Skip to search formSkip to main contentSkip to account menu

Mask (computing)

Known as: Masked imaging, Bit masking, Wildcard Netmask 
In computer science, a mask is data that are used for bitwise operations, particularly in a bit field. Using a mask, multiple bits in a byte, nibble… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
SRAM-based FPGAs, like Xilinx Virtex series, are susceptible to ionizing radiation and require configuration memory scrubbing in… 
2010
2010
Unknown (X) states are increasingly often identified as having potential for rendering semiconductor tests useless. One of the… 
Highly Cited
2004
Highly Cited
2004
Non-specific interactions in β- and γ-crystallins have been studied by solution X-ray scattering and osmotic pressure experiments… 
2001
2001
Generation X The Structure of Chameleonism The Xer Chameleon The Great Transformation Make Way for the Xers The Search for… 
2001
2001
One important problem in code generation for embedded processors is the design of efficient compilers for target machines with… 
Highly Cited
1998
Highly Cited
1998
This paper considers the use of the image quality metric for still image compression systems comparison. Considering the fact… 
1997
1997
  • M. D. Cin
  • 1997
  • Corpus ID: 6060837
Fault tolerant behavior is an important non functional requirement for systems that involve high criticality. We present a… 
Highly Cited
1995
Highly Cited
1995
Threespine stickleback vary greatly in male nuptial display, from full red expression between the throat and pelvis to total… 
Review
1972
Review
1972
Fidelity measures and criteria for visual communications are discussed. It is recognized that the basis of visual fidelity…