Access Restriction

Author Ivie, E. L. ♦ Ryder, J. L. ♦ Wehr, L. A. ♦ Canaday, R. H. ♦ Harrison, R. D.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Subject Keyword Data base protection ♦ Computer configurations ♦ Data base portability ♦ Information retrieval ♦ Computer networks ♦ Data base management ♦ Data base task group language ♦ Back-end computer
Abstract It is proposed that the data base management function be placed on a dedicated back-end computer which accepts commands (in a relatively high level language such as the CODASYL Data Base Task Group, April 1971 Report) from a host computer, accesses the data base on secondary storage, and returns results. The advantages of such a configuration are discussed. An experimental implementation, called the eXperimental Data Management System, XDMS, is described and certain conclusions about the back-end approach are drawn from this implementation.
Description Affiliation: Bell Lab, New Brunswick, NJ (Canaday, R. H.; Harrison, R. D.; Ivie, E. L.; Ryder, J. L.; Wehr, L. A.)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 17
Issue Number 10
Page Count 8
Starting Page 575
Ending Page 582

Open content in new tab

   Open content in new tab
Source: ACM Digital Library