Bit array

Known as: Boolean vector, Bit vector, Bitvector 
A bit array (also known as bitmap, bitset, bit string, or bit vector) is an array data structure that compactly stores bits. It can be used to… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1961-2017
05010015019612017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2007
Highly Cited
2007
STP is a decision procedure for the satisfiability of quantifier-free formulas in the theory of bit-vectors and arrays that has… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In this paper, we define and explore <i>proofs of retrievability</i> (PORs). A POR scheme enables an archive or back-up service… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Our main result is a reduction from worst-case lattice problems such as SVP and SIVP to a certain learning problem. This learning… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We describe a parallelizable block-cipher mode of operation that simultaneously provides privacy and authenticity. OCB encrypts… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1998
Highly Cited
1998
 
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Private Information Retrieval (PIR) schemes allow a user to retrieve the i-th bit of a data string 2, replicated in k 2 2… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
We propose a private-key cryptosystem and a protocol for key agreement by public discussion that are unconditionally secure based… (More)
Is this relevant?
Highly Cited
1995
Highly Cited
1995
~ This paper provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett… (More)
Is this relevant?
Highly Cited
1989
Highly Cited
1989
In this paper we analyze and compare four parallel join algorithms. Grace and Hybrid hash represent the class of hash-based join… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1988
Highly Cited
1988
In this paper, we investigate how the use of a channel with perfect authenticity but no privacy can be used to repair the defects… (More)
Is this relevant?