Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,115,609 papers from all fields of science
Search
Sign In
Create Free Account
Command (computing)
Known as:
Console command
, Command (computer science)
, Command
Expand
In computing, a command is a directive to a computer program acting as an interpreter of some kind, in order to perform a specific task. Most…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
3D interaction
AlliedWare Plus
Barbie
Batch file
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A three dimensional adaptive multiscale method for crack growth in Silicon
P. Budarapu
,
B. Javvaji
,
J. Reinoso
,
M. Paggi
,
T. Rabczuk
Theoretical and applied fracture mechanics (Print…
2018
Corpus ID: 73696054
2012
2012
On General Formulas for Generating Sequences of Pythagorean Triples Ordered by C-B
Eduardo Calooy Roque
2012
Corpus ID: 54772670
General formulas for generating sequences of Pythagorean triples ordered by c-b are studied in this paper. As computational proof…
Expand
2010
2010
Unreasonable Accommodation and Due Hardship
Mark C. Weber
2010
Corpus ID: 142868200
This Article analyzes authoritative sources concerning the Americans with Disabilities Act accommodation requirement and…
Expand
2004
2004
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Marek P. Zielinski
Information Security for South Africa
2004
Corpus ID: 2434493
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of…
Expand
2001
2001
Requirements engineering for complex collaborative systems
A. Sutcliffe
Proceedings Fifth IEEE International Symposium on…
2001
Corpus ID: 10979821
A method for analysing requirements for complex sociotechnical systems is described. The method builds on the I* family of models…
Expand
1998
1998
COMMAND AND CONTROL IN AXIOMATIC DESIGN THEORY: ITS ROLE AND PLACEMENT IN THE SYSTEM ARCHITECTURE
J. Hintersteiner
,
D. Tate
1998
Corpus ID: 16814351
This paper describes how system command and control may be integrated into a system architecture. There are two key questions…
Expand
Highly Cited
1995
Highly Cited
1995
Vibration Reduction Using Multi-Hump Extra-Insensitive Input Shapers
W. Singhose
,
L. Porter
,
N. Singer
1995
Corpus ID: 14527149
Input shaping is a method for reducing residual vibrations in computer controlled machines. Vibration is eliminated by convolving…
Expand
1993
1993
NALIGE: A User Interface Management System for the Development of Natural Language Interfaces
B. Manaris
,
W. D. Dominick
Int. J. Man Mach. Stud.
1993
Corpus ID: 26763314
Abstract One of the major problems encountered by the average computer user is the syntactic inflexibility and linguistic opacity…
Expand
1993
1993
OS Agents: Using AI Techniques in the Operating System Environment
Oren Etzioni
,
H. Levy
,
Richard B. Segal
,
C. A. Thekkath
1993
Corpus ID: 11991416
While recent decades have brought substantial change to the form of the operating system interface, the power of operating system…
Expand
1989
1989
An Attempt to Incorporate Expertise about Users into an Intelligent Interface for Unix
J. Jerrams-Smith
Int. J. Man Mach. Stud.
1989
Corpus ID: 26407132
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required