|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1993 occurrences of 1129 keywords
|
|
|
Results
Found 5500 publication records. Showing 5500 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
166 | Ran Raz, Amir Shpilka |
On the Power of Quantum Proofs.  |
CCC  |
2004 |
DBLP DOI BibTeX RDF |
|
106 | Aggelos Kiayias, Moti Yung |
Self Protecting Pirates and Black-Box Traitor Tracing.  |
CRYPTO  |
2001 |
DBLP DOI BibTeX RDF |
|
99 | Steven Halim, Roland H. C. Yap, Hoong Chuin Lau |
An Integrated White+Black Box Approach for Designing and Tuning Stochastic Local Search.  |
CP  |
2007 |
DBLP DOI BibTeX RDF |
|
97 | Bogdan Korel |
Black-Box Understanding of COTS Components.  |
IWPC  |
1999 |
DBLP DOI BibTeX RDF |
Black-Box understanding, Interface probing, Black-box testing, Automated test generation, COTS component, White-box testing |
96 | Per Kristian Lehre, Carsten Witt |
Black-box search by unbiased variation.  |
GECCO  |
2010 |
DBLP DOI BibTeX RDF |
black-box complexity, runtime analysis |
95 | Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank |
Black-box constructions for secure computation.  |
STOC  |
2006 |
DBLP DOI BibTeX RDF |
theory of cryptography, oblivious transfer, secure computation, black-box reductions |
92 | Sergei Kojarski, David H. Lorenz |
Comparing White-Box, Black-Box, and Glass-Box Composition of Aspect Mechanisms.  |
ICSR  |
2006 |
DBLP DOI BibTeX RDF |
|
90 | Adam L. Young, Moti Yung |
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts.  |
ACISP  |
2003 |
DBLP DOI BibTeX RDF |
hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography |
85 | Rafael Pass, Hoeteck Wee |
Black-Box Constructions of Two-Party Protocols from One-Way Functions.  |
TCC  |
2009 |
DBLP DOI BibTeX RDF |
black-box constructions, zero-knowledge arguments, trapdoor commitments, parallel coin-tossing, non-malleable commitments, secure two-party computation |
85 | Huafei Zhu |
Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols.  |
CANS  |
2008 |
DBLP DOI BibTeX RDF |
Black-box constructions, defensible adversary, malicious adversary, oblivious transfer protocols |
85 | Jun Furukawa 0001, Nuttapong Attrapadung |
Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys.  |
ICALP  |
2007 |
DBLP DOI BibTeX RDF |
Fully Collusion Resistant, Revocation, Traitor Tracing, Black-Box |
85 | Tatsuyuki Matsushita, Hideki Imai |
Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size.  |
ICICS  |
2006 |
DBLP DOI BibTeX RDF |
Hierarchical key assignment, black-box tracing, reduced ciphertext size |
85 | Amrit Tiwana |
Beyond the Black Box: Knowledge Overlaps in Software Outsourcing.  |
IEEE Softw.  |
2004 |
DBLP DOI BibTeX RDF |
congruence framework, software project risk, black-box development, knowledge management, software development, outsourcing |
85 | Tatsuyuki Matsushita, Hideki Imai |
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates.  |
ASIACRYPT  |
2004 |
DBLP DOI BibTeX RDF |
Public-key traitor tracing, Black-box tracing, Self-defensive pirates |
85 | Tatsuyuki Matsushita |
A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing.  |
ICICS  |
2002 |
DBLP DOI BibTeX RDF |
Flexible revocation, Black-box tracing, Traitor tracing |
84 | Ueli M. Maurer, Dominik Raub |
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations.  |
ASIACRYPT  |
2007 |
DBLP DOI BibTeX RDF |
Black-box fields, computational algebra, homomorphic encryption, generic algorithms, one-way permutations |
80 | Yehuda Lindell |
Lower Bounds and Impossibility Results for Concurrent Self Composition.  |
J. Cryptol.  |
2008 |
DBLP DOI BibTeX RDF |
Self and general composition, Non-black-box and black-box simulation, Lower bounds, Secure computation, Protocol composition, Impossibility results |
80 | Conor Nugent, Padraig Cunningham |
A Case-Based Explanation System for Black-Box Systems.  |
Artif. Intell. Rev.  |
2005 |
DBLP DOI BibTeX RDF |
black-box systems, case-based reasoning, explanation |
79 | Sami Beydeda, Volker Gruhn |
Integrating White- and Black-Box Techniques for Class-Level Regression Testing.  |
COMPSAC  |
2001 |
DBLP DOI BibTeX RDF |
Integrated White- and Black-Box Testing, Class-level Testing, Regression Testing |
78 | Iftach Haitner |
Semi-honest to Malicious Oblivious Transfer - The Black-Box Way.  |
TCC  |
2008 |
DBLP DOI BibTeX RDF |
|
78 | Aggelos Kiayias, Moti Yung |
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract.  |
Digital Rights Management Workshop  |
2008 |
DBLP DOI BibTeX RDF |
error correcting codes, traitor tracing |
78 | Amos Beimel, Tal Malkin |
A Quantitative Approach to Reductions in Secure Computation.  |
TCC  |
2004 |
DBLP DOI BibTeX RDF |
|
74 | Gerald Kotonya |
An Architecture-Centric Development Environment for Black-Box Component-Based Systems.  |
ECSA  |
2008 |
DBLP DOI BibTeX RDF |
black-box components, architecture, Development environment |
74 | Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang |
On Secure Multi-party Computation in Black-Box Groups.  |
CRYPTO  |
2007 |
DBLP DOI BibTeX RDF |
Planar Graph, Graph Colouring, Black-Box, Multi-Party Computation, Non-Abelian Group |
74 | Wayne Eberly, Mark Giesbrecht, Pascal Giorgi, Arne Storjohann, Gilles Villard |
Faster inversion and other black box matrix computations using efficient block projections.  |
ISSAC  |
2007 |
DBLP DOI BibTeX RDF |
black box linear algebra, linear system solving, sparse integer matrix, structured integer matrix |
74 | Mark Last, Shay Eyal, Abraham Kandel |
Effective Black-Box Testing with Genetic Algorithms.  |
Haifa Verification Conference  |
2005 |
DBLP DOI BibTeX RDF |
Genetic algorithms, Fuzzy logic, Computational intelligence, Black-box testing, Test prioritization |
74 | Shoichi Hirose |
Provably Secure Double-Block-Length Hash Functions in a Black-Box Model.  |
ICISC  |
2004 |
DBLP DOI BibTeX RDF |
block cipher, black-box model, double-block-length hash function |
74 | Patrick J. Schroeder, Bogdan Korel |
Black-box test reduction using input-output analysis.  |
ISSTA  |
2000 |
DBLP DOI BibTeX RDF |
input-output analysis, test reduction, black-box testing, combinatorial testing |
74 | Zhonglin He, Geoff Staples, Margaret Ross 0001, Ian Court |
Software Black Box Mechanism: A Pragmatic Method for Software Crash Diagnosis and Usage Maintenance Testing.  |
ICSM  |
1997 |
DBLP DOI BibTeX RDF |
software maintenance testing, software usage testing, software crash diagnosis, software black box mechanism |
72 | Boaz Barak |
Non-black-box Techniques in Cryptography.  |
CSR  |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Zhanfei Zhou |
Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes.  |
CISC  |
2005 |
DBLP DOI BibTeX RDF |
|
72 | Ronald Cramer, Serge Fehr |
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups.  |
CRYPTO  |
2002 |
DBLP DOI BibTeX RDF |
|
72 | B. David Saunders |
Black box methods for least squares problems.  |
ISSAC  |
2001 |
DBLP DOI BibTeX RDF |
|
68 | Kwang Ik Seo, Eun Man Choi |
Comparison of Five Black-box Testing Methods for Object-Oriented Software.  |
SERA  |
2006 |
DBLP DOI BibTeX RDF |
Comparison of testing methods, Performance of testing methods, Specification-based test, Black-box test |
68 | Aman Shaikh, Albert G. Greenberg |
Experience in black-box OSPF measurement.  |
Internet Measurement Workshop  |
2001 |
DBLP DOI BibTeX RDF |
SPF calculation, black-box measurements, routing, OSPF |
66 | Ahto Buldas, Sven Laur, Margus Niitsoo |
Oracle Separation in the Non-uniform Model.  |
ProvSec  |
2009 |
DBLP DOI BibTeX RDF |
|
66 | Amir Shpilka, Ilya Volkovich |
Read-once polynomial identity testing.  |
STOC  |
2008 |
DBLP DOI BibTeX RDF |
bounded depth circuits, identity testing, read-once formulas, reconstruction, arithmetic circuits |
66 | Boaz Barak, Yehuda Lindell |
Strict polynomial-time in simulation and extraction.  |
STOC  |
2002 |
DBLP DOI BibTeX RDF |
|
66 | Aggelos Kiayias, Moti Yung |
On Crafty Pirates and Foxy Tracers.  |
Digital Rights Management Workshop  |
2001 |
DBLP DOI BibTeX RDF |
|
63 | Eddie Davis, Marianthi G. Ierapetritou |
A kriging based method for the solution of mixed-integer nonlinear programs containing black-box functions.  |
J. Glob. Optim.  |
2009 |
DBLP DOI BibTeX RDF |
Optimization, Mathematical modeling, Kriging, Response surface, Black-box models |
63 | Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee |
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One.  |
TCC  |
2008 |
DBLP DOI BibTeX RDF |
black-box constructions, Public-key encryption, semantic security, non-malleability |
63 | Tobias Storch |
On the impact of objective function transformations on evolutionary and black-box algorithms.  |
Genet. Program. Evolvable Mach.  |
2006 |
DBLP DOI BibTeX RDF |
Black-box algorithm, Evolutionary algorithm, Runtime analysis |
63 | William J. Turner |
Preconditioners for singular black box matrices.  |
ISSAC  |
2005 |
DBLP DOI BibTeX RDF |
Wiedemann method, black box linear algebra, rank preconditioner, singular linear system, switching network, Toeplitz matrix |
63 | Stephanie White, Herbert Warner |
A Process for Specifying Black Box Behavior, Demonstrated in a Case Study.  |
ICECCS  |
1996 |
DBLP DOI BibTeX RDF |
software engineering, formal methods, scenarios, traces, systems engineering, black box, system behavior, requirements definition |
61 | Zohar Shay Karnin, Amir Shpilka |
Black Box Polynomial Identity Testing of Generalized Depth-3 Arithmetic Circuits with Bounded Top Fan-In.  |
CCC  |
2008 |
DBLP DOI BibTeX RDF |
PIT, depth-3, arithmetic circuit, deterministic, polynomial identity testing |
61 | Eric Filiol |
Malware Pattern Scanning Schemes Secure Against Black-box Analysis.  |
J. Comput. Virol.  |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Tafline Murnane, Karl Reed, Richard Hall |
Tailoring of Black-Box Testing Methods.  |
ASWEC  |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Jihyun Lee, Dan Lee |
Description Technique for Component Composition Focusing on Black-Box View.  |
ICCSA (4)  |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Vikraman Arvind, Bireswar Das, Partha Mukhopadhyay |
The Complexity of Black-Box Ring Problems.  |
COCOON  |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Tafline Murnane, Karl Reed |
On the Effectiveness of Mutation Analysis as a Black Box Testing Technique.  |
Australian Software Engineering Conference  |
2001 |
DBLP DOI BibTeX RDF |
|
61 | Matt Blaze |
Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion).  |
Security Protocols Workshop  |
2000 |
DBLP DOI BibTeX RDF |
|
60 | Aasia Riasat, Syed Sajjad Rizvi, Farheen Zehara, Faraz Arain |
The Role of System Dynamics in Learning Environments.  |
Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education  |
2008 |
DBLP DOI BibTeX RDF |
|
60 | Huo Yan Chen, T. H. Tse, F. T. Chan, Tsong Yueh Chen |
In Black and White: An Integrated Approach to Class-Level Testing of Object-Oriented Programs.  |
ACM Trans. Softw. Eng. Methodol.  |
1998 |
DBLP DOI BibTeX RDF |
software-testing methodologies, object-oriented programming, abstract data types, algebraic specification, observational equivalence |
59 | Hoijin Yoon, Byoungju Choi |
An Effective Testing Technique for Component Composition in EJBs.  |
APSEC  |
2001 |
DBLP DOI BibTeX RDF |
|
57 | HongDa Li 0001, Bao Li 0001 |
Existence of 3-round zero-knowledge proof systems for NP.  |
Sci. China Ser. F Inf. Sci.  |
2008 |
DBLP DOI BibTeX RDF |
non-black-box simulation, DDH assumption, zero-knowledge proof, interactive proof |
57 | Alex Groce, Doron A. Peled, Mihalis Yannakakis |
Adaptive Model Checking.  |
TACAS  |
2002 |
DBLP DOI BibTeX RDF |
Learning Algorithms, Automatic Verification, Black Box Testing |
57 | Robert Beals, Harry Buhrman, Richard Cleve, Michele Mosca, Ronald de Wolf |
Quantum Lower Bounds by Polynomials.  |
FOCS  |
1998 |
DBLP DOI BibTeX RDF |
Black-box computation, Decision trees, Quantum computation, Complexity theory |
57 | Bruce W. Weide, William F. Ogden, Murali Sitaraman |
Recasting Algorithms to Encourage Reuse.  |
IEEE Softw.  |
1994 |
DBLP DOI BibTeX RDF |
machine-oriented view, black-box reuse, spanning-forest algorithm, recasting, object-oriented programming, sorting, graph algorithm, objects, software reusability, sorting algorithm, performance trade-offs |
56 | Achim D. Brucker, Burkhart Wolff |
Interactive Testing with HOL-TestGen.  |
FATES  |
2005 |
DBLP DOI BibTeX RDF |
symbolic test case generations, theorem proving, black box testing, white box testing, interactive testing |
56 | Adam L. Young, Moti Yung |
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone?  |
CRYPTO  |
1996 |
DBLP DOI BibTeX RDF |
Cryptanalytic attacks, Private key, applied systems, design and manufacturing of cryptographic devices and software, auto-escrowing keys, software, RSA, randomness, hardware, Public Key, pseudorandomness, Kerberos, key escrow, DSA, ElGamal, subliminal channels, Capstone |
56 | Claus-Peter Schnorr, Serge Vaudenay |
Black Box Cryptanalysis of Hash Networks Based on Multipermutations.  |
EUROCRYPT  |
1994 |
DBLP DOI BibTeX RDF |
|
55 | Yuval Ishai, Manoj Prabhakaran 0001, Amit Sahai |
Secure Arithmetic Computation with No Honest Majority.  |
TCC  |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Seung Chan Slim Lim, Peter Lucas 0002 |
JDA: a step towards large-scale reuse on the web.  |
OOPSLA Companion  |
2006 |
DBLP DOI BibTeX RDF |
black box reuse, information devices architecture, rich web application, composition, web engineering, JavaScript, dataflow architecture |
52 | Nikolaus Hansen, Anne Auger, Raymond Ros, Steffen Finck, Petr Posík |
Comparing results of 31 algorithms from the black-box optimization benchmarking BBOB-2009.  |
GECCO (Companion)  |
2010 |
DBLP DOI BibTeX RDF |
benchmarking, black-box optimization |
52 | Thanh-Do Tran, Gang-Gyoo Jin |
Real-coded genetic algorithm benchmarked on noiseless black-box optimization testbed.  |
GECCO (Companion)  |
2010 |
DBLP DOI BibTeX RDF |
evolutionary computation, benchmarking, black-box optimization, real-coded genetic algorithm |
52 | Thanh-Do Tran, Gang-Gyoo Jin |
Benchmarking real-coded genetic algorithm on noisy black-box optimization testbed.  |
GECCO (Companion)  |
2010 |
DBLP DOI BibTeX RDF |
evolutionary computation, benchmarking, black-box optimization, real-coded genetic algorithm |
52 | Danilo Ardagna, Mara Tanelli, Marco Lovera, Li Zhang 0002 |
Black-box performance models for virtualized web service applications.  |
WOSP/SIPEW  |
2010 |
DBLP DOI BibTeX RDF |
linear parameter varying models, black box models |
52 | José García-Nieto, Enrique Alba 0001, Javier Apolloni |
Particle swarm hybridized with differential evolution: black box optimization benchmarking for noisy functions.  |
GECCO (Companion)  |
2009 |
DBLP DOI BibTeX RDF |
noisy functions, benchmarking, differential evolution, black-box optimization, hybrid algorithms, particle swarm |
52 | Peter A. N. Bosman, Jörn Grahl, Dirk Thierens |
AMaLGaM IDEAs in noisy black-box optimization benchmarking.  |
GECCO (Companion)  |
2009 |
DBLP DOI BibTeX RDF |
evolutionary computation, benchmarking, black-box optimization |
52 | Peter Korosec, Jurij Silc |
A stigmergy-based algorithm for black-box optimization: noisy function testbed.  |
GECCO (Companion)  |
2009 |
DBLP DOI BibTeX RDF |
benchmarking, black-box optimization, stigmergy |
52 | Peter A. N. Bosman, Jörn Grahl, Dirk Thierens |
AMaLGaM IDEAs in noiseless black-box optimization benchmarking.  |
GECCO (Companion)  |
2009 |
DBLP DOI BibTeX RDF |
evolutionary computation, benchmarking, black-box optimization |
52 | Peter Korosec, Jurij Silc |
A stigmergy-based algorithm for black-box optimization: noiseless function testbed.  |
GECCO (Companion)  |
2009 |
DBLP DOI BibTeX RDF |
benchmarking, black-box optimization, stigmergy |
52 | José García-Nieto, Enrique Alba 0001, Javier Apolloni |
Noiseless functions black-box optimization: evaluation of a hybrid particle swarm with differential operators.  |
GECCO (Companion)  |
2009 |
DBLP DOI BibTeX RDF |
noiseless functions, benchmarking, differential evolution, black-box optimization, hybrid algorithms, particle swarm |
52 | Daniel Molina, Manuel Lozano 0001, Francisco Herrera |
A memetic algorithm using local search chaining for black-box optimization benchmarking 2009 for noisy functions.  |
GECCO (Companion)  |
2009 |
DBLP DOI BibTeX RDF |
evolutionary computation, black-box optimization, memetic algorithms, hybrid metaheuristics |
52 | Itai Dinur, Adi Shamir |
Cube Attacks on Tweakable Black Box Polynomials.  |
EUROCRYPT  |
2009 |
DBLP DOI BibTeX RDF |
cube attacks, tweakable black box polynomials, Cryptanalysis, stream ciphers, algebraic attacks, Trivium |
52 | Jean-Guillaume Dumas, Clément Pernet, B. David Saunders |
On finding multiplicities of characteristic polynomial factors of black-box matrices.  |
ISSAC  |
2009 |
DBLP DOI BibTeX RDF |
finite field, characteristic polynomial, black-box matrix |
52 | XiaoFeng Wang 0001, Zhuowei Li 0001, Jong Youl Choi, Jun Xu 0003, Michael K. Reiter, Chongkyung Kil |
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software.  |
ACM Trans. Inf. Syst. Secur.  |
2008 |
DBLP DOI BibTeX RDF |
black-box defense, exploit detection, vaccine injection, worm, signature generation |
52 | Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David Wetherall, Gabriel Maganis, Tadayoshi Kohno |
Privacy oracle: a system for finding application leaks with black box differential testing.  |
CCS  |
2008 |
DBLP DOI BibTeX RDF |
data loss prevention, differential fuzz testing, personal information leaks, sequence alignment algorithm, black-box testing |
52 | José Daniel García, Laura Prada, Javier Fernández 0001, Alberto Nuñez, Jesús Carretero 0001 |
Using Black-Box Modeling Techniques for Modern Disk Drives Service Time Simulation.  |
Annual Simulation Symposium  |
2008 |
DBLP DOI BibTeX RDF |
black-box mdodelin, simulation, analytical models, i/o performance, disk drives |
52 | Lionel C. Briand, Yvan Labiche, Zaheer Bawar |
Using Machine Learning to Refine Black-Box Test Specifications and Test Suites.  |
QSIC  |
2008 |
DBLP DOI BibTeX RDF |
category partition, machine learning, black-box testing |
52 | Eric Koskinen, John Jannotti |
BorderPatrol: isolating events for black-box tracing.  |
EuroSys  |
2008 |
DBLP DOI BibTeX RDF |
black box systems, causal paths, distributed systems, performance analysis, performance debugging |
52 | XiaoFeng Wang 0001, Zhuowei Li 0001, Jun Xu 0003, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi |
Packet vaccine: black-box exploit detection and signature generation.  |
CCS  |
2006 |
DBLP DOI BibTeX RDF |
black-box defense, exploit detection, vaccine injection, worm, signature generation |
52 | Patrick Reynolds, Janet L. Wiener, Jeffrey C. Mogul, Marcos Kawazoe Aguilera, Amin Vahdat |
WAP5: black-box performance debugging for wide-area systems.  |
WWW  |
2006 |
DBLP DOI BibTeX RDF |
black box systems, distributed systems, performance analysis, performance debugging |
52 | Karl Meinke |
Automated black-box testing of functional correctness using function approximation.  |
ISSTA  |
2004 |
DBLP DOI BibTeX RDF |
formal specification, approximation, functional test, constraint solving, test coverage, black-box test, satisfiability problem |
52 | Charles Kindel |
COM: what makes it work, black-box encapsulation through multiple, immutable interfaces.  |
EDOC  |
1997 |
DBLP DOI BibTeX RDF |
commercial reality, black box-encapsulation, interface immutability, programming, multiple interfaces, component system, component object model, location transparency |
51 | Manfred Broy |
A uniform mathematical concept of a component (Appendix to M. Broy et al.: "What characterizes a (software) component?".  |
Softw. Concepts Tools  |
1998 |
DBLP DOI BibTeX RDF |
Black box specification, Component, Componentware |
50 | Ritendra Datta, Dhiraj Joshi, Jia Li 0001, James Ze Wang |
Tagging over time: real-world image annotation by lightweight meta-learning.  |
ACM Multimedia  |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Jonathan Katz, Arkady Yerukhimovich |
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations.  |
ASIACRYPT  |
2009 |
DBLP DOI BibTeX RDF |
|
50 | Benoît Libert, Damien Vergnaud |
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys.  |
Public Key Cryptography  |
2009 |
DBLP DOI BibTeX RDF |
efficiency, traceability, Identity-based encryption |
50 | Thomas Huining Feng, Lynn Wang, Wei Zheng, Sri Kanajan, Sanjit A. Seshia |
Interactive presentation: Automatic model generation for black box real-time systems.  |
DATE  |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Ajitha Rajan |
Coverage Metrics to Measure Adequacy of Black-Box Test Suites.  |
ASE  |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Dragan Bosnacki |
Black Box Checking for Biochemical Networks.  |
CMSB  |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Boaz Barak, Yehuda Lindell, Salil P. Vadhan |
Lower Bounds for Non-Black-Box Zero Knowledge.  |
FOCS  |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Vinhthuy T. Phan, Pavel Sumazin, Steven Skiena |
A Time-Sensitive System for Black-Box Combinatorial Optimization.  |
ALENEX  |
2002 |
DBLP DOI BibTeX RDF |
|
50 | Amy Sundermier, Suzanne W. Dietrich, Vandana Shah |
An Active Database Approach to Integrating Black-Box Software Components.  |
COMPSAC  |
1999 |
DBLP DOI BibTeX RDF |
rule-based databases, object-oriented programming, software components, active databases |
50 | Yuri I. Ozhigov |
Quantum Computer Can Not Speed Up Iterated Applications of a Black Box.  |
QCQC  |
1998 |
DBLP DOI BibTeX RDF |
|
50 | Dan Boneh, Richard J. Lipton |
Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract).  |
CRYPTO  |
1996 |
DBLP DOI BibTeX RDF |
|
50 | Tsong Yueh Chen, Pak-Lok Poon, Sau-Fun Tang, Yuen-Tak Yu |
White on Black: A White-Box-Oriented Approach for Selecting Black-Box-Generated Test Cases.  |
APAQS  |
2000 |
DBLP DOI BibTeX RDF |
specification-based testing, partition testing, test case selection, classification-tree method, Category-partition method |
50 | Emin Borandag |
İlişkisel veri tabanı kullanılan yazılımlarda black-box ve white-box test yöntemleri ile agile metodolojiye uygun bir hibrit test metodu ve uygulama yazılımının geliştirilmesi (Development of a hybrid test method complied with the agile methodology and an application software by using black-box and white-box test methods for software using relational database)  |
|
2011 |
RDF |
|
50 | Sami Beydeda, Volker Gruhn, Michael Stachorski |
A Graphical Class Representation for Integrated Black- and White-Box Testing.  |
ICSM  |
2001 |
DBLP DOI BibTeX RDF |
Class-level testing, integrated black- and white-box testing, selective regression testing, test suite reduction |
Displaying result #1 - #100 of 5500 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|