Filters








47,878 Hits in 4.5 sec

Working with Unix Tools

D. Spinellis
2005 IEEE Software  
You might want to process only some parts of Working with Unix Tools Diomidis Spinellis A successful [software] tool is one that was used to do something undreamed of by its author. -Stephen C.  ...  If you're working with files grouped into an archive, a command like tar, jar, or ar will list the archive's contents.  ... 
doi:10.1109/ms.2005.170 fatcat:n7axbyuzgbd73dguynla6j455a

Comprehensive Comparison of Cloud-Based NGS Data Analysis and Alignment Tools

Qanita Bani Baker, Mahmoud Hammad, Wesam Al-Rashdan, Yaser Jararweh, Mohammad AL-Smadi, Mohammad Al-Zinati
2020 Informatics in Medicine Unlocked  
This work provides a comprehensive investigation of cloud-based NGS data analysis and alignment tools, both the commercial and the open-source tools.  ...  Moreover, we extensively analyze and classify the studied NGS data analysis and alignment tools to help NGS biomedical researchers and clinicians in finding appropriate tools for their work, while understanding  ...  As shown in Tables 2 and 3, all of the desktop versions of the open-source tools work with the Linux/Unix operating system.  ... 
doi:10.1016/j.imu.2020.100296 fatcat:kttqpcwljrelfiahmj66nudco4

Linux Online Virtual Environments in Teaching Operating Systems

Olena Holovnia
2020 International Conference on Information and Communication Technologies in Education, Research, and Industrial Applications  
The work also gives the comparison of standalone online Unix/Linux terminals in terms of their possible use for a course in operating systems.  ...  The author analyzes the experience of teaching a Linux operating system to students of different specializations, and in particular, discusses the virtualization tools used, including Linux online environments  ...  The study concluded the need for designing and implementing a virtual Linux environment with remote access to meet individual requirements of the Operating Systems course.  ... 
dblp:conf/icteri/Holovnia20 fatcat:uwdm63vge5cefiivu3l5ounqyq

First Edition Unix: Its Creation and Restoration

Warren Toomey
2010 IEEE Annals of the History of Computing  
Acknowledgments I thank all the members of the Unix restoration project including Johan Beisser, Tim Bradshaw, Ralph Logan, Doug Merritt, James Markevitch, Brad Parker, and most particularly Tim Newsham  ...  With the populated file system and later a.out support, the restored Unix system was again usable, with nearly all the documented system tools, text editor and document processing tools, and programming  ...  With a great deal of effort and fortune, this code listing has been restored to working order, returning the first edition Unix to a working artifact of computing history. and Plauger wrote, The earliest  ... 
doi:10.1109/mahc.2009.55 fatcat:lakujkysfjgavoyvc7xumu7y3i

THE FERMI UNIX ENVIRONMENT - DEALING WITH ADOLESCENCE

Ruth Pordes, Judy Nicholls, Matt Wicks
1996 Computing in High Energy Physics '95  
In particular, with the power of the new PCs making enthusiastic converts of physicists to the pc world, we are faced with the challenge of expanding the paradigm to non-UNIX platforms in a uniform and  ...  Fermilab's Computing Division started early in the definition implemention and promulgation of a common environment for Users across the Laboratory's UNIX platforms and installations.  ...  The Fermi Unix Environment Working Group works with the VMS Migration Task Force on technical issues and needed developments to help provide the most complete and consistent environment to meet the needs  ... 
doi:10.1142/9789814447188_0131 fatcat:nrxr75jymfdstbn56brd56bgha

UNIX and Security: The Influences of History

Eugene H. Spafford
1995 Information Systems Security  
Instead, the blame lies partially with the traditional use of Unix and partially with the poor security consciousness of its users.  ...  Users in these environments often congured their systems with lax security, and even developed philosophies that viewed security as something to avoid.  ...  Similar methods can be used with other classes of tools, too, such as network monitoring software.  ... 
doi:10.1080/10658989509342510 fatcat:2j6h5eo3fjbdhpaxkkbqlroz54

ShellOnYou

Vincent Berry, Arnaud Castelltort, Chrysta Pelissier, Marion Rousseau, Chouki Tibermacine
2022 Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 1  
We found it particularly useful when teaching students with heterogeneous Unix backgrounds. The tool is available on request.  ...  We present ShellOnYou, a new Computer Science education tool, and analyze its use with four successive student cohorts.  ...  ACKNOWLEDGMENTS This work was funded by Fondation Polytech, the Polytech Network through the IDEFI AVOSTTI ANR project and the Opening project (call Hybridation des formations d'enseignement supérieur  ... 
doi:10.1145/3502718.3524753 fatcat:giwzof2tzjfrxoond7x3u76pgy

DEC FUSE: Building a Graphical Software Development Environment from UNIX Tools

Richard O. Hart, Glenn Lupton
1995 Digital technical journal of Digital Equipment Corporation  
With the first method, we show how tools are built as graphical user interfaces (GUIs) on top of existing UNIX commands. Then, we show how messaging enables these tools to work together.  ...  Developers build project-specific tools using UNIX commands in shell scripts and have become proficient in the use of tools like the dbx debugger and the emacs and vi editors. 2 Developers have also become  ...  We also want to acknowledge the work on FIELD done at Brown University by Steven P. Reiss and his students that laid the groundwork for DEC FUSE and other software development environments.  ... 
dblp:journals/dtj/HartL95 fatcat:3kopsoishvcplpimdakijgwmvq

A methodology for managing roles in legacy systems

Sylvia L. Osborn, Yan Han, Jun Liu
2003 Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03  
Role-based access control (RBAC) is well accepted as a good technology for managing and designing access control in systems with many users and many objects.  ...  We also discuss how to simulate the role graph model on a Unix system, and extend the methodology just described for relational databases to managing a Unix system when changes are made to the role graph  ...  ACKNOWLEDGEMENTS The following students have worked on the current version of the software for the role graph and group graph tool: Rizwan Qureshi, He Peng, Kefeng Yan and Yan Shi.  ... 
doi:10.1145/775412.775417 dblp:conf/sacmat/OsbornHL03 fatcat:x55xuo7vbzehpgm2yqugbf6vji

A methodology for managing roles in legacy systems

Sylvia L. Osborn, Yan Han, Jun Liu
2003 Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03  
Role-based access control (RBAC) is well accepted as a good technology for managing and designing access control in systems with many users and many objects.  ...  We also discuss how to simulate the role graph model on a Unix system, and extend the methodology just described for relational databases to managing a Unix system when changes are made to the role graph  ...  ACKNOWLEDGEMENTS The following students have worked on the current version of the software for the role graph and group graph tool: Rizwan Qureshi, He Peng, Kefeng Yan and Yan Shi.  ... 
doi:10.1145/775413.775417 fatcat:tzn32gdmkvcphfh7n3riy7yhee

Command-line utilities for managing and exploring annotated corpora

Joel Nothman, Tim Dawborn, James R. Curran
2014 Proceedings of the Workshop on Open Infrastructures and Analysis Frameworks for HLT  
While these may be easily performed over flat text files with stream-processing UNIX tools, similar tools for structured annotation require custom design.  ...  We suggest that such tools are universally valuable for working with structured corpora; in turn, their utility promotes common storage and distribution formats for annotated text.  ...  UNIX tools to process textual streams, implementing similar tools for working with structured DOCREP files seemed natural.  ... 
doi:10.3115/v1/w14-5207 dblp:conf/coling/NothmanDC14 fatcat:fhkkxqndjzgjjkyui7mhxb4emu

The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)

Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo Kermes, Wayne Liu, Shahank Sahai, Zhenghui Zhu
2007 Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)  
UnMask is a working system.  ...  tools to collect additional information from the Internet.  ...  Section 6 concludes with a brief discussion on future work.  ... 
doi:10.1109/acsac.2007.12 dblp:conf/acsac/AggarwalBDKLSZ07 fatcat:kaeckpemo5dgtdgyfaj7uivoq4

The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)

Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo Kermes, Wayne Liu, Shahank Sahai, Zhenghui Zhu
2007 Proceedings of the Computer Security Applications Conference  
UnMask is a working system.  ...  tools to collect additional information from the Internet.  ...  Section 6 concludes with a brief discussion on future work.  ... 
doi:10.1109/acsac.2007.4412984 fatcat:4jdzb6uiy5fcnbdwz463wywpju

A Software Development Environment for Improving Productivity

Boehm, Penedo, Stuckle, Williams, Pyster
1984 Computer  
Acknowledgments We thank all members of the software productivity project for their dedication, hard work, creative ideas, and enthusiastic support-which made this work possible.  ...  Second, Unix is different from what most TRW software developers are familiar with, and it takes a lot of work to learn another operating system and collection of tools; the users must be persuaded there  ...  The major automated office/project support components, other than those provided with the standard UC Berkeley Unix, are SPS tool catalog, a catalog of the tools that are part of the SPS.  ... 
doi:10.1109/mc.1984.1659160 fatcat:fcdcqoelvfgk3frulm7p5eiqiq

Use of UNIX in large online processor farms

Joseph R. Biel
1990 AIP Conference Proceedings  
Issues involved in constructing online UNIX farms are discussed.  ...  There has been a recent rapid increase in the power of RISC computers running the UNIX operating system.  ...  Online Tool% Finally, some tools were constructed to support online use of UNIX on the ACP/RSOOO.  ... 
doi:10.1063/1.39580 fatcat:w5ifbg7rljbtddcaqu6pfafhfy
« Previous Showing results 1 — 15 out of 47,878 results