Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,708,871 papers from all fields of science
Search
Sign In
Create Free Account
Random number generation
Known as:
Random number god
, Random event generator (consciousness research)
, Random number
Expand
A random-number generator (RNG) is a computational or physical device designed to generate a sequence of numbers or symbols that cannot be reasonably…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Arthur–Merlin protocol
Atmospheric noise
Bingo voting
Blocking (computing)
Expand
Broader (1)
Information theory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Secure Tag Search in RFID Systems Using Mobile Readers
S. Sundaresan
,
R. Doss
,
S. Piramuthu
,
Wanlei Zhou
IEEE Transactions on Dependable and Secure…
2015
Corpus ID: 16905346
One of the important features of an RFID system is its ability to search for a particular tag among a group of tags. In order to…
Expand
Highly Cited
2010
Highly Cited
2010
A novel cellular automata based technique for visual multimedia content encryption
Savvas A Chatzichristofis
,
D. Mitzias
,
G. Sirakoulis
,
Y. Boutalis
2010
Corpus ID: 30332632
Highly Cited
2009
Highly Cited
2009
Optimization of Power Allocation for Interference Cancellation With Particle Swarm Optimization
K. Zielinski
,
P. Weitkemper
,
R. Laur
,
K. Kammeyer
IEEE Transactions on Evolutionary Computation
2009
Corpus ID: 2278794
In code division multiple access (CDMA) systems a significant degradation in detection performance due to multiuser interference…
Expand
Highly Cited
2009
Highly Cited
2009
ECC-based lightweight authentication protocol with untraceability for low-cost RFID
Hung-Yu Chien
,
C. Laih
J. Parallel Distributed Comput.
2009
Corpus ID: 44427660
Highly Cited
2004
Highly Cited
2004
Minimum and maximum utilization bounds for multiprocessor rate monotonic scheduling
J. López
,
J. L. Díaz
,
D. F. García
IEEE Transactions on Parallel and Distributed…
2004
Corpus ID: 825704
The utilization bound for real-time rate monotonic (RM) scheduling on uniprocessors is extended to multiprocessors with…
Expand
Highly Cited
2003
Highly Cited
2003
Optimal Design of Reliable Computer Networks: A Comparison of Metaheuristics
Fulya Altiparmak
,
B. Dengiz
,
Alice E. Smith
J. Heuristics
2003
Corpus ID: 15957541
In many computer communications network design problems, such as those faced by hospitals, universities, research centers, and…
Expand
Highly Cited
1998
Highly Cited
1998
Algorithms for the Detection of Su b-Pixel Targets in Multispectral Imagery
E. Ashton
,
A. Schaum
1998
Corpus ID: 17807206
A new sub-pixel target detection algorithm is developed that integrates a linear mixing model (LMM) with the powefil "RX" anomaly…
Expand
Highly Cited
1989
Highly Cited
1989
Secure random number generation using chaotic circuits
Greg Bernstein
,
Michael A. Lieberman
IEEE Military Communications Conference…
1989
Corpus ID: 60839082
The authors show how to use a chaotic circuit as a secure random number generator and given an example using a first-order…
Expand
1984
1984
Random Number Generation on Microcomputers
D. Modianos
,
R. Scott
,
L. Cornwell
1984
Corpus ID: 62601939
In a study of the statistical and temporal characteristics of random number generators for microcomputers, several peculiarities…
Expand
1967
1967
Random-number generation on digital computers
R. P. Chambers
IEEE spectrum
1967
Corpus ID: 51647318
Random sampling methods are valuable not only for providing solutions to problems involving probability but also for solving many…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE