Group Testing


Book Description

Researchers and students in modern communication and network systems will find this monograph an essential resource in understanding this new family of codes that will have a significant impact on such systems in the years to come.




Combinatorial Group Testing and Its Applications


Book Description

Group testing has been used in medical, chemical and electrical testing, coding, drug screening, pollution control, multiaccess channel management, and recently in data verification, clone library screening and AIDS testing. The mathematical model can be either combinatorial or probabilistic. This book summarizes all important results under the combinatorial model, and demonstrates their applications in real problems. Some other search problems, including the famous counterfeit-coins problem, are also studied in depth. There are two reasons for publishing a second edition of this book. The first is the usual need to update the text (after six years) and correct errors. The second -- and more important -- reason is to accommodate the recent sudden growth of interest in applying the idea of group testing to clone library screening. This development is much more than just a new application, since the new application brings with it new objectives which require a new twist of theory. It also embraces the growing importance of two topics: nonadaptive algorithms and error tolerance. Two new chapters, one on clone library screening and the other on error tolerance, have been added. Also included is a new chapter on counterfeit coins, the most famous search problem historically, which recently drew on an unexpected connection to some deep mathematical theory to yield new results. Finally, the chapters have been recognized into parts to provide focuses and perspectives.




Combinatorial Group Testing And Its Applications


Book Description

Group testing was first proposed for blood tests, but soon found its way to many industrial applications. Combinatorial group testing studies the combinatorial aspect of the problem and is particularly related to many topics in combinatorics, computer science and operations research. Recently, the idea of combinatorial group testing has been applied to experimental designs, coding, multiaccess computer communication, clone library screening and other fields. This book is the first attempt to cover the theory and applications of combinatorial group testing in one place.




Pooling Designs and Nonadaptive Group Testing


Book Description

"Pooling designs have been widely used in various aspects of DNA sequencing. In biological applications, the well-studied mathematical problem called "group testing" shifts its focus to nonadaptive algorithms while the focus of traditional group testing is on sequential algorithms. Biological applications also bring forth new models not previously considered, such as the error-tolerant model, the complex model, and the inhibitor model. This book is the first attempt to collect all the significant research on pooling designs in one convenient place." "The coverage includes many real biological applications such as clone library screening, contig sequencing, exon boundary finding and protein-protein interaction detecting and introduces the mathematics behind it."--BOOK JACKET.




Pooling Designs And Nonadaptive Group Testing: Important Tools For Dna Sequencing


Book Description

Pooling designs have been widely used in various aspects of DNA sequencing. In biological applications, the well-studied mathematical problem called “group testing” shifts its focus to nonadaptive algorithms while the focus of traditional group testing is on sequential algorithms. Biological applications also bring forth new models not previously considered, such as the error-tolerant model, the complex model, and the inhibitor model. This book is the first attempt to collect all the significant research on pooling designs in one convenient place.The coverage includes many real biological applications such as clone library screening, contig sequencing, exon boundary finding and protein-protein interaction detecting and introduces the mathematics behind it.




Group Testing Theory in Network Security


Book Description

Group Testing Theory in Network Security explores a new branch of group testing theory with an application which enhances research results in network security. This brief presents new solutions on several advanced network security problems and mathematical frameworks based on the group testing theory, specifically denial-of-service and jamming attacks. A new application of group testing, illustrated in this text, requires additional theories, such as size constraint group testing and connected group testing. Included in this text is a chapter devoted to discussing open problems and suggesting new solutions for various network security problems. This text also exemplifies the connection between mathematical approaches and practical applications to group testing theory in network security. This work will appeal to a multidisciplinary audience with interests in computer communication networks, optimization, and engineering.




The Test


Book Description

"[The anti-testing] movement now has a guidebook. . . . Kamenetz shows how fundamentally American it would be to move toward a more holistic system." -- New York Times Book Review The Test is an essential and critically acclaimed book for any parent confounded by our national obsession with standardized testing. It recounts the shocking history and tempestuous politics of testing and borrows strategies from fields as diverse as games, neuroscience, and ancient philosophy to help children cope. It presents the stories of families, teachers, and schools maneuvering within and beyond the existing educational system, playing and winning the testing game. And it points the way toward a hopeful future of better tests and happier kids.







SOFSEM 2024


Book Description

This book constitutes the proceedings of the 49th International Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM 2024, held in Cochem, Germany, in February 2024. The 33 full papers presented in this book were carefully reviewed and selected from 81 submissions. The book also contains one invited talk in full paper length. They focus on original research and challenges in foundations of computer science including algorithms, AI-based methods, computational complexity, and formal models.




Code of Federal Regulations


Book Description

Special edition of the Federal Register, containing a codification of documents of general applicability and future effect ... with ancillaries.