نتایج جستجو برای: black box testing

تعداد نتایج: 545580  

2010
Bernhard Schätz Christian Pfaller

In a component-based development approach system integration generally implies the packaging of software components on hardware units, hiding the interface of a component inside the unit. Thus, integration testing is done on the (logical) component as well as the (technical) unit level, to ensure the correctness of each component in isolation as well as of the complete system combined with the ...

2001
Sami Beydeda Volker Gruhn Michael Stachorski

Although both blackand white-box testing have the same objective, namely detecting faults in a program, they are often conducted separately. In our opinion, the reason is the lack of techniques and tools integrating both strategies, although an integration can substantially decrease testing costs. Specifically, an integrated technique can generate a reduced test suite, as single test cases can ...

2003
Sami Beydeda Volker Gruhn

Although both blackand white-box testing have the same objective, namely detecting faults in a program, they are often conducted separately. In our opinion, the reason is the lack of techniques and tools integrating both strategies, although integration can substantially decrease testing costs. Specifically, an integrated technique can generate a reduced test suite, as single test cases can cov...

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 2007
Zohar S. Karnin Amir Shpilka

In this paper we consider the problem of determining whether an unknown arithmetic circuit, for which we have oracle access, computes the identically zero polynomial. Our focus is on depth-3 circuits with a bounded top fan-in. We obtain the following results. 1. A quasi-polynomial time deterministic black-box identity testing algorithm for ΣΠΣ(k) circuits (depth-3 circuits with top fan-in equal...

2002
Stanley Chow Philip A. Eisen Harold Johnson Paul C. van Oorschot

For digital rights management (drm) software implementations incorporating cryptography, white-box cryptography (cryptographic implementation designed to withstand the white-box attack context) is more appropriate than traditional black-box cryptography. In the whitebox context, the attacker has total visibility into software implementation and execution. Our objective is to prevent extraction ...

Journal: :Softw. Test., Verif. Reliab. 2000
Stephen H. Edwards

A black-box testing strategy based on Zweben et al.’s specification-based test data adequacy criteria is explored. The approach focuses on generating a flowgraph from a component’s specification and applying analogues of white-box strategies to it. An experimental assessment of the fault-detecting ability of test sets generated using this approach was performed for three of Zweben’s criteria us...

Journal: :Journal of Systems and Software 2011
Lijun Mei Wing Kwong Chan T. H. Tse Robert G. Merkel

A web service may evolve autonomously, making peer web services in the same service composition uncertain as to whether the evolved behaviors are compatible with its original collaborative agreement. Although peer services may wish to conduct regression testing to verify the agreed collaboration, the source code of the former service may be inaccessible to them. Owing to the black-box nature of...

2004
SCHATTEN

The ever increasing complexity of contemporary software products advise the application of stateof-the-art software engineering techniques. However, the setup, configuration and implementation in the project team is a demanding task. This paper acts as a guideline through the forest of several important aspects of software development as there are: daily builds using automated testing, black bo...

1999
Ton Dekkers

This document describes the test estimate preparation technique known as test point analysis (TPA). TPA can be used to objectively prepare an estimate for a system test or acceptance test. TPA covers only so-called black-box testing; an estimate for the test activities, which precede black-box testing (i.e. white-box testing), will already have been included in the estimate produced by function...

Journal: : 2022

The types of the testing methods were analyzed from side development. If changes are made to code, even minor ones, bugs can appear anywhere in system. cost fixing increases with time they discovered. Using effective web prevent unexpected costs. Modern applications indeed a place where all type is vital for high-quality product. At moment, traditional front and back office increasingly moving ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید