Works matching DE "ORACLE software"
Results: 114
Blind Spot Detection for Safe Sim-to-Real Transfer.
- Published in:
- Journal of Artificial Intelligence Research, 2020, v. 67, p. 191, doi. 10.1613/jair.1.11436
- By:
- Publication type:
- Article
Specification-driven model transformation testing.
- Published in:
- Software & Systems Modeling, 2015, v. 14, n. 2, p. 623, doi. 10.1007/s10270-013-0369-x
- By:
- Publication type:
- Article
The Oracle Problem in Software Testing: A Survey.
- Published in:
- IEEE Transactions on Software Engineering, 2015, v. 41, n. 5, p. 507, doi. 10.1109/TSE.2014.2372785
- By:
- Publication type:
- Article
How Effectively Does Metamorphic Testing Alleviate the Oracle Problem?
- Published in:
- IEEE Transactions on Software Engineering, 2014, v. 40, n. 1, p. 4, doi. 10.1109/TSE.2013.46
- By:
- Publication type:
- Article
Model-Based Test Oracle Generation for Automated Unit Testing of Agent Systems.
- Published in:
- IEEE Transactions on Software Engineering, 2013, v. 39, n. 9, p. 1230, doi. 10.1109/TSE.2013.10
- By:
- Publication type:
- Article
Weak factor automata: The failure of failure factor oracles?
- Published in:
- South African Computer Journal, 2014, v. 53, p. 1, doi. 10.18489/sacj.v53i0.199
- By:
- Publication type:
- Article
Password Authenticated Key Exchange and Protected Password Change Protocols.
- Published in:
- Symmetry (20738994), 2017, v. 9, n. 8, p. 134, doi. 10.3390/sym9080134
- By:
- Publication type:
- Article
Design and construction of system for marine geophysics data sharing based on WebGIS.
- Published in:
- Journal of Earth Science, 2012, v. 23, n. 6, p. 914, doi. 10.1007/s12583-012-0302-1
- By:
- Publication type:
- Article
Database based Operational Eddy Detection in High-Frequency Radar Surface Velocities.
- Published in:
- Bollettino di Geofisica Teorica ed Applicata, 2016, v. 57, p. 214
- By:
- Publication type:
- Article
A New Method for Evaluation of Bivariate Compound Poisson Distribution for Aggregate Claims.
- Published in:
- Gazi University Journal of Science, 2011, v. 24, n. 2, p. 241
- By:
- Publication type:
- Article
SOFTWARE COPYRIGHT'S ORACLE FROM THE CLOUD.
- Published in:
- Berkeley Technology Law Journal, 2015, v. 30, n. 1, p. 161
- By:
- Publication type:
- Article
The Role of the Tester's Knowledge in Exploratory Software Testing.
- Published in:
- IEEE Transactions on Software Engineering, 2013, v. 39, n. 5, p. 707, doi. 10.1109/TSE.2012.55
- By:
- Publication type:
- Article
Oracles for Distributed Testing.
- Published in:
- IEEE Transactions on Software Engineering, 2012, v. 38, n. 3, p. 629, doi. 10.1109/TSE.2011.45
- By:
- Publication type:
- Article
Mutation-Driven Generation of Unit Tests and Oracles.
- Published in:
- IEEE Transactions on Software Engineering, 2012, v. 38, n. 2, p. 278, doi. 10.1109/TSE.2011.93
- By:
- Publication type:
- Article
SYSTEM HELP.
- Published in:
- Financial Executive, 1997, v. 13, n. 4, p. 55
- Publication type:
- Article
Explain Plan and SQL Trace the Two Approaches for RDBMS Tuning.
- Published in:
- Database Systems Journal, 2017, v. 8, n. 1, p. 31
- By:
- Publication type:
- Article
Performance Enhancement using SQL Statement Tuning Approach.
- Published in:
- Database Systems Journal, 2017, v. 8, n. 1, p. 12
- By:
- Publication type:
- Article
An Empirical Evaluation of LIKE Operator in Oracle.
- Published in:
- BVICAM's International Journal of Information Technology, 2011, v. 3, n. 2, p. 34
- By:
- Publication type:
- Article
An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants.
- Published in:
- Computer Journal, 2015, v. 58, n. 4, p. 1021, doi. 10.1093/comjnl/bxu037
- By:
- Publication type:
- Article
A Forward-Secure Certificate-Based Signature Scheme.
- Published in:
- Computer Journal, 2015, v. 58, n. 4, p. 853, doi. 10.1093/comjnl/bxt141
- By:
- Publication type:
- Article
Efficient Identity-Based Proxy Signature in the Standard Model.
- Published in:
- Computer Journal, 2015, v. 58, n. 4, p. 792, doi. 10.1093/comjnl/bxt132
- By:
- Publication type:
- Article
The Oracle Problem When Testing from MSCs.
- Published in:
- Computer Journal, 2014, v. 57, n. 7, p. 987, doi. 10.1093/comjnl/bxt055
- By:
- Publication type:
- Article
Certificateless Signatures: New Schemes and Security Models1.
- Published in:
- Computer Journal, 2012, v. 55, n. 4, p. 457, doi. 10.1093/comjnl/bxr097
- By:
- Publication type:
- Article
On Constructing Minimal Formulae.
- Published in:
- Computer Journal, 2011, v. 54, n. 7, p. 1067, doi. 10.1093/comjnl/bxq050
- By:
- Publication type:
- Article
SKENO: Secret key encryption with non-interactive opening.
- Published in:
- Journal of Mathematical Cryptology, 2015, v. 9, n. 2, p. 63, doi. 10.1515/jmc-2014-0010
- By:
- Publication type:
- Article
OrChem.
- Published in:
- 2010
- By:
- Publication type:
- Abstract
CBIR Based Testing Oracles: An Experimental Evaluation of Similarity Functions.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2015, v. 25, n. 8, p. 1271, doi. 10.1142/S0218194015500254
- By:
- Publication type:
- Article
APC FORUM: CREATING A PLATFORM FOR INNOVATION AT LEVTION MANUFACTURING.
- Published in:
- MIS Quarterly Executive, 2010, v. 9, n. 1, p. 35
- By:
- Publication type:
- Article
On the Complexity of Constructing Pseudorandom Functions (Especially when They Don't Exist).
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 3, p. 509, doi. 10.1007/s00145-013-9161-x
- By:
- Publication type:
- Article
Tight Security for Signature Schemes Without Random Oracles.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 3, p. 641, doi. 10.1007/s00145-013-9173-6
- By:
- Publication type:
- Article
Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed?
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 1, p. 29, doi. 10.1007/s00145-013-9167-4
- By:
- Publication type:
- Article
Fully Leakage-Resilient Signatures.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 3, p. 513, doi. 10.1007/s00145-012-9136-3
- By:
- Publication type:
- Article
Compact Proofs of Retrievability.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 3, p. 442, doi. 10.1007/s00145-012-9129-2
- By:
- Publication type:
- Article
Programmable Hash Functions and Their Applications.
- Published in:
- Journal of Cryptology, 2012, v. 25, n. 3, p. 484, doi. 10.1007/s00145-011-9102-5
- By:
- Publication type:
- Article
Short Undeniable Signatures Based on Group Homomorphisms.
- Published in:
- Journal of Cryptology, 2011, v. 24, n. 3, p. 545, doi. 10.1007/s00145-010-9070-1
- By:
- Publication type:
- Article
RESEARCH ISSUES CONCERNING ALGORITHMS USED FOR OPTIMIZING THE DATA MINING PROCESS.
- Published in:
- Journal of Information Systems & Operations Management, 2011, v. 5, n. 2, p. 100
- By:
- Publication type:
- Article
INTRODUCING ORACLE APPLICATION EXPRESS.
- Published in:
- Journal of Information Systems & Operations Management, 2011, v. 5, n. 1, p. 206
- By:
- Publication type:
- Article
DATA REPORTING ON INTERNET FROM SENSORS THAT MEASURE ENVIRONMENTAL PARAMETERS.
- Published in:
- Annals of DAAAM & Proceedings, 2012, v. 23, n. 1, p. 0075
- By:
- Publication type:
- Article
Organizing Hierarchical Data in a Relational Database by "Carry-along Sort" Algorithm.
- Published in:
- International Journal of Intelligent Information Technology Application, 2009, v. 2, n. 4, p. 187
- By:
- Publication type:
- Article
SPATIAL DATABASES FOR WIND PARKS.
- Published in:
- Economic Computation & Economic Cybernetics Studies & Research, 2012, v. 46, n. 2, p. 5
- By:
- Publication type:
- Article
ANALYZING THE PERFORMANCE OF DATA LOADING AND PROCESSING IN RELATIONAL DATABASES.
- Published in:
- Economic Computation & Economic Cybernetics Studies & Research, 2010, v. 44, n. 3, p. 1
- By:
- Publication type:
- Article
Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings.
- Published in:
- Journal of Information Science & Engineering, 2011, v. 27, n. 3, p. 969
- By:
- Publication type:
- Article
A Secure ID-Based Authenticated Group Key Exchange Protocol Resistant to Insider Attacks.
- Published in:
- Journal of Information Science & Engineering, 2011, v. 27, n. 3, p. 915
- By:
- Publication type:
- Article
Best Buys.
- Published in:
- Government Technology, 2010, v. 23, n. 5, p. 26
- By:
- Publication type:
- Article
Level bundle methods for oracles with on-demand accuracy.
- Published in:
- Optimization Methods & Software, 2014, v. 29, n. 6, p. 1180, doi. 10.1080/10556788.2013.871282
- By:
- Publication type:
- Article
New forward-secure public-key encryption without random oracles.
- Published in:
- International Journal of Computer Mathematics, 2013, v. 90, n. 12, p. 2603, doi. 10.1080/00207160.2013.807915
- By:
- Publication type:
- Article
Spatial quantum search in a triangular network.
- Published in:
- Mathematical Structures in Computer Science, 2012, v. 22, n. 3, p. 521, doi. 10.1017/S0960129511000600
- By:
- Publication type:
- Article
OP129 Healthcare Utilization After Bariatric Surgery.
- Published in:
- 2019
- By:
- Publication type:
- Abstract
The oracle penalty method.
- Published in:
- Journal of Global Optimization, 2010, v. 47, n. 2, p. 293, doi. 10.1007/s10898-009-9477-0
- By:
- Publication type:
- Article
Possibilities for Unification of Hardware and Software Testing.
- Published in:
- Baltic Journal of Modern Computing, 2014, v. 2, n. 4, p. 227
- By:
- Publication type:
- Article