Deterministic black-box identity testing π-ordered algebraic branching programs

被引:0
|
作者
Jansen, Maurice [1 ]
Qiao, Youming [2 ]
Jayalal Sarma, M.N. [3 ]
机构
[1] School of Informatics, University of Edinburgh, United Kingdom
[2] Institute for Theoretical Computer Science, Tsinghua University, China
[3] Department of Computer Science and Engineering, Indian Institute of Technology Madras, India
关键词
Number:; 60553001; Acronym:; NSFC; Sponsor: National Natural Science Foundation of China; 61073174; 61033001;
D O I
暂无
中图分类号
学科分类号
摘要
Polynomials
引用
收藏
页码:296 / 307
相关论文
共 50 条
  • [41] Black-box testing based on colorful taint analysis
    CHEN Kai1
    2State Key Laboratory of Information Security
    3National Engineering Research Center of Information Security
    Science China(Information Sciences), 2012, 55 (01) : 171 - 183
  • [42] Using MC/DC as a Black-Box Testing Technique
    Vilkomir, Sergiy
    Baptista, John
    Das, Gourav
    2017 IEEE 28TH ANNUAL SOFTWARE TECHNOLOGY CONFERENCE (STC), 2017,
  • [43] RESTTESTGEN: Automated Black-Box Testing of RESTful APIs
    Viglianisi, Emanuele
    Dallago, Michael
    Ceccato, Mariano
    2020 IEEE 13TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VALIDATION AND VERIFICATION (ICST 2020), 2020, : 142 - 152
  • [44] Automated black-box testing with abstract VDM oracles
    Aichernig, BK
    COMPUTER SAFETY, RELIABILITY AND SECURITY, 1999, 1698 : 250 - 259
  • [45] Constructive Membership Testing in Black-Box Classical Groups
    Ambrose, Sophie
    Murray, Scott H.
    Praeger, Cheryl E.
    Schneider, Csaba
    MATHEMATICAL SOFTWARE - ICMS 2010, 2010, 6327 : 54 - +
  • [46] Black-Box Testing and Auditing of Bias in ADM Systems
    Krafft, Tobias D.
    Hauer, Marc P.
    Zweig, Katharina
    MINDS AND MACHINES, 2024, 34 (02)
  • [47] CovDroid: A Black-Box Testing Coverage System for Android
    Yeh, Chao-Chun
    Huang, Shih-Kun
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 447 - 452
  • [48] A kriging method for the solution of nonlinear programs with black-box functions
    Davis, Eddie
    Ierapetritou, Marianthi
    AICHE JOURNAL, 2007, 53 (08) : 2001 - 2012
  • [49] Black-Box Accountable Authority Identity-Based Encryption
    Goyal, Vipul
    Lu, Steve
    Sahai, Amit
    Waters, Brent
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 427 - 436
  • [50] Parallel Framework for Evolutionary Black-box Optimization with Application to Algebraic Cryptanalysis
    Pavlenko, A.
    Semenov, A.
    Ulyantsev, V.
    Zaikin, O.
    2019 42ND INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2019, : 1144 - 1149