BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
control (16)
system (15)
use (11)
base (8)
gestur (8)

Stem command$ (all stems)

69 papers:

CHICHI-2015-PerraultLBZG #memory management #physics #semantics
Physical Loci: Leveraging Spatial, Object and Semantic Memory for Command Selection (STP, EL, YPB, SZ, YG), pp. 299–308.
CHICHI-2015-XuFTI #named
GACA: Group-Aware Command-based Arrangement of Graphic Elements (PX, HF, CLT, TI), pp. 2787–2795.
HCIHCI-IT-2015-KurosawaST #mobile
Spatial Arrangement of Data and Commands at Bezels of Mobile Touchscreen Devices (TK, BS, JT), pp. 227–237.
CASECASE-2014-AfaghaniA #concurrent #online
Advanced-collision-map-based on-line collision and deadlock avoidance between two robot manipulators with PTP commands (AYA, YA), pp. 1244–1251.
CHICHI-2014-GutwinCSMO #performance
Faster command selection on tablets with FastTap (CG, AC, JS, SM, SCO), pp. 2617–2626.
CHICHI-2014-ScarrCGBC #usability
The usability of CommandMaps in realistic tasks (JS, AC, CG, AB, JC), pp. 2241–2250.
ICEISICEIS-v3-2014-LaraC #integration #protocol
A Protocol for Command and Control Systems Integration (PL, RC), pp. 484–489.
ICPRICPR-2014-BouillonA #classification #evolution #gesture #learning #online
Supervision Strategies for the Online Learning of an Evolving Classifier for Gesture Commands (MB, ÉA), pp. 2029–2034.
SACSAC-2014-ZandVYK #detection
Extracting probable command and control signatures for detecting botnets (AZ, GV, XY, CK), pp. 1657–1662.
HPDCHPDC-2014-XiaHD #memory management #named
ConCORD: easily exploiting memory content redundancy through the content-aware service command (LX, KCH, PAD), pp. 25–36.
ICDARICDAR-2013-BouillonLAR #gesture #learning #using
Using Confusion Reject to Improve (User and) System (Cross) Learning of Gesture Commands (MB, PL, ÉA, GR), pp. 1017–1021.
CHICHI-2013-SerranoLG #gesture
Bezel-Tap gestures: quick activation of commands from sleep mode on tablets (MS, EL, YG), pp. 3027–3036.
HCIHCI-IMT-2013-SchwallerBL #gesture #human-computer
Two Handed Mid-Air Gestural HCI: Point + Command (MS, SB, DL), pp. 388–397.
CASECASE-2012-NgoS #composition #design
Hierarchical control of discrete-event systems: A new command and control design based on feasible system decomposition (QHN, KTS), pp. 674–679.
CHICHI-2012-ScarrCGB
Improving command selection with CommandMaps (JS, AC, CG, AB), pp. 257–266.
ICPRICPR-2012-Renau-FerrerLDA #database #gesture
The ILGDB database of realistic pen-based gestural commands (NRF, PL, AD, ÉA), pp. 3741–3744.
SEKESEKE-2012-ChenL #approach #behaviour #elicitation #ontology #requirements #security
Eliciting Security Requirements in the Commanded Behavior Frame: An Ontology based Approach (XC, JL), pp. 61–65.
FSEFSE-2012-Murphy-HillJM #developer #development #recommendation
Improving software developers’ fluency by recommending development environment commands (ERMH, RJ, GCM), p. 42.
IFMIFM-J-2009-ColvinH11 #behaviour #csp #semantics #specification #using
A semantics for Behavior Trees using CSP with specification commands (RC, IJH), pp. 891–914.
CHICHI-2011-CohnMPT #gesture #using
Your noise is my command: sensing gestures using the body as an antenna (GC, DM, SNP, DST), pp. 791–800.
CHICHI-2011-MillerDO #categorisation
Categorization costs for hierarchical keyboard commands (CSM, SD, RCO), pp. 2765–2768.
HCIDUXU-v2-2011-ReilyB #gesture #interface
Applying Gestural Interfaces to Command-and-Control (TR, MB), pp. 187–194.
SASSAS-2009-Bouissou #algorithm #correctness #implementation #proving
Proving the Correctness of the Implementation of a Control-Command Algorithm (OB), pp. 102–119.
CHICHI-2009-AppertZ #tool support #using
Using strokes as command shortcuts: cognitive benefits and toolkit support (CA, SZ), pp. 2289–2298.
HCIDHM-2009-MahmudVLC #ubiquitous
The Five Commandments of Activity-Aware Ubiquitous Computing Applications (NM, JV, KL, KC), pp. 257–264.
KEODKEOD-2009-HodickyF
Decision Support System for a Commander at the Operational Level (JH, PF), pp. 359–362.
FMFM-2008-Lecomte #framework #reliability
Safe and Reliable Metro Platform Screen Doors Control/Command Systems (TL), pp. 430–434.
CHICHI-2008-FitzmauriceMKGK #agile #named
PieCursor: merging pointing and command selection for rapid in-place tool switching (GWF, JM, AK, MG, GK), pp. 1361–1370.
ITiCSEITiCSE-2007-Solomon #assessment #named
Linuxgym: software to automate formative assessment of unix command-line and scripting skills (AS), p. 353.
AGTIVEAGTIVE-2007-TaentzerCSE #editing #generative
Generating Domain-Specific Model Editors with Complex Editing Commands (GT, AC, RS, CE), pp. 98–103.
CHICHI-2007-KristenssonZ #gesture #using
Command strokes with and without preview: using pen gestures on keyboard for command selection (POK, SZ), pp. 1137–1146.
CHICHI-2007-ThompsonRYB #detection #interface #visual notation
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection (RST, EMR, WY, BPB), p. 1205.
ICEISICEIS-HCI-2007-ArjunanWKY #human-computer #recognition #speech #using
Silent Bilingual Vowel Recognition — Using fSEMG for HCI based Speech Commands (SPA, HW, DKK, WCY), pp. 68–78.
ASEASE-2006-HalfondO #database #testing
Command-Form Coverage for Testing Database Applications (WGJH, AO), pp. 69–80.
ICGTICGT-2006-ButtnerG #graph transformation #sequence
Realizing Graph Transformations by Pre- and Postconditions and Command Sequences (FB, MG), pp. 398–413.
POPLPOPL-2006-SuW #injection #web
The essence of command injection attacks in web applications (ZS, GW), pp. 372–382.
WRLAWRLA-2004-DuranEL05 #evaluation #maude
New Evaluation Commands for Maude Within Full Maude (FD, SE, SL), pp. 263–284.
SOFTVISSOFTVIS-2005-OReillyBM #coordination #visualisation
The war room command console: shared visualizations for inclusive team coordination (CO, DWB, PJM), pp. 57–65.
QAPLQAPL-2004-HurdMM05 #probability
Probabilistic Guarded Commands Mechanized in HOL (JH, AM, CM), pp. 95–111.
CHICHI-2004-JiangHTL #prototype #scalability #ubiquitous
Ubiquitous computing for firefighters: field studies and prototypes of large displays for incident command (XJ, JIH, LT, JAL), pp. 679–686.
SASSAS-2003-LeeYY #memory management #reuse #source code
Inserting Safe Memory Reuse Commands into ML-Like Programs (OL, HY, KY), pp. 171–188.
KDDKDD-2003-BarryZM #architecture #information management #simulation
Architecting a knowledge discovery engine for military commanders utilizing massive runs of simulations (PSB, JZ, MM), pp. 699–704.
CHICHI-2001-BhavnaniRJ #education #identification #using
Beyond command knowledge: identifying and teaching strategic knowledge for using complex computer applications (SKB, FR, BEJ), pp. 229–236.
AdaSIGAda-2001-Fassbender #ada #information management #re-engineering #uml #using
Reengineering an Ada95-programmed command and control information system by using UML (HF), pp. 53–60.
ICSEICSE-2001-WohlstadterJD #generative #source code
Generating Wrappers for Command Line Programs: The Cal-Aggie Wrap-O-Matic Project (EW, SJ, PTD), pp. 243–252.
ICPRICPR-v4-2000-BergasaMGBB #generative #people
Commands Generation by Face Movements Applied to the Guidance of a Wheelchair for Handicapped People (LMB, MM, AGV, RB, LB), pp. 4660–4663.
SACSAC-2000-Dowell #configuration management #constraints #network #performance
Optimal Configuration of a Command and Control Network: Balancing Performance and Reconfiguration Constraints (LJD), pp. 94–98.
WICSAWICSA-1999-Butler #security
Security Issues with the Global Command and Control System (GCCS) (SAB), pp. 407–422.
AdaSIGAda-1999-BuhlerF #ada #corba #framework #independence #information management #java
Applying Ada, Java and CORBA for making a command and control information system platform independent (GB, HF), pp. 83–88.
AdaSIGAda-1998-DousetteDJ #using #web
Command and Control Using World Wide Web Technology (PJD, AD, MJ), pp. 212–214.
AdaSIGAda-1998-FleenerMS #lightweight #reuse
A Reusable Lightweight Executive for Command and Control Systems (NF, LM, MS), pp. 81–88.
EDOCEDOC-1998-AagedalM #enterprise #modelling
Enterprise modelling and QoS for command and control systems (JØA, ZM), pp. 88–101.
KDDKDD-1998-CarlisSK
Blurring the Distinction between Command and Data in Scientific KDD (JVC, ES, SK), pp. 154–158.
KDDKDD-1998-DuMouchelS #algorithm #detection #performance #testing
A Fast Computer Intrusion Detection Algorithm Based on Hypothesis Testing of Command Transition Probabilities (WD, MS), pp. 189–193.
VLDBVLDB-1997-GinisHKMT #evolution #realtime
Data Manager for Evolvable Real-time Command and Control Systems (EH, RG, BMT, PCK, JAM), pp. 558–561.
HCIHCI-SEC-1997-DavisonH #adaptation #interface #towards
Toward an Adaptive Command Line Interface (BDD, HH), pp. 505–508.
HCIHCI-SEC-1997-Ntuen #formal method
A Formal Method for Deriving Command Production Language from Human Intents (CAN), pp. 257–260.
CHICHI-1996-MyersK #reuse
Reusable Hierarchical Command Objects (BAM, DSK), pp. 260–267.
CHICHI-1995-NicholsR #alias #automation #generative #motivation
A Theoretically Motivated Tool for Automatically Generating Command Aliases (SN, FER), pp. 393–400.
HCIHCI-ACS-1993-InoueN #case study #recognition #sequence
A Case Study of Plan Recognition: Command Sequences as Acts (YI, MN), pp. 392–397.
CHICHI-1991-BrennanDLMSF #interface #question
Should we or shouldn’t we use spoken commands in voice interfaces? (PB, GD, DL, MM, ECS, MF), pp. 369–372.
CHICHI-1990-DillonET #cost analysis
Measuring the true cost of command selection: techniques and results (RFD, JDE, JWT), pp. 19–26.
SIGMODSIGMOD-1986-FrassonE
Principles of an Icons-Based Command Language (CF, MEr), pp. 144–152.
ICSEICSE-1984-DeMarcoS #data flow #modula #named
SYNCRO: A Dataflow Command Shell for the Lilith/Modula Computer (TD, AS), pp. 207–213.
SIGIRSIGIR-1983-GellerL #information management #user interface
User Interfaces to Information Systems: Choices vs. Commands (VJG, ML), pp. 130–135.
DACDAC-1982-Price #design
Design of command menus for CAD systems (LAP), pp. 453–459.
FMVDM-1978-Bjorner78a #abstraction #operating system #pl-i #specification #tutorial
Software Abstraction Principles: Tutorial Examples of: An Operating System Command Language Specification, and a PL/I-like On-Condition Language Definition (DB), pp. 337–374.
ICSEICSE-1976-Mashey #programming language #using
Using a Command Language as a High-Level Programming Language (JRM), pp. 169–176.
SOSPSOSP-1973-Stephenson #on the
On the Structure and Control of Commands (CJS), pp. 22–26.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.