Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 223,670,455 papers from all fields of science
Search
Sign In
Create Free Account
Randomization function
Known as:
Randomisation function
, Randomizing function
In computer science, a randomization function or randomizing function is an algorithm or procedure that implements a randomly chosen function between…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Algorithm
Checksum
Computer science
Hash function
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Privacy Preservation Data Mining and Security
Dimah Almani
International Conference on Control, Automation…
2020
Corpus ID: 218832707
The paper is a research report on data mining – a subject which has been studied widely and whose application spans a wide range…
Expand
2019
2019
SMS Security Improvement using RSA in Complaints Application on Regional Head Election’s Fraud
Dwi Yuny Sylfania
,
F. P. Juniawan
,
Laurentinus Laurentinus
,
H. Pradana
Jurnal Teknologi dan Sistem Komputer
2019
Corpus ID: 209074783
In the campaign period of regional heads election, fraud can occur, such as money politics, blaming campaign facilities, campaign…
Expand
Review
2018
Review
2018
Monopsony and Employer Mis-optimization Account for Round Number Bunching in the Wage Distribution
Arindrajit Dubé
,
Alan Manning
,
Suresh Naidu
2018
Corpus ID: 264656856
We show that wages in administrative data and in online markets exhibit considerable bunching at round numbers that cannot all be…
Expand
Review
2017
Review
2017
Joint Factorizational Topic Models for Cross-City Recommendation
Xiao Lin
,
Min Zhang
,
Yongfeng Zhang
APWeb/WAIM
2017
Corpus ID: 31931583
The research of personalized recommendation techniques today has mostly parted into two mainstream directions, namely, the…
Expand
2016
2016
A Lightweight RFID Authentication Protocol with Forward Security and Randomized Identifier
Zhicai Shi
,
Fei Wu
,
Changzhi Wang
,
S. Ren
International Conference on Security, Privacy…
2016
Corpus ID: 33894930
The RFID tags only have limited computing and memory resources. This makes it difficult to solve their security and privacy…
Expand
2014
2014
By Modifying BEB Algorithm an Optimized MAC 802.11 Protocols for Wireless Network
R. Paper
,
Vaishali Tiwari
,
Prof. Damodar Tiwari
,
Prof. Vijay Lokhande
2014
Corpus ID: 212595491
— in wireless ad-hoc network, backoff is traditionally based on the IEEE binary exponential backoff algorithm. As wireless ad-hoc…
Expand
2014
2014
Randomized Additive Data Perturbation and Reconstruction Technique to Approximate Distribution of Original Information in PPDM
Dr. P. Kamakshi
2014
Corpus ID: 15977368
Data mining or knowledge discovery is the process of analysing data from different perspectives and summarizing it into useful…
Expand
2010
2010
Exploratory QTL analyses of some pepper physiological traits in two environments
N. Alimi
,
M. Bink
,
+5 authors
F. Eeuwijk
2010
Corpus ID: 83444675
behind phenotypic differences and led to selection of genotypes having favourable traits. Continuous monitoring of environmental…
Expand
2003
2003
Highly accurate and efficient evaluation of randomising set index functions
Hans Vandierendonck
,
K. D. Bosschere
Journal of systems architecture
2003
Corpus ID: 30537874
Review
2003
Review
2003
T-79.514 Special Course on Cryptology / Privacy-Preserving Data Mining: Database randomization via RRT
Isto Niemi
2003
Corpus ID: 14399079
This survey is a review of randomized response techniques for privacy-preserving data mining as described in the papers ”Using…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE