Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,116,416 papers from all fields of science
Search
Sign In
Create Free Account
Binary search algorithm
Known as:
Binary chop
, Binary search
, Bsearch
In computer science, binary search, also known as half-interval search or logarithmic search, is a search algorithm that finds the position of a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ALGOL 60
Algorithmic efficiency
Amortized analysis
Analysis of algorithms
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Continuous Optimization Optimal algorithms for the a -neighbor p -center problem
Doron Chen
,
Reuven Chen
2012
Corpus ID: 30388382
Assigning multiple service facilities to demand points is important when demand points are required to withstand service facility…
Expand
2012
2012
Estimating Collision Set Size in Framed Slotted Aloha Wireless Networks and RFID Systems
A. Zanella
IEEE Communications Letters
2012
Corpus ID: 7630355
In wireless networks and RFID systems, a collision set is a group of nodes such that the simultaneous transmission of two or more…
Expand
Highly Cited
2006
Highly Cited
2006
Adaptive searching in succinctly encoded binary relations and tree-structured documents
Jérémy Félix Barbay
,
Alexander Golynski
,
J. Munro
,
S. Rao
Theoretical Computer Science
2006
Corpus ID: 7426055
2006
2006
Content-based image retrieval using association rule mining with soft relevance feedback
Peng-Yeng Yin
,
Shin-Huei Li
Journal of Visual Communication and Image…
2006
Corpus ID: 33406355
Highly Cited
2006
Highly Cited
2006
Enhanced binary search with cut-through operation for anti-collision in RFID systems
Tsan-Pin Wang
IEEE Communications Letters
2006
Corpus ID: 35598385
RFID systems allow contactless identification of objects using radio frequency. When there is more than one transponder within…
Expand
2006
2006
The distance trisector curve
T. Asano
,
J. Matoušek
,
T. Tokuyama
Symposium on the Theory of Computing
2006
Corpus ID: 2195637
Given points P and Q in the plane, we are interested in separating them by two curves C<sub>1</sub> and C<sub>2</sub> such that…
Expand
Highly Cited
2005
Highly Cited
2005
A wide-range and fast-locking all-digital cycle-controlled delay-locked loop
Hsiang-Hui Chang
,
Shen-Iuan Liu
IEEE Journal of Solid-State Circuits
2005
Corpus ID: 25695048
An all-digital cycle-controlled delay-locked loop (DLL) is presented to achieve wide range operation, fast lock and process…
Expand
2005
2005
An ultra-low-power fast-lock-in small-jitter all-digital DLL
Jinn-Shyan Wang
,
Yi-Ming Wang
,
Chin-Hao Chen
,
Yu-Chia Liu
ISSCC. IEEE International Digest of Technical…
2005
Corpus ID: 19575695
Using binary-weighted differential-delay cells and an asynchronous binary search circuit, the proposed 1.0V 0.25 /spl mu/m all…
Expand
2004
2004
Speed and accuracy comparison of techniques for multiuser detection in synchronous CDMA
F. Hasegawa
,
Jie Luo
,
K. Pattipati
,
P. Willett
,
D. Pham
IEEE Transactions on Communications
2004
Corpus ID: 2036254
In this letter, we compare the complexity and efficiency of several methods used for multiuser detection in a synchronous code…
Expand
1972
1972
Dynamic Memories with Enhanced Data Access
H. Stone
IEEE transactions on computers
1972
Corpus ID: 206619309
Dynamic memories are commonly constructed as circulating shift registers, and thus have access times that are proportional to the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE