Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,995,831 papers from all fields of science
Search
Sign In
Create Free Account
Name mangling
Known as:
Name decoration
, Mangling
, Demangling
Expand
In compiler construction, name mangling (also called name decoration) is a technique used to solve various problems caused by the need to resolve…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Application binary interface
Application programming interface
C++
Cfront
Expand
Broader (1)
Java
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Art and Judaism in the Greco-Roman World: Toward a New Jewish Archaeology
S. Fine
2010
Corpus ID: 166076078
Introduction Part I. 'The 'Most Unmonumental People' of the World': Modern Constructions of Ancient Jewish Art: 1. Building an…
Expand
2005
2005
Models and modeling schemes for binary IV-VI glasses
D. Tafen
,
David Alan Drabold
2005
Corpus ID: 16576992
In this paper, we present and thoroughly characterize several new models of amorphous binary IV-VI glasses. We apply both a…
Expand
2004
2004
Neighbouring male spotted bowerbirds are not related, but do maraud each other
J. Madden
,
T. J. Lowe
,
+4 authors
F. Jury
Animal Behaviour
2004
Corpus ID: 53003586
2002
2002
The Art of The Kariye Camii
R. Ousterhout
2002
Corpus ID: 190386925
A touchstone of Byzantine artistic achievement, the church now known as the Kariye Camii in Istanbul preserves impressive cycles…
Expand
2001
2001
Defect-Tolerant Single-Electron Charging at Room Temperature in Metal Nanoparticle Decorated Biopolymers
C. A. Berven
,
L. Clarke
,
J. Mooster
,
M. Wybourne
,
J. Hutchison
2001
Corpus ID: 187820
The last three decades have seen a dramatic decrease in the size of microelectronic devices, with the number of devices on a…
Expand
2001
2001
Designing Mechanisms for E-Commerce Security: An Example from Sealed-Bid Auctions
Wenli Wang
,
Z. Hidvégi
,
Andrew Whinston
International Journal of Electronic Commerce
2001
Corpus ID: 12193070
The use of computing technology is a necessary but not sufficient approach to enhancing e-commerce security. It should be…
Expand
1996
1996
After a Fashion
Joanne Finkelstein
1996
Corpus ID: 193293517
Fashion is more that supermodels in odd clothes pouting and pirouetting on Parisian catwalks. Commentators and theorists have…
Expand
1994
1994
Efficient Disambiguation by means of Stochastic Tree Substitution Grammars
L. Bod
,
Steven Krauwer
,
R. Scha
,
K. Sima'an
1994
Corpus ID: 9587615
In Stochastic Tree Substitution Grammars (STSGs), one parse(tree) of an input sentence can be generated by exponentially many…
Expand
Highly Cited
1987
Highly Cited
1987
Ritual and Reconstructed Meaning: The Neonian Baptistery in Ravenna
A. J. Wharton
1987
Corpus ID: 55181016
The pre-modern work of art, which gained authority through its extension in ritual action, could function as a social integrator…
Expand
1976
1976
Byzantine Mosaic Decoration: Aspects of Monumental Art in Byzantium
Otto Demus
1976
Corpus ID: 190121125
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE