Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,286,857 papers from all fields of science
Search
Sign In
Create Free Account
Mask (computing)
Known as:
Masked imaging
, Bit masking
, Wildcard Netmask
Expand
In computer science, a mask is data that are used for bitwise operations, particularly in a bit field. Using a mask, multiple bits in a byte, nibble…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
43 relations
Adobe Photoshop
Affinity mask
Alpha compositing
Alpha mapping
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2020
Highly Cited
2020
Inception U-Net Architecture for Semantic Segmentation to Identify Nuclei in Microscopy Cell Images
Narinder Singh Punn
,
Sonali Agarwal
ACM Trans. Multim. Comput. Commun. Appl.
2020
Corpus ID: 214794035
With the increasing applications of deep learning in biomedical image analysis, in this article we introduce an inception U-Net…
Expand
Highly Cited
2019
Highly Cited
2019
A deep learning-based approach for mitigating falls from height with computer vision: Convolutional neural network
Weili Fang
,
B. Zhong
,
+4 authors
Shuangjie Xu
Advanced Engineering Informatics
2019
Corpus ID: 85519056
Highly Cited
2012
Highly Cited
2012
Red blood cell segmentation using masking and watershed algorithm: A preliminary study
J. M. Sharif
,
M. Miswan
,
Md. Asri Ngadi
,
S. Salam
,
M. M. Jamil
International Conference on Biomedical…
2012
Corpus ID: 24284419
Image segmentation is the most important step and a key technology in image processing which directly affect the next processing…
Expand
Highly Cited
2011
Highly Cited
2011
An exact bit-parallel algorithm for the maximum clique problem
P. S. Segundo
,
D. Rodríguez-Losada
,
Agustín Jiménez
Computers & Operations Research
2011
Corpus ID: 14438508
Highly Cited
2006
Highly Cited
2006
Blur filtration fails to preserve privacy for home-based video conferencing
Carman Neustaedter
,
S. Greenberg
,
Michael Boyle
TCHI
2006
Corpus ID: 14105128
Always-on video provides rich awareness for distance-separated coworkers. Yet video can threaten privacy, especially when it…
Expand
Highly Cited
2004
Highly Cited
2004
Protein interactions in the calf eye lens: interactions between β-crystallins are repulsive whereas in γ-crystallins they are attractive
A. Tardieu
,
F. Vérétout
,
B. Krop
,
C. Slingsby
European Biophysics Journal
2004
Corpus ID: 2641601
Non-specific interactions in β- and γ-crystallins have been studied by solution X-ray scattering and osmotic pressure experiments…
Expand
Highly Cited
2002
Highly Cited
2002
UNDERWATER NOISE OF WHALE‐WATCHING BOATS AND POTENTIAL EFFECTS ON KILLER WHALES (ORCINUS ORCA), BASED ON AN ACOUSTIC IMPACT MODEL
C. Erbe
2002
Corpus ID: 53381795
Underwater noise of whale-watching boats was recorded in the popular killer whale-watching region of southern British Columbia…
Expand
Highly Cited
1996
Highly Cited
1996
Software error analysis: a real case study involving real faults and mutations
M. Daran
,
P. Thévenod-Fosse
International Symposium on Software Testing and…
1996
Corpus ID: 1762513
The paper reports on a first experimental comparison of software errors generated by real faults and by 1st-order mutations. The…
Expand
Highly Cited
1992
Highly Cited
1992
The signal value of matched singing in great tits: evidence from interactive playback experiments
P. McGregor
,
T. Dabelsteen
,
Michael Shepherd
,
S. Pedersen
Animal Behaviour
1992
Corpus ID: 53171050
Highly Cited
1989
Highly Cited
1989
Current directions in computer music research
M. Mathews
,
J. Pierce
1989
Corpus ID: 60729926
An expensive laboratory luxury just 25 years ago, computer music is now entering the public domain. Inexpensive digital keyboards…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE