445",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/363/forum.html",
  acknowledgement = ack-nhfb,
}

@Article{Davenport:1997:ASS,
  author =       "G. Davenport and M. Murtaugh",
  title =        "Automatist storyteller systems and the shifting sands
                 of story",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "3",
  pages =        "446--456",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/363/davenport.html",
  acknowledgement = ack-nhfb,
}

@Article{Jacobson:1997:LB,
  author =       "J. Jacobson and B. Comiskey and C. Turner and J.
                 Albert and P. Tsao",
  title =        "The last book",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "3",
  pages =        "457--463",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/363/jacobson.html",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1997:Ba,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "3",
  pages =        "464--466",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1997:R,
  author =       "Anonymous",
  title =        "Referees",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "3",
  pages =        "467--471",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1997:Pd,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "4",
  pages =        "472--473",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/364/preface.html",
  acknowledgement = ack-nhfb,
}

@Article{Perelgut:1997:OCA,
  author =       "S. G. Perelgut and G. M. Silberman and K. A. Lyons and
                 K. L. Bennet",
  title =        "Overview: The {Centre for Advanced Studies}",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "4",
  pages =        "474--488",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/364/perelgut.html",
  acknowledgement = ack-nhfb,
}

@Article{Wong:1997:ETD,
  author =       "J. W. Wong and K. A. Lyons and D. Evans and R. J.
                 Velthuys and G. v. Bochmann and E. Dubois and N. D.
                 Georganas and G. Neufeld and M. T. {\"O}zsu and J.
                 Brinskelle and A. Hafid and N. Hutchinson and P.
                 Iglinski and B. Kerherv{\'e} and L. Lamont and D.
                 Makaroff and D. Szafron",
  title =        "Enabling technology for distributed multimedia
                 applications",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "4",
  pages =        "489--507",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/364/wong.html",
  acknowledgement = ack-nhfb,
}

@Article{Bauer:1997:SSM,
  author =       "M. A. Bauer and R. B. Bunt and A. {El Rayess} and P.
                 J. Finnigan and T. Kunz and H. L. Lutfiyya and
                 A. D. Marshall and P. Martin and G. M. Oster and
                 W. Powley and J. Rolia and D. Taylor and M. Woodside",
  title =        "Services supporting management of distributed
                 applications and systems",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "4",
  pages =        "508--526",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/364/bauer.html",
  acknowledgement = ack-nhfb,
}

@Article{Parsons:1997:PPD,
  author =       "E. W. Parsons and M. Brorsson and K. C. Sevcik",
  title =        "Predicting the performance of distributed virtual
                 shared-memory applications",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "4",
  pages =        "527--549",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/364/parsons.html",
  acknowledgement = ack-nhfb,
}

@Article{Seaman:1997:COS,
  author =       "C. B. Seaman and V. R. Basili",
  title =        "Communication and organization in software
                 development: {An} empirical study",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "4",
  pages =        "550--563",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/364/seaman.html",
  acknowledgement = ack-nhfb,
}

@Article{Finnigan:1997:SB,
  author =       "P. J. Finnigan and R. C. Holt and I. Kalas and S. Kerr
                 and K. Kontogiannis and H. A. M{\"u}ller and J.
                 Mylopoulos and S. G. Perelgut and M. Stanley and K.
                 Wong",
  title =        "The software bookshelf",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "4",
  pages =        "564--593",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/364/finnigan.html",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1997:Bb,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "4",
  pages =        "594--595",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/364/books.html",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1997:CV,
  author =       "Anonymous",
  title =        "Contents of {Volume 36, 1997}",
  journal =      j-IBM-SYS-J,
  volume =       "36",
  number =       "4",
  pages =        "596--596",
  month =        "",
  year =         "1997",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/364/v36cont.html",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1998:Pa,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "1",
  pages =        "2--3",
  month =        "",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/371/preface.html",
  acknowledgement = ack-nhfb,
}

@Article{vonKanel:1998:IMF,
  author =       "J. {von K{\"a}nel} and J. S. Givler and B. Leiba and
                 W. Segmuller",
  title =        "{Internet} Messaging Frameworks",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "1",
  pages =        "4--18",
  month =        "",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/371/vonkanel.html",
  acknowledgement = ack-nhfb,
}

@Article{Kellogg:1998:NGI,
  author =       "W. A. Kellogg and J. T. Richards and C. Swart and P.
                 Malkin and M. Laff and V. Hanson and B. Hailpern",
  title =        "{NetVista}: Growing an {Internet} solution for
                 schools",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "1",
  pages =        "19--41",
  month =        "",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/371/kellogg.html",
  acknowledgement = ack-nhfb,
}

@Article{Cheng:1998:SAI,
  author =       "P.-C. Cheng and J. A. Garay and A. Herzberg and H.
                 Krawczyk",
  title =        "A security architecture for the {Internet Protocol}",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "1",
  pages =        "42--60",
  month =        "",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/371/cheng.html",
  acknowledgement = ack-nhfb,
}

@Article{Herzberg:1998:SCS,
  author =       "A. Herzberg and D. Naor",
  title =        "{Surf'N'Sign}: Client signatures on {Web} documents",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "1",
  pages =        "61--71",
  month =        "",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/371/herzberg.html",
  acknowledgement = ack-nhfb,
}

@Article{AbadPeiro:1998:DGP,
  author =       "J. L. {Abad Peiro} and N. Asokan and M. Steiner and M.
                 Waidner",
  title =        "Designing a generic payment service",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "1",
  pages =        "72--88",
  month =        "",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/371/abadpeiro.html",
  acknowledgement = ack-nhfb,
}

@Article{Wu:1998:SWU,
  author =       "K.-L. Wu and P. S. Yu and A. Ballman",
  title =        "{SpeedTracer}: a {Web} usage mining and analysis
                 tool",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "1",
  pages =        "89--105",
  month =        "",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/371/wu.html",
  acknowledgement = ack-nhfb,
}

@Article{Boulanger:1998:CGH,
  author =       "A. Boulanger",
  title =        "Catapults and grappling hooks: {The} tools and
                 techniques of information warfare",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "1",
  pages =        "106--114",
  month =        "",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/371/boulanger.html",
  acknowledgement = ack-nhfb,
}

@Article{Peng:1998:AEB,
  author =       "C.-S. Peng and S.-K. Chen and J.-Y. Chung and A.
                 Roy-Chowdhury and V. Srinivasan",
  title =        "Accessing existing business data from the {World Wide
                 Web}",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "1",
  pages =        "115--132",
  month =        "",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/371/peng.html",
  acknowledgement = ack-nhfb,
}

@Article{Tan:1998:IEH,
  author =       "Y. S. Tan and D. B. Lindquist and T. O. Rowe and J. R.
                 Hind",
  title =        "{IBM eNetwork Host On-Demand}: The beginning of a new
                 era for accessing host information in a {Web}
                 environment",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "1",
  pages =        "133--151",
  month =        "",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/371/tan.html",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1998:E,
  author =       "Anonymous",
  title =        "Erratum",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "1",
  pages =        "152--153",
  month =        "",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Wed Mar 25 09:56:10 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/371/erratum.html",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1998:Pb,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "2",
  pages =        "154--155",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:04:57 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/372/preface.html",
  acknowledgement = ack-nhfb,
}

@Article{Bohrer:1998:ASF,
  author =       "K. A. Bohrer",
  title =        "Architecture of the {San Francisco} frameworks",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "2",
  pages =        "156--169",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:04:57 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/372/bohrer.html",
  acknowledgement = ack-nhfb,
}

@Article{Inman:1998:EMA,
  author =       "E. E. Inman",
  title =        "Enterprise modeling advantages of {San Francisco} for
                 general ledger systems",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "2",
  pages =        "170--180",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:04:57 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/372/inman.html",
  acknowledgement = ack-nhfb,
}

@Article{Henders:1998:EAA,
  author =       "R. A. Henders",
  title =        "An evolutionary approach to application development
                 with object technology",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "2",
  pages =        "181--188",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:04:57 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/372/henders.html",
  acknowledgement = ack-nhfb,
}

@Article{Retallick:1998:EKS,
  author =       "R. Retallick and S. S{\'a}nchez",
  title =        "Enterprise knowledge sharing, activity management, and
                 a fabric for commitment",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "2",
  pages =        "189--199",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:04:57 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/372/retallick.html",
  acknowledgement = ack-nhfb,
}

@Article{vanderSalm:1998:ISF,
  author =       "R. L. {van der Salm}",
  title =        "Introducing shareable frameworks into a procedural
                 development environment",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "2",
  pages =        "200--214",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:04:57 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/372/vandersalm.html",
  acknowledgement = ack-nhfb,
}

@Article{Polan:1998:TNU,
  author =       "M. G. Polan",
  title =        "Technical note: Using the {San Francisco} frameworks
                 with {VisualAge} for {Java}",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "2",
  pages =        "215--226",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:04:57 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/372/polan.html",
  acknowledgement = ack-nhfb,
}

@Article{Crowston:1998:CCM,
  author =       "K. Crowston and E. E. Kammerer",
  title =        "Coordination and collective mind in software
                 requirements development",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "2",
  pages =        "227--245",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:04:57 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/372/crowston.html",
  acknowledgement = ack-nhfb,
}

@Article{Aiken:1998:RED,
  author =       "P. H. Aiken",
  title =        "Reverse engineering of data",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "2",
  pages =        "246--269",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:04:57 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/372/aiken.html",
  acknowledgement = ack-nhfb,
}

@Article{Schmidt:1998:PDR,
  author =       "W. J. Schmidt and R. R. Roediger and C. S. Mestad and
                 B. Mendelson and I. Shavit-Lottem and V.
                 Bortnikov-Sitnitsky",
  title =        "Profile-directed restructuring of operating system
                 code",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "2",
  pages =        "270--305",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:04:57 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/372/schmidt.html",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1998:Pc,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "3",
  pages =        "306--307",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:12:23 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-3.html",
  URL =          "http://www.research.ibm.com/journal/sj/373/preface.html",
  acknowledgement = ack-nhfb,
}

@Article{Gottschalk:1998:TOI,
  author =       "K. D. Gottschalk",
  title =        "Technical overview of {IBM}'s {Java} initiatives",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "3",
  pages =        "308--322",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:12:23 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-3.html",
  URL =          "http://www.research.ibm.com/journal/sj/373/gottschalk.html",
  acknowledgement = ack-nhfb,
}

@Article{Brackenbury:1998:IES,
  author =       "I. F. Brackenbury and D. F. Ferguson and K. D.
                 Gottschalk and R. A. Storey",
  title =        "{IBM}'s {Enterprise Server for Java}",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "3",
  pages =        "323--335",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:12:23 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-3.html",
  URL =          "http://www.research.ibm.com/journal/sj/373/brackenbury.html",
  acknowledgement = ack-nhfb,
}

@Article{Bayeh:1998:WAS,
  author =       "E. Bayeh",
  title =        "The {WebSphere Application Server} architecture and
                 programming model",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "3",
  pages =        "336--348",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:12:23 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-3.html",
  URL =          "http://www.research.ibm.com/journal/sj/373/bayeh.html",
  acknowledgement = ack-nhfb,
}

@Article{Koved:1998:EJS,
  author =       "L. Koved and A. J. Nadalin and D. Neal and T. Lawson",
  title =        "The evolution of {Java} security",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "3",
  pages =        "349--364",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:12:23 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-3.html",
  URL =          "http://www.research.ibm.com/journal/sj/373/koved.html",
  acknowledgement = ack-nhfb,
}

@Article{Rubin:1998:JIS,
  author =       "B. S. Rubin and A. R. Christ and K. A. Bohrer",
  title =        "{Java} and the {IBM San Francisco} project",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "3",
  pages =        "365--371",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:12:23 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-3.html",
  URL =          "http://www.research.ibm.com/journal/sj/373/rubin.html",
  acknowledgement = ack-nhfb,
}

@Article{Briggs:1998:LE,
  author =       "B. Briggs",
  title =        "{Lotus eSuite}",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "3",
  pages =        "372--385",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:12:23 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-3.html",
  URL =          "http://www.research.ibm.com/journal/sj/373/briggs.html",
  acknowledgement = ack-nhfb,
}

@Article{Chamberland:1998:IVJ,
  author =       "L. A. Chamberland and S. F. Lymer and A. G. Ryman",
  title =        "{IBM VisualAge for Java}",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "3",
  pages =        "386--408",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:12:23 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-3.html",
  URL =          "http://www.research.ibm.com/journal/sj/373/chamberland.html",
  acknowledgement = ack-nhfb,
}

@Article{Midkiff:1998:OAR,
  author =       "S. P. Midkiff and J. E. Moreira and M. Snir",
  title =        "Optimizing array reference checking in {Java}
                 programs",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "3",
  pages =        "409--453",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:12:23 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-3.html",
  URL =          "http://www.research.ibm.com/journal/sj/373/midkiff.html",
  acknowledgement = ack-nhfb,
}

@Article{Wyckoff:1998:S,
  author =       "P. Wyckoff and S. W. McLaughry and T. J. Lehman and D.
                 A. Ford",
  title =        "{T} Spaces",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "3",
  pages =        "454--481",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  bibdate =      "Thu Nov 5 17:12:23 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-3.html",
  URL =          "http://www.research.ibm.com/journal/sj/373/wyckoff.html",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1998:Pd,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "4",
  pages =        "482--483",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 25 12:24:04 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-4.html",
  URL =          "http://www.research.ibm.com/journal/sj/374/preface.html",
  acknowledgement = ack-nhfb,
}

@Article{Mendonca:1998:AIE,
  author =       "M. G. Mendonca and V. R. Basili and I. S. Bhandari and
                 J. Dawson",
  title =        "An approach to improving existing measurement
                 frameworks",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "4",
  pages =        "484--501",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 25 12:24:04 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-4.html",
  URL =          "http://www.research.ibm.com/journal/sj/374/mendonca.html",
  acknowledgement = ack-nhfb,
}

@Article{Codella:1998:SEJ,
  author =       "C. F. Codella and D. N. Dillenberger and D. F.
                 Ferguson and R. D. Jackson and T. A. Mikalsen and I.
                 Silva-Lepe",
  title =        "Support for {Enterprise JavaBeans} in {Component
                 Broker}",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "4",
  pages =        "502--538",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 25 12:24:04 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-4.html",
  URL =          "http://www.research.ibm.com/journal/sj/374/codella.html",
  acknowledgement = ack-nhfb,
}

@Article{Fuh:1998:LDT,
  author =       "G. Y. Fuh and J.-H. Chow and N. M. Mattos and B. T.
                 Tran and T. C. Truong",
  title =        "On the linkage of dynamic tables in relational
                 {DBMSs}",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "4",
  pages =        "539--551",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 25 12:24:04 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-4.html",
  URL =          "http://www.research.ibm.com/journal/sj/374/fuh.html",
  acknowledgement = ack-nhfb,
}

@Article{Sawyer:1998:SDP,
  author =       "S. Sawyer and P. J. Guinan",
  title =        "Software development: Processes and performance",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "4",
  pages =        "552--569",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 25 12:24:04 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-4.html",
  URL =          "http://www.research.ibm.com/journal/sj/374/sawyer.html",
  acknowledgement = ack-nhfb,
}

@Article{Huang:1998:CIA,
  author =       "K.-T. Huang",
  title =        "Capitalizing on intellectual assets",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "4",
  pages =        "570--583",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 25 12:24:04 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-4.html",
  URL =          "http://www.research.ibm.com/journal/sj/374/huang.html",
  acknowledgement = ack-nhfb,
}

@Article{Zhao:1998:TNW,
  author =       "Y. Zhao",
  title =        "Technical note --- {WebEntree}: a {Web} service
                 aggregator",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "4",
  pages =        "584--595",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 25 12:24:04 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-4.html",
  URL =          "http://www.research.ibm.com/journal/sj/374/zhao.html",
  acknowledgement = ack-nhfb,
}

@Article{Blackman:1998:TNI,
  author =       "K. R. Blackman",
  title =        "Technical note --- {IMS} celebrates thirty years as an
                 {IBM} product",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "4",
  pages =        "596--603",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 25 12:24:04 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-4.html",
  URL =          "http://www.research.ibm.com/journal/sj/374/blackman.html",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1998:B,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "4",
  pages =        "604--605",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 25 12:24:04 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-4.html",
  URL =          "http://www.research.ibm.com/journal/sj/374/books.html",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1998:CV,
  author =       "Anonymous",
  title =        "Contents of Volume 37, 1998",
  journal =      j-IBM-SYS-J,
  volume =       "37",
  number =       "4",
  pages =        "606--??",
  month =        "????",
  year =         "1998",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 25 12:24:04 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj37-4.html",
  URL =          "http://www.research.ibm.com/journal/",
  acknowledgement = ack-nhfb,
}

@Article{Hoffnagle:1999:Pa,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "1",
  pages =        "2--??",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jul 15 12:57:56 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/381/preface.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0134",
}

@Article{Plachy:1999:ESS,
  author =       "E. C. Plachy and P. A. Hausler",
  title =        "Enterprise solutions structure",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "1",
  pages =        "4--11",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jul 15 12:57:56 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/381/plachy.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0134",
}

@Article{McDavid:1999:SBA,
  author =       "D. W. McDavid",
  title =        "A standard for business architecture description",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "1",
  pages =        "12--31",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jul 15 12:57:56 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/381/mcdavid.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0134",
}

@Article{Youngs:1999:SAD,
  author =       "R. Youngs and D. Redmond-Pyle and P. Spaas and E.
                 Kahan",
  title =        "A standard for architecture description",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "1",
  pages =        "32--50",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jul 15 12:57:56 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/381/youngs.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0134",
}

@Article{Lloyd:1999:TRA,
  author =       "P. T. L. Lloyd and G. M. Galambos",
  title =        "Technical reference architectures",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "1",
  pages =        "51--75",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jul 15 12:57:56 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/381/lloyd.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0134",
}

@Article{Leishman:1999:SC,
  author =       "D. A. Leishman",
  title =        "Solution customization",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "1",
  pages =        "76--97",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jul 15 12:57:56 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/381/leishman.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0134",
}

@Article{Harris:1999:ERT,
  author =       "T. Harris and J. W. Rothwell and P. T. L. Lloyd",
  title =        "Experiences in reusing technical reference
                 architectures",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "1",
  pages =        "98--117",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jul 15 12:57:56 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/381/harris.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0134",
}

@Article{Millet:1999:TNP,
  author =       "I. Millet",
  title =        "Technical note --- {A} proposal to simplify data flow
                 diagrams",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "1",
  pages =        "118--121",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jul 15 12:57:56 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/381/millet.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0134",
}

@Article{Anonymous:1999:BP,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "1",
  pages =        "122--124",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jul 15 12:57:56 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/381/books.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0134",
}

@Article{Anonymous:1999:SR,
  author =       "Anonymous",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "1",
  pages =        "125--125",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Thu Jul 15 12:57:56 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/381/books.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0134",
}

@Article{Hoffnagle:1999:Pb,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "2--134",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  URL =          "http://www.research.ibm.com/journal/sj/382/preface.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "39KB",
}

@Article{Allen:1999:TPI,
  author =       "F. E. Allen",
  title =        "Turning points in interaction with computers",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "135--138",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  URL =          "http://www.research.ibm.com/journal/sj/382/allen.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "46KB",
}

@Article{Iverson:1999:PNS,
  author =       "K. E. Iverson",
  title =        "Programming notation in systems design",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "139--150",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  note =         "Reprinted from \cite{Iverson:1963:PNS}.",
  URL =          "http://www.research.ibm.com/journal/sj/382/iverson.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "2,673KB",
}

@Article{Dimsdale:1999:DSL,
  author =       "B. Dimsdale and H. M. Markowitz",
  title =        "A description of the {SIMSCRIPT} language",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "151--161",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  note =         "Reprinted from \cite{Dimsdale:1964:DSL}.",
  URL =          "http://www.research.ibm.com/journal/sj/382/dimsdale.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "2,557KB",
}

@Article{Boies:1999:UBI,
  author =       "S. J. Boies",
  title =        "User behavior on an interactive computer system",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "162--180",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  note =         "Reprinted from \cite{Boies:1974:UBI}.",
  URL =          "http://www.research.ibm.com/journal/sj/382/boies.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "7,395KB",
}

@Article{Parr:1999:NHL,
  author =       "F. N. Parr and R. E. Strom",
  title =        "{NIL}: a high-level language for distributed systems
                 programming",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "181--198",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  note =         "Reprinted from \cite{Parr:1983:NHL}.",
  URL =          "http://www.research.ibm.com/journal/sj/382/parr.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "9,378KB",
}

@Article{Shu:1999:VPP,
  author =       "N. C. Shu",
  title =        "Visual programming: Perspectives and approaches",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "199--224",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  note =         "Reprinted from \cite{Shu:1989:VPP}.",
  URL =          "http://www.research.ibm.com/journal/sj/382/shu.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "15,308KB",
}

@Article{Goldberg:1999:TPS,
  author =       "R. Goldberg",
  title =        "Turning points on software development",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "225--230",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  URL =          "http://www.research.ibm.com/journal/sj/382/goldberg.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "72KB",
}

@Article{Stevens:1999:SD,
  author =       "W. P. Stevens and G. J. Myers and L. L. Constantive",
  title =        "Structured design",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "231--257",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  note =         "Reprinted from \cite{Stevens:1974:SD}.",
  URL =          "http://www.research.ibm.com/journal/sj/382/stevens.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "26,042KB",
}

@Article{Fagan:1999:DCI,
  author =       "M. E. Fagan",
  title =        "Design and code inspections to reduce errors in
                 program development",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "258--288",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  note =         "Reprinted from \cite{Fagan:1976:DCI}.",
  URL =          "http://www.research.ibm.com/journal/sj/382/fagan.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "7,181KB",
}

@Article{Mills:1999:MSE,
  author =       "H. D. Mills",
  title =        "The management of software engineering, Part {I}:
                 Principled of software engineering",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "289--296",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  note =         "Reprinted from \cite{Mills:1980:MSE}.",
  URL =          "http://www.research.ibm.com/journal/sj/382/mills.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "2,554KB",
}

@Article{Radice:1999:PPS,
  author =       "R. A. Radice and J. T. Harding and P. E. Munnis and R.
                 W. Phillips",
  title =        "A programming process study",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "297--307",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  note =         "Reprinted from \cite{Radice:1985:PPA}.",
  URL =          "http://www.research.ibm.com/journal/sj/382/radice.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "1,705KB",
}

@Article{Cockburn:1999:IOO,
  author =       "A. A. R. Cockburn",
  title =        "The impact of object-orientation on application
                 development",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "308--334",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  note =         "Reprinted from \cite{Cockburn:1993:IOA}.",
  URL =          "http://www.research.ibm.com/journal/sj/382/cockburn.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "9,047KB",
}

@Article{Ganek:1999:TPS,
  author =       "A. G. Ganek and E. H. Sussenguth",
  title =        "Turning points in systems architecture",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "335--339",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  URL =          "http://www.research.ibm.com/journal/sj/382/ganek.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
}

@Article{Auslander:1999:FSI,
  author =       "M. A. Auslander and J. F. Jaffe",
  title =        "Functional structure of {IBM} virtual storage
                 operating systems, Part {I}: Influences of dynamic
                 address translation on operating system technology",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "340--353",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  note =         "Reprinted from \cite{Auslander:1973:FSI}.",
  URL =          "http://www.research.ibm.com/journal/sj/382/auslander.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "6,410KB",
}

@Article{Scherr:1999:DDP,
  author =       "A. L. Scherr",
  title =        "Distributed data processing",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "354--374",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  note =         "Reprinted from \cite{Scherr:1978:DDP}.",
  URL =          "http://www.research.ibm.com/journal/sj/382/scherr.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "14,356KB",
}

@Article{Blasgen:1999:SRA,
  author =       "M. W. Blasgen and M. M. Astrahan and D. D. Chamberlin
                 and J. N. Gray and W. F. King and B. G. Lindsay and R.
                 A. Lorie and J. W. Mehl and T. G. Price and G. R.
                 Putzolu and M. Schkolnick and P. G. Selinger and D. R.
                 Slutz and H. R. Strong and I. L. Traiger and B. W. Wade
                 and R. A. Yost",
  title =        "{System R}: An architectural overview",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "375--397",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  note =         "Reprinted from \cite{Blasgen:1981:SRA}.",
  URL =          "http://www.research.ibm.com/journal/sj/382/blasgen.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "7,057KB",
}

@Article{Schleicher:1999:SOA,
  author =       "D. L. Schleicher and R. L. Taylor",
  title =        "System overview of the {Application System\slash
                 400}",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "398--413",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  note =         "Reprinted from \cite{Schleicher:1989:SOA}.",
  URL =          "http://www.research.ibm.com/journal/sj/382/schleicher.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
}

@Article{Agerwala:1999:SSA,
  author =       "T. Agerwala and J. L. Martin and J. H. Mirza and D. C.
                 Sadler and D. M. Dias and M. Snir",
  title =        "{SP2} system architecture",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "414--448",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  note =         "Reprinted from \cite{Agerwala:1995:SSA}.",
  URL =          "http://www.research.ibm.com/journal/sj/382/agerwala.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
}

@Article{Wladawsky-Berger:1999:TPI,
  author =       "I. Wladawsky-Berger",
  title =        "Turning points in information technology",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "449--453",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  URL =          "http://www.research.ibm.com/journal/sj/382/wladawsky.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "46KB",
}

@Article{Zachman:1999:FIS,
  author =       "J. A. Zachman",
  title =        "A framework for information systems architecture",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "454--471",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  note =         "Reprinted from \cite{Zachman:1987:FIS}.",
  URL =          "http://www.research.ibm.com/journal/sj/382/zachman.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "15,482KB",
}

@Article{Henderson:1999:SAL,
  author =       "J. C. Henderson and H. Venkatraman",
  title =        "Strategic alignment: Leveraging information technology
                 for transforming organizations",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "472--484",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  note =         "Reprinted from \cite{Henderson:1993:SAL}.",
  URL =          "http://www.research.ibm.com/journal/sj/382/henderson.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "4,638KB",
}

@Article{Davidson:1999:BRE,
  author =       "W. H. Davidson",
  title =        "Beyond re-engineering: The three phases of business
                 transformation",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "2--3",
  pages =        "485--501",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Fri Sep 17 16:42:27 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-23.html",
  note =         "Reprinted from \cite{Davidson:1993:BRT}.",
  URL =          "http://www.research.ibm.com/journal/sj/382/davidson.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0135",
  pdfsize =      "6,675KB",
}

@Article{Hoffnagle:1999:Pc,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "4",
  pages =        "502--503",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:00 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/384/preface.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0136",
}

@Article{Ark:1999:LHI,
  author =       "W. S. Ark and T. Selker",
  title =        "A look at human interaction with pervasive computers",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "4",
  pages =        "504--507",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:00 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/384/ark.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0136",
}

@Article{Abowd:1999:CEI,
  author =       "G. D. Abowd",
  title =        "{Classroom 2000}: {An} experiment with the
                 instrumentation of a living educational environment",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "4",
  pages =        "508--530",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:00 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/384/abowd.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0136",
}

@Article{Landay:1999:MSP,
  author =       "J. A. Landay and R. C. Davis",
  title =        "Making sharing pervasive: {Ubiquitous} computing for
                 shared note taking",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "4",
  pages =        "531--550",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:00 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/384/landay.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0136",
}

@Article{Baber:1999:CPD,
  author =       "C. Baber and D. J. Haniff and S. I. Woolley",
  title =        "Contrasting paradigms for the development of wearable
                 computers",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "4",
  pages =        "551--565",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:00 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/384/baber.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0136",
}

@Article{Zimmerman:1999:WND,
  author =       "T. G. Zimmerman",
  title =        "Wireless networked digital devices: a new paradigm
                 for computing and communication",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "4",
  pages =        "566--574",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:00 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/384/zimmerman.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0136",
}

@Article{Eustice:1999:UIA,
  author =       "K. F. Eustice and T. J. Lehman and A. Morales and M.
                 C. Munson and S. Edlund and M. Guillen",
  title =        "A universal information appliance",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "4",
  pages =        "575--601",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:00 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/384/eustice.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0136",
}

@Article{Spohrer:1999:IP,
  author =       "J. C. Spohrer",
  title =        "Information in places",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "4",
  pages =        "602--605",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:00 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/384/spohrer.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0136",
}

@Article{Anonymous:1999:CVP,
  author =       "Anonymous",
  title =        "Contents of {Volume 37, 1998}",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "4",
  pages =        "606--628",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:00 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0136",
}

@Article{Barrett:1999:IAM,
  author =       "R. Barrett and P. P. Maglio",
  title =        "Intermediaries: {An} approach to manipulating
                 information streams",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "4",
  pages =        "629--641",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:00 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/384/barrett.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0136",
}

@Article{Zhai:1999:MIE,
  author =       "S. Zhai and B. A. Smith",
  title =        "Multistream input: {An} experimental study of document
                 scrolling methods",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "4",
  pages =        "642--651",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:00 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/384/zhai.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0136",
}

@Article{Dryer:1999:WCP,
  author =       "D. C. Dryer and C. Eisbach and W. S. Ark",
  title =        "At what cost pervasive? {A} social computing view of
                 mobile computing systems",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "4",
  pages =        "652--676",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:00 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/384/dryer.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0136",
}

@Article{Mark:1999:TPC,
  author =       "W. Mark",
  title =        "Turning pervasive computing into mediated spaces",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "4",
  pages =        "677--677",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:00 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/384/mark.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0136",
}

@Article{Weiser:1999:OUC,
  author =       "M. Weiser and R. Gold and J. S. Brown",
  title =        "The origins of ubiquitous computing research at {PARC}
                 in the late 1980s",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "4",
  pages =        "677--677",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:00 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/384/weiser.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0136",
}

@Article{Anonymous:1999:CV,
  author =       "Anonymous",
  title =        "Contents of Volume 38, 1999",
  journal =      j-IBM-SYS-J,
  volume =       "38",
  number =       "4",
  pages =        "697--??",
  month =        "????",
  year =         "1999",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Sep 25 06:18:22 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj38-4.html",
  URL =          "http://www.research.ibm.com/journal/sj/384/v38cont.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0136",
}

@Article{Hoffnagle:2000:Pa,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "1",
  pages =        "2--3",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:02 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/391/preface.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0137",
}

@Article{Christ:2000:SFP,
  author =       "R. Christ and S. L. Halter and K. Lynne and S. Meizer
                 and S. J. Munroe and M. Pasch",
  title =        "{San Francisco} performance: a case study in
                 performance for large-scale {Java} applications",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "1",
  pages =        "4--20",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:02 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/391/christ.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0137",
}

@Article{Moreira:2000:JPH,
  author =       "J. E. Moreira and S. P. Midkiff and M. Gupta and P. V.
                 Artigas and M. Snir and R. D. Lawrence",
  title =        "{Java} programming for high-performance numerical
                 computing",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "1",
  pages =        "21--56",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:02 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/391/moreira.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0137",
}

@Article{Baylor:2000:JSB,
  author =       "S. J. Baylor and M. Devarakonda and S. Fink and E.
                 Gluzberg and M. Kalantar and P. Muttineni and E.
                 Barsness and R. Arora and R. Dimpsey and S. J. Munroe",
  title =        "{Java} server benchmarks",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "1",
  pages =        "57--81",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:02 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/391/baylor.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0137",
}

@Article{Viswanathan:2000:JVM,
  author =       "D. Viswanathan and S. Liang",
  title =        "{Java Virtual Machine Profiler Interface}",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "1",
  pages =        "82--95",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:02 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/391/viswanathan.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0137",
}

@Article{Kazi:2000:JCS,
  author =       "I. H. Kazi and D. P. Jose and B. Ben-Hamida and C. J.
                 Hescott and C. Kwok and J. A. Konstan and D. J. Lilja
                 and P.-C Yew",
  title =        "{JaViz}: a client\slash server {Java} profiling
                 tool",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "1",
  pages =        "96--117",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:02 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/391/kazi.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0137",
}

@Article{Alexander:2000:UAP,
  author =       "W. P. Alexander and R. F. Berry and F. E. Levine and
                 R. J. Urquhart",
  title =        "A unifying approach to performance analysis in the
                 {Java} environment",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "1",
  pages =        "118--134",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:02 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/391/alexander.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0137",
}

@Article{Gu:2000:EHP,
  author =       "W. Gu and N. A. Burns and M. T. Collins and W. Y. P.
                 Wong",
  title =        "The evolution of a high-performing {Java} virtual
                 machine",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "1",
  pages =        "135--150",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:02 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/391/gu.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0137",
}

@Article{Dimpsey:2000:JSP,
  author =       "R. Dimpsey and R. Arora and K. Kuiper",
  title =        "{Java} server performance: a case study of building
                 efficient, scalable {JVMs}",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "1",
  pages =        "151--174",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:02 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/391/dimpsey.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0137",
}

@Article{Suganuma:2000:OIJ,
  author =       "T. Suganuma and T. Ogasawara and M. Takeuchi and T.
                 Yasue and M. Kawahito and K. Ishizaki and H. Komatsu
                 and T. Nakatani",
  title =        "Overview of the {IBM Java Just-in-Time Compiler}",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "1",
  pages =        "175--193",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:02 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/391/suganuma.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0137",
}

@Article{Dillenberger:2000:BJV,
  author =       "D. Dillenberger and R. Bordawekar and C. W. Clark and
                 D. Durand and D. Emmes and O. Gohda and S. Howard and
                 M. F. Oliver and F. Samuel and R. W. {St. John}",
  title =        "Building a {Java} virtual machine for server
                 applications: The {JVM} on {OS/390}",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "1",
  pages =        "194--210",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:02 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/391/dillenberger.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0137",
}

@Article{Alpern:2000:JAV,
  author =       "B. Alpern and C. R. Attanasio and J. J. Barton and M.
                 G. Burke and P. Cheng and J.-D. Choi and A. Cocchi and
                 S. J. Fink and D. Grove and M. Hind and S. F. Hummel
                 and D. Lieber and V. Litvinov and M. F. Mergen and T.
                 Ngo and J. R. Russell and V. Sarkar and M. J. Serrano
                 and J. C. Shepherd and S. E. Smith and V. C. Sreedhar
                 and H. Srinivasan and J. Whaley",
  title =        "The {Jalape{\~n}o} virtual machine",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "1",
  pages =        "211--238",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Apr 24 15:43:02 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  URL =          "http://www.research.ibm.com/journal/sj/391/alpern.html",
  acknowledgement = ack-nhfb,
  keywords =     "Java",
  ordernumber =  "G321-0137",
}

@Article{Hoffnagle:2000:Pb,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "2",
  pages =        "242--243",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Sep 25 06:33:35 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/392/preface.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0138",
}

@Article{Johnson:2000:ISM,
  author =       "V. M. Johnson and D. K. Austreng",
  title =        "{IBM SanFrancisco}: Moving into the marketplace",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "2",
  pages =        "244--247",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Sep 25 06:33:35 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/392/johnson.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0138",
}

@Article{vanEmdeBoas-Lubsen:2000:BCP,
  author =       "H. {van Emde Boas-Lubsen}",
  title =        "{Business Component Prototyper} for {SanFrancisco}: An
                 experiment in architecture for application development
                 tools",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "2",
  pages =        "248--266",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Sep 25 06:33:35 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/392/vanemdeboas.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0138",
}

@Article{Bunting:2000:BFM,
  author =       "R. Bunting",
  title =        "Bridging the framework modeling and implementation
                 gap",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "2",
  pages =        "267--284",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Sep 25 06:33:35 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/392/bunting.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0138",
}

@Article{Jaufmann:2000:UIS,
  author =       "E. J. {Jaufmann, Jr.} and D. C. Logan",
  title =        "The use of {IBM SanFrancisco} core business processes
                 in human resources scheduling",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "2",
  pages =        "285--292",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Sep 25 06:33:35 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/392/jaufmann.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0138",
}

@Article{Tost:2000:UJC,
  author =       "A. Tost and V. M. Johnson",
  title =        "Using {JavaBeans} components as accessors to
                 {Enterprise JavaBeans} components",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "2",
  pages =        "293--300",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Sep 25 06:33:35 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/392/tost.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0138",
}

@Article{Salm:2000:TNI,
  author =       "R. van der Salm",
  title =        "Technical note --- {IBS Consist} two years later:
                 {The} {LEGO} brick dream",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "2",
  pages =        "301--314",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Sep 25 06:33:35 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/392/vandersalm.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0138",
}

@Article{Bevington:2000:TNB,
  author =       "D. Bevington",
  title =        "Technical note --- Business function specification of
                 commercial applications",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "2",
  pages =        "315--335",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Sep 25 06:33:35 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/392/bevington.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0138",
}

@Article{Ricke:2000:TNT,
  author =       "D. D. Ricke",
  title =        "Technical note --- {A} three-dimensional framework for
                 information technology solutions",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "2",
  pages =        "336--359",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Sep 25 06:33:35 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/392/ricke.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0138",
}

@Article{Shi:2000:EDS,
  author =       "S. S. B. Shi and E. Stokes and D. Byrne and C. F. Corn
                 and D. Bachmann and T. Jones",
  title =        "An enterprise directory solution with {DB2}",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "2",
  pages =        "360--383",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Sep 25 06:33:35 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/392/shi.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0138",
}

@Article{Housel:2000:EES,
  author =       "B. C. Housel and I. Shields",
  title =        "{Emulator Express}: a system for optimizing emulator
                 performance for wireless networks",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "2",
  pages =        "384--402",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Sep 25 06:33:35 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/392/housel.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0138",
}

@Article{Anonymous:2000:BP,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "2",
  pages =        "403--??",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Sep 25 06:33:35 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/392/books.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0138",
}

@Article{Hoffnagle:2000:Pc,
  author =       "Gene F. Hoffnagle",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "415--??",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Negroponte:2000:BDD,
  author =       "N. Negroponte",
  title =        "From being digital to digital beings",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "417--418",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/negroponte.html;
                 http://www.research.ibm.com/journal/sj/393/negroponte.pdf;
                 http://www.research.ibm.com/journal/sj/393/negroponte.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Haase:2000:WML,
  author =       "K. Haase",
  title =        "Why the {Media Lab} works --- {A} personal view",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "419--431",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/haase.html;
                 http://www.research.ibm.com/journal/sj/393/haase.pdf;
                 http://www.research.ibm.com/journal/sj/393/haase.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Lippman:2000:MNC,
  author =       "A. Lippman",
  title =        "Media, networks, and content",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "435--437",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part1/lippman.html;
                 http://www.research.ibm.com/journal/sj/393/part1/lippman.pdf;
                 http://www.research.ibm.com/journal/sj/393/part1/lippman.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Pinhanez:2000:PIS,
  author =       "C. S. Pinhanez and J. W. Davis and S. Intille and M.
                 P. Johnson and A. D. Wilson and A. F. Bobick and B.
                 Blumberg",
  title =        "Physically interactive story environments",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "438--455",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part1/pinhanez.html;
                 http://www.research.ibm.com/journal/sj/393/part1/pinhanez.pdf;
                 http://www.research.ibm.com/journal/sj/393/part1/pinhanez.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Davenport:2000:SSC,
  author =       "G. Davenport and S. Agamanolis and B. Barry and B.
                 Bradley and K. Brooks",
  title =        "Synergistic storyscapes and constructionist cinematic
                 sharing",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "456--469",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part1/davenport.html;
                 http://www.research.ibm.com/journal/sj/393/part1/davenport.pdf;
                 http://www.research.ibm.com/journal/sj/393/part1/davenport.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Bove:2000:HTR,
  author =       "V. M. {Bove, Jr.} and J. Dakss and E. Chalom and S.
                 Agamanolis",
  title =        "Hyperlinked television research at the {MIT Media
                 Laboratory}",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "470--478",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part1/bove.html;
                 http://www.research.ibm.com/journal/sj/393/part1/bove.pdf;
                 http://www.research.ibm.com/journal/sj/393/part1/bove.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Sparacino:2000:MPI,
  author =       "F. Sparacino and G. Davenport and A. Pentland",
  title =        "Media in performance: Interactive spaces for dance,
                 theater, circus, and museum exhibits",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "479--510",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part1/sparacino.html;
                 http://www.research.ibm.com/journal/sj/393/part1/sparacino.pdf;
                 http://www.research.ibm.com/journal/sj/393/part1/sparacino.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Paradiso:2000:DIE,
  author =       "J. A. Paradiso and K. Hsiao and A. Y. Benbasat and Z.
                 Teegarden",
  title =        "Design and implementation of expressive footwear",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "511--529",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part1/paradiso.html;
                 http://www.research.ibm.com/journal/sj/393/part1/paradiso.pdf;
                 http://www.research.ibm.com/journal/sj/393/part1/paradiso.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Gerasimov:2000:TTU,
  author =       "V. Gerasimov and W. Bender",
  title =        "Things that talk: Using sound for device-to-device and
                 device-to-human communication",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "530--546",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part1/gerasimov.html;
                 http://www.research.ibm.com/journal/sj/393/part1/gerasimov.pdf;
                 http://www.research.ibm.com/journal/sj/393/part1/gerasimov.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Bender:2000:ADH,
  author =       "W. Bender and W. Butera and D. Gruhl and R. Hwang and
                 F. J. Paiz and S. Pogreb",
  title =        "Applications for data hiding",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "547--566",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Gruhl:2000:NSN,
  author =       "D. Gruhl and W. Bender",
  title =        "A new structure for news editing",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "569--588",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part1/gruhl.html;
                 http://www.research.ibm.com/journal/sj/393/part1/gruhl.pdf;
                 http://www.research.ibm.com/journal/sj/393/part1/gruhl.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Haase:2000:IB,
  author =       "K. Haase",
  title =        "Interlingual {BRICO}",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "589--596",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part1/haase.html;
                 http://www.research.ibm.com/journal/sj/393/part1/haase.pdf;
                 http://www.research.ibm.com/journal/sj/393/part1/haase.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Koen:2000:TFT,
  author =       "D. B. Koen and W. Bender",
  title =        "Time Frames: Temporal augmentation of the news",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "597--616",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part1/koen.html;
                 http://www.research.ibm.com/journal/sj/393/part1/koen.pdf;
                 http://www.research.ibm.com/journal/sj/393/part1/koen.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Lieberman:2000:CCS,
  author =       "H. Lieberman and T. Selker",
  title =        "Out of context: Computer systems that adapt to, and
                 learn from, context",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "617--632",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part1/lieberman.html;
                 http://www.research.ibm.com/journal/sj/393/part1/lieberman.pdf;
                 http://www.research.ibm.com/journal/sj/393/part1/lieberman.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Dean:2000:SMF,
  author =       "S. Elo Dean and L. Weitzman",
  title =        "{SuperNews}: Multiple feeds for multiple views",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "633--645",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part1/elodean.html;
                 http://www.research.ibm.com/journal/sj/393/part1/elodean.pdf;
                 http://www.research.ibm.com/journal/sj/393/part1/elodean.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Emnett:2000:SNR,
  author =       "K. Emnett and C. Schmandt",
  title =        "Synthetic News Radio",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "646--659",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part1/emnett.html;
                 http://www.research.ibm.com/journal/sj/393/part1/emnett.pdf;
                 http://www.research.ibm.com/journal/sj/393/part1/emnett.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Schmandt:2000:EM,
  author =       "C. Schmandt and N. Marmasse and S. Marti and N.
                 Sawhney and S. Wheeler",
  title =        "Everywhere messaging",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "660--677",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part1/schmandt.html;
                 http://www.research.ibm.com/journal/sj/393/part1/schmandt.pdf;
                 http://www.research.ibm.com/journal/sj/393/part1/schmandt.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Learning:2000:FAW,
  author =       "T. Machover",
  title =        "Future arts: By and for whom, and for what?",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "678--679",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part1/machover.html;
                 http://www.research.ibm.com/journal/sj/393/part1/machover.pdf;
                 http://www.research.ibm.com/journal/sj/393/part1/machover.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Bender:2000:LE,
  author =       "W. Bender",
  title =        "Learning and expressing",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "683--684",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part2/bender.html;
                 http://www.research.ibm.com/journal/sj/393/part2/bender.pdf;
                 http://www.research.ibm.com/journal/sj/393/part2/bender.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Rhodes:2000:JTI,
  author =       "B. J. Rhodes and P. Maes",
  title =        "Just-in-time information retrieval agents",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "685--704",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part2/rhodes.html;
                 http://www.research.ibm.com/journal/sj/393/part2/rhodes.pdf;
                 http://www.research.ibm.com/journal/sj/393/part2/rhodes.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Picard:2000:TCR,
  author =       "R. W. Picard",
  title =        "Toward computers that recognize and respond to user
                 emotion",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "705--719",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part2/picard.html;
                 http://www.research.ibm.com/journal/sj/393/part2/picard.pdf;
                 http://www.research.ibm.com/journal/sj/393/part2/picard.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Papert:2000:WBI,
  author =       "S. Papert",
  title =        "What's the big idea? Toward a pedagogy of idea power",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "720--729",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part2/papert.html;
                 http://www.research.ibm.com/journal/sj/393/part2/papert.pdf;
                 http://www.research.ibm.com/journal/sj/393/part2/papert.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Smith:2000:SSJ,
  author =       "B. K. Smith and W. Bender and I. Endter and J.
                 Driscoll and M. Turpeinen and D. Quan",
  title =        "{Silver Stringers} and {Junior Journalists}: Active
                 information producers",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "730--748",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part2/smith.html;
                 http://www.research.ibm.com/journal/sj/393/part2/smith.pdf;
                 http://www.research.ibm.com/journal/sj/393/part2/smith.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Smith:2000:JIM,
  author =       "B. K. Smith and E. Blankinship",
  title =        "Justifying imagery: Multimedia support for learning
                 through explanation",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "749--767",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part2/blankinship.html;
                 http://www.research.ibm.com/journal/sj/393/part2/blankinship.pdf;
                 http://www.research.ibm.com/journal/sj/393/part2/blankinship.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Cavallo:2000:EDL,
  author =       "D. Cavallo",
  title =        "Emergent design and learning environments: Building on
                 indigenous knowledge",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "768--781",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part2/cavallo.html;
                 http://www.research.ibm.com/journal/sj/393/part2/cavallo.pdf;
                 http://www.research.ibm.com/journal/sj/393/part2/cavallo.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Orwant:2000:EAP,
  author =       "J. Orwant",
  title =        "{EGGG}: Automated programming for game generation",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "782--794",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part2/orwant.html;
                 http://www.research.ibm.com/journal/sj/393/part2/orwant.pdf;
                 http://www.research.ibm.com/journal/sj/393/part2/orwant.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Martin:2000:MDK,
  author =       "F. Martin and B. Mikhak and B. Silverman",
  title =        "{MetaCricket}: a designer's kit for making
                 computational devices",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "795--815",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part2/martin.html;
                 http://www.research.ibm.com/journal/sj/393/part2/martin.pdf;
                 http://www.research.ibm.com/journal/sj/393/part2/martin.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Resnick:2000:PEC,
  author =       "M. Resnick",
  title =        "Part 3: Everywhere computing: It's not just
                 information",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "816--817",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 01 08:42:51 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part2/resnick.html;
                 http://www.research.ibm.com/journal/sj/393/part2/resnick.pdf;
                 http://www.research.ibm.com/journal/sj/393/part2/resnick.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Pentland:2000:A,
  author =       "A. Pentland",
  title =        "It's alive!",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "821--822",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part3/pentland.html;
                 http://www.research.ibm.com/journal/sj/393/part3/pentland.pdf;
                 http://www.research.ibm.com/journal/sj/393/part3/pentland.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Maguire:2000:TTT,
  author =       "Y. Maguire and E. Boyden and N. Gershenfeld",
  title =        "Toward a table-top quantumcomputer",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "823--839",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part3/maguire.html;
                 http://www.research.ibm.com/journal/sj/393/part3/maguire.pdf;
                 http://www.research.ibm.com/journal/sj/393/part3/maguire.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Post:2000:BDF,
  author =       "E. R. Post and M. Orth and P. R. Russo and N.
                 Gershenfeld",
  title =        "{E}-broidery: Design and fabrication of textile-based
                 computing",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "840--860",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part3/post.html;
                 http://www.research.ibm.com/journal/sj/393/part3/post.pdf;
                 http://www.research.ibm.com/journal/sj/393/part3/post.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Omojola:2000:IIF,
  author =       "O. Omojola and E. R. Post and M. D. Hancher and Y.
                 Maguire and R. Pappu and B. Schoner and P. R. Russo and
                 R. Fletcher and N. Gershenfeld",
  title =        "An installation of interactive furniture",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "861--879",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part3/omojola.html;
                 http://www.research.ibm.com/journal/sj/393/part3/omojola.pdf;
                 http://www.research.ibm.com/journal/sj/393/part3/omojola.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Selker:2000:CAD,
  author =       "T. Selker and W. Burleson",
  title =        "Context-aware design and interaction in computer
                 systems",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "880--891",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part3/selker.html;
                 http://www.research.ibm.com/journal/sj/393/part3/selker.pdf;
                 http://www.research.ibm.com/journal/sj/393/part3/selker.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Paradiso:2000:SSI,
  author =       "J. A. Paradiso and K. Hsiao and J. Strickon and J.
                 Lifton and A. Adler",
  title =        "Sensor systems for interactive surfaces",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "892--914",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part3/paradiso.html;
                 http://www.research.ibm.com/journal/sj/393/part3/paradiso.pdf;
                 http://www.research.ibm.com/journal/sj/393/part3/paradiso.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Ullmer:2000:EFT,
  author =       "B. Ullmer and H. Ishii",
  title =        "Emerging frameworks for tangible user interfaces",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "915--931",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part3/ullmer.html;
                 http://www.research.ibm.com/journal/sj/393/part3/ullmer.pdf;
                 http://www.research.ibm.com/journal/sj/393/part3/ullmer.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Gershenfeld:2000:EUL,
  author =       "N. Gershenfeld",
  title =        "Everything, the universe, and life",
  journal =      j-IBM-SYS-J,
  volume =       "39",
  number =       "3/4",
  pages =        "932--934",
  month =        "????",
  year =         "2000",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Oct 21 11:40:48 MDT 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj39-34.html",
  URL =          "http://www.research.ibm.com/journal/sj/393/part3/gershenfeld.html;
                 http://www.research.ibm.com/journal/sj/393/part3/gershenfeld.pdf;
                 http://www.research.ibm.com/journal/sj/393/part3/gershenfeld.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0139",
}

@Article{Ritsko:2001:Pa,
  author =       "John J. Ritsko and Alfred G. Davis",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "1",
  pages =        "2--3",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 7 16:40:01 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/401/preface.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0140",
}

@Article{Smith:2001:TBT,
  author =       "R. A. Smith",
  title =        "Trends in e-business technologies",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "1",
  pages =        "4--7",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 7 16:40:01 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/401/smith.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0140",
}

@Article{Flurry:2001:IAF,
  author =       "G. Flurry and W. Vicknair",
  title =        "The {IBM Application Framework} for e-business",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "1",
  pages =        "8--24",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 7 16:40:01 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/401/flurry.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0140",
}

@Article{Ferguson:2001:WBS,
  author =       "D. F. Ferguson and R. Kerth",
  title =        "{WebSphere} as an e-business server",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "1",
  pages =        "25--45",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 7 16:40:01 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/401/ferguson.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0140",
}

@Article{Bainbridge:2001:CEJ,
  author =       "A. Bainbridge and J. Colgrave and A. Colyer and G.
                 Normington",
  title =        "{CICS} and {Enterprise JavaBeans}",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "1",
  pages =        "46--67",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 7 16:40:01 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/401/bainbridge.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0140",
}

@Article{Dan:2001:BBI,
  author =       "A. Dan and D. M. Dias and R. Kearney and T. C. Lau and
                 T. N. Nguyen and F. N. Parr and M. W. Sachs and H. H.
                 Shaikh",
  title =        "Business-to-business integration with {tpaML} and a
                 business-to-business protocol framework",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "1",
  pages =        "68--90",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 7 16:40:01 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/401/dan.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0140",
}

@Article{Rofrano:2001:IWC,
  author =       "J. J. Rofrano",
  title =        "{IBM WebSphere Commerce Suite Product Advisor}",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "1",
  pages =        "91--103",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 7 16:40:01 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/401/rofrano.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0140",
}

@Article{Kreger:2001:JME,
  author =       "H. Kreger",
  title =        "{Java Management Extensions} for application
                 management",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "1",
  pages =        "104--129",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 7 16:40:01 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/401/kreger.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0140",
}

@Article{Koved:2001:SCE,
  author =       "L. Koved and A. Nadalin and N. Nagaratnam and M.
                 Pistoia and T. Shrader",
  title =        "Security challenges for {Enterprise Java} in an
                 e-business environment",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "1",
  pages =        "130--152",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 7 16:40:01 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/401/koved.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0140",
}

@Article{Britton:2001:TEB,
  author =       "K. H. Britton and R. Case and A. Citron and R. Floyd
                 and Y. Li and C. Seekamp and B. Topol and K. Tracey",
  title =        "Transcoding: Extending e-business to new
                 environments",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "1",
  pages =        "153--178",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 7 16:40:01 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/401/britton.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0140",
}

@Article{Ihde:2001:IBT,
  author =       "S. C. Ihde and P. P. Maglio and J. Meyer and R.
                 Barrett",
  title =        "Intermediary-based transcoding framework",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "1",
  pages =        "179--192",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 7 16:40:01 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/401/ihde.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0140",
}

@Article{Hild:2001:AHP,
  author =       "S. G. Hild and C. Binding and D. Bourges-Waldegg and
                 C. Steenkeste",
  title =        "Application hosting for pervasive computing",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "1",
  pages =        "193--219",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 7 16:40:01 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/401/hild.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0140",
}

@Article{Kan:2001:PMS,
  author =       "S. H. Kan and J. Parrish and D. Manlove",
  title =        "In-process metrics for software testing",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "1",
  pages =        "220--241",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 7 16:40:01 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-1.html",
  URL =          "http://www.research.ibm.com/journal/sj/401/kan.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0140",
}

@Article{Swope:2001:DCL,
  author =       "W. C. Swope",
  title =        "Deep computing for the life sciences",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "248--263",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/swope.html;
                 http://www.research.ibm.com/journal/sj/402/swope.pdf;
                 http://www.research.ibm.com/journal/sj/402/swope.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{Head-Gordon:2001:CCS,
  author =       "T. Head-Gordon and J. C. Wooley",
  title =        "Computational challenges in structural and functional
                 genomics",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "265--296",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/headgordon.html;
                 http://www.research.ibm.com/journal/sj/402/headgordon.pdf;
                 http://www.research.ibm.com/journal/sj/402/headgordon.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{Duan:2001:CPF,
  author =       "Y. Duan and P. A. Kollman",
  title =        "Computational protein folding: From lattice to
                 all-atom",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "297--308",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/duan.html;
                 http://www.research.ibm.com/journal/sj/402/duan.pdf;
                 http://www.research.ibm.com/journal/sj/402/duan.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{IBGT:2001:BGV,
  author =       "{IBM Blue Gene team}",
  title =        "{Blue Gene}: a vision for protein science using a
                 petaflop supercomputer",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "310--327",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/allen.html;
                 http://www.research.ibm.com/journal/sj/402/allen.pdf;
                 http://www.research.ibm.com/journal/sj/402/allen.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{Straatsma:2001:LBM,
  author =       "T. P. Straatsma and J. A. McCammon",
  title =        "Load balancing of molecular dynamics simulation with
                 {NWChem}",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "328--341",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/straatsma.html;
                 http://www.research.ibm.com/journal/sj/402/straatsma.pdf;
                 http://www.research.ibm.com/journal/sj/402/straatsma.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{Winslow:2001:MMV,
  author =       "R. L. Winslow and D. F. Scollan and J. L. Greenstein
                 and C. K. Yung and W. {Baumgartner, Jr.} and G. Bhanot
                 and D. L. Gresh and B. E. Rogowitz",
  title =        "Mapping, modeling, and visual exploration of
                 structure-function relationships in the heart",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "342--359",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/winslow.html;
                 http://www.research.ibm.com/journal/sj/402/winslow.pdf;
                 http://www.research.ibm.com/journal/sj/402/winslow.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{Waszkowycz:2001:LSV,
  author =       "B. Waszkowycz and T. D. J. Perkins and R. A. Sykes and
                 J. Li",
  title =        "Large-scale virtual screening for discovering leads in
                 the postgenomic era",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "360--376",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/waszkowycz.html;
                 http://www.research.ibm.com/journal/sj/402/waszkowycz.pdf;
                 http://www.research.ibm.com/journal/sj/402/waszkowycz.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{Liu:2001:FCP,
  author =       "A. H. Liu and A. Califano",
  title =        "Functional classification of proteins by pattern
                 discovery and top-down clustering of primary
                 sequences",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "379--393",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/liu.html;
                 http://www.research.ibm.com/journal/sj/402/liu.pdf;
                 http://www.research.ibm.com/journal/sj/402/liu.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{Jurisica:2001:IDS,
  author =       "I. Jurisica and P. Rogers and J. I. Glasgow and S.
                 Fortier and J. R. Luft and J. R. Wolfley and M. A.
                 Bianca and D. R. Weeks and G. T. DeTitta",
  title =        "Intelligent decision support for protein crystal
                 growth",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "394--409",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/jurisica.html;
                 http://www.research.ibm.com/journal/sj/402/jurisica.pdf;
                 http://www.research.ibm.com/journal/sj/402/jurisica.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{Siew:2001:CEP,
  author =       "N. Siew and D. Fischer",
  title =        "Convergent evolution of protein structure prediction
                 and computer chess tournaments: {CASP}, {Kasparov}, and
                 {CAFASP}",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "410--425",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/siew.html;
                 http://www.research.ibm.com/journal/sj/402/siew.pdf;
                 http://www.research.ibm.com/journal/sj/402/siew.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{Wang:2001:NTE,
  author =       "J. T. L. Wang and Q. Ma and D. Shasha and C. H. Wu",
  title =        "New techniques for extracting features from protein
                 sequences",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "426--441",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/wang.html;
                 http://www.research.ibm.com/journal/sj/402/wang.pdf;
                 http://www.research.ibm.com/journal/sj/402/wang.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{Robson:2001:FSU,
  author =       "B. Robson",
  title =        "{Fastfinger}: a study into the use of compressed
                 residue pair separation matrices for protein sequence
                 comparison",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "442--463",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/robson.html;
                 http://www.research.ibm.com/journal/sj/402/robson.pdf;
                 http://www.research.ibm.com/journal/sj/402/robson.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{Inman:2001:HTD,
  author =       "J. T. Inman and H. R. Flores and G. D. May and J. W.
                 Weller and C. J. Bell",
  title =        "A high-throughput distributed {DNA} sequence analysis
                 and database system",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "464--486",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/inman.html;
                 http://www.research.ibm.com/journal/sj/402/inman.pdf;
                 http://www.research.ibm.com/journal/sj/402/inman.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{Haas:2001:DSI,
  author =       "L. M. Haas and P. M. Schwarz and P. Kodali and E.
                 Kotlar and J. E. Rice and W. C. Swope",
  title =        "{DiscoveryLink}: a system for integrated access to
                 life sciences data sources",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "489--511",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/haas.html;
                 http://www.research.ibm.com/journal/sj/402/haas.pdf;
                 http://www.research.ibm.com/journal/sj/402/haas.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{Davidson:2001:KKG,
  author =       "S. B. Davidson and J. Crabtree and B. P. Brunk and J.
                 Schug and V. Tannen and G. C. Overton and C. J.
                 {Stoeckert, Jr.}",
  title =        "{K2\slash Kleisli} and {GUS}: Experiments in
                 integrated access to genomic data sources",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "512--531",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/davidson.html;
                 http://www.research.ibm.com/journal/sj/402/davidson.pdf;
                 http://www.research.ibm.com/journal/sj/402/davidson.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{Goble:2001:TAM,
  author =       "C. A. Goble and R. Stevens and G. Ng and S. Bechhofer
                 and N. W. Paton and P. G. Baker and M. Peim and A.
                 Brass",
  title =        "Transparent access to multiple bioinformatics
                 information sources",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "532--551",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/goble.html;
                 http://www.research.ibm.com/journal/sj/402/goble.pdf;
                 http://www.research.ibm.com/journal/sj/402/goble.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{Mangalam:2001:GOS,
  author =       "H. Mangalam and J. Stewart and J. Zhou and K. Schlauch
                 and M. Waugh and G. Chen and A. D. Farmer and G.
                 Colello and J. W. Weller",
  title =        "{GeneX}: An {Open Source} gene expression database and
                 integrated tool set",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "552--569",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/mangalam.html;
                 http://www.research.ibm.com/journal/sj/402/mangalam.pdf;
                 http://www.research.ibm.com/journal/sj/402/mangalam.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{Siepel:2001:IPH,
  author =       "A. C. Siepel and A. N. Tolopko and A. D. Farmer and P.
                 A. Steadman and F. D. Schilkey and B. D. Perry and W.
                 D. Beavis",
  title =        "An integration platform for heterogeneous
                 bioinformatics software components",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "570--591",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/siepel.html;
                 http://www.research.ibm.com/journal/sj/402/siepel.pdf;
                 http://www.research.ibm.com/journal/sj/402/siepel.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{Lee:2001:GSG,
  author =       "C. Lee and K. Irizarry",
  title =        "The {GeneMine} system for genome\slash proteome
                 annotation and collaborative data mining",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "592--603",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/lee.html;
                 http://www.research.ibm.com/journal/sj/402/lee.pdf;
                 http://www.research.ibm.com/journal/sj/402/lee.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{Kovac:2001:MVP,
  author =       "Caroline A. Kovac",
  title =        "Message from the {Vice President, Life Sciences
                 Solutions}",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "2",
  pages =        "??--??",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jul 25 11:56:47 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/sj40-2.html",
  URL =          "http://www.research.ibm.com/journal/sj/402/message.html;
                 http://www.research.ibm.com/journal/sj/402/message.pdf;
                 http://www.research.ibm.com/journal/sj/402/message.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0141",
}

@Article{Ritsko:2001:Pb,
  author =       "John J. Ritsko and Marilyn L. Bates",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "3",
  pages =        "612--613",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/403/preface.html;
                 http://www.research.ibm.com/journal/sj/403/preface.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0142",
}

@Article{Hamann:2001:SBA,
  author =       "E.-M. Hamann and H. Henn and T. Sch{\"a}ck and F.
                 Seliger",
  title =        "Securing e-business applications using smart cards",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "3",
  pages =        "635--647",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/403/hamann.html;
                 http://www.research.ibm.com/journal/sj/403/hamann.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0142",
}

@Article{Benantar:2001:IPK,
  author =       "M. Benantar",
  title =        "The {Internet} public key infrastructure",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "3",
  pages =        "648--665",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/403/benantar.html;
                 http://www.research.ibm.com/journal/sj/403/benantar.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0142",
}

@Article{Botha:2001:SDA,
  author =       "R. A. Botha and J. H. P. Eloff",
  title =        "Separation of duties for access control enforcement in
                 workflow environments",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "3",
  pages =        "666--682",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/403/botha.html;
                 http://www.research.ibm.com/journal/sj/403/botha.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0142",
}

@Article{Smith:2001:PSP,
  author =       "S. W. Smith and D. Safford",
  title =        "Practical server privacy with secure coprocessors",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "3",
  pages =        "683--695",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/403/smith.html;
                 http://www.research.ibm.com/journal/sj/403/smith.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0142",
}

@Article{Guski:2001:SZC,
  author =       "R. Guski and J. C. Dayka and L. N. Distel and W. B.
                 Farrell and K. A. Gdaniec and M. J. Kelly and M. A.
                 Nelson and L. H. Overby and L. G. Robinson",
  title =        "Security on {z/OS}: Comprehensive, current, and
                 flexible",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "3",
  pages =        "696--720",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/403/guski.html;
                 http://www.research.ibm.com/journal/sj/403/guski.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0142",
}

@Article{Cheng:2001:AIK,
  author =       "P.-C. Cheng",
  title =        "An architecture for the {Internet Key Exchange
                 Protocol}",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "3",
  pages =        "721--746",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/403/cheng.html;
                 http://www.research.ibm.com/journal/sj/403/cheng.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0142",
}

@Article{Whitmore:2001:MDS,
  author =       "J. J. Whitmore",
  title =        "A method for designing secure solutions",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "3",
  pages =        "747--768",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/403/whitmore.html;
                 http://www.research.ibm.com/journal/sj/403/whitmore.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0142",
}

@Article{Palmer:2001:EH,
  author =       "C. C. Palmer",
  title =        "Ethical hacking",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "3",
  pages =        "769--780",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/403/palmer.html;
                 http://www.research.ibm.com/journal/sj/403/palmer.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0142",
}

@Article{Hsu:2001:CPD,
  author =       "W. W. Hsu and A. J. Smith and H. C. Young",
  title =        "Characteristics of production database workloads and
                 the {TPC} benchmarks",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "3",
  pages =        "781--802",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/403/hsu.html;
                 http://www.research.ibm.com/journal/sj/403/hsu.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0142",
}

@Article{Anonymous:2001:B,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "3",
  pages =        "803--805",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/403/books.html;
                 http://www.research.ibm.com/journal/sj/403/books.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0142",
}

@Article{Anonymous:2001:R,
  author =       "Anonymous",
  title =        "Referees",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "3",
  pages =        "806--808",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/403/referees.html;
                 http://www.research.ibm.com/journal/sj/403/referees.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0142",
}

@Article{Ritsko:2001:Pc,
  author =       "John J. Ritsko and Alex Birman",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "4",
  pages =        "812--813",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/404/preface.html;
                 http://www.research.ibm.com/journal/sj/404/preface.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0143",
}

@Article{Marwick:2001:CPO,
  author =       "A. D. Marwick",
  title =        "Communities of practice and organizational
                 performance",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "4",
  pages =        "814--830",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/404/marwick.html;
                 http://www.research.ibm.com/journal/sj/404/marwick.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0143",
}

@Article{Lesser:2001:CPO,
  author =       "E. L. Lesser and J. Storck",
  title =        "Communities of practice and organizational
                 performance",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "4",
  pages =        "831--841",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/404/lesser.html;
                 http://www.research.ibm.com/journal/sj/404/lesser.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0143",
}

@Article{Gongla:2001:ECP,
  author =       "P. Gongla and C. R. Rizzuto",
  title =        "Evolving communities of practice: {IBM Global
                 Services} experience",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "4",
  pages =        "842--862",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/404/gongla.html;
                 http://www.research.ibm.com/journal/sj/404/gongla.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0143",
}

@Article{Thomas:2001:KMP,
  author =       "J. C. Thomas and W. A. Kellogg and T. Erickson",
  title =        "The knowledge management puzzle: Human and social
                 factors in knowledge management",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "4",
  pages =        "863--884",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/404/thomas.html;
                 http://www.research.ibm.com/journal/sj/404/thomas.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0143",
}

@Article{Dueck:2001:VKH,
  author =       "G. Dueck",
  title =        "Views of knowledge are human views",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "4",
  pages =        "885--888",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/404/dueck.html;
                 http://www.research.ibm.com/journal/sj/404/dueck.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0143",
}

@Article{Fahey:2001:LBO,
  author =       "L. Fahey and R. Srivastava and J. S. Sharon and D. E.
                 Smith",
  title =        "Linking e-business and operating processes: The role
                 of knowledge management",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "4",
  pages =        "889--907",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/404/fahey.html;
                 http://www.research.ibm.com/journal/sj/404/fahey.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0143",
}

@Article{Parise:2001:KRE,
  author =       "S. Parise and J. C. Henderson",
  title =        "Knowledge resource exchange in strategic alliances",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "4",
  pages =        "908--924",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/404/parise.html;
                 http://www.research.ibm.com/journal/sj/404/parise.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0143",
}

@Article{Mack:2001:KPE,
  author =       "R. Mack and Y. Ravin and R. J. Byrd",
  title =        "Knowledge portals and the emerging digital knowledge
                 workplace",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "4",
  pages =        "925--955",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/404/mack.html;
                 http://www.research.ibm.com/journal/sj/404/mack.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0143",
}

@Article{Pohs:2001:LKD,
  author =       "W. Pohs and G. Pinder and C. Dougherty and M. White",
  title =        "The {Lotus Knowledge Discovery System}: {Tools} and
                 experiences",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "4",
  pages =        "956--966",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/404/pohs.html;
                 http://www.research.ibm.com/journal/sj/404/pohs.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0143",
}

@Article{Nasukawa:2001:TAK,
  author =       "T. Nasukawa and T. Nagano",
  title =        "Text analysis and knowledge mining system",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "4",
  pages =        "967--984",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/404/nasukawa.html;
                 http://www.research.ibm.com/journal/sj/404/nasukawa.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0143",
}

@Article{Brown:2001:TSK,
  author =       "E. W. Brown and S. Srinivasan and A. Coden and D.
                 Ponceleon and J. W. Cooper and A. Amir",
  title =        "Toward speech as a knowledge resource",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "4",
  pages =        "985--1001",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/404/brown.html;
                 http://www.research.ibm.com/journal/sj/404/brown.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0143",
}

@Article{Prusak:2001:WDK,
  author =       "L. Prusak",
  title =        "Where did knowledge management come from?",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "4",
  pages =        "1002--1007",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/404/prusak.html;
                 http://www.research.ibm.com/journal/sj/404/prusak.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0143",
}

@Article{Anonymous:2001:SR,
  author =       "Anonymous",
  title =        "Suggested reading",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "4",
  pages =        "1008--1011",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/404/suggest.html;
                 http://www.research.ibm.com/journal/sj/404/suggest.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0143",
}

@Article{Ritsko:2002:Pa,
  author =       "John J. Ritsko and Marilyn L. Bates",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "1",
  pages =        "2--3",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Feb 12 17:23:05 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/411/preface.html;
                 http://www.research.ibm.com/journal/sj/411/preface.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0144",
}

@Article{Hailpern:2002:SDT,
  author =       "B. Hailpern and P. Santhanam",
  title =        "Software debugging, testing, and verification",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "1",
  pages =        "4--12",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Feb 12 17:23:05 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/411/hailpern.html;
                 http://www.research.ibm.com/journal/sj/411/hailpern.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0144",
}

@Article{Bassin:2002:MEV,
  author =       "K. Bassin and S. Biyani and P. Santhanam",
  title =        "Metrics to evaluate vendor-developed software based on
                 test case execution results",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "1",
  pages =        "13--30",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Feb 12 17:23:05 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/411/bassin.html;
                 http://www.research.ibm.com/journal/sj/411/bassin.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0144",
}

@Article{Butcher:2002:IST,
  author =       "M. Butcher and H. Munro and T. Kratschmer",
  title =        "Improving software testing via {ODC}: Three case
                 studies",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "1",
  pages =        "31--44",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Feb 12 17:23:05 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/411/butcher.html;
                 http://www.research.ibm.com/journal/sj/411/butcher.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0144",
}

@Article{Weyuker:2002:MPP,
  author =       "E. J. Weyuker and A. Avritzer",
  title =        "A metric for predicting the performance of an
                 application under a growing workload",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "1",
  pages =        "45--54",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Feb 12 17:23:05 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/411/weyuker.html;
                 http://www.research.ibm.com/journal/sj/411/weyuker.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0144",
}

@Article{Loveland:2002:TZP,
  author =       "S. Loveland and G. Miller and R. Prewitt and M.
                 Shannon",
  title =        "Testing {z/OS}: The premier operating system for
                 {IBM}'s {zSeries} server",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "1",
  pages =        "55--73",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Feb 12 17:23:05 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/411/loveland.html;
                 http://www.research.ibm.com/journal/sj/411/loveland.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0144",
}

@Article{Williams:2002:STT,
  author =       "C. Williams and H. Sluiman and D. Pitcher and M.
                 Slavescu and J. Spratley and M. Brodhun and J. McLean
                 and C. Rankin and K. Rosengren",
  title =        "The {STCL} test tools architecture",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "1",
  pages =        "74--88",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Feb 12 17:23:05 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/411/williams.html;
                 http://www.research.ibm.com/journal/sj/411/williams.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0144",
}

@Article{Farchi:2002:UMB,
  author =       "E. Farchi and A. Hartman and S. S. Pinter",
  title =        "Using a model-based test generator to test for
                 standard conformance",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "1",
  pages =        "89--110",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Feb 12 17:23:05 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/411/farchi.html;
                 http://www.research.ibm.com/journal/sj/411/farchi.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0144",
}

@Article{Edelstein:2002:MJP,
  author =       "O. Edelstein and E. Farchi and Y. Nir and G. Ratsaby
                 and S. Ur",
  title =        "Multithreaded {Java} program test generation",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "1",
  pages =        "111--125",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Feb 12 17:23:05 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/411/edelstein.html;
                 http://www.research.ibm.com/journal/sj/411/edelstein.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0144",
}

@Article{Rankin:2002:STA,
  author =       "C. Rankin",
  title =        "The {Software Testing Automation Framework}",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "1",
  pages =        "126--139",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Feb 12 17:23:05 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/411/rankin.html;
                 http://www.research.ibm.com/journal/sj/411/rankin.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0144",
}

@Article{Cobleigh:2002:FFS,
  author =       "J. M. Cobleigh and L. A. Clarke and L. J. Osterweil",
  title =        "{FLAVERS}: a finite state verification technique for
                 software systems",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "1",
  pages =        "140--165",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Feb 12 17:23:05 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/411/cobleigh.html;
                 http://www.research.ibm.com/journal/sj/411/cobleigh.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0144",
}

@Article{Woodworth:2002:MCD,
  author =       "Bill Woodworth",
  title =        "Message from the {Corporate Director, IBM Software
                 Test}",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "1",
  pages =        "??--??",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Feb 12 17:23:05 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/411/execletter.html;
                 http://www.research.ibm.com/journal/sj/411/execletter.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0144",
}

@Article{Mills:2002:MSV,
  author =       "Steve Mills",
  title =        "Message from the {Senior Vice President and Group
                 Executive, IBM Software Group}",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "2",
  pages =        "??--??",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 27 11:36:56 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/412/execletter.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0145",
}

@Article{Ritsko:2002:Pb,
  author =       "John J. Ritsko and Alfred G. Davis",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "2",
  pages =        "168--177",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 27 11:36:56 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/412/preface.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0145",
}

@Article{Gottschalk:2002:IWS,
  author =       "K. Gottschalk and S. Graham and H. Kreger and J.
                 Snell",
  title =        "Introduction to {Web} services architecture",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "2",
  pages =        "168--177",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 27 11:36:56 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/412/gottschalk.html;
                 http://www.research.ibm.com/journal/sj/412/gottschalk.pdf;
                 http://www.research.ibm.com/journal/sj/412/gottschalk.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0145",
}

@Article{Lau:2002:DXW,
  author =       "C. Lau and A. Ryman",
  title =        "Developing {XML Web} services with {WebSphere Studio
                 Application Developer}",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "2",
  pages =        "178--197",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 27 11:36:56 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/412/lau.html;
                 http://www.research.ibm.com/journal/sj/412/lau.pdf;
                 http://www.research.ibm.com/journal/sj/412/lau.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0145",
}

@Article{Leymann:2002:WSB,
  author =       "F. Leymann and D. Roller and M.-T. Schmidt",
  title =        "{Web} services and business process management",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "2",
  pages =        "198--211",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 27 11:36:56 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/412/leymann.html;
                 http://www.research.ibm.com/journal/sj/412/leymann.pdf;
                 http://www.research.ibm.com/journal/sj/412/leymann.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0145",
}

@Article{Farrell:2002:WSM,
  author =       "J. A. Farrell and H. Kreger",
  title =        "{Web} services management approaches",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "2",
  pages =        "212--227",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 27 11:36:56 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/412/farrell.html;
                 http://www.research.ibm.com/journal/sj/412/farrell.pdf;
                 http://www.research.ibm.com/journal/sj/412/farrell.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0145",
}

@Article{Hondo:2002:SWS,
  author =       "M. Hondo and N. Nagaratnam and A. Nadalin",
  title =        "Securing {Web} services",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "2",
  pages =        "228--241",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 27 11:36:56 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/412/hondo.html;
                 http://www.research.ibm.com/journal/sj/412/hondo.pdf;
                 http://www.research.ibm.com/journal/sj/412/hondo.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0145",
}

@Article{Sairamesh:2002:PBB,
  author =       "J. Sairamesh and R. Mohan and M. Kumar and L. Hasson
                 and C. Bender",
  title =        "A platform for business-to-business sell-side, private
                 exchanges and marketplaces",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "2",
  pages =        "242--252",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 27 11:36:56 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/412/sairamesh.html;
                 http://www.research.ibm.com/journal/sj/412/sairamesh.pdf;
                 http://www.research.ibm.com/journal/sj/412/sairamesh.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0145",
}

@Article{Kumaran:2002:FBA,
  author =       "S. Kumaran and Y. Huang and J.-Y. Chung",
  title =        "A framework-based approach to building private trading
                 exchanges",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "2",
  pages =        "253--271",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 27 11:36:56 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/412/kumaran.html;
                 http://www.research.ibm.com/journal/sj/412/kumaran.pdf;
                 http://www.research.ibm.com/journal/sj/412/kumaran.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0145",
}

@Article{Dias:2002:CII,
  author =       "D. M. Dias and S. L. Palmer and J. T. Rayfield and H.
                 H. Shaikh and T. K. Sreeram",
  title =        "{E}-commerce interoperability with {IBM}'s {WebSphere
                 Commerce} products",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "2",
  pages =        "272--286",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 27 11:36:56 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/412/dias.html;
                 http://www.research.ibm.com/journal/sj/412/dias.pdf;
                 http://www.research.ibm.com/journal/sj/412/dias.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0145",
}

@Article{Bichler:2002:AFP,
  author =       "M. Bichler and J. Kalagnanam and K. Katircioglu and A.
                 J. King and R. D. Lawrence and H. S. Lee and G. Y. Lin
                 and Y. Lu",
  title =        "Applications of flexible pricing in
                 business-to-business electronic commerce",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "2",
  pages =        "287--302",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 27 11:36:56 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/412/bichler.html;
                 http://www.research.ibm.com/journal/sj/412/bichler.pdf;
                 http://www.research.ibm.com/journal/sj/412/bichler.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0145",
}

@Article{Goodwin:2002:ILA,
  author =       "R. Goodwin and S. F. Goh and F. Y. Wu",
  title =        "Instance-level access control for business-to-business
                 electronic commerce",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "2",
  pages =        "303--317",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Mar 27 11:36:56 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/412/goodwin.html;
                 http://www.research.ibm.com/journal/sj/412/goodwin.pdf;
                 http://www.research.ibm.com/journal/sj/412/goodwin.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0145",
}

@Article{Spector:2002:MVP,
  author =       "Alfred Spector",
  title =        "Message from the {Vice President, Services and
                 Software, Research Division}",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "3",
  pages =        "??--??",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Sep 21 08:49:00 MDT 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/413/message.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0146",
}

@Article{Hong:2002:P,
  author =       "Se June Hong and John J. Ritsko and Alex Birman",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "3",
  pages =        "328--330",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Sep 21 08:49:00 MDT 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/413/preface.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0146",
}

@Article{Sowa:2002:AIS,
  author =       "J. F. Sowa",
  title =        "Architectures for intelligent systems",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "3",
  pages =        "331--349",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Sep 21 08:49:00 MDT 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/413/bigus.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0146",
}

@Article{Bigus:2002:ATB,
  author =       "J. P. Bigus and D. A. Schlosnagle and J. R. Pilgrim
                 and W. N. {Mills III} and Y. Diao",
  title =        "{ABLE}: a toolkit for building multiagent autonomic
                 systems",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "3",
  pages =        "350--371",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Sep 21 08:49:00 MDT 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/413/bigus.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0146",
}

@Article{Brodie:2002:IPC,
  author =       "M. Brodie and I. Rish and S. Ma",
  title =        "Intelligent probing: a cost-effective approach to
                 fault diagnosis in computer networks",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "3",
  pages =        "372--385",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Sep 21 08:49:00 MDT 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/413/brodie.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0146",
}

@Article{Bin:2002:UCS,
  author =       "E. Bin and R. Emek and G. Shurek and A. Ziv",
  title =        "Using a constraint satisfaction formulation and
                 solution techniques for random test program
                 generation",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "3",
  pages =        "386--402",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Sep 21 08:49:00 MDT 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/413/bin.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0146",
}

@Article{Diao:2002:UFC,
  author =       "Y. Diao and J. L. Hellerstein and S. Parekh",
  title =        "Using fuzzy control to maximize profits in service
                 level management",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "3",
  pages =        "403--420",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Sep 21 08:49:00 MDT 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/413/diao.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0146",
}

@Article{Weiss:2002:AGM,
  author =       "S. M. Weiss and C. V. Apte",
  title =        "Automated generation of model cases for help-desk
                 applications",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "3",
  pages =        "421--427",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Sep 21 08:49:00 MDT 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/413/weiss.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0146",
}

@Article{Johnson:2002:DTB,
  author =       "D. E. Johnson and F. J. Oles and T. Zhang and T.
                 Goetz",
  title =        "A decision-tree-based symbolic rule induction system
                 for text categorization",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "3",
  pages =        "428--437",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Sep 21 08:49:00 MDT 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/413/johnson.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0146",
}

@Article{Apte:2002:PEF,
  author =       "C. V. Apte and R. Natarajan and E. P. D. Pednault and
                 F. Tipu",
  title =        "A probabilistic estimation framework for predictive
                 modeling analytics",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "3",
  pages =        "438--448",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Sep 21 08:49:00 MDT 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/413/apte.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0146",
}

@Article{Oblinger:2002:CTA,
  author =       "D. A. Oblinger and M. Reid and M. Brodie and R. de
                 Salvo Braz",
  title =        "Cross training and its application to skill mining",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "3",
  pages =        "449--460",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Sep 21 08:49:00 MDT 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/413/oblinger.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0146",
}

@Article{Vilalta:2002:PAM,
  author =       "R. Vilalta and C. V. Apte and J. L. Hellerstein and S.
                 Ma and S. M. Weiss",
  title =        "Predictive algorithms in the management of computer
                 systems",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "3",
  pages =        "461--474",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Sep 21 08:49:00 MDT 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/413/vilalta.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0146",
}

@Article{Hellerstein:2002:DAP,
  author =       "J. L. Hellerstein and S. Ma and C.-S. Perng",
  title =        "Discovering actionable patterns in event data",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "3",
  pages =        "475--493",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Sep 21 08:49:00 MDT 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/413/hellerstein.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0146",
}

@Article{Perrone:2002:MLM,
  author =       "M. P. Perrone and G. F. Russell and A. Ziq",
  title =        "Machine learning in a multimedia document retrieval
                 framework",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "3",
  pages =        "494--503",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Sep 21 08:49:00 MDT 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/413/perrone.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0146",
}

@Article{Zhou:2002:AML,
  author =       "M. X. Zhou and S. Ma and Y. Feng",
  title =        "Applying machine learning to automated information
                 graphics generation",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "3",
  pages =        "504--523",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Sep 21 08:49:00 MDT 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/413/zhou.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0146",
}

@Article{Brackenbury:2002:MIT,
  author =       "I. Brackenbury and Y. Ravin",
  title =        "Machine intelligence and the {Turing Test}",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "3",
  pages =        "524--529",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Sep 21 08:49:00 MDT 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/413/forum.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0146",
}

@Article{McCarthy:2002:ADC,
  author =       "J. McCarthy and M. Minsky and A. Sloman and L. Gong
                 and T. Lau and L. Morgenstern and E. T. Mueller and D.
                 Riecken and M. Singh and P. Singh",
  title =        "An architecture of diversity for commonsense
                 reasoning",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "3",
  pages =        "530--539",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Sep 21 08:49:00 MDT 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/413/forum.html#part2",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0146",
}

@Article{Anonymous:2002:BAB,
  author =       "Anonymous",
  title =        "Books: {{\em Arguing A.I.: The Battle for Twenty-First
                 Century Science}, Sam Williams, Random House, New York,
                 2002. 128 pp. (ISBN 0-8129-91180-X)}",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "3",
  pages =        "540--541",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Sep 21 08:49:00 MDT 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/413/books.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0146",
}

@Article{Perna:2002:MGM,
  author =       "Janet Perna",
  title =        "Message from the General Manager, Data Management
                 Solutions, {IBM} Software Group",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "4",
  pages =        "??--??",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Nov 5 09:51:21 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/414/message.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0147",
}

@Article{Ritsko:2002:Pc,
  author =       "John J. Ritsko and Marilyn Bates",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "4",
  pages =        "553--554",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Nov 5 09:51:21 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/414/preface.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0147",
}

@Article{Mattos:2002:IIR,
  author =       "A. D. Jhingran and N. Mattos and H. Pirahesh",
  title =        "Information integration: a research agenda",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "4",
  pages =        "555--562",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Nov 5 09:51:21 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/414/preface.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0147",
}

@Article{Roth:2002:IIN,
  author =       "M. A. Roth and D. C. Wolfson and J. C. Kleewein and C.
                 J. Nelin",
  title =        "Information integration: a new generation of
                 information technology",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "4",
  pages =        "563--577",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Nov 5 09:51:21 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/414/roth.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0147",
}

@Article{Haas:2002:DIT,
  author =       "L. M. Haas and E. T. Lin and M. A. Roth",
  title =        "Data integration through database federation",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "4",
  pages =        "578--596",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Nov 5 09:51:21 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/414/haas.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0147",
}

@Article{Chamberlin:2002:XXQ,
  author =       "D. Chamberlin",
  title =        "{XQuery}: An {XML} query language",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "4",
  pages =        "597--615",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Nov 5 09:51:21 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/414/chamberlin.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0147",
}

@Article{Funderburk:2002:XBR,
  author =       "J. E. Funderburk and G. Kiernan and J.
                 Shanmugasundaram and E. Shekita and C. Wei",
  title =        "{XTABLES}: Bridging relational technology and {XML}",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "4",
  pages =        "616--641",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Nov 5 09:51:21 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/414/funderburk.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0147",
}

@Article{Funderburk:2002:XPS,
  author =       "J. E. Funderburk and S. Malaika and B. Reinwald",
  title =        "{XML} programming with {SQL\slash XML} and {XQuery}",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "4",
  pages =        "642--665",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Nov 5 09:51:21 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/414/reinwald.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0147",
}

@Article{Malaika:2002:DWS,
  author =       "S. Malaika and C. J. Nelin and R. Qu and B. Reinwald
                 and D. C. Wolfson",
  title =        "{DB2} and {Web} services",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "4",
  pages =        "666--685",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Nov 5 09:51:21 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/414/malaika.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0147",
}

@Article{Somani:2002:BTC,
  author =       "A. Somani and D. Choy and J. Kleewein",
  title =        "Bringing together content and data management systems:
                 Challenges and opportunities",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "4",
  pages =        "686--696",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Nov 5 09:51:21 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/414/somani.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0147",
}

@Article{Cody:2002:IBI,
  author =       "W. F. Cody and J. T. Kreulen and V. Krishna and W. S.
                 Spangler",
  title =        "The integration of business intelligence and knowledge
                 management",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "4",
  pages =        "697--713",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Nov 5 09:51:21 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/414/cody.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0147",
}

@Article{Colossi:2002:REO,
  author =       "N. Colossi and W. Malloy and B. Reinwald",
  title =        "Relational extensions for {OLAP}",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "4",
  pages =        "714--731",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Nov 5 09:51:21 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0147",
}

@Article{Leymann:2002:UFI,
  author =       "F. Leymann and D. Roller",
  title =        "Using flows in information integration",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "4",
  pages =        "732--742",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Nov 5 09:51:21 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/414/leymann.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0147",
}

@Article{Chessell:2002:ECT,
  author =       "M. Chessell and C. Griffin and D. Vines and M. Butler
                 and C. Ferreira and P. Henderson",
  title =        "Extending the concept of transaction compensation",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "4",
  pages =        "743--758",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Nov 5 09:51:21 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/414/chessell.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0147",
}

@Article{Fahlman:2002:TFS,
  author =       "S. E. Fahlman",
  title =        "Technical forum: Selling interrupt rights: a way to
                 control unwanted e-mail and telephone calls",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "4",
  pages =        "759--766",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Nov 5 09:51:21 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/414/chessell.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0147",
}

@Article{Anonymous:2002:CV,
  author =       "Anonymous",
  title =        "Contents of Volume 41, 2002",
  journal =      j-IBM-SYS-J,
  volume =       "41",
  number =       "4",
  pages =        "767--768",
  month =        "????",
  year =         "2002",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Nov 5 09:51:21 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/414/chessell.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0147",
}

@Article{Herger:2003:P,
  author =       "Lorraine Herger and Kazuo Iwano and Pratap Pattnaik
                 and John J. Ritsko and Alfred G. Davis",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "1",
  pages =        "3--4",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:14 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/421/preface.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0148",
}

@Article{Ganek:2003:DAC,
  author =       "A. G. Ganek and T. A. Corbi",
  title =        "The dawning of the autonomic computing era",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "1",
  pages =        "5--18",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:14 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/421/verma.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0148",
}

@Article{Verma:2003:SSR,
  author =       "D. C. Verma and S. Sahu and S. Calo and A. Shaikh and
                 I. Chang and A. Acharya",
  title =        "{SRIRAM}: a scalable resilient autonomic mesh",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "1",
  pages =        "19--28",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:14 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/421/verma.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0148",
}

@Article{Jann:2003:DRB,
  author =       "J. Jann and L. M. Browning and R. S. Burugula",
  title =        "Dynamic reconfiguration: Basic building blocks for
                 autonomic computing on {IBM pSeries} servers",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "1",
  pages =        "29--37",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:14 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/421/jann.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0148",
}

@Article{Norman:2003:AMD,
  author =       "D. A. Norman and A. Ortony and D. M. Russell",
  title =        "Affect and machine design: Lessons for the development
                 of autonomous machines",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "1",
  pages =        "38--44",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:14 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/421/norman.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0148",
}

@Article{Whisnant:2003:SMD,
  author =       "K. Whisnant and Z. T. Kalbarczyk and R. K. Iyer",
  title =        "A system model for dynamically reconfigurable
                 software",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "1",
  pages =        "45--59",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:14 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/421/whisnant.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0148",
}

@Article{Appavoo:2003:EAB,
  author =       "J. Appavoo and K. Hui and C. A. N. Soules and R. W.
                 Wisniewski and D. M. Da Silva and O. Krieger and M. A.
                 Auslander and D. J. Edelsohn and B. Gamsa and G. R.
                 Ganger and P. McKenney and M. Ostrowski and B.
                 Rosenburg and M. Stumm and J. Xenidis",
  title =        "Enabling autonomic behavior in systems software with
                 hot swapping",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "1",
  pages =        "60--76",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:14 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/421/appavoo.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0148",
}

@Article{Russell:2003:CNM,
  author =       "L. W. Russell and S. P. Morgan and E. G. Chron",
  title =        "Clockwork: a new movement in autonomic systems",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "1",
  pages =        "77--84",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:14 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/421/russell.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0148",
}

@Article{Yellin:2003:CAD,
  author =       "D. M. Yellin",
  title =        "Competitive algorithms for the dynamic selection of
                 component implementations",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "1",
  pages =        "85--97",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:14 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/421/yellin.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0148",
}

@Article{Markl:2003:LAQ,
  author =       "V. Markl and G. M. Lohman and V. Raman",
  title =        "{LEO}: An autonomic query optimizer for {DB2}",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "1",
  pages =        "98--106",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:14 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/421/markl.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0148",
}

@Article{Chess:2003:SAC,
  author =       "D. M. Chess and C. C. Palmer and S. R. White",
  title =        "Security in an autonomic computing environment",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "1",
  pages =        "107--118",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:14 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/421/chess.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0148",
}

@Article{Lanfranchi:2003:TNL,
  author =       "G. Lanfranchi and P. Della Peruta and A. Perrone and
                 D. Calvanese",
  title =        "Toward a new landscape of systems management in an
                 autonomic computing environment",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "1",
  pages =        "119--128",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:14 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/421/lanfranchi.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0148",
}

@Article{Want:2003:CAP,
  author =       "R. Want and T. Pering and D. Tennenhouse",
  title =        "Comparing autonomic and proactive computing",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "1",
  pages =        "129--135",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:14 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/421/want.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0148",
}

@Article{Diao:2003:MWS,
  author =       "Y. Diao and J. L. Hellerstein and S. Parekh and J. P.
                 Bigus",
  title =        "Managing {Web} server performance with {AutoTune}
                 agents",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "1",
  pages =        "136--149",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:14 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/421/diao.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0148",
}

@Article{Haas:2003:ASD,
  author =       "R. Haas and P. Droz and B. Stiller",
  title =        "Autonomic service deployment in networks",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "1",
  pages =        "150--164",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:14 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/421/haas.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0148",
}

@Article{Bantz:2003:APC,
  author =       "D. F. Bantz and C. Bisdikian and D. Challener and J.
                 P. Karidis and S. Mastrianni and A. Mohindra and D. G.
                 Shea and M. Vanover",
  title =        "Autonomic personal computing",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "1",
  pages =        "165--176",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:14 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/421/bantz.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0148",
}

@Article{Russell:2003:DGM,
  author =       "D. M. Russell and P. P. Maglio and R. Dordick and C.
                 Neti",
  title =        "Dealing with ghosts: Managing the user experience of
                 autonomic computing",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "1",
  pages =        "177--195",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:14 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/421/maglio.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0148",
}

@Article{Denneau:2003:B,
  author =       "Monty M. Denneau",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "1",
  pages =        "196--197",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:14 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/421/books.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0148",
}

@Article{Birman:2003:P,
  author =       "Alex Birman and John J. Ritsko",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "2",
  pages =        "203--204",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:15 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/422/preface.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321=0149",
}

@Article{Morris:2003:ESS,
  author =       "R. J. T. Morris and B. J. Truskowski",
  title =        "The evolution of storage systems",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "2",
  pages =        "205--217",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:15 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/422/preface.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321=0149",
}

@Article{Sarkar:2003:IPS,
  author =       "P. Sarkar and K. Voruganti and K. Meth and O. Biran
                 and J. Satran",
  title =        "{Internet Protocol} storage area networks",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "2",
  pages =        "218--231",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:15 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/422/sarkar.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321=0149",
}

@Article{Glider:2003:SAS,
  author =       "J. S. Glider and C. F. Fuente and W. J. Scales",
  title =        "The software architecture of a {SAN} storage control
                 system",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "2",
  pages =        "232--249",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:15 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/422/glider.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321=0149",
}

@Article{Menon:2003:IST,
  author =       "J. Menon and D. A. Pease and R. Rees and L. Duyanovich
                 and B. Hillsberg",
  title =        "{IBM Storage Tank} --- {A} heterogeneous scalable
                 {SAN} file system",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "2",
  pages =        "250--267",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:15 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/422/menon.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321=0149",
}

@Article{Azagury:2003:AFS,
  author =       "A. C. Azagury and M. E. Factor and W. F. Micka",
  title =        "Advanced functions for storage subsystems: Supporting
                 continuous availability",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "2",
  pages =        "268--279",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:15 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/422/azagury.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321=0149",
}

@Article{Meritt:2003:ZSI,
  author =       "A. S. Meritt and J. A. Staubi and K. M. Trowell and G.
                 Whistance and H. M. Yudenfriend",
  title =        "{z/OS} support of the {IBM TotalStorage Enterprise
                 Storage Server}",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "2",
  pages =        "280--301",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:15 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/422/meritt.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321=0149",
}

@Article{Ashton:2003:TDP,
  author =       "L. L. Ashton and E. A. Baker and A. J. Bariska and E.
                 M. Dawson and R. L. Ferziger and S. M. Kissinger and T.
                 A. Menendez and S. Shyam and J. P. Strickland and D. K.
                 Thompson and G. R. Wilcock and M. W. Wood",
  title =        "Two decades of policy-based storage management for the
                 {IBM} mainframe computer",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "2",
  pages =        "302--321",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:15 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/422/ashton.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321=0149",
}

@Article{Kaczmarski:2003:BBT,
  author =       "M. Kaczmarski and T. Jiang and D. A. Pease",
  title =        "Beyond backup toward storage management",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "2",
  pages =        "322--337",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:15 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/422/kaczmarski.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321=0149",
}

@Article{Grochowski:2003:TIM,
  author =       "E. Grochowski and R. D. Halem",
  title =        "Technological impact of magnetic hard disk drives on
                 storage systems",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "2",
  pages =        "338--346",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:15 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/422/grochowski.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321=0149",
}

@Article{Hsu:2003:CTP,
  author =       "W. W. Hsu and A. J. Smith",
  title =        "Characteristics of {I/O} traffic in personal computer
                 and server workloads",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "2",
  pages =        "347--372",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:15 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/422/hsu.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321=0149",
}

@Article{Dillon:2003:TNI,
  author =       "M. R. Dillon and P. M. Collins and P. R. Hurley and J.
                 E. Handlin and S. A. Reed",
  title =        "Technical note --- The {IBM TotalStorage Enterprise
                 Storage Server}: {Testing} for general availability and
                 beyond",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "2",
  pages =        "373--382",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:15 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/422/dillon.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321=0149",
}

@Article{Hartung:2003:ITE,
  author =       "M. Hartung",
  title =        "{IBM TotalStorage Enterprise Storage Server}: a
                 designer's view",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "2",
  pages =        "383--396",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:15 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/422/hartung.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321=0149",
}

@Article{Hedger:2003:B,
  author =       "Richard J. Hedger",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "2",
  pages =        "397--399",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Jun 28 15:16:15 MDT 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/422/books.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321=0149",
}

@Article{Kennelly:2003:MVP,
  author =       "Peggy Kennelly",
  title =        "Message from the {Vice President, On Demand Innovation
                 Services, Research Division}",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "3",
  pages =        "??--??",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:01 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/423/message.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0150",
}

@Article{Ritsko:2003:P,
  author =       "John J. Ritsko and Alfred G. Davis",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "3",
  pages =        "403--404",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:01 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/423/preface.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0150",
}

@Article{Haeckel:2003:SMF,
  author =       "S. H. Haeckel",
  title =        "A survey of manufacturing flexibility: Implications
                 for e-business flexibility",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "3",
  pages =        "405--413",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:01 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/423/haeckel.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0150",
}

@Article{Shi:2003:SMF,
  author =       "D. Shi and R. L. Daniels",
  title =        "A survey of manufacturing flexibility: Implications
                 for e-business flexibility",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "3",
  pages =        "414--427",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:01 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/423/shi.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0150",
}

@Article{Nigam:2003:BAA,
  author =       "A. Nigam and N. S. Caswell",
  title =        "Business artifacts: An approach to operational
                 specification",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "3",
  pages =        "428--445",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:01 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/423/nigam.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0150",
}

@Article{Singer:2003:CSI,
  author =       "C. A. Singer",
  title =        "Context-specific intellectual capital---The next link
                 in the knowledge chain",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "3",
  pages =        "446--461",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:01 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/423/singer.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0150",
}

@Article{Kurtz:2003:NDS,
  author =       "C. F. Kurtz and D. J. Snowden",
  title =        "The new dynamics of strategy: Sense-making in a
                 complex and complicated world",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "3",
  pages =        "462--483",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:01 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/423/kurtz.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0150",
}

@Article{Grey:2003:AAQ,
  author =       "W. Grey and K. Katircloglu and S. Bagchi and D. Shi
                 and G. Gallego and D. Seybold and S. Stefanis",
  title =        "An analytical approach for quantifying the value of
                 e-business initiatives",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "3",
  pages =        "484--497",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:01 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/423/grey.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0150",
}

@Article{Keser:2003:EGD,
  author =       "C. Keser",
  title =        "Experimental games for the design of reputation
                 management systems",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "3",
  pages =        "498--506",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:01 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/423/keser.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0150",
}

@Article{Huang:2003:TID,
  author =       "H. Huang and C. Keser and J. Leland and J. Shachat",
  title =        "Trust, the {Internet}, and the digital divide",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "3",
  pages =        "507--518",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:01 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/423/huang.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0150",
}

@Article{Schirmer:2003:PKM,
  author =       "A. L. Schirmer",
  title =        "Privacy and knowledge management: Challenges in the
                 design of the {Lotus Discovery Server}",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "3",
  pages =        "519--531",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:01 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/423/schirmer.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0150",
}

@Article{Mes:2003:TNW,
  author =       "A. de Mes and E. Rongen",
  title =        "Technical note---{Web Service Credentials}",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "3",
  pages =        "532--537",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:01 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/423/demes.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0150",
}

@Article{Funderburk:2003:TNX,
  author =       "J. E. Funderburk and G. Kiernan and J.
                 Shanmugasundaram and E. Shekita and C. Wei",
  title =        "Technical Note---{XTABLES}: Bridging relational
                 technology and {XML}",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "3",
  pages =        "538--541",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:01 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/423/funderburk.pdf",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0150",
}

@Article{Donofrio:2003:MSV,
  author =       "Nicholas M. Donofrio",
  title =        "Message from the {Senior Vice President, Technology
                 and Manufacturing}",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "4",
  pages =        "??--??",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:02 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/424/message.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Vredenburg:2003:P,
  author =       "Karel Vredenburg and John J. Ritsko and David I.
                 Seidman",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "4",
  pages =        "515--516",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:02 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/424/preface.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Vredenburg:2003:BEU,
  author =       "Karel Vredenburg",
  title =        "Building ease of use into the {IBM} user experience",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "4",
  pages =        "517--531",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:02 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/424/preface.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Karat:2003:EUC,
  author =       "J. Karat and C. M. Karat",
  title =        "The evolution of user-centered focus in the
                 human-computer interaction field",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "4",
  pages =        "532--541",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:02 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/424/karat.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Berry:2003:DEV,
  author =       "D. Berry and C. Hungate and T. Temple",
  title =        "Delivering expected value to users and stakeholders
                 with {User Engineering}",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "4",
  pages =        "542--567",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:02 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/424/berry.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Telford:2003:UDC,
  author =       "R. Telford and R. Horman and S. Lightstone and N.
                 Markov and S. O'Connell and G. Lohman",
  title =        "Usability and design considerations for an autonomic
                 relational database management system",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "4",
  pages =        "568--581",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:02 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/424/telford.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Krauss:2003:MRU,
  author =       "F. S. H. Krauss",
  title =        "Methodology for remote usability activities: a case
                 study",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "4",
  pages =        "582--593",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:02 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/424/krauss.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Greene:2003:IDF,
  author =       "S. L. Greene and L. Jones and P. Matchen and J. C.
                 Thomas",
  title =        "Iterative development in the field",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "4",
  pages =        "594--612",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:02 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/424/greene.pdf",
  acknowledgement = ack-nhfb,
}

@Article{VanBuskirk:2003:EP,
  author =       "R. {Van Buskirk} and B. W. Moroney",
  title =        "Extending prototyping",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "4",
  pages =        "613--623",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:02 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/424/vanbuskirk.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Lewis:2003:DVS,
  author =       "J. R. Lewis and P. M. Commarford",
  title =        "Developing a voice-spelling alphabet for {PDA}s",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "4",
  pages =        "624--638",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:02 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/424/lewis.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Gorlenko:2003:NWA,
  author =       "L. Gorlenko and R. Merrick",
  title =        "No wires attached: Usability challenges in the
                 connected mobile world",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "4",
  pages =        "639--651",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:02 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/424/gorlenko.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Willuhn:2003:DAS,
  author =       "D. Willuhn and C. Schulz and L. Knoth-Weber and S.
                 Feger and Y. Saillet",
  title =        "Developing accessible software for data
                 visualization",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "4",
  pages =        "652--668",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:02 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/424/willuhn.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Sawin:2003:ATR,
  author =       "D. A. Sawin and J. A. Calcaterra and K. Olka",
  title =        "{Access ThinkPad}: The right information at the right
                 time and place",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "4",
  pages =        "669--685",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:02 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/424/sawin.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Karat:2003:PUE,
  author =       "C. M. Karat and C. Brodie and J. Karat and J. Vergo
                 and S. R. Alpert",
  title =        "Personalizing the user experience on {\tt ibm.com}",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "4",
  pages =        "686--701",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:02 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/424/brodie.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:2003:B,
  author =       "Anonymous",
  title =        "Books",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "4",
  pages =        "702--705",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:02 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/424/books.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:2003:CV,
  author =       "Anonymous",
  title =        "Contents of Volume 42, 2003",
  journal =      j-IBM-SYS-J,
  volume =       "42",
  number =       "4",
  pages =        "706--708",
  month =        "????",
  year =         "2003",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Nov 29 15:40:02 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/424/books.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Ritsko:2004:Pa,
  author =       "John J. Ritsko and Alex Birman",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "1",
  pages =        "3--4",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 9 07:55:31 MST 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/431/preface.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Ross:2004:PUC,
  author =       "J. W. Ross and G. Westerman",
  title =        "Preparing for utility computing: The role of {IT}
                 architecture and relationship management",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "1",
  pages =        "5--19",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 9 07:55:31 MST 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/431/ross.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Paleologo:2004:PRM,
  author =       "G. A. Paleologo",
  title =        "{Price-at-Risk}: a methodology for pricing utility
                 computing services",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "1",
  pages =        "20--31",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 9 07:55:31 MST 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/431/paleologo.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Rappa:2004:UBM,
  author =       "M. A. Rappa",
  title =        "The utility business model and the future of computing
                 services",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "1",
  pages =        "32--42",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 9 07:55:31 MST 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/431/rappa.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Gayek:2004:WCS,
  author =       "P. Gayek and R. Nesbitt and H. Pearthree and A. Shaikh
                 and B. Snitzer",
  title =        "A {Web} content serving utility",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "1",
  pages =        "43--63",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 9 07:55:31 MST 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/431/gayek.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Gruhl:2004:HBW,
  author =       "D. Gruhl and L. Chavet and D. Gibson and J. Meyer and
                 P. Pattanayak and A. Tomkins and J. Zien",
  title =        "How to build a {WebFountain}: {An} architecture for
                 very large-scale text analytics",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "1",
  pages =        "64--77",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 9 07:55:31 MST 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/431/gruhl.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Naik:2004:ACS,
  author =       "V. K. Naik and A. Mohindra and D. F. Bantz",
  title =        "An architecture for the coordination of system
                 management services",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "1",
  pages =        "78--96",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 9 07:55:31 MST 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/431/naik.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Eilam:2004:UUC,
  author =       "T. Eilam and K. Appleby and J. Breh and G. Breiter and
                 H. Daur and S. A. Fakhouri and G. D. H. Hunt and T. Lu
                 and S. D. Miller and L. B. Mummert and J. A. Pershing
                 and H. Wagner",
  title =        "Using a utility computing framework to develop utility
                 systems",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "1",
  pages =        "97--120",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 9 07:55:31 MST 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/431/eilam.html",
  acknowledgement = ack-nhfb,
}

@Article{Appleby:2004:PBA,
  author =       "K. C. Appleby and S. B. Calo and J. R. Giles and K.-W.
                 Lee",
  title =        "Policy-based automated provisioning",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "1",
  pages =        "121--135",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 9 07:55:31 MST 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/431/appleby.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Dan:2004:WSD,
  author =       "A. Dan and D. Davis and R. Kearney and A. Keller and
                 R. King and D. Kuebler and H. Ludwig and M. Polan and
                 M. Spreitzer and A. Youssef",
  title =        "{Web} services on demand: {WSLA}-driven automated
                 management",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "1",
  pages =        "136--158",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 9 07:55:31 MST 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/431/dan.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Buco:2004:UCS,
  author =       "M. J. Buco and R. N. Chang and L. Z. Luan and C. Ward
                 and J. L. Wolf and P. S. Yu",
  title =        "Utility computing {SLA} management based upon business
                 objectives",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "1",
  pages =        "159--178",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 9 07:55:31 MST 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/431/buco.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Albaugh:2004:UMS,
  author =       "V. Albaugh and H. Madduri",
  title =        "The utility metering service of the {Universal
                 Management Infrastructure}",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "1",
  pages =        "179--189",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 9 07:55:31 MST 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/431/albaugh.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Chang:2004:DEP,
  author =       "K. Chang and A. Dasari and H. Madduri and A. Mendoza
                 and J. Mims",
  title =        "Design of an enablement process for on demand
                 applications",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "1",
  pages =        "190--203",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 9 07:55:31 MST 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/431/chang.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Ritsko:2004:Pb,
  author =       "John J. Ritsko and David I. Seidman",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "2",
  pages =        "211--212",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:41 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/432/preface.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0153",
}

@Article{Herness:2004:WAS,
  author =       "E. N. Herness and R. J. High and J. R. McGee",
  title =        "{WebSphere} Application Server: a foundation for on
                 demand computing",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "2",
  pages =        "213--237",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:41 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/432/herness.html;
                 http://www.research.ibm.com/journal/sj/432/herness.pdf;
                 http://www.research.ibm.com/journal/sj/432/herness.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0153",
}

@Article{Bhaskaran:2004:WBI,
  author =       "K. Bhaskaran and M.-T. Schmidt",
  title =        "{WebSphere} Business Integration: An architectural
                 overview",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "2",
  pages =        "238--253",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:41 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/432/bhaskaran.html;
                 http://www.research.ibm.com/journal/sj/432/bhaskaran.pdf;
                 http://www.research.ibm.com/journal/sj/432/bhaskaran.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0153",
}

@Article{Saracco:2004:EDE,
  author =       "C. M. Saracco and M. A. Roth and D. C. Wolfson",
  title =        "Enabling distributed enterprise integration with
                 {WebSphere} and {DB2 Information Integrator}",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "2",
  pages =        "255--269",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:41 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/432/saracco.html;
                 http://www.research.ibm.com/journal/sj/432/saracco.pdf;
                 http://www.research.ibm.com/journal/sj/432/saracco.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0153",
}

@Article{Kloppmann:2004:BPC,
  author =       "M. Kloppmann and D. K{\"o}nig and F. Leymann and G.
                 Pfau and D. Roller",
  title =        "Business process choreography in {WebSphere}:
                 Combining the power of {BPEL} and {J2EE}",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "2",
  pages =        "270--296",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:41 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/432/kloppmann.html;
                 http://www.research.ibm.com/journal/sj/432/kloppmann.pdf;
                 http://www.research.ibm.com/journal/sj/432/kloppmann.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0153",
}

@Article{Ponzo:2004:DWC,
  author =       "J. Ponzo and L. D. Hasson and J. George and G. Thomas
                 and O. Gruber and R. Konuru and A. Purakayastha and R.
                 D. Johnson and J. Colson and R. A. Pollak",
  title =        "On demand {Web}-client technologies",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "2",
  pages =        "297--315",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:41 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/432/ponzo.html;
                 http://www.research.ibm.com/journal/sj/432/ponzo.pdf;
                 http://www.research.ibm.com/journal/sj/432/ponzo.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0153",
}

@Article{Fontes:2004:WCA,
  author =       "S. M. Fontes and C. J. Nordstrom and K. W. Sutter",
  title =        "{WebSphere} connector architecture evolution",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "2",
  pages =        "316--326",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:41 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/432/fontes.html;
                 http://www.research.ibm.com/journal/sj/432/fontes.pdf;
                 http://www.research.ibm.com/journal/sj/432/fontes.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0153",
}

@Article{Willenborg:2004:DWA,
  author =       "R. Willenborg and K. Brown and G. Cuomo",
  title =        "Designing {WebSphere Application Server} for
                 performance: An evolutionary approach",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "2",
  pages =        "327--340",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:41 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/432/willenborg.html;
                 http://www.research.ibm.com/journal/sj/432/willenborg.pdf;
                 http://www.research.ibm.com/journal/sj/432/willenborg.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0153",
}

@Article{Bakalova:2004:WDC,
  author =       "R. Bakalova and A. Chow and C. Fricano and P. Jain and
                 N. Kodali and D. Poirier and S. Sankaran and D. Shupp",
  title =        "{WebSphere Dynamic Cache}: Improving {J2EE}
                 application performance",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "2",
  pages =        "351--370",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:41 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/432/bakalova.html;
                 http://www.research.ibm.com/journal/sj/432/bakalova.pdf;
                 http://www.research.ibm.com/journal/sj/432/bakalova.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0153",
}

@Article{desRivieres:2004:EPI,
  author =       "J. des Rivi{\^e}res and J. Wiegand",
  title =        "{Eclipse}: a platform for integrating development
                 tools",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "2",
  pages =        "371--383",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:41 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/432/desrivieres.html;
                 http://www.research.ibm.com/journal/sj/432/desrivieres.pdf;
                 http://www.research.ibm.com/journal/sj/432/desrivieres.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0153",
}

@Article{Budinsky:2004:WSO,
  author =       "F. Budinsky and G. DeCandio and R. Earle and T.
                 Francis and J. Jones and J. Li and M. Nally and C.
                 Nelin and V. Popescu and S. Rich and A. Ryman and T.
                 Wilson",
  title =        "{WebSphere Studio} overview",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "2",
  pages =        "384--419",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:41 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/432/budinsky.html;
                 http://www.research.ibm.com/journal/sj/432/budinsky.pdf;
                 http://www.research.ibm.com/journal/sj/432/budinsky.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0153",
}

@Article{Will:2004:WPU,
  author =       "R. Will and S. Ramaswamy and T. Schaeck",
  title =        "{WebSphere Portal}: Unified user access to content,
                 applications, and services",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "2",
  pages =        "420--429",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:41 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/432/will.html;
                 http://www.research.ibm.com/journal/sj/432/will.pdf;
                 http://www.research.ibm.com/journal/sj/432/will.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0153",
}

@Article{Johnson:2004:IDT,
  author =       "R. D. Johnson and D. Reimer",
  title =        "Issues in the development of transactional {Web}
                 applications",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "2",
  pages =        "430--440",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:41 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/432/johnson.html;
                 http://www.research.ibm.com/journal/sj/432/johnson.pdf;
                 http://www.research.ibm.com/journal/sj/432/johnson.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0153",
}

@Article{Anonymous:2004:E,
  author =       "Anonymous",
  title =        "Errata",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "2",
  pages =        "441--441",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:41 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/432/errata.html;
                 http://www.research.ibm.com/journal/sj/432/errata.pdf;
                 http://www.research.ibm.com/journal/sj/432/errata.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0153",
}

@Article{Spector:2004:I,
  author =       "Alfred Spector and John Swainson and Danny Sabbah",
  title =        "Introduction",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "2",
  pages =        "??--??",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:41 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/432/intro.html;
                 http://www.research.ibm.com/journal/sj/432/intro.pdf;
                 http://www.research.ibm.com/journal/sj/432/intro.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0153",
}

@Article{Ritsko:2004:Pc,
  author =       "John J. Ritsko and David I. Seidman",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "3",
  pages =        "449--450",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/433/preface.html;
                 http://www.research.ibm.com/journal/sj/433/preface.pdf;
                 http://www.research.ibm.com/journal/sj/433/preface.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0154",
}

@Article{Broder:2004:TNG,
  author =       "A. Z. Broder and A. C. Ciccolo",
  title =        "Towards the next generation of enterprise search
                 technology",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "3",
  pages =        "451--454",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/433/broder.html;
                 http://www.research.ibm.com/journal/sj/433/broder.pdf;
                 http://www.research.ibm.com/journal/sj/433/broder.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0154",
}

@Article{Ferrucci:2004:BEA,
  author =       "D. Ferrucci and A. Lally",
  title =        "Building an example application with the {Unstructured
                 Information Management Architecture}",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "3",
  pages =        "455--475",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/433/ferrucci.html;
                 http://www.research.ibm.com/journal/sj/433/ferrucci.pdf;
                 http://www.research.ibm.com/journal/sj/433/ferrucci.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0154",
}

@Article{Gotz:2004:DIU,
  author =       "T. G{\"o}tz and O. Suhre",
  title =        "Design and implementation of the {UIMA Common Analysis
                 System}",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "3",
  pages =        "476--489",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/433/gotz.html;
                 http://www.research.ibm.com/journal/sj/433/gotz.pdf;
                 http://www.research.ibm.com/journal/sj/433/gotz.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0154",
}

@Article{Mack:2004:TAL,
  author =       "R. Mack and S. Mukherjea and A. Soffer and N. Uramoto
                 and E. Brown and A. Coden and J. Cooper and A. Inokuchi
                 and B. Iyer and Y. Mass and H. Matsuzawa and L. V.
                 Subramaniam",
  title =        "Text analytics for life science using the
                 {Unstructured Information Management Architecture}",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "3",
  pages =        "490--515",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/433/mack.html;
                 http://www.research.ibm.com/journal/sj/433/mack.pdf;
                 http://www.research.ibm.com/journal/sj/433/mack.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0154",
}

@Article{Uramoto:2004:TMS,
  author =       "N. Uramoto and H. Matsuzawa and T. Nagano and A.
                 Murakami and H. Takeuchi and K. Takeda",
  title =        "A text-mining system for knowledge discovery from
                 biomedical documents",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "3",
  pages =        "516--533",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/433/uramoto.html;
                 http://www.research.ibm.com/journal/sj/433/uramoto.pdf;
                 http://www.research.ibm.com/journal/sj/433/uramoto.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0154",
}

@Article{Su:2004:MIP,
  author =       "Z. Su and J. Jiang and T. Liu and G. T. Xie and Y.
                 Pan",
  title =        "{Market Intelligence Portal}: An entity-based system
                 for managing market intelligence",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "3",
  pages =        "534--545",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/433/su.html;
                 http://www.research.ibm.com/journal/sj/433/su.pdf;
                 http://www.research.ibm.com/journal/sj/433/su.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0154",
}

@Article{Kozakov:2004:GEU,
  author =       "L. Kozakov and Y. Park and T. Fin and Y. Drissi and Y.
                 Doganata and T. Cofino",
  title =        "Glossary extraction and utilization in the information
                 search and delivery system for {IBM Technical
                 Support}",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "3",
  pages =        "546--563",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/433/kozakov.html;
                 http://www.research.ibm.com/journal/sj/433/kozakov.pdf;
                 http://www.research.ibm.com/journal/sj/433/kozakov.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0154",
}

@Article{Wolf:2004:STS,
  author =       "C. G. Wolf and S. R. Alpert and J. G. Vergo and L.
                 Kozakov and Y. Doganata",
  title =        "Summarizing technical support documents for search:
                 Expert and user studies",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "3",
  pages =        "564--586",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/433/wolf.html;
                 http://www.research.ibm.com/journal/sj/433/wolf.pdf;
                 http://www.research.ibm.com/journal/sj/433/wolf.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0154",
}

@Article{Iyer:2004:FDA,
  author =       "B. Iyer and R. Gottlieb",
  title =        "The {Four-Domain Architecture}: An approach to support
                 enterprise architecture design",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "3",
  pages =        "587--597",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/433/iyer.html;
                 http://www.research.ibm.com/journal/sj/433/iyer.pdf;
                 http://www.research.ibm.com/journal/sj/433/iyer.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0154",
}

@Article{Stojanovic:2004:ROA,
  author =       "L. Stojanovic and J. Schneider and A. Maedche and S.
                 Libischer and R. Studer and Th. Lumpp and A. Abecker
                 and G. Breiter and J. Dinger",
  title =        "The role of ontologies in autonomic computing
                 systems",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "3",
  pages =        "598--616",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/433/stojanovic.html;
                 http://www.research.ibm.com/journal/sj/433/stojanovic.pdf;
                 http://www.research.ibm.com/journal/sj/433/stojanovic.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0154",
}

@Article{Perna:2004:I,
  author =       "Janet Perna and Alfred Spector",
  title =        "Introduction",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "3",
  pages =        "??--??",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/433/intro.html;
                 http://www.research.ibm.com/journal/sj/433/intro.pdf;
                 http://www.research.ibm.com/journal/sj/433/intro.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0154",
}

@Article{Ritsko:2004:Pd,
  author =       "John J. Ritsko and Alex Birman",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "4",
  pages =        "622--623",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/434/preface.html;
                 http://www.research.ibm.com/journal/sj/434/preface.pdf;
                 http://www.research.ibm.com/journal/sj/434/preface.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0155",
}

@Article{Joseph:2004:EGC,
  author =       "J. Joseph and M. Ernest and C. Fellenstein",
  title =        "Evolution of grid computing architecture and grid
                 adoption models",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "4",
  pages =        "624--645",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/434/joseph.html;
                 http://www.research.ibm.com/journal/sj/434/joseph.pdf;
                 http://www.research.ibm.com/journal/sj/434/joseph.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0155",
}

@Article{Meliksetian:2004:DIE,
  author =       "D. S. Meliksetian and J.-P. Prost and A. S. Bahl and
                 I. Boutboul and D. P. Currier and S. Fibra and J.-Y.
                 Girard and K. M. Kassab and J.-L. Lepesant and C.
                 Malone and P. Manesco",
  title =        "Design and implementation of an enterprise grid",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "4",
  pages =        "646--664",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/434/meliksetian.html;
                 http://www.research.ibm.com/journal/sj/434/meliksetian.pdf;
                 http://www.research.ibm.com/journal/sj/434/meliksetian.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0155",
}

@Article{Bourbonnais:2004:TII,
  author =       "S. Bourbonnais and V. M. Gogate and L. M. Haas and R.
                 W. Horman and S. Malaika and I. Narang and V. Raman",
  title =        "Towards an information infrastructure for the grid",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "4",
  pages =        "665--688",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/434/bourbonnais.html;
                 http://www.research.ibm.com/journal/sj/434/bourbonnais.pdf;
                 http://www.research.ibm.com/journal/sj/434/bourbonnais.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0155",
}

@Article{Carpenter:2004:AIS,
  author =       "B. E. Carpenter and P. A. Janson",
  title =        "Abstract interdomain security assertions: a basis
                 for extra-grid virtual organizations",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "4",
  pages =        "689--701",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/434/carpenter.html;
                 http://www.research.ibm.com/journal/sj/434/carpenter.pdf;
                 http://www.research.ibm.com/journal/sj/434/carpenter.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0155",
}

@Article{Anderson:2004:GNF,
  author =       "O. T. Anderson and L. Luan and C. Everhart and M.
                 Pereira and R. Sarkar and J. Xu",
  title =        "Global namespace for files",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "4",
  pages =        "702--722",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/434/anderson.html;
                 http://www.research.ibm.com/journal/sj/434/anderson.pdf;
                 http://www.research.ibm.com/journal/sj/434/anderson.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0155",
}

@Article{Horn:2004:LSB,
  author =       "B. Horn and H. Balakrishnan and B. T. Maniampadavathu
                 and J. Warnes and D. A. Elko",
  title =        "A {Logger System} based on {Web} services",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "4",
  pages =        "723--733",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/434/horn.html;
                 http://www.research.ibm.com/journal/sj/434/horn.pdf;
                 http://www.research.ibm.com/journal/sj/434/horn.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0155",
}

@Article{Tan:2004:SD,
  author =       "Y.-S. Tan and V. Vellanki and J. Xing and B. Topol and
                 G. Dudley",
  title =        "Service domains",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "4",
  pages =        "734--755",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/434/tan.html;
                 http://www.research.ibm.com/journal/sj/434/tan.pdf;
                 http://www.research.ibm.com/journal/sj/434/tan.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0155",
}

@Article{Lewis:2004:MDS,
  author =       "K. N. Lewis and M. D. Robinson and T. R. Hughes and C.
                 W. V. Hogue",
  title =        "{MyMed}: a database system for biomedical research
                 on {MEDLINE} data",
  journal =      j-IBM-SYS-J,
  volume =       "43",
  number =       "4",
  pages =        "756--767",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/434/lewis.html;
                 http://www.research.ibm.com/journal/sj/434/lewis.pdf;
                 http://www.research.ibm.com/journal/sj/434/lewis.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0155",
}

@Article{Ritsko:2005:Pa,
  author =       "John J. Ritsko and David I. Seidman",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "1",
  pages =        "3--4",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/441/preface.html;
                 http://www.research.ibm.com/journal/sj/441/preface.pdf;
                 http://www.research.ibm.com/journal/sj/441/preface.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0156",
}

@Article{Kapoor:2005:TFS,
  author =       "S. Kapoor and K. Bhattacharya and S. Buckley and P.
                 Chowdhary and M. Ettl and K. Katircioglu and E. Mauch
                 and L. Phillips",
  title =        "A technical framework for sense-and-respond business
                 management",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "1",
  pages =        "5--24",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/441/kapoor.html;
                 http://www.research.ibm.com/journal/sj/441/kapoor.pdf;
                 http://www.research.ibm.com/journal/sj/441/kapoor.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0156",
}

@Article{Hess:2005:ATB,
  author =       "H. M. Hess",
  title =        "Aligning technology and business: Applying patterns
                 for legacy transformation",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "1",
  pages =        "25--45",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/441/hess.html;
                 http://www.research.ibm.com/journal/sj/441/hess.pdf;
                 http://www.research.ibm.com/journal/sj/441/hess.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0156",
}

@Article{Koehler:2005:DTM,
  author =       "J. Koehler and R. Hauser and S. Sendall and M.
                 Wahler",
  title =        "Declarative techniques for model-driven business
                 process integration",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "1",
  pages =        "47--65",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/441/koehler.html;
                 http://www.research.ibm.com/journal/sj/441/koehler.pdf;
                 http://www.research.ibm.com/journal/sj/441/koehler.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0156",
}

@Article{Arsanjani:2005:EBA,
  author =       "A. Arsanjani",
  title =        "Empowering the business analyst for on demand
                 computing",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "1",
  pages =        "67--80",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/441/arsanjani.html;
                 http://www.research.ibm.com/journal/sj/441/arsanjani.pdf;
                 http://www.research.ibm.com/journal/sj/441/arsanjani.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0156",
}

@Article{Crawford:2005:TDS,
  author =       "C. H. Crawford and G. P. Bate and L. Cherbakov and K.
                 Holley and C. Tsocanos",
  title =        "Toward an on demand service-oriented architecture",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "1",
  pages =        "81--107",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/441/crawford.html;
                 http://www.research.ibm.com/journal/sj/441/crawford.pdf;
                 http://www.research.ibm.com/journal/sj/441/crawford.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0156",
}

@Article{Grey:2005:RMR,
  author =       "W. Grey and T. Olavson and D. Shi",
  title =        "The role of e-marketplaces in relationship-based
                 supply chains: a survey",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "1",
  pages =        "109--123",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/441/grey.html;
                 http://www.research.ibm.com/journal/sj/441/grey.pdf;
                 http://www.research.ibm.com/journal/sj/441/grey.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0156",
}

@Article{Martin:2005:ILM,
  author =       "K. Martin and M. A. Quigley and S. Rogers",
  title =        "Implementing a learning management system globally: An
                 innovative change management approach",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "1",
  pages =        "125--143",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/441/martin.html;
                 http://www.research.ibm.com/journal/sj/441/martin.pdf;
                 http://www.research.ibm.com/journal/sj/441/martin.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0156",
}

@Article{Bhattacharya:2005:MDA,
  author =       "K. Bhattacharya and R. Guttman and K. Lyman and F. F.
                 {Heath III} and S. Kumaran and P. Nandi and F. Wu and
                 P. Athma and C. Freiberg and L. Johannsen and A.
                 Staudt",
  title =        "A model-driven approach to industrializing discovery
                 processes in pharmaceutical research",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "1",
  pages =        "145--162",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/441/bhattacharya.html;
                 http://www.research.ibm.com/journal/sj/441/bhattacharya.pdf;
                 http://www.research.ibm.com/journal/sj/441/bhattacharya.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0156",
}

@Article{Cortada:2005:MFS,
  author =       "J. W. Cortada and H. E. Fraser",
  title =        "Mapping the future in science-intensive industries:
                 Lessons from the pharmaceutical industry",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "1",
  pages =        "163--183",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/441/cortada.html;
                 http://www.research.ibm.com/journal/sj/441/cortada.pdf;
                 http://www.research.ibm.com/journal/sj/441/cortada.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0156",
}

@Article{Cabri:2005:IRJ,
  author =       "G. Cabri and L. Ferrari and L. Leonardi",
  title =        "Injecting roles in {Java} agents through runtime
                 bytecode manipulation",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "1",
  pages =        "185--208",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/441/cabri.html;
                 http://www.research.ibm.com/journal/sj/441/cabri.pdf;
                 http://www.research.ibm.com/journal/sj/441/cabri.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0156",
}

@Article{Lasser:2005:MVP,
  author =       "Catherine Lasser and Margaret Kennelly",
  title =        "Message from the {Vice Presidents, Industry Solutions
                 and Emerging Businesses and On Demand Innovation
                 Services}",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "1",
  pages =        "??--??",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:42 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/441/message.html;
                 http://www.research.ibm.com/journal/sj/441/message.pdf;
                 http://www.research.ibm.com/journal/sj/441/message.txt",
  acknowledgement = ack-nhfb,
  ordernumber =  "G321-0156",
}

@Article{Sabbah:2005:I,
  author =       "Danny Sabbah and Daniel Frye",
  title =        "Introduction",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "??--??",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:43 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/intro.html;
                 http://www.research.ibm.com/journal/sj/442/intro.pdf;
                 http://www.research.ibm.com/journal/sj/442/intro.txt",
  acknowledgement = ack-nhfb,
}

@Article{Ritsko:2005:Pb,
  author =       "John J. Ritsko and Alex Birman",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "213--214",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:43 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/preface.html;
                 http://www.research.ibm.com/journal/sj/442/preface.pdf;
                 http://www.research.ibm.com/journal/sj/442/preface.txt",
  acknowledgement = ack-nhfb,
}

@Article{Neus:2005:OMC,
  author =       "A. Neus and P. Scherf",
  title =        "Opening minds: Cultural change with the introduction
                 of open-source collaboration methods",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "215--225",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:43 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/neus.html;
                 http://www.research.ibm.com/journal/sj/442/neus.pdf;
                 http://www.research.ibm.com/journal/sj/442/neus.txt",
  acknowledgement = ack-nhfb,
}

@Article{Simon:2005:VOS,
  author =       "K. D. Simon",
  title =        "The value of open standards and open-source software
                 in government environments",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "227--238",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:43 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/simon.html;
                 http://www.research.ibm.com/journal/sj/442/simon.pdf;
                 http://www.research.ibm.com/journal/sj/442/simon.txt",
  acknowledgement = ack-nhfb,
}

@Article{Boulanger:2005:OSV,
  author =       "A. Boulanger",
  title =        "Open-source versus proprietary software: Is one more
                 secure and reliable than the other?",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "239--248",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:43 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/boulanger.html;
                 http://www.research.ibm.com/journal/sj/442/boulanger.pdf;
                 http://www.research.ibm.com/journal/sj/442/boulanger.txt",
  acknowledgement = ack-nhfb,
}

@Article{Capek:2005:HIO,
  author =       "P. G. Capek and S. P. Frank and S. Gerdt and D.
                 Shields",
  title =        "A history of {IBM}'s open-source involvement and
                 strategy",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "249--257",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:43 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/capek.html;
                 http://www.research.ibm.com/journal/sj/442/capek.pdf;
                 http://www.research.ibm.com/journal/sj/442/capek.txt",
  acknowledgement = ack-nhfb,
}

@Article{Edelsohn:2005:CGC,
  author =       "D. Edelsohn and W. Gellerich and M. Hagog and D.
                 Naishlos and M. Namolaru and E. Pasch and H. Penner and
                 U. Weigand and A. Zaks",
  title =        "Contributions to the {GNU Compiler Collection}",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "259--278",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:43 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/edelsohn.html;
                 http://www.research.ibm.com/journal/sj/442/edelsohn.pdf;
                 http://www.research.ibm.com/journal/sj/442/edelsohn.txt",
  acknowledgement = ack-nhfb,
}

@Article{Ponzo:2005:EIW,
  author =       "J. Ponzo and O. Gruber",
  title =        "{Eclipse}: Integrating {Web} technologies",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "279--288",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jun 01 07:19:30 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/ponzo.html;
                 http://www.research.ibm.com/journal/sj/442/ponzo.pdf;
                 http://www.research.ibm.com/journal/sj/442/ponzo.txt",
  acknowledgement = ack-nhfb,
}

@Article{Gruber:2005:EPA,
  author =       "O. Gruber and B. J. Hargrave and J. McAffer and P.
                 Rapicault and T. Watson",
  title =        "The {Eclipse 3.0} platform: Adopting {OSGi}
                 technology",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "289--299",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jun 01 07:19:59 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/gruber.html;
                 http://www.research.ibm.com/journal/sj/442/gruber.pdf;
                 http://www.research.ibm.com/journal/sj/442/gruber.txt",
  acknowledgement = ack-nhfb,
}

@Article{Colyer:2005:AOP,
  author =       "A. Colyer and A. Clement",
  title =        "Aspect-oriented programming with {AspectJ}",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "301--308",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:43 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/colyer.html;
                 http://www.research.ibm.com/journal/sj/442/colyer.pdf;
                 http://www.research.ibm.com/journal/sj/442/colyer.txt",
  acknowledgement = ack-nhfb,
}

@Article{Harrison:2005:SAO,
  author =       "W. Harrison and H. Ossher and S. Sutton and P. Tarr",
  title =        "Supporting aspect-oriented software development with
                 the {Concern Manipulation Environment}",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "309--318",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:43 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/harrison.html;
                 http://www.research.ibm.com/journal/sj/442/harrison.pdf;
                 http://www.research.ibm.com/journal/sj/442/harrison.txt",
  acknowledgement = ack-nhfb,
}

@Article{Venton:2005:ULH,
  author =       "T. Venton and M. Miller and R. Kalla and A.
                 Blanchard",
  title =        "Using {Linux} for hardware bring up, development, and
                 manufacturing",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "319--329",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:43 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/venton.html;
                 http://www.research.ibm.com/journal/sj/442/venton.pdf;
                 http://www.research.ibm.com/journal/sj/442/venton.txt",
  acknowledgement = ack-nhfb,
}

@Article{Borntrager:2005:PLS,
  author =       "C. Borntr{\"a}ger and M. Schwidefsky",
  title =        "Providing {Linux 2.6} support for the {zSeries}
                 platform",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "331--340",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:43 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/borntraeger.html;
                 http://www.research.ibm.com/journal/sj/442/borntraeger.pdf;
                 http://www.research.ibm.com/journal/sj/442/borntraeger.txt",
  acknowledgement = ack-nhfb,
}

@Article{Turk:2005:VLS,
  author =       "D. Turk and J. Bausch",
  title =        "Virtual {Linux} servers under {z/VM}: Security,
                 performance, and administration issues",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "341--351",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jun 01 07:21:21 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/turk.html;
                 http://www.research.ibm.com/journal/sj/442/turk.pdf;
                 http://www.research.ibm.com/journal/sj/442/turk.txt",
  acknowledgement = ack-nhfb,
}

@Article{Anand:2005:MPC,
  author =       "V. K. Anand and W. C. Jamison",
  title =        "A middleware performance characterization of {Linux}
                 using {IBM WebSphere Application Server}",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "353--367",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:43 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/anand.html;
                 http://www.research.ibm.com/journal/sj/442/anand.pdf;
                 http://www.research.ibm.com/journal/sj/442/anand.txt",
  acknowledgement = ack-nhfb,
}

@Article{Yeoh:2005:BAL,
  author =       "C. Yeoh",
  title =        "Building applications for the {Linux Standard Base}",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "369--380",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jun 01 07:21:56 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/yeoh.html;
                 http://www.research.ibm.com/journal/sj/442/yeoh.pdf;
                 http://www.research.ibm.com/journal/sj/442/yeoh.txt",
  acknowledgement = ack-nhfb,
}

@Article{Becking:2005:MOS,
  author =       "J. Becking and S. Course and G. van Enk and H. T.
                 Hangyi and J. J. M. Lahaye and D. Ockeloen and R.
                 Peters and H. Rosbergen and R. van Wendel de Joode",
  title =        "{MMBase}: An open-source content management system",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "381--397",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:43 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/becking.html;
                 http://www.research.ibm.com/journal/sj/442/becking.pdf;
                 http://www.research.ibm.com/journal/sj/442/becking.txt",
  acknowledgement = ack-nhfb,
}

@Article{Alpern:2005:JRV,
  author =       "B. Alpern and S. Augart and S. M. Blackburn and M.
                 Butrico and A. Cocchi and P. Cheng and J. Dolby and S.
                 Fink and D. Grove and M. Hind and K. S. McKinley and M.
                 Mergen and J. E. B. Moss and T. Ngo and V. Sarkar and
                 M. Trapp",
  title =        "The {Jikes Research Virtual Machine} project: Building
                 an open-source research community",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "399--417",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:43 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/alpern.html;
                 http://www.research.ibm.com/journal/sj/442/alpern.pdf;
                 http://www.research.ibm.com/journal/sj/442/alpern.txt",
  acknowledgement = ack-nhfb,
}

@Article{Yan:2005:UOS,
  author =       "N. Yan and D. Leip and K. Gupta",
  title =        "The use of open-source software in the {IBM} corporate
                 portal",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "419--425",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jun 01 07:23:08 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/yan.html;
                 http://www.research.ibm.com/journal/sj/442/yan.pdf;
                 http://www.research.ibm.com/journal/sj/442/yan.txt",
  acknowledgement = ack-nhfb,
  remark =       "From p. 420: ``The IBM portal has operated at 100
                 percent availability for over three years. Although at
                 times parts of the infrastructure have been taken down
                 for maintenance and upgrades, there has not been a
                 customer-impacting outage since June of 2001, when a
                 5-minute outage was caused by human error.''",
}

@Article{Appavoo:2005:EKO,
  author =       "J. Appavoo and M. Auslander and M. Butrico and D. da
                 Silva and O. Krieger and M. Mergen and M. Ostrowski and
                 B. Rosenburg and R. W. Wisniewski and J. Xenidis",
  title =        "Experiences with {K42}, an open-source,
                 {Linux}-compatible, scalable operating-system kernel",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "2",
  pages =        "427--440",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Sat Apr 16 18:29:43 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/442/appavoo.html;
                 http://www.research.ibm.com/journal/sj/442/appavoo.pdf;
                 http://www.research.ibm.com/journal/sj/442/appavoo.txt",
  acknowledgement = ack-nhfb,
}

@Article{Basson:2005:P,
  author =       "Sara Basson and Vicki Hanson and Michael Strack and
                 John J. Ritsko and David I. Seidman",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "3",
  pages =        "443--44",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 5 06:56:54 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/443/preface.html",
  acknowledgement = ack-nhfb,
}

@Article{Brunet:2005:ARS,
  author =       "P. Brunet and B. A. Feigenbaum and K. Harris and C.
                 Laws and R. Schwerdtfeger and L. Weiss",
  title =        "Accessibility requirements for systems design to
                 accommodate users with vision impairments",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "3",
  pages =        "445--466",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 5 06:56:54 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/443/brunet.html",
  acknowledgement = ack-nhfb,
}

@Article{Hoffman:2005:DSA,
  author =       "D. Hoffman and E. Grivel and L. Battle",
  title =        "Designing software architectures to facilitate
                 accessible {Web} applications",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "3",
  pages =        "467--483",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 5 06:56:54 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/443/hoffman.html",
  acknowledgement = ack-nhfb,
}

@Article{Turunen:2005:AAS,
  author =       "M. Turunen and J. Hakulinen and K.-J. R{\"a}ih{\"a}
                 and E.-P. Salonen and A. Kainulainen and P. Prusi",
  title =        "An architecture and applications for speech-based
                 accessibility systems",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "3",
  pages =        "485--504",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 5 06:56:54 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/443/turunen.html",
  acknowledgement = ack-nhfb,
}

@Article{Mankoff:2005:EAS,
  author =       "J. Mankoff and H. Fait and R. Juang",
  title =        "Evaluating accessibility by simulating the experiences
                 of users with vision or motor impairments",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "3",
  pages =        "505--517",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 5 06:56:54 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/443/mankoff.html",
  acknowledgement = ack-nhfb,
}

@Article{King:2005:MUP,
  author =       "M. King and J. W. Thatcher and P. M. Bronstad and R.
                 Easton",
  title =        "Managing usability for people with disabilities in a
                 large {Web} presence",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "3",
  pages =        "519--535",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 5 06:56:54 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/443/king.html",
  acknowledgement = ack-nhfb,
}

@Article{Englefield:2005:PAI,
  author =       "P. Englefield and C. Paddison and M. Tibbits and I.
                 Damani",
  title =        "A proposed architecture for integrating accessibility
                 test tools",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "3",
  pages =        "537--555",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 5 06:56:54 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/443/englefield.html",
  acknowledgement = ack-nhfb,
}

@Article{Milne:2005:GEI,
  author =       "S. Milne and A. Dickinson and A. Carmichael and D.
                 Sloan and R. Eisma and P. Gregor",
  title =        "Are guidelines enough? {An} introduction to designing
                 {Web} sites accessible to older people",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "3",
  pages =        "557--571",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 5 06:56:54 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/443/milne.html",
  acknowledgement = ack-nhfb,
}

@Article{Hanson:2005:IWA,
  author =       "V. L. Hanson and J. P. Brezin and S. Crayne and S.
                 Keates and R. Kjeldsen and J. T. Richards and C. Swart
                 and S. Trewin",
  title =        "Improving {Web} accessibility through an enhanced
                 open-source browser",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "3",
  pages =        "573--588",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 5 06:56:54 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/443/hanson.html",
  acknowledgement = ack-nhfb,
}

@Article{Bain:2005:ATA,
  author =       "K. Bain and S. Basson and A. Faisman and D. Kanevsky",
  title =        "Accessibility, transcription, and access everywhere",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "3",
  pages =        "589--603",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 5 06:56:54 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/443/bain.html",
  acknowledgement = ack-nhfb,
}

@Article{Emiliani:2005:UAA,
  author =       "P. L. Emiliani and C. Stephanidis",
  title =        "Universal access to ambient intelligence environments:
                 Opportunities and challenges for people with
                 disabilities",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "3",
  pages =        "605--619",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 5 06:56:54 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/443/emiliani.html",
  acknowledgement = ack-nhfb,
}

@Article{Levine:2005:MAP,
  author =       "J. L. Levine and M. A. Schappert",
  title =        "A mouse adapter for people with hand tremor",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "3",
  pages =        "621--628",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 5 06:56:54 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/443/levine.html",
  acknowledgement = ack-nhfb,
}

@Article{Petrie:2005:PIN,
  author =       "H. L. Petrie and G. Weber and W. Fisher",
  title =        "Personalization, interaction, and navigation in rich
                 multimedia documents for print-disabled users",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "3",
  pages =        "629--635",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 5 06:56:54 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/443/petrie.html",
  acknowledgement = ack-nhfb,
}

@Article{Harper:2005:STI,
  author =       "S. Harper and S. Bechhofer",
  title =        "Semantic triage for increased Web accessibility",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "3",
  pages =        "637--648",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 5 06:56:54 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/443/harper.html",
  acknowledgement = ack-nhfb,
}

@Article{Horn:2005:I,
  author =       "Paul Horn and Frances West",
  title =        "Introduction",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "3",
  pages =        "??--??",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 5 06:56:54 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/443/intro.html",
  acknowledgement = ack-nhfb,
}

@Article{Ritsko:2005:Pc,
  author =       "John J. Ritsko and Alex Birman",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "4",
  pages =        "651--652",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:13 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/444/preface.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Cherbakov:2005:ISO,
  author =       "L. Cherbakov and G. Galambos and R. Harishankar and S.
                 Kalyana and G. Rackham",
  title =        "Impact of service orientation at the business level",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "4",
  pages =        "653--668",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:13 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/444/cherbakov.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Kano:2005:ASB,
  author =       "M. Kano and A. Koide and T.-K. Liu and B.
                 Ramachandran",
  title =        "Analysis and simulation of business solutions in a
                 service-oriented architecture",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "4",
  pages =        "669--690",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:13 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/444/kano.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Bieberstein:2005:ISO,
  author =       "N. Bieberstein and S. Bose and L. Walker and A.
                 Lynch",
  title =        "Impact of service-oriented architecture on enterprise
                 systems, organizational structures, and individuals",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "4",
  pages =        "691--708",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:13 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/444/bieberstein.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Cox:2005:MSO,
  author =       "D. E. Cox and H. Kreger",
  title =        "Management of the service-oriented-architecture life
                 cycle",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "4",
  pages =        "709--726",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:13 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/444/cox.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Brown:2005:RSO,
  author =       "A. W. Brown and M. Delbaere and P. Eeles and S.
                 Johnston and R. Weaver",
  title =        "Realizing service-oriented solutions with the {IBM
                 Rational Software Development Platform}",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "4",
  pages =        "727--752",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:13 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/444/brown.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Ferguson:2005:SOA,
  author =       "D. F. Ferguson and M. L. Stockton",
  title =        "Service-oriented architecture: Programming model and
                 product architecture",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "4",
  pages =        "753--780",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:13 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/444/ferguson.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Schmidt:2005:ESB,
  author =       "M.-T. Schmidt and B. Hutchison and P. Lambros and R.
                 Phippen",
  title =        "The {Enterprise Service Bus}: Making service-oriented
                 architecture real",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "4",
  pages =        "781--797",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:13 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/444/schmidt.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Curbera:2005:CLM,
  author =       "F. Curbera and M. J. Duftler and R. Khalaf and W. A.
                 Nagy and N. Mukhi and S. Weerawarana",
  title =        "{Colombo}: Lightweight middleware for service-oriented
                 computing",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "4",
  pages =        "799--820",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:13 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/444/curbera.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Pauw:2005:WSN,
  author =       "W. {De Pauw} and M. Lei and E. Pring and L. Villard
                 and M. Arnold and J. F. Morar",
  title =        "{Web Services Navigator}: Visualizing the execution of
                 {Web Services}",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "4",
  pages =        "821--845",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:13 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/444/depauw.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Nagaratnam:2005:BDA,
  author =       "N. Nagaratnam and A. Nadalin and M. Hondo and M.
                 McIntosh and P. Austel",
  title =        "Business-driven application security: From modeling to
                 managing secure applications",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "4",
  pages =        "847--867",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:13 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/444/nagaratnam.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Niblett:2005:ESO,
  author =       "P. Niblett and S. Graham",
  title =        "Events and service-oriented architecture: The {OASIS
                 Web Services Notification} specifications",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "4",
  pages =        "869--886",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:13 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/444/niblett.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Vetere:2005:MSI,
  author =       "G. Vetere and M. Lenzerini",
  title =        "Models for semantic interoperability in
                 service-oriented architectures",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "4",
  pages =        "887--903",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:13 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/444/vetere.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Weisser:2005:MVP,
  author =       "Jason Weisser",
  title =        "Message from the {Vice President, IBM Asset and
                 Integration Technology, Software Group}",
  journal =      j-IBM-SYS-J,
  volume =       "44",
  number =       "4",
  pages =        "??--??",
  month =        "????",
  year =         "2005",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:13 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/444/message.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Neti:2006:P,
  author =       "Chalapathy Neti and Anees Shaikh and Chris Sharp and
                 Randy Moulic and Patty Fry and Dick Anderson and John
                 J. Ritsko and David I. Seidman",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "1",
  pages =        "3--6",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/451/preface.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Shaikh:2006:DPO,
  author =       "A. Shaikh and S. Sahu and M.-C. Rosu and M. Shea and
                 D. Saha",
  title =        "On demand platform for online games",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "1",
  pages =        "7--19",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/451/shaikh.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Deen:2006:RQI,
  author =       "G. Deen and M. Hammer and J. Bethencourt and I. Eiron
                 and J. Thomas and J. H. Kaufman",
  title =        "Running {Quake II} on a grid",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "1",
  pages =        "21--44",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/451/deen.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Ye:2006:SPM,
  author =       "M. Ye and L. Cheng",
  title =        "System-performance modeling for massively multiplayer
                 online role-playing games",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "1",
  pages =        "45--58",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/451/ye.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Eichenberger:2006:UAC,
  author =       "A. E. Eichenberger and J. K. O'Brien and K. M. O'Brien
                 and P. Wu and T. Chen and P. H. Oden and D. A. Prener
                 and J. C. Shepherd and B. So and Z. Sura and A. Wang
                 and T. Zhang and P. Zhao and M. K. Gschwind and R.
                 Archambault and Y. Gao and R. Koo",
  title =        "Using advanced compiler technology to exploit the
                 performance of the {Cell Broadband Engine{\TM}}
                 architecture",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "1",
  pages =        "59--84",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/451/eichenberger.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Ohara:2006:MMP,
  author =       "M. Ohara and H. Inoue and Y. Sohda and H. Komatsu and
                 T. Nakatani",
  title =        "{MPI} microtask for programming the {Cell Broadband
                 Engine{\TM}} processor",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "1",
  pages =        "85--102",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/451/ohara.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{DAmora:2006:HPS,
  author =       "B. D'Amora and K. Magerlein and A. Binstock and A.
                 Nanda and B. Yee",
  title =        "High-performance server systems and the next
                 generation of online games",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "1",
  pages =        "103--118",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/451/damora.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Myles:2006:CPG,
  author =       "G. Myles and S. Nusser",
  title =        "Content protection for games",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "1",
  pages =        "119--143",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/451/myles.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Luo:2006:CAS,
  author =       "L. Luo and J. Liu and L. Shao and W. Lu and M. Ye",
  title =        "A context-aware smart-call-center solution: Improving
                 customer service for online games",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "1",
  pages =        "145--160",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/451/luo.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Sharp:2006:OGB,
  author =       "C. E. Sharp and M. Rowe",
  title =        "Online games and e-business: Architecture for
                 integrating business models and services into online
                 games",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "1",
  pages =        "161--179",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/451/sharp.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Hirschheim:2006:MMM,
  author =       "R. Hirschheim and A. Schwarz and P. Todd",
  title =        "A marketing maturity model for {IT}: Building a
                 customer-centric {IT} organization",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "1",
  pages =        "181--199",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/451/hirschheim.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Ritsko:2006:Pa,
  author =       "John J. Ritsko and Alex Birman",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "2",
  pages =        "205--205",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/452/preface.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Adler:2006:TCC,
  author =       "S. Adler and R. Cochrane and J. F. Morar and A.
                 Spector",
  title =        "Technical context and cultural consequences of {XML}",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "2",
  pages =        "207--223",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/452/adler.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Perkins:2006:GEP,
  author =       "E. Perkins and M. Matsa and M. G. Kostoulas and A.
                 Heifets and N. Mendelsohn",
  title =        "Generation of efficient parsers through direct
                 compilation of {XML Schema} grammars",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "2",
  pages =        "225--244",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/452/perkins.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Ozcan:2006:ISX,
  author =       "F. {\"O}zcan and D. Chamberlin and K. Kulkarni and
                 J.-E. Michels",
  title =        "Integration of {SQL} and {XQ}uery in {IBM DB2}",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "2",
  pages =        "245--270",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/452/ozcan.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Beyer:2006:DGH,
  author =       "K. Beyer and R. Cochrane and M. Hvizdos and V.
                 Josifovski and J. Kleewein and G. Lapis and G. Lohman
                 and R. Lyle and M. Nicola and F. {\"O}zcan and H.
                 Pirahesh and N. Seemann and A. Singh and T. Truong and
                 R. C. Van der Linden and B. Vickery and C. Zhang and G.
                 Zhang",
  title =        "{DB2} goes hybrid: Integrating native {XML} and
                 {XQuery} with relational data and {SQL}",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "2",
  pages =        "271--298",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/452/beyer.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Balmin:2006:CBO,
  author =       "A. Balmin and T. Eliaz and J. Hornibrook and L. Lim
                 and G. M. Lohman and D. Simmen and M. Wang and C.
                 Zhang",
  title =        "Cost-based optimization in {DB2 XML}",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "2",
  pages =        "299--319",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/452/balmin.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Kanne:2006:ISC,
  author =       "C. C. Kanne and G. Moerkotte",
  title =        "The importance of sibling clustering for efficient
                 bulkload of {XML} document trees",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "2",
  pages =        "321--334",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/452/kanne.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Amer-Yahia:2006:XFT,
  author =       "S. Amer-Yahia and C. Botev and J. D{\"o}rre and J.
                 Shanmugasundaram",
  title =        "{XQuery Full-Text} extensions explained",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "2",
  pages =        "335--351",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/452/amer.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Case:2006:EXS,
  author =       "P. Case",
  title =        "Enhancing {XML} search with {XQuery 1.0} and {XPath
                 2.0} Full-Text",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "2",
  pages =        "353--360",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/452/case.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Shabo:2006:RIX,
  author =       "A. Shabo and S. Rabinovici-Cohen and P. Vortman",
  title =        "Revolutionary impact of {XML} on biomedical
                 information interoperability",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "2",
  pages =        "361--372",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/452/shabo.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Hinkelman:2006:EPU,
  author =       "S. Hinkelman and D. Buddenbaum and L.-J. Zhang",
  title =        "Emerging patterns in the use of {XML} for information
                 modeling in vertical industries",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "2",
  pages =        "373--378",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/452/hinkelman.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Roth:2006:XMT,
  author =       "M. Roth and M. A. Hernandez and P. Coulthard and L.
                 Yan and L. Popa and H. C.-T. Ho and C. C. Salter",
  title =        "{XML} mapping technology: Making connections in an
                 {XML}-centric world",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "2",
  pages =        "389--409",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/452/roth.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Rose:2006:VXT,
  author =       "K. H. Rose and S. Malaika and R. J. Schloss",
  title =        "{Virtual XML}: a toolbox and use cases for the {XML}
                 world view",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "2",
  pages =        "411--424",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/452/rose.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Khalaf:2006:BPW,
  author =       "R. Khalaf and A. Keller and F. Leymann",
  title =        "Business processes for {Web Services}: Principles and
                 applications",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "2",
  pages =        "425--446",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/452/khalaf.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Horn:2006:I,
  author =       "Paul Horn and Steven Mills",
  title =        "Introduction",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "2",
  pages =        "??--??",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:14 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/452/intro.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Ritsko:2006:Pb,
  author =       "John J. Ritsko and David I. Seidman",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "3",
  pages =        "449--450",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/453/preface.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Hailpern:2006:MDD,
  author =       "B. Hailpern and P. Tarr",
  title =        "Model-driven development: The good, the bad, and the
                 ugly",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "3",
  pages =        "451--461",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/453/hailpern.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Brown:2006:RAM,
  author =       "A. W. Brown and S. Iyengar and S. Johnston",
  title =        "A rational approach to model-driven development",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "3",
  pages =        "463--480",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/453/brown.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Abrams:2006:ATM,
  author =       "S. Abrams and B. Bloom and P. Keyser and D. Kimelman
                 and E. Nelson and W. Neuberger and T. Roth and I.
                 Simmonds and S. Tang and J. Vlissides",
  title =        "Architectural thinking and modeling with the
                 {Architects' Workbench}",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "3",
  pages =        "481--500",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/453/abrams.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Sinha:2006:MFE,
  author =       "A. Sinha and C. E. Williams and P. Santhanam",
  title =        "A measurement framework for evaluating model-based
                 test generation tools",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "3",
  pages =        "501--514",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/453/sinha.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Aizenbud-Reshef:2006:MT,
  author =       "N. Aizenbud-Reshef and B. T. Nolan and J. Rubin and Y.
                 Shaham-Gafni",
  title =        "Model traceability",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "3",
  pages =        "515--526",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/453/aizenbud.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Batory:2006:MMM,
  author =       "D. Batory",
  title =        "Multilevel models in model-driven engineering, product
                 lines, and metaprogramming",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "3",
  pages =        "527--539",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/453/batory.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Larsen:2006:MDD,
  author =       "G. Larsen",
  title =        "Model-driven development: Assets and reuse",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "3",
  pages =        "541--553",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/453/larsen.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Leroux:2006:RSA,
  author =       "D. Leroux and M. Nally and K. Hussey",
  title =        "{Rational Software Architect}: a tool for
                 domain-specific modeling",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "3",
  pages =        "555--568",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/453/leroux.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Balmelli:2006:MDS,
  author =       "L. Balmelli and D. Brown and M. Cantor and M. Mott",
  title =        "Model-driven systems development",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "3",
  pages =        "569--585",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/453/balmelli.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Chowdhary:2006:MDD,
  author =       "P. Chowdhary and K. Bhaskaran and N. S. Caswell and H.
                 Chang and T. Chao and S.-K. Chen and M. Dikun and H.
                 Lei and J.-J. Jeng and S. Kapoor and C. A. Lang and G.
                 Mihaila and I. Stanoi and L. Zeng",
  title =        "Model Driven Development for Business Performance
                 Management",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "3",
  pages =        "587--605",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/453/chowdhary.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Selic:2006:UMD,
  author =       "B. Selic",
  title =        "{UML 2}: a model-driven development tool",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "3",
  pages =        "607--620",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/453/selic.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Czarnecki:2006:FBS,
  author =       "K. Czarnecki and S. Helsen",
  title =        "Feature-based survey of model transformation
                 approaches",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "3",
  pages =        "621--645",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/453/czarnecki.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Chandra:2006:ULD,
  author =       "S. Chandra and J. de Vries and J. Field and H. Hess
                 and M. Kalidasan and K. V. Raghavan and F. Nieuwerth
                 and G. Ramalingam and J. Xue",
  title =        "Using logical data models for understanding and
                 transforming legacy business applications",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "3",
  pages =        "647--655",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/453/chandra.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Sabbah:2006:I,
  author =       "Daniel Sabbah",
  title =        "Introduction",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "3",
  pages =        "??--??",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/453/intro.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Greif:2006:P,
  author =       "Irene Greif and Alex Birman and John J. Ritsko",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "4",
  pages =        "659--661",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/454/preface.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Hill:2006:BPW,
  author =       "C. Hill and R. Yates and C. Jones and S. L. Kogan",
  title =        "Beyond predictable workflows: Enhancing productivity
                 in artful business processes",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "4",
  pages =        "663--682",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/454/hill.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Moody:2006:BAP,
  author =       "P. Moody and D. Gruen and M. J. Muller and J. Tang and
                 T. P. Moran",
  title =        "Business activity patterns: a new model for
                 collaborative business applications",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "4",
  pages =        "683--694",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/454/moody.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Cozzi:2006:AMW,
  author =       "A. Cozzi and S. Farrell and T. Lau and B. A. Smith and
                 C. Drews and J. Lin and B. Stachel and T. P. Moran",
  title =        "Activity management as a {Web} service",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "4",
  pages =        "695--712",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/454/cozzi.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Geyer:2006:AEA,
  author =       "W. Geyer and M. J. Muller and M. T. Moore and E.
                 Wilcox and L.-T. Cheng and B. Brownholtz and C. Hill
                 and D. R. Millen",
  title =        "{Activity Explorer}: Activity-centric collaboration
                 from research to product",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "4",
  pages =        "713--738",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/454/geyer.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Sow:2006:UHY,
  author =       "D. M. Sow and J. S. Davis and M. R. Ebling and A.
                 Misra and L. Bergman",
  title =        "Uncovering the to-dos hidden in your in-box",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "4",
  pages =        "739--757",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/454/sow.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Kogan:2006:ESC,
  author =       "S. L. Kogan and M. J. Muller",
  title =        "Ethnographic study of collaborative knowledge work",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "4",
  pages =        "759--771",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/454/kogan.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Treinen:2006:FSC,
  author =       "J. J. Treinen and S. L. Miller-Frost",
  title =        "Following the sun: Case studies in global software
                 development",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "4",
  pages =        "773--783",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/454/treinen.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Spangler:2006:MCD,
  author =       "W. S. Spangler and J. T. Kreulen and J. F.
                 Newswanger",
  title =        "Machines in the conversation: Detecting themes and
                 trends in informal communication streams",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "4",
  pages =        "785--799",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/454/spangler.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Viegas:2006:TFC,
  author =       "F. B. Vi{\'e}gas and M. Wattenberg",
  title =        "Technical forum: Communication-minded visualization:
                 {A} call to action",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "4",
  pages =        "801--812",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/454/viegas.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Akerman:2006:UOS,
  author =       "A. Akerman and J. Tyree",
  title =        "Using ontology to support development of software
                 architectures",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "4",
  pages =        "813--825",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/454/akerman.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Greif:2006:I,
  author =       "Irene Greif and Michael Rhodin",
  title =        "Introduction",
  journal =      j-IBM-SYS-J,
  volume =       "45",
  number =       "4",
  pages =        "??--??",
  month =        "????",
  year =         "2006",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:15 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/454/intro.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Jasinski:2007:P,
  author =       "Joseph M. Jasinski and David I. Seidman and John J.
                 Ritsko",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "1",
  pages =        "3--??",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:16 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/461/preface.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Eggebraaten:2007:HCD,
  author =       "T. J. Eggebraaten and J. W. Tenner and J. C. Dubbels",
  title =        "A health-care data model based on the {HL7 Reference
                 Information Model}",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "1",
  pages =        "5--18",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:16 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/461/eggebraaten.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Eckman:2007:VIT,
  author =       "B. A. Eckman and C. A. Bennett and J. H. Kaufman and
                 J. W. Tenner",
  title =        "Varieties of interoperability in the transformation of
                 the health-care information infrastructure",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "1",
  pages =        "19--41",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:16 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/461/eckman.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Gold:2007:HRB,
  author =       "J. D. Gold and M. J. Ball",
  title =        "The {Health Record Banking} imperative: a conceptual
                 model",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "1",
  pages =        "43--55",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:16 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/461/gold.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Shabo:2007:SLC,
  author =       "A. Shabo and D. Dotan",
  title =        "The seventh layer of the clinical-genomics information
                 infrastructure",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "1",
  pages =        "57--67",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:16 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/461/shabo.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Weinstein:2007:IBT,
  author =       "R. S. Weinstein and A. M. L{\'o}pez and G. P. Barker
                 and E. A. Krupinski and M. R. Descour and K. M. Scott
                 and L. C. Richter and S. J. Beinar and M. J. Holcomb
                 and P. H. Bartels and R. A. McNeely and A. K.
                 Bhattacharyya",
  title =        "The innovative bundling of teleradiology,
                 telepathology, and teleoncology services",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "1",
  pages =        "69--84",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:16 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/461/weinstein.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Kirsch:2007:MCI,
  author =       "C. Kirsch and M. Mattingley-Scott and C. Muszynski and
                 F. Schaefer and C. Weiss",
  title =        "Monitoring chronically ill patients using mobile
                 technologies",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "1",
  pages =        "85--93",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:16 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/461/kirsch.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Blount:2007:RHC,
  author =       "M. Blount and V. M. Batra and A. N. Capella and M. R.
                 Ebling and W. F. Jerome and S. M. Martin and M. Nidd
                 and M. R. Niemi and S. P. Wright",
  title =        "Remote health-care monitoring using {Personal Care
                 Connect}",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "1",
  pages =        "95--113",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:16 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/461/blount.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Inokuchi:2007:MCI,
  author =       "A. Inokuchi and K. Takeda and N. Inaoka and F. Wakao",
  title =        "{MedTAKMI-CDI}: Interactive knowledge discovery for
                 clinical decision intelligence",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "1",
  pages =        "115--133",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:16 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/461/inokuchi.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Mushlin:2007:GTA,
  author =       "R. A. Mushlin and A. Kershenbaum and S. T. Gallagher
                 and T. R. Rebbeck",
  title =        "A graph-theoretical approach for pattern discovery in
                 epidemiological research",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "1",
  pages =        "135--149",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:16 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/461/mushlin.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Wang:2007:ICD,
  author =       "X. S. Wang and L. Nayda and R. Dettinger",
  title =        "Infrastructure for a clinical-decision-intelligence
                 system",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "1",
  pages =        "151--169",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:16 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/461/wang.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Olund:2007:BIM,
  author =       "G. {\"O}lund and P. Lindqvist and J.-E. Litton",
  title =        "{BIMS}: An information management system for
                 biobanking in the {21st Century}",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "1",
  pages =        "171--182",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:16 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/461/olund.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Hehenberger:2007:ISI,
  author =       "M. Hehenberger and A. Chatterjee and U. Reddy and J.
                 Hernandez and J. Sprengel",
  title =        "{IT} solutions for imaging biomarkers in
                 biopharmaceutical research and development",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "1",
  pages =        "183--198",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:16 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/461/hehenberger.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Lasser:2007:I,
  author =       "Catherine Lasser and Michael Svinte",
  title =        "Introduction",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "1",
  pages =        "??--??",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Feb 12 18:19:16 MST 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/461/intro.html",
  acknowledgement = ack-nhfb,
  ordernumber =  "????",
}

@Article{Ritsko:2007:P,
  author =       "John J. Ritsko and Alex Birman",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "2",
  pages =        "203--??",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/462/preface.html",
  acknowledgement = ack-nhfb,
}

@Article{Bellamy:2007:SBD,
  author =       "R. K. E. Bellamy and T. Erickson and B. Fuller and W.
                 A. Kellogg and R. Rosenbaum and J. C. Thomas and T.
                 Vetting Wolf",
  title =        "Seeing is believing: {Designing} visualizations for
                 managing risk and compliance",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "2",
  pages =        "205--??",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/462/bellamy.html",
  acknowledgement = ack-nhfb,
}

@Article{Abrams:2007:OER,
  author =       "C. Abrams and J. von K{\"a}nel and S. M{\"u}ller and
                 B. Pfitzmann and S. Ruschka-Taylor",
  title =        "Optimized enterprise risk management",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "2",
  pages =        "219--??",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/462/abrams.html",
  acknowledgement = ack-nhfb,
}

@Article{Kudo:2007:BPT,
  author =       "M. Kudo and Y. Araki and H. Nomiyama and S. Saito and
                 Y. Sohda",
  title =        "Best practices and tools for personal information
                 compliance management",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "2",
  pages =        "235--??",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/462/kudo.html",
  acknowledgement = ack-nhfb,
}

@Article{Johnson:2007:CDP,
  author =       "C. M. Johnson and T. W. A. Grandison",
  title =        "Compliance with data protection laws using
                 {Hippocratic Database} active enforcement and
                 auditing",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "2",
  pages =        "255--??",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/462/johnson.html",
  acknowledgement = ack-nhfb,
}

@Article{Pistoia:2007:SSA,
  author =       "M. Pistoia and S. Chandra and S. J. Fink and E.
                 Yahav",
  title =        "A survey of static analysis methods for identifying
                 security vulnerabilities in software systems",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "2",
  pages =        "265--??",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/462/pistoia.html",
  acknowledgement = ack-nhfb,
}

@Article{Luo:2007:AEB,
  author =       "L. Luo and D. M. Hao and Z. Tian and Y. B. Dang and B.
                 Hou and P. Malkin and S. X. Yang",
  title =        "{Ariadne}: {An} {Eclipse}-based system for tracking
                 originality of source code",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "2",
  pages =        "289--??",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/462/luo.html",
  acknowledgement = ack-nhfb,
}

@Article{Ramanathan:2007:RAR,
  author =       "J. Ramanathan and R. J. Cohen and E. Plassmann and K.
                 Ramamoorthy",
  title =        "Role of an auditing and reporting service in
                 compliance management",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "2",
  pages =        "305--??",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/462/ramanathan.html",
  acknowledgement = ack-nhfb,
}

@Article{Delbaere:2007:ADA,
  author =       "M. Delbaere and R. Ferreira",
  title =        "Addressing the data aspects of compliance with
                 industry models",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "2",
  pages =        "319--??",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/462/delbaere.html",
  acknowledgement = ack-nhfb,
}

@Article{Liu:2007:SCC,
  author =       "Y. Liu and S. M{\"u}ller and K. Xu",
  title =        "A static compliance-checking framework for business
                 process models",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "2",
  pages =        "335--??",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/462/liu.html",
  acknowledgement = ack-nhfb,
}

@Article{Hsu:2007:WSE,
  author =       "W. W. Hsu and S. Ong",
  title =        "{WORM} storage is not enough",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "2",
  pages =        "363--??",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/462/hsu.html",
  acknowledgement = ack-nhfb,
}

@Article{Lickel:2007:I,
  author =       "Charles W. Lickel",
  title =        "Introduction",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "2",
  pages =        "??--??",
  month =        "????",
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/462/intro.html",
  acknowledgement = ack-nhfb,
}

@Article{Paul:2007:P,
  author =       "C. J. Paul and C. Ward and D. I. Seidman and J. J.
                 Ritsko",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "3",
  pages =        "373--??",
  month =        jul # "\slash " # sep,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/463/preface.html",
  acknowledgement = ack-nhfb,
}

@Article{Ganek:2007:OIS,
  author =       "A. Ganek and K. Kloeckner",
  title =        "An overview of {IBM Service Management}",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "3",
  pages =        "375--??",
  month =        jul # "\slash " # sep,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/463/ganek.html",
  acknowledgement = ack-nhfb,
}

@Article{Ernest:2007:AVI,
  author =       "M. Ernest and J. M. Nisavic",
  title =        "Adding value to the {IT} organization with the
                 {Component Business Model}",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "3",
  pages =        "387--??",
  month =        jul # "\slash " # sep,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/463/ernest.html",
  acknowledgement = ack-nhfb,
}

@Article{Black:2007:IMO,
  author =       "J. Black and C. Draper and T. Lococo and F. Matar and
                 C. Ward",
  title =        "An integration model for organizing {IT} service
                 management",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "3",
  pages =        "405--??",
  month =        jul # "\slash " # sep,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/463/black.html",
  acknowledgement = ack-nhfb,
}

@Article{Lindquist:2007:ISM,
  author =       "D. Lindquist and H. Madduri and C. J. Paul and B.
                 Rajaraman",
  title =        "{IBM Service Management} architecture",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "3",
  pages =        "423--??",
  month =        jul # "\slash " # sep,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/463/lindquist.html",
  acknowledgement = ack-nhfb,
}

@Article{Madduri:2007:CMD,
  author =       "H. Madduri and S. S. B. Shi and R. Baker and N.
                 Ayachitula and L. Shwartz and M. Surendra and C. Corley
                 and M. Benantar and S. Patel",
  title =        "A configuration management database architecture in
                 support of {IBM Service Management}",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "3",
  pages =        "441--??",
  month =        jul # "\slash " # sep,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/463/madduri.html",
  acknowledgement = ack-nhfb,
}

@Article{Ward:2007:ICC,
  author =       "C. Ward and V. Aggarwal and M. Buco and E. Olsson and
                 S. Weinberger",
  title =        "Integrated change and configuration management",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "3",
  pages =        "459--??",
  month =        jul # "\slash " # sep,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/463/ward.html",
  acknowledgement = ack-nhfb,
}

@Article{Paul:2007:PBP,
  author =       "C. J. Paul",
  title =        "The process of building a {Process Manager}:
                 {Architecture} and design patterns",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "3",
  pages =        "479--??",
  month =        jul # "\slash " # sep,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/463/paul.html",
  acknowledgement = ack-nhfb,
}

@Article{Joshi:2007:IDS,
  author =       "N. Joshi and W. Riley and J. Schneider and Y.-S. Tan",
  title =        "Integration of domain-specific {IT} processes and
                 tools in {IBM Service Management}",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "3",
  pages =        "497--??",
  month =        jul # "\slash " # sep,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/463/joshi.html",
  acknowledgement = ack-nhfb,
}

@Article{Kumaran:2007:UMD,
  author =       "S. Kumaran and P. Bishop and T. Chao and P. Dhoolia
                 and P. Jain and R. Jaluka and H. Ludwig and A. Moyer
                 and A. Nigam",
  title =        "Using a model-driven transformational approach and
                 service-oriented architecture for service delivery
                 management",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "3",
  pages =        "513--??",
  month =        jul # "\slash " # sep,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/463/kumaran.html",
  acknowledgement = ack-nhfb,
}

@Article{Ludwig:2007:CBS,
  author =       "H. Ludwig and J. Hogan and R. Jaluka and D.
                 Loewenstern and S. Kumaran and A. Gilbert and A. Roy
                 and T. R. Nellutla and M. Surendra",
  title =        "Catalog-based service request management",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "3",
  pages =        "531--??",
  month =        jul # "\slash " # sep,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/463/ludwig.html",
  acknowledgement = ack-nhfb,
}

@Article{Keel:2007:TOS,
  author =       "A. J. Keel and M. A. Orr and R. R. Hernandez and E. A.
                 Patrocinio and J. Bouchard",
  title =        "From a technology-oriented to a service-oriented
                 approach to {IT} management",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "3",
  pages =        "549--??",
  month =        jul # "\slash " # sep,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/463/keel.html",
  acknowledgement = ack-nhfb,
}

@Article{Brittenham:2007:ISM,
  author =       "P. Brittenham and R. R. Cutlip and C. Draper and B. A.
                 Miller and S. Choudhary and M. Perazolo",
  title =        "{IT} service management architecture and autonomic
                 computing",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "3",
  pages =        "565--??",
  month =        jul # "\slash " # sep,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/463/brittenham.html",
  acknowledgement = ack-nhfb,
}

@Article{Johnson:2007:ESI,
  author =       "M. W. Johnson and A. Hately and B. A. Miller and R.
                 Orr",
  title =        "Evolving standards for {IT} service management",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "3",
  pages =        "583--??",
  month =        jul # "\slash " # sep,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/463/johnson.html",
  acknowledgement = ack-nhfb,
}

@Article{Chess:2007:PSI,
  author =       "D. M. Chess and J. E. Hanson and J. A. {Pershing, Jr.}
                 and S. R. White",
  title =        "Prospects for simplifying {ITSM}-based management
                 through self-managing resources",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "3",
  pages =        "599--??",
  month =        jul # "\slash " # sep,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/463/chess.html",
  acknowledgement = ack-nhfb,
}

@Article{Mastrianni:2007:IAF,
  author =       "S. Mastrianni and D. F. Bantz and K. A. Beaty and T.
                 Chefalas and S. Jalan and G. Kar and A. Kochut and D.
                 J. Lan and L. O'Connell and A. Sailer and G. Wang and
                 Q. B. Wang and D. G. Shea",
  title =        "{IT Autopilot}: a flexible {IT} service management
                 and delivery platform for small and medium business",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "3",
  pages =        "609--??",
  month =        jul # "\slash " # sep,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/463/mastrianni.html",
  acknowledgement = ack-nhfb,
}

@Article{Zollar:2007:I,
  author =       "Al Zollar",
  title =        "Introduction",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "3",
  pages =        "??--??",
  month =        jul # "\slash " # sep,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:35:06 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/463/intro.html",
  acknowledgement = ack-nhfb,
}

@Article{Abe:2007:OSB,
  author =       "N. Abe and R. Akkiraju and S. Buckley and M. Ettl and
                 P. Huang and D. Subramanian and F. Tipu",
  title =        "On optimizing the selection of business transformation
                 projects",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "4",
  pages =        "??--??",
  month =        oct # "\slash " # dec,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:39:46 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/464/abe.html",
  acknowledgement = ack-nhfb,
}

@Article{Bhattacharya:2007:ACO,
  author =       "K. Bhattacharya and N. S. Caswell and S. Kumaran and
                 A. Nigam and F. Y. Wu",
  title =        "Artifact-centered operational modeling: {Lessons} from
                 customer engagements",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "4",
  pages =        "??--??",
  month =        oct # "\slash " # dec,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:39:46 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  acknowledgement = ack-nhfb,
}

@Article{Birman:2007:P,
  author =       "A. Birman and J. J. Ritsko",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "4",
  pages =        "??--??",
  month =        oct # "\slash " # dec,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:39:46 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  acknowledgement = ack-nhfb,
}

@Article{Cherbakov:2007:CCI,
  author =       "L. Cherbakov and A. Bravery and B. D. Goodman and A.
                 Pandya and J. Baggett",
  title =        "Changing the corporate {IT} development model:
                 {Tapping} the power of grassroots computing",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "4",
  pages =        "??--??",
  month =        oct # "\slash " # dec,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:39:46 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/464/cherbakov.html",
  acknowledgement = ack-nhfb,
}

@Article{Chow:2007:ECC,
  author =       "A. W. Chow and B. D. Goodman and J. W. Rooney and C.
                 D. Wyble",
  title =        "Engaging a corporate community to manage technology
                 and embrace innovation",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "4",
  pages =        "??--??",
  month =        oct # "\slash " # dec,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:39:46 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  acknowledgement = ack-nhfb,
}

@Article{Christensen:2007:VEI,
  author =       "J. Christensen and B. Hughes",
  title =        "Voice-enabled {IT} transformation: {The} new voice
                 technologies",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "4",
  pages =        "??--??",
  month =        oct # "\slash " # dec,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:39:46 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  acknowledgement = ack-nhfb,
}

@Article{Kapoor:2007:SRS,
  author =       "S. Kapoor and B. Binney and S. Buckley and H. Chang
                 and T. Chao and M. Ettl and E. N. Luddy and R. K. Ravi
                 and J. Yang",
  title =        "Sense-and-respond supply chain using model-driven
                 techniques",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "4",
  pages =        "??--??",
  month =        oct # "\slash " # dec,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:39:46 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/464/kapoor.html",
  acknowledgement = ack-nhfb,
}

@Article{Lawrence:2007:ADS,
  author =       "R. Lawrence and C. Perlich and S. Rosset and J. Arroyo
                 and M. Callahan and J. M. Collins and A. Ershov and S.
                 Feinzig and I. Khabibrakhmanov and S. Mahatma and M.
                 Niemaszyk and S. M. Weiss",
  title =        "Analytics-driven solutions for customer targeting and
                 sales-force allocation",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "4",
  pages =        "??--??",
  month =        oct # "\slash " # dec,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:39:46 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/464/lawrence.html",
  acknowledgement = ack-nhfb,
}

@Article{Nayak:2007:CBA,
  author =       "N. Nayak and M. Linehan and A. Nigam and D. Marston
                 and J.-J. Jeng and F. Y. Wu and D. Boullery and L. F.
                 White and P. Nandi and J. L. C. Sanz",
  title =        "Core business architecture for a service-oriented
                 enterprise",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "4",
  pages =        "??--??",
  month =        oct # "\slash " # dec,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:39:46 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/464/nayak.html",
  acknowledgement = ack-nhfb,
}

@Article{Newbold:2007:MCL,
  author =       "D. L. Newbold and M. C. Azua",
  title =        "A model for {CIO}-led innovation",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "4",
  pages =        "??--??",
  month =        oct # "\slash " # dec,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:39:46 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/464/newbold.html",
  acknowledgement = ack-nhfb,
}

@Article{Sanford:2007:MSV,
  author =       "Linda S. Sanford",
  title =        "Message from the {Senior Vice President, Enterprise On
                 Demand Transformation \& Information Technology}",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "4",
  pages =        "??--??",
  month =        oct # "\slash " # dec,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:39:46 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  acknowledgement = ack-nhfb,
}

@Article{Vayghan:2007:IIT,
  author =       "J. A. Vayghan and S. M. Garfinkle and C. Walenta and
                 D. C. Healy and Z. Valentin",
  title =        "The internal information transformation of {IBM}",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "4",
  pages =        "??--??",
  month =        oct # "\slash " # dec,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:39:46 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  acknowledgement = ack-nhfb,
}

@Article{Walker:2007:IBT,
  author =       "L. Walker",
  title =        "{IBM} business transformation enabled by
                 service-oriented architecture",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "4",
  pages =        "??--??",
  month =        oct # "\slash " # dec,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:39:46 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  acknowledgement = ack-nhfb,
}

@Article{Zeng:2007:MAB,
  author =       "L. Zeng and H. Lei and T. Koyanagi and H. Ohsaki and
                 H. Chang",
  title =        "Model analysis for business event processing",
  journal =      j-IBM-SYS-J,
  volume =       "46",
  number =       "4",
  pages =        "??--??",
  month =        oct # "\slash " # dec,
  year =         "2007",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Oct 31 13:39:46 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/464/zeng.html",
  acknowledgement = ack-nhfb,
}

@Article{Maglio:2008:P,
  author =       "P. P. Maglio and J. Spohrer and D. I. Seidman and J.
                 J. Ritsko",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "1",
  pages =        "3--??",
  month =        jan # "\slash " # mar,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/471/preface.html",
  acknowledgement = ack-nhfb,
}

@Article{Lusch:2008:TCF,
  author =       "R. F. Lusch and S. L. Vargo and G. Wessels",
  title =        "Toward a conceptual foundation for service science:
                 Contributions from service-dominant logic",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "1",
  pages =        "5--??",
  month =        jan # "\slash " # mar,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/471/lusch.html",
  acknowledgement = ack-nhfb,
}

@Article{Glushko:2008:DSS,
  author =       "R. J. Glushko",
  title =        "Designing a service science discipline with
                 discipline",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "1",
  pages =        "15--??",
  month =        jan # "\slash " # mar,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/471/glushko.html",
  acknowledgement = ack-nhfb,
}

@Article{Davis:2008:SSC,
  author =       "M. M. Davis and I. Berdrow",
  title =        "Service science: Catalyst for change in business
                 school curricula",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "1",
  pages =        "29--??",
  month =        jan # "\slash " # mar,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/471/davis.html",
  acknowledgement = ack-nhfb,
}

@Article{Larson:2008:SSI,
  author =       "R. C. Larson",
  title =        "Service science: At the intersection of management,
                 social, and engineering sciences",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "1",
  pages =        "41--??",
  month =        jan # "\slash " # mar,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/471/larson.html",
  acknowledgement = ack-nhfb,
}

@Article{Basole:2008:CSV,
  author =       "R. C. Basole and W. B. Rouse",
  title =        "Complexity of service value networks:
                 Conceptualization and empirical investigation",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "1",
  pages =        "53--??",
  month =        jan # "\slash " # mar,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/471/basole.html",
  acknowledgement = ack-nhfb,
}

@Article{Alter:2008:SSF,
  author =       "S. Alter",
  title =        "Service system fundamentals: Work system, value chain,
                 and life cycle",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "1",
  pages =        "71--??",
  month =        jan # "\slash " # mar,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/471/alter.html",
  acknowledgement = ack-nhfb,
}

@Article{Caswell:2008:EVS,
  author =       "N. S. Caswell and C. Nikolaou and J. Sairamesh and M.
                 Bitsaki and G. D. Koutras and G. Iacovidis",
  title =        "Estimating value in service systems: a case study of
                 a repair service system",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "1",
  pages =        "87--??",
  month =        jan # "\slash " # mar,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/471/caswell.html",
  acknowledgement = ack-nhfb,
}

@Article{Tian:2008:BFB,
  author =       "C. H. Tian and B. K. Ray and J. Lee and R. Cao and W.
                 Ding",
  title =        "{BEAM}: a framework for business ecosystem analysis
                 and modeling",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "1",
  pages =        "101--??",
  month =        jan # "\slash " # mar,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/471/tian.html",
  acknowledgement = ack-nhfb,
}

@Article{Miles:2008:PIS,
  author =       "I. Miles",
  title =        "Patterns of innovation in service industries",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "1",
  pages =        "115--??",
  month =        jan # "\slash " # mar,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  note =         "See erratum \cite{Anonymous:2008:Ea} with corrected
                 Figure 1.",
  URL =          "http://www.research.ibm.com/journal/sj/471/miles.html",
  acknowledgement = ack-nhfb,
}

@Article{Clarke:2008:BSC,
  author =       "R. J. Clarke and A. G. Nilsson",
  title =        "Business services as communication patterns: a work
                 practice approach for analyzing service encounters",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "1",
  pages =        "129--??",
  month =        jan # "\slash " # mar,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/471/clarke.html",
  acknowledgement = ack-nhfb,
}

@Article{Pitkanen:2008:LRT,
  author =       "O. Pitk{\"a}nen and P. Virtanen and J. Kemppinen",
  title =        "Legal research topics in user-centric services",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "1",
  pages =        "143--??",
  month =        jan # "\slash " # mar,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/471/pitkanen.html",
  acknowledgement = ack-nhfb,
}

@Article{Leon:2008:MSP,
  author =       "N. Leon and A. Davies",
  title =        "Managed service paradox",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "1",
  pages =        "153--??",
  month =        jan # "\slash " # mar,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/471/leon.html",
  acknowledgement = ack-nhfb,
}

@Article{Hickey:2008:ISD,
  author =       "J. Hickey and J. Siegel",
  title =        "Improving service delivery through integrated quality
                 initiatives: a case study",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "1",
  pages =        "167--??",
  month =        jan # "\slash " # mar,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/471/hickey.html",
  acknowledgement = ack-nhfb,
}

@Article{Verma:2008:PCC,
  author =       "R. Verma and G. R. Plaschka and B. Hanlon and A.
                 Livingston and K. Kalcher",
  title =        "Predicting customer choice in services using discrete
                 choice analysis",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "1",
  pages =        "179--??",
  month =        jan # "\slash " # mar,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/471/verma.html",
  acknowledgement = ack-nhfb,
}

@Article{Rometty:2008:MSV,
  author =       "Ginni Rometty",
  title =        "Message from the {Senior Vice President, Global
                 Business Services}",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "1",
  pages =        "??--??",
  month =        jan # "\slash " # mar,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/471/message.html",
  acknowledgement = ack-nhfb,
}

@Article{Birman:2008:P,
  author =       "A. Birman and J. J. Ritsko",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "2",
  pages =        "195--??",
  month =        apr # "\slash " # jun,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/472/preface.html",
  acknowledgement = ack-nhfb,
}

@Article{Berry:2008:RSI,
  author =       "R. F. Berry and P. E. McKenney and F. N. Parr",
  title =        "Responsive systems: An introduction",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "2",
  pages =        "197--??",
  month =        apr # "\slash " # jun,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/472/berry.html",
  acknowledgement = ack-nhfb,
}

@Article{Hart:2008:RTL,
  author =       "D. Hart and J. Stultz and T. Ts'o",
  title =        "{Real-time Linux} in real time",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "2",
  pages =        "207--??",
  month =        apr # "\slash " # jun,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/472/hart.html",
  acknowledgement = ack-nhfb,
}

@Article{Guniguntala:2008:RCU,
  author =       "D. Guniguntala and P. E. McKenney and J. Triplett and
                 J. Walpole",
  title =        "The read-copy-update mechanism for supporting
                 real-time applications on shared-memory multiprocessor
                 systems with {Linux}",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "2",
  pages =        "221--??",
  month =        apr # "\slash " # jun,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/472/guniguntala.html",
  acknowledgement = ack-nhfb,
}

@Article{Bauer:2008:TSR,
  author =       "D. Bauer and L. Garc{\'e}s-Erice and S. Rooney and P.
                 Scotton",
  title =        "Toward scalable real-time messaging",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "2",
  pages =        "237--??",
  month =        apr # "\slash " # jun,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/472/bauer.html",
  acknowledgement = ack-nhfb,
}

@Article{Magid:2008:GRT,
  author =       "Y. Magid and D. Oren and D. Botzer and A. Adi and B.
                 Shulman and E. Rabinovich and M. Barnea",
  title =        "Generating real-time complex event-processing
                 applications",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "2",
  pages =        "251--??",
  month =        apr # "\slash " # jun,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/472/magid.html",
  acknowledgement = ack-nhfb,
}

@Article{Astley:2008:PRC,
  author =       "M. Astley and S. Bhola and M. J. Ward and K. Shagin
                 and H. Paz and G. Gershinsky",
  title =        "{Pulsar}: a resource-control architecture for
                 time-critical service-oriented applications",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "2",
  pages =        "265--??",
  month =        apr # "\slash " # jun,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/472/astley.html",
  acknowledgement = ack-nhfb,
}

@Article{Dube:2008:HHM,
  author =       "P. Dube and N. Halim and K. Karenos and M. Kim and Z.
                 Liu and S. Parthasarathy and D. Pendarakis and H.
                 Yang",
  title =        "{Harmony}: Holistic messaging middleware for
                 event-driven systems",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "2",
  pages =        "281--??",
  month =        apr # "\slash " # jun,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/472/dube.html",
  acknowledgement = ack-nhfb,
}

@Article{Chen:2008:DTD,
  author =       "H. Chen and P. B. Chou and N. H. Cohen and S. S. Duri
                 and C. W. Jung",
  title =        "{DRIVE}: a tool for developing, deploying, and
                 managing distributed sensor and actuator applications",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "2",
  pages =        "289--??",
  month =        apr # "\slash " # jun,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/472/chen.html",
  acknowledgement = ack-nhfb,
}

@Article{Selic:2008:APE,
  author =       "B. Selic",
  title =        "Accounting for platform effects in the design of
                 real-time software using model-based methods",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "2",
  pages =        "309--??",
  month =        apr # "\slash " # jun,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/472/selic.html",
  acknowledgement = ack-nhfb,
}

@Article{Sharon:2008:EPN,
  author =       "G. Sharon and O. Etzion",
  title =        "Event-processing network model and implementation",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "2",
  pages =        "321--??",
  month =        apr # "\slash " # jun,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/472/sharon.html",
  acknowledgement = ack-nhfb,
}

@Article{Parr:2008:PRW,
  author =       "F. N. Parr and L. Yusuf",
  title =        "Patterns for real-world-aware and real-time
                 solutions",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "2",
  pages =        "335--??",
  month =        apr # "\slash " # jun,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/472/parr.html",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:2008:Ea,
  author =       "Anonymous",
  title =        "Erratum",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "2",
  pages =        "351--??",
  month =        apr # "\slash " # jun,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  note =         "See \cite{Miles:2008:PIS}.",
  URL =          "http://www.research.ibm.com/journal/sj/472/erratum.html",
  acknowledgement = ack-nhfb,
}

@Article{Kloeckner:2008:MVP,
  author =       "Kristof Kloeckner",
  title =        "Message from the {Vice President of Strategy and
                 Technology, IBM Software Group}",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "2",
  pages =        "??--??",
  month =        apr # "\slash " # jun,
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Mon Jul 7 21:42:12 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/472/message.html",
  acknowledgement = ack-nhfb,
}

@Article{Seidman:2008:P,
  author =       "David Seidman and John J. Ritsko",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "3",
  pages =        "355--356",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:40 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/473/preface.pdf",
  acknowledgement = ack-nhfb,
}

@Article{High:2008:CMC,
  author =       "Rob {High, Jr.} and Gopal Krishnan and Matt Sanchez",
  title =        "Creating and maintaining coherency in loosely coupled
                 systems",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "3",
  pages =        "357--376",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:40 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/473/high.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Arsanjani:2008:SMD,
  author =       "Ali Arsanjani and Shuvanker Ghosh and Abdul Allam and
                 Tina Abdollah and Sella Ganapathy and Kerrie Holley",
  title =        "{SOMA}: a method for developing service-oriented
                 solutions",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "3",
  pages =        "377--396",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:40 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/473/arsanjani.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Zhang:2008:SMP,
  author =       "Liang-Jie Zhang and Nianjun Zhou and Yi-Min Chee and
                 Ahamed Jalaldeen and Karthikeyan Ponnalagu and Renuka
                 R. Sindhgatta and Ali Arsanjani and Fausta Bernardini",
  title =        "{SOMA-ME}: a platform for the model-driven design of
                 {SOA} solutions",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "3",
  pages =        "397--413",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:40 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/473/zhang.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Strosnider:2008:MDS,
  author =       "Jay K. Strosnider and Prabir Nandi and Santhosh
                 Kumaran and Shuvanker Ghosh and Ali Arsnajani",
  title =        "Model-driven synthesis of {SOA} solutions",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "3",
  pages =        "415--432",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:40 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  note =         "See errata \cite{Anonymous:2008:Eb} with a corrected
                 Table 4.",
  URL =          "http://www.research.ibm.com/journal/sj/473/strosnider.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Ramanathan:2008:ITS,
  author =       "Sriram Ramanathan and Michael Alexander and Gordon
                 Kerr",
  title =        "The {IBM} telecommunications service delivery
                 platform",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "3",
  pages =        "433--443",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:40 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/473/ramanathan.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Chen:2008:RAS,
  author =       "Ing-Yi (Eric) Chen and Guo-Kai (Ken) Ni and Chau-Young
                 (Ivan) Lin",
  title =        "A runtime-adaptable service bus design for telecom
                 operations support systems",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "3",
  pages =        "445--456",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:40 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/473/chen.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Li:2008:BPD,
  author =       "Zhong Jie Li and Hua Fang Tan and He Heui Liu and Jun
                 Zhu and Naomi M. Mitsumori",
  title =        "Business-process-driven gray-box {SOA} testing",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "3",
  pages =        "457--472",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:40 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/473/li.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Varadan:2008:IBF,
  author =       "Radhu Varadan and Kishore Channabasavaiah and Siljan
                 Simpson and Kerrie Holley and Abdul Allam",
  title =        "Increasing business flexibility and {SOA} adoption
                 through effective {SOA} governance",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "3",
  pages =        "473--488",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:40 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/473/varadan.pdf",
  acknowledgement = ack-nhfb,
}

@Article{LeBlanc:2008:MGM,
  author =       "Robert LeBlanc",
  title =        "Message from the {General Manager, Global Consulting
                 Services and SOA}",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "3",
  pages =        "??--??",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:40 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/473/message.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Morrill:2008:P,
  author =       "Harriet Morrill and David Seidman and John J. Ritsko",
  title =        "Preface",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "4",
  pages =        "491--491",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:41 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/474/preface.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Morrill:2008:ACA,
  author =       "Harriet Morrill and Mark Beard and David Clitherow",
  title =        "Achieving continuous availability of {IBM} systems
                 infrastructures",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "4",
  pages =        "493--503",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:41 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/474/morrill.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Jews:2008:IPS,
  author =       "Curts Jews and Riaz Ahmad and David H. Surman",
  title =        "{IBM Parallel Sysplex} clustering: Technology options
                 for continuous availability",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "4",
  pages =        "505--518",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:41 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/474/jews.pdf",
  acknowledgement = ack-nhfb,
}

@Article{McLaughlin:2008:IPS,
  author =       "Grant T. McLaughlin and Leo Y. Liu and Daniel J.
                 DeGroff and Kenneth W. Fleck",
  title =        "{IBM Power Systems} platform: Advancements in the
                 state of the art in {IT} availability",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "4",
  pages =        "519--533",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:41 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/474/mclaughlin.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Scadden:2008:RHC,
  author =       "Russell R. Scadden and Richard J. Bogdany and Jade W.
                 Clifford and Herbert D. (Herbie) Pearthree and Richard
                 A. Locke",
  title =        "Resilient hosting in a continuously available
                 virtualized environment",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "4",
  pages =        "535--548",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:41 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/474/scadden.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Radhakrishnan:2008:ISM,
  author =       "Rajesh Radhakrishnan and Kari Mark and Bill Powell",
  title =        "{IT} service management for high availability",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "4",
  pages =        "549--561",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:41 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/474/radhakrishnan.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Clitherow:2008:CHA,
  author =       "David Clitherow and Michael Brookbanks and Nicolas
                 Clayton and Gail Spear",
  title =        "Combining high availability and disaster recovery
                 solutions for critical {IT} environments",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "4",
  pages =        "563--575",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:41 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/474/clitherow.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Bailey:2008:TRE,
  author =       "Dan Bailey and Erwin Frank-Schultz and Pieter Lindeque
                 and Joseph L. {Temple III}",
  title =        "Three reliability engineering techniques and their
                 application to evaluating the availability of {IT}
                 systems: An introduction",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "4",
  pages =        "577--589",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:41 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/474/bailey.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Loveland:2008:LVO,
  author =       "Scott Loveland and Eli M. Dow and Frank LeFevre and
                 Duane Beyer and Philip F. Chan",
  title =        "Leveraging virtualization to optimize
                 high-availability system configurations",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "4",
  pages =        "591--604",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:41 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/474/loveland.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Lumpp:2008:HAD,
  author =       "Thomas Lumpp and Juergen Schneider and Juergen Holtz
                 and Markus Mueller and Norbert Lenz and Ana Biazetti
                 and David Petersen",
  title =        "From high availability and disaster recovery to
                 business continuity solutions",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "4",
  pages =        "605--619",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:41 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/474/lumpp.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Smith:2008:AAB,
  author =       "W. Earl Smith and Kishor S. Trivedi and Lorrie A.
                 Tomek and Jerry Ackaret",
  title =        "Availability analysis of blade server systems",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "4",
  pages =        "621--640",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:41 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/474/smith.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Caffrey:2008:RCP,
  author =       "James M. Caffrey",
  title =        "The resiliency challenge presented by soft failure
                 incidents",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "4",
  pages =        "641--652",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:41 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/474/caffrey.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Heisig:2008:STA,
  author =       "Stephen Heisig and Jonathan R. M. Hosking",
  title =        "Scoring and thresholding for availability",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "4",
  pages =        "653--666",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:41 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/474/heisig.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Haataia:2008:EAS,
  author =       "Bob Haataia and Scott Fredericksen and Eliot Burris
                 and Lauren Bragg and Kent W. Eastley and John Bird",
  title =        "Enhancing availability with service automation and a
                 trusted support partner",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "4",
  pages =        "667--680",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:41 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/474/haataia.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Rooney:2008:ITP,
  author =       "William J. Rooney and Gregory E. McBride and Tariq
                 Hanif",
  title =        "{IBM TotalStorage Productivity Center for Replication
                 for z/OS}",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "4",
  pages =        "681--694",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:41 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/474/rooney.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Cocchiara:2008:DCT,
  author =       "Richard Cocchiara and Hugh Davis and Doug Kinnaird",
  title =        "Data center topologies for mission-critical business
                 systems",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "4",
  pages =        "695--706",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:41 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/474/cocchiara.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:2008:Eb,
  author =       "Anonymous",
  title =        "Errata",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "4",
  pages =        "709--709",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:41 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  note =         "See \cite{Strosnider:2008:MDS}.",
  URL =          "http://www.research.ibm.com/journal/sj/474/errata.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Unland:2008:MVP,
  author =       "Holly D. Unland",
  title =        "Message from the {Vice President, Solutions \& Global
                 Technical Sales, IBM Global Sales \& Distribution}",
  journal =      j-IBM-SYS-J,
  volume =       "47",
  number =       "4",
  pages =        "??--??",
  month =        "????",
  year =         "2008",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 26 15:54:41 MST 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/474/message.pdf",
  acknowledgement = ack-nhfb,
}

%%% ====================================================================
%%% Cross-referenced entries must come last.  They are sorted by year,
%%% and then by citation label, with `bibsort -byyear':
@Book{Swartzlander:1990:CAa,
  author =       "Earl E. {Swartzlander, Jr.}",
  title =        "Computer Arithmetic",
  volume =       "1",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xiii + 378",
  year =         "1990",
  ISBN =         "0-8186-8931-5 (hardcover), 0-8186-5931-9
                 (microfiche)",
  ISBN-13 =      "978-0-8186-8931-4 (hardcover), 978-0-8186-5931-7
                 (microfiche)",
  LCCN =         "QA76.6 .C633 1990",
  bibdate =      "Wed Dec 15 10:43:03 1993",
  bibsource =    "ftp://garbo.uwasa.fi/pc/doc-soft/fpbibl18.zip;
                 http://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 http://www.math.utah.edu/pub/tex/bib/ieeetranscomput1970.bib;
                 http://www.math.utah.edu/pub/tex/bib/master.bib",
  series =       "IEEE Computer Society Press tutorial",
  acknowledgement = ack-nj,
  keywords =     "Computer arithmetic; Electronic digital computers ---
                 Programming; Floating-point arithmetic.",
  remark =       "Vol. 1 is a reprint. Originally published:
                 Stroudsburg, Pa.: Dowden, Hutchinson and Ross, c1980.
                 Originally published in series: Benchmark papers in
                 electrical engineering and computer science; 21. Vol 2
                 is a sequel to the earlier collection. Vol. 1: 2nd
                 ed.",
  tableofcontents = "Series Editor's Foreword / v \\
                 Preface / vii \\
                 Contents by Author / xiii \\
                 Introduction / 1 \\
                 Part I: Overview / 6 \\
                 Editor's / Comments on Papers 1 and 2 / 7 \\
                 1: Shaw, R. F.: Arithmetic Operations in a Binary
                 Computer, Rev. Sci. Instrum. 21:687--693 (1950) / 7 \\
                 2: MacSorley, O. L: High-Speed Arithmetic in Binary
                 Computers, IRE Proc. 49:67--91 (1961) / 14 \\
                 Part II: Addition and Subtraction \\
                 Editor's Comments on Papers 3 Through 10 / 40 \\
                 3: Gilchrist, B., J. H. Pomerene, and S. Y. Wong: Fast
                 Carry Logic for Digital Computers, IRE Trans. Electron.
                 Comput. EC-4:133--136 (1955) / 43 \\
                 4: Weinberger, A., and J. L. Smith: A Logic for
                 High-Speed Addition, Nat. Bur. Stand. Circ. 591, pp.
                 3--12 (1958) / 47 \\
                 5: Sklansky J.: Conditional-Sum Addition Logic, IRE
                 Trans. Electron. Comput. EC-9:226--231 (1960) / 57 \\
                 6: Sklansky J.: An Evaluation of Several Two-Summand
                 Binary Adders / IRE Trans. Electron. Comput.
                 EC-9:213--226 (1960) / 63 \\
                 7: Svoboda, A.: Adder with Distributed Control, IEEE
                 Trans. Comput. C-19: 749--751 (1970) / 77 \\
                 8: Ho, I. T., and T. C. Chen: Multiple Addition by
                 Residue Threshold Functions and Their Representation by
                 Array Logic, IEEE Trans. Comput. C-22:762--767 (1973) /
                 80 \\
                 9: Foster, C C,, and F. D. Stockton: Counting
                 Responders in an Associative Memory, IEEE Trans.
                 Comput. C-20:1580--1583 (1971) / 86 \\
                 10: Swartzlander, E. E., Jr.: Parallel Counters, IEEE
                 Trans. Comput. C-22:1021--1024 (1973) / 90 \\
                 Editor's Comments on Papers 11 Through 20 / 96 \\
                 11: Booth, A, D.: A Signed Binary Multiplication
                 Technique, Q. J. Mech. Appl. Math. 4:236--240 (1951) /
                 100 \\
                 12: Ghest, C.: Multiplying Made Easy for Digital
                 Assemblies, Electronics 44:56--61 (Nov. 22, 1971) / 105
                 \\
                 13: Chen, T. C.: A Binary Multiplication Scheme Based
                 on Squaring, IEEE Trans. Comput. C-20:678--680 (1971) /
                 111 \\
                 14: Wallace, C. S.: A Suggestion for a Fast Multiplier,
                 IEEE Trans. Electron. Comput. EC-13:14--17 (1964) / 114
                 \\
                 15: Dadda, L.: Some Schemes for Parallel Multipliers,
                 Alta Freq. 34:349--356 (1965) / 118 \\
                 16: Dadda, L.: On Parallel Digital Multipliers, Alta
                 Freq. 45:574--580 (1976) / 126 \\
                 17: Stenzel, W. J., W. J. Kubitz, and G. H. Garcia: A
                 Compact High-Speed Parallel Multiplication Scheme, IEEE
                 Trans. Comput. C-26:948--957 (1977) / 133 \\
                 18A: Baugh, C. R., and B. A, Wooley: A Two's Complement
                 Parallel Array Multiplication Algorithm, IEEE Trans.
                 Comput. C-22:1045--1047 (1973) / 143 \\
                 18B: Blankenship, P. E.: Comments on ``A Two's
                 Complement Parallel Array Multiplication Algorithm'',
                 IEEE Trans. Comput. C-23:1327 (1974) / 146 \\
                 19: Swartzlander, E. E., Jr.: The Quasi-Serial
                 Multiplier, IEEE Trans. Comput. C-22:317--321 (1973) /
                 147 \\
                 20: McDaneld, T. G., and R. K. Guha: The Two's
                 Complement Quasi-Serial Multiplier, IEEE Trans. Comput.
                 C-24:1233--1235 (1975) / 152 \\
                 Part IV: Division \\
                 Editor's Comments on Papers 21 Through 26 / 156 \\
                 21: Robertson, J. E.: A New Class of Digital Division
                 Methods, IRE Trans. Electron. Comput. EC-7:218--222
                 (1958) / 159 \\
                 22: Wilson, J. B., and R. S. Ledley: An Algorithm for
                 Rapid Binary Division, IRE Trans. Electron. Comput.
                 EC-10:662--670 (1961) / 164 \\
                 23: Atkins, D. E.: Higher-Radix Division Using
                 Estimates of the Divisor and Partial Remainders, IEEE
                 Trans. Comput. C-17:925--934 (1968) / 173 \\
                 24: Svoboda, A.: An Algorithm for Division, Inf.
                 Process. Mach. 9:25--32 (1963) / 183 \\
                 25: Ferrari, D.: A Division Method Using a Parallel
                 Multiplier, IEEE Trans. Electron. Comput.
                 EC-16:224--226 (1967) / 191 \\
                 26: Flynn, M. J.: On Division by Functional Iteration,
                 IEEE Trans. Comput. C-19:702--706 (1970) / 194 \\
                 Part V: Logarithms \\
                 Editor's Comments on Papers 27 Through 31 / 200 \\
                 27: Combet, M., H. van Zonneveld, and L. Verbeek:
                 Computation of the Base Two Logarithm of Binary
                 Numbers, IEEE Trans. Electron. Comput. EC-14:863--867
                 (1965) / 202 \\
                 28: Marino, D.: New Algorithms for the Approximate
                 Evaluation in Hardware of Binary Logarithms and
                 Elementary Functions IEEE Trans. Comput. C-21:
                 1416--1421 (1972) / 207 \\
                 29: Majithia J. C., and D. Levan: A Note on Base-2
                 Logarithm Computations, IEEE Proc. 61:1519--1520 (1973)
                 / 213 \\
                 30: Kingsbury N. G., and P. J. W. Rayner: Digital
                 Filtering Using Logarithmic Arithmetic, Electron. Lett.
                 7:56--58 (1971) / 215 \\
                 31: Swartzlander E. E., Jr., and A. G. Alexopoulos: The
                 Sign/Logarithm Number System, IEEE Trans. Comput.
                 C-24:1238--1242 (1975) / 218 \\
                 Part VI: Elementary Functions \\
                 Editor's Comments on Papers 32 Through 37 / 224 \\
                 32: Volder, J. E.: The CORDIC Trigonometric Computing
                 Technique, IRE Trans. Electron. Comput. EC-8:330--334
                 (1959) / 226 \\
                 33: Specker W. H.: A Class of Algorithms for Ln $x$,
                 Exp $x$, Sin $x$, Cos $x$, Tan$^{-1}$ $x$, and
                 Cot$^{-1}$ $x$, IEEE Trans. Electron. Comput.
                 EC-14:85--86 (1965) / 231 \\
                 34: Linhardt, R. J., and H. S. Muller: Digit-by-Digit
                 Transcendental-Function Computation RCA Rev. 30:20~247
                 (1969) / 233 \\
                 35: Walther J. S.: A Unified Algorithm for Elementary
                 Functions, Spring Joint Computer Conf., 1971, Proc.,
                 pp. 379--385 / 272 \\
                 36: Ramamoorthy, C. V., J. R. Goodman, and K. H. Kim:
                 Some Properties of Iterative Square-Rooting Methods
                 Using High-Speed Multiplication, IEEE Trans. Comput.
                 C-21: 837--847 (1972) / 279 \\
                 37: Ercegovac M. D.: Radix-16 Evaluation of Certain
                 Elementary Functions, IEEE Trans. Comput. C-22:561--566
                 (1973) / 290 \\
                 Part VII: Floating-Point Arithmetic \\
                 Editor's Comments on Papers 38 Through 42 / 298 \\
                 38: Hamming, R. W.: On the Distribution of Numbers,
                 Bell Syst. Tech. J. 49:1609--1625 (1970) / 300 \\
                 39: Sweeney D. W.: An Analysis of Floating-Point
                 Addition, IBM Syst. J. 4:31--42 (1965) / 317 \\
                 40: Anderson, S. F., J. G. Earler, R. E. Goldschmidt,
                 and D. M. Powers: The IBM System/360 Model 91:
                 Floating-Point Execution Unit, IBM J. Res. Dev.
                 11:34--53 (1967) / 329 \\
                 41: Gosling, J. B.: Design of Large High-Speed Floating
                 Point Arithmetic Units, IEE Proc. 118:493--498 (1971) /
                 349 \\
                 42: Kuck, D. J., D. S. Parker, Jr., and A. H. Sameh:
                 Analysis of Rounding Methods in Floating-Point
                 Arithmetic, IEEE Trans. Comput. C-26:643--650 (1977) /
                 355 \\
                 Bibliography / 363 \\
                 Author Citation Index / 373 \\
                 Subject Index / 377 \\
                 About the Editor / 379",
}