نتایج جستجو برای: box testing

تعداد نتایج: 418764  

2005
Peter Brooksbank Alice C. Niemeyer Ákos Seress

We describe an algorithm which, for any given group G containing an absolutely irreducible, extraspecial normal subgroup, constructs a homomorphism, with nontrivial kernel, from G onto a nontrivial group of permutations or matrices. Thus we reduce the problem of computing with G to two smaller problems. The algorithm, which uses a blend of geometric and black-box techniques, forms part of the b...

Journal: :IACR Cryptology ePrint Archive 2006
Julien Bringer Hervé Chabanne Emmanuelle Dottax

At CMS 2006 Bringer et al. show how to conceal the algebraic structure of a “traceable block cipher” by adding perturbations to its description. We here exploit and strengthen their ideas by further perturbing the representation of a cipher towards a white box implementation. Our technique is quite general, and we apply it – as a challenging example in the domain of white box cryptography – to ...

2008
Udo Kannengiesser

This paper presents a view of design methods as process artefacts that can be represented using the function-behaviour-structure (FBS) ontology. This view allows identifying five fundamental approaches to methods: black-box, procedural, artefact-centric, formal and managerial approaches. They all describe method structure but emphasise different aspects of it. Capturing these differences addres...

2006
I. Ascione Giulio Giunta P. Mariani Raffaele Montella Angelo Riccio

The grid computing technology permits the coordinate, efficient and effective use of (geographically spread) computational and storage resources with the aim to achieve high performance throughputs for intensive CPU load applications. In this paper we describe the development of a virtual laboratory for environmental applications. The software infrastructure, and the related interface, are deve...

2012
Kris Heylen Dirk Speelman Dirk Geeraerts

In statistical NLP, Semantic Vector Spaces (SVS) are the standard technique for the automatic modeling of lexical semantics. However, it is largely unclear how these black-box techniques exactly capture word meaning. To explore the way an SVS structures the individual occurrences of words, we use a non-parametric MDS solution of a token-by-token similarity matrix. The MDS solution is visualized...

2006
Cheng Li Zhe Dang

To efficiently solve safety verification and testing problems for an aspect-oriented system, we use multitape automata to model aspects and propose algorithms for the aspect-oriented system specified by a number of primary labeled transition systems (some of them are black-boxes) and aspects. Our algorithms combine automata manipulations over the aspects and primary systems with black-box testi...

Journal: :Discrete Event Dynamic Systems 2014
Debmalya Biswas Blaise Genest

For complex services composed of many (component) services, logging is an integral middleware aspect, especially for providing transactions and monitoring. In the event of a failure, the log allows us to deduce the cause of failure (diagnosis) and recover by compensating the executed services (atomicity). However, for heterogeneous services with parts of the functionality provided by multiple o...

Journal: :CoRR 2001
Tomás Müller Roman Barták

Timetabling is a typical application of constraint programming whose task is to allocate activities to slots in available resources respecting various constraints like precedence and capacity. In this paper we present a basic concept, a constraint model, and a solution algorithm for interactive timetabling. Interactive timetabling combines automated timetabling (the computer allocates the activ...

2007
Tanu Malik Randal C. Burns Nitesh V. Chawla

We present a “black-box” approach to estimating query cardinality that has no knowledge of query execution plans and data distribution, yet provides accurate estimates. It does so by grouping queries into syntactic families and learning the cardinality distribution of that group directly from points in a high-dimensional input space constructed from the query’s attributes, operators, function a...

Journal: :Logic Journal of the IGPL 2002
Alex Groce Doron A. Peled Mihalis Yannakakis

We consider the case where inconsistencies are present between a system and its corresponding model, used for automatic verification. Such inconsistencies can be the result of modeling errors or recent modifications of the system. Despite such discrepancies we can still attempt to perform automatic verification. In fact, as we show, we can sometimes exploit the verification results to assist in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید