Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,732,022 papers from all fields of science
Search
Sign In
Create Free Account
Bit array
Known as:
Boolean array
, Bit string
, Bitvector
Expand
A bit array (also known as bitmap, bitset, bit string, or bit vector) is an array data structure that compactly stores bits. It can be used to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
APL
Arithmetic logic unit
Array data structure
Binary data
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Design and management of flexible process variants using templates and rules
Akhil Kumar
,
W. Yao
Computers in industry (Print)
2012
Corpus ID: 18716364
2010
2010
Robust minutiae hash for fingerprint template protection
Bian Yang
,
C. Busch
,
Patrick A. H. Bours
,
Davrondzhon Gafurov
Electronic imaging
2010
Corpus ID: 5421460
A robust fingerprint minutiae hash generation algorithm is proposed in this paper to extract a binary secure hash bit string from…
Expand
Highly Cited
2010
Highly Cited
2010
SPACE: Sharing pattern-based directory coherence for multicore scalability
Hongzhou Zhao
,
Arrvindh Shriraman
,
S. Dwarkadas
International Conference on Parallel…
2010
Corpus ID: 5641505
An important challenge in multicore processors is the maintenance of cache coherence in a scalable manner. Directory-based…
Expand
2009
2009
Un-Trusted-HB: Security Vulnerabilities of Trusted-HB
Dmitry Frumkin
,
A. Shamir
IACR Cryptology ePrint Archive
2009
Corpus ID: 12791591
With increased use of passive RFID tags, the need for secure lightweight identification protocols arose. HB+ is one such protocol…
Expand
Highly Cited
2005
Highly Cited
2005
A Nonlinear Dynamics Perspective of Wolfram's New Kind of Science Part IV: from Bernoulli Shift to 1/F Spectrum
L. Chua
,
V. I. Sbitnev
,
Sook Yoon
International Journal of Bifurcation and Chaos in…
2005
Corpus ID: 14866747
By exploiting the new concepts of CA characteristic functions and their associated attractor time-τ maps, a complete…
Expand
2003
2003
HMM-based channel error mitigation and its application to distributed speech recognition
A. Peinado
,
V. Sánchez
,
J. L. Pérez-Córdoba
,
Á. D. L. Torre
Speech Communication
2003
Corpus ID: 2833796
Highly Cited
2001
Highly Cited
2001
Notes on design and implementation of compressed bit vectors
Kesheng Wu
2001
Corpus ID: 56526734
Author(s): Wu, Kesheng | Abstract: Many database applications make extensive use of bitmap indexing schemes. In this paper, we…
Expand
Highly Cited
1996
Highly Cited
1996
Shape Representations and Evolution Schemes
Marc Schoenauer
Evolutionary Programming
1996
Corpus ID: 11832375
The choice of a representation i.e. the deeni-tion of the search space, is of vital importance in all Evolutionary Optimization…
Expand
Highly Cited
1991
Highly Cited
1991
CAREL: Computer Aided Reliability Evaluator for Distributed Computing Networks
S. Soh
,
S. Rai
IEEE Trans. Parallel Distributed Syst.
1991
Corpus ID: 1132635
An efficient method to compute the terminal reliability (the probability of communication between a pair of nodes) of a…
Expand
Highly Cited
1988
Highly Cited
1988
The structure of the limit cycles in sigma delta modulation
V. Friedman
IEEE Transactions on Communications
1988
Corpus ID: 28804295
It is shown that when the input to a sigma-delta modulator is a DC level that can be expressed as a rational number b/a, when…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE