Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,182,843 papers from all fields of science
Search
Sign In
Create Free Account
Unix
Known as:
Traditional Unix
, UX
, Truly Unix
Expand
Unix (/ˈjuː.nɪks/; trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
"Classic" Mac OS
ADAPTIVE Communication Environment (ACE)
Aanval
Admon
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Capsicum: Practical Capabilities for UNIX
R. Watson
,
Jonathan Anderson
,
B. Laurie
,
Kristian D. Kennaway
USENIX Security Symposium
2010
Corpus ID: 6836450
Capsicum is a lightweight operating system capability and sandbox framework planned for inclusion in FreeBSD 9. Capsicum extends…
Expand
Highly Cited
2007
Highly Cited
2007
A log buffer-based flash translation layer using fully-associative sector translation
Sang-Won Lee
,
Dong-Joo Park
,
Tae-Sun Chung
,
Dong-Ho Lee
,
Sangwon Park
,
Ha-Joo Song
TECS
2007
Corpus ID: 14494226
Flash memory is being rapidly deployed as data storage for mobile devices such as PDAs, MP3 players, mobile phones, and digital…
Expand
Highly Cited
2003
Highly Cited
2003
GUI ripping: reverse engineering of graphical user interfaces for testing
A. Memon
,
Ishan Banerjee
,
Adithya Nagarajan
10th Working Conference on Reverse Engineering…
2003
Corpus ID: 15594335
Graphical user interfaces (GUIs) are important parts oftoday's software and their correct execution is required toensure the…
Expand
Highly Cited
1998
Highly Cited
1998
Computer Immunology
Mark Burgess
LiSA
1998
Corpus ID: 7731046
Present day computer systems are fragile and unreliable. Human beings are involved in the care and repair of computer systems at…
Expand
Highly Cited
1997
Highly Cited
1997
Learning Patterns from Unix Process Execution Traces for Intrusion Detection
Wenke Lee
,
S. Stolfo
,
P. Chan
1997
Corpus ID: 6617889
In this paper we describe our preliminary experiments to extend the work pioneered by Forrest (see Forrest et al. 1996) on…
Expand
Highly Cited
1993
Highly Cited
1993
USTAT: a real-time intrusion detection system for UNIX
K. Ilgun
Proceedings IEEE Computer Society Symposium on…
1993
Corpus ID: 8144380
The author presents the design and implementation of a real-time intrusion detection tool, called USTAT, a state transition…
Expand
Highly Cited
1992
Highly Cited
1992
The design and implementation of hierarchical software systems with reusable components
D. Batory
,
S. O'Malley
TSEM
1992
Corpus ID: 11871208
We present a domain-independent model of hierarchical software system design and construction that is based on interchangeable…
Expand
Highly Cited
1990
Highly Cited
1990
Amoeba A Distributed Operating System for the 1990 s Sape
S. Mullender
,
G. Rossum
,
A. Tanenbaum
,
R. V. Renesse
,
H. V. Staveren
1990
Corpus ID: 962588
n the nexi decdde, computer prices will drop 50 low that IO, 20, or persystem developed at the Free University and the Centre for…
Expand
Highly Cited
1985
Highly Cited
1985
A trace-driven analysis of the unix 4
J. Ousterhout
,
H. D. Costa
,
David Harrison
,
J. Kunze
,
Michael D. Kupfer
,
J. Thompson
Symposium on Operating Systems Principles
1985
Corpus ID: 60548424
Abstract : We analyzed the UNIX 4.2BSD file system by recording activity in trace files and writing programs to analyze the…
Expand
Highly Cited
1985
Highly Cited
1985
The TimberWolf placement and routing package
Carl Sechen
,
Alberto L. Sangiovanni-Vincentelli
IEEE Journal of Solid-State Circuits
1985
Corpus ID: 8596751
TimberWolf is an integrated set of placement and routing optimization programs. The general combinatorial optimization technique…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE