Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,475,751 papers from all fields of science
Search
Sign In
Create Free Account
Randomization function
Known as:
Randomisation function
, Randomizing function
In computer science, a randomization function or randomizing function is an algorithm or procedure that implements a randomly chosen function between…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Algorithm
Checksum
Computer science
Hash function
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Privacy Preservation Data Mining and Security
Dimah Almani
International Conference on Control, Automation…
2020
Corpus ID: 218832707
The paper is a research report on data mining – a subject which has been studied widely and whose application spans a wide range…
Expand
2019
2019
SMS Security Improvement using RSA in Complaints Application on Regional Head Election’s Fraud
Dwi Yuny Sylfania
,
F. P. Juniawan
,
Laurentinus Laurentinus
,
H. Pradana
Jurnal Teknologi dan Sistem Komputer
2019
Corpus ID: 209074783
In the campaign period of regional heads election, fraud can occur, such as money politics, blaming campaign facilities, campaign…
Expand
2016
2016
A Lightweight RFID Authentication Protocol with Forward Security and Randomized Identifier
Zhicai Shi
,
Fei Wu
,
Changzhi Wang
,
S. Ren
International Conference on Security, Privacy…
2016
Corpus ID: 33894930
The RFID tags only have limited computing and memory resources. This makes it difficult to solve their security and privacy…
Expand
Review
2016
Review
2016
Integrating Topic Models and Latent Factors for Recommendation
Danis J. Wilson
,
Wei Zhang
arXiv.org
2016
Corpus ID: 10788304
The research of personalized recommendation techniques today has mostly parted into two mainstream directions, i.e., the…
Expand
2014
2014
By Modifying BEB Algorithm an Optimized MAC 802.11 Protocols for Wireless Network
R. Paper
,
Vaishali Tiwari
,
Prof. Damodar Tiwari
,
Prof. Vijay Lokhande
2014
Corpus ID: 212595491
— in wireless ad-hoc network, backoff is traditionally based on the IEEE binary exponential backoff algorithm. As wireless ad-hoc…
Expand
2014
2014
Randomized Additive Data Perturbation and Reconstruction Technique to Approximate Distribution of Original Information in PPDM
Dr. P. Kamakshi
2014
Corpus ID: 15977368
Data mining or knowledge discovery is the process of analysing data from different perspectives and summarizing it into useful…
Expand
2010
2010
Exploratory QTL analyses of some pepper physiological traits in two environments
N. Alimi
,
M. Bink
,
+5 authors
F. Eeuwijk
2010
Corpus ID: 83444675
behind phenotypic differences and led to selection of genotypes having favourable traits. Continuous monitoring of environmental…
Expand
2010
2010
An Improved Approach to High Level Privacy Preserving Itemset Mining
Raj Boora
,
Ruchi Shukla
,
A. Misra
arXiv.org
2010
Corpus ID: 9003231
Privacy preserving association rule mining has triggered the development of many privacy preserving data mining techniques. A…
Expand
2003
2003
Highly accurate and efficient evaluation of randomising set index functions
Hans Vandierendonck
,
K. D. Bosschere
Journal of systems architecture
2003
Corpus ID: 30537874
Review
2003
Review
2003
T-79.514 Special Course on Cryptology / Privacy-Preserving Data Mining: Database randomization via RRT
Isto Niemi
2003
Corpus ID: 14399079
This survey is a review of randomized response techniques for privacy-preserving data mining as described in the papers ”Using…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE