Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,463,656 papers from all fields of science
Search
Sign In
Create Free Account
C file input/output
Known as:
Vfwprintf
, Vasprintf
, Getwc
Expand
The C programming language provides many standard library functions for file input and output. These functions make up the bulk of the C standard…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Byte
C localization functions
C11 (C standard revision)
Computer file
Expand
Broader (1)
C standard library
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
The Impact of Node's Mobility on Link-Detection Based on Routing Hello Messages
Rodolfo Oliveira
,
Miguel Luís
,
Luís Bernardo
,
R. Dinis
,
Paulo Pinto
IEEE Wireless Communication and Networking…
2010
Corpus ID: 6989048
Several routing protocols for Mobile Ad Hoc Networks (MANETS), including the well known Ad hoc On-Demand Distance Vector Routing…
Expand
2010
2010
ACPI and SMI handlers: some limits to trusted computing
L. Duflot
,
Olivier Grumelard
,
O. Levillain
,
B. Morin
Journal in Computer Virology
2010
Corpus ID: 5621858
Trusted computing has been explored through several international initiatives. Trust in a platform generally requires a subset of…
Expand
Review
2010
Review
2010
Engineering Differential Equations: Theory and Applications
B. Goodwine
2010
Corpus ID: 117886394
Preface.- Prerequisites.- Course Structure.- Introduction and Preliminaries.- Ordinary First Order Equations.- Ordinary Second…
Expand
2009
2009
The life and death of statically detected vulnerabilities: An empirical study
M. D. Penta
,
L. Cerulo
,
L. Aversano
Information and Software Technology
2009
Corpus ID: 2369851
2008
2008
System Level Modelling of RF IC in SystemC-WMS
S. Orcioni
,
M. Ballicchia
,
G. Biagetti
,
R. d'Aparo
,
M. Conti
EURASIP Journal on Embedded Systems
2008
Corpus ID: 3242941
This paper proposes a methodology for modelling and simulation of RF systems in SystemC-WMS. Analog RF modules have been…
Expand
Highly Cited
2005
Highly Cited
2005
Countering Network Worms Through Automatic Patch Generation
Stelios Sidiroglou
,
A. Keromytis
IEEE Security and Privacy
2005
Corpus ID: 952790
To counter zero-day worms that exploit software flaws such as buffer overflows, this end-point architecture uses source code…
Expand
2005
2005
Preventing format-string attacks via automatic and efficient dynamic checking
Michael F. Ringenburg
,
D. Grossman
Conference on Computer and Communications…
2005
Corpus ID: 15951518
We propose preventing format-string attacks with a combination of static dataflow analysis and dynamic white-lists of safe…
Expand
2004
2004
Using Execution Transactions To Recover From Buffer Overflow Attacks
Stelios Sidiroglou
,
A. Keromytis
2004
Corpus ID: 15492207
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we dynamically augment…
Expand
2001
2001
Components and interfaces of a process management system for parallel programs
R. Butler
,
W. Gropp
,
E. Lusk
Parallel Computing
2001
Corpus ID: 14709809
1988
1988
A tale of two greps
A. Hume
Software, Practice & Experience
1988
Corpus ID: 6395770
Text searching programs such as the UNIX system tools grep and egrep require more than just good algorithms; they need to make…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE