Partial Covering Arrays: Algorithms and Asymptotics
A covering array CA( N ; t , k , v ) is an N × k array with entries in {1,2,…, v }, for which every N × t subarray contains each t -tuple of {1,2,…, v } t among its rows. Covering arrays find application in interaction testing, including software and hardware testing, advanced materials development,...
Saved in:
| Published in | Theory of computing systems Vol. 62; no. 6; pp. 1470 - 1489 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
Springer US
01.08.2018
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1432-4350 1433-0490 |
| DOI | 10.1007/s00224-017-9782-9 |
Cover
| Abstract | A covering array CA(
N
;
t
,
k
,
v
) is an
N
×
k
array with entries in {1,2,…,
v
}, for which
every
N
×
t
subarray contains
each t
-tuple of {1,2,…,
v
}
t
among its rows. Covering arrays find application in interaction testing, including software and hardware testing, advanced materials development, and biological systems. A central question is to determine or bound CAN(
t
,
k
,
v
), the minimum number
N
of rows of a CA(
N
;
t
,
k
,
v
). The well known bound CAN(
t
,
k
,
v
) =
O
((
t
− 1)
v
t
log
k
) is not too far from being asymptotically optimal. Sensible relaxations of the covering requirement arise when (1) the set {1,2,…,
v
}
t
need only be contained among the rows of
at least
(
1
−
𝜖
)
k
t
of the
N
×
t
subarrays and (2) the rows of
every
N
×
t
subarray need only contain a (large)
subset
of {1,2,…,
v
}
t
. In this paper, using probabilistic methods, significant improvements on the covering array upper bound are established for both relaxations, and for the conjunction of the two. In each case, a randomized algorithm constructs such arrays in expected polynomial time. |
|---|---|
| AbstractList | A covering array CA(N;t, k, v) is an N × k array with entries in {1,2,…, v}, for which everyN × t subarray contains each t-tuple of {1,2,…, v}t among its rows. Covering arrays find application in interaction testing, including software and hardware testing, advanced materials development, and biological systems. A central question is to determine or bound CAN(t, k, v), the minimum number N of rows of a CA(N;t, k, v). The well known bound CAN(t, k, v) = O((t − 1)vt log k) is not too far from being asymptotically optimal. Sensible relaxations of the covering requirement arise when (1) the set {1,2,…, v}t need only be contained among the rows of at least(1−ðoe-)kt of the N × t subarrays and (2) the rows of everyN × t subarray need only contain a (large) subset of {1,2,…, v}t. In this paper, using probabilistic methods, significant improvements on the covering array upper bound are established for both relaxations, and for the conjunction of the two. In each case, a randomized algorithm constructs such arrays in expected polynomial time. A covering array CA( N ; t , k , v ) is an N × k array with entries in {1,2,…, v }, for which every N × t subarray contains each t -tuple of {1,2,…, v } t among its rows. Covering arrays find application in interaction testing, including software and hardware testing, advanced materials development, and biological systems. A central question is to determine or bound CAN( t , k , v ), the minimum number N of rows of a CA( N ; t , k , v ). The well known bound CAN( t , k , v ) = O (( t − 1) v t log k ) is not too far from being asymptotically optimal. Sensible relaxations of the covering requirement arise when (1) the set {1,2,…, v } t need only be contained among the rows of at least ( 1 − 𝜖 ) k t of the N × t subarrays and (2) the rows of every N × t subarray need only contain a (large) subset of {1,2,…, v } t . In this paper, using probabilistic methods, significant improvements on the covering array upper bound are established for both relaxations, and for the conjunction of the two. In each case, a randomized algorithm constructs such arrays in expected polynomial time. |
| Author | Sarkar, Kaushik Colbourn, Charles J. De Bonis, Annalisa Vaccaro, Ugo |
| Author_xml | – sequence: 1 givenname: Kaushik surname: Sarkar fullname: Sarkar, Kaushik email: ksarkar1@asu.edu organization: CIDSE, Arizona State University – sequence: 2 givenname: Charles J. surname: Colbourn fullname: Colbourn, Charles J. organization: CIDSE, Arizona State University – sequence: 3 givenname: Annalisa surname: De Bonis fullname: De Bonis, Annalisa organization: Dipartimento di Informatica, University of Salerno – sequence: 4 givenname: Ugo surname: Vaccaro fullname: Vaccaro, Ugo organization: Dipartimento di Informatica, University of Salerno |
| BookMark | eNp9kE1LAzEQhoNUsK3-AG8LnqOTj2423paiVSjoQc8hm83WlO1mTVKh_96uKwiCnmYO7_PO8MzQpPOdReiSwDUBEDcRgFKOgQgsRUGxPEFTwhnDwCVMvnaKOVvAGZrFuAUAVgBMEXvWITndZkv_YYPrNlkZgj7E26xsNz649LaLme7qrIyHXZ98ciaeo9NGt9FefM85er2_e1k-4PXT6nFZrrFhJE9YVBUxGnILNYeGSShA1w2BSkopcrIQRU5ZJeuamIrDggkteC4pN6ZhuRWSzdHV2NsH_763Mamt34fueFJR4EVOCKNDSowpE3yMwTbKuKST810K2rWKgBoMqdGQOhpSgyE1kOQX2Qe30-HwL0NHJvaDLRt-fvob-gT3dXhn |
| CitedBy_id | crossref_primary_10_1016_j_jss_2022_111353 crossref_primary_10_1016_j_tcs_2019_10_022 crossref_primary_10_1515_dma_2020_0025 crossref_primary_10_1002_jcd_21659 crossref_primary_10_1002_jcd_21609 crossref_primary_10_4213_dm1540 |
| Cites_doi | 10.1023/A:1007616604496 10.1145/1667053.1667060 10.1006/inco.1993.1010 10.1016/j.disc.2003.11.029 10.1007/BF00264296 10.1016/0039-9140(96)01905-4 10.1016/0097-3165(74)90062-4 10.1023/A:1008379710317 10.1109/SYSTEMS.2010.5482481 10.1007/0-387-25036-0_10 10.1016/S0022-0000(74)80044-9 10.1104/pp.010683 10.1007/BF01195325 10.1137/S0097539703428002 10.46298/dmtcs.3480 10.1504/IJSPM.2007.014717 10.1145/1985793.1985931 10.1017/S0963548300001905 10.1007/BF02018457 10.1016/0012-365X(73)90098-8 10.1002/jcd.20035 10.1016/0012-365X(75)90058-8 10.1016/0890-5401(88)90056-9 10.1109/ICSTW.2013.77 |
| ContentType | Journal Article |
| Copyright | Springer Science+Business Media New York 2017 Theory of Computing Systems is a copyright of Springer, (2017). All Rights Reserved. |
| Copyright_xml | – notice: Springer Science+Business Media New York 2017 – notice: Theory of Computing Systems is a copyright of Springer, (2017). All Rights Reserved. |
| DBID | AAYXX CITATION 3V. 7SC 7WY 7WZ 7XB 87Z 88I 8AL 8AO 8FD 8FE 8FG 8FK 8FL ABJCF ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ HCIFZ JQ2 K60 K6~ K7- L.- L6V L7M L~C L~D M0C M0N M2P M7S P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI PRINS PTHSS PYYUZ Q9U |
| DOI | 10.1007/s00224-017-9782-9 |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Science Database (Alumni Edition) Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni) Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central Advanced Technologies & Computer Science Collection ProQuest Central Essentials - QC ProQuest Central Business Premium Collection Technology Collection ProQuest One ProQuest Central Korea Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced ProQuest Engineering Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database Science Database Engineering Database ProQuest advanced technologies & aerospace journals ProQuest Advanced Technologies & Aerospace Collection Proquest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering collection ABI/INFORM Collection China ProQuest Central Basic |
| DatabaseTitle | CrossRef ProQuest Business Collection (Alumni Edition) Computer Science Database ProQuest Central Student ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts SciTech Premium Collection ProQuest Central China ABI/INFORM Complete ProQuest One Applied & Life Sciences ProQuest Central (New) Engineering Collection Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global Engineering Database ProQuest Science Journals (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest Business Collection ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ABI/INFORM Global (Corporate) ProQuest One Business Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest Pharma Collection ProQuest Central ABI/INFORM Professional Advanced ProQuest Engineering Collection ProQuest Central Korea Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Science Journals ProQuest Computing (Alumni Edition) ABI/INFORM China ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database Materials Science & Engineering Collection ProQuest One Business (Alumni) ProQuest Central (Alumni) Business Premium Collection (Alumni) |
| DatabaseTitleList | ProQuest Business Collection (Alumni Edition) |
| Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Mathematics Computer Science |
| EISSN | 1433-0490 |
| EndPage | 1489 |
| ExternalDocumentID | 10_1007_s00224_017_9782_9 |
| GrantInformation_xml | – fundername: National Science Foundation grantid: 1421058 funderid: http://dx.doi.org/10.13039/100000001 |
| GroupedDBID | --Z -59 -5G -BR -EM -Y2 -~C -~X .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 2.D 203 29Q 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3V. 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 7WY 88I 8AO 8FE 8FG 8FL 8TC 8UJ 8V8 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDBF ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJCF ABJNI ABJOX ABKCH ABKTR ABLJU ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACGOD ACHSB ACHXU ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACUHS ACZOJ ADHIR ADIMF ADINQ ADKNI ADKPE ADMLS ADPHR ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMOZ AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGWIL AGWZB AGYKE AHAVH AHBYD AHQJS AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ AKVCP ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AOCGG ARAPS ARCSS ARMRJ AXYYD AYJHY AZFZN AZQEC B-. B0M BA0 BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ BSONS CAG CCPQU COF CS3 CSCUP D0L DDRTE DL5 DNIVK DPUIP DU5 DWQXO EAD EAP EBA EBLON EBR EBS EBU ECS EDO EIOEI EJD EMK EPL ESBYG EST ESX FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ3 GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ H~9 I-F I09 IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K1G K60 K6V K6~ K7- KDC KOV L6V LAS LLZTM M0C M0N M2P M4Y M7S MA- MK~ ML~ NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM P19 P2P P62 P9O PF- PQBIZ PQBZA PQQKQ PROAC PT4 PT5 PTHSS Q2X QOK QOS R89 R9I RNI ROL RPX RSV RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TH9 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WH7 WK8 XOL YLTOR Z45 Z7X Z83 Z88 Z8R Z8W Z92 ZMTXR ~8M AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP AMVHM ATHPR AYFIA CITATION PHGZM PHGZT PQGLB PUEGO 7SC 7XB 8AL 8FD 8FK JQ2 L.- L7M L~C L~D PKEHL PQEST PQUKI PRINS Q9U |
| ID | FETCH-LOGICAL-c316t-7bb1ca06e0d40f39080adf10b999761578623b9dd1cb40537a746924ccf36e793 |
| IEDL.DBID | U2A |
| ISSN | 1432-4350 |
| IngestDate | Sat Aug 23 13:10:03 EDT 2025 Wed Oct 01 02:51:53 EDT 2025 Thu Apr 24 23:00:56 EDT 2025 Fri Feb 21 02:34:29 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 6 |
| Keywords | Combinatorial design Covering arrays Partial covering arrays Software interaction testing Orthogonal arrays |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c316t-7bb1ca06e0d40f39080adf10b999761578623b9dd1cb40537a746924ccf36e793 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2048611329 |
| PQPubID | 48907 |
| PageCount | 20 |
| ParticipantIDs | proquest_journals_2048611329 crossref_citationtrail_10_1007_s00224_017_9782_9 crossref_primary_10_1007_s00224_017_9782_9 springer_journals_10_1007_s00224_017_9782_9 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2018-08-01 |
| PublicationDateYYYYMMDD | 2018-08-01 |
| PublicationDate_xml | – month: 08 year: 2018 text: 2018-08-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | Theory of computing systems |
| PublicationTitleAbbrev | Theory Comput Syst |
| PublicationYear | 2018 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | CawseJNExperimental design for combinatorial and high throughput materials developmentGE Glob. Res. Tech. Rep.200229769781 BshoutyNHCostaAExact learning of juntas from membership queriesLect. Notes Artif. Intell.20169925115129359098606650166 HartmanARaskinLProblems and algorithms for covering arraysDiscret. Math.20042841–3149156207190510.1016/j.disc.2003.11.0291044.05029 Alon, N., Spencer, J.H.: The probabilistic method, 3rd edn. Wiley-Interscience Series in Discrete Mathematics and Optimization. John Wiley & Sons, Inc., Hoboken, NJ (2008) BryceRCChenYColbournCJBiased covering arrays for progressive ranking and composition of web servicesInt. J. Simul. Process Modell.200731/2808710.1504/IJSPM.2007.014717 Sarkar, K., Colbourn, C.J.: Two-stage algorithms for covering array construction. submitted for publication ColbournCJConditional expectation algorithms for covering arraysJ. Comb. Math. Comb. Comput.2014909711532411541310.05034 Francetić, N., Stevens, B.: Asymptotic size of covering arrays: an application of entropy compression. Journal of Combinatorial Designs, to appear SteinSKTwo combinatorial covering theoremsJ. Comb. Theory Ser. A19741639139734006210.1016/0097-3165(74)90062-40287.05002 ChateauneufMAColbournCJKreherDLCovering arrays of strength 3Des. Codes Crypt.199916235242168958510.1023/A:10083797103170938.05017 SümerOPartial covering of hypergraphsProceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’052005PA, USASociety for Industrial and Applied Mathematics572581 HartmanAGolumbicMCHartmanIBASoftware and hardware testing using combinatorial covering suitesInterdisciplinary Applications of Graph Theory, Combinatorics, and Algorithms2005Norwell, MASpringer23726610.1007/0-387-25036-0_10 Sarkar, K., Colbourn, C.J.: Upper bounds on the size of covering arrays. ArXiv e-prints (2016) GodboleAPSkipperDESunleyRAt-covering arrays: upper bounds and Poisson approximationsComb. Probab. Comput.19965105118140095710.1017/S09635483000019050865.60008 ChenBZhangJTuple density: a new metric for combinatorial test suitesProceedings of the 33rd International Conference on Software Engineering2011HI, USAICSE 2011876879 GrahamNHararyFLivingstonMStoutQSubcube fault-tolerance in hypercubesInf. Comput.19931022280314120479310.1006/inco.1993.10100785.68006 Colbourn, C.J.: Covering arrays and hash families. In: Crnkovič, D., Tonchev, V. (eds.) Information Security, Coding Theory, and Related Combinatorics, NATO Science for Peace and Security Series, pp. 99–135. IOS Press, (2011) LovászLOn the ratio of optimal integral and fractional coversDiscret. Math.197513438339038457810.1016/0012-365X(75)90058-80323.05127 Gravier, S., Ycart, B.: S-constrained random matrices. DMTCS Proc. 0(1), (2006) KatonaGOHTwo applications (for search theory and truth functions) of Sperner type theoremsPeriod. Math.19733192633527110.1007/BF020184570266.05001 MoserRATardosGA constructive proof of the general Lovász local lemmaJ. ACM2010572Art. 11, 1510.1145/1667053.16670601300.60024 Kuhn, D.R., Kacker, R., Lei, Y.: Introduction to combinatorial testing. CRC Press (2013) KleitmanDSpencerJFamilies of k-independent setsDiscret. Math.1973625526232357810.1016/0012-365X(73)90098-80269.05002 Jukna, S.: Extremal combinatorics: with applications in computer science, 1st edn. Springer Publishing Company, Incorporated, (2010) ColbournCJCombinatorial aspects of covering arraysLe Matematiche (Catania)2004581211671195.05017 BeckerBSimonHUHow robust is the n-cube?Inform. Comput.19887716217893884510.1016/0890-5401(88)90056-90647.68007 ChandraAKKouLTMarkowskyGZaksSOn sets of boolean n-vectors with all k-projections surjectiveActa Inform.198320110311172023910.1007/BF002642960519.94017 JohnsonDSApproximation algorithms for combinatorial problemsJ. Comput. Syst. Sci.1974925627844901210.1016/S0022-0000(74)80044-90296.65036 DamaschkePAdaptive versus nonadaptive attribute-efficient learningMach. Learn.200041219721510.1023/A:10076166044960965.68029 Maximoff, J.R., Trela, M.D., Kuhn, D.R., Kacker, R.: A method for analyzing system state-space coverage within a t-wise testing framework (2010) MeagherKStevensBGroup construction of covering arraysJ. Combin. Des.2005137077210360310.1002/jcd.200351057.05023 De BonisAGasieniecLVaccaroUOptimal Two-Stage algorithms for group testing problemsSIAM J. Comput.200534512531270216594610.1137/S00975397034280021079.68043 GarganoLKörnerJVaccaroUSperner capacitiesGraphs Comb.199393146121558310.1007/BF011953250771.05004 VaziraniVVApproximation algorithms2001NY, USASpringer-Verlag New York, Inc.0999.68546 Kuhn, D.R., Mendoza, I.D., Kacker, R.N., Lei, Y.: Combinatorial coverage measurement concepts and applications. In: 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp. 352–361 (2013) TongAJWuYGLiLDRoom-temperature phosphorimetry studies of some addictive drugs following dansyl chloride labellingTalanta19964391429—143610.1016/0039-9140(96)01905-4 ShashaDEKouranovAYLejayLVChouMFCoruzziGMUsing combinatorial design to study regulation by multiple input signals: A tool for parsimony in the post-genomics eraPlant Physiol.20011271590259410.1104/pp.010683 D Kleitman (9782_CR24) 1973; 6 AK Chandra (9782_CR6) 1983; 20 B Chen (9782_CR8) 2011 9782_CR22 VV Vazirani (9782_CR37) 2001 RA Moser (9782_CR30) 2010; 57 AP Godbole (9782_CR16) 1996; 5 DS Johnson (9782_CR21) 1974; 9 NH Bshouty (9782_CR4) 2016; 9925 CJ Colbourn (9782_CR9) 2004; 58 9782_CR28 AJ Tong (9782_CR36) 1996; 43 N Graham (9782_CR17) 1993; 102 9782_CR26 9782_CR25 O Sümer (9782_CR35) 2005 MA Chateauneuf (9782_CR7) 1999; 16 A De Bonis (9782_CR13) 2005; 34 L Gargano (9782_CR15) 1993; 9 K Meagher (9782_CR29) 2005; 13 GOH Katona (9782_CR23) 1973; 3 9782_CR1 P Damaschke (9782_CR12) 2000; 41 RC Bryce (9782_CR3) 2007; 3 9782_CR10 9782_CR32 JN Cawse (9782_CR5) 2002; 29 9782_CR31 CJ Colbourn (9782_CR11) 2014; 90 A Hartman (9782_CR19) 2005 9782_CR18 L Lovász (9782_CR27) 1975; 13 SK Stein (9782_CR34) 1974; 16 A Hartman (9782_CR20) 2004; 284 B Becker (9782_CR2) 1988; 77 9782_CR14 DE Shasha (9782_CR33) 2001; 127 |
| References_xml | – reference: CawseJNExperimental design for combinatorial and high throughput materials developmentGE Glob. Res. Tech. Rep.200229769781 – reference: BryceRCChenYColbournCJBiased covering arrays for progressive ranking and composition of web servicesInt. J. Simul. Process Modell.200731/2808710.1504/IJSPM.2007.014717 – reference: LovászLOn the ratio of optimal integral and fractional coversDiscret. Math.197513438339038457810.1016/0012-365X(75)90058-80323.05127 – reference: BshoutyNHCostaAExact learning of juntas from membership queriesLect. Notes Artif. Intell.20169925115129359098606650166 – reference: ColbournCJCombinatorial aspects of covering arraysLe Matematiche (Catania)2004581211671195.05017 – reference: DamaschkePAdaptive versus nonadaptive attribute-efficient learningMach. Learn.200041219721510.1023/A:10076166044960965.68029 – reference: ChenBZhangJTuple density: a new metric for combinatorial test suitesProceedings of the 33rd International Conference on Software Engineering2011HI, USAICSE 2011876879 – reference: JohnsonDSApproximation algorithms for combinatorial problemsJ. Comput. Syst. Sci.1974925627844901210.1016/S0022-0000(74)80044-90296.65036 – reference: ChateauneufMAColbournCJKreherDLCovering arrays of strength 3Des. Codes Crypt.199916235242168958510.1023/A:10083797103170938.05017 – reference: Kuhn, D.R., Kacker, R., Lei, Y.: Introduction to combinatorial testing. CRC Press (2013) – reference: TongAJWuYGLiLDRoom-temperature phosphorimetry studies of some addictive drugs following dansyl chloride labellingTalanta19964391429—143610.1016/0039-9140(96)01905-4 – reference: KatonaGOHTwo applications (for search theory and truth functions) of Sperner type theoremsPeriod. Math.19733192633527110.1007/BF020184570266.05001 – reference: SümerOPartial covering of hypergraphsProceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’052005PA, USASociety for Industrial and Applied Mathematics572581 – reference: BeckerBSimonHUHow robust is the n-cube?Inform. Comput.19887716217893884510.1016/0890-5401(88)90056-90647.68007 – reference: Sarkar, K., Colbourn, C.J.: Two-stage algorithms for covering array construction. submitted for publication – reference: Francetić, N., Stevens, B.: Asymptotic size of covering arrays: an application of entropy compression. Journal of Combinatorial Designs, to appear – reference: KleitmanDSpencerJFamilies of k-independent setsDiscret. Math.1973625526232357810.1016/0012-365X(73)90098-80269.05002 – reference: GarganoLKörnerJVaccaroUSperner capacitiesGraphs Comb.199393146121558310.1007/BF011953250771.05004 – reference: Jukna, S.: Extremal combinatorics: with applications in computer science, 1st edn. Springer Publishing Company, Incorporated, (2010) – reference: Maximoff, J.R., Trela, M.D., Kuhn, D.R., Kacker, R.: A method for analyzing system state-space coverage within a t-wise testing framework (2010) – reference: MeagherKStevensBGroup construction of covering arraysJ. Combin. Des.2005137077210360310.1002/jcd.200351057.05023 – reference: ShashaDEKouranovAYLejayLVChouMFCoruzziGMUsing combinatorial design to study regulation by multiple input signals: A tool for parsimony in the post-genomics eraPlant Physiol.20011271590259410.1104/pp.010683 – reference: ChandraAKKouLTMarkowskyGZaksSOn sets of boolean n-vectors with all k-projections surjectiveActa Inform.198320110311172023910.1007/BF002642960519.94017 – reference: VaziraniVVApproximation algorithms2001NY, USASpringer-Verlag New York, Inc.0999.68546 – reference: Gravier, S., Ycart, B.: S-constrained random matrices. DMTCS Proc. 0(1), (2006) – reference: GrahamNHararyFLivingstonMStoutQSubcube fault-tolerance in hypercubesInf. Comput.19931022280314120479310.1006/inco.1993.10100785.68006 – reference: GodboleAPSkipperDESunleyRAt-covering arrays: upper bounds and Poisson approximationsComb. Probab. Comput.19965105118140095710.1017/S09635483000019050865.60008 – reference: Kuhn, D.R., Mendoza, I.D., Kacker, R.N., Lei, Y.: Combinatorial coverage measurement concepts and applications. In: 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp. 352–361 (2013) – reference: HartmanAGolumbicMCHartmanIBASoftware and hardware testing using combinatorial covering suitesInterdisciplinary Applications of Graph Theory, Combinatorics, and Algorithms2005Norwell, MASpringer23726610.1007/0-387-25036-0_10 – reference: De BonisAGasieniecLVaccaroUOptimal Two-Stage algorithms for group testing problemsSIAM J. Comput.200534512531270216594610.1137/S00975397034280021079.68043 – reference: Sarkar, K., Colbourn, C.J.: Upper bounds on the size of covering arrays. ArXiv e-prints (2016) – reference: ColbournCJConditional expectation algorithms for covering arraysJ. Comb. Math. Comb. Comput.2014909711532411541310.05034 – reference: Alon, N., Spencer, J.H.: The probabilistic method, 3rd edn. Wiley-Interscience Series in Discrete Mathematics and Optimization. John Wiley & Sons, Inc., Hoboken, NJ (2008) – reference: MoserRATardosGA constructive proof of the general Lovász local lemmaJ. ACM2010572Art. 11, 1510.1145/1667053.16670601300.60024 – reference: SteinSKTwo combinatorial covering theoremsJ. Comb. Theory Ser. A19741639139734006210.1016/0097-3165(74)90062-40287.05002 – reference: Colbourn, C.J.: Covering arrays and hash families. In: Crnkovič, D., Tonchev, V. (eds.) Information Security, Coding Theory, and Related Combinatorics, NATO Science for Peace and Security Series, pp. 99–135. IOS Press, (2011) – reference: HartmanARaskinLProblems and algorithms for covering arraysDiscret. Math.20042841–3149156207190510.1016/j.disc.2003.11.0291044.05029 – volume: 41 start-page: 197 issue: 2 year: 2000 ident: 9782_CR12 publication-title: Mach. Learn. doi: 10.1023/A:1007616604496 – volume: 57 start-page: Art. 11, 15 issue: 2 year: 2010 ident: 9782_CR30 publication-title: J. ACM doi: 10.1145/1667053.1667060 – volume: 102 start-page: 280 issue: 2 year: 1993 ident: 9782_CR17 publication-title: Inf. Comput. doi: 10.1006/inco.1993.1010 – volume: 284 start-page: 149 issue: 1–3 year: 2004 ident: 9782_CR20 publication-title: Discret. Math. doi: 10.1016/j.disc.2003.11.029 – volume: 20 start-page: 103 issue: 1 year: 1983 ident: 9782_CR6 publication-title: Acta Inform. doi: 10.1007/BF00264296 – ident: 9782_CR22 – ident: 9782_CR32 – volume: 43 start-page: 1429—1436 issue: 9 year: 1996 ident: 9782_CR36 publication-title: Talanta doi: 10.1016/0039-9140(96)01905-4 – volume: 16 start-page: 391 year: 1974 ident: 9782_CR34 publication-title: J. Comb. Theory Ser. A doi: 10.1016/0097-3165(74)90062-4 – volume: 16 start-page: 235 year: 1999 ident: 9782_CR7 publication-title: Des. Codes Crypt. doi: 10.1023/A:1008379710317 – ident: 9782_CR14 – ident: 9782_CR28 doi: 10.1109/SYSTEMS.2010.5482481 – start-page: 237 volume-title: Interdisciplinary Applications of Graph Theory, Combinatorics, and Algorithms year: 2005 ident: 9782_CR19 doi: 10.1007/0-387-25036-0_10 – volume: 90 start-page: 97 year: 2014 ident: 9782_CR11 publication-title: J. Comb. Math. Comb. Comput. – ident: 9782_CR1 – volume: 9 start-page: 256 year: 1974 ident: 9782_CR21 publication-title: J. Comput. Syst. Sci. doi: 10.1016/S0022-0000(74)80044-9 – volume: 127 start-page: 1590 year: 2001 ident: 9782_CR33 publication-title: Plant Physiol. doi: 10.1104/pp.010683 – volume: 9 start-page: 31 year: 1993 ident: 9782_CR15 publication-title: Graphs Comb. doi: 10.1007/BF01195325 – volume: 9925 start-page: 115 year: 2016 ident: 9782_CR4 publication-title: Lect. Notes Artif. Intell. – start-page: 572 volume-title: Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’05 year: 2005 ident: 9782_CR35 – volume: 34 start-page: 1253 issue: 5 year: 2005 ident: 9782_CR13 publication-title: SIAM J. Comput. doi: 10.1137/S0097539703428002 – volume: 29 start-page: 769 year: 2002 ident: 9782_CR5 publication-title: GE Glob. Res. Tech. Rep. – ident: 9782_CR18 doi: 10.46298/dmtcs.3480 – ident: 9782_CR31 – volume: 3 start-page: 80 issue: 1/2 year: 2007 ident: 9782_CR3 publication-title: Int. J. Simul. Process Modell. doi: 10.1504/IJSPM.2007.014717 – ident: 9782_CR25 – volume-title: Approximation algorithms year: 2001 ident: 9782_CR37 – ident: 9782_CR10 – start-page: 876 volume-title: Proceedings of the 33rd International Conference on Software Engineering year: 2011 ident: 9782_CR8 doi: 10.1145/1985793.1985931 – volume: 5 start-page: 105 year: 1996 ident: 9782_CR16 publication-title: Comb. Probab. Comput. doi: 10.1017/S0963548300001905 – volume: 3 start-page: 19 year: 1973 ident: 9782_CR23 publication-title: Period. Math. doi: 10.1007/BF02018457 – volume: 6 start-page: 255 year: 1973 ident: 9782_CR24 publication-title: Discret. Math. doi: 10.1016/0012-365X(73)90098-8 – volume: 58 start-page: 121 year: 2004 ident: 9782_CR9 publication-title: Le Matematiche (Catania) – volume: 13 start-page: 70 year: 2005 ident: 9782_CR29 publication-title: J. Combin. Des. doi: 10.1002/jcd.20035 – volume: 13 start-page: 383 issue: 4 year: 1975 ident: 9782_CR27 publication-title: Discret. Math. doi: 10.1016/0012-365X(75)90058-8 – volume: 77 start-page: 162 year: 1988 ident: 9782_CR2 publication-title: Inform. Comput. doi: 10.1016/0890-5401(88)90056-9 – ident: 9782_CR26 doi: 10.1109/ICSTW.2013.77 |
| SSID | ssj0003800 |
| Score | 2.1975749 |
| Snippet | A covering array CA(
N
;
t
,
k
,
v
) is an
N
×
k
array with entries in {1,2,…,
v
}, for which
every
N
×
t
subarray contains
each t
-tuple of {1,2,…,
v
}
t... A covering array CA(N;t, k, v) is an N × k array with entries in {1,2,…, v}, for which everyN × t subarray contains each t-tuple of {1,2,…, v}t among its rows.... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1470 |
| SubjectTerms | Algorithms Arrays Biological materials Computer Science Probabilistic methods Set theory Special Issue on Combinatorial Algorithms Theory of Computation Upper bounds |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT8JAEJ4gXPTgAzWiaHrwpNm4fdBuTYxBAiEmEGIk4dbso-gBCtJ64N87u7Qlmsi5nUk6OzP7TXfnG4BbjD3lyKlPPK4CognoCPNim7SYRO-ijopNI-1g6PfH3uukNanAsOiF0dcqi5xoErVaSP2P_EETzPpmLPrz8ovoqVH6dLUYocHz0QrqyVCM7UHN0cxYVai9dIejtzI3u8w0pSBI0L1CrfKckxpaUdzOiM7aWFk5JPy9U23h558TU7MR9Y7hMEeQVnuz5CdQiZM6HBXTGaw8WOtwMCgZWdNTcEfaR1Cuo-9somJUsOLr9NFqzz7wO7PPeWrxRFntdD1fZgstdQbjXve90yf5wAQiXdvPSCCELTn1Y6o8OnVDRINcTW0qEAUGCF0CLF9cESplS-FpIhceYHXseFJOXT_GSD2HarJI4guwmMsE4wFTodKIiwrD5Bb7AitGqsKwAbQwTiRzNnE91GIWlTzIxp4R2jPS9oxQ5K4UWW6oNHa93CwsHuVRlUZbH2jAfbEK28f_KrvcrewK9hEGsc21viZUs9V3fI1QIxM3uf_8AKQ4y6E priority: 102 providerName: ProQuest |
| Title | Partial Covering Arrays: Algorithms and Asymptotics |
| URI | https://link.springer.com/article/10.1007/s00224-017-9782-9 https://www.proquest.com/docview/2048611329 |
| Volume | 62 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: EBSCOhost Academic Search Ultimate customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn eissn: 1433-0490 dateEnd: 20241101 omitProxy: true ssIdentifier: ssj0003800 issn: 1432-4350 databaseCode: ABDBF dateStart: 19970101 isFulltext: true titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn providerName: EBSCOhost – providerCode: PRVEBS databaseName: EBSCOhost Mathematics Source - HOST customDbUrl: eissn: 1433-0490 dateEnd: 20241101 omitProxy: false ssIdentifier: ssj0003800 issn: 1432-4350 databaseCode: AMVHM dateStart: 19970101 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/mathematics-source providerName: EBSCOhost – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1433-0490 dateEnd: 20241101 omitProxy: false ssIdentifier: ssj0003800 issn: 1432-4350 databaseCode: ADMLS dateStart: 19970101 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 1433-0490 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0003800 issn: 1432-4350 databaseCode: AFBBN dateStart: 19670301 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1433-0490 dateEnd: 20241101 omitProxy: true ssIdentifier: ssj0003800 issn: 1432-4350 databaseCode: 8FG dateStart: 20020101 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1433-0490 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0003800 issn: 1432-4350 databaseCode: AGYKE dateStart: 19970101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1433-0490 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0003800 issn: 1432-4350 databaseCode: U2A dateStart: 19970101 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwIxEG4ELnrwgRofSPbgSdOk--56WwgL0UCIkQRPm-0DNYGFsOuBf--07K7RqImnHtqZw3Sm_SbtfIPQNcSesPjMw04ifKwI6DB1pIldysG7iCWkLqQdjrzBxLmfutOijjsrf7uXT5L6pK6K3fR1g9WpCpmPhYMaariKzQuceGKF1fFrU113AjhAlQO51VPmTyq-XkafCPPbo6i-a6JDtF-ARCPc7uoR2pFpEx2UDRiMIh6baG9Yka5mx8geKzcAua76lgmKQcE62WR3Rjh_Wa7f8tdFZiSpMMJss1jlSyV1giZR76k7wEVPBMxt08uxz5jJE-JJIhwyswMAfImYmYQB0PMBnfiQodgsEMLkzFFcLYkPCbDlcD6zPQnBeIrq6TKVZ8igNmU08akIhAJVhGmyNukxSAqJCIJzRErjxLwgDFd9K-ZxRXWs7RmDPWNlzxhEbiqR1ZYt46_FrdLicRE4Wax4hD0TUmSYvi134XP6V2UX_1p9iXYB-NDtR74Wqufrd3kF4CJnbVSjUb-NGmHU6YzU2H9-6MHY6Y3Gj23tah_UZ8dL |
| linkProvider | Springer Nature |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT8JAEJ4YPKgHH6gRnz3oRbNx-6APE2NQMaBCjIGEW-0-qgcEtDWGP-dvc3ZpSzTRG-d25jCd3fmmu_N9AIe49oTFY5c4kfCIIqAjviNNUvU5Zhe1hNSDtK222-g6t71qbw6-8lkYda0y3xP1Ri2GXP0jP1UEs66WRb8YvRGlGqVOV3MJjSiTVhDnmmIsG-y4k-NPbOGS8-Y1fu8jy7qpd64aJFMZINw23ZR4jJk8oq6kwqGxHSCEikRsUobQCXt8zGhECCwQwuTMUewnkYctpeVwHtuu9BQZE5aAecd2Amz-5i_r7YfHohbYvh6CQVCiZpOqxbkq1TSmWD6JqhLYyVkk-FkZp3D31wmtLnw3q7CcIVajNkmxNZiTgzKs5GoQRrY5lGGpVTDAJutgP6icRLsrdUcUHaOD92icnBm1_jPGNX15TYxoIIxaMn4dpUNltQHdmYRuE0qD4UBugeHbPvMjzxeBUAiPMs0cJ12GHSoVQVABmgcn5Bl7uRLR6IcF77KOZ4jxDFU8QzQ5LkxGE-qO_17ezSMeZqs4Cac5V4GT_CtMH__pbPt_Zwew0Oi07sP7ZvtuBxYRgvmTK4W7UErfP-QewpyU7We5ZMDTrNP3G2RRB1Q |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JSsRAEC1EQfTgLu7moBelsbNM0hFEBnXcxYOCt5heoodxZjQRmV_z66zqSTIo6M1zUnWovK4lXfUKYAvPnvZUFrIg1REjAjomAuOyhlCILu5pYwdpr2_Cs_vg4qHxMAKf1SwMtVVWPtE6at1V9I98jwhmQ7sWfS8r2yJuj1uHvVdGG6ToprVapzGAyKXpf2D5lh-cH-O33va81snd0RkrNwww5bthwSIpXZXy0HAd8AzLf8FTnblcYtqE9T2iGbMDGWvtKhkQ80kaYTnpBUplfmgiImJC9z8WEYs7Tam3Tuso4As7_oLpCE0lNeobVW4JTDFwMooPWMN5LP4eE4eJ7o-7WRvyWjMwVeaqTnMArlkYMZ05mK72QDilW5iDyeua-zWfB_-W0IhyR9QdiopRwVvaz_edZvsJrVg8v-RO2tFOM--_9IouSS3A_b8YbhFGO92OWQJH-EKKNBI61pTbcWk540wosTblOo6XgVfGSVTJW07rM9pJzbhs7ZmgPROyZ4IiO7VIb0Da8dfLa5XFk_L85skQbcuwW32F4eNfla38rWwTxhG0ydX5zeUqTGDuJQa9hGswWry9m3XMbwq5YYHkwON_I_cLE2UE7g |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Partial+Covering+Arrays%3A+Algorithms+and+Asymptotics&rft.jtitle=Theory+of+computing+systems&rft.au=Sarkar%2C+Kaushik&rft.au=Colbourn%2C+Charles+J.&rft.au=De+Bonis%2C+Annalisa&rft.au=Vaccaro%2C+Ugo&rft.date=2018-08-01&rft.pub=Springer+US&rft.issn=1432-4350&rft.eissn=1433-0490&rft.volume=62&rft.issue=6&rft.spage=1470&rft.epage=1489&rft_id=info:doi/10.1007%2Fs00224-017-9782-9&rft.externalDocID=10_1007_s00224_017_9782_9 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1432-4350&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1432-4350&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1432-4350&client=summon |