• Publications
  • Influence
Asymptotic and constructive methods for covering perfect hash families and covering arrays
TLDR
We apply two probabilistic methods to covering perfect hash families to improve upon the asymptotic upper bound for the minimum number of rows in a covering array with v symbols, k columns, and strength t. Expand
Formal Methods Analysis of the Secure Remote Password Protocol
TLDR
The first formal analysis of the SRP-3 protocol for structural weaknesses, which we carried out using the CPSA tool. Expand
Partitioned Search with Column Resampling for Locating Array Construction
TLDR
We present Partitioned Search with Column Resampling (PSCR), a randomized computational search algorithmic framework to verify if an array is (d, t)-locating by partitioning the search space to decrease the number of comparisons. Expand
Subspace restrictions and affine composition for covering perfect hash families
TLDR
We develop a method using subspace restrictions to produce covering arrays that are guaranteed to have at least a specified number of duplicated rows in the covering array. Expand
Genetic algorithms for affine transformations to existential t-restrictions
TLDR
The subject of existential f-restrictions has garnered considerable interest recently as it encompasses many different types of combinatorial objects, all of which have unique and important applications. Expand
Formal Methods Analysis of the Secure Remote Password Protocol
Combinatorial Testing Metrics for Machine Learning
This paper defines a set difference metric for comparing machine learning (ML) datasets and proposes the difference between datasets be a function of combinatorial coverage. We illustrate its utilityExpand
Algorithms for Constructing Anonymizing Arrays
TLDR
An anonymizing array ensures that any assignment of values to t attributes that appears in the array appears at least r times. Expand
Test and Evaluation Framework for Multi-Agent Systems of Autonomous Intelligent Agents
TLDR
We propose a framework that incorporates test and evaluation throughout not only the development life cycle, but continues into operation as the system learns and adapts in a noisy, changing, and contended environment. Expand