Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,235,072 papers from all fields of science
Search
Sign In
Create Free Account
List of Unix commands
Known as:
Unix commands
, List of Unix programs
, List of Linux programs
Expand
This is a list of Unix commands as specified by IEEE Std 1003.1-2008, which is part of the Single UNIX Specification (SUS). These commands can be…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
AWK
Ar (Unix)
Arbitrary-precision arithmetic
Bc (programming language)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Metamodels for Auto-Generative Learning Objects Dedicated to Unix Operating System Disciplines
Ciprian-Bogdan Chirila
,
Gaultier Parain
International Conference on System Theory…
2018
Corpus ID: 53750865
The currently developing industry demands more and more IT specialists day by day. Many industrial systems are automated using…
Expand
2017
2017
Learning Semantic Correspondences in Technical Documentation
Kyle Richardson
,
Jonas Kuhn
Annual Meeting of the Association for…
2017
Corpus ID: 1100057
We consider the problem of translating high-level textual descriptions to formal representations in technical documentation as…
Expand
2015
2015
Raspberry Pi Touchscreen Tablet (Pi-Pad)
R. Dharmateja
,
Dr. A. Ruhan Bevi
2015
Corpus ID: 62442069
The Raspberry Pi is a credit card sized single-board computer developed in UK by Raspberry Pi foundation with the intention of…
Expand
2013
2013
Incremental Construction of Greibach Normal Form
M. Bals
,
Christina Jansen
,
T. Noll
International Symposium on Theoretical Aspects of…
2013
Corpus ID: 18685603
This paper presents an incremental version of the well-known algorithm for constructing the Greibach normal form (GNF) of a…
Expand
2011
2011
Intrusion Detection with Symbolic Model Verifier
Ines Ben Tekaya
,
Mohamed Graiet
,
B. Ayeb
International Conference on Software Engineering…
2011
Corpus ID: 55353829
Many intrusions came from internal users. This behavior can cause damage without human intervention: viruses, worms, trojan…
Expand
2000
2000
Using Justification Patterns to Advise Novice UNIX Users
A. Quilici
Artificial Intelligence Review
2000
Corpus ID: 11347760
Novice unix users have many incorrect beliefsabout unix commands. An intelligent advisory system for unix should provide…
Expand
1996
1996
Cooperative software agents for the Unix domain
A. Poggi
Knowledge-Based Systems
1996
Corpus ID: 28877633
1991
1991
The HP-ST Toolset
C. Dollin
VDM Europe
1991
Corpus ID: 206636173
The HP-ST toolset allows a specifier to construct a specification document which contains mixed text and HP-SL specifications…
Expand
1989
1989
Program Derivation Using Analogy
M. Harandi
,
S. Bhansali
International Joint Conference on Artificial…
1989
Corpus ID: 18249908
We present a methodology for using analogy to derive programs based on a derivational transformation method. The derived programs…
Expand
1989
1989
POS-formal specification of a Unix tool
Jonathan P. Bowen
Software Engineering Journal
1989
Corpus ID: 38638133
A simple text processing tool which allows positioning of lines within a document is presented using the formal specification…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE