Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 211,147,244 papers from all fields of science
Search
Sign In
Create Free Account
Magic number (programming)
Known as:
0xFDFDFDFD
, 0xCACACACA
, 0xFACADE
Expand
In computer programming, the term magic number has multiple meanings. It could refer to one or more of the following: * A constant numerical or text…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
"Classic" Mac OS
Advanced Disc Filing System
Anti-pattern
AppleScript
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2019
Highly Cited
2019
REDQUEEN: Fuzzing with Input-to-State Correspondence
Cornelius Aschermann
,
Sergej Schumilo
,
Tim Blazytko
,
R. Gawlik
,
Thorsten Holz
Network and Distributed System Security Symposium
2019
Corpus ID: 85546717
Automated software testing based on fuzzing has experienced a revival in recent years. Especially feedback-driven fuzzing has…
Expand
Highly Cited
2017
Highly Cited
2017
Steelix: program-state based binary fuzzing
Yuekang Li
,
Bihuan Chen
,
Mahinthan Chandramohan
,
Shang-Wei Lin
,
Yang Liu
,
A. Tiu
ESEC/SIGSOFT FSE
2017
Corpus ID: 39960933
Coverage-based fuzzing is one of the most effective techniques to find vulnerabilities, bugs or crashes. However, existing…
Expand
Review
2012
Review
2012
Spotlights, Floodlights, and the Magic Number Zero: Simple Effects Tests in Moderated Regression
Stephen A. Spiller
,
G. Fitzsimons
,
John G. Lynch
,
G. McClelland
2012
Corpus ID: 53505606
It is common for researchers discovering a significant interaction of a measured variable X with a manipulated variable Z to…
Expand
2012
2012
Tensor-force effects on single-particle levels and proton bubble structure around the Z or N=20 magic number
H. Nakada
,
K. Sugiura
,
J. Margueron
2012
Corpus ID: 118607674
Applying the semi-realistic $NN$ interactions that include realistic tensor force to the Hartree-Fock calculations, we…
Expand
Highly Cited
2004
Highly Cited
2004
The Number of Neighbors Needed for Connectivity of Wireless Networks
F. Xue
,
P. Kumar
Wirel. Networks
2004
Corpus ID: 6349082
Unlike wired networks, wireless networks do not come with links. Rather, links have to be fashioned out of the ether by nodes…
Expand
Highly Cited
2004
Highly Cited
2004
PREPARATION AND CHARACTERIZATION OF 1?2 NM DENDRIMER-ENCAPSULATED GOLD NANOPARTICLES HAVING VERY NARROW SIZE DISTRIBUTIONS
Yong Gu Kim
,
Sang-keun Oh
,
R. Crooks
2004
Corpus ID: 93648205
Highly monodisperse, 1−2-nm diameter Au nanoparticles were prepared using poly(amidoamine) (PAMAM) dendrimers as templates. The…
Expand
Highly Cited
2001
Highly Cited
2001
How Many Cases Do I Need
Mary Dunnewold
2001
Corpus ID: 60355553
This article addresses the issue of knowing when one has researched enough – thoroughly, and without missing anything. The author…
Expand
Highly Cited
1996
Highly Cited
1996
Giant Halo at the Neutron Drip Line
J. Meng
,
P. Ring
1996
Corpus ID: 960629
Relativistic Hartree-Bogoliubov theory in coordinate space is used to describe the chain of zirconium isotopes reaching from…
Expand
Highly Cited
1988
Highly Cited
1988
A Connectionist/Control Architecture for Working Memory
W. Schneider
,
M. Detweiler
1988
Corpus ID: 51771692
Highly Cited
1987
Highly Cited
1987
The stability of the fullerenes Cn, with n = 24, 28, 32, 36, 50, 60 and 70
H. Kroto
Nature
1987
Corpus ID: 4267579
It has been proposed1 that the geodesic and chemical properties inherent in a closed, hollow, spheroidal, carbon cage structure…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE