Journal articles on the topic 'Black-box Analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Black-box Analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
NAILA, FIRDAUS, and MANISHA DAWRA Ms. "Requirement Analysis of Black Box Testing." International Journal of Advances in Engineering & Scientific Research 1, no. 5 (2014): 19–23. https://doi.org/10.5281/zenodo.10721079.
Full textLeshkevich, Tatiana G. "Metaphors of the digital age and the Black Box Problem." Philosophy of Science and Technology 27, no. 1 (2022): 34–48. http://dx.doi.org/10.21146/2413-9084-2022-27-1-34-48.
Full textResende, David Nunes, Xiaowen Yu, Sílvia Gaia, and David V. Gibson. "Inside the Black Box." International Journal of Information Systems and Social Change 8, no. 4 (2017): 1–22. http://dx.doi.org/10.4018/ijissc.2017100101.
Full textMickelborough, Jane. "Unpacking the black box." Reviews in Clinical Gerontology 7, no. 4 (1997): 287–88. http://dx.doi.org/10.1017/s0959259897007417.
Full textKim, Byol, and Rina Foygel Barber. "Black-box tests for algorithmic stability." Information and Inference: A Journal of the IMA 12, no. 4 (2023): 2690–719. http://dx.doi.org/10.1093/imaiai/iaad039.
Full textLamb, Anthony R. "Computer analysis: avoiding the ‘black box’ syndrome." Proceedings of the Institution of Civil Engineers - Civil Engineering 157, no. 3 (2004): 134–39. http://dx.doi.org/10.1680/cien.2004.157.3.134.
Full textLamb, Anthony R. "Computer analysis: avoiding the ‘black box’ syndrome." Civil Engineering Innovation 1, no. 2 (2007): 93–99. http://dx.doi.org/10.1680/einn.2007.1.2.93.
Full textLamb, Anthony R. "Computer analysis: avoiding the ‘black box’ syndrome." Civil Engineering Innovation 1, no. 2 (2007): 93–99. http://dx.doi.org/10.1680/jciei.2007.13258.
Full textBirkmeyer, John D., and Jean Y. Liu. "Decision analysis models: Opening the black box." Surgery 133, no. 1 (2003): 1–4. http://dx.doi.org/10.1067/msy.2003.21.
Full textRossi, Dario, Elisa Sottile, and Paolo Veglia. "Black-box analysis of Internet P2P applications." Peer-to-Peer Networking and Applications 4, no. 2 (2010): 146–64. http://dx.doi.org/10.1007/s12083-010-0072-4.
Full textHileman, L. C. "Penetrating the black box of phylogenetic analysis." Development 136, no. 24 (2009): 4067–68. http://dx.doi.org/10.1242/dev.038182.
Full textNellaivadivelu, Guruswamy, Fabio Di Troia, and Mark Stamp. "Black box analysis of android malware detectors." Array 6 (July 2020): 100022. http://dx.doi.org/10.1016/j.array.2020.100022.
Full textKaradas, Georgiana, and Osman M. Karatepe. "Unraveling the black box." Employee Relations 41, no. 1 (2019): 67–83. http://dx.doi.org/10.1108/er-04-2017-0084.
Full textWu, Yaqiong, Chunhong Zhang, Wenlong Wu, Weilin Li, and Lianfei Lyu. "Genome-wide identification and analysis of the MADS-box gene family and its potential role in fruit ripening in black raspberry (Rubus occidentalis L.)." Journal of Berry Research 11, no. 2 (2021): 301–15. http://dx.doi.org/10.3233/jbr-200679.
Full textAkshaya, S., V. Panicker Allan, Johnson Joel, Asok Karthik, and Ravi Chinnu. "Black Box for Cars." Research and Applications of Web Development and Design 7, no. 2 (2024): 39–44. https://doi.org/10.5281/zenodo.12066354.
Full textSchiller, Devon. "The Black Box Grimaces Back." Grimace, Vol. 2, no. 1 (2017): 72–81. http://dx.doi.org/10.47659/m2.072..art.
Full textSchiller, Devon. "The Black Box Grimaces Back." Grimace, Vol. 2, no. 1 (2017): 72–81. http://dx.doi.org/10.47659/m2.072.art.
Full textLarson, Jeffrey, Matt Menickelly, and Stefan M. Wild. "Derivative-free optimization methods." Acta Numerica 28 (May 1, 2019): 287–404. http://dx.doi.org/10.1017/s0962492919000060.
Full textChen, Jie, JunWei Su, and JingYin Li. "Self-Coupling Black Box Model of a Dynamic System Based on ANN and Its Application." Mathematical Problems in Engineering 2020 (March 27, 2020): 1–12. http://dx.doi.org/10.1155/2020/5724831.
Full textChitic, Raluca, Ali Osman Topal, and Franck Leprévost. "Empirical Perturbation Analysis of Two Adversarial Attacks: Black Box versus White Box." Applied Sciences 12, no. 14 (2022): 7339. http://dx.doi.org/10.3390/app12147339.
Full textHartono, Firman Dwi, and Yuni Sugiarti. "PERBANDINGAN METODE EQUIVALENCE PARTITIONS DAN BOUNDARY VALUE ANALYSIS PADA PENGUJIAN BLACK BOX Literatur Review." Majalah Ilmiah METHODA 12, no. 2 (2022): 153–59. http://dx.doi.org/10.46880/methoda.vol12no2.pp153-159.
Full textKoga, Kazuki, and Kazuhiro Takemoto. "Simple Black-Box Universal Adversarial Attacks on Deep Neural Networks for Medical Image Classification." Algorithms 15, no. 5 (2022): 144. http://dx.doi.org/10.3390/a15050144.
Full textJuhász, László, and Irén Juhász Junger. "Spectral Analysis and Parameter Identification of Textile-Based Dye-Sensitized Solar Cells." Materials 11, no. 9 (2018): 1623. http://dx.doi.org/10.3390/ma11091623.
Full textBilles, Marina, Anders Møller, and Michael Pradel. "Systematic black-box analysis of collaborative web applications." ACM SIGPLAN Notices 52, no. 6 (2017): 171–84. http://dx.doi.org/10.1145/3140587.3062364.
Full textSchroeder, Patrick J., and Bogdan Korel. "Black-box test reduction using input-output analysis." ACM SIGSOFT Software Engineering Notes 25, no. 5 (2000): 173–77. http://dx.doi.org/10.1145/347636.349042.
Full textChen, Kai, DengGuo Feng, PuRui Su, and YingJun Zhang. "Black-box testing based on colorful taint analysis." Science China Information Sciences 55, no. 1 (2011): 171–83. http://dx.doi.org/10.1007/s11432-011-4291-y.
Full textDoerr, Benjamin, Carola Doerr, and Jing Yang. "Optimal parameter choices via precise black-box analysis." Theoretical Computer Science 801 (January 2020): 1–34. http://dx.doi.org/10.1016/j.tcs.2019.06.014.
Full textBanerjee, Ipsita, Siladitya Pal, and Spandan Maiti. "Computationally efficient black-box modeling for feasibility analysis." Computers & Chemical Engineering 34, no. 9 (2010): 1515–21. http://dx.doi.org/10.1016/j.compchemeng.2010.02.016.
Full textVogt, Nina. "Unraveling the black box in neural signal analysis." Nature Methods 22, no. 5 (2025): 894. https://doi.org/10.1038/s41592-025-02715-1.
Full textMartynenko, S. I. "Robust Multigrid Technique for Black Box Software." Computational Methods in Applied Mathematics 6, no. 4 (2006): 413–35. http://dx.doi.org/10.2478/cmam-2006-0026.
Full textPramudita, Rully. "Pengujian Black Box pada Aplikasi Ecampus Menggunakan Metode Equivalence Partitioning." INFORMATICS FOR EDUCATORS AND PROFESSIONAL : Journal of Informatics 4, no. 2 (2020): 193. http://dx.doi.org/10.51211/itbi.v4i2.1347.
Full textPham, Cong, Trung-Nguyen Hoang, Cao-Truong Tran, and Viet-Binh Do. "GanTextKnockoff: stealing text sentiment analysis model functionality using synthetic data." Journal of Military Science and Technology, CSCE8 (December 30, 2024): 76–86. https://doi.org/10.54939/1859-1043.j.mst.csce8.2024.76-86.
Full textPintelas, Emmanuel, Ioannis E. Livieris, and Panagiotis Pintelas. "A Grey-Box Ensemble Model Exploiting Black-Box Accuracy and White-Box Intrinsic Interpretability." Algorithms 13, no. 1 (2020): 17. http://dx.doi.org/10.3390/a13010017.
Full textPetrick, Elizabeth R. "Building the Black Box: Cyberneticians and Complex Systems." Science, Technology, & Human Values 45, no. 4 (2019): 575–95. http://dx.doi.org/10.1177/0162243919881212.
Full textPasaribu, Johni Setiady. "Perbandingan Pengujian Boundary Value Analysis, Equivalence Partitioning dan Error Guessy (Studi Kasus Indeks Nilai)." Jurnal ICT : Information Communication & Technology 20, no. 2 (2021): 210–17. http://dx.doi.org/10.36054/jict-ikmi.v20i2.388.
Full textDobslaw, Felix, Robert Feldt, and Francisco Gomes de Oliveira Neto. "Automated black-box boundary value detection." PeerJ Computer Science 9 (November 7, 2023): e1625. http://dx.doi.org/10.7717/peerj-cs.1625.
Full textMansour, Nizar, Emna Gara, and Chiha Gaha. "Getting inside the black box." Personnel Review 43, no. 4 (2014): 490–514. http://dx.doi.org/10.1108/pr-03-2013-0052.
Full textGerber, B. S., T. G. Tape, R. S. Wigton, and P. S. Heckerling. "Entering the Black Box of Neural Networks." Methods of Information in Medicine 42, no. 03 (2003): 287–96. http://dx.doi.org/10.1055/s-0038-1634363.
Full textHu, Ran, Nan Ma, Bing Li, et al. "Black-Box Modelling of Active Distribution Network Devices Based on Neural ODEs." Journal of Physics: Conference Series 2826, no. 1 (2024): 012029. http://dx.doi.org/10.1088/1742-6596/2826/1/012029.
Full textMani, Vaidyanath, and Robert E. Hartwig. "Duality and Black Box Interpolation I: The One Variable Nonderogatory Case." SIAM Journal on Matrix Analysis and Applications 16, no. 1 (1995): 21–28. http://dx.doi.org/10.1137/s0895479892234922.
Full textKoshy, Roshan, and Vineetha V. Nair. "Black Box for Accident Analysis Using MATLAB-Image Processing." International Journal of Computer Applications Technology and Research 6, no. 5 (2017): 229–33. http://dx.doi.org/10.7753/ijcatr0605.1003.
Full textSiordia, O. S., I. M. de Diego, C. Conde, and E. Cabello. "Wireless In-Vehicle Compliant Black Box: For Accident Analysis." IEEE Vehicular Technology Magazine 7, no. 3 (2012): 80–89. http://dx.doi.org/10.1109/mvt.2012.2203692.
Full textTakefuji, Yoshiyasu. "Black box analysis with linear regression on global warming." Hygiene and Environmental Health Advances 12 (December 2024): 100109. http://dx.doi.org/10.1016/j.heha.2024.100109.
Full textCarabantes, Manuel. "Black-box artificial intelligence: an epistemological and critical analysis." AI & SOCIETY 35, no. 2 (2019): 309–17. http://dx.doi.org/10.1007/s00146-019-00888-w.
Full textLim, Eldin Wee Chuan, and Jin Rou New. "Black-Box Optimization by Fourier Analysis and Swarm Intelligence." JOURNAL OF CHEMICAL ENGINEERING OF JAPAN 45, no. 6 (2012): 417–28. http://dx.doi.org/10.1252/jcej.12we002.
Full textYang, Homer. "Intraoperative automated ST segment analysis: a reliable ‘Black Box’?" Canadian Journal of Anaesthesia 43, no. 10 (1996): 1041–51. http://dx.doi.org/10.1007/bf03011907.
Full textFiliol, Eric. "Malware Pattern Scanning Schemes Secure Against Black-box Analysis." Journal in Computer Virology 2, no. 1 (2006): 35–50. http://dx.doi.org/10.1007/s11416-006-0009-x.
Full textPriyadarshini, MS V. Nisha, D. R. Lakshmi D R Lakshmi, Sirani Sunitha, et al. "Automobile Black Box System for Accident Analysis using IOT." International Journal of Advances in Engineering and Management 7, no. 3 (2025): 572–79. https://doi.org/10.35629/5252-0703572579.
Full textZhang, Chao, and Yu Wang. "Research on the Structure of Authentication Protocol Analysis Based on MSCs/Promela." Advanced Materials Research 989-994 (July 2014): 4698–703. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4698.
Full textGreshoff, Rainer. "Relational Sociology–A Black Box Conception?" Analyse & Kritik 41, no. 1 (2019): 175–82. http://dx.doi.org/10.1515/auk-2019-410111.
Full text