Processing math: 100%
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    MULTI-TERMINAL NETWORK CONNECTEDNESS ON SERIES-PARALLEL NETWORKS

    Network operation may require that a specified number k of nodes be able to communicate via paths consisting of operating edges and nodes. In an environment of node and edge failure, this leads to associated reliability measures. When the k nodes are known in advance, this has been widely studied as k-terminal reliability; when the k nodes are chosen uniformly at random, this has been studied as k-resilience. A third notion, when it suffices to have anyk nodes communicate, is related to the expected size of the largest component in the network. We generalize these three measures to the probability that given h nodes chosen in advance and i nodes chosen at random, they appear in a component of size at least k = h + i + j. As expected, for general networks, for most choices of (h, i, j) the computation is #P-complete and hence unlikely to admit a polynomial time algorithm. We develop polynomial time algorithms in the special case that the network is series-parallel, which subsume and generalize earlier methods for k-terminal reliability and k-resilience.

  • articleNo Access

    Covering arrays, augmentation, and quilting arrays

    Numerous constructions of the best known covering arrays are effective only for specific numbers of symbols. Fusion replaces numerous symbols by one, and can thereby employ such constructions to produce useful covering arrays on fewer symbols. Augmentation instead replaces one symbol by many, permitting the construction of covering arrays from those with fewer symbols. Until this time, augmentation has been of limited value because it introduces substantial redundant coverage. Here a general augmentation method is improved upon by analyzing the classes of interactions to be covered and employing variants of covering arrays, quilting arrays, to reduce the redundancy introduced. For strengths four, five, and six, quilting arrays are produced that can be used in the refined augmentation to produce many best known covering arrays.

  • articleNo Access

    Mixed covering arrays on graphs of small treewidth

    Covering arrays are combinatorial objects that have been successfully applied in design of test suites for testing systems such as software, hardware, and networks where failures can be caused by the interaction between their parameters. Let n and k be positive integers with k3. Two vectors xng1 and yng2 are qualitatively independent if for any ordered pair (a,b)g1×g2, there exists an index j{0,1,,n1} such that (x(j),y(j))=(a,b). Let G be a graph with k vertices v1,v2,,vk with respective vertex weights g1,g2,,gk. A mixed covering array onG, denoted by CA(n,G,ki=1gi), is a k×n array such that row i corresponds to vertex vi, entries in row i are from Zgi; and if {vx,vy} is an edge in G, then the rows x,y are qualitatively independent. The parameter n is the size of the array. Given a weighted graph G, a mixed covering array on G with minimum size is optimal. In this paper, we introduce some basic graph operations to provide constructions for optimal mixed covering arrays on the family of graphs with treewidth at most three.

  • chapterNo Access

    Scalable Optimal Test Patterns for Crosstalk-induced Faults on Deep Submicron Global Interconnects

    Capacitance-coupling and mutual inductance between the neighboring wires of global interconnects give rise to crosstalk effects, which are one of the biggest signal integrity problems in DSM circuits today. Previous models for crosstalk-induced faults assume that all the wires of a bus act together to induce crosstalk effects on a single wire. Based on recent simulation results of Sirisaengtaksin and Gupta, we use a more general model of crosstalk-induced faults that allows tradeoffs between efficiency of tests and quality of tests. We construct provably optimal test patterns that covers all crosstalk-induced faults under this general model. Our test patterns admit simple generators for at-speed testing in BIST. The test methodology proposed here can result in huge savings in test cost. In particular, the required linear number of test patterns can be reduced to a constant number of test patterns by accepting only a few percent of error, thus allowing our test methodology to scale with bus width and technology.

  • chapterNo Access

    Constructing Perfect Hash Families Using a Greedy Algorithm

    A perfect hash family𝖯𝖧𝖥(N; k, v, t) is an N × k array on v symbols with v ≥ t, in which in every N × t subarray, at least one row is comprised of distinct symbols. Perfect hash families have a wide range of applications in cryptography, particularly to secure frameproof codes, in database management, and are indirectly used in software interaction testing. A simple one-row-at-a-time greedy algorithm for constructing small perfect hash families is described. The algorithm is deterministic, and its worst-case runtime is polynomial in k and v but exponential in t; consequently, when t is fixed, the algorithm runs in polynomial time in the worst case. It provides a deterministic guarantee that the number N of rows produced is O(log k). In addition to these strong asymptotic guarantees, the method is shown to be practical for the computation of perfect hash families for "small" values of k and t.