Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,589,891 papers from all fields of science
Search
Sign In
Create Free Account
Uncontrolled format string
Known as:
Format string bug
, Uncontrolled
, Format string attacks
Expand
Uncontrolled format string is a type of software vulnerability discovered around 1989 that can be used in security exploits. Previously thought…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Buffer overflow
C shell
Call stack
Command history
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Recent trends in machine learning for human activity recognition—A survey
S. R. Ramamurthy
,
Nirmalya Roy
WIREs Data Mining Knowl. Discov.
2018
Corpus ID: 43949774
There has been an upsurge recently in investigating machine learning techniques for activity recognition (AR) problems as they…
Expand
Highly Cited
2007
Highly Cited
2007
Multifilament Fibers Based on Dissolution of Cellulose in NaOH/Urea Aqueous Solution: Structure and Properties
J. Cai
,
Lina Zhang
,
+5 authors
B. Chu
2007
Corpus ID: 56250504
High-quality cellulose multifilaments are spun using a preliminary pilot apparatus, from the cellulose dope in an NaOH and urea…
Expand
Highly Cited
2004
Highly Cited
2004
An ecosystem service value assessment of land-use change on Chongming Island, China.
Bin Zhao
,
U. Kreuter
,
Bo Li
,
Zhijun Ma
,
Jia-kuan Chen
,
N. Nakagoshi
2004
Corpus ID: 56277290
Highly Cited
2003
Highly Cited
2003
Urban Solid Waste Management in Low-Income Countries of Asia How to Cope with the Garbage Crisis
C. Zurbrügg
2003
Corpus ID: 52060067
Human activities create waste, and it is the way these wastes are handled, stored, collected and disposed of, which can pose…
Expand
Highly Cited
2002
Highly Cited
2002
Overfishing drives a trophic cascade in the Black Sea
G. Daskalov
2002
Corpus ID: 53135492
During recent decades, environmental conditions have deteriorated in the Black Sea. Population explosions of phytoplankton and…
Expand
Highly Cited
1996
Highly Cited
1996
Anchoring the Software Process
B. Boehm
IEEE Software
1996
Corpus ID: 865088
Software organizations need common milestones to serve as a basis for their software development processes. The author proposes…
Expand
Highly Cited
1993
Highly Cited
1993
African medicinal plants SETTING PRIORITIES AT THE INTERFACE BETWEEN CONSERVATION AND PRIMARY HEALTHCARE
A. Semple
,
I. Fabbri
1993
Corpus ID: 2040798
This series of working papers is intended to provide information and to generate fruitful discussion on key issues in the…
Expand
Highly Cited
1990
Highly Cited
1990
Critical Social Research
L. Harvey
1990
Corpus ID: 50528531
Part 1 Basics: criticism and knowledge empirical study critical and conventional ethnography the critical tradition elements of…
Expand
Highly Cited
1987
Highly Cited
1987
Extrapolation of the kinetics of oil and gas formation from laboratory experiments to sedimentary basins
Philippe Ungerer
,
R. Pelet
Nature
1987
Corpus ID: 4367660
It is generally accepted that the formation of oil and gas from sedimentary organic matter—or kerogen—is adequately described by…
Expand
Highly Cited
1975
Highly Cited
1975
Multivariable tuning regulators: The feedforward and robust control of a general servomechanism problem
E. Davison
IEEE Conference on Decision and Control including…
1975
Corpus ID: 39203144
A new notion of computer identification, as opposed to the conventional plant identification problem, is introduced in this paper…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE