Sciweavers

SEKE
2005
Springer
14 years 5 months ago
Dynamically Evolvable Composition of Aspects Based On Relation Model
Current aspect-oriented programming (AOP) enhances maintainability and comprehensibility by modularizing concerns crosscutting multiple components but lacks the support for the hie...
Ik-Joo Han, Doo-Hwan Bae
AMOST
2005
ACM
14 years 5 months ago
Using information about functions in selecting test cases
We consider the problem of generating a set of test cases from a black box specification. We focus on stress testing, i.e. picking test cases that seem most likely to reveal prog...
Markus Clermont, David Lorge Parnas
ISSAC
2007
Springer
153views Mathematics» more  ISSAC 2007»
14 years 5 months ago
On exact and approximate interpolation of sparse rational functions
The black box algorithm for separating the numerator from the denominator of a multivariate rational function can be combined with sparse multivariate polynomial interpolation alg...
Erich Kaltofen, Zhengfeng Yang
ISOLA
2007
Springer
14 years 5 months ago
Using Invariant Detection Mechanism in Black Box Inference
The testing and formal verification of black box software components is a challenging domain. The problem is even harder when specifications of these components are not available...
Muzammil Shahbaz, Roland Groz
FUZZIEEE
2007
IEEE
14 years 5 months ago
Survey of Rough and Fuzzy Hybridization
— This paper provides a broad overview of logical and black box approaches to fuzzy and rough hybridization. The logical approaches include theoretical, supervised learning, feat...
Pawan Lingras, Richard Jensen
ACSAC
2007
IEEE
14 years 5 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...
SIGCOMM
2009
ACM
14 years 6 months ago
Why should we integrate services, servers, and networking in a data center?
Since the early days of networks, a basic principle has been that endpoints treat the network as a black box. An endpoint injects a packet with a destination address and the netwo...
Paolo Costa, Thomas Zahn, Antony I. T. Rowstron, G...
COCO
2009
Springer
96views Algorithms» more  COCO 2009»
14 years 6 months ago
Reconstruction of Generalized Depth-3 Arithmetic Circuits with Bounded Top Fan-in
In this paper we give reconstruction algorithms for depth-3 arithmetic circuits with k multiplication gates (also known as ΣΠΣ(k) circuits), where k = O(1). Namely, we give an ...
Zohar Shay Karnin, Amir Shpilka