Genetic algorithms for affine transformations to existential T-restrictions

Ryan E. Dougherty, Charles J. Colbourn, Erin Lanus, Stephanie Forrest

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

The subject of t-restrictions has garnered considerable interest recently as it encompasses many different types of combinatorial objects, all of which have unique and important applications. One of the most popular of these is an ingredient in the generation of covering arrays, which are used for discovering faulty interactions among software components. We focus on existential t-restrictions, which have a structure that can be exploited by genetic algorithms. In particular, recent work on such restrictions considers affine transformations while maximizing the corresponding “score” of the formed restriction. We propose to use genetic algorithms for existential t-restrictions by providing a general framework that can be applied to all such objects.

Original languageEnglish (US)
Title of host publicationGECCO 2019 Companion - Proceedings of the 2019 Genetic and Evolutionary Computation Conference Companion
PublisherAssociation for Computing Machinery, Inc
Pages1707-1708
Number of pages2
ISBN (Electronic)9781450367486
DOIs
StatePublished - Jul 13 2019
Event2019 Genetic and Evolutionary Computation Conference, GECCO 2019 - Prague, Czech Republic
Duration: Jul 13 2019Jul 17 2019

Publication series

NameGECCO 2019 Companion - Proceedings of the 2019 Genetic and Evolutionary Computation Conference Companion

Conference

Conference2019 Genetic and Evolutionary Computation Conference, GECCO 2019
Country/TerritoryCzech Republic
CityPrague
Period7/13/197/17/19

Keywords

  • Covering array
  • Covering perfect hash family
  • T-restriction

ASJC Scopus subject areas

  • Artificial Intelligence
  • Theoretical Computer Science
  • Software

Fingerprint

Dive into the research topics of 'Genetic algorithms for affine transformations to existential T-restrictions'. Together they form a unique fingerprint.

Cite this