Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,668,859 papers from all fields of science
Search
Sign In
Create Free Account
Bit array
Known as:
Boolean array
, Bit string
, Bitvector
Expand
A bit array (also known as bitmap, bitset, bit string, or bit vector) is an array data structure that compactly stores bits. It can be used to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
APL
Arithmetic logic unit
Array data structure
Binary data
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Design and management of flexible process variants using templates and rules
Akhil Kumar
,
W. Yao
Computers in industry (Print)
2012
Corpus ID: 18716364
2010
2010
Robust minutiae hash for fingerprint template protection
Bian Yang
,
C. Busch
,
Patrick A. H. Bours
,
Davrondzhon Gafurov
Electronic imaging
2010
Corpus ID: 5421460
A robust fingerprint minutiae hash generation algorithm is proposed in this paper to extract a binary secure hash bit string from…
Expand
Highly Cited
2010
Highly Cited
2010
SPACE: Sharing pattern-based directory coherence for multicore scalability
Hongzhou Zhao
,
Arrvindh Shriraman
,
S. Dwarkadas
International Conference on Parallel…
2010
Corpus ID: 5641505
An important challenge in multicore processors is the maintenance of cache coherence in a scalable manner. Directory-based…
Expand
Highly Cited
2010
Highly Cited
2010
Secret keys from entangled sensor motes: implementation and analysis
Matthias Wilhelm
,
I. Martinovic
,
J. Schmitt
Wireless Network Security
2010
Corpus ID: 708417
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource…
Expand
Highly Cited
2005
Highly Cited
2005
A Nonlinear Dynamics Perspective of Wolfram's New Kind of Science Part IV: from Bernoulli Shift to 1/F Spectrum
L. Chua
,
V. I. Sbitnev
,
Sook Yoon
International Journal of Bifurcation and Chaos in…
2005
Corpus ID: 14866747
By exploiting the new concepts of CA characteristic functions and their associated attractor time-τ maps, a complete…
Expand
2003
2003
HMM-based channel error mitigation and its application to distributed speech recognition
A. Peinado
,
V. Sánchez
,
J. L. Pérez-Córdoba
,
Á. D. L. Torre
Speech Communication
2003
Corpus ID: 2833796
Highly Cited
2001
Highly Cited
2001
Notes on design and implementation of compressed bit vectors
Kesheng Wu
2001
Corpus ID: 56526734
Author(s): Wu, Kesheng | Abstract: Many database applications make extensive use of bitmap indexing schemes. In this paper, we…
Expand
1999
1999
Anonymous Fingerprinting Based on Committed Oblivious Transfer
J. Domingo-Ferrer
International Conference on Theory and Practice…
1999
Corpus ID: 1036843
Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce…
Expand
Highly Cited
1984
Highly Cited
1984
Design and Application of Self-Testing Comparators Implemented with MOS PLA's
Y. Tamir
,
C. Séquin
IEEE transactions on computers
1984
Corpus ID: 11137821
A high probability of detecting errors caused by hardware faults is an essential property of any fault-tolerant system. VLSI…
Expand
1983
1983
Vectorization of molecular dynamics Fortran programs using the cyber 205 vector processing computer
R. Vogelsang
,
M. Schoen
,
C. Hoheisel
1983
Corpus ID: 62721903
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE