Skip to search formSkip to main contentSkip to account menu

Mask (computing)

Known as: Masked imaging, Bit masking, Wildcard Netmask 
In computer science, a mask is data that are used for bitwise operations, particularly in a bit field. Using a mask, multiple bits in a byte, nibble… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
This thesis describes the self-stratification as well as the purely lateral phase separation in a thin polymer blend film during… 
2015
2015
Ternary content addressable memory (TCAM) is one key component in high-performance networking applications. An asymmetric TCAM… 
2014
2014
Gamma-ray imaging is the most important way to identify unknown gamma-ray emitting objects in decommissioning, security… 
2010
2010
This paper details a methodology and preliminary results for applying a hierarchy of clustering units to mammographic image data… 
2009
2009
To fabricate microstructures with rapid prototyping system, a novel integral Stereolithography (SL) system is developed. Photo… 
2005
2005
Title of Dissertation: THE PHENOMENOLOGY OF RACIALISM: BLACKFACE PUPPETRY IN AMERICAN THEATRE, 1872-1939 Benjamin Daniel Fisler… 
2001
2001
Generation X The Structure of Chameleonism The Xer Chameleon The Great Transformation Make Way for the Xers The Search for… 
2001
2001
One important problem in code generation for embedded processors is the design of efficient compilers for target machines with… 
1997
1997
  • M. D. Cin
  • 1997
  • Corpus ID: 6060837
Fault tolerant behavior is an important non functional requirement for systems that involve high criticality. We present a… 
1992
1992
In Fourier synthesis, natural musical sounds are produced by summing time-varying sinusoids. Sounds from individual instruments…