251:
391:
53:
302:
Höök, Kristina; Karlgren, Jussi; Waern, Annika; Dahlbäck, Nils; Jansson, Carl Gustaf; Karlgren, Klas; Lemaire, Benoît (1998). "A glass box approach to adaptive hypermedia".
432:
366:
du Boulay, Benedict; O'Shea, Tim; Monk, John (1981). "The black box inside the glass box: presenting computing concepts to novices".
244:
The notion of a "Black Box in a Glass Box" was originally used as a metaphor for teaching complex topics to computing novices.
19:"Open box" redirects here. "Open box" is also the name of the visible symbol ␣ that is sometimes used to indicate a space. See
317:
Karlgren, Jussi; Höök, Kristina; Lantz, Ann; Palme, Jacob; Pärgman, Daniel (1994). "The glass box user model for filtering".
233:; for example, if a programmer can examine source code, weaknesses in an algorithm are much easier to discover. That makes
456:
223:
177:
241:
but considerably more difficult from the sophistication needed on the part of the tester to understand the subsystem.
288:
Patrick J. Driscoll, "Systems
Thinking," in Gregory S. Parnell, Patrick J. Driscoll, and Dale L. Henderson (eds.),
425:
229:
Having access to the subsystem internals in general makes the subsystem easier to understand, but also easier to
35:
145:
406:
418:
219:
451:
351:
Höök, Kristina; Karlgren, Jussi; Waern, Annika (1995). "A glass box intelligent help interface".
230:
170:
98:
31:
122:
398:
215:
153:
134:
20:
250:
8:
211:
149:
106:
163:
238:
234:
114:
81:
27:
269:
118:
402:
141:
69:
445:
210:
whose internals can be viewed but usually not altered. The term is used in
102:
85:
264:
207:
65:
44:
52:
390:
332:
Raj, Arun (2020). "Explainable AI: From black box to glass box".
222:
design, where it is closely related to recent interest in
301:
365:
316:
290:
Decision Making in
Systems Engineering and Management
16:
System whose internals can be viewed but not altered
353:
First
Workshop on Intelligent Multimodal Interfaces
350:
443:
319:Fourth international conference on User Modeling
426:
171:
368:International Journal of Man-Machine Studies
334:Journal of the Academy of Marketing Science
433:
419:
178:
164:
292:, 2nd. ed., Hoboken, NJ: Wiley, 2011, 40.
249:
254:Mathematical models for complex systems
444:
385:
331:
224:explainable artificial intelligence
13:
14:
468:
304:Adaptive hypertext and hypermedia
389:
51:
359:
344:
325:
310:
295:
282:
1:
275:
36:White box (computer hardware)
405:. You can help Knowledge by
7:
258:
10:
473:
457:Software engineering stubs
384:
220:intelligent user interface
25:
18:
237:much more effective than
159:
133:
128:
97:
92:
80:
75:
64:
59:
50:
43:
26:Not to be confused with
401:-related article is a
255:
76:Methods and techniques
32:White-box cryptography
253:
154:Thermodynamic systems
123:System identification
399:software-engineering
216:software engineering
21:whitespace character
212:systems engineering
150:Operations research
107:Pattern recognition
256:
93:Related techniques
414:
413:
239:black-box testing
235:white-box testing
188:
187:
115:White-box testing
82:Black-box testing
45:Black box systems
28:White-box testing
464:
452:Software testing
435:
428:
421:
393:
386:
376:
375:
363:
357:
356:
348:
342:
341:
329:
323:
322:
314:
308:
307:
299:
293:
286:
270:Gray-box testing
180:
173:
166:
119:Gray-box testing
55:
41:
40:
472:
471:
467:
466:
465:
463:
462:
461:
442:
441:
440:
439:
382:
380:
379:
364:
360:
349:
345:
330:
326:
315:
311:
300:
296:
287:
283:
278:
261:
247:
184:
142:Control systems
88:
39:
24:
17:
12:
11:
5:
470:
460:
459:
454:
438:
437:
430:
423:
415:
412:
411:
394:
378:
377:
358:
343:
324:
309:
294:
280:
279:
277:
274:
273:
272:
267:
260:
257:
186:
185:
183:
182:
175:
168:
160:
157:
156:
131:
130:
126:
125:
95:
94:
90:
89:
78:
77:
73:
72:
70:Oracle machine
62:
61:
57:
56:
48:
47:
15:
9:
6:
4:
3:
2:
469:
458:
455:
453:
450:
449:
447:
436:
431:
429:
424:
422:
417:
416:
410:
408:
404:
400:
395:
392:
388:
387:
383:
374:(3): 237-249.
373:
369:
362:
354:
347:
340:(1): 137-141.
339:
335:
328:
320:
313:
305:
298:
291:
285:
281:
271:
268:
266:
263:
262:
252:
248:
245:
242:
240:
236:
232:
227:
225:
221:
217:
213:
209:
205:
201:
197:
193:
181:
176:
174:
169:
167:
162:
161:
158:
155:
151:
147:
143:
139:
137:
132:
127:
124:
120:
116:
112:
108:
104:
100:
96:
91:
87:
83:
79:
74:
71:
67:
63:
58:
54:
49:
46:
42:
37:
33:
29:
22:
407:expanding it
396:
381:
371:
367:
361:
352:
346:
337:
333:
327:
318:
312:
303:
297:
289:
284:
246:
243:
228:
203:
199:
195:
191:
189:
146:Open systems
135:
129:Fundamentals
110:
99:Feed forward
138:information
103:Obfuscation
86:Blackboxing
446:Categories
306:: 143-170.
276:References
265:Black box
218:, and in
208:subsystem
200:clear box
196:glass box
192:white box
111:White box
66:Black box
259:See also
204:open box
136:A priori
206:) is a
60:System
397:This
202:, or
34:, or
403:stub
231:hack
194:(or
448::
372:14
370:.
338:48
336:.
226:.
214:,
198:,
190:A
152:,
148:,
144:,
140:,
121:,
117:,
113:,
109:,
105:,
101:,
84:,
68:,
30:,
434:e
427:t
420:v
409:.
355:.
321:.
179:e
172:t
165:v
38:.
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.