نتایج جستجو برای: black box testing

تعداد نتایج: 545580  

Journal: :SIAM Journal on Optimization 2011
A. L. Custódio J. F. Aguilar Madeira A. Ismael F. Vaz Luís N. Vicente

In practical applications of optimization it is common to have several conflicting objective functions to optimize. Frequently, these functions are subject to noise or can be of black-box type, preventing the use of derivative-based techniques. We propose a novel multiobjective derivative-free methodology, calling it direct multisearch (DMS), which does not aggregate any of the objective functi...

2014
Manolis Stamatogiannakis Paul T. Groth Herbert Bos

Knowing the provenance of a data item helps in ascertaining its trustworthiness. Various approaches have been proposed to track or infer data provenance. However, these approaches either treat an executing program as a black-box, limiting the fidelity of the captured provenance, or require developers to modify the program to make it provenance-aware. In this paper, we introduce DataTracker, a n...

2003
Tetsuya Sakai Makoto Koyama Masaru Suzuki Akira Kumano Toshihiko Manabe

This paper describes two new features of the BRIDJE system for cross-language information access. The first feature is the partial disambiguation function of the Bi-directional Retriever, which can be used for search request translation in cross-language IR. Its advantage over a “black-box” machine translation approach is consistent across five test collections and across two language permutati...

2009
Ken Sekimoto KEN SEKIMOTO

The internal (or residual) stress is among the key notions to describe the state of the systems far from equilibrium. Such stress is invisible on the macroscopic scale where the system is regarded as a black-box. Yet nonequilibrium macroscopic operations allow to create and observe the internal stress. We present in this lecture some examples of the internal stress and its operations. We descri...

2008
Aasia Riasat Syed S. Rizvi Faraz Arain

Due to increasing demand for simulation and modeling, efforts are needed to build up more powerful simulation and modeling methodologies that can help to facilitate learning complex dynamic systems. By learning we mean the acquisition of knowledge, skills and experience for better and faster learning of the various types of complex dynamic systems. System dynamics is one of the successful well ...

2008
Huijia Lin Rafael Pass Muthuramakrishnan Venkitasubramaniam

We show the existence of concurrent non-malleable commitments based on the existence of one-way functions. Our proof of security only requires the use of black-box techniques, and additionally provides an arguably simplified proof of the existence of even stand-alone secure non-malleable commitments.

Journal: :Informatics in Education 2009
David Ginat

The notion of ”don’t care”, that encapsulates the unimportance of which of several scenarios will occur, is a fundamental notion in computer science. It is the core of non-determinism; it is essential in various computational models; it is central in distributed and concurrent algorithms; and it also is relevant in sequential, deterministic algorithms. It is a valuable tool in algorithmic probl...

2017
Javier Álvez German Rigau

We describe the practical application of a black-box testing methodology for the validation of the knowledge encoded in WordNet, SUMO and their mapping by using automated theorem provers. In this paper, we concentrate on the part-whole information provided by WordNet and create a large set of tests on the basis of few question patterns. From our preliminary evaluation results, we report on some...

2011
Deng Chaoqun

Customers are ultimate judges of products. In order to produce the world-ranking product, customer information must be embodied in the part of production and hierarchy of control. This paper firstly points out the deficiency of QFD and the superiority of TRIZ. And then it constructs the application system of integrating QFD and TRIZ based on the theoretical rationale of the integration. The mai...

2011
Jason Croft Matthew Caesar

Preventing exfiltration of sensitive data is a central challenge facing many modern networking environments. In this paper, we propose a network-wide method of confining and controlling the flow of sensitive data within a network. Our approach is based on black-box differencing – we run two logical copies of the network, one with private data scrubbed, and compare outputs of the two to determin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید