UNICOS

Known as: Cray Linux, Cray Linux Environment 
UNICOS is the name of a range of Unix-like operating system variants developed by Cray for its supercomputers. UNICOS is the successor of the Cray… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1988-2014
012319882014

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
PID (Proportional, Integral and Derivative) is the most used feedback control algorithm in the process control industry. Despite… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2014
2014
Reliability of is of growing concern in computational systems [6]. Studies have shown [7, 3, 5] that memory errors are a major… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2012
2012
The Continuous Process Control package (CPC) is one of the components of the CERN Unified Industrial Control System framework… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
Linux is widely used on high-performance computing (HPC) systems, from commodity clusters to Cray supercomputers (which run the… (More)
  • figure 1
  • figure 2
Is this relevant?
2010
2010
Modern supercomputers are growing in diversity and complexity - the arrival of technologies such as multi-core processors… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Review
1997
Review
1997
Fair Share is the standard scheduling algorithm used for political resource control on large, multi-user UNIX systems. Promising… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
1997
1997
An effective method for detecting computer misuse is the automatic monitoring and analysis of on-line user activity. During the… (More)
  • figure 2-1
  • table 2-2
  • table 2-1
  • table 2-3
  • table 2-5
Is this relevant?
1995
1995
An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity… (More)
Is this relevant?
1995
1995
An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity… (More)
  • figure 4-1
  • figure 4-2
  • figure 4-3
Is this relevant?