Summary of In-Parameter-Order strategies for covering perfect hash families

Michael Wagner, Charles J. Colbourn, Dimitris E. Simos

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Generating combinatorial test sets for complex systems, where the input model contains hundreds or thousands of parameters is a very challenging task. In [1], we developed a new approach that performs this task very effectively by modifying the popular In-Parameter-Order (IPO) strategy to generate a combinatorial structure called Covering Perfect Hash Families (CPHFs), which can be seen as an efficient packing of certain families of Covering Arrays (CAs). The introduced methods not only manage to generate CAs with a large number of columns within a short amount of time, in many cases the produced CAs are smaller than the previously best known ones.

Original languageEnglish (US)
Title of host publicationProceedings - 2023 IEEE 16th International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages268-270
Number of pages3
ISBN (Electronic)9798350333350
DOIs
StatePublished - 2023
Event16th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2023 - Dublin, Ireland
Duration: Apr 16 2023Apr 20 2023

Publication series

NameProceedings - 2023 IEEE 16th International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2023

Conference

Conference16th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2023
Country/TerritoryIreland
CityDublin
Period4/16/234/20/23

Keywords

  • Algorithms
  • Covering Array
  • Covering Perfect Hash Families
  • In-Parameter-Order
  • Permutation Vector

ASJC Scopus subject areas

  • Software
  • Safety, Risk, Reliability and Quality
  • Modeling and Simulation

Fingerprint

Dive into the research topics of 'Summary of In-Parameter-Order strategies for covering perfect hash families'. Together they form a unique fingerprint.

Cite this