Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,980,258 papers from all fields of science
Search
Sign In
Create Free Account
Command (computing)
Known as:
Console command
, Command (computer science)
, Command
Expand
In computing, a command is a directive to a computer program acting as an interpreter of some kind, in order to perform a specific task. Most…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
3D interaction
AlliedWare Plus
Barbie
Batch file
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
End-to-end privacy policy enforcement in cloud infrastructure
S. Betgé-Brezetz
,
Guy-Bertrand Kamga
,
Marie-Pascale Dupont
,
Aoues Guesmi
IEEE 2nd International Conference on Cloud…
2013
Corpus ID: 13216269
Privacy in the cloud is still a strong issue for the large adoption of cloud technologies by enterprises which fear to actually…
Expand
2012
2012
On General Formulas for Generating Sequences of Pythagorean Triples Ordered by C-B
Eduardo Calooy Roque
2012
Corpus ID: 54772670
General formulas for generating sequences of Pythagorean triples ordered by c-b are studied in this paper. As computational proof…
Expand
2010
2010
Unreasonable Accommodation and Due Hardship
Mark C. Weber
2010
Corpus ID: 142868200
This Article analyzes authoritative sources concerning the Americans with Disabilities Act accommodation requirement and…
Expand
2004
2004
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Marek P. Zielinski
Information Security for South Africa
2004
Corpus ID: 2434493
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of…
Expand
2001
2001
Requirements engineering for complex collaborative systems
A. Sutcliffe
Proceedings Fifth IEEE International Symposium on…
2001
Corpus ID: 10979821
A method for analysing requirements for complex sociotechnical systems is described. The method builds on the I* family of models…
Expand
1998
1998
COMMAND AND CONTROL IN AXIOMATIC DESIGN THEORY: ITS ROLE AND PLACEMENT IN THE SYSTEM ARCHITECTURE
J. Hintersteiner
,
D. Tate
1998
Corpus ID: 16814351
This paper describes how system command and control may be integrated into a system architecture. There are two key questions…
Expand
Highly Cited
1996
Highly Cited
1996
Unity-Magnitude Input Shapers and their Relation to Time-Optimal Control
L. Pao
,
W. Singhose
1996
Corpus ID: 12240744
1994
1994
Wind technology development: Large and small turbines
R. Thresher
,
S. Hock
,
R. Loose
,
P. Goldman
1994
Corpus ID: 107956397
Wind technology has been developing rapidly over the last decade. The experience gained in the wind farms of California is being…
Expand
1993
1993
NALIGE: A User Interface Management System for the Development of Natural Language Interfaces
B. Manaris
,
W. D. Dominick
Int. J. Man Mach. Stud.
1993
Corpus ID: 26763314
Abstract One of the major problems encountered by the average computer user is the syntactic inflexibility and linguistic opacity…
Expand
1989
1989
An Attempt to Incorporate Expertise about Users into an Intelligent Interface for Unix
J. Jerrams-Smith
Int. J. Man Mach. Stud.
1989
Corpus ID: 26407132
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE