Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,184,904 papers from all fields of science
Search
Sign In
Create Free Account
Parent process
Known as:
Parent (disambiguation)
, Process
In computing, a parent process is a process that has created one or more child processes.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Cd (command)
Child process
Computer multitasking
DNET
Expand
Broader (1)
Process (computing)
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Interacting cluster point process model for epidermal nerve fibers
N. Garcia
,
P. Guttorp
,
Guilherme Ludwig
Spatial Statistics
2020
Corpus ID: 213576687
2019
2019
Meta Distribution of SIR in Large-Scale Uplink and Downlink NOMA Networks
Mohammad Salehi
,
H. Tabassum
,
Ekram Hossain
IEEE Transactions on Communications
2019
Corpus ID: 263874390
We develop an analytical framework to derive the meta distribution and moments of the conditional success probability (CSP…
Expand
2018
2018
Double Cox cluster processes — with applications to photoactivated localization microscopy
Ina Trolle Andersen
,
U. Hahn
,
E. C. Arnspang
,
L. N. Nejsum
,
E. B. Jensen
Spatial Statistics
2018
Corpus ID: 125167367
2015
2015
Reconstructing Tabbed Browser Sessions Using Metadata Associations for Multi-Threaded Browser Implementation
S. Raghavan
2015
Corpus ID: 20780973
Today, Internet browsers support multiple browser tabs, each browser tab capable of initiating & maintaining a separate web…
Expand
Review
2011
Review
2011
Maintaining Access with Backdoors and Rootkits
P. Engebretson
2011
Corpus ID: 63035066
2011
2011
On Maintaining Consistency of Process Model Variants
Emilian Pascalau
,
Ahmed Awad
,
Sherif Sakr
,
M. Weske
Business Process Management Workshops
2011
Corpus ID: 14777346
Today’s enterprises are dynamic where many variances of business process models can exist due to several reasons such as: the…
Expand
2008
2008
CAN ONE SEE A COMPETITION BETWEEN SUBDIFFUSION AND LÈVY FLIGHTS? A CASE OF GEOMETRIC-STABLE NOISE ∗
K. Burnecki
,
J. Janczura
,
M. Magdziarz
,
A. Weron
,
H. Steinhaus
2008
Corpus ID: 52268558
Competition between subdiffusion and Levy flights is conveniently described by the fractional Fokker–Planck equation with…
Expand
2008
2008
The SAS ® Terminator: An Ultimate Killer of UNIX Processes
Houliang Li
2008
Corpus ID: 17989546
As a UNIX SAS user, you may not realize that when your SAS program terminates, whether voluntarily or by external force, it may…
Expand
2006
2006
Preventing Secret Leakage from fork(): Securing Privilege-Separated Applications
U. Shankar
,
D. Wagner
IEEE International Conference on Communications
2006
Corpus ID: 7332910
If trusted processes' secrets or privileged system objects such as file handles are leaked to an untrusted process, the result…
Expand
2003
2003
Nethost-sensor: a novel concept in intrusion detection systems
A. Abimbola
,
Q. Shi
,
M. Merabti
Proceedings of the Eighth IEEE Symposium on…
2003
Corpus ID: 9166882
An intrusion detection systems (IDS) main purpose is to monitor a resource and notify someone in the event of a specific…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE