Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,132,364 papers from all fields of science
Search
Sign In
Create Free Account
Command (computing)
Known as:
Console command
, Command (computer science)
, Command
Expand
In computing, a command is a directive to a computer program acting as an interpreter of some kind, in order to perform a specific task. Most…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
3D interaction
AlliedWare Plus
Barbie
Batch file
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Weakly Supervised Learning of Hidden Markov Models for Spoken Language Acquisition
Vincent Renkens
,
H. V. Hamme
IEEE/ACM Transactions on Audio Speech and…
2017
Corpus ID: 15567318
In this paper, a spoken command and control interface that acquires spoken language through demonstrations from the user is…
Expand
2012
2012
On General Formulas for Generating Sequences of Pythagorean Triples Ordered by C-B
Eduardo Calooy Roque
2012
Corpus ID: 54772670
General formulas for generating sequences of Pythagorean triples ordered by c-b are studied in this paper. As computational proof…
Expand
Review
2012
Review
2012
A Notation Method for Three Dimensional Hand Gesture
Eunjung Choi
,
Heejin Kim
,
M. Chung
2012
Corpus ID: 61338967
Objective: The aim of this study is to suggest a notation method for three-dimensional hand gesture. Background: To match…
Expand
2005
2005
MANAGING PERFORMANCE DEGRADATION IN FAULT TOLERANT CONTROL SYSTEMS
Youmin Zhang
,
Jin Jiang
,
Zhenyu Yang
,
Akbar Hussain
IFAC Proceedings Volumes
2005
Corpus ID: 14420272
Abstract A fault tolerant control system design technique has been proposed and analyzed for managing performance degradation in…
Expand
2004
2004
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Marek P. Zielinski
Information Security for South Africa
2004
Corpus ID: 2434493
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of…
Expand
2001
2001
Requirements engineering for complex collaborative systems
A. Sutcliffe
Proceedings Fifth IEEE International Symposium on…
2001
Corpus ID: 10979821
A method for analysing requirements for complex sociotechnical systems is described. The method builds on the I* family of models…
Expand
2001
2001
Audio-enhanced collaboration at an interactive electronic whiteboard
Christian Muller-Tomfelde
,
S. Steiner
2001
Corpus ID: 15720604
This paper describes an experimental setup to investigate new possibilities to support cooperative work of a team with audio…
Expand
1993
1993
NALIGE: A User Interface Management System for the Development of Natural Language Interfaces
Bill Z. Manaris
,
W. D. Dominick
Int. J. Man Mach. Stud.
1993
Corpus ID: 26763314
Abstract One of the major problems encountered by the average computer user is the syntactic inflexibility and linguistic opacity…
Expand
1977
1977
Statistical Prediction of Programming Errors.
R. Motley
,
W. D. Brooks
1977
Corpus ID: 56583654
Abstract : This report presents and discusses the results obtained for statistical predictions of programming errors using…
Expand
1976
1976
NUL: a Navigational User's Language for a network structured data base
Claude Deheneffe
,
Henri Hennebert
ACM SIGMOD Conference
1976
Corpus ID: 14064127
This paper presents an end-user's language which tries to solve the problem of an easy navigation through a DBTG-like data base…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE