

Author: Gage Stephen
Publisher: Emerald Group Publishing Ltd
ISSN: 0368-492X
Source: Kybernetes: The International Journal of Systems & Cybernetics, Vol.36, Iss.9-10, 2007-10, pp. : 1329-1339
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




Opening the "Black Box' of Software
By Eischen Kyle
Information, Communication and Society, Vol. 6, Iss. 1, 2003-01 ,pp. :




Information gain of black-box testing
By Yang Linmin
Formal Aspects of Computing, Vol. 23, Iss. 4, 2011-07 ,pp. :