Partial Covering Arrays: Algorithms and Asymptotics

A covering array CA( N ; t , k , v ) is an N × k array with entries in {1,2,…, v }, for which every N × t subarray contains each t -tuple of {1,2,…, v } t among its rows. Covering arrays find application in interaction testing, including software and hardware testing, advanced materials development,...

Full description

Saved in:
Bibliographic Details
Published inTheory of computing systems Vol. 62; no. 6; pp. 1470 - 1489
Main Authors Sarkar, Kaushik, Colbourn, Charles J., De Bonis, Annalisa, Vaccaro, Ugo
Format Journal Article
LanguageEnglish
Published New York Springer US 01.08.2018
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1432-4350
1433-0490
DOI10.1007/s00224-017-9782-9

Cover

Abstract A covering array CA( N ; t , k , v ) is an N × k array with entries in {1,2,…, v }, for which every N × t subarray contains each t -tuple of {1,2,…, v } t among its rows. Covering arrays find application in interaction testing, including software and hardware testing, advanced materials development, and biological systems. A central question is to determine or bound CAN( t , k , v ), the minimum number N of rows of a CA( N ; t , k , v ). The well known bound CAN( t , k , v ) = O (( t − 1) v t log k ) is not too far from being asymptotically optimal. Sensible relaxations of the covering requirement arise when (1) the set {1,2,…, v } t need only be contained among the rows of at least ( 1 − 𝜖 ) k t of the N × t subarrays and (2) the rows of every N × t subarray need only contain a (large) subset of {1,2,…, v } t . In this paper, using probabilistic methods, significant improvements on the covering array upper bound are established for both relaxations, and for the conjunction of the two. In each case, a randomized algorithm constructs such arrays in expected polynomial time.
AbstractList A covering array CA(N;t, k, v) is an N × k array with entries in {1,2,…, v}, for which everyN × t subarray contains each t-tuple of {1,2,…, v}t among its rows. Covering arrays find application in interaction testing, including software and hardware testing, advanced materials development, and biological systems. A central question is to determine or bound CAN(t, k, v), the minimum number N of rows of a CA(N;t, k, v). The well known bound CAN(t, k, v) = O((t − 1)vt log k) is not too far from being asymptotically optimal. Sensible relaxations of the covering requirement arise when (1) the set {1,2,…, v}t need only be contained among the rows of at least(1−ðoe-)kt of the N × t subarrays and (2) the rows of everyN × t subarray need only contain a (large) subset of {1,2,…, v}t. In this paper, using probabilistic methods, significant improvements on the covering array upper bound are established for both relaxations, and for the conjunction of the two. In each case, a randomized algorithm constructs such arrays in expected polynomial time.
A covering array CA( N ; t , k , v ) is an N × k array with entries in {1,2,…, v }, for which every N × t subarray contains each t -tuple of {1,2,…, v } t among its rows. Covering arrays find application in interaction testing, including software and hardware testing, advanced materials development, and biological systems. A central question is to determine or bound CAN( t , k , v ), the minimum number N of rows of a CA( N ; t , k , v ). The well known bound CAN( t , k , v ) = O (( t − 1) v t log k ) is not too far from being asymptotically optimal. Sensible relaxations of the covering requirement arise when (1) the set {1,2,…, v } t need only be contained among the rows of at least ( 1 − 𝜖 ) k t of the N × t subarrays and (2) the rows of every N × t subarray need only contain a (large) subset of {1,2,…, v } t . In this paper, using probabilistic methods, significant improvements on the covering array upper bound are established for both relaxations, and for the conjunction of the two. In each case, a randomized algorithm constructs such arrays in expected polynomial time.
Author Sarkar, Kaushik
Colbourn, Charles J.
De Bonis, Annalisa
Vaccaro, Ugo
Author_xml – sequence: 1
  givenname: Kaushik
  surname: Sarkar
  fullname: Sarkar, Kaushik
  email: ksarkar1@asu.edu
  organization: CIDSE, Arizona State University
– sequence: 2
  givenname: Charles J.
  surname: Colbourn
  fullname: Colbourn, Charles J.
  organization: CIDSE, Arizona State University
– sequence: 3
  givenname: Annalisa
  surname: De Bonis
  fullname: De Bonis, Annalisa
  organization: Dipartimento di Informatica, University of Salerno
– sequence: 4
  givenname: Ugo
  surname: Vaccaro
  fullname: Vaccaro, Ugo
  organization: Dipartimento di Informatica, University of Salerno
BookMark eNp9kE1LAzEQhoNUsK3-AG8LnqOTj2423paiVSjoQc8hm83WlO1mTVKh_96uKwiCnmYO7_PO8MzQpPOdReiSwDUBEDcRgFKOgQgsRUGxPEFTwhnDwCVMvnaKOVvAGZrFuAUAVgBMEXvWITndZkv_YYPrNlkZgj7E26xsNz649LaLme7qrIyHXZ98ciaeo9NGt9FefM85er2_e1k-4PXT6nFZrrFhJE9YVBUxGnILNYeGSShA1w2BSkopcrIQRU5ZJeuamIrDggkteC4pN6ZhuRWSzdHV2NsH_763Mamt34fueFJR4EVOCKNDSowpE3yMwTbKuKST810K2rWKgBoMqdGQOhpSgyE1kOQX2Qe30-HwL0NHJvaDLRt-fvob-gT3dXhn
CitedBy_id crossref_primary_10_1016_j_jss_2022_111353
crossref_primary_10_1016_j_tcs_2019_10_022
crossref_primary_10_1515_dma_2020_0025
crossref_primary_10_1002_jcd_21659
crossref_primary_10_1002_jcd_21609
crossref_primary_10_4213_dm1540
Cites_doi 10.1023/A:1007616604496
10.1145/1667053.1667060
10.1006/inco.1993.1010
10.1016/j.disc.2003.11.029
10.1007/BF00264296
10.1016/0039-9140(96)01905-4
10.1016/0097-3165(74)90062-4
10.1023/A:1008379710317
10.1109/SYSTEMS.2010.5482481
10.1007/0-387-25036-0_10
10.1016/S0022-0000(74)80044-9
10.1104/pp.010683
10.1007/BF01195325
10.1137/S0097539703428002
10.46298/dmtcs.3480
10.1504/IJSPM.2007.014717
10.1145/1985793.1985931
10.1017/S0963548300001905
10.1007/BF02018457
10.1016/0012-365X(73)90098-8
10.1002/jcd.20035
10.1016/0012-365X(75)90058-8
10.1016/0890-5401(88)90056-9
10.1109/ICSTW.2013.77
ContentType Journal Article
Copyright Springer Science+Business Media New York 2017
Theory of Computing Systems is a copyright of Springer, (2017). All Rights Reserved.
Copyright_xml – notice: Springer Science+Business Media New York 2017
– notice: Theory of Computing Systems is a copyright of Springer, (2017). All Rights Reserved.
DBID AAYXX
CITATION
3V.
7SC
7WY
7WZ
7XB
87Z
88I
8AL
8AO
8FD
8FE
8FG
8FK
8FL
ABJCF
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
HCIFZ
JQ2
K60
K6~
K7-
L.-
L6V
L7M
L~C
L~D
M0C
M0N
M2P
M7S
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
PYYUZ
Q9U
DOI 10.1007/s00224-017-9782-9
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Science Database (Alumni Edition)
Computing Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni)
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials - QC
ProQuest Central
Business Premium Collection
Technology Collection
ProQuest One
ProQuest Central Korea
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
ProQuest Engineering Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
Science Database
Engineering Database
ProQuest advanced technologies & aerospace journals
ProQuest Advanced Technologies & Aerospace Collection
Proquest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering collection
ABI/INFORM Collection China
ProQuest Central Basic
DatabaseTitle CrossRef
ProQuest Business Collection (Alumni Edition)
Computer Science Database
ProQuest Central Student
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
SciTech Premium Collection
ProQuest Central China
ABI/INFORM Complete
ProQuest One Applied & Life Sciences
ProQuest Central (New)
Engineering Collection
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
Engineering Database
ProQuest Science Journals (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest Business Collection
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ABI/INFORM Global (Corporate)
ProQuest One Business
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest Pharma Collection
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest Engineering Collection
ProQuest Central Korea
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
ProQuest Computing
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Science Journals
ProQuest Computing (Alumni Edition)
ABI/INFORM China
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
Materials Science & Engineering Collection
ProQuest One Business (Alumni)
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
DatabaseTitleList ProQuest Business Collection (Alumni Edition)

Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Mathematics
Computer Science
EISSN 1433-0490
EndPage 1489
ExternalDocumentID 10_1007_s00224_017_9782_9
GrantInformation_xml – fundername: National Science Foundation
  grantid: 1421058
  funderid: http://dx.doi.org/10.13039/100000001
GroupedDBID --Z
-59
-5G
-BR
-EM
-Y2
-~C
-~X
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
2.D
203
29Q
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
3V.
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
7WY
88I
8AO
8FE
8FG
8FL
8TC
8UJ
8V8
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDBF
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJCF
ABJNI
ABJOX
ABKCH
ABKTR
ABLJU
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACGOD
ACHSB
ACHXU
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACUHS
ACZOJ
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMLS
ADPHR
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMOZ
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHQJS
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
AKVCP
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AOCGG
ARAPS
ARCSS
ARMRJ
AXYYD
AYJHY
AZFZN
AZQEC
B-.
B0M
BA0
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
BSONS
CAG
CCPQU
COF
CS3
CSCUP
D0L
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
EAD
EAP
EBA
EBLON
EBR
EBS
EBU
ECS
EDO
EIOEI
EJD
EMK
EPL
ESBYG
EST
ESX
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ3
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
H~9
I-F
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K1G
K60
K6V
K6~
K7-
KDC
KOV
L6V
LAS
LLZTM
M0C
M0N
M2P
M4Y
M7S
MA-
MK~
ML~
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
P19
P2P
P62
P9O
PF-
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
PT5
PTHSS
Q2X
QOK
QOS
R89
R9I
RNI
ROL
RPX
RSV
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TH9
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WH7
WK8
XOL
YLTOR
Z45
Z7X
Z83
Z88
Z8R
Z8W
Z92
ZMTXR
~8M
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
AMVHM
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
PUEGO
7SC
7XB
8AL
8FD
8FK
JQ2
L.-
L7M
L~C
L~D
PKEHL
PQEST
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c316t-7bb1ca06e0d40f39080adf10b999761578623b9dd1cb40537a746924ccf36e793
IEDL.DBID U2A
ISSN 1432-4350
IngestDate Sat Aug 23 13:10:03 EDT 2025
Wed Oct 01 02:51:53 EDT 2025
Thu Apr 24 23:00:56 EDT 2025
Fri Feb 21 02:34:29 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords Combinatorial design
Covering arrays
Partial covering arrays
Software interaction testing
Orthogonal arrays
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c316t-7bb1ca06e0d40f39080adf10b999761578623b9dd1cb40537a746924ccf36e793
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2048611329
PQPubID 48907
PageCount 20
ParticipantIDs proquest_journals_2048611329
crossref_citationtrail_10_1007_s00224_017_9782_9
crossref_primary_10_1007_s00224_017_9782_9
springer_journals_10_1007_s00224_017_9782_9
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2018-08-01
PublicationDateYYYYMMDD 2018-08-01
PublicationDate_xml – month: 08
  year: 2018
  text: 2018-08-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle Theory of computing systems
PublicationTitleAbbrev Theory Comput Syst
PublicationYear 2018
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References CawseJNExperimental design for combinatorial and high throughput materials developmentGE Glob. Res. Tech. Rep.200229769781
BshoutyNHCostaAExact learning of juntas from membership queriesLect. Notes Artif. Intell.20169925115129359098606650166
HartmanARaskinLProblems and algorithms for covering arraysDiscret. Math.20042841–3149156207190510.1016/j.disc.2003.11.0291044.05029
Alon, N., Spencer, J.H.: The probabilistic method, 3rd edn. Wiley-Interscience Series in Discrete Mathematics and Optimization. John Wiley & Sons, Inc., Hoboken, NJ (2008)
BryceRCChenYColbournCJBiased covering arrays for progressive ranking and composition of web servicesInt. J. Simul. Process Modell.200731/2808710.1504/IJSPM.2007.014717
Sarkar, K., Colbourn, C.J.: Two-stage algorithms for covering array construction. submitted for publication
ColbournCJConditional expectation algorithms for covering arraysJ. Comb. Math. Comb. Comput.2014909711532411541310.05034
Francetić, N., Stevens, B.: Asymptotic size of covering arrays: an application of entropy compression. Journal of Combinatorial Designs, to appear
SteinSKTwo combinatorial covering theoremsJ. Comb. Theory Ser. A19741639139734006210.1016/0097-3165(74)90062-40287.05002
ChateauneufMAColbournCJKreherDLCovering arrays of strength 3Des. Codes Crypt.199916235242168958510.1023/A:10083797103170938.05017
SümerOPartial covering of hypergraphsProceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’052005PA, USASociety for Industrial and Applied Mathematics572581
HartmanAGolumbicMCHartmanIBASoftware and hardware testing using combinatorial covering suitesInterdisciplinary Applications of Graph Theory, Combinatorics, and Algorithms2005Norwell, MASpringer23726610.1007/0-387-25036-0_10
Sarkar, K., Colbourn, C.J.: Upper bounds on the size of covering arrays. ArXiv e-prints (2016)
GodboleAPSkipperDESunleyRAt-covering arrays: upper bounds and Poisson approximationsComb. Probab. Comput.19965105118140095710.1017/S09635483000019050865.60008
ChenBZhangJTuple density: a new metric for combinatorial test suitesProceedings of the 33rd International Conference on Software Engineering2011HI, USAICSE 2011876879
GrahamNHararyFLivingstonMStoutQSubcube fault-tolerance in hypercubesInf. Comput.19931022280314120479310.1006/inco.1993.10100785.68006
Colbourn, C.J.: Covering arrays and hash families. In: Crnkovič, D., Tonchev, V. (eds.) Information Security, Coding Theory, and Related Combinatorics, NATO Science for Peace and Security Series, pp. 99–135. IOS Press, (2011)
LovászLOn the ratio of optimal integral and fractional coversDiscret. Math.197513438339038457810.1016/0012-365X(75)90058-80323.05127
Gravier, S., Ycart, B.: S-constrained random matrices. DMTCS Proc. 0(1), (2006)
KatonaGOHTwo applications (for search theory and truth functions) of Sperner type theoremsPeriod. Math.19733192633527110.1007/BF020184570266.05001
MoserRATardosGA constructive proof of the general Lovász local lemmaJ. ACM2010572Art. 11, 1510.1145/1667053.16670601300.60024
Kuhn, D.R., Kacker, R., Lei, Y.: Introduction to combinatorial testing. CRC Press (2013)
KleitmanDSpencerJFamilies of k-independent setsDiscret. Math.1973625526232357810.1016/0012-365X(73)90098-80269.05002
Jukna, S.: Extremal combinatorics: with applications in computer science, 1st edn. Springer Publishing Company, Incorporated, (2010)
ColbournCJCombinatorial aspects of covering arraysLe Matematiche (Catania)2004581211671195.05017
BeckerBSimonHUHow robust is the n-cube?Inform. Comput.19887716217893884510.1016/0890-5401(88)90056-90647.68007
ChandraAKKouLTMarkowskyGZaksSOn sets of boolean n-vectors with all k-projections surjectiveActa Inform.198320110311172023910.1007/BF002642960519.94017
JohnsonDSApproximation algorithms for combinatorial problemsJ. Comput. Syst. Sci.1974925627844901210.1016/S0022-0000(74)80044-90296.65036
DamaschkePAdaptive versus nonadaptive attribute-efficient learningMach. Learn.200041219721510.1023/A:10076166044960965.68029
Maximoff, J.R., Trela, M.D., Kuhn, D.R., Kacker, R.: A method for analyzing system state-space coverage within a t-wise testing framework (2010)
MeagherKStevensBGroup construction of covering arraysJ. Combin. Des.2005137077210360310.1002/jcd.200351057.05023
De BonisAGasieniecLVaccaroUOptimal Two-Stage algorithms for group testing problemsSIAM J. Comput.200534512531270216594610.1137/S00975397034280021079.68043
GarganoLKörnerJVaccaroUSperner capacitiesGraphs Comb.199393146121558310.1007/BF011953250771.05004
VaziraniVVApproximation algorithms2001NY, USASpringer-Verlag New York, Inc.0999.68546
Kuhn, D.R., Mendoza, I.D., Kacker, R.N., Lei, Y.: Combinatorial coverage measurement concepts and applications. In: 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp. 352–361 (2013)
TongAJWuYGLiLDRoom-temperature phosphorimetry studies of some addictive drugs following dansyl chloride labellingTalanta19964391429—143610.1016/0039-9140(96)01905-4
ShashaDEKouranovAYLejayLVChouMFCoruzziGMUsing combinatorial design to study regulation by multiple input signals: A tool for parsimony in the post-genomics eraPlant Physiol.20011271590259410.1104/pp.010683
D Kleitman (9782_CR24) 1973; 6
AK Chandra (9782_CR6) 1983; 20
B Chen (9782_CR8) 2011
9782_CR22
VV Vazirani (9782_CR37) 2001
RA Moser (9782_CR30) 2010; 57
AP Godbole (9782_CR16) 1996; 5
DS Johnson (9782_CR21) 1974; 9
NH Bshouty (9782_CR4) 2016; 9925
CJ Colbourn (9782_CR9) 2004; 58
9782_CR28
AJ Tong (9782_CR36) 1996; 43
N Graham (9782_CR17) 1993; 102
9782_CR26
9782_CR25
O Sümer (9782_CR35) 2005
MA Chateauneuf (9782_CR7) 1999; 16
A De Bonis (9782_CR13) 2005; 34
L Gargano (9782_CR15) 1993; 9
K Meagher (9782_CR29) 2005; 13
GOH Katona (9782_CR23) 1973; 3
9782_CR1
P Damaschke (9782_CR12) 2000; 41
RC Bryce (9782_CR3) 2007; 3
9782_CR10
9782_CR32
JN Cawse (9782_CR5) 2002; 29
9782_CR31
CJ Colbourn (9782_CR11) 2014; 90
A Hartman (9782_CR19) 2005
9782_CR18
L Lovász (9782_CR27) 1975; 13
SK Stein (9782_CR34) 1974; 16
A Hartman (9782_CR20) 2004; 284
B Becker (9782_CR2) 1988; 77
9782_CR14
DE Shasha (9782_CR33) 2001; 127
References_xml – reference: CawseJNExperimental design for combinatorial and high throughput materials developmentGE Glob. Res. Tech. Rep.200229769781
– reference: BryceRCChenYColbournCJBiased covering arrays for progressive ranking and composition of web servicesInt. J. Simul. Process Modell.200731/2808710.1504/IJSPM.2007.014717
– reference: LovászLOn the ratio of optimal integral and fractional coversDiscret. Math.197513438339038457810.1016/0012-365X(75)90058-80323.05127
– reference: BshoutyNHCostaAExact learning of juntas from membership queriesLect. Notes Artif. Intell.20169925115129359098606650166
– reference: ColbournCJCombinatorial aspects of covering arraysLe Matematiche (Catania)2004581211671195.05017
– reference: DamaschkePAdaptive versus nonadaptive attribute-efficient learningMach. Learn.200041219721510.1023/A:10076166044960965.68029
– reference: ChenBZhangJTuple density: a new metric for combinatorial test suitesProceedings of the 33rd International Conference on Software Engineering2011HI, USAICSE 2011876879
– reference: JohnsonDSApproximation algorithms for combinatorial problemsJ. Comput. Syst. Sci.1974925627844901210.1016/S0022-0000(74)80044-90296.65036
– reference: ChateauneufMAColbournCJKreherDLCovering arrays of strength 3Des. Codes Crypt.199916235242168958510.1023/A:10083797103170938.05017
– reference: Kuhn, D.R., Kacker, R., Lei, Y.: Introduction to combinatorial testing. CRC Press (2013)
– reference: TongAJWuYGLiLDRoom-temperature phosphorimetry studies of some addictive drugs following dansyl chloride labellingTalanta19964391429—143610.1016/0039-9140(96)01905-4
– reference: KatonaGOHTwo applications (for search theory and truth functions) of Sperner type theoremsPeriod. Math.19733192633527110.1007/BF020184570266.05001
– reference: SümerOPartial covering of hypergraphsProceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’052005PA, USASociety for Industrial and Applied Mathematics572581
– reference: BeckerBSimonHUHow robust is the n-cube?Inform. Comput.19887716217893884510.1016/0890-5401(88)90056-90647.68007
– reference: Sarkar, K., Colbourn, C.J.: Two-stage algorithms for covering array construction. submitted for publication
– reference: Francetić, N., Stevens, B.: Asymptotic size of covering arrays: an application of entropy compression. Journal of Combinatorial Designs, to appear
– reference: KleitmanDSpencerJFamilies of k-independent setsDiscret. Math.1973625526232357810.1016/0012-365X(73)90098-80269.05002
– reference: GarganoLKörnerJVaccaroUSperner capacitiesGraphs Comb.199393146121558310.1007/BF011953250771.05004
– reference: Jukna, S.: Extremal combinatorics: with applications in computer science, 1st edn. Springer Publishing Company, Incorporated, (2010)
– reference: Maximoff, J.R., Trela, M.D., Kuhn, D.R., Kacker, R.: A method for analyzing system state-space coverage within a t-wise testing framework (2010)
– reference: MeagherKStevensBGroup construction of covering arraysJ. Combin. Des.2005137077210360310.1002/jcd.200351057.05023
– reference: ShashaDEKouranovAYLejayLVChouMFCoruzziGMUsing combinatorial design to study regulation by multiple input signals: A tool for parsimony in the post-genomics eraPlant Physiol.20011271590259410.1104/pp.010683
– reference: ChandraAKKouLTMarkowskyGZaksSOn sets of boolean n-vectors with all k-projections surjectiveActa Inform.198320110311172023910.1007/BF002642960519.94017
– reference: VaziraniVVApproximation algorithms2001NY, USASpringer-Verlag New York, Inc.0999.68546
– reference: Gravier, S., Ycart, B.: S-constrained random matrices. DMTCS Proc. 0(1), (2006)
– reference: GrahamNHararyFLivingstonMStoutQSubcube fault-tolerance in hypercubesInf. Comput.19931022280314120479310.1006/inco.1993.10100785.68006
– reference: GodboleAPSkipperDESunleyRAt-covering arrays: upper bounds and Poisson approximationsComb. Probab. Comput.19965105118140095710.1017/S09635483000019050865.60008
– reference: Kuhn, D.R., Mendoza, I.D., Kacker, R.N., Lei, Y.: Combinatorial coverage measurement concepts and applications. In: 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp. 352–361 (2013)
– reference: HartmanAGolumbicMCHartmanIBASoftware and hardware testing using combinatorial covering suitesInterdisciplinary Applications of Graph Theory, Combinatorics, and Algorithms2005Norwell, MASpringer23726610.1007/0-387-25036-0_10
– reference: De BonisAGasieniecLVaccaroUOptimal Two-Stage algorithms for group testing problemsSIAM J. Comput.200534512531270216594610.1137/S00975397034280021079.68043
– reference: Sarkar, K., Colbourn, C.J.: Upper bounds on the size of covering arrays. ArXiv e-prints (2016)
– reference: ColbournCJConditional expectation algorithms for covering arraysJ. Comb. Math. Comb. Comput.2014909711532411541310.05034
– reference: Alon, N., Spencer, J.H.: The probabilistic method, 3rd edn. Wiley-Interscience Series in Discrete Mathematics and Optimization. John Wiley & Sons, Inc., Hoboken, NJ (2008)
– reference: MoserRATardosGA constructive proof of the general Lovász local lemmaJ. ACM2010572Art. 11, 1510.1145/1667053.16670601300.60024
– reference: SteinSKTwo combinatorial covering theoremsJ. Comb. Theory Ser. A19741639139734006210.1016/0097-3165(74)90062-40287.05002
– reference: Colbourn, C.J.: Covering arrays and hash families. In: Crnkovič, D., Tonchev, V. (eds.) Information Security, Coding Theory, and Related Combinatorics, NATO Science for Peace and Security Series, pp. 99–135. IOS Press, (2011)
– reference: HartmanARaskinLProblems and algorithms for covering arraysDiscret. Math.20042841–3149156207190510.1016/j.disc.2003.11.0291044.05029
– volume: 41
  start-page: 197
  issue: 2
  year: 2000
  ident: 9782_CR12
  publication-title: Mach. Learn.
  doi: 10.1023/A:1007616604496
– volume: 57
  start-page: Art. 11, 15
  issue: 2
  year: 2010
  ident: 9782_CR30
  publication-title: J. ACM
  doi: 10.1145/1667053.1667060
– volume: 102
  start-page: 280
  issue: 2
  year: 1993
  ident: 9782_CR17
  publication-title: Inf. Comput.
  doi: 10.1006/inco.1993.1010
– volume: 284
  start-page: 149
  issue: 1–3
  year: 2004
  ident: 9782_CR20
  publication-title: Discret. Math.
  doi: 10.1016/j.disc.2003.11.029
– volume: 20
  start-page: 103
  issue: 1
  year: 1983
  ident: 9782_CR6
  publication-title: Acta Inform.
  doi: 10.1007/BF00264296
– ident: 9782_CR22
– ident: 9782_CR32
– volume: 43
  start-page: 1429—1436
  issue: 9
  year: 1996
  ident: 9782_CR36
  publication-title: Talanta
  doi: 10.1016/0039-9140(96)01905-4
– volume: 16
  start-page: 391
  year: 1974
  ident: 9782_CR34
  publication-title: J. Comb. Theory Ser. A
  doi: 10.1016/0097-3165(74)90062-4
– volume: 16
  start-page: 235
  year: 1999
  ident: 9782_CR7
  publication-title: Des. Codes Crypt.
  doi: 10.1023/A:1008379710317
– ident: 9782_CR14
– ident: 9782_CR28
  doi: 10.1109/SYSTEMS.2010.5482481
– start-page: 237
  volume-title: Interdisciplinary Applications of Graph Theory, Combinatorics, and Algorithms
  year: 2005
  ident: 9782_CR19
  doi: 10.1007/0-387-25036-0_10
– volume: 90
  start-page: 97
  year: 2014
  ident: 9782_CR11
  publication-title: J. Comb. Math. Comb. Comput.
– ident: 9782_CR1
– volume: 9
  start-page: 256
  year: 1974
  ident: 9782_CR21
  publication-title: J. Comput. Syst. Sci.
  doi: 10.1016/S0022-0000(74)80044-9
– volume: 127
  start-page: 1590
  year: 2001
  ident: 9782_CR33
  publication-title: Plant Physiol.
  doi: 10.1104/pp.010683
– volume: 9
  start-page: 31
  year: 1993
  ident: 9782_CR15
  publication-title: Graphs Comb.
  doi: 10.1007/BF01195325
– volume: 9925
  start-page: 115
  year: 2016
  ident: 9782_CR4
  publication-title: Lect. Notes Artif. Intell.
– start-page: 572
  volume-title: Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’05
  year: 2005
  ident: 9782_CR35
– volume: 34
  start-page: 1253
  issue: 5
  year: 2005
  ident: 9782_CR13
  publication-title: SIAM J. Comput.
  doi: 10.1137/S0097539703428002
– volume: 29
  start-page: 769
  year: 2002
  ident: 9782_CR5
  publication-title: GE Glob. Res. Tech. Rep.
– ident: 9782_CR18
  doi: 10.46298/dmtcs.3480
– ident: 9782_CR31
– volume: 3
  start-page: 80
  issue: 1/2
  year: 2007
  ident: 9782_CR3
  publication-title: Int. J. Simul. Process Modell.
  doi: 10.1504/IJSPM.2007.014717
– ident: 9782_CR25
– volume-title: Approximation algorithms
  year: 2001
  ident: 9782_CR37
– ident: 9782_CR10
– start-page: 876
  volume-title: Proceedings of the 33rd International Conference on Software Engineering
  year: 2011
  ident: 9782_CR8
  doi: 10.1145/1985793.1985931
– volume: 5
  start-page: 105
  year: 1996
  ident: 9782_CR16
  publication-title: Comb. Probab. Comput.
  doi: 10.1017/S0963548300001905
– volume: 3
  start-page: 19
  year: 1973
  ident: 9782_CR23
  publication-title: Period. Math.
  doi: 10.1007/BF02018457
– volume: 6
  start-page: 255
  year: 1973
  ident: 9782_CR24
  publication-title: Discret. Math.
  doi: 10.1016/0012-365X(73)90098-8
– volume: 58
  start-page: 121
  year: 2004
  ident: 9782_CR9
  publication-title: Le Matematiche (Catania)
– volume: 13
  start-page: 70
  year: 2005
  ident: 9782_CR29
  publication-title: J. Combin. Des.
  doi: 10.1002/jcd.20035
– volume: 13
  start-page: 383
  issue: 4
  year: 1975
  ident: 9782_CR27
  publication-title: Discret. Math.
  doi: 10.1016/0012-365X(75)90058-8
– volume: 77
  start-page: 162
  year: 1988
  ident: 9782_CR2
  publication-title: Inform. Comput.
  doi: 10.1016/0890-5401(88)90056-9
– ident: 9782_CR26
  doi: 10.1109/ICSTW.2013.77
SSID ssj0003800
Score 2.1975749
Snippet A covering array CA( N ; t , k , v ) is an N × k array with entries in {1,2,…, v }, for which every N × t subarray contains each t -tuple of {1,2,…, v } t...
A covering array CA(N;t, k, v) is an N × k array with entries in {1,2,…, v}, for which everyN × t subarray contains each t-tuple of {1,2,…, v}t among its rows....
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1470
SubjectTerms Algorithms
Arrays
Biological materials
Computer Science
Probabilistic methods
Set theory
Special Issue on Combinatorial Algorithms
Theory of Computation
Upper bounds
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT8JAEJ4gXPTgAzWiaHrwpNm4fdBuTYxBAiEmEGIk4dbso-gBCtJ64N87u7Qlmsi5nUk6OzP7TXfnG4BbjD3lyKlPPK4CognoCPNim7SYRO-ijopNI-1g6PfH3uukNanAsOiF0dcqi5xoErVaSP2P_EETzPpmLPrz8ovoqVH6dLUYocHz0QrqyVCM7UHN0cxYVai9dIejtzI3u8w0pSBI0L1CrfKckxpaUdzOiM7aWFk5JPy9U23h558TU7MR9Y7hMEeQVnuz5CdQiZM6HBXTGaw8WOtwMCgZWdNTcEfaR1Cuo-9somJUsOLr9NFqzz7wO7PPeWrxRFntdD1fZgstdQbjXve90yf5wAQiXdvPSCCELTn1Y6o8OnVDRINcTW0qEAUGCF0CLF9cESplS-FpIhceYHXseFJOXT_GSD2HarJI4guwmMsE4wFTodKIiwrD5Bb7AitGqsKwAbQwTiRzNnE91GIWlTzIxp4R2jPS9oxQ5K4UWW6oNHa93CwsHuVRlUZbH2jAfbEK28f_KrvcrewK9hEGsc21viZUs9V3fI1QIxM3uf_8AKQ4y6E
  priority: 102
  providerName: ProQuest
Title Partial Covering Arrays: Algorithms and Asymptotics
URI https://link.springer.com/article/10.1007/s00224-017-9782-9
https://www.proquest.com/docview/2048611329
Volume 62
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: EBSCOhost Academic Search Ultimate
  customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn
  eissn: 1433-0490
  dateEnd: 20241101
  omitProxy: true
  ssIdentifier: ssj0003800
  issn: 1432-4350
  databaseCode: ABDBF
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn
  providerName: EBSCOhost
– providerCode: PRVEBS
  databaseName: EBSCOhost Mathematics Source - HOST
  customDbUrl:
  eissn: 1433-0490
  dateEnd: 20241101
  omitProxy: false
  ssIdentifier: ssj0003800
  issn: 1432-4350
  databaseCode: AMVHM
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/mathematics-source
  providerName: EBSCOhost
– providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1433-0490
  dateEnd: 20241101
  omitProxy: false
  ssIdentifier: ssj0003800
  issn: 1432-4350
  databaseCode: ADMLS
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 1433-0490
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0003800
  issn: 1432-4350
  databaseCode: AFBBN
  dateStart: 19670301
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 1433-0490
  dateEnd: 20241101
  omitProxy: true
  ssIdentifier: ssj0003800
  issn: 1432-4350
  databaseCode: 8FG
  dateStart: 20020101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 1433-0490
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0003800
  issn: 1432-4350
  databaseCode: AGYKE
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 1433-0490
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0003800
  issn: 1432-4350
  databaseCode: U2A
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwIxEG4ELnrwgRofSPbgSdOk--56WwgL0UCIkQRPm-0DNYGFsOuBf--07K7RqImnHtqZw3Sm_SbtfIPQNcSesPjMw04ifKwI6DB1pIldysG7iCWkLqQdjrzBxLmfutOijjsrf7uXT5L6pK6K3fR1g9WpCpmPhYMaariKzQuceGKF1fFrU113AjhAlQO51VPmTyq-XkafCPPbo6i-a6JDtF-ARCPc7uoR2pFpEx2UDRiMIh6baG9Yka5mx8geKzcAua76lgmKQcE62WR3Rjh_Wa7f8tdFZiSpMMJss1jlSyV1giZR76k7wEVPBMxt08uxz5jJE-JJIhwyswMAfImYmYQB0PMBnfiQodgsEMLkzFFcLYkPCbDlcD6zPQnBeIrq6TKVZ8igNmU08akIhAJVhGmyNukxSAqJCIJzRErjxLwgDFd9K-ZxRXWs7RmDPWNlzxhEbiqR1ZYt46_FrdLicRE4Wax4hD0TUmSYvi134XP6V2UX_1p9iXYB-NDtR74Wqufrd3kF4CJnbVSjUb-NGmHU6YzU2H9-6MHY6Y3Gj23tah_UZ8dL
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT8JAEJ4YPKgHH6gRnz3oRbNx-6APE2NQMaBCjIGEW-0-qgcEtDWGP-dvc3ZpSzTRG-d25jCd3fmmu_N9AIe49oTFY5c4kfCIIqAjviNNUvU5Zhe1hNSDtK222-g6t71qbw6-8lkYda0y3xP1Ri2GXP0jP1UEs66WRb8YvRGlGqVOV3MJjSiTVhDnmmIsG-y4k-NPbOGS8-Y1fu8jy7qpd64aJFMZINw23ZR4jJk8oq6kwqGxHSCEikRsUobQCXt8zGhECCwQwuTMUewnkYctpeVwHtuu9BQZE5aAecd2Amz-5i_r7YfHohbYvh6CQVCiZpOqxbkq1TSmWD6JqhLYyVkk-FkZp3D31wmtLnw3q7CcIVajNkmxNZiTgzKs5GoQRrY5lGGpVTDAJutgP6icRLsrdUcUHaOD92icnBm1_jPGNX15TYxoIIxaMn4dpUNltQHdmYRuE0qD4UBugeHbPvMjzxeBUAiPMs0cJ12GHSoVQVABmgcn5Bl7uRLR6IcF77KOZ4jxDFU8QzQ5LkxGE-qO_17ezSMeZqs4Cac5V4GT_CtMH__pbPt_Zwew0Oi07sP7ZvtuBxYRgvmTK4W7UErfP-QewpyU7We5ZMDTrNP3G2RRB1Q
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JSsRAEC1EQfTgLu7moBelsbNM0hFEBnXcxYOCt5heoodxZjQRmV_z66zqSTIo6M1zUnWovK4lXfUKYAvPnvZUFrIg1REjAjomAuOyhlCILu5pYwdpr2_Cs_vg4qHxMAKf1SwMtVVWPtE6at1V9I98jwhmQ7sWfS8r2yJuj1uHvVdGG6ToprVapzGAyKXpf2D5lh-cH-O33va81snd0RkrNwww5bthwSIpXZXy0HAd8AzLf8FTnblcYtqE9T2iGbMDGWvtKhkQ80kaYTnpBUplfmgiImJC9z8WEYs7Tam3Tuso4As7_oLpCE0lNeobVW4JTDFwMooPWMN5LP4eE4eJ7o-7WRvyWjMwVeaqTnMArlkYMZ05mK72QDilW5iDyeua-zWfB_-W0IhyR9QdiopRwVvaz_edZvsJrVg8v-RO2tFOM--_9IouSS3A_b8YbhFGO92OWQJH-EKKNBI61pTbcWk540wosTblOo6XgVfGSVTJW07rM9pJzbhs7ZmgPROyZ4IiO7VIb0Da8dfLa5XFk_L85skQbcuwW32F4eNfla38rWwTxhG0ydX5zeUqTGDuJQa9hGswWry9m3XMbwq5YYHkwON_I_cLE2UE7g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Partial+Covering+Arrays%3A+Algorithms+and+Asymptotics&rft.jtitle=Theory+of+computing+systems&rft.au=Sarkar%2C+Kaushik&rft.au=Colbourn%2C+Charles+J.&rft.au=De+Bonis%2C+Annalisa&rft.au=Vaccaro%2C+Ugo&rft.date=2018-08-01&rft.pub=Springer+US&rft.issn=1432-4350&rft.eissn=1433-0490&rft.volume=62&rft.issue=6&rft.spage=1470&rft.epage=1489&rft_id=info:doi/10.1007%2Fs00224-017-9782-9&rft.externalDocID=10_1007_s00224_017_9782_9
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1432-4350&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1432-4350&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1432-4350&client=summon