Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,297,622 papers from all fields of science
Search
Sign In
Create Free Account
Command (computing)
Known as:
Console command
, Command (computer science)
, Command
Expand
In computing, a command is a directive to a computer program acting as an interpreter of some kind, in order to perform a specific task. Most…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
3D interaction
AlliedWare Plus
Barbie
Batch file
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
La Mejora Continua de los Procesos en una Organización Fortalecida mediante el uso de Herramientas de Apoyo a la toma de Decisiones
Yailí Pérez Guerra
2016
Corpus ID: 191926462
La practica empresarial ha demostrado que las organizaciones que no se adaptan permanentemente a las necesidades del entorno y…
Expand
2012
2012
On General Formulas for Generating Sequences of Pythagorean Triples Ordered by C-B
Eduardo Calooy Roque
2012
Corpus ID: 54772670
General formulas for generating sequences of Pythagorean triples ordered by c-b are studied in this paper. As computational proof…
Expand
Review
2012
Review
2012
A Notation Method for Three Dimensional Hand Gesture
Eunjung Choi
,
Heejin Kim
,
M. Chung
2012
Corpus ID: 61338967
Objective: The aim of this study is to suggest a notation method for three-dimensional hand gesture. Background: To match…
Expand
2009
2009
Environment stiffness estimation with multiple observers
Fernanda Coutinho
,
R. Cortesão
35th Annual Conference of IEEE Industrial…
2009
Corpus ID: 20070236
When a compliant robotic manipulator interacts with the environment, forces are generated at the contact points, which are a…
Expand
2005
2005
MANAGING PERFORMANCE DEGRADATION IN FAULT TOLERANT CONTROL SYSTEMS
Youmin Zhang
,
Jin Jiang
,
Zhenyu Yang
,
Akbar Hussain
IFAC Proceedings Volumes
2005
Corpus ID: 14420272
Abstract A fault tolerant control system design technique has been proposed and analyzed for managing performance degradation in…
Expand
2004
2004
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Marek P. Zielinski
Information Security for South Africa
2004
Corpus ID: 2434493
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of…
Expand
2001
2001
Audio-enhanced collaboration at an interactive electronic whiteboard
Christian Muller-Tomfelde
,
S. Steiner
2001
Corpus ID: 15720604
This paper describes an experimental setup to investigate new possibilities to support cooperative work of a team with audio…
Expand
1993
1993
NALIGE: A User Interface Management System for the Development of Natural Language Interfaces
Bill Z. Manaris
,
W. D. Dominick
Int. J. Man Mach. Stud.
1993
Corpus ID: 26763314
Abstract One of the major problems encountered by the average computer user is the syntactic inflexibility and linguistic opacity…
Expand
1977
1977
Statistical Prediction of Programming Errors.
R. Motley
,
W. D. Brooks
1977
Corpus ID: 56583654
Abstract : This report presents and discusses the results obtained for statistical predictions of programming errors using…
Expand
1976
1976
NUL: a Navigational User's Language for a network structured data base
Claude Deheneffe
,
Henri Hennebert
ACM SIGMOD Conference
1976
Corpus ID: 14064127
This paper presents an end-user's language which tries to solve the problem of an easy navigation through a DBTG-like data base…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE