69 papers:
- CHI-2015-PerraultLBZG #memory management #physics #semantics
- Physical Loci: Leveraging Spatial, Object and Semantic Memory for Command Selection (STP, EL, YPB, SZ, YG), pp. 299–308.
- CHI-2015-XuFTI #named
- GACA: Group-Aware Command-based Arrangement of Graphic Elements (PX, HF, CLT, TI), pp. 2787–2795.
- HCI-IT-2015-KurosawaST #mobile
- Spatial Arrangement of Data and Commands at Bezels of Mobile Touchscreen Devices (TK, BS, JT), pp. 227–237.
- CASE-2014-AfaghaniA #concurrent #online
- Advanced-collision-map-based on-line collision and deadlock avoidance between two robot manipulators with PTP commands (AYA, YA), pp. 1244–1251.
- CHI-2014-GutwinCSMO #performance
- Faster command selection on tablets with FastTap (CG, AC, JS, SM, SCO), pp. 2617–2626.
- CHI-2014-ScarrCGBC #usability
- The usability of CommandMaps in realistic tasks (JS, AC, CG, AB, JC), pp. 2241–2250.
- ICEIS-v3-2014-LaraC #integration #protocol
- A Protocol for Command and Control Systems Integration (PL, RC), pp. 484–489.
- ICPR-2014-BouillonA #classification #evolution #gesture #learning #online
- Supervision Strategies for the Online Learning of an Evolving Classifier for Gesture Commands (MB, ÉA), pp. 2029–2034.
- SAC-2014-ZandVYK #detection
- Extracting probable command and control signatures for detecting botnets (AZ, GV, XY, CK), pp. 1657–1662.
- HPDC-2014-XiaHD #memory management #named
- ConCORD: easily exploiting memory content redundancy through the content-aware service command (LX, KCH, PAD), pp. 25–36.
- ICDAR-2013-BouillonLAR #gesture #learning #using
- Using Confusion Reject to Improve (User and) System (Cross) Learning of Gesture Commands (MB, PL, ÉA, GR), pp. 1017–1021.
- CHI-2013-SerranoLG #gesture
- Bezel-Tap gestures: quick activation of commands from sleep mode on tablets (MS, EL, YG), pp. 3027–3036.
- HCI-IMT-2013-SchwallerBL #gesture #human-computer
- Two Handed Mid-Air Gestural HCI: Point + Command (MS, SB, DL), pp. 388–397.
- CASE-2012-NgoS #composition #design
- Hierarchical control of discrete-event systems: A new command and control design based on feasible system decomposition (QHN, KTS), pp. 674–679.
- CHI-2012-ScarrCGB
- Improving command selection with CommandMaps (JS, AC, CG, AB), pp. 257–266.
- ICPR-2012-Renau-FerrerLDA #database #gesture
- The ILGDB database of realistic pen-based gestural commands (NRF, PL, AD, ÉA), pp. 3741–3744.
- SEKE-2012-ChenL #approach #behaviour #elicitation #ontology #requirements #security
- Eliciting Security Requirements in the Commanded Behavior Frame: An Ontology based Approach (XC, JL), pp. 61–65.
- FSE-2012-Murphy-HillJM #developer #development #recommendation
- Improving software developers’ fluency by recommending development environment commands (ERMH, RJ, GCM), p. 42.
- IFM-J-2009-ColvinH11 #behaviour #csp #semantics #specification #using
- A semantics for Behavior Trees using CSP with specification commands (RC, IJH), pp. 891–914.
- CHI-2011-CohnMPT #gesture #using
- Your noise is my command: sensing gestures using the body as an antenna (GC, DM, SNP, DST), pp. 791–800.
- CHI-2011-MillerDO #categorisation
- Categorization costs for hierarchical keyboard commands (CSM, SD, RCO), pp. 2765–2768.
- DUXU-v2-2011-ReilyB #gesture #interface
- Applying Gestural Interfaces to Command-and-Control (TR, MB), pp. 187–194.
- SAS-2009-Bouissou #algorithm #correctness #implementation #proving
- Proving the Correctness of the Implementation of a Control-Command Algorithm (OB), pp. 102–119.
- CHI-2009-AppertZ #tool support #using
- Using strokes as command shortcuts: cognitive benefits and toolkit support (CA, SZ), pp. 2289–2298.
- DHM-2009-MahmudVLC #ubiquitous
- The Five Commandments of Activity-Aware Ubiquitous Computing Applications (NM, JV, KL, KC), pp. 257–264.
- KEOD-2009-HodickyF
- Decision Support System for a Commander at the Operational Level (JH, PF), pp. 359–362.
- FM-2008-Lecomte #framework #reliability
- Safe and Reliable Metro Platform Screen Doors Control/Command Systems (TL), pp. 430–434.
- CHI-2008-FitzmauriceMKGK #agile #named
- PieCursor: merging pointing and command selection for rapid in-place tool switching (GWF, JM, AK, MG, GK), pp. 1361–1370.
- ITiCSE-2007-Solomon #assessment #named
- Linuxgym: software to automate formative assessment of unix command-line and scripting skills (AS), p. 353.
- AGTIVE-2007-TaentzerCSE #editing #generative
- Generating Domain-Specific Model Editors with Complex Editing Commands (GT, AC, RS, CE), pp. 98–103.
- CHI-2007-KristenssonZ #gesture #using
- Command strokes with and without preview: using pen gestures on keyboard for command selection (POK, SZ), pp. 1137–1146.
- CHI-2007-ThompsonRYB #detection #interface #visual notation
- Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection (RST, EMR, WY, BPB), p. 1205.
- ICEIS-HCI-2007-ArjunanWKY #human-computer #recognition #speech #using
- Silent Bilingual Vowel Recognition — Using fSEMG for HCI based Speech Commands (SPA, HW, DKK, WCY), pp. 68–78.
- ASE-2006-HalfondO #database #testing
- Command-Form Coverage for Testing Database Applications (WGJH, AO), pp. 69–80.
- ICGT-2006-ButtnerG #graph transformation #sequence
- Realizing Graph Transformations by Pre- and Postconditions and Command Sequences (FB, MG), pp. 398–413.
- POPL-2006-SuW #injection #web
- The essence of command injection attacks in web applications (ZS, GW), pp. 372–382.
- WRLA-2004-DuranEL05 #evaluation #maude
- New Evaluation Commands for Maude Within Full Maude (FD, SE, SL), pp. 263–284.
- SOFTVIS-2005-OReillyBM #coordination #visualisation
- The war room command console: shared visualizations for inclusive team coordination (CO, DWB, PJM), pp. 57–65.
- QAPL-2004-HurdMM05 #probability
- Probabilistic Guarded Commands Mechanized in HOL (JH, AM, CM), pp. 95–111.
- CHI-2004-JiangHTL #prototype #scalability #ubiquitous
- Ubiquitous computing for firefighters: field studies and prototypes of large displays for incident command (XJ, JIH, LT, JAL), pp. 679–686.
- SAS-2003-LeeYY #memory management #reuse #source code
- Inserting Safe Memory Reuse Commands into ML-Like Programs (OL, HY, KY), pp. 171–188.
- KDD-2003-BarryZM #architecture #information management #simulation
- Architecting a knowledge discovery engine for military commanders utilizing massive runs of simulations (PSB, JZ, MM), pp. 699–704.
- CHI-2001-BhavnaniRJ #education #identification #using
- Beyond command knowledge: identifying and teaching strategic knowledge for using complex computer applications (SKB, FR, BEJ), pp. 229–236.
- SIGAda-2001-Fassbender #ada #information management #re-engineering #uml #using
- Reengineering an Ada95-programmed command and control information system by using UML (HF), pp. 53–60.
- ICSE-2001-WohlstadterJD #generative #source code
- Generating Wrappers for Command Line Programs: The Cal-Aggie Wrap-O-Matic Project (EW, SJ, PTD), pp. 243–252.
- ICPR-v4-2000-BergasaMGBB #generative #people
- Commands Generation by Face Movements Applied to the Guidance of a Wheelchair for Handicapped People (LMB, MM, AGV, RB, LB), pp. 4660–4663.
- SAC-2000-Dowell #configuration management #constraints #network #performance
- Optimal Configuration of a Command and Control Network: Balancing Performance and Reconfiguration Constraints (LJD), pp. 94–98.
- WICSA-1999-Butler #security
- Security Issues with the Global Command and Control System (GCCS) (SAB), pp. 407–422.
- SIGAda-1999-BuhlerF #ada #corba #framework #independence #information management #java
- Applying Ada, Java and CORBA for making a command and control information system platform independent (GB, HF), pp. 83–88.
- SIGAda-1998-DousetteDJ #using #web
- Command and Control Using World Wide Web Technology (PJD, AD, MJ), pp. 212–214.
- SIGAda-1998-FleenerMS #lightweight #reuse
- A Reusable Lightweight Executive for Command and Control Systems (NF, LM, MS), pp. 81–88.
- EDOC-1998-AagedalM #enterprise #modelling
- Enterprise modelling and QoS for command and control systems (JØA, ZM), pp. 88–101.
- KDD-1998-CarlisSK
- Blurring the Distinction between Command and Data in Scientific KDD (JVC, ES, SK), pp. 154–158.
- KDD-1998-DuMouchelS #algorithm #detection #performance #testing
- A Fast Computer Intrusion Detection Algorithm Based on Hypothesis Testing of Command Transition Probabilities (WD, MS), pp. 189–193.
- VLDB-1997-GinisHKMT #evolution #realtime
- Data Manager for Evolvable Real-time Command and Control Systems (EH, RG, BMT, PCK, JAM), pp. 558–561.
- HCI-SEC-1997-DavisonH #adaptation #interface #towards
- Toward an Adaptive Command Line Interface (BDD, HH), pp. 505–508.
- HCI-SEC-1997-Ntuen #formal method
- A Formal Method for Deriving Command Production Language from Human Intents (CAN), pp. 257–260.
- CHI-1996-MyersK #reuse
- Reusable Hierarchical Command Objects (BAM, DSK), pp. 260–267.
- CHI-1995-NicholsR #alias #automation #generative #motivation
- A Theoretically Motivated Tool for Automatically Generating Command Aliases (SN, FER), pp. 393–400.
- HCI-ACS-1993-InoueN #case study #recognition #sequence
- A Case Study of Plan Recognition: Command Sequences as Acts (YI, MN), pp. 392–397.
- CHI-1991-BrennanDLMSF #interface #question
- Should we or shouldn’t we use spoken commands in voice interfaces? (PB, GD, DL, MM, ECS, MF), pp. 369–372.
- CHI-1990-DillonET #cost analysis
- Measuring the true cost of command selection: techniques and results (RFD, JDE, JWT), pp. 19–26.
- SIGMOD-1986-FrassonE
- Principles of an Icons-Based Command Language (CF, MEr), pp. 144–152.
- ICSE-1984-DeMarcoS #data flow #modula #named
- SYNCRO: A Dataflow Command Shell for the Lilith/Modula Computer (TD, AS), pp. 207–213.
- SIGIR-1983-GellerL #information management #user interface
- User Interfaces to Information Systems: Choices vs. Commands (VJG, ML), pp. 130–135.
- DAC-1982-Price #design
- Design of command menus for CAD systems (LAP), pp. 453–459.
- VDM-1978-Bjorner78a #abstraction #operating system #pl-i #specification #tutorial
- Software Abstraction Principles: Tutorial Examples of: An Operating System Command Language Specification, and a PL/I-like On-Condition Language Definition (DB), pp. 337–374.
- ICSE-1976-Mashey #programming language #using
- Using a Command Language as a High-Level Programming Language (JRM), pp. 169–176.
- SOSP-1973-Stephenson #on the
- On the Structure and Control of Commands (CJS), pp. 22–26.