Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,678,428 papers from all fields of science
Search
Sign In
Create Free Account
Input mask
In computer programming, an input mask refers to a string expression, defined by a developer, that governs what a user is allowed to enter in as…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
Broader (1)
Data quality
Decimal mark
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
Scaling Symbolic Methods using Gradients for Neural Model Explanation
Subham S. Sahoo
,
Subhashini Venugopalan
,
Li Li
,
Rishabh Singh
,
Patrick F. Riley
International Conference on Learning…
2020
Corpus ID: 220266076
Symbolic techniques based on Satisfiability Modulo Theory (SMT) solvers have been proposed for analyzing and verifying neural…
Expand
2018
2018
Single-shot image retrieval through a multimode fiber using a genetic algorithm
Michael Ruddlesden
,
Jinshuai Zhang
,
Tianrui Zhao
,
Wen Wang
,
Lei Su
2018
Corpus ID: 125611422
In this letter, we present a genetic algorithm-based approach for image retrieval through a multimode fiber in a reference-less…
Expand
2014
2014
"UML Quiz": Automatic Conversion of Web-Based E-Learning Content in Mobile Applications
Alexander von Franqué
,
H. Tellioglu
2014
Corpus ID: 11469997
Many educational institutions use Learning Management Systems to provide e-learning content to their students. This often…
Expand
2014
2014
Systems, devices and methods for determining a following lowest masking bits of a type toy register
C. Hughes
,
Mark J. Charney
,
+4 authors
Robert Valentine
2014
Corpus ID: 222754107
The execution of a KZBTZ determines a following least significant zero bit position in a first input mask and sets an output mask…
Expand
2012
2012
SVD Based Automatic Detection of Target Regions for Image Inpainting
Milind G. Padalkar
,
M. Zaveri
,
M. Joshi
ACCV Workshops
2012
Corpus ID: 8013990
We are often required to retouch images in order to improve their visual appearance, by removing the visual discontinuities like…
Expand
2012
2012
MobilePaperAccess: Ubiquitous Paper-based Interfaces for Mobile Interactions
Yun Zhou
,
B. David
,
R. Chalon
ANT/MobiWIS
2012
Corpus ID: 13380339
2004
2004
Progressive architecture of mask supply chain and integrated operation system supporting extreme-QTAT device manufacturing
M. Mori
,
I. Miyazaki
,
Ken Fujimoto
,
K. Hosono
Photomask Japan
2004
Corpus ID: 110670031
In recent years, Quick-TAT (Turn-Around Time) in preparing masks is very important factor together with the complexity and cost…
Expand
2003
2003
Masking Errors Through Software Robustness
Z. Al-Khanjari
,
M. Woodward
,
N. S. Kutti
,
H. Ramadhan
,
K. Shihab
International Conference on Internet Computing
2003
Corpus ID: 9134246
1999
1999
Evolutionary Programming of Near-Optimal Neural Networks
D. Lock
,
C. Giraud-Carrier
International Conference on Adaptive and Natural…
1999
Corpus ID: 18354763
A genetic algorithm (GA) method that evolves both the topology and training parameters of backpropagation-trained, fully…
Expand
1981
1981
Network recognition for VLSI mask pattern data
Kunimitsu Fujiki
1981
Corpus ID: 62754264
Network recognition processing for obtaining circuit connections from mask data (mask pattern) is a keystone of test processing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE