Asymptotic and constructive methods for covering perfect hash families and covering arrays

被引:22
作者
Colbourn, Charles J. [1 ]
Lanus, Erin [1 ]
Sarkar, Kaushik [1 ]
机构
[1] Arizona State Univ, Comp Informat & Decis Syst Engn, POB 878809, Tempe, AZ 85287 USA
基金
美国国家科学基金会;
关键词
Covering array; Covering perfect hash family; Conditional expectation algorithm; Asymptotic bound; PERMUTATION VECTORS; HIGHER STRENGTH; ALGORITHM; SEQUENCES; STATE; SETS;
D O I
10.1007/s10623-017-0369-x
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Covering perfect hash families represent certain covering arrays compactly. Applying two probabilistic methods to covering perfect hash families improves upon the asymptotic upper bound for the minimum number of rows in a covering array with v symbols, k columns, and strength t. One bound can be realized by a randomized polynomial time construction algorithm using column resampling, while the other can be met by a deterministic polynomial time conditional expectation algorithm. Computational results are developed for both techniques. Further, a random extension algorithm further improves on the best known sizes for covering arrays in practice. An extensive set of computations with column resampling and random extension yields explicit constructions when for strength seven, for strength six, for strength five, and for strength four. When , almost all known explicit constructions are improved upon. For strength , restrictions on the covering perfect hash family ensure the presence of redundant rows in the covering array, which can be removed. Using restrictions and random extension, computations for and again improve upon known explicit constructions in the majority of cases. Computations for strengths three and four demonstrate that a conditional expectation algorithm can produce further improvements at the expense of a larger time and storage investment.
引用
收藏
页码:907 / 937
页数:31
相关论文
共 50 条
[41]   Covering arrays with mixed alphabet sizes [J].
Moura, L ;
Stardom, J ;
Stevens, B ;
Williams, A .
JOURNAL OF COMBINATORIAL DESIGNS, 2003, 11 (06) :413-432
[42]   A sequence approach to linear perfect hash families [J].
Barwick, Susan G. ;
Jackson, Wen-Ai .
DESIGNS CODES AND CRYPTOGRAPHY, 2007, 45 (01) :95-121
[43]   A sequence approach to linear perfect hash families [J].
Susan G. Barwick ;
Wen-Ai Jackson .
Designs, Codes and Cryptography, 2007, 45 :95-121
[44]   New bounds for binary covering arrays using simulated annealing [J].
Torres-Jimenez, Jose ;
Rodriguez-Tello, Eduardo .
INFORMATION SCIENCES, 2012, 185 (01) :137-152
[45]   Constructions of new orthogonal arrays and covering arrays of strength three [J].
Ji, Lijun ;
Yin, Jianxing .
JOURNAL OF COMBINATORIAL THEORY SERIES A, 2010, 117 (03) :236-247
[46]   On the state of strength-three covering arrays [J].
Chateauneuf, M ;
Kreher, DL .
JOURNAL OF COMBINATORIAL DESIGNS, 2002, 10 (04) :217-238
[47]   Improving two recursive constructions for covering arrays [J].
Colbourn C.J. ;
Zhou J. .
Journal of Statistical Theory and Practice, 2012, 6 (1) :30-47
[48]   Supercomputing and grid computing on the verification of covering arrays [J].
Himer Avila-George ;
Jose Torres-Jimenez ;
Nelson Rangel-Valdez ;
Abel Carrión ;
Vicente Hernández .
The Journal of Supercomputing, 2012, 62 :916-945
[49]   Supercomputing and grid computing on the verification of covering arrays [J].
Avila-George, Himer ;
Torres-Jimenez, Jose ;
Rangel-Valdez, Nelson ;
Carrion, Abel ;
Hernandez, Vicente .
JOURNAL OF SUPERCOMPUTING, 2012, 62 (02) :916-945
[50]   Cover starters for covering arrays of strength two [J].
Lobb, Jason R. ;
Colbourn, Charles J. ;
Danziger, Peter ;
Stevens, Brett ;
Torres-Jimenez, Jose .
DISCRETE MATHEMATICS, 2012, 312 (05) :943-956