Skip to search formSkip to main contentSkip to account menu

Metacharacter

Known as: Meta Character, Meta-character, Metacharacters 
A metacharacter is a character that has a special meaning (instead of a literal meaning) to a computer program, such as a shell interpreter or a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
........................................................................................................................................................ VI ACKNOWLEDGMENT................................................................................................................................... VII LIST OF TABLES ........................................................................................................................................... VIII LIST OF FIGURES ............................................................................................................................................ IX ABBREVIATIONS IN ALPHABETICAL ORDER .......................................................................................... X 
2016
2016
We develop efficient methods to check whether two given Context-Free Grammars (CFGs) are transformed into parsers that recognize… 
2013
2013
Gaito Gazdanov's novel The Flight is regarded as a special hypertext of a classical Russian novel, depicting a family drama of… 
2012
2012
Information query is one of the basic functions of the corpus. The pattern searching technologies draw lots of attentions whereas… 
2011
2011
SQL injection attacks (SQLIA) are widely used in which an attacker crafts input to the application server to access or modify… 
2011
2011
Perl Regular Expressions (PRX) are powerful, but frequently unused, functions that can be employed in-line with your code. These… 
2008
2008
Recent network intrusion detection systems (NIDS) use regular expressions to represent suspicious or malicious character… 
2008
2008
Recent network intrusion detection systems (NIDS) use regular expressions to represent suspicious or malicious character… 
Review
2008
Review
2008
In the first part of this article, popular vulnerability and attack types used in books, vulnerability disclosures, and databases… 
1967
1967
This dissertation presents a descriptive notation for data structures which is embedded in a programming language in such a way…