• algorithmic transparency

    Algorithmic transparency is openness about the purposes, structure and underlying actions of the algorithms used to search for, process and deliver data.

    Margaret Rouse9,485 pointsBadges:
  • Does your enterprise regularly check your algorithm security to prevent substitution attacks?

    searchsecurity23,430 pointsBadges:
  • Algorithm substitution attacks: Ensuring encryption algorithm security

    Algorithm substitution attacks can decrypt secure communications and potentially expose enterprise data in plaintext. Learn how to mitigate the threat.

    searchsecurity23,430 pointsBadges:
  • Melbourne shuffle algorithm

    The Melbourne shuffle algorithm is a method of protecting data access patterns from detection to prevent unauthorized parties from gathering information about the data.

    Margaret Rouse9,485 pointsBadges:
  • leaky bucket algorithm

    The leaky bucket algorithm is used to implement traffic policing and traffic shaping in Ethernet and cellular data networks. The algorithm can also be used to control metered-bandwidth Internet connections to prevent going over the allotted bandwidth for a month, thereby avoiding extra charges.

    Margaret Rouse9,485 pointsBadges:
  • greedy algorithm

    A greedy algorithm is a mathematical process that looks for simple, easy-to-implement solutions to complex, multi-step problems by deciding which next step will provide the most obvious benefit.

    Margaret Rouse9,485 pointsBadges:
  • vision-correcting display

    A vision-correcting display distorts the images on users' screens according to algorithms based on their prescriptions for eyeglasses. The distortion makes it possible for users to view the display without wearing glasses or contact lenses.

    Margaret Rouse9,485 pointsBadges:
  • cache algorithm

    A cache algorithm is a detailed list of instructions that decides which items should be discarded in a computer's cache of information.

    ITKE372,235 pointsBadges:
  • When is it better to build predictive or prescriptive algorithms internally versus contracting these services out?

    Emily McLaughlin1,370 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.