Covering arrays from cyclotomy

نویسنده

  • Charles J. Colbourn
چکیده

For a prime power q ≡ 1 (mod v), the q × q cyclotomic matrix, whose entries are the discrete logarithmsmodulo v of the entries in the addition table of Fq , has been shown using character theoretic arguments to produce an ε-biased array, provided that q is large enough as a function of v and ε. A suitable choice of ε ensures that the array is a covering array of strength t when q > t2v4t . On the other hand, when v = 2, using a different character-theoretic argument the matrix has been shown to be a covering array of strength t when q > t222t−2. The restrictions on ε-biased arrays are more severe than on covering arrays. This is exploited to prove that for all v ≥ 2, the matrix is a covering array of strength t whenever q > t2v2t , again using character theory. A number of constructions of covering arrays arise by developing and extending the cyclotomic matrix. For each construction, extensive computations for various choices of t and v are reported that determine the precise set of small primes for which the construction produces a covering array. As a consequence, many covering arrays are found when q is smaller than the bound t2v2t , and consequences for the existence of covering arrays reported.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Profiles of covering arrays of strength two

Covering arrays of strength two have been widely studied as combinatorial models of software interaction test suites for pairwise testing. While numerous algorithmic techniques have been developed for the generation of covering arrays with few columns (factors), the construction of covering arrays with many factors and few tests by these techniques is problematic. Random generation techniques c...

متن کامل

Using the Particle Swarm Optimization Algorithm to Generate the Minimum Test Suite in Covering Array with Uniform Strength

Up to now, several useful algorithms have been proposed to generate covering array, which is one of the branches of combinatorial testing. The main challenge in generating such arrays is generation of the arrays with a minimum number of test cases (for efficiency) at a proper time (for performance), for large systems. Covering array generation strategies are often divided into two general categ...

متن کامل

New Generalized Cyclotomy and Its Applications

In this paper we first introduce a new generalized cyclotomy of order 2 with respect to pe1 1 2pet t , then we calculate the new cyclotomic numbers of order 2. Some applications of the new cyclotomy in sequences, cryptography, and coding theory are also discussed. In the last section of this paper, we introduce more generalized cyclotomies and point out their applications. The major motivation ...

متن کامل

Complete Weight Enumerator of a Family of Linear Codes from Cyclotomy

Linear codes have been an interesting topic in both theory and practice for many years. In this paper, for a prime p, we determine the explicit complete weight enumerators of a family of linear codes over Fp with defining set related to cyclotomy. These codes may have applications in cryptography and secret sharing schemes. Index Terms Linear code, complete weight enumerator, cyclotomy, Gaussia...

متن کامل

Strength two covering arrays: Existence tables and projection

A covering array CA(N; t, k, v) is an N × k array such that every N × t sub-array contains all t-tuples from v symbols at least once, where t is the strength of the array. Covering arrays are used in experiments to screen for interactions among t-subsets of k components. Strength two covering arrays have been studied from numerous viewpoints, resulting in a variety of computational, direct, and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Des. Codes Cryptography

دوره 55  شماره 

صفحات  -

تاریخ انتشار 2010