Sciweavers

93 search results - page 2 / 19
» Command line or pretty lines
Sort
View
92
Voted
AAAI
2000
15 years 2 months ago
Predicting UNIX Command Lines: Adjusting to User Patterns
As every user has his own idiosyncrasies and preferences, an interface that is honed for one user may be problematic for another. To accommodate a diverse range of users, many com...
Benjamin Korvemaker, Russell Greiner
90
Voted
DSN
2002
IEEE
15 years 5 months ago
Masquerade Detection Using Truncated Command Lines
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Roy A. Maxion, Tahlia N. Townsend
114
Voted
ICSE
2001
IEEE-ACM
15 years 5 months ago
Generating Wrappers for Command Line Programs: The Cal-Aggie Wrap-O-Matic Project
Software developers writing new software have strong incentives to make their products compliant to standards such as corba, com, and JavaBeans. Standardscompliance facilitates in...
Eric Wohlstadter, Stoney Jackson, Premkumar T. Dev...
81
Voted
CHI
2007
ACM
16 years 1 months ago
Back stage on the front lines: perspectives and performance in the combat information center
While tactical command. control and communication environments might appear to be entirely instrumental in nature, they nevertheless provide a setting for social interaction. This...
Paul M. Aoki
SEAA
2008
IEEE
15 years 7 months ago
GRAIL - A Tool for Accessing and Instrumenting WSRF - compliant Web Services
Grid access methods are still dominated by command line tools or manually developed, problem specific graphical user interfaces. This fact reduces the acceptance of the Grid for ...
Thomas Jejkal, Rainer Stotzka, Michael Sutter