Software and hardware testing using combinatorial covering suites

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

In the 21st century our society is becoming more and more dependent on software systems. The safety of these systems and the quality of our lives is increasingly dependent on the quality of such systems. A key element in the manufacture and quality assurance process in software engineering is the testing of software and hardware systems. The construction of efficient combinatorial covering suites has important applications in the testing of hardware and software. In this paper we define the general problem, discuss the lower bounds on the size of covering suites, and give a series of constructions that achieve these bounds asymptotically. These constructions include the use of finite field theory, extremal set theory, group theory, coding theory, combinatorial recursive techniques, and other areas of computer science and mathematics. The study of these combinatorial covering suites is a fascinating example of the interplay between pure mathematics and the applied problems generated by software and hardware engineers. The wide range of mathematical techniques used, and the often unexpected applications of combinatorial covering suites make for a rewarding study.

Original languageEnglish
Title of host publicationGraph theory, combinatorics and algorithms
EditorsM.C. Golumbic, I.BA. Hartman
Place of PublicationBoston, MA
PublisherSpringer
Pages237-266
Number of pages30
Volume34
ISBN (Electronic)978-0-387-25036-6
ISBN (Print)978-0-387-24347-4
DOIs
StatePublished - 2005
Externally publishedYes

Publication series

NameOperations Research/ Computer Science Interfaces Series
PublisherSpringer Science + Business Media
ISSN (Print)1387-666X

ASJC Scopus subject areas

  • General Computer Science
  • Management Science and Operations Research

Fingerprint

Dive into the research topics of 'Software and hardware testing using combinatorial covering suites'. Together they form a unique fingerprint.

Cite this