Academic literature on the topic 'Algorithmic identity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Algorithmic identity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Algorithmic identity"
Cheney-Lippold, John. "A New Algorithmic Identity." Theory, Culture & Society 28, no. 6 (2011): 164–81. http://dx.doi.org/10.1177/0263276411424420.
Full textKarizat, Nadia, Dan Delmonaco, Motahhare Eslami, and Nazanin Andalibi. "Algorithmic Folk Theories and Identity: How TikTok Users Co-Produce Knowledge of Identity and Engage in Algorithmic Resistance." Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (2021): 1–44. http://dx.doi.org/10.1145/3476046.
Full textPacker, Jeremy. "Homeland Subjectivity: The Algorithmic Identity of Security." Communication and Critical/Cultural Studies 4, no. 2 (2007): 211–15. http://dx.doi.org/10.1080/14791420701296588.
Full textKotliar, Dan M. "The return of the social: Algorithmic identity in an age of symbolic demise." New Media & Society 22, no. 7 (2020): 1152–67. http://dx.doi.org/10.1177/1461444820912535.
Full textJames, Keith, and Jacob Eisenberg. "Personal Identity and Group Identity Influences on Algorithmic and Original Task Performance." Creativity Research Journal 16, no. 1 (2004): 91–103. http://dx.doi.org/10.1207/s15326934crj1601_9.
Full textLee, Angela Y., Hannah Mieczkowski, Nicole B. Ellison, and Jeffrey T. Hancock. "The Algorithmic Crystal: Conceptualizing the Self through Algorithmic Personalization on TikTok." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022): 1–22. http://dx.doi.org/10.1145/3555601.
Full textResearcher. "ALGORITHMIC IDENTITY AND THE FRAGMENTATION OF CULTURAL CONSENSUS: EXPLORING THE POLITICS OF BELONGING AND SOCIAL COHESION IN AI-MEDIATED SOCIETIES." International Journal of Politics, Culture, and Society (IJPCS) 2, no. 1 (2025): 1–9. https://doi.org/10.5281/zenodo.15608656.
Full textHolmes, Martin. "Algorithmic Determination of Japanese Ethnic Identity Based on Name." Journal of the Japanese Association for Digital Humanities 3, no. 1 (2018): 73–97. http://dx.doi.org/10.17928/jjadh.3.1_73.
Full textMuchitsch, Veronika. "“Genrefluid” Spotify Playlists and Mediations of Genre and Identity in Music Streaming." IASPM Journal 13, no. 3 (2023): 48–65. http://dx.doi.org/10.5429/2079-3871(2023)v13i3.5en.
Full textSujatha Lakshmi Narra. "Human-AI Collaboration in Identity Security: When Should AI Decide?" Journal of Computer Science and Technology Studies 7, no. 7 (2025): 191–97. https://doi.org/10.32996/jcsts.2025.7.7.17.
Full textDissertations / Theses on the topic "Algorithmic identity"
Bellesia, Francesca <1990>. "Individuals in the Workplatform. Exploring Implications for Work Identity and Algorithmic Reputation Management." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amsdottorato.unibo.it/9259/1/Thesis%20Final%20February%202020.pdf.
Full textHayman, Bernard Akeem. "Community, Identity, and Agency in the Age of Big Social Data: A Place-based Study on Literacies, Perceptions, and Responses of Digital Engagement." The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1586602013429227.
Full textPutigny, Herve. "Dynamiques socioculturelles et algorithmiques d'entrée dans une communauté cybercriminelles." Electronic Thesis or Diss., Bourgogne Franche-Comté, 2022. http://www.theses.fr/2022UBFCH019.
Full textPoudel, Bhuwan Krishna Som. "Algorithms to identify failure pattern." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-23011.
Full textWei, Hao. "Evolving test environments to identify faults in swarm robotics algorithms." Thesis, University of York, 2018. http://etheses.whiterose.ac.uk/22022/.
Full textAimejalii, K., Keshav P. Dahal, and M. Alamgir Hossain. "GA-based learning algorithms to identify fuzzy rules for fuzzy neural networks." IEEE, 2007. http://hdl.handle.net/10454/2553.
Full textChen, Liang. "Motif Selection Using Simulated Annealing Algorithm with Application to Identify Regulatory Elements." Ohio University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1531343206505855.
Full textXu, Jennifer J., and Hsinchun Chen. "Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks." Elsevier, 2004. http://hdl.handle.net/10150/106207.
Full textTolley, Joseph D. "Implementation and Evaluation of an Algorithm for User Identity and Permissions for Situational Awareness Analysis." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/89907.
Full textAurangabadwala, Tehsin T. "DEVELOPMENT OF AN EXPERT ALGORITHM TO IDENTIFY RISKS ASSOCIATED WITH A RESEARCH FACILITY." Ohio University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1173823780.
Full textBooks on the topic "Algorithmic identity"
Polk, Tim. Cryptographic algorithms and key sizes for Personal Identity Verification. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2010.
Find full textPolk, Tim. Cryptographic algorithms and key sizes for Personal Identity Verification. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009.
Find full textGrigor'ev, Anatoliy, and Evgeniy Isaev. Methods and algorithms of data processing. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1032305.
Full textCamenisch, Jan. Privacy and Identity Management for Life. Springer-Verlag Berlin Heidelberg, 2011.
Find full textSloot, Bart, and Aviva Groot, eds. The Handbook of Privacy Studies. Amsterdam University Press, 2018. http://dx.doi.org/10.5117/9789462988095.
Full textKochetova, Zhanna, Natal'ya Maslova, and Oleg Bazarskiy. Aviation and missile clusters and the environment. INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1544137.
Full textPenny, Duquenoy, Hansen Marit, Leenes Ronald, Zhang Ge, and SpringerLink (Online service), eds. Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers. IFIP International Federation for Information Processing, 2011.
Find full textMaking It Personal: Algorithmic Personalization, Identity, and Everyday Life. Oxford University Press, Incorporated, 2020.
Find full textKant, Tanya. Making It Personal: Algorithmic Personalization, Identity, and Everyday Life. Oxford University Press, Incorporated, 2020.
Find full textKant, Tanya. Making it Personal. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190905088.001.0001.
Full textBook chapters on the topic "Algorithmic identity"
Schneider, Stephanie. "Modelling Vision: A Semeiotic Approach to Algorithmic Images." In Imaging Identity. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21774-7_4.
Full textPetzold, Thomas. "Human-Algorithmic Scaffolding." In Crossroads in New Media, Identity and Law. Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137491268_9.
Full textAlbrecht, Eduardo. "India." In Political Automation. Oxford University Press, 2025. https://doi.org/10.1093/9780197696989.003.0011.
Full textBodó, Balázs, and Linda Weigl. "The Frameworks of Trust and Trustlessness Around Algorithmic Control Technologies: A Lost Sense of Community." In Public Governance and Emerging Technologies. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-84748-6_16.
Full textSchon, Bernd Friedrich. "Identity 5.0: How to Fight Algorithms Online (Fast). Heuristic Compressions of Personality Concepts (Dis)Obedient to Algorithmic Power—from Film, Television and a Cult Classic Novel." In (Dis)Obedience in Digital Societies. transcript Verlag, 2022. http://dx.doi.org/10.14361/9783839457634-014.
Full textGautam, Tanvi. "Identity—Based Encryption." In Emerging Security Algorithms and Techniques, edited by Aditya Thakkar and Nitish Pathak. Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-10.
Full textHunt, Luke William. "Algorithms and Justice." In The Police Identity Crisis. Routledge, 2021. http://dx.doi.org/10.4324/9781003145455-4.
Full textStroeken, Koen. "Prologue." In Simplex Society. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-41115-1_1.
Full textGonçalves, Rafael, Filipe Gouveia, Inês Lynce, and José Fragoso Santos. "Proxy Attribute Discovery in Machine Learning Datasets via Inductive Logic Programming." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-90653-4_17.
Full textBrazdil, Pavel, Jan N. van Rijn, Carlos Soares, and Joaquin Vanschoren. "Metalearning Approaches for Algorithm Selection II." In Metalearning. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-67024-5_5.
Full textConference papers on the topic "Algorithmic identity"
Makatov, Zurab. "Digital Performativity: New Horizons of Identity in the Algorithmic Era." In 2024 International Conference on Engineering Management of Communication and Technology (EMCTECH). IEEE, 2024. http://dx.doi.org/10.1109/emctech63049.2024.10741632.
Full textWang, Li, Zhaoxing Jing, Zhi Li, and Haojie Yu. "A Traceability Approach for Agarwood Based on Distributed Identity and Smart Contracts." In 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS). IEEE, 2024. http://dx.doi.org/10.1109/iacis61494.2024.10722022.
Full textWu, Yang. "Research on a lightweight identity authentication scheme for drones based on blockchain technology." In 2025 2nd International Conference on Algorithms, Software Engineering and Network Security (ASENS). IEEE, 2025. https://doi.org/10.1109/asens64990.2025.11011264.
Full textLora, Chandra Prakash, V. Sandeep, and Rajeev Kumar Sinha. "Applying Identity-Based Security Algorithms to Cloud Computing Networks." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724265.
Full textChatterjee, Parijat, Jayanti Dansana, Sujata Swain, Mahendra Kumar Gourisaria, and Anjan Bandyopadhyay. "Identity Verification in Real Time Proctoring: An Integrated Approach with Face Recognition and Eye Tracking." In 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS). IEEE, 2024. http://dx.doi.org/10.1109/iacis61494.2024.10721819.
Full textKardasz, Piotr, Krzysztof Kolebski, and Piotr Jednaszewski. "UTILIZING ALGORITHMS FOR IMAGING MEDICAL RESULTS FROM CT, MRI, AND PET INTO VIRTUAL REALITY." In 24th SGEM International Multidisciplinary Scientific GeoConference 2024. STEF92 Technology, 2024. https://doi.org/10.5593/sgem2024/2.1/s07.12.
Full textBarnwal, Sweta Kumari, Aakriti Chauhan, and G. PadmaPriya. "An Investigation into Identity-Based Authentication Algorithms for Network Security." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725696.
Full textXie, Yihao. "Research on Blockchain Implementation Algorithm for Decentralized Identity Authentication System." In 2024 IEEE 4th International Conference on Data Science and Computer Application (ICDSCA). IEEE, 2024. https://doi.org/10.1109/icdsca63855.2024.10859590.
Full textYenikieiev, Oleksandr, Liudmyla Nechvoloda, Dmitriy Zaharenkov, and Katerina Krykunenko. "HARDWARE OF MONITORING THE IDENTITY OF OPERATING CYCLES OF DIESEL GENERATOR." In 2021 III International Scientific and Practical Conference Theoretical and Applied Aspects of Device Development on Microcontrollers and FPGAs. MC-ampFPGA-2021, 2021. http://dx.doi.org/10.35598/mcfpga.2021.007.
Full textYAHAYA, Wasiu Olayinka, Abdulrazaq Oladimeji AKANBI, Quadri YAHAYA, and Abdulquadri Aishat YUSUF. "COMPUTATIONAL THINKING AND SCIENCE VALUE: PREDICTORS OF SENIOR SCHOOL PHYSICS STUDENTS SCIENCE IDENTITY IN ILORIN, NIGERIA." In Second Southern Science Conference - 2024. Araucária - Associação Científica, 2024. https://doi.org/10.48141/sscon_50_2024.pdf.
Full textReports on the topic "Algorithmic identity"
Marty, Frédéric, and Thierry Warin. Deciphering Algorithmic Collusion: Insights from Bandit Algorithms and Implications for Antitrust Enforcement. CIRANO, 2023. http://dx.doi.org/10.54932/iwpg7510.
Full textPolk, W. T., D. F. Dodson, and W. E. Burr. Cryptographic algorithms and key sizes for personal identity verification. National Institute of Standards and Technology, 2005. http://dx.doi.org/10.6028/nist.sp.800-78.
Full textPolk, W. T., D. F. Dodson, and W. E. Burr. Cryptographic algorithms and key sizes for personal identity verification. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-78-1.
Full textPolk, W. T., D. F. Dodson, and W. E. Burr. Cryptographic algorithms and key sizes for personal identity verification. National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.sp.800-78-2.
Full textPolk, W. T., D. F. Dodson, W. E. Burr, H. Ferraiolo, and D. A. Cooper. Cryptographic algorithms and key sizes for personal identity verification. National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.sp.800-78-3.
Full textPolk, William T., Donna F. Dodson, William Burr, Salvatore Francomacaro, and David A. Cooper. Cryptographic Algorithms and Key Sizes for Personal Identity Verification. National Institute of Standards and Technology, 2015. http://dx.doi.org/10.6028/nist.sp.800-78-4.
Full textFerraiolo, Hildegard. Cryptographic Algorithms and Key Sizes for Personal Identity Verification. National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-78-5.ipd.
Full textFerraiolo, Hildegard. Cryptographic Algorithms and Key Sizes for Personal Identity Verification. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.800-78-5.
Full textGrant, C., J. Lenderman, and J. Gansemer. US-VISIT Identity Matching Algorithm Evaluation Program: ADIS Algorithm Evaluation Project Plan Update. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1021071.
Full textGrechanuk, Pavel, Michael Rising, and Todd Palmer. Application of Machine Learning Algorithms to Identify Problematic Nuclear Data. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1906466.
Full text