|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1993 occurrences of 1129 keywords
|
|
|
Results
Found 5500 publication records. Showing 5500 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
166 | Ran Raz, Amir Shpilka |
On the Power of Quantum Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: 19th Annual IEEE Conference on Computational Complexity (CCC 2004), 21-24 June 2004, Amherst, MA, USA, pp. 260-274, 2004, IEEE Computer Society, 0-7695-2120-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
106 | Aggelos Kiayias, Moti Yung |
Self Protecting Pirates and Black-Box Traitor Tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, pp. 63-79, 2001, Springer, 3-540-42456-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
99 | Steven Halim, Roland H. C. Yap, Hoong Chuin Lau |
An Integrated White+Black Box Approach for Designing and Tuning Stochastic Local Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CP ![In: Principles and Practice of Constraint Programming - CP 2007, 13th International Conference, CP 2007, Providence, RI, USA, September 23-27, 2007, Proceedings, pp. 332-347, 2007, Springer, 978-3-540-74969-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
97 | Bogdan Korel |
Black-Box Understanding of COTS Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWPC ![In: 7th International Workshop on Program Comprehension (IWPC '99), May 5-7, 1999 - Pittsburgh, PA, USA, pp. 92-99, 1999, IEEE Computer Society, 0-7695-0179-6. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Black-Box understanding, Interface probing, Black-box testing, Automated test generation, COTS component, White-box testing |
96 | Per Kristian Lehre, Carsten Witt |
Black-box search by unbiased variation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2010, Proceedings, Portland, Oregon, USA, July 7-11, 2010, pp. 1441-1448, 2010, ACM, 978-1-4503-0072-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
black-box complexity, runtime analysis |
95 | Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank |
Black-box constructions for secure computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 38th Annual ACM Symposium on Theory of Computing, Seattle, WA, USA, May 21-23, 2006, pp. 99-108, 2006, ACM, 1-59593-134-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
theory of cryptography, oblivious transfer, secure computation, black-box reductions |
92 | Sergei Kojarski, David H. Lorenz |
Comparing White-Box, Black-Box, and Glass-Box Composition of Aspect Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSR ![In: Reuse of Off-the-Shelf Components, 9th International Conference on Software Reuse, ICSR 2006, Turin, Italy, June 12-15, 2006, Proceedings, pp. 246-259, 2006, Springer, 3-540-34606-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
90 | Adam L. Young, Moti Yung |
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 297-311, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography |
85 | Rafael Pass, Hoeteck Wee |
Black-Box Constructions of Two-Party Protocols from One-Way Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings, pp. 403-418, 2009, Springer, 978-3-642-00456-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
black-box constructions, zero-knowledge arguments, trapdoor commitments, parallel coin-tossing, non-malleable commitments, secure two-party computation |
85 | Huafei Zhu |
Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings, pp. 214-225, 2008, Springer, 978-3-540-89640-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Black-box constructions, defensible adversary, malicious adversary, oblivious transfer protocols |
85 | Jun Furukawa 0001, Nuttapong Attrapadung |
Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings, pp. 496-508, 2007, Springer, 978-3-540-73419-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Fully Collusion Resistant, Revocation, Traitor Tracing, Black-Box |
85 | Tatsuyuki Matsushita, Hideki Imai |
Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 92-111, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Hierarchical key assignment, black-box tracing, reduced ciphertext size |
85 | Amrit Tiwana |
Beyond the Black Box: Knowledge Overlaps in Software Outsourcing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 21(5), pp. 51-58, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
congruence framework, software project risk, black-box development, knowledge management, software development, outsourcing |
85 | Tatsuyuki Matsushita, Hideki Imai |
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, pp. 260-275, 2004, Springer, 3-540-23975-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Public-key traitor tracing, Black-box tracing, Self-defensive pirates |
85 | Tatsuyuki Matsushita |
A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 197-208, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Flexible revocation, Black-box tracing, Traitor tracing |
84 | Ueli M. Maurer, Dominik Raub |
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 427-443, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Black-box fields, computational algebra, homomorphic encryption, generic algorithms, one-way permutations |
80 | Yehuda Lindell |
Lower Bounds and Impossibility Results for Concurrent Self Composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 21(2), pp. 200-249, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Self and general composition, Non-black-box and black-box simulation, Lower bounds, Secure computation, Protocol composition, Impossibility results |
80 | Conor Nugent, Padraig Cunningham |
A Case-Based Explanation System for Black-Box Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Rev. ![In: Artif. Intell. Rev. 24(2), pp. 163-178, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
black-box systems, case-based reasoning, explanation |
79 | Sami Beydeda, Volker Gruhn |
Integrating White- and Black-Box Techniques for Class-Level Regression Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 25th International Computer Software and Applications Conference (COMPSAC 2001), Invigorating Software Development, 8-12 October 2001, Chicago, IL, USA, pp. 357-362, 2001, IEEE Computer Society, 0-7695-1372-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Integrated White- and Black-Box Testing, Class-level Testing, Regression Testing |
78 | Iftach Haitner |
Semi-honest to Malicious Oblivious Transfer - The Black-Box Way. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008., pp. 412-426, 2008, Springer, 978-3-540-78523-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
78 | Aggelos Kiayias, Moti Yung |
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 8th ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008, pp. 9-18, 2008, ACM, 978-1-60558-290-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
error correcting codes, traitor tracing |
78 | Amos Beimel, Tal Malkin |
A Quantitative Approach to Reductions in Secure Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings, pp. 238-257, 2004, Springer, 3-540-21000-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
74 | Gerald Kotonya |
An Architecture-Centric Development Environment for Black-Box Component-Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECSA ![In: Software Architecture, Second European Conference, ECSA 2008, Paphos, Cyprus, September 29 - October 1, 2008, Proceedings, pp. 98-113, 2008, Springer, 978-3-540-88029-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
black-box components, architecture, Development environment |
74 | Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang |
On Secure Multi-party Computation in Black-Box Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 591-612, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Planar Graph, Graph Colouring, Black-Box, Multi-Party Computation, Non-Abelian Group |
74 | Wayne Eberly, Mark Giesbrecht, Pascal Giorgi, Arne Storjohann, Gilles Villard |
Faster inversion and other black box matrix computations using efficient block projections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSAC ![In: Symbolic and Algebraic Computation, International Symposium, ISSAC 2007, Waterloo, Ontario, Canada, July 28 - August 1, 2007, Proceedings, pp. 143-150, 2007, ACM, 978-1-59593-743-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
black box linear algebra, linear system solving, sparse integer matrix, structured integer matrix |
74 | Mark Last, Shay Eyal, Abraham Kandel |
Effective Black-Box Testing with Genetic Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Haifa Verification Conference ![In: Hardware and Software Verification and Testing, First International Haifa Verification Conference, Haifa, Israel, November 13-16, 2005, Revised Selected Papers, pp. 134-148, 2005, Springer, 3-540-32604-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Genetic algorithms, Fuzzy logic, Computational intelligence, Black-box testing, Test prioritization |
74 | Shoichi Hirose |
Provably Secure Double-Block-Length Hash Functions in a Black-Box Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 330-342, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
block cipher, black-box model, double-block-length hash function |
74 | Patrick J. Schroeder, Bogdan Korel |
Black-box test reduction using input-output analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the International Symposium on Software Testing and Analysis, ISSTA 2000, Portland, OR, USA, August 21-24, 2000, pp. 173-177, 2000, ACM, 1-58113-266-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
input-output analysis, test reduction, black-box testing, combinatorial testing |
74 | Zhonglin He, Geoff Staples, Margaret Ross 0001, Ian Court |
Software Black Box Mechanism: A Pragmatic Method for Software Crash Diagnosis and Usage Maintenance Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 1997 International Conference on Software Maintenance (ICSM '97), 1-3 October 1997, Bari, Italy, Proceedings, pp. 142-149, 1997, IEEE Computer Society, 0-8186-8013-X. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
software maintenance testing, software usage testing, software crash diagnosis, software black box mechanism |
72 | Boaz Barak |
Non-black-box Techniques in Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: Computer Science - Theory and Applications, First International Symposium on Computer Science in Russia, CSR 2006, St. Petersburg, Russia, June 8-12, 2006, Proceedings, pp. 1, 2006, Springer, 3-540-34166-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Zhanfei Zhou |
Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 370-383, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
72 | Ronald Cramer, Serge Fehr |
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 272-287, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
72 | B. David Saunders |
Black box methods for least squares problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSAC ![In: Proceedings of the 2001 International Symposium on Symbolic and Algebraic Computation, ISSAC 2001, ORCCA & University of Western Ontario, London, Ontario, Canada, July 22-25, 2001, pp. 297-302, 2001, ACM, 1-58113-417-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
68 | Kwang Ik Seo, Eun Man Choi |
Comparison of Five Black-box Testing Methods for Object-Oriented Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERA ![In: Fourth International Conference on Software Engineering, Research, Management and Applications (SERA 2006), 9-11 August 2006, Seattle, Washington, USA, pp. 213-220, 2006, IEEE Computer Society, 0-7695-2656-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Comparison of testing methods, Performance of testing methods, Specification-based test, Black-box test |
68 | Aman Shaikh, Albert G. Greenberg |
Experience in black-box OSPF measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Workshop ![In: Proceedings of the 1st ACM SIGCOMM Internet Measurement Workshop, IMW 2001, San Francisco, California, USA, November 1-2, 2001, pp. 113-125, 2001, ACM, 1-58113-435-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
SPF calculation, black-box measurements, routing, OSPF |
66 | Ahto Buldas, Sven Laur, Margus Niitsoo |
Oracle Separation in the Non-uniform Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 230-244, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
66 | Amir Shpilka, Ilya Volkovich |
Read-once polynomial identity testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008, pp. 507-516, 2008, ACM, 978-1-60558-047-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
bounded depth circuits, identity testing, read-once formulas, reconstruction, arithmetic circuits |
66 | Boaz Barak, Yehuda Lindell |
Strict polynomial-time in simulation and extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings on 34th Annual ACM Symposium on Theory of Computing, May 19-21, 2002, Montréal, Québec, Canada, pp. 484-493, 2002, ACM, 1-58113-495-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
66 | Aggelos Kiayias, Moti Yung |
On Crafty Pirates and Foxy Tracers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers, pp. 22-39, 2001, Springer, 3-540-43677-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
63 | Eddie Davis, Marianthi G. Ierapetritou |
A kriging based method for the solution of mixed-integer nonlinear programs containing black-box functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Glob. Optim. ![In: J. Glob. Optim. 43(2-3), pp. 191-205, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Optimization, Mathematical modeling, Kriging, Response surface, Black-box models |
63 | Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee |
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008., pp. 427-444, 2008, Springer, 978-3-540-78523-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
black-box constructions, Public-key encryption, semantic security, non-malleability |
63 | Tobias Storch |
On the impact of objective function transformations on evolutionary and black-box algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Genet. Program. Evolvable Mach. ![In: Genet. Program. Evolvable Mach. 7(2), pp. 171-193, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Black-box algorithm, Evolutionary algorithm, Runtime analysis |
63 | William J. Turner |
Preconditioners for singular black box matrices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSAC ![In: Symbolic and Algebraic Computation, International Symposium ISSAC 2005, Beijing, China, July 24-27, 2005, Proceedings, pp. 332-339, 2005, ACM, 1-59593-095-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Wiedemann method, black box linear algebra, rank preconditioner, singular linear system, switching network, Toeplitz matrix |
63 | Stephanie White, Herbert Warner |
A Process for Specifying Black Box Behavior, Demonstrated in a Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 2nd IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '96), 21-25 October 1996, Montreal, Canada, pp. 80-, 1996, IEEE Computer Society, 0-8186-7614-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
software engineering, formal methods, scenarios, traces, systems engineering, black box, system behavior, requirements definition |
61 | Zohar Shay Karnin, Amir Shpilka |
Black Box Polynomial Identity Testing of Generalized Depth-3 Arithmetic Circuits with Bounded Top Fan-In. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: Proceedings of the 23rd Annual IEEE Conference on Computational Complexity, CCC 2008, 23-26 June 2008, College Park, Maryland, USA, pp. 280-291, 2008, IEEE Computer Society, 978-0-7695-3169-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
PIT, depth-3, arithmetic circuit, deterministic, polynomial identity testing |
61 | Eric Filiol |
Malware Pattern Scanning Schemes Secure Against Black-box Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 2(1), pp. 35-50, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Tafline Murnane, Karl Reed, Richard Hall |
Tailoring of Black-Box Testing Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASWEC ![In: 17th Australian Software Engineering Conference (ASWEC 2006), 18-21 April 2006, Sydney, Australia, pp. 292-299, 2006, IEEE Computer Society, 0-7695-2551-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Jihyun Lee, Dan Lee |
Description Technique for Component Composition Focusing on Black-Box View. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV, pp. 994-1002, 2006, Springer, 3-540-34077-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Vikraman Arvind, Bireswar Das, Partha Mukhopadhyay |
The Complexity of Black-Box Ring Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COCOON ![In: Computing and Combinatorics, 12th Annual International Conference, COCOON 2006, Taipei, Taiwan, August 15-18, 2006, Proceedings, pp. 126-135, 2006, Springer, 3-540-36925-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Tafline Murnane, Karl Reed |
On the Effectiveness of Mutation Analysis as a Black Box Testing Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Software Engineering Conference ![In: 13th Australian Software Engineering Conference (ASWEC 2001), 26-28 August 2001, Canberra, Australia, pp. 12-20, 2001, IEEE Computer Society, 0-7695-1254-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
61 | Matt Blaze |
Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 54-61, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
60 | Aasia Riasat, Syed Sajjad Rizvi, Farheen Zehara, Faraz Arain |
The Role of System Dynamics in Learning Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education ![In: Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education, Proceedings of the 2007 International Conference on Engineering Education, Instructional Technology, Assessment, and E-learning (EIAE 2007), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2007), Bridgeport, CT, USA, December 3-12, 2007, pp. 538-541, 2008, Springer, 978-1-4020-8738-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
60 | Huo Yan Chen, T. H. Tse, F. T. Chan, Tsong Yueh Chen |
In Black and White: An Integrated Approach to Class-Level Testing of Object-Oriented Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 7(3), pp. 250-295, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
software-testing methodologies, object-oriented programming, abstract data types, algebraic specification, observational equivalence |
59 | Hoijin Yoon, Byoungju Choi |
An Effective Testing Technique for Component Composition in EJBs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSEC ![In: 8th Asia-Pacific Software Engineering Conference (APSEC 2001), 4-7 December 2001, Macau, China, pp. 229-236, 2001, IEEE Computer Society, 0-7695-1408-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
57 | HongDa Li 0001, Bao Li 0001 |
Existence of 3-round zero-knowledge proof systems for NP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 51(3), pp. 273-282, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
non-black-box simulation, DDH assumption, zero-knowledge proof, interactive proof |
57 | Alex Groce, Doron A. Peled, Mihalis Yannakakis |
Adaptive Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TACAS ![In: Tools and Algorithms for the Construction and Analysis of Systems, 8th International Conference, TACAS 2002, Held as Part of the Joint European Conference on Theory and Practice of Software, ETAPS 2002, Grenoble, France, April 8-12, 2002, Proceedings, pp. 357-370, 2002, Springer, 3-540-43419-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Learning Algorithms, Automatic Verification, Black Box Testing |
57 | Robert Beals, Harry Buhrman, Richard Cleve, Michele Mosca, Ronald de Wolf |
Quantum Lower Bounds by Polynomials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 39th Annual Symposium on Foundations of Computer Science, FOCS '98, November 8-11, 1998, Palo Alto, California, USA, pp. 352-361, 1998, IEEE Computer Society, 0-8186-9172-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Black-box computation, Decision trees, Quantum computation, Complexity theory |
57 | Bruce W. Weide, William F. Ogden, Murali Sitaraman |
Recasting Algorithms to Encourage Reuse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 11(5), pp. 80-88, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
machine-oriented view, black-box reuse, spanning-forest algorithm, recasting, object-oriented programming, sorting, graph algorithm, objects, software reusability, sorting algorithm, performance trade-offs |
56 | Achim D. Brucker, Burkhart Wolff |
Interactive Testing with HOL-TestGen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FATES ![In: Formal Approaches to Software Testing, 5th International Workshop, FATES 2005, Edinburgh, UK, July 11, 2005, Revised Selected Papers, pp. 87-102, 2005, Springer, 3-540-34454-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
symbolic test case generations, theorem proving, black box testing, white box testing, interactive testing |
56 | Adam L. Young, Moti Yung |
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 89-103, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Cryptanalytic attacks, Private key, applied systems, design and manufacturing of cryptographic devices and software, auto-escrowing keys, software, RSA, randomness, hardware, Public Key, pseudorandomness, Kerberos, key escrow, DSA, ElGamal, subliminal channels, Capstone |
56 | Claus-Peter Schnorr, Serge Vaudenay |
Black Box Cryptanalysis of Hash Networks Based on Multipermutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings, pp. 47-57, 1994, Springer, 3-540-60176-7. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
55 | Yuval Ishai, Manoj Prabhakaran 0001, Amit Sahai |
Secure Arithmetic Computation with No Honest Majority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings, pp. 294-314, 2009, Springer, 978-3-642-00456-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Seung Chan Slim Lim, Peter Lucas 0002 |
JDA: a step towards large-scale reuse on the web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA Companion ![In: Companion to the 21th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2006, October 22-26, 2006, Portland, Oregon, USA, pp. 586-601, 2006, ACM, 1-59593-491-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
black box reuse, information devices architecture, rich web application, composition, web engineering, JavaScript, dataflow architecture |
52 | Nikolaus Hansen, Anne Auger, Raymond Ros, Steffen Finck, Petr Posík |
Comparing results of 31 algorithms from the black-box optimization benchmarking BBOB-2009. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2010, Proceedings, Portland, Oregon, USA, July 7-11, 2010, Companion Material, pp. 1689-1696, 2010, ACM, 978-1-4503-0073-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
benchmarking, black-box optimization |
52 | Thanh-Do Tran, Gang-Gyoo Jin |
Real-coded genetic algorithm benchmarked on noiseless black-box optimization testbed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2010, Proceedings, Portland, Oregon, USA, July 7-11, 2010, Companion Material, pp. 1731-1738, 2010, ACM, 978-1-4503-0073-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
evolutionary computation, benchmarking, black-box optimization, real-coded genetic algorithm |
52 | Thanh-Do Tran, Gang-Gyoo Jin |
Benchmarking real-coded genetic algorithm on noisy black-box optimization testbed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2010, Proceedings, Portland, Oregon, USA, July 7-11, 2010, Companion Material, pp. 1739-1744, 2010, ACM, 978-1-4503-0073-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
evolutionary computation, benchmarking, black-box optimization, real-coded genetic algorithm |
52 | Danilo Ardagna, Mara Tanelli, Marco Lovera, Li Zhang 0002 |
Black-box performance models for virtualized web service applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSP/SIPEW ![In: Proceedings of the first joint WOSP/SIPEW International Conference on Performance Engineering, San Jose, California, USA, January 28-30, 2010, pp. 153-164, 2010, ACM, 978-1-60558-563-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
linear parameter varying models, black box models |
52 | José García-Nieto, Enrique Alba 0001, Javier Apolloni |
Particle swarm hybridized with differential evolution: black box optimization benchmarking for noisy functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2009, Proceedings, Montreal, Québec, Canada, July 8-12, 2009, Companion Material, pp. 2343-2350, 2009, ACM, 978-1-60558-505-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
noisy functions, benchmarking, differential evolution, black-box optimization, hybrid algorithms, particle swarm |
52 | Peter A. N. Bosman, Jörn Grahl, Dirk Thierens |
AMaLGaM IDEAs in noisy black-box optimization benchmarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2009, Proceedings, Montreal, Québec, Canada, July 8-12, 2009, Companion Material, pp. 2351-2358, 2009, ACM, 978-1-60558-505-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
evolutionary computation, benchmarking, black-box optimization |
52 | Peter Korosec, Jurij Silc |
A stigmergy-based algorithm for black-box optimization: noisy function testbed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2009, Proceedings, Montreal, Québec, Canada, July 8-12, 2009, Companion Material, pp. 2375-2382, 2009, ACM, 978-1-60558-505-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
benchmarking, black-box optimization, stigmergy |
52 | Peter A. N. Bosman, Jörn Grahl, Dirk Thierens |
AMaLGaM IDEAs in noiseless black-box optimization benchmarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2009, Proceedings, Montreal, Québec, Canada, July 8-12, 2009, Companion Material, pp. 2247-2254, 2009, ACM, 978-1-60558-505-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
evolutionary computation, benchmarking, black-box optimization |
52 | Peter Korosec, Jurij Silc |
A stigmergy-based algorithm for black-box optimization: noiseless function testbed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2009, Proceedings, Montreal, Québec, Canada, July 8-12, 2009, Companion Material, pp. 2295-2302, 2009, ACM, 978-1-60558-505-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
benchmarking, black-box optimization, stigmergy |
52 | José García-Nieto, Enrique Alba 0001, Javier Apolloni |
Noiseless functions black-box optimization: evaluation of a hybrid particle swarm with differential operators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2009, Proceedings, Montreal, Québec, Canada, July 8-12, 2009, Companion Material, pp. 2231-2238, 2009, ACM, 978-1-60558-505-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
noiseless functions, benchmarking, differential evolution, black-box optimization, hybrid algorithms, particle swarm |
52 | Daniel Molina, Manuel Lozano 0001, Francisco Herrera |
A memetic algorithm using local search chaining for black-box optimization benchmarking 2009 for noisy functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2009, Proceedings, Montreal, Québec, Canada, July 8-12, 2009, Companion Material, pp. 2359-2366, 2009, ACM, 978-1-60558-505-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
evolutionary computation, black-box optimization, memetic algorithms, hybrid metaheuristics |
52 | Itai Dinur, Adi Shamir |
Cube Attacks on Tweakable Black Box Polynomials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pp. 278-299, 2009, Springer, 978-3-642-01000-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cube attacks, tweakable black box polynomials, Cryptanalysis, stream ciphers, algebraic attacks, Trivium |
52 | Jean-Guillaume Dumas, Clément Pernet, B. David Saunders |
On finding multiplicities of characteristic polynomial factors of black-box matrices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSAC ![In: Symbolic and Algebraic Computation, International Symposium, ISSAC 2009, Seoul, Republic of Korea, July 29-31, 2009, Proceedings, pp. 135-142, 2009, ACM, 978-1-60558-609-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
finite field, characteristic polynomial, black-box matrix |
52 | XiaoFeng Wang 0001, Zhuowei Li 0001, Jong Youl Choi, Jun Xu 0003, Michael K. Reiter, Chongkyung Kil |
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(2), pp. 11:1-11:35, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
black-box defense, exploit detection, vaccine injection, worm, signature generation |
52 | Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David Wetherall, Gabriel Maganis, Tadayoshi Kohno |
Privacy oracle: a system for finding application leaks with black box differential testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 279-288, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data loss prevention, differential fuzz testing, personal information leaks, sequence alignment algorithm, black-box testing |
52 | José Daniel García, Laura Prada, Javier Fernández 0001, Alberto Nuñez, Jesús Carretero 0001 |
Using Black-Box Modeling Techniques for Modern Disk Drives Service Time Simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Annual Simulation Symposium ![In: Proceedings 41st Annual Simulation Symposium (ANSS-41 2008), April 14-16, 2008, Ottawa, Canada, pp. 139-145, 2008, IEEE Computer Society, 0-7695-3143-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
black-box mdodelin, simulation, analytical models, i/o performance, disk drives |
52 | Lionel C. Briand, Yvan Labiche, Zaheer Bawar |
Using Machine Learning to Refine Black-Box Test Specifications and Test Suites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QSIC ![In: Proceedings of the Eighth International Conference on Quality Software, QSIC 2008, 12-13 August 2008, Oxford, UK, pp. 135-144, 2008, IEEE Computer Society, 978-0-7695-3312-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
category partition, machine learning, black-box testing |
52 | Eric Koskinen, John Jannotti |
BorderPatrol: isolating events for black-box tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, pp. 191-203, 2008, ACM, 978-1-60558-013-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
black box systems, causal paths, distributed systems, performance analysis, performance debugging |
52 | XiaoFeng Wang 0001, Zhuowei Li 0001, Jun Xu 0003, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi |
Packet vaccine: black-box exploit detection and signature generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 37-46, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
black-box defense, exploit detection, vaccine injection, worm, signature generation |
52 | Patrick Reynolds, Janet L. Wiener, Jeffrey C. Mogul, Marcos Kawazoe Aguilera, Amin Vahdat |
WAP5: black-box performance debugging for wide-area systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 15th international conference on World Wide Web, WWW 2006, Edinburgh, Scotland, UK, May 23-26, 2006, pp. 347-356, 2006, ACM, 1-59593-323-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
black box systems, distributed systems, performance analysis, performance debugging |
52 | Karl Meinke |
Automated black-box testing of functional correctness using function approximation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2004, Boston, Massachusetts, USA, July 11-14, 2004, pp. 143-153, 2004, ACM, 1-58113-820-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
formal specification, approximation, functional test, constraint solving, test coverage, black-box test, satisfiability problem |
52 | Charles Kindel |
COM: what makes it work, black-box encapsulation through multiple, immutable interfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 1st International Enterprise Distributed Object Computing Conference (EDOC '97), 24-26 October 1997, Gold Coast, Australia, Proceedings, pp. 68-77, 1997, IEEE Computer Society, 0-8186-8031-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
commercial reality, black box-encapsulation, interface immutability, programming, multiple interfaces, component system, component object model, location transparency |
51 | Manfred Broy |
A uniform mathematical concept of a component (Appendix to M. Broy et al.: "What characterizes a (software) component?". ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Concepts Tools ![In: Softw. Concepts Tools 19(1), pp. 57-59, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Black box specification, Component, Componentware |
50 | Ritendra Datta, Dhiraj Joshi, Jia Li 0001, James Ze Wang |
Tagging over time: real-world image annotation by lightweight meta-learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 15th International Conference on Multimedia 2007, Augsburg, Germany, September 24-29, 2007, pp. 393-402, 2007, ACM, 978-1-59593-702-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Jonathan Katz, Arkady Yerukhimovich |
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 197-213, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
50 | Benoît Libert, Damien Vergnaud |
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 235-255, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
efficiency, traceability, Identity-based encryption |
50 | Thomas Huining Feng, Lynn Wang, Wei Zheng, Sri Kanajan, Sanjit A. Seshia |
Interactive presentation: Automatic model generation for black box real-time systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2007 Design, Automation and Test in Europe Conference and Exposition, DATE 2007, Nice, France, April 16-20, 2007, pp. 930-935, 2007, EDA Consortium, San Jose, CA, USA, 978-3-9810801-2-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Ajitha Rajan |
Coverage Metrics to Measure Adequacy of Black-Box Test Suites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006), 18-22 September 2006, Tokyo, Japan, pp. 335-338, 2006, IEEE Computer Society, 0-7695-2579-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Dragan Bosnacki |
Black Box Checking for Biochemical Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CMSB ![In: Computational Methods in Systems Biology, International Conference, CMSB 2004, Paris, France, May 26-28, 2004, Revised Selected Papers, pp. 225-230, 2004, Springer, 3-540-25375-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Boaz Barak, Yehuda Lindell, Salil P. Vadhan |
Lower Bounds for Non-Black-Box Zero Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 44th Symposium on Foundations of Computer Science (FOCS 2003), 11-14 October 2003, Cambridge, MA, USA, Proceedings, pp. 384-393, 2003, IEEE Computer Society, 0-7695-2040-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Vinhthuy T. Phan, Pavel Sumazin, Steven Skiena |
A Time-Sensitive System for Black-Box Combinatorial Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ALENEX ![In: Algorithm Engineering and Experiments, 4th International Workshop, ALENEX 2002, San Francisco, CA, USA, January 4-5, 2002, Revised Papers, pp. 16-18, 2002, Springer, 3-540-43977-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
50 | Amy Sundermier, Suzanne W. Dietrich, Vandana Shah |
An Active Database Approach to Integrating Black-Box Software Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 23rd International Computer Software and Applications Conference (COMPSAC '99), 27-19 October 1999, Phoenix, AZ, USA, pp. 403-409, 1999, IEEE Computer Society, 0-7695-0368-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
rule-based databases, object-oriented programming, software components, active databases |
50 | Yuri I. Ozhigov |
Quantum Computer Can Not Speed Up Iterated Applications of a Black Box. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QCQC ![In: Quantum Computing and Quantum Communications, First NASA International Conference, QCQC'98, Palm Springs, California, USA, February 17-20, 1998, Selected Papers, pp. 152-159, 1998, Springer, 3-540-65514-X. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
50 | Dan Boneh, Richard J. Lipton |
Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 283-297, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
50 | Tsong Yueh Chen, Pak-Lok Poon, Sau-Fun Tang, Yuen-Tak Yu |
White on Black: A White-Box-Oriented Approach for Selecting Black-Box-Generated Test Cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APAQS ![In: 1st Asia-Pacific Conference on Quality Software (APAQS 2000), 30-31 October 2000, Hong Kong, China, Proceedings, pp. 275-284, 2000, IEEE Computer Society, 0-7695-0825-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
specification-based testing, partition testing, test case selection, classification-tree method, Category-partition method |
50 | Emin Borandag |
İlişkisel veri tabanı kullanılan yazılımlarda black-box ve white-box test yöntemleri ile agile metodolojiye uygun bir hibrit test metodu ve uygulama yazılımının geliştirilmesi (Development of a hybrid test method complied with the agile methodology and an application software by using black-box and white-box test methods for software using relational database) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2011 |
RDF |
|
50 | Sami Beydeda, Volker Gruhn, Michael Stachorski |
A Graphical Class Representation for Integrated Black- and White-Box Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 2001 International Conference on Software Maintenance, ICSM 2001, Florence, Italy, November 6-10, 2001, pp. 706-715, 2001, IEEE Computer Society, 0-7695-1189-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Class-level testing, integrated black- and white-box testing, selective regression testing, test suite reduction |
Displaying result #1 - #100 of 5500 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|