A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Working with Unix Tools
2005
IEEE Software
You might want to process only some parts of
Working with Unix Tools Diomidis Spinellis A successful [software] tool is one that was used to do something undreamed of by its author. -Stephen C. ...
If you're working with files grouped into an archive, a command like tar, jar, or ar will list the archive's contents. ...
doi:10.1109/ms.2005.170
fatcat:n7axbyuzgbd73dguynla6j455a
Comprehensive Comparison of Cloud-Based NGS Data Analysis and Alignment Tools
2020
Informatics in Medicine Unlocked
This work provides a comprehensive investigation of cloud-based NGS data analysis and alignment tools, both the commercial and the open-source tools. ...
Moreover, we extensively analyze and classify the studied NGS data analysis and alignment tools to help NGS biomedical researchers and clinicians in finding appropriate tools for their work, while understanding ...
As shown in Tables 2 and 3, all of the desktop versions of the open-source tools work with the Linux/Unix operating system. ...
doi:10.1016/j.imu.2020.100296
fatcat:kttqpcwljrelfiahmj66nudco4
Linux Online Virtual Environments in Teaching Operating Systems
2020
International Conference on Information and Communication Technologies in Education, Research, and Industrial Applications
The work also gives the comparison of standalone online Unix/Linux terminals in terms of their possible use for a course in operating systems. ...
The author analyzes the experience of teaching a Linux operating system to students of different specializations, and in particular, discusses the virtualization tools used, including Linux online environments ...
The study concluded the need for designing and implementing a virtual Linux environment with remote access to meet individual requirements of the Operating Systems course. ...
dblp:conf/icteri/Holovnia20
fatcat:uwdm63vge5cefiivu3l5ounqyq
First Edition Unix: Its Creation and Restoration
2010
IEEE Annals of the History of Computing
Acknowledgments I thank all the members of the Unix restoration project including Johan Beisser, Tim Bradshaw, Ralph Logan, Doug Merritt, James Markevitch, Brad Parker, and most particularly Tim Newsham ...
With the populated file system and later a.out support, the restored Unix system was again usable, with nearly all the documented system tools, text editor and document processing tools, and programming ...
With a great deal of effort and fortune, this code listing has been restored to working order, returning the first edition Unix to a working artifact of computing history. and Plauger wrote, The earliest ...
doi:10.1109/mahc.2009.55
fatcat:lakujkysfjgavoyvc7xumu7y3i
THE FERMI UNIX ENVIRONMENT - DEALING WITH ADOLESCENCE
1996
Computing in High Energy Physics '95
In particular, with the power of the new PCs making enthusiastic converts of physicists to the pc world, we are faced with the challenge of expanding the paradigm to non-UNIX platforms in a uniform and ...
Fermilab's Computing Division started early in the definition implemention and promulgation of a common environment for Users across the Laboratory's UNIX platforms and installations. ...
The Fermi Unix Environment Working Group works with the VMS Migration Task Force on technical issues and needed developments to help provide the most complete and consistent environment to meet the needs ...
doi:10.1142/9789814447188_0131
fatcat:nrxr75jymfdstbn56brd56bgha
UNIX and Security: The Influences of History
1995
Information Systems Security
Instead, the blame lies partially with the traditional use of Unix and partially with the poor security consciousness of its users. ...
Users in these environments often congured their systems with lax security, and even developed philosophies that viewed security as something to avoid. ...
Similar methods can be used with other classes of tools, too, such as network monitoring software. ...
doi:10.1080/10658989509342510
fatcat:2j6h5eo3fjbdhpaxkkbqlroz54
ShellOnYou
2022
Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 1
We found it particularly useful when teaching students with heterogeneous Unix backgrounds. The tool is available on request. ...
We present ShellOnYou, a new Computer Science education tool, and analyze its use with four successive student cohorts. ...
ACKNOWLEDGMENTS This work was funded by Fondation Polytech, the Polytech Network through the IDEFI AVOSTTI ANR project and the Opening project (call Hybridation des formations d'enseignement supérieur ...
doi:10.1145/3502718.3524753
fatcat:giwzof2tzjfrxoond7x3u76pgy
DEC FUSE: Building a Graphical Software Development Environment from UNIX Tools
1995
Digital technical journal of Digital Equipment Corporation
With the first method, we show how tools are built as graphical user interfaces (GUIs) on top of existing UNIX commands. Then, we show how messaging enables these tools to work together. ...
Developers build project-specific tools using UNIX commands in shell scripts and have become proficient in the use of tools like the dbx debugger and the emacs and vi editors. 2 Developers have also become ...
We also want to acknowledge the work on FIELD done at Brown University by Steven P. Reiss and his students that laid the groundwork for DEC FUSE and other software development environments. ...
dblp:journals/dtj/HartL95
fatcat:3kopsoishvcplpimdakijgwmvq
A methodology for managing roles in legacy systems
2003
Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03
Role-based access control (RBAC) is well accepted as a good technology for managing and designing access control in systems with many users and many objects. ...
We also discuss how to simulate the role graph model on a Unix system, and extend the methodology just described for relational databases to managing a Unix system when changes are made to the role graph ...
ACKNOWLEDGEMENTS The following students have worked on the current version of the software for the role graph and group graph tool: Rizwan Qureshi, He Peng, Kefeng Yan and Yan Shi. ...
doi:10.1145/775412.775417
dblp:conf/sacmat/OsbornHL03
fatcat:x55xuo7vbzehpgm2yqugbf6vji
A methodology for managing roles in legacy systems
2003
Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03
Role-based access control (RBAC) is well accepted as a good technology for managing and designing access control in systems with many users and many objects. ...
We also discuss how to simulate the role graph model on a Unix system, and extend the methodology just described for relational databases to managing a Unix system when changes are made to the role graph ...
ACKNOWLEDGEMENTS The following students have worked on the current version of the software for the role graph and group graph tool: Rizwan Qureshi, He Peng, Kefeng Yan and Yan Shi. ...
doi:10.1145/775413.775417
fatcat:tzn32gdmkvcphfh7n3riy7yhee
Command-line utilities for managing and exploring annotated corpora
2014
Proceedings of the Workshop on Open Infrastructures and Analysis Frameworks for HLT
While these may be easily performed over flat text files with stream-processing UNIX tools, similar tools for structured annotation require custom design. ...
We suggest that such tools are universally valuable for working with structured corpora; in turn, their utility promotes common storage and distribution formats for annotated text. ...
UNIX tools to process textual streams, implementing similar tools for working with structured DOCREP files seemed natural. ...
doi:10.3115/v1/w14-5207
dblp:conf/coling/NothmanDC14
fatcat:fhkkxqndjzgjjkyui7mhxb4emu
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)
2007
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)
UnMask is a working system. ...
tools to collect additional information from the Internet. ...
Section 6 concludes with a brief discussion on future work. ...
doi:10.1109/acsac.2007.12
dblp:conf/acsac/AggarwalBDKLSZ07
fatcat:kaeckpemo5dgtdgyfaj7uivoq4
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)
2007
Proceedings of the Computer Security Applications Conference
UnMask is a working system. ...
tools to collect additional information from the Internet. ...
Section 6 concludes with a brief discussion on future work. ...
doi:10.1109/acsac.2007.4412984
fatcat:4jdzb6uiy5fcnbdwz463wywpju
A Software Development Environment for Improving Productivity
1984
Computer
Acknowledgments We thank all members of the software productivity project for their dedication, hard work, creative ideas, and enthusiastic support-which made this work possible. ...
Second, Unix is different from what most TRW software developers are familiar with, and it takes a lot of work to learn another operating system and collection of tools; the users must be persuaded there ...
The major automated office/project support components, other than those provided with the standard UC Berkeley Unix, are SPS tool catalog, a catalog of the tools that are part of the SPS. ...
doi:10.1109/mc.1984.1659160
fatcat:fcdcqoelvfgk3frulm7p5eiqiq
Use of UNIX in large online processor farms
1990
AIP Conference Proceedings
Issues involved in constructing online UNIX farms are discussed. ...
There has been a recent rapid increase in the power of RISC computers running the UNIX operating system. ...
Online Tool% Finally, some tools were constructed to support online use of UNIX on the ACP/RSOOO. ...
doi:10.1063/1.39580
fatcat:w5ifbg7rljbtddcaqu6pfafhfy
« Previous
Showing results 1 — 15 out of 47,878 results