Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,218,684 papers from all fields of science
Search
Sign In
Create Free Account
C file input/output
Known as:
Vfwprintf
, Vasprintf
, Getwc
Expand
The C programming language provides many standard library functions for file input and output. These functions make up the bulk of the C standard…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Byte
C localization functions
C11 (C standard revision)
Computer file
Expand
Broader (1)
C standard library
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
The Close Binary Fraction of Solar-type Stars Is Strongly Anticorrelated with Metallicity
M. Moe
,
K. Kratter
,
C. Badenes
Astrophysical Journal
2018
Corpus ID: 92993525
There is now strong evidence that the close binary fraction (P < 104 days; a < 10 au) of solar-type stars (M1 ≈ 0.6–1.5…
Expand
Highly Cited
2013
Highly Cited
2013
An Embedded Systems Laboratory to Support Rapid Prototyping of Robotics and the Internet of Things
J. O. Hamblen
,
Gijsbert M. E. van Bekkum
IEEE Transactions on Education
2013
Corpus ID: 14383543
This paper describes a new approach for a course and laboratory designed to allow students to develop low-cost prototypes of…
Expand
2010
2010
The Impact of Node's Mobility on Link-Detection Based on Routing Hello Messages
Rodolfo Oliveira
,
Miguel Luís
,
Luís Bernardo
,
R. Dinis
,
Paulo Pinto
IEEE Wireless Communication and Networking…
2010
Corpus ID: 6989048
Several routing protocols for Mobile Ad Hoc Networks (MANETS), including the well known Ad hoc On-Demand Distance Vector Routing…
Expand
2010
2010
ACPI and SMI handlers: some limits to trusted computing
L. Duflot
,
Olivier Grumelard
,
O. Levillain
,
B. Morin
Journal in Computer Virology
2010
Corpus ID: 5621858
Trusted computing has been explored through several international initiatives. Trust in a platform generally requires a subset of…
Expand
Review
2010
Review
2010
Engineering Differential Equations: Theory and Applications
B. Goodwine
2010
Corpus ID: 117886394
Preface.- Prerequisites.- Course Structure.- Introduction and Preliminaries.- Ordinary First Order Equations.- Ordinary Second…
Expand
2009
2009
The life and death of statically detected vulnerabilities: An empirical study
M. D. Penta
,
L. Cerulo
,
L. Aversano
Information and Software Technology
2009
Corpus ID: 2369851
Highly Cited
2005
Highly Cited
2005
Countering Network Worms Through Automatic Patch Generation
Stelios Sidiroglou
,
A. Keromytis
IEEE Security and Privacy
2005
Corpus ID: 952790
To counter zero-day worms that exploit software flaws such as buffer overflows, this end-point architecture uses source code…
Expand
2005
2005
Preventing format-string attacks via automatic and efficient dynamic checking
Michael F. Ringenburg
,
D. Grossman
Conference on Computer and Communications…
2005
Corpus ID: 15951518
We propose preventing format-string attacks with a combination of static dataflow analysis and dynamic white-lists of safe…
Expand
Highly Cited
2002
Highly Cited
2002
Path-Sensitive Program Veri cation in Polynomial Time
Sorin Lerner
2002
Corpus ID: 14053100
In this paper, we present a new algorithm for program veri cation that runs in polynomial time and space. We are interested in…
Expand
2001
2001
Components and interfaces of a process management system for parallel programs
R. Butler
,
W. Gropp
,
E. Lusk
Parallel Computing
2001
Corpus ID: 14709809
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE