Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,979,800 papers from all fields of science
Search
Sign In
Create Free Account
Printk
printk is a function that prints messages and is used in the C Programming Language exclusively for the Linux Kernel. It accepts a string parameter…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
Broader (1)
Linux
Printf format string
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Analysis and Defense of Network Attacking Based on the Linux Server
Dapeng Lang
,
Wei Ding
,
Yuhan Xiang
,
Xiangyu Liu
ICPCSEE
2019
Corpus ID: 203471813
The kernel of the Linux server is analyzed to find out the main cause of the server’s denial of service when it is attacked. In…
Expand
2015
2015
Logging method for high execution frequency paths of Linux kernel
K. K. Jha
International Conference on Contemporary…
2015
Corpus ID: 8879653
Understanding Operating System behavior is very critical for any embedded designer to make informed design decision. We present a…
Expand
2013
2013
Kernel Modules and Device Drivers
D. Abbott
2013
Corpus ID: 60795787
2008
2008
Wifi Mesh for HandHelds in Linux
N. Corriero
,
V. Cozza
,
F. Pistillo
,
Eustrat Zhupa
International Conference on Wireless Networks
2008
Corpus ID: 11785758
This work shows how to use a Linux kernel for arm processors, including a specific aodv module to support Wi-Fi connection in ad…
Expand
2006
2006
Group-edf: a new approach and an efficient non-preemptive algorithm for soft real-time systems
K. Kavi
,
Wenming Li
2006
Corpus ID: 15693080
Hard real-time systems in robotics, space and military missions, and control devices are specified with stringent and critical…
Expand
2006
2006
Chapter 7 – Kernel Modules and Device Drivers
D. Abbott
2006
Corpus ID: 56621814
2005
2005
Weaknesses in Wireless LAN Session Containment
Joshua Wright
2005
Corpus ID: 110096362
This paper describes the characteristics of wireless LAN session containment techniques used t o stop an unauthorized station…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE