Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,206,881 papers from all fields of science
Search
Sign In
Create Free Account
Printf format string
Known as:
Printf()
, Placeholder (Computing)
, %25s (printf)
Expand
Printf format string (of which "printf" stands for "print formatted") refers to a control parameter used by a class of functions in the string…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
ALGOL 68
AMPL
BCPL
C file input/output
Expand
Broader (1)
C standard library
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Transparent linking of compiled software and synthesized hardware
David B. Thomas
,
Shane T. Fleming
,
G. Constantinides
,
D. Ghica
Design, Automation and Test in Europe
2015
Corpus ID: 14878467
Modern heterogeneous devices contain tightly coupled CPU and FPGA logic, allowing low latency access to accelerators. However…
Expand
Review
2012
Review
2012
Finding Chapel ’ s Peak : Introducing Auto-Tuning to the Chapel Parallel Programming Language
Ray S. Chen
2012
Corpus ID: 10310240
The benefit of automated application tuning has been the focus of numerous research projects, yet applying this technology…
Expand
2011
2011
Taint Propagation Analysis and Dynamic Verification with Information Flow Policy
Zeng Qing
2011
Corpus ID: 63916406
In this paper,based on a flow and context-sensitive SSA(static single assignment) information-flow analysis,a fine-grained and…
Expand
2011
2011
An Automatic Network Protocol Fuzz Testing and Vulnerability Discovering Method: An Automatic Network Protocol Fuzz Testing and Vulnerability Discovering Method
Wei-Ming Li
,
Aifang Zhang
,
Jianchuan Liu
,
Zhi-Tang Li
2011
Corpus ID: 61639009
2010
2010
Vulnerability detector using parse tree annotation
Mohammad Akbari
,
Sarah Berenji
,
R. Azmi
International Conference on Education Technology…
2010
Corpus ID: 15946513
Static vulnerability Detection approach usually produces large amount of false positives. To achieve better result, a tool which…
Expand
Review
2008
Review
2008
Classes of Vulnerabilities and Attacks
P. Meunier
2008
Corpus ID: 18801071
In the first part of this article, popular vulnerability and attack types used in books, vulnerability disclosures, and databases…
Expand
2007
2007
Variadic templates for C++
Douglas P. Gregor
,
Jaakko Järvi
ACM Symposium on Applied Computing
2007
Corpus ID: 14899853
Generic functions and classes accepting a variable number of type arguments have proven to be a very useful, but missing, feature…
Expand
2006
2006
Group-edf: a new approach and an efficient non-preemptive algorithm for soft real-time systems
K. Kavi
,
Wenming Li
2006
Corpus ID: 15693080
Hard real-time systems in robotics, space and military missions, and control devices are specified with stringent and critical…
Expand
Highly Cited
2005
Highly Cited
2005
Automatic extraction of accurate application-specific sandboxing policy
L. Lam
,
T. Chiueh
IEEE Military Communications Conference
2005
Corpus ID: 10747678
One of the most dangerous cybersecurity threats is control hijacking attacks, which hijack the control of a victim application…
Expand
2003
2003
A Catalog of Patterns for Program Generation
M. Völter
European Conference on Pattern Languages of…
2003
Corpus ID: 16113653
Generation of source code is becoming a more and more important tool for software engineering, especially in the context of model…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE