Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,006,437 papers from all fields of science
Search
Sign In
Create Free Account
Bitap algorithm
Known as:
Shift or algorithm
, Shift-or algorithm
, Shift-Or
Expand
The bitap algorithm (also known as the shift-or, shift-and or Baeza-Yates–Gonnet algorithm) is an approximate string matching algorithm. The…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Approximate string matching
Bitwise operation
Communications of the ACM
Damerau–Levenshtein distance
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Quantum Latin squares and unitary error bases
Benjamin Musto
,
J. Vicary
Quantum information & computation
2015
Corpus ID: 2790273
In this paper we introduce quantum Latin squares, combinatorial quantum objects which generalize classical Latin squares, and…
Expand
2014
2014
Low-Complexity Multiplierless Constant Rotators Based on Combined Coefficient Selection and Shift-and-Add Implementation (CCSSI)
M. Garrido
,
F. Qureshi
,
O. Gustafsson
IEEE Transactions on Circuits and Systems Part 1…
2014
Corpus ID: 1196668
This paper presents a new approach to design multiplierless constant rotators. The approach is based on a combined coefficient…
Expand
Highly Cited
2010
Highly Cited
2010
Computing Rightmost Eigenvalues for Small-Signal Stability Assessment of Large-Scale Power Systems
J. Rommes
,
N. Martins
,
F. Freitas
IEEE Transactions on Power Systems
2010
Corpus ID: 6638069
Knowledge of the rightmost eigenvalues of system matrices is essential in power system small-signal stability analysis. Accurate…
Expand
Review
2005
Review
2005
Identity as a Source of Moral Motivation
S. Hardy
,
G. Carlo
Human Development
2005
Corpus ID: 10861984
Theory and research regarding moral motivation has focused for decades on the roles of moral reasoning and, to some extent, moral…
Expand
Highly Cited
2004
Highly Cited
2004
A methodology for synthesis of efficient intrusion detection systems on FPGAs
Z. Baker
,
V. Prasanna
12th Annual IEEE Symposium on Field-Programmable…
2004
Corpus ID: 289268
Intrusion detection for network security is a computation intensive application demanding high system performance. System level…
Expand
Highly Cited
2004
Highly Cited
2004
A 64-point Fourier transform chip for high-speed wireless LAN application using OFDM
K. Maharatna
,
E. Grass
,
U. Jagdhold
IEEE Journal of Solid-State Circuits
2004
Corpus ID: 16300034
In this paper, we present a novel fixed-point 16-bit word-width 64-point FFT/IFFT processor developed primarily for the…
Expand
Highly Cited
2003
Highly Cited
2003
Choice of Travel Mode in the Theory of Planned Behavior: The Roles of Past Behavior, Habit, and Reasoned Action
S. Bamberg
,
I. Ajzen
,
P. Schmidt
2003
Corpus ID: 145180925
Relying on the theory of planned behavior (Ajzen, 1991), a longitudinal study investigated the effects of an intervention…
Expand
Review
1992
Review
1992
CORDIC-based VLSI architectures for digital signal processing
Yu-Hen Hu
IEEE Signal Processing Magazine
1992
Corpus ID: 25009810
The evolution of CORDIC, an iterative arithmetic computing algorithm capable of evaluating various elementary functions using a…
Expand
Highly Cited
1992
Highly Cited
1992
A new 'shift and ratio' method for MOSFET channel-length extraction
Y. Taur
,
D. Zicherman
,
+6 authors
G. Shahidi
IEEE Electron Device Letters
1992
Corpus ID: 39754853
A shift-and-ratio method for extracting MOSFET channel length is presented. In this method, channel mobility can be any function…
Expand
Highly Cited
1989
Highly Cited
1989
Algorithm engineering for public key algorithms
T. Beth
,
D. Gollmann
IEEE J. Sel. Areas Commun.
1989
Corpus ID: 43850579
Methods of implementing public key algorithms based on modular integer arithmetic (RSA) and finite-field arithmetic (Diffie…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE