Combinatorial test list generation based on Harmony Search Algorithm

ARA Alsewari, R Poston, KZ Zamli, M Balfaqih… - Journal of Ambient …, 2022 - Springer
Combinatorial test case generation faces a problem on how to reduce the test cases by
uncover the unnecessary test cases. So, there is a need for expert applications or strategies …

[PDF][PDF] T-way strategies and its applications for combinatorial testing

RR Othman, KZ Zamli - … Journal of New Computer Architectures and …, 2011 - academia.edu
The demand for multi-functional software has grown drastically over the years. To cater for
this demand, software engineers are forced to develop complex software with increasing …

Privacy Preserving Decision Tree Training and Prediction via Fully Homomorphic Encryption with No Decryption

H Lee, C Clark - arXiv preprint arXiv:2310.13140, 2023 - arxiv.org
With data-outsourcing becoming commonplace, there grows a need for secure outsourcing
of data and machine learning models. Namely, data and model owners (client) often have a …

SAT-based techniques in system synthesis

C Haubelt, R Feldmann - 2003 Design, Automation and Test in …, 2003 - ieeexplore.ieee.org
SAT-based verification of electronic systems has become very popular in recent years. In
this paper, we show that SAT-techniques are also applicable and helpful during the …

On sequence based interaction testing

KZ Zamli, RR Othman… - 2011 IEEE Symposium on …, 2011 - ieeexplore.ieee.org
T-way strategies aim to generate effective test data for detecting fault due to interaction.
Different levels of interaction possibilities have been considered as part of existing t-way …

Interaction testing: from pairwise to variable strength interaction

KZ Zamli, MI Younis - 2010 Fourth Asia International …, 2010 - ieeexplore.ieee.org
Although desirable as an important activity for quality assurances and enhancing reliability,
complete and exhaustive software testing is prohibitively impossible due to resources as …

Practical adoptions of T-way strategies for interaction testing

KZ Zamli, RR Othman, MI Younis… - … and Computer Systems …, 2011 - Springer
This paper discusses the practical adoption of t-way strategies (also termed interaction
testing) for interaction testing. Unlike earlier work, this paper also highlights and unifies the …

Blind Evaluation Framework for Fully Homomorphic Encryption and Privacy-Preserving Machine Learning

H Lee - 2024 - scholar.smu.edu
Various approaches to privacy-preserving machine learning (PPML) using Fully
Homomorphic Encryption (FHE) have been developed, focusing on secure data outsourcing …

Effectiveness of the cumulative vs. normal mode of operation for combinatorial testing

MI Younis, KZ Zamli, RR Othman - 2010 IEEE Symposium on …, 2010 - ieeexplore.ieee.org
This paper discusses the state of the art of applying combinatorial interaction testing (CIT) in
conjunction with mutation testing for hardware testing. In addition, the paper discusses the …

[PDF][PDF] Adopting systematic quality signing and verification processes for sequential hardware testing

MI Younis, KZ Zamli, NAM Isa - Invent Impact Struct Des, 2012 - portal.arid.my
Combinatorial interaction testing (CIT) has been an active research area in the recent years.
CIT [1-7] is based on generating subset of exhaustive set according to the degree of …