default search action
IBM Systems Journal, Volume 40, 2001
Volume 40, Number 1, 2001
- John J. Ritsko, Alfred G. Davis:
Preface. 2-3 - Rodney A. Smith:
Trends in e-business technologies. 4-7 - Greg Flurry, Wayne Vicknair:
The IBM Application Framework for e-business. 8-24 - Donald F. Ferguson, Rainer Kerth:
WebSphere as an e-business server. 25-45 - Andrew Bainbridge, John Colgrave, Adrian M. Colyer, Glyn Normington:
CICS and Enterprise JavaBeans. 46-67 - Asit Dan, Daniel M. Dias, Robert D. Kearney, Terry C. Lau, Thao Nguyen, Francis N. Parr, Martin W. Sachs, Hidayatullah Shaikh:
Business-to-business integration with tpaML and a business-to-business protocol framework. 68-90 - John J. Rofrano:
IBM WebSphere Commerce Suite Product Advisor. 91-103 - Heather Kreger:
Java Management Extensions for application management. 104-129 - Larry Koved, Anthony J. Nadalin, Nataraj Nagaratnam, Marco Pistoia, Theodore Shrader:
Security challenges for Enterprise Java in an e-business environment. 130-152 - Kathryn Heninger Britton, Ralph Case, Andrew Citron, Richard A. Floyd, Yongcheng Li, Christopher Seekamp, Brad Topol, Karen M. Tracey:
Transcoding: Extending e-business to new environments. 153-178 - Steven Ihde, Paul P. Maglio, Jörg Meyer, Rob Barrett:
Intermediary-based transcoding framework. 179-192 - Stefan G. Hild, Carl Binding, Daniela Bourges-Waldegg, Céline Steenkeste:
Application hosting for pervasive computing. 193-219 - Stephen H. Kan, Jerry Parrish, Diane Manlove:
In-process metrics for software testing. 220-241
Volume 40, Number 2, 2001
- Caroline A. Kovac:
Message from the Vice President, Life Sciences Solutions. - John J. Ritsko, Marilyn L. Bates:
Preface. 247 - William C. Swope:
Deep computing for the life sciences. 248-264 - Teresa Head-Gordon, John C. Wooley:
Computational challenges in structural and functional genomics. 265-296 - Yong Duan, Peter A. Kollman:
Computational protein folding: From lattice to all-atom. 297-309 - Frances E. Allen, George S. Almási, Wanda Andreoni, Daniel K. Beece, Bruce J. Berne, Arthur A. Bright, José R. Brunheroto, Calin Cascaval, José G. Castaños, Paul Coteus, Paul Crumley, Alessandro Curioni, Monty Denneau, Wilm E. Donath, Maria Eleftheriou, Blake G. Fitch, Bruce M. Fleischer, Christos J. Georgiou, Robert S. Germain, Mark Giampapa, Donna L. Gresh, Manish Gupta, Ruud A. Haring, C. T. Howard Ho, Peter H. Hochschild, Susan Flynn Hummel, Tiziana Jonas, Derek Lieber, Glenn J. Martyna, Kiran K. Maturu, José E. Moreira, Dennis M. Newns, Matthew Newton, Robert Philhower, Thomas Picunko, Jed W. Pitera, Michael Pitman, Rick A. Rand, Ajay K. Royyuru, Valentina Salapura, Alda Sanomiya, Rahul S. Shah, Yuk Yin Sham, Sarabjeet Singh, Marc Snir, Frank Suits, Richard A. Swetz, William C. Swope, Nagesh K. Vishnumurthy, T. J. Christopher Ward, Henry S. Warren Jr., Ruhong Zhou:
Blue Gene: A vision for protein science using a petaflop supercomputer. 310-327 - Tjerk P. Straatsma, James Andrew McCammon:
Load balancing of molecular dynamics simulation with NWChem. 328-341 - Raimond L. Winslow, David F. Scollan, Joseph L. Greenstein, Christina K. Yung, William Baumgartner Jr., Gyan Bhanot, Donna L. Gresh, Bernice E. Rogowitz:
Mapping, modeling, and visual exploration of structure-function relationships in the heart. 342-359 - Bohdan Waszkowycz, Tim D. J. Perkins, Richard A. Sykes, Jin Li:
Large-scale virtual screening for discovering leads in the postgenomic era. 360-378 - Agatha H. Liu, Andrea Califano:
Functional classification of proteins by pattern discovery and top-down clustering of primary sequences. 379-393 - Igor Jurisica, Patrick Rogers, Janice I. Glasgow, Suzanne Fortier, Joseph R. Luft, Jennifer R. Wolfley, Melissa A. Bianca, Daniel R. Weeks, George T. DeTitta:
Intelligent decision support for protein crystal growth. 394-409 - Naomi Siew, Daniel Fischer:
Convergent evolution of protein structure prediction and computer chess tournaments: CASP, Kasparov, and CAFASP. 410-425 - Jason Tsong-Li Wang, Qicheng Ma, Dennis E. Shasha, Cathy H. Wu:
New techniques for extracting features from protein sequences. 426-441 - Barry Robson:
Fastfinger: A study into the use of compressed residue pair separation matrices for protein sequence comparison. 442-463 - Jeff T. Inman, H. Raul Flores, Gregory D. May, Jennifer W. Weller, Callum J. Bell:
A high-throughput distributed DNA sequence analysis and database system. 464-488 - Laura M. Haas, Peter M. Schwarz, Prasad Kodali, Elon Kotlar, Julia E. Rice, William C. Swope:
DiscoveryLink: A system for integrated access to life sciences data sources. 489-511 - Susan B. Davidson, Jonathan Crabtree, Brian P. Brunk, Jonathan Schug, Val Tannen, G. Christian Overton, Christian J. Stoeckert Jr.:
K2/Kleisli and GUS: Experiments in integrated access to genomic data sources. 512-531 - Carole A. Goble, Robert Stevens, Gary Ng, Sean Bechhofer, Norman W. Paton, Patricia G. Baker, Martin Peim, Andy Brass:
Transparent access to multiple bioinformatics information sources. 532-551 - Harry Mangalam, Jason E. Stewart, Jiaye Zhou, Karen Schlauch, Mark E. Waugh, Guanghong Chen, Andrew D. Farmer, Greg Colello, Jennifer W. Weller:
GeneX: An Open Source gene expression database and integrated tool set. 552-569 - Adam C. Siepel, Andrew N. Tolopko, Andrew D. Farmer, Peter A. Steadman, Faye D. Schilkey, B. Dawn Perry, William D. Beavis:
An integration platform for heterogeneous bioinformatics software components. 570-591 - Christopher Lee, Kris Irizarry:
The GeneMine system for genome/proteome annotation and collaborative data mining. 592-611
Volume 40, Number 3, 2001
- John J. Ritsko, Marilyn L. Bates:
Preface. 612-613 - Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle:
Enhancing security and privacy in biometrics-based authentication systems. 614-634 - Ernst-Michael (Mike) Hamann, Horst Henn, Thomas Schäck, Frank Seliger:
Securing e-business applications using smart. 635-647 - Messaoud Benantar:
The Internet public key infrastructure. 648-665 - Reinhardt A. Botha, Jan H. P. Eloff:
Separation of duties for access control enforcement in workflow environments. 666-682 - Sean W. Smith, David Safford:
Practical server privacy with secure coprocessors. 683-695 - Richard L. Guski, John C. Dayka, Linda N. Distel, Walter B. Farrell, Karen A. Gdaniec, Michael J. Kelly, Mark A. Nelson, Linwood H. Overby, Linwood G. Robinson:
Security on z/OS: Comprehensive, current, and flexible. 696-720 - Pau-Chen Cheng:
An architecture for the Internet Key Exchange Protocol. 721-746 - James J. Whitmore:
A method for designing secure solutions. 747-768 - Charles C. Palmer:
Ethical hacking. 769-780 - Windsor W. Hsu, Alan Jay Smith, Honesty C. Young:
Characteristics of production database workloads and the TPC benchmarks. 781-802
Volume 40, Number 4, 2001
- John J. Ritsko, Alexander Birman:
Preface. 812-813 - Alan D. Marwick:
Knowledge management technology. 814-830 - Eric L. Lesser, John Storck:
Communities of practice and organizational performance. 831-841 - Patricia Gongla, Christine R. Rizzuto:
Evolving communities of practice: IBM Global Services experience. 842-862 - John C. Thomas, Wendy A. Kellogg, Thomas Erickson:
The knowledge management puzzle: Human and social factors in knowledge management. 863-884 - Gunter Dueck:
Views of knowledge are human views. 885-888 - Liam Fahey, Rajendra K. Srivastava, Joyce Shems Sharon, David E. Smith:
Linking e-business and operating processes: The role of knowledge management. 889-907 - Salvatore Parise, John C. Henderson:
Knowledge resource exchange in strategic alliances. 908-924 - Robert Mack, Yael Ravin, Roy J. Byrd:
Knowledge portals and the emerging digital knowledge workplace. 925-955 - Wendi Pohs, Gary Pinder, Christopher Dougherty, Marianne White:
The Lotus Knowledge Discovery System: Tools and experiences. 956-966 - Tetsuya Nasukawa, Tohru Nagano:
Text analysis and knowledge mining system. 967-984 - Eric W. Brown, Savitha Srinivasan, Anni Coden, Dulce B. Ponceleon, James W. Cooper, Arnon Amir:
Toward speech as a knowledge resource. 985-1001 - Laurence Prusak:
Where did knowledge management come from?. 1002-1007
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.