Contents
Definitions[edit | edit source]
Australia[edit | edit source]
An algorithm is
“ | [a] sequence of instructions that performs a calculation or other problem-solving operation when applied to defined input data.^{[1]} | ” |
Council of Europe[edit | edit source]
An algorithm is
“ | [a] finite suite of formal rules/commands, usually in the form of a mathematical logic, that allows for a result to be obtained from input elements."^{[2]} | ” |
Encryption[edit | edit source]
General[edit | edit source]
An algorithm is
“ | [a] specific approach, often described in mathematical terms, used by a computer to solve a certain problem or carry out a certain task.^{[3]} | ” |
Japan[edit | edit source]
An algorithm refer to "methods of combining in a program, instructions given to a computer."^{[4]}
United States[edit | edit source]
An algorithm is
- "[a] prescribed set of well defined rules or processes for the solution of a problem."^{[5]}
- "a particular method devised to solve a particular problem (or class of problems)."^{[6]}
- "a step-by-step, problem-solving procedure, especially an established computational procedure for solving a problem in a finite number of steps."^{[7]}
- "[a] mathematical procedure used to solve problems with a series of steps. Algorithms are usually encoded as a sequence of computer commands."^{[8]}
An algorithm is
“ | a well-defined computational procedure for taking an input and producing an output. Algorithms are tools for solving computational problems--an algorithm describes a specific computational procedure for achieving a desired input/output relationship.^{[9]} | ” |
References[edit | edit source]
- ↑ Digital Platforms Inquiry-Final Report, Glossary, at 614.
- ↑ Unboxing Artificial Intelligence: 10 steps to protect Human Rights, at 24.
- ↑ Quantum Computing: Progress and Prospects, at 245.
- ↑ Japan, Law No. 48 of 1970, Art. 10(3)(III).
- ↑ U.S. Copyright Office, Compendium of Copyright Office Practices II, § 326 (1984).
- ↑ At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues, at 18.
- ↑ Youth, Pornography, and the Internet, at 407.
- ↑ Wiki.GIS.com, GIS Glossary (full-text).
- ↑ Finding a Balance: Computer Software, Intellectual Property, and the Challenge of Technological Change, at 6 n.20.
See also[edit | edit source]
- Algorithm transition
- Algorithmic transparency
- Asymmetric algorithm
- Cellular Message Encryption Algorithm
- Cryptographic algorithm
- Cryptographic hash algorithm
- Data Encryption Algorithm
- Digital signature algorithm
- Elliptic Curve Digital Signature Algorithm
- Encryption algorithm
- Hash algorithm
- International Data Encryption Algorithm
- Locked algorithm
- One-way hash algorithm
- PTO Guidelines: Computer Programs and Mathematical Algorithms
- Routing algorithm
- RSA algorithm
- Secure Hash Algorithm
- Signature scanning and algorithmic detection
- Storage allocation algorithm
- Symmetric algorithm
- Triple Data Encryption Algorithm
Community content is available under CC-BY-SA unless otherwise noted.