نتایج جستجو برای: black box testing
تعداد نتایج: 545580 فیلتر نتایج به سال:
In practical applications of optimization it is common to have several conflicting objective functions to optimize. Frequently, these functions are subject to noise or can be of black-box type, preventing the use of derivative-based techniques. We propose a novel multiobjective derivative-free methodology, calling it direct multisearch (DMS), which does not aggregate any of the objective functi...
Knowing the provenance of a data item helps in ascertaining its trustworthiness. Various approaches have been proposed to track or infer data provenance. However, these approaches either treat an executing program as a black-box, limiting the fidelity of the captured provenance, or require developers to modify the program to make it provenance-aware. In this paper, we introduce DataTracker, a n...
This paper describes two new features of the BRIDJE system for cross-language information access. The first feature is the partial disambiguation function of the Bi-directional Retriever, which can be used for search request translation in cross-language IR. Its advantage over a “black-box” machine translation approach is consistent across five test collections and across two language permutati...
The internal (or residual) stress is among the key notions to describe the state of the systems far from equilibrium. Such stress is invisible on the macroscopic scale where the system is regarded as a black-box. Yet nonequilibrium macroscopic operations allow to create and observe the internal stress. We present in this lecture some examples of the internal stress and its operations. We descri...
Due to increasing demand for simulation and modeling, efforts are needed to build up more powerful simulation and modeling methodologies that can help to facilitate learning complex dynamic systems. By learning we mean the acquisition of knowledge, skills and experience for better and faster learning of the various types of complex dynamic systems. System dynamics is one of the successful well ...
We show the existence of concurrent non-malleable commitments based on the existence of one-way functions. Our proof of security only requires the use of black-box techniques, and additionally provides an arguably simplified proof of the existence of even stand-alone secure non-malleable commitments.
The notion of ”don’t care”, that encapsulates the unimportance of which of several scenarios will occur, is a fundamental notion in computer science. It is the core of non-determinism; it is essential in various computational models; it is central in distributed and concurrent algorithms; and it also is relevant in sequential, deterministic algorithms. It is a valuable tool in algorithmic probl...
We describe the practical application of a black-box testing methodology for the validation of the knowledge encoded in WordNet, SUMO and their mapping by using automated theorem provers. In this paper, we concentrate on the part-whole information provided by WordNet and create a large set of tests on the basis of few question patterns. From our preliminary evaluation results, we report on some...
Customers are ultimate judges of products. In order to produce the world-ranking product, customer information must be embodied in the part of production and hierarchy of control. This paper firstly points out the deficiency of QFD and the superiority of TRIZ. And then it constructs the application system of integrating QFD and TRIZ based on the theoretical rationale of the integration. The mai...
Preventing exfiltration of sensitive data is a central challenge facing many modern networking environments. In this paper, we propose a network-wide method of confining and controlling the flow of sensitive data within a network. Our approach is based on black-box differencing – we run two logical copies of the network, one with private data scrubbed, and compare outputs of the two to determin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید