Conferences related to Command languages

Back to Top

2023 Annual International Conference of the IEEE Engineering in Medicine & Biology Conference (EMBC)

The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted full papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions,will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.


2020 IEEE Frontiers in Education Conference (FIE)

The Frontiers in Education (FIE) Conference is a major international conference focusing on educational innovations and research in engineering and computing education. FIE 2019 continues a long tradition of disseminating results in engineering and computing education. It is an ideal forum for sharing ideas, learning about developments and interacting with colleagues inthese fields.


2020 IEEE International Conference on Robotics and Automation (ICRA)

The International Conference on Robotics and Automation (ICRA) is the IEEE Robotics and Automation Society’s biggest conference and one of the leading international forums for robotics researchers to present their work.


2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)

The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.


2020 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2019 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


More Conferences

Periodicals related to Command languages

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Biomedical Engineering, IEEE Transactions on

Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computational Biology and Bioinformatics, IEEE/ACM Transactions on

Specific topics of interest include, but are not limited to, sequence analysis, comparison and alignment methods; motif, gene and signal recognition; molecular evolution; phylogenetics and phylogenomics; determination or prediction of the structure of RNA and Protein in two and three dimensions; DNA twisting and folding; gene expression and gene regulatory networks; deduction of metabolic pathways; micro-array design and analysis; proteomics; ...


More Periodicals

Most published Xplore authors for Command languages

Back to Top

Xplore Articles related to Command languages

Back to Top

A service designer's functional view of intelligent network

1989 IEEE Global Telecommunications Conference and Exhibition 'Communications Technology for the 1990s and Beyond', 1989

Ameritech's view of IN (intelligent network) Release 0 is described, and some of the technical issues to be addressed as the intelligent network evolves over the time period 1991 to 1995 are highlighted. The service switching point (SSP), which resides in local or tandem switching systems, is a critical component of the IN architecture and provides functionalities required and used ...


A sound and practical approach to the re-engineering of time-critical systems

Proceedings of the Second Euromicro Conference on Software Maintenance and Reengineering, 1998

The authors investigate the re-engineering of time-critical applications using an integration of refinement and transformational techniques. The approach is uniform in the sense that one is able to combined both reverse and forward engineering within the same formal model. The approach is based on designing a wide-spectrum language which is equipped with a specification statement and concrete constructs to cope ...


Accelerate instrument control and automation

IEEE Instrumentation & Measurement Magazine, 2013

Automating instrument set up and measurement within a programming environment can be difficult. This paper will demonstrate the details of creating a sequence of instrument commands that will perform the necessary set-up and measurement and will assure the correct syntax and options for later integration into an automated environment. Agilent's Command Expert will be used to generate the instrument commands ...


A Data Acquisition Command Interface Using VAX/VMS DCL

IEEE Transactions on Nuclear Science, 1985

The user interface to a data acquisition system is being developed at the Los Alamos Weapons Neutron Research Facility using the VAX/VMS command language interface DCL. Commands are being implemented which provide for system initialization and control functions and FASTBUS diagnostics. The data acquisition system incorporates the concept of a data acquisition "state" (running, halted, etc.) where a certain subset ...


Design and implementation of a query command language using transition networks

COMPSAC 79. Proceedings. Computer Software and The IEEE Computer Society's Third International Applications Conference, 1979., 1979

A system is described which allows the user to define the syntax of a command language. This is done by reading in the syntax in the form of a Transition Network. The result is an improved user oriented language and increased flexibility of the system.


More Xplore Articles

Educational Resources on Command languages

Back to Top

IEEE-USA E-Books

  • A service designer's functional view of intelligent network

    Ameritech's view of IN (intelligent network) Release 0 is described, and some of the technical issues to be addressed as the intelligent network evolves over the time period 1991 to 1995 are highlighted. The service switching point (SSP), which resides in local or tandem switching systems, is a critical component of the IN architecture and provides functionalities required and used by the service designer. The IN Release 0 SSP-SCP (service control point) interface is the initial step in developing a flexible service-independent interface, enabling switching programmability for the intelligent network. Initial implementation is planned for the existing generation of digital switches, and IN will evolve to extend its usefulness to the service designer.<<ETX>>

  • A sound and practical approach to the re-engineering of time-critical systems

    The authors investigate the re-engineering of time-critical applications using an integration of refinement and transformational techniques. The approach is uniform in the sense that one is able to combined both reverse and forward engineering within the same formal model. The approach is based on designing a wide-spectrum language which is equipped with a specification statement and concrete constructs to cope with concurrency and real-time aspects. The language is an extension of Dijksua's guarded command language with the specification statement taken as a formula expressed in interval temporal logic (ITL). An ITL semantics for WSL is given together with a set of algebraic laws and refinement rules. Reverse engineering is achieved by applying various algebraic laws to produce a structured code (written in WSL) from the original one preserving its semantic equivalence. Such a transformation is done semi-automatically using an extension to MA. The resulting code is considered as an intermediate representation which can then be analysed and used as a basis to construct a higher level of abstraction of the original system. Calculating ITL semantics for the intermediate representation serves as a requirement specification of the original code and is subsequently used as the starting point to forward engineer the system by successive applications of the available refinement calculus. The semantics (an In formula) is produced automatically with the help of the PVS+ toolkit.

  • Accelerate instrument control and automation

    Automating instrument set up and measurement within a programming environment can be difficult. This paper will demonstrate the details of creating a sequence of instrument commands that will perform the necessary set-up and measurement and will assure the correct syntax and options for later integration into an automated environment. Agilent's Command Expert will be used to generate the instrument commands that can be profiled to improve execution time and identify bottlenecks. Different instruments can be substituted, and the software will identify commands that need to be altered or will not work for the new instrument. Once developed and tuned, the command sequence can easily be used in the following Application Development Environments (ADEs): Visual Studio, LabVIEW, MATLAB, VEE, SystemVue, and Excel. These and other features help remove many of the barriers that exist today when trying to automate instrument control for validation and test.

  • A Data Acquisition Command Interface Using VAX/VMS DCL

    The user interface to a data acquisition system is being developed at the Los Alamos Weapons Neutron Research Facility using the VAX/VMS command language interface DCL. Commands are being implemented which provide for system initialization and control functions and FASTBUS diagnostics. The data acquisition system incorporates the concept of a data acquisition "state" (running, halted, etc.) where a certain subset of input commands is allowed.

  • Design and implementation of a query command language using transition networks

    A system is described which allows the user to define the syntax of a command language. This is done by reading in the syntax in the form of a Transition Network. The result is an improved user oriented language and increased flexibility of the system.

  • Design and Implementation of Intelligent PID Controller Based on FPGA

    Now, many systems are time-varying, nonlinear and real-time in industrial processes. According to PID parameters adjustment problems of these systems, firstly, the paper adopts asynchronous particle swarm optimization (APSO) algorithm to optimize the parameters of PID controller and introduces altera FPGA 1P1C6F256C8 to implement PID controller. Secondly, the closed-loop test system is constructed by DSP builder. It can simulates the input behavior of controller effectively, and enhances the flexibility of design and test. At last, tool command language (TCL) script file is generated by signal compiler and then is run in modelsim to verify VHDL code which is compiled in quartus II. The results show that APSO algorithm improves the precision of PID parameters optimization and the adaptability of control system, simultaneously demonstrate the feasibility and practicability of intelligent PID controller based on FPGA.

  • A visual interface for generic message translation

    The authors are concerned with the translation of data structures they call messages. Messages are an example of a type of data structure encountered in generic data translation. The objective is to provide a system that the nonprogrammer can use to specify the nature of translations from one type to another. For this reason, the authors selected a visual interface that uses interaction techniques that do not require knowledge of programming or command languages. The translator must accomplish two tasks: (i) create a mapping between fields in different message types that specifies which fields have similar semantic content, and (ii) reformat or translate data specifications within those fields. The translations are accomplished with appropriate but different visual metaphors.<<ETX>>

  • Scan parallel loading in VHDL

    A scan-based design can have several scan chains, and each scan chain can contain as many as 20,000 scan cells. During simulation, serial loading of scan values into a 20,000-element scan chain requires 20,000 clock cycles for each scan pattern. This loading operation adversely affects simulator performance and taxes simulator capacity. The capability within a simulator to load scan patterns directly into a scan chain by forcing the internal values of the scan elements would alleviate these problems and is badly needed. The VHDL language, unlike the Verilog language, does not provide the capability to force/assign a value to an internal signal in a design and cannot be used for parallel loading. This paper proposes a method to allow parallel scan loading in VHDL using a small set of the simulation command language (SSCL) to be supported by VHDL simulators.

  • The Tinkertoy graphical programming environment

    The Tinkertoy graphical interface to Lisp is described, in which programs are 'built' rather than written, out of icons and flexible interconnections. It represents a computer/user interface that can easily exceed the interaction speed of the best text-based language editors and command languages. It also provides a consistent framework for interaction across both editing and command execution. Moreover, because programs are represented graphically, structures that do not naturally conform to the text medium can be clearly described, the new kinds of information can be incorporated into programs and program elements.<<ETX>>

  • The Dorothy Project: An Open Botnet Analysis Framework for Automatic Tracking and Activity Visualization

    Botnets, networks of compromised machines remotely controlled and instructed to work in a coordinated fashion, have had an epidemic diffusion over the Internet and represent one of today's most insidious threat. In this paper, we present an open framework called Dorothy that permits to monitor the activity of a botnet. We propose to characterize a botnet behavior through a set of parameters and a graphical representation. In a case study, we infiltrated and monitored a botnet named siwa collecting information about its functional structure, geographical distribution, communication mechanisms, command language and operations.



Standards related to Command languages

Back to Top

IEEE Guide for Monitoring, Information Exchange, and Control of Distributed Resources Interconnected with Electric Power Systems

This document provides guidelines for monitoring, information exchange, and control for distributed resources (DR) interconnected with electric power systems (EPS).


IEEE Standard for Data Delivery and Logical Channels for IEEE Std 1284 Interfaces

The packet protocol described by this standard allows a device to carry on multiple, concurrent exchanges of data and/or control information with another device across a single point-to-point link. the protocol is not a device control language. The protocol provides basic transportlevel flow control and multiplexing services. The multiplexed information exchanges are independent and blocking of one has no effect ...


IEEE Standard for Media Management System (MMS) Media Management Protocol (MMP)

Specify the Media Management Protocol which is used by client and administrative applications in the Media Management System to allocate, de-allocate, mount and dismount, volumes and to adminster the system. The MMP includes levels of privilige so that, for example, a client application cannot perform administrative funcetions, or an operator console program cannot perform higher-level management functions.


Standard for Common Incident Management Message Sets for Use by Emergency Management Centers

This standard is the Base Standard for a family of related standards that address the intercommunication needs of emergency management centers and other types of centers engaged in transportation incident management. Incident in this standard includes information concerning any transportation-related event that is received by the emergency management system, including planned roadway closures and special events, whether or not the ...



Jobs related to Command languages

Back to Top