Academic literature on the topic 'Algorithmic identity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Algorithmic identity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Algorithmic identity"

1

Cheney-Lippold, John. "A New Algorithmic Identity." Theory, Culture & Society 28, no. 6 (2011): 164–81. http://dx.doi.org/10.1177/0263276411424420.

Full text
Abstract:
Marketing and web analytic companies have implemented sophisticated algorithms to observe, analyze, and identify users through large surveillance networks online. These computer algorithms have the capacity to infer categories of identity upon users based largely on their web-surfing habits. In this article I will first discuss the conceptual and theoretical work around code, outlining its use in an analysis of online categorization practices. The article will then approach the function of code at the level of the category, arguing that an analysis of coded computer algorithms enables a supple
APA, Harvard, Vancouver, ISO, and other styles
2

Karizat, Nadia, Dan Delmonaco, Motahhare Eslami, and Nazanin Andalibi. "Algorithmic Folk Theories and Identity: How TikTok Users Co-Produce Knowledge of Identity and Engage in Algorithmic Resistance." Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (2021): 1–44. http://dx.doi.org/10.1145/3476046.

Full text
Abstract:
Algorithms in online platforms interact with users' identities in different ways. However, little is known about how users understand the interplay between identity and algorithmic processes on these platforms, and if and how such understandings shape their behavior on these platforms in return. Through semi-structured interviews with 15 US-based TikTok users, we detail users' algorithmic folk theories of the For You Page algorithm in relation to two inter-connected identity types: person and social identity. Participants identified potential harms that can accompany algorithms' tailoring cont
APA, Harvard, Vancouver, ISO, and other styles
3

Packer, Jeremy. "Homeland Subjectivity: The Algorithmic Identity of Security." Communication and Critical/Cultural Studies 4, no. 2 (2007): 211–15. http://dx.doi.org/10.1080/14791420701296588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kotliar, Dan M. "The return of the social: Algorithmic identity in an age of symbolic demise." New Media & Society 22, no. 7 (2020): 1152–67. http://dx.doi.org/10.1177/1461444820912535.

Full text
Abstract:
This article explores the socio-algorithmic construction of identity categories based on an ethnographic study of the Israeli data analytics industry. While algorithmic categorization has been described as a post-textual phenomenon that leaves language, social theory, and social expertise behind, this article focuses on the return of the social—the process through which the symbolic means resurface to turn algorithmically produced clusters into identity categories. I show that such categories stem not only from algorithms’ structure or their data, but from the social contexts from which they a
APA, Harvard, Vancouver, ISO, and other styles
5

James, Keith, and Jacob Eisenberg. "Personal Identity and Group Identity Influences on Algorithmic and Original Task Performance." Creativity Research Journal 16, no. 1 (2004): 91–103. http://dx.doi.org/10.1207/s15326934crj1601_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Angela Y., Hannah Mieczkowski, Nicole B. Ellison, and Jeffrey T. Hancock. "The Algorithmic Crystal: Conceptualizing the Self through Algorithmic Personalization on TikTok." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022): 1–22. http://dx.doi.org/10.1145/3555601.

Full text
Abstract:
This research examines how TikTok users conceptualize and engage with personalized algorithms on the TikTok platform. Using qualitative methods, we analyzed 24 interviews with TikTok users to explore how algorithmic personalization processes inform people's understanding of their identities as well as shape their orientation to others. Building on insights from our qualitative data and previous scholarship on algorithms and identity, we propose a novel conceptual model to understand how people think about and interact with personalized algorithmic systems. Drawing on the metaphor of crystals a
APA, Harvard, Vancouver, ISO, and other styles
7

Researcher. "ALGORITHMIC IDENTITY AND THE FRAGMENTATION OF CULTURAL CONSENSUS: EXPLORING THE POLITICS OF BELONGING AND SOCIAL COHESION IN AI-MEDIATED SOCIETIES." International Journal of Politics, Culture, and Society (IJPCS) 2, no. 1 (2025): 1–9. https://doi.org/10.5281/zenodo.15608656.

Full text
Abstract:
The rapid integration of artificial intelligence (AI) into digital platforms has reconfigured societal dynamics, influenced not only economic and political systems but also reshaping identities and perceptions of belonging. This paper interrogates how algorithmic governance and AI-driven personalization contribute to the fragmentation of cultural consensus in contemporary societies. It explores how AI mediates social cohesion, often creating algorithmic echo chambers, identity silos, and digital tribalism. Drawing upon prior literature and emerging developments as of this study offers a concep
APA, Harvard, Vancouver, ISO, and other styles
8

Holmes, Martin. "Algorithmic Determination of Japanese Ethnic Identity Based on Name." Journal of the Japanese Association for Digital Humanities 3, no. 1 (2018): 73–97. http://dx.doi.org/10.17928/jjadh.3.1_73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Muchitsch, Veronika. "“Genrefluid” Spotify Playlists and Mediations of Genre and Identity in Music Streaming." IASPM Journal 13, no. 3 (2023): 48–65. http://dx.doi.org/10.5429/2079-3871(2023)v13i3.5en.

Full text
Abstract:
Recent popular discourse has claimed that music and listeners’ tastes are becoming increasingly “genrefluid” in popular music culture, and this idea has been linked to the logics of music streaming services. This article analyzes the Spotify-curated playlist Lorem, which has been presented by the company as a primary illustration of “genrefluid” music curation and listening, to investigate Spotify’s mediations of genre and identity at the intersections of media discourse, genre metadata, and curated sound. I discuss how the idea of genrefluidity links post-genre and post-identity discourses to
APA, Harvard, Vancouver, ISO, and other styles
10

Sujatha Lakshmi Narra. "Human-AI Collaboration in Identity Security: When Should AI Decide?" Journal of Computer Science and Technology Studies 7, no. 7 (2025): 191–97. https://doi.org/10.32996/jcsts.2025.7.7.17.

Full text
Abstract:
The integration of artificial intelligence into identity and access management presents both transformative opportunities and significant challenges for contemporary security frameworks. This article examines the critical question of decision authority allocation in AI-augmented security environments: determining when automated systems should independently make access determinations versus when human expertise remains essential. Through analysis of implementation case studies across financial services and healthcare sectors, the research identifies patterns of successful collaboration between
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Algorithmic identity"

1

Bellesia, Francesca <1990&gt. "Individuals in the Workplatform. Exploring Implications for Work Identity and Algorithmic Reputation Management." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amsdottorato.unibo.it/9259/1/Thesis%20Final%20February%202020.pdf.

Full text
Abstract:
In the new world of work, workers not only change jobs more frequently, but also perform independent work on online labor markets. As they accomplish smaller and shorter jobs at the boundaries of organizations, employment relationships become unstable and career trajectories less linear. These new working conditions question the validity of existing management theories and call for more studies explaining gig workers’ behavior. Aim of this dissertation is contributing to this emerging body of knowledge by (I) exploring how gig workers shape their work identity on online platforms, and (II) inv
APA, Harvard, Vancouver, ISO, and other styles
2

Hayman, Bernard Akeem. "Community, Identity, and Agency in the Age of Big Social Data: A Place-based Study on Literacies, Perceptions, and Responses of Digital Engagement." The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1586602013429227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Putigny, Herve. "Dynamiques socioculturelles et algorithmiques d'entrée dans une communauté cybercriminelles." Electronic Thesis or Diss., Bourgogne Franche-Comté, 2022. http://www.theses.fr/2022UBFCH019.

Full text
Abstract:
La généralisation croissante des technologies informatiques conventionnelles et l'émergence de l'internet des objets constituent probablement des principes fondateurs d'un nouvel ordre mondial numérique. L'omniprésence, l'interdépendance des réseaux et la convergence des composantes du cyberespace catalysent la formation de groupes sociaux dans un objet tel qu'Internet et en particulier dans les médias sociaux. Cette thèse étudiera en particulier la naissance de communautés cybercriminelles, ainsi que les rites et les liens d'affinité des membres de ces sociétés. Au-delà de mettre en exergue l
APA, Harvard, Vancouver, ISO, and other styles
4

Poudel, Bhuwan Krishna Som. "Algorithms to identify failure pattern." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-23011.

Full text
Abstract:
This project report was written for ?Algorithms to Identify Failure Pattern? at NTNU (Norwegian University of Science and Technology), IME (Faculty of Information Technology, Mathematics and Electrical Engineering) and IDI (Department of Computer Science).In software application, there are three types of failure pattern: point pattern, block pattern and stripe pattern. The purpose of the report is to prepare an algorithm that identifies the pattern in a software application. Only theoretical concept is written in this report. My goal is to compare these algorithms and find the efficient one.Th
APA, Harvard, Vancouver, ISO, and other styles
5

Wei, Hao. "Evolving test environments to identify faults in swarm robotics algorithms." Thesis, University of York, 2018. http://etheses.whiterose.ac.uk/22022/.

Full text
Abstract:
Swarm robotic systems are often considered to be dependable. However, there is little empirical evidence or theoretical analysis showing that dependability is an inherent property of all swarm robotic systems. Recent literature has identified potential issues with respect to dependability within certain types of swarm robotic control algorithms. However, there is little research on the testing of swarm robotic systems; this provides the motivation for developing a novel testing method for swarm robotic systems. An evolutionary testing method is proposed in this thesis to identify unintended be
APA, Harvard, Vancouver, ISO, and other styles
6

Aimejalii, K., Keshav P. Dahal, and M. Alamgir Hossain. "GA-based learning algorithms to identify fuzzy rules for fuzzy neural networks." IEEE, 2007. http://hdl.handle.net/10454/2553.

Full text
Abstract:
Identification of fuzzy rules is an important issue in designing of a fuzzy neural network (FNN). However, there is no systematic design procedure at present. In this paper we present a genetic algorithm (GA) based learning algorithm to make use of the known membership function to identify the fuzzy rules form a large set of all possible rules. The proposed learning algorithm initially considers all possible rules then uses the training data and the fitness function to perform ruleselection. The proposed GA based learning algorithm has been tested with two different sets of training
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Liang. "Motif Selection Using Simulated Annealing Algorithm with Application to Identify Regulatory Elements." Ohio University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1531343206505855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, Jennifer J., and Hsinchun Chen. "Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks." Elsevier, 2004. http://hdl.handle.net/10150/106207.

Full text
Abstract:
Artificial Intelligence Lab, Department of MIS, University of Arizona<br>Effective and efficient link analysis techniques are needed to help law enforcement and intelligence agencies fight organized crimes such as narcotics violation, terrorism, and kidnapping. In this paper, we propose a link analysis technique that uses shortest-path algorithms, priority-first-search (PFS) and two-tree PFS, to identify the strongest association paths between entities in a criminal network. To evaluate effectiveness, we compared the PFS algorithms with crime investigatorsâ typical association-search approa
APA, Harvard, Vancouver, ISO, and other styles
9

Tolley, Joseph D. "Implementation and Evaluation of an Algorithm for User Identity and Permissions for Situational Awareness Analysis." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/89907.

Full text
Abstract:
The thesis analyzes the steps and actions necessary to develop an application using a user identity management system, user permissions system, message distribution system, and message response data collection and display system to deliver timely command and control of human assets and the input of intelligence in emergency response situations. The application, MinuteMan, uniquely manages messages sent between multiple users and their parent organizations. Specifically, messages are stored, managed, and displayed to managers based on the hierarch or organizational rank as well as situational
APA, Harvard, Vancouver, ISO, and other styles
10

Aurangabadwala, Tehsin T. "DEVELOPMENT OF AN EXPERT ALGORITHM TO IDENTIFY RISKS ASSOCIATED WITH A RESEARCH FACILITY." Ohio University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1173823780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Algorithmic identity"

1

Polk, Tim. Cryptographic algorithms and key sizes for Personal Identity Verification. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Polk, Tim. Cryptographic algorithms and key sizes for Personal Identity Verification. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Grigor'ev, Anatoliy, and Evgeniy Isaev. Methods and algorithms of data processing. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1032305.

Full text
Abstract:
The tutorial deals with selected methods and algorithms of data processing, the sequence of solving problems of processing and analysis of data to create models behavior of the object taking into account all the components of its mathematical model. Describes the types of technological methods for the use of software and hardware for solving problems in this area. The algorithms of distributions, regressions vremenny series, transform them with the aim of obtaining mathematical models and prediction of the behavior information and economic systems (objects).&#x0D; The second edition is supplem
APA, Harvard, Vancouver, ISO, and other styles
4

Camenisch, Jan. Privacy and Identity Management for Life. Springer-Verlag Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sloot, Bart, and Aviva Groot, eds. The Handbook of Privacy Studies. Amsterdam University Press, 2018. http://dx.doi.org/10.5117/9789462988095.

Full text
Abstract:
The Handbook of Privacy Studies is the first book in the world that brings together several disciplinary perspectives on privacy, such as the legal, ethical, medical, informatics and anthropological perspective. Privacy is in the news almost every day: mass surveillance by intelligence agencies, the use of social media data for commercial profit and political microtargeting, password hacks and identity theft, new data protection regimes, questionable reuse of medical data, and concerns about how algorithms shape the way we think and decide. This book offers interdisciplinary background informa
APA, Harvard, Vancouver, ISO, and other styles
6

Kochetova, Zhanna, Natal'ya Maslova, and Oleg Bazarskiy. Aviation and missile clusters and the environment. INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1544137.

Full text
Abstract:
The monograph introduces a new concept - the aviation and missile cluster as a new class of objects of geo-ecological monitoring, united by the solution of identical strategic tasks of the state, the interconnection of its structural elements, the identity of priority contaminants and products of their transformation.&#x0D; The scientific and methodological apparatus of complex geoecological monitoring of territories under the influence of objects of aviation and space activities is presented, including predictive models of the spread and transformation of priority contaminants in environmenta
APA, Harvard, Vancouver, ISO, and other styles
7

Penny, Duquenoy, Hansen Marit, Leenes Ronald, Zhang Ge, and SpringerLink (Online service), eds. Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers. IFIP International Federation for Information Processing, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Making It Personal: Algorithmic Personalization, Identity, and Everyday Life. Oxford University Press, Incorporated, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kant, Tanya. Making It Personal: Algorithmic Personalization, Identity, and Everyday Life. Oxford University Press, Incorporated, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kant, Tanya. Making it Personal. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190905088.001.0001.

Full text
Abstract:
The encounter of “personalized experiences”—targeted advertisements, tailored information feeds, and “recommended” content, among other things—is now a common and somewhat inescapable component of digital life. More often than not however, “you” the user are not primarily responsible for personalizing your web engagements: instead, with the help of your search, browsing, and purchase histories, your “likes,” your click-throughs, and a multitude of other data you produce as you go about your day, your experience can “conveniently”—and computationally—be personalized on your behalf. This book ex
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Algorithmic identity"

1

Schneider, Stephanie. "Modelling Vision: A Semeiotic Approach to Algorithmic Images." In Imaging Identity. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21774-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Petzold, Thomas. "Human-Algorithmic Scaffolding." In Crossroads in New Media, Identity and Law. Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137491268_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Albrecht, Eduardo. "India." In Political Automation. Oxford University Press, 2025. https://doi.org/10.1093/9780197696989.003.0011.

Full text
Abstract:
Abstract This chapter features interviews with Anushka Jain of the Digital Futures Lab and Shweta Mohandas from the Centre for Internet and Society. Both organizations are based in India and investigate issues related to technology and society, algorithmic decision-making, digital rights, and online privacy. Jain discusses the ubiquity of facial recognition projects in India and highlights the potential of the Aadhaar digital identity system to violate the rights of citizens, particularly the most vulnerable. Mohandas points out the trade-offs between maintaining national security and protecting privacy rights, discusses the potential misuse of data by foreign and private actors, and highlights the advances and lacunae of the recently passed Personal Data Protection Act. Both Mohandas and Jain agree that the use of geolocation trackers for municipal workers is open to abuse and presents a serious violation of civil rights that is likely to expand if left unchecked.
APA, Harvard, Vancouver, ISO, and other styles
4

Bodó, Balázs, and Linda Weigl. "The Frameworks of Trust and Trustlessness Around Algorithmic Control Technologies: A Lost Sense of Community." In Public Governance and Emerging Technologies. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-84748-6_16.

Full text
Abstract:
Abstract Certain techno-political infrastructures, e.g. blockchains, aim to replace our existing social and institutional modes of producing trust as a social resource. Can they successfully do that, without the reliance on the very same institutions, which could safeguard and guarantee their trustworthiness in the first place? By now we have more than a decade of experience trying to build autonomous, code-driven, private ordering infrastructures, designed to complement, disrupt, or replace both private and public institutions. The revolution of these ‘trustless’ digital technologies is yet to happen, raising concerns about their promises to address the existing trust challenges of centralized institutions, their capacity to eliminate the societal reliance on trust, and the potential consequences thereof. Therefore, in this chapter, we pose the following questions: How does trustlessness through the elimination of more-or-less trusted middlemen impact our values and our sense of belonging? How does the decision to end trust maintenance through trustless technologies impact the cultivation of a sense of community within a society? This chapter addresses these questions by critically reviewing the claims surrounding the trustlessness of automated, code-as-law-based governance systems in the field of digital identity management—an area that continues to command the attention of various organizations and institutions.
APA, Harvard, Vancouver, ISO, and other styles
5

Schon, Bernd Friedrich. "Identity 5.0: How to Fight Algorithms Online (Fast). Heuristic Compressions of Personality Concepts (Dis)Obedient to Algorithmic Power—from Film, Television and a Cult Classic Novel." In (Dis)Obedience in Digital Societies. transcript Verlag, 2022. http://dx.doi.org/10.14361/9783839457634-014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gautam, Tanvi. "Identity—Based Encryption." In Emerging Security Algorithms and Techniques, edited by Aditya Thakkar and Nitish Pathak. Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hunt, Luke William. "Algorithms and Justice." In The Police Identity Crisis. Routledge, 2021. http://dx.doi.org/10.4324/9781003145455-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stroeken, Koen. "Prologue." In Simplex Society. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-41115-1_1.

Full text
Abstract:
AbstractThe prologue situates this book within the epoch of post-truth, when society and humanity have grown apart, and ‘reality’ and ‘feeling’ have become one. The broader context is the Anthropocene, marked by a series of lifeways systematically exploiting the sources of production. In communication and technology, one-directional signals or ‘simplexes’ block off the contradicting input in parallel that could humanize. The result is, among others, polarization, populism, dehumanization, racism, conspiracy hypes, memetic escalation, a-historicism, dogmatic positivism, emo-cracy and identity politics, but also technologies of automation, massification, human resources formatism, algorithmic preprocessing, surveillance and remote-controlled warfare. Simplex phenomena dissociate feeling from meaning whereafter emotions can be manipulated.The diagnosis of Part I (Simplex Frames) comes with a remedy in Part II (Tensors of the Undertow). We have reason for optimism. In a knowledge society, whose currency is language instead of capital, altered vocabulary can end discrimination and injustice. The media-savvy generations are destined to drag us out of post-truth. They know about ‘tensors’ that stretch the simplex back to life. They cultivate intuition, the missing link between spirituality and knowledge.
APA, Harvard, Vancouver, ISO, and other styles
9

Gonçalves, Rafael, Filipe Gouveia, Inês Lynce, and José Fragoso Santos. "Proxy Attribute Discovery in Machine Learning Datasets via Inductive Logic Programming." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-90653-4_17.

Full text
Abstract:
Abstract The issue of fairness is a well-known challenge in Machine Learning (ML) that has gained increased importance with the emergence of Large Language Models (LLMs) and generative AI. Algorithmic bias can manifest during the training of ML models due to the presence of sensitive attributes, such as gender or racial identity. One approach to mitigate bias is to avoid making decisions based on these protected attributes. However, indirect discrimination can still occur if sensitive information is inferred from proxy attributes. To prevent this, there is a growing interest in detecting potential proxy attributes before training ML models. In this case study, we report on the use of Inductive Logic Programming (ILP) to discover proxy attributes in training datasets, with a focus on the ML classification problem. While ILP has established applications in program synthesis and data curation, we demonstrate that it can also advance the state of the art in proxy attribute discovery by removing the need for prior domain knowledge. Our evaluation shows that this approach is effective at detecting potential sources of indirect discrimination, having successfully identified proxy attributes in several well-known datasets used in fairness-awareness studies.
APA, Harvard, Vancouver, ISO, and other styles
10

Brazdil, Pavel, Jan N. van Rijn, Carlos Soares, and Joaquin Vanschoren. "Metalearning Approaches for Algorithm Selection II." In Metalearning. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-67024-5_5.

Full text
Abstract:
SummaryThis chapter discusses different types of metalearning models, including regression, classification and relative performance models. Regression models use a suitable regression algorithm, which is trained on the metadata and used to predict the performance of given base-level algorithms. The predictions can in turn be used to order the base-level algorithms and hence identify the best one. These models also play an important role in the search for the potentially best hyperparameter configuration discussed in the next chapter. Classification models identify which base-level algorithms are applicable or non-applicable to the target classification task. Probabilistic classifiers can be used to construct a ranking of potentially useful alternatives. Relative performance models exploit information regarding the relative performance of base-level models, which can be either in the form of rankings or pairwise comparisons. This chapter discusses various methods that use this information in the search for the potentially best algorithm for the target task.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Algorithmic identity"

1

Makatov, Zurab. "Digital Performativity: New Horizons of Identity in the Algorithmic Era." In 2024 International Conference on Engineering Management of Communication and Technology (EMCTECH). IEEE, 2024. http://dx.doi.org/10.1109/emctech63049.2024.10741632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Li, Zhaoxing Jing, Zhi Li, and Haojie Yu. "A Traceability Approach for Agarwood Based on Distributed Identity and Smart Contracts." In 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS). IEEE, 2024. http://dx.doi.org/10.1109/iacis61494.2024.10722022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Yang. "Research on a lightweight identity authentication scheme for drones based on blockchain technology." In 2025 2nd International Conference on Algorithms, Software Engineering and Network Security (ASENS). IEEE, 2025. https://doi.org/10.1109/asens64990.2025.11011264.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lora, Chandra Prakash, V. Sandeep, and Rajeev Kumar Sinha. "Applying Identity-Based Security Algorithms to Cloud Computing Networks." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chatterjee, Parijat, Jayanti Dansana, Sujata Swain, Mahendra Kumar Gourisaria, and Anjan Bandyopadhyay. "Identity Verification in Real Time Proctoring: An Integrated Approach with Face Recognition and Eye Tracking." In 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS). IEEE, 2024. http://dx.doi.org/10.1109/iacis61494.2024.10721819.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kardasz, Piotr, Krzysztof Kolebski, and Piotr Jednaszewski. "UTILIZING ALGORITHMS FOR IMAGING MEDICAL RESULTS FROM CT, MRI, AND PET INTO VIRTUAL REALITY." In 24th SGEM International Multidisciplinary Scientific GeoConference 2024. STEF92 Technology, 2024. https://doi.org/10.5593/sgem2024/2.1/s07.12.

Full text
Abstract:
Utilizing algorithms for imaging medical results from CT, MRI, and PET into Virtual Reality. There is a growing interest in the field of medical imaging in understanding the impact of algorithm parameters on the quality and interpretability of the obtained images. In the developed software VRMed3D aimed at educating students using medical images in virtual reality technology, Gaussian noise was utilized to identify the most effective edge detection algorithms. The search was for an algorithm that provided the most optimal quality of generated images while maintaining the shortest possible wait
APA, Harvard, Vancouver, ISO, and other styles
7

Barnwal, Sweta Kumari, Aakriti Chauhan, and G. PadmaPriya. "An Investigation into Identity-Based Authentication Algorithms for Network Security." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725696.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xie, Yihao. "Research on Blockchain Implementation Algorithm for Decentralized Identity Authentication System." In 2024 IEEE 4th International Conference on Data Science and Computer Application (ICDSCA). IEEE, 2024. https://doi.org/10.1109/icdsca63855.2024.10859590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yenikieiev, Oleksandr, Liudmyla Nechvoloda, Dmitriy Zaharenkov, and Katerina Krykunenko. "HARDWARE OF MONITORING THE IDENTITY OF OPERATING CYCLES OF DIESEL GENERATOR." In 2021 III International Scientific and Practical Conference Theoretical and Applied Aspects of Device Development on Microcontrollers and FPGAs. MC-ampFPGA-2021, 2021. http://dx.doi.org/10.35598/mcfpga.2021.007.

Full text
Abstract:
Abstract It is offered to use a signal of fluctuations of speed of rotation of a cranked shaft at monitoring of identity of working cycles of the power unit. Hardware has been built and information technology for primary signal processing has been created. A deterministic mathematical model of a diesel circuit in the form of a mechanical system with four degrees of freedom under the condition of friction, Laplace transform, methods of similarity theory and signal graph theory, as well as the method of determinants is used in the development of algorithmic software. The monitoring procedure lea
APA, Harvard, Vancouver, ISO, and other styles
10

YAHAYA, Wasiu Olayinka, Abdulrazaq Oladimeji AKANBI, Quadri YAHAYA, and Abdulquadri Aishat YUSUF. "COMPUTATIONAL THINKING AND SCIENCE VALUE: PREDICTORS OF SENIOR SCHOOL PHYSICS STUDENTS SCIENCE IDENTITY IN ILORIN, NIGERIA." In Second Southern Science Conference - 2024. Araucária - Associação Científica, 2024. https://doi.org/10.48141/sscon_50_2024.pdf.

Full text
Abstract:
Knowledge acquisition and positive learning outcomes serve as the major output of teaching-learning activities. To be able to think differently, independently, and creatively in nature for the decision-making process constitutes what is called computational thinking. The present study searched the senior school students’ science value as a mediating variable between computational thinking and science identity. Computational thinking as a multi-dimensional construct consists of creativity, algorithmic thinking, cooperativity, critical thinking, and problem-solving skills, as theorized in previo
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Algorithmic identity"

1

Marty, Frédéric, and Thierry Warin. Deciphering Algorithmic Collusion: Insights from Bandit Algorithms and Implications for Antitrust Enforcement. CIRANO, 2023. http://dx.doi.org/10.54932/iwpg7510.

Full text
Abstract:
This paper examines algorithmic collusion from legal and economic perspectives, highlighting the growing role of algorithms in digital markets and their potential for anti-competitive behavior. Using bandit algorithms as a model, traditionally applied in uncertain decision-making contexts, we illuminate the dynamics of implicit collusion without overt communication. Legally, the challenge is discerning and classifying these algorithmic signals, especially as unilateral communications. Economically, distinguishing between rational pricing and collusive patterns becomes intricate with algorithm-
APA, Harvard, Vancouver, ISO, and other styles
2

Polk, W. T., D. F. Dodson, and W. E. Burr. Cryptographic algorithms and key sizes for personal identity verification. National Institute of Standards and Technology, 2005. http://dx.doi.org/10.6028/nist.sp.800-78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Polk, W. T., D. F. Dodson, and W. E. Burr. Cryptographic algorithms and key sizes for personal identity verification. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-78-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Polk, W. T., D. F. Dodson, and W. E. Burr. Cryptographic algorithms and key sizes for personal identity verification. National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.sp.800-78-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Polk, W. T., D. F. Dodson, W. E. Burr, H. Ferraiolo, and D. A. Cooper. Cryptographic algorithms and key sizes for personal identity verification. National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.sp.800-78-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Polk, William T., Donna F. Dodson, William Burr, Salvatore Francomacaro, and David A. Cooper. Cryptographic Algorithms and Key Sizes for Personal Identity Verification. National Institute of Standards and Technology, 2015. http://dx.doi.org/10.6028/nist.sp.800-78-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ferraiolo, Hildegard. Cryptographic Algorithms and Key Sizes for Personal Identity Verification. National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-78-5.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ferraiolo, Hildegard. Cryptographic Algorithms and Key Sizes for Personal Identity Verification. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.800-78-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Grant, C., J. Lenderman, and J. Gansemer. US-VISIT Identity Matching Algorithm Evaluation Program: ADIS Algorithm Evaluation Project Plan Update. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1021071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Grechanuk, Pavel, Michael Rising, and Todd Palmer. Application of Machine Learning Algorithms to Identify Problematic Nuclear Data. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1906466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!