New combinatorial structures with applications to efficient group testing with inhibitors

Group testing with inhibitors (GTI) is a variant of classical group testing where in addition to positive items and negative items, there is a third class of items called inhibitors . In this model the response to a test is YES if and only if the tested group of items contains at least one positive...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of combinatorial optimization Jg. 15; H. 1; S. 77 - 94
1. Verfasser: De Bonis, Annalisa
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Boston Springer US 01.01.2008
Schlagworte:
ISSN:1382-6905, 1573-2886
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Group testing with inhibitors (GTI) is a variant of classical group testing where in addition to positive items and negative items, there is a third class of items called inhibitors . In this model the response to a test is YES if and only if the tested group of items contains at least one positive item and no inhibitor. This model of group testing has been introduced by Farach et al. (Proceedings of compression and complexity of sequences, pp 357–367, 1997 ) for applications in the field of molecular biology. In this paper we investigate the GTI problem both in the case when the exact number of positive items is given, and in the case when the number of positives is not given but we are provided with an upper bound on it. For the latter case, we present a lower bound on the number of tests required to determine the positive items in a completely nonadaptive fashion. Also under the same hypothesis, we derive an improved lower bound on the number of tests required by any algorithm (using any number of stages) for the GTI problem. As far as it concerns the case when the exact number of positives is known, we give an efficient trivial two-stage algorithm. Instrumental to our results are new combinatorial structures introduced in this paper. In particular we introduce generalized versions of the well known superimposed codes (Du, D.Z., Hwang, F.K. in Pooling designs and nonadaptive group testing, 2006 ; Dyachkov, A.G., Rykov, V.V. in Probl. Control Inf. Theory 12:7–13, 1983 ; Dyachkov, A.G., et al. in J. Comb. Theory Ser. A 99:195–218, 2002 ; Kautz, W.H., Singleton, R.R. in IEEE Trans. Inf. Theory 10:363–377, 1964 ) and selectors (Clementi, A.E.F, et al. in Proceedings of symposium on discrete algorithms, pp. 709–718, 2001 ; De Bonis, A., et al. in SIAM J Comput. 34(5):1253–1270, 2005 ; Indyk, P. in Proceedings of symposium on discrete algorithms, pp. 697–704, 2002 ) that we believe to be of independent interest.
AbstractList Group testing with inhibitors (GTI) is a variant of classical group testing where in addition to positive items and negative items, there is a third class of items called inhibitors . In this model the response to a test is YES if and only if the tested group of items contains at least one positive item and no inhibitor. This model of group testing has been introduced by Farach et al. (Proceedings of compression and complexity of sequences, pp 357–367, 1997 ) for applications in the field of molecular biology. In this paper we investigate the GTI problem both in the case when the exact number of positive items is given, and in the case when the number of positives is not given but we are provided with an upper bound on it. For the latter case, we present a lower bound on the number of tests required to determine the positive items in a completely nonadaptive fashion. Also under the same hypothesis, we derive an improved lower bound on the number of tests required by any algorithm (using any number of stages) for the GTI problem. As far as it concerns the case when the exact number of positives is known, we give an efficient trivial two-stage algorithm. Instrumental to our results are new combinatorial structures introduced in this paper. In particular we introduce generalized versions of the well known superimposed codes (Du, D.Z., Hwang, F.K. in Pooling designs and nonadaptive group testing, 2006 ; Dyachkov, A.G., Rykov, V.V. in Probl. Control Inf. Theory 12:7–13, 1983 ; Dyachkov, A.G., et al. in J. Comb. Theory Ser. A 99:195–218, 2002 ; Kautz, W.H., Singleton, R.R. in IEEE Trans. Inf. Theory 10:363–377, 1964 ) and selectors (Clementi, A.E.F, et al. in Proceedings of symposium on discrete algorithms, pp. 709–718, 2001 ; De Bonis, A., et al. in SIAM J Comput. 34(5):1253–1270, 2005 ; Indyk, P. in Proceedings of symposium on discrete algorithms, pp. 697–704, 2002 ) that we believe to be of independent interest.
Author De Bonis, Annalisa
Author_xml – sequence: 1
  givenname: Annalisa
  surname: De Bonis
  fullname: De Bonis, Annalisa
  email: debonis@dia.unisa.it
  organization: Dipartimento di Informatica ed Applicazioni, Università di Salerno
BookMark eNp9kE1OwzAQhS1UJNrCAdjlAgY7iRN3iSr-pAo2sGETTdxx6yq1I9tRxW04CyfDJaxYdPWeNPON3rwZmVhnkZBrzm44Y_Vt4EzWkiZLF0wKys_IlIu6oLmU1ST5Qua0WjBxQWYh7BhjyZdT8vGCh0y5fWssROcNdFmIflBx8Biyg4nbDPq-MwqicTZk0X1_odZGGbQx23g39FnEEI3djNvGbk1r0qlwSc41dAGv_nRO3h_u35ZPdPX6-Ly8W1GVskXaKoQaJAgNWOgaywIFgGwXVSUYZ4UWOeRKQ7nGtVAiTVSOWDFeJ8ESijmpx7vKuxA86kaZ-Bs3ejBdw1lzrKgZK2qO9lhRwxPJ_5G9N3vwnyeZfGRC2rUb9M3ODd6mB09AP7w0f-k
CitedBy_id crossref_primary_10_1089_cmb_2009_0138
crossref_primary_10_1007_s10878_011_9413_3
crossref_primary_10_1109_TSP_2021_3137026
crossref_primary_10_1080_12460125_2021_1933713
crossref_primary_10_1089_cmb_2010_0030
crossref_primary_10_1109_TIT_2016_2647600
crossref_primary_10_1371_journal_pone_0085864
crossref_primary_10_1016_j_tcs_2013_04_011
crossref_primary_10_1109_TIT_2014_2384012
Cites_doi 10.1137/S0097539703428002
10.1145/237814.237824
10.1016/S0020-0190(98)00088-X
10.1006/jcta.1999.3036
10.1090/dimacs/055/13
10.1016/S0378-3758(99)00131-7
10.1089/106652703321825982
10.1109/SFCS.1997.646101
10.1016/0012-365X(75)90058-8
10.1109/TCOM.1984.1096146
10.1109/TIT.1964.1053689
10.1109/SFCS.2000.892325
10.1109/TIP.2002.801124
10.1007/BF02772959
10.1007/978-3-642-57576-1_8
10.1093/nar/19.22.6241
10.1109/SFCS.1995.492591
10.1007/3-540-58338-6_64
10.1109/TIT.1985.1057026
10.1016/0888-7543(95)80078-Z
10.1007/3-540-48405-1_38
10.1007/978-1-4612-0751-1_8
10.1002/j.1538-7305.1959.tb03914.x
10.1080/01621459.1962.10480672
10.1214/aoms/1177731363
10.1006/jcta.2002.3257
ContentType Journal Article
Copyright Springer Science+Business Media, LLC 2007
Copyright_xml – notice: Springer Science+Business Media, LLC 2007
DBID AAYXX
CITATION
DOI 10.1007/s10878-007-9085-1
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Mathematics
EISSN 1573-2886
EndPage 94
ExternalDocumentID 10_1007_s10878_007_9085_1
GroupedDBID -5D
-5G
-BR
-EM
-Y2
-~C
.86
.DC
.VR
06D
0R~
0VY
1N0
1SB
203
29K
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5GY
5VS
67Z
6NX
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYOK
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFGCZ
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BAPOH
BDATZ
BGNMA
BSONS
CAG
COF
CS3
CSCUP
D-I
DDRTE
DL5
DNIVK
DPUIP
DU5
EBLON
EBS
EIOEI
EJD
ESBYG
F5P
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
IWAJR
IXC
IXD
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
J9A
JBSCW
JCJTX
JZLTJ
KDC
KOV
LAK
LLZTM
M4Y
MA-
N2Q
NB0
NPVJJ
NQJWS
NU0
O9-
O93
O9J
OAM
OVD
P2P
P9R
PF0
PT4
PT5
QOS
R89
R9I
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S27
S3B
SAP
SDH
SHX
SISQX
SJYHP
SMT
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TEORI
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7X
Z83
Z88
ZMTXR
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABJCF
ABRTQ
ACSTC
ADHKG
AEZWR
AFDZB
AFFHD
AFHIU
AFKRA
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ARAPS
ATHPR
AYFIA
AZQEC
BENPR
BGLVJ
CCPQU
CITATION
DWQXO
GNUQQ
HCIFZ
M2P
M7S
PHGZM
PHGZT
PQGLB
PTHSS
ID FETCH-LOGICAL-c288t-bcea7a8a5fae3f7e43e5aa8b96650103f52a2cfa4ded5c5a8bc2ee60172eee4a3
IEDL.DBID RSV
ISICitedReferencesCount 11
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000251643600006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1382-6905
IngestDate Sat Nov 29 04:54:06 EST 2025
Tue Nov 18 21:39:39 EST 2025
Fri Feb 21 02:33:47 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Group testing algorithms
Superimposed codes
Computational molecular biology
Selectors
Pooling designs
Language English
License http://www.springer.com/tdm
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c288t-bcea7a8a5fae3f7e43e5aa8b96650103f52a2cfa4ded5c5a8bc2ee60172eee4a3
PageCount 18
ParticipantIDs crossref_citationtrail_10_1007_s10878_007_9085_1
crossref_primary_10_1007_s10878_007_9085_1
springer_journals_10_1007_s10878_007_9085_1
PublicationCentury 2000
PublicationDate 20080100
2008-1-00
PublicationDateYYYYMMDD 2008-01-01
PublicationDate_xml – month: 1
  year: 2008
  text: 20080100
PublicationDecade 2000
PublicationPlace Boston
PublicationPlace_xml – name: Boston
PublicationTitle Journal of combinatorial optimization
PublicationTitleAbbrev J Comb Optim
PublicationYear 2008
Publisher Springer US
Publisher_xml – name: Springer US
References Chrobak M, Gasieniec L, Rytter W (2000) Fast broadcasting and gossiping in radio networks. In: Proceedings of 42nd IEEE annual symposium on foundation of computer science (FOCS 2000), pp 575–581
LiCHA sequential method for screening experimental variablesJ Am Stat Assoc1962574554770105.1220210.2307/2281652
BergerTMehravariNTowsleyDWolfJRandom multiple-access communication and group testingIEEE Trans Commun198432776977910.1109/TCOM.1984.1096146
Dyachkov AG, Macula AJ, Torney DC, Vilenkin PA (2001) Two models of nonadaptive group testing for designing screening experiments. In: Proceedings of the 6th international workshop on model-oriented designs and analysis, pp 63–75
Indyk P (2002) Explicit constructions of selectors and related combinatorial structures, with applications. In: Proceedings of symposium on discrete algorithms 2002 (SODA 2002), pp 697–704
LovàszLOn the ratio of optimal integral and fractional coversDiscret Math1975133833900323.0512710.1016/0012-365X(75)90058-8
Indyk P (1997) Deterministic superimposed coding with application to pattern matching. In: Proceedings of thirty-ninth IEEE annual symposium on foundations of computer science (FOCS 97), pp 127–136
FarachMKannanSKnillEHMuthukrishnanSCarpentieriBDe SantisAVaccaroUStorerJGroup testing with sequences in experimental molecular biologyProceedings of compression and complexity of sequences1997Los AlamitosIEEE Computer Society357367
BaldingDJBrunoWJKnillETorneyDCSpeedTPWatermanMSA comparative survey of non-adaptive pooling designGenetic mapping and DNA sequencing1996BerlinSpringer133154
StinsonDRvan TrungTWeiRSecure frameproof codes, key distribution patterns, group testing algorithms and related structuresJ Stat Plan Inference2000865956171054.9401310.1016/S0378-3758(99)00131-7
DuDZHwangFKPooling designs and nonadaptive group testing2006SingaporeWorld Scientific05070274
NgoHQDuD-ZA survey on combinatorial group testing algorithms with applications to DNA library screeningDiscrete mathematical problems with medical applications2000ProvidenceAmerican Mathematical Society171182
DyachkovAGRykovVVA survey of superimposed code theoryProbl Control Inf Theory1983124113729278
KautzWHSingletonRRNonrandom binary superimposed codesIEEE Trans Inf Theory1964103633770133.1240210.1109/TIT.1964.1053689
DyachkovAGVilenkinPMaculaATorneyDFamilies of finite sets in which no intersections of ℓ sets is covered by the union of s othersJ Comb Theory Ser A20029919521810.1006/jcta.2002.32571917018
SobelMGrollPAGroup testing to eliminate efficiently all defectives in a binomial sampleBell Syst Tech J19593811791252107341
De BonisAGasieniecLVaccaroUOptimal two-stage algorithms for group testing problemsSIAM J Comput2005345125312701079.6804310.1137/S00975397034280022165946
Knill E (1995) Lower bounds for identifying subset members with subset queries. In: Proceedings of symposium on discrete algorithms 1995 (SODA 1995), pp 369–377
WolfJBorn again group testing: multiaccess communicationsIEEE Trans Inf Theory1985311851910586.9401110.1109/TIT.1985.1057026
DuDZHwangFKCombinatorial group testing and its applications2000SingaporeWorld Scientific0952.90001
Chaudhuri S, Radhakrishnan J (1996) Deterministic restrictions in circuit complexity. In: Proceedings of the twenty-eighth annual ACM symposium on the theory of computing (STOC 96), pp 30–36
Barillot E, Lacroix B, Cohen D (1991) Theoretical analysis of library screening using an n-dimensional pooling strategy. In: Nucleic acids research, pp 6241–6247
Clementi AEF, Monti A, Silvestri R (2001) Selective families, superimposed codes, and broadcasting on unknown radio networks. In: Proceedings of symposium on discrete algorithms (SODA’01), pp 709–718
HwangFKLiuYCError-tolerant pooling designs with inhibitorsJ Comput Biol200310223123610.1089/106652703321825982
PevznerPALipshutzRTowards DNA sequencing chips19th international conference on mathematical foundations of computer science1994BerlinSpringer143158
Hong YW, Scaglione A (2004) On multiple access for distributed dependent sensors: a content-based group testing approach. In: IEEE information theory workshop, pp 298–303
StinsonDRWeiRZhuLSome new bounds for cover-free familiesJ Comb Theory Ser A2000902242340948.0505510.1006/jcta.1999.30361749434
Margaritis D, Skiena S (1995) Reconstructing strings from substrings in rounds. In: Proceedings of thirty-seventh IEEE annual symposium on foundations of computer science (FOCS 95), pp 613–620
ErdösPFranklPFürediZFamilies of finite sets in which no set is covered by the union of r othersIsrael J Math198551758910.1007/BF02772959
HongEHLadnerREGroup testing for image compressionIEEE Trans Image Process20021190191110.1109/TIP.2002.801124
De BonisAVaccaroUImproved algorithms for group testing with inhibitorsInf Process Lett199866576410.1016/S0020-0190(98)00088-X
DorfmanRThe detection of defective members of large populationsAnn Math Stat194314436440
KumarRRajagopalanSSahaiACoding constructions for blacklisting problems without computational assumptionsProceedings of CRYPTO ‘991999BerlinSpringer609623
BrunoWJBaldingDJKnillEBruceDWhittakerCDoggetNStallingRTorneyDCDesign of efficient pooling experimentsGenomics199526213010.1016/0888-7543(95)80078-Z
9085_CR14
9085_CR1
M Farach (9085_CR17) 1997
9085_CR6
9085_CR7
PA Pevzner (9085_CR30) 1994
9085_CR5
DR Stinson (9085_CR33) 2000; 86
DJ Balding (9085_CR2) 1996
DZ Du (9085_CR12) 2006
AG Dyachkov (9085_CR13) 1983; 12
J Wolf (9085_CR34) 1985; 31
R Dorfman (9085_CR10) 1943; 14
DZ Du (9085_CR11) 2000
EH Hong (9085_CR18) 2002; 11
R Kumar (9085_CR25) 1999
L Lovàsz (9085_CR27) 1975; 13
AG Dyachkov (9085_CR15) 2002; 99
9085_CR28
WH Kautz (9085_CR23) 1964; 10
9085_CR24
M Sobel (9085_CR31) 1959; 38
9085_CR21
FK Hwang (9085_CR20) 2003; 10
9085_CR22
T Berger (9085_CR3) 1984; 32
P Erdös (9085_CR16) 1985; 51
WJ Bruno (9085_CR4) 1995; 26
DR Stinson (9085_CR32) 2000; 90
A Bonis De (9085_CR9) 2005; 34
HQ Ngo (9085_CR29) 2000
CH Li (9085_CR26) 1962; 57
A Bonis De (9085_CR8) 1998; 66
9085_CR19
References_xml – reference: DyachkovAGRykovVVA survey of superimposed code theoryProbl Control Inf Theory1983124113729278
– reference: Margaritis D, Skiena S (1995) Reconstructing strings from substrings in rounds. In: Proceedings of thirty-seventh IEEE annual symposium on foundations of computer science (FOCS 95), pp 613–620
– reference: LovàszLOn the ratio of optimal integral and fractional coversDiscret Math1975133833900323.0512710.1016/0012-365X(75)90058-8
– reference: BergerTMehravariNTowsleyDWolfJRandom multiple-access communication and group testingIEEE Trans Commun198432776977910.1109/TCOM.1984.1096146
– reference: Chrobak M, Gasieniec L, Rytter W (2000) Fast broadcasting and gossiping in radio networks. In: Proceedings of 42nd IEEE annual symposium on foundation of computer science (FOCS 2000), pp 575–581
– reference: Clementi AEF, Monti A, Silvestri R (2001) Selective families, superimposed codes, and broadcasting on unknown radio networks. In: Proceedings of symposium on discrete algorithms (SODA’01), pp 709–718
– reference: DuDZHwangFKCombinatorial group testing and its applications2000SingaporeWorld Scientific0952.90001
– reference: Hong YW, Scaglione A (2004) On multiple access for distributed dependent sensors: a content-based group testing approach. In: IEEE information theory workshop, pp 298–303
– reference: KautzWHSingletonRRNonrandom binary superimposed codesIEEE Trans Inf Theory1964103633770133.1240210.1109/TIT.1964.1053689
– reference: ErdösPFranklPFürediZFamilies of finite sets in which no set is covered by the union of r othersIsrael J Math198551758910.1007/BF02772959
– reference: HwangFKLiuYCError-tolerant pooling designs with inhibitorsJ Comput Biol200310223123610.1089/106652703321825982
– reference: BaldingDJBrunoWJKnillETorneyDCSpeedTPWatermanMSA comparative survey of non-adaptive pooling designGenetic mapping and DNA sequencing1996BerlinSpringer133154
– reference: FarachMKannanSKnillEHMuthukrishnanSCarpentieriBDe SantisAVaccaroUStorerJGroup testing with sequences in experimental molecular biologyProceedings of compression and complexity of sequences1997Los AlamitosIEEE Computer Society357367
– reference: BrunoWJBaldingDJKnillEBruceDWhittakerCDoggetNStallingRTorneyDCDesign of efficient pooling experimentsGenomics199526213010.1016/0888-7543(95)80078-Z
– reference: Indyk P (1997) Deterministic superimposed coding with application to pattern matching. In: Proceedings of thirty-ninth IEEE annual symposium on foundations of computer science (FOCS 97), pp 127–136
– reference: Barillot E, Lacroix B, Cohen D (1991) Theoretical analysis of library screening using an n-dimensional pooling strategy. In: Nucleic acids research, pp 6241–6247
– reference: De BonisAGasieniecLVaccaroUOptimal two-stage algorithms for group testing problemsSIAM J Comput2005345125312701079.6804310.1137/S00975397034280022165946
– reference: De BonisAVaccaroUImproved algorithms for group testing with inhibitorsInf Process Lett199866576410.1016/S0020-0190(98)00088-X
– reference: HongEHLadnerREGroup testing for image compressionIEEE Trans Image Process20021190191110.1109/TIP.2002.801124
– reference: StinsonDRWeiRZhuLSome new bounds for cover-free familiesJ Comb Theory Ser A2000902242340948.0505510.1006/jcta.1999.30361749434
– reference: StinsonDRvan TrungTWeiRSecure frameproof codes, key distribution patterns, group testing algorithms and related structuresJ Stat Plan Inference2000865956171054.9401310.1016/S0378-3758(99)00131-7
– reference: Chaudhuri S, Radhakrishnan J (1996) Deterministic restrictions in circuit complexity. In: Proceedings of the twenty-eighth annual ACM symposium on the theory of computing (STOC 96), pp 30–36
– reference: Dyachkov AG, Macula AJ, Torney DC, Vilenkin PA (2001) Two models of nonadaptive group testing for designing screening experiments. In: Proceedings of the 6th international workshop on model-oriented designs and analysis, pp 63–75
– reference: DyachkovAGVilenkinPMaculaATorneyDFamilies of finite sets in which no intersections of ℓ sets is covered by the union of s othersJ Comb Theory Ser A20029919521810.1006/jcta.2002.32571917018
– reference: KumarRRajagopalanSSahaiACoding constructions for blacklisting problems without computational assumptionsProceedings of CRYPTO ‘991999BerlinSpringer609623
– reference: Indyk P (2002) Explicit constructions of selectors and related combinatorial structures, with applications. In: Proceedings of symposium on discrete algorithms 2002 (SODA 2002), pp 697–704
– reference: Knill E (1995) Lower bounds for identifying subset members with subset queries. In: Proceedings of symposium on discrete algorithms 1995 (SODA 1995), pp 369–377
– reference: SobelMGrollPAGroup testing to eliminate efficiently all defectives in a binomial sampleBell Syst Tech J19593811791252107341
– reference: LiCHA sequential method for screening experimental variablesJ Am Stat Assoc1962574554770105.1220210.2307/2281652
– reference: NgoHQDuD-ZA survey on combinatorial group testing algorithms with applications to DNA library screeningDiscrete mathematical problems with medical applications2000ProvidenceAmerican Mathematical Society171182
– reference: PevznerPALipshutzRTowards DNA sequencing chips19th international conference on mathematical foundations of computer science1994BerlinSpringer143158
– reference: DorfmanRThe detection of defective members of large populationsAnn Math Stat194314436440
– reference: DuDZHwangFKPooling designs and nonadaptive group testing2006SingaporeWorld Scientific05070274
– reference: WolfJBorn again group testing: multiaccess communicationsIEEE Trans Inf Theory1985311851910586.9401110.1109/TIT.1985.1057026
– volume: 34
  start-page: 1253
  issue: 5
  year: 2005
  ident: 9085_CR9
  publication-title: SIAM J Comput
  doi: 10.1137/S0097539703428002
– ident: 9085_CR5
  doi: 10.1145/237814.237824
– volume: 66
  start-page: 57
  year: 1998
  ident: 9085_CR8
  publication-title: Inf Process Lett
  doi: 10.1016/S0020-0190(98)00088-X
– volume: 90
  start-page: 224
  year: 2000
  ident: 9085_CR32
  publication-title: J Comb Theory Ser A
  doi: 10.1006/jcta.1999.3036
– start-page: 171
  volume-title: Discrete mathematical problems with medical applications
  year: 2000
  ident: 9085_CR29
  doi: 10.1090/dimacs/055/13
– volume: 86
  start-page: 595
  year: 2000
  ident: 9085_CR33
  publication-title: J Stat Plan Inference
  doi: 10.1016/S0378-3758(99)00131-7
– volume-title: Combinatorial group testing and its applications
  year: 2000
  ident: 9085_CR11
– volume: 10
  start-page: 231
  issue: 2
  year: 2003
  ident: 9085_CR20
  publication-title: J Comput Biol
  doi: 10.1089/106652703321825982
– ident: 9085_CR21
  doi: 10.1109/SFCS.1997.646101
– volume: 13
  start-page: 383
  year: 1975
  ident: 9085_CR27
  publication-title: Discret Math
  doi: 10.1016/0012-365X(75)90058-8
– volume: 32
  start-page: 769
  issue: 7
  year: 1984
  ident: 9085_CR3
  publication-title: IEEE Trans Commun
  doi: 10.1109/TCOM.1984.1096146
– volume: 10
  start-page: 363
  year: 1964
  ident: 9085_CR23
  publication-title: IEEE Trans Inf Theory
  doi: 10.1109/TIT.1964.1053689
– ident: 9085_CR6
  doi: 10.1109/SFCS.2000.892325
– volume: 11
  start-page: 901
  year: 2002
  ident: 9085_CR18
  publication-title: IEEE Trans Image Process
  doi: 10.1109/TIP.2002.801124
– volume: 51
  start-page: 75
  year: 1985
  ident: 9085_CR16
  publication-title: Israel J Math
  doi: 10.1007/BF02772959
– ident: 9085_CR14
  doi: 10.1007/978-3-642-57576-1_8
– ident: 9085_CR1
  doi: 10.1093/nar/19.22.6241
– ident: 9085_CR7
– ident: 9085_CR28
  doi: 10.1109/SFCS.1995.492591
– start-page: 143
  volume-title: 19th international conference on mathematical foundations of computer science
  year: 1994
  ident: 9085_CR30
  doi: 10.1007/3-540-58338-6_64
– ident: 9085_CR19
– volume: 31
  start-page: 185
  year: 1985
  ident: 9085_CR34
  publication-title: IEEE Trans Inf Theory
  doi: 10.1109/TIT.1985.1057026
– volume: 26
  start-page: 21
  year: 1995
  ident: 9085_CR4
  publication-title: Genomics
  doi: 10.1016/0888-7543(95)80078-Z
– start-page: 609
  volume-title: Proceedings of CRYPTO ‘99
  year: 1999
  ident: 9085_CR25
  doi: 10.1007/3-540-48405-1_38
– start-page: 133
  volume-title: Genetic mapping and DNA sequencing
  year: 1996
  ident: 9085_CR2
  doi: 10.1007/978-1-4612-0751-1_8
– volume: 38
  start-page: 1179
  year: 1959
  ident: 9085_CR31
  publication-title: Bell Syst Tech J
  doi: 10.1002/j.1538-7305.1959.tb03914.x
– volume: 57
  start-page: 455
  year: 1962
  ident: 9085_CR26
  publication-title: J Am Stat Assoc
  doi: 10.1080/01621459.1962.10480672
– volume: 14
  start-page: 436
  year: 1943
  ident: 9085_CR10
  publication-title: Ann Math Stat
  doi: 10.1214/aoms/1177731363
– start-page: 357
  volume-title: Proceedings of compression and complexity of sequences
  year: 1997
  ident: 9085_CR17
– volume-title: Pooling designs and nonadaptive group testing
  year: 2006
  ident: 9085_CR12
– volume: 12
  start-page: 1
  issue: 4
  year: 1983
  ident: 9085_CR13
  publication-title: Probl Control Inf Theory
– volume: 99
  start-page: 195
  year: 2002
  ident: 9085_CR15
  publication-title: J Comb Theory Ser A
  doi: 10.1006/jcta.2002.3257
– ident: 9085_CR22
– ident: 9085_CR24
SSID ssj0009054
Score 1.8079269
Snippet Group testing with inhibitors (GTI) is a variant of classical group testing where in addition to positive items and negative items, there is a third class of...
SourceID crossref
springer
SourceType Enrichment Source
Index Database
Publisher
StartPage 77
SubjectTerms Combinatorics
Convex and Discrete Geometry
Mathematical Modeling and Industrial Mathematics
Mathematics
Mathematics and Statistics
Operations Research/Decision Theory
Optimization
Theory of Computation
Title New combinatorial structures with applications to efficient group testing with inhibitors
URI https://link.springer.com/article/10.1007/s10878-007-9085-1
Volume 15
WOSCitedRecordID wos000251643600006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: Springer LINK Contemporary (1997 - Present)
  customDbUrl:
  eissn: 1573-2886
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0009054
  issn: 1382-6905
  databaseCode: RSV
  dateStart: 19970301
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA6yetCDb3F9kYMnJdBtmyZ7FHHxoIugLouXkmYnWpCu2Orv8bf4y5zpYx-ggt5aOgllMsnky2S-Yew4kFFobSIFhIES4chzQicqERRzAh93qJ0yi39wpfp9PRx2b-o87ry57d6EJMuVeibZTRMbrKdEl27MI-RZlEQ2QxD9djBl2vVkVckWt44I_WQTyvyui3lnNB8JLR1Mb-1fv7bOVuv9JD-rDGCDLUC2yVZmWAbx7XpCzZpvsQdc1jh2i4iY8DaaH684ZN8QeHM6luWzQW1ejD8_oOSZQPfEyyQQXhA1R_ZYSafZU5qkVLRnm933Lu7OL0VdYEFYX-tCJBaMMtpIZyBwCocLpDE6QQgkqf6Dk77xrTPhCEbSSvxifYCIYCMAhCbYYa1snMEu4w58nM46AWVV2LVGSxk4cNJYEynngjbzGk3HtmYfpyIYz_GUN5mUGNMjKTHutNnJpMlLRb3xm_BpMzRxPQvzn6X3_iS9z5arWyJ08HLAWjgocMiW7HuR5q9HpfV9AbOy198
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEA5SBfXgW6zPHDwpC-3upkmPIpaKbRGspXhZsulEF2Qr7urv8bf4y5zZRx-ggt522UlYJpNMvkzmG8ZOPdHwjQmFA74nHX9Us44KZehQzAlc3KHWsyz-QUf2emo4bN4WedxJedu9DElmK_VMspsiNtiadJp0Yx4hz6JPVXYIot8Npky7NZFXssWtI0I_UYYyv-ti3hnNR0IzB9Na_9evbbC1Yj_JL3ID2GQLEG-x1RmWQXzrTqhZk232gMsax24RERPeRvPjOYfsGwJvTseyfDaozdPx5wdkPBPonniWBMJTouaIH3PpKH6KwoiK9uyw-9ZV_7LtFAUWHOMqlTqhAS210sJq8KzE4QKhtQoRAgmq_2CFq11jtT-CkTACvxgXoEGwEQB87e2ySjyOYY9xCy5OZxWCNNJvGq2E8CxYoY1uSGu9KquVmg5MwT5ORTCegylvMikxoEdSYlCvsrNJk5eceuM34fNyaIJiFiY_S-__SfqELbf73U7Que7dHLCV_MYIHcIcsgoOEByxJfOeRsnrcWaJX9ut2sM
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8QwEA6iInrwLa7PHDwpYXfbZpM9iroorsviY1m8lDSdaEG6i63-Hn-Lv8xJH_sAFcRbSydtSCbNfJmZbwg5cnnD0zrgDDxXMC-sGSYDETDrcwIHLdR6lsXfa4tOR_b7zW5R5zQpo91Ll2Se02BZmuK0OgxNdSLxTVpm2JpgTRs9j_BnzkMgY2O6bu96Y9bdGs-r2qIZiTCQl27N714xvTFNe0Wzzaa18u9urpLlws6kp7lirJEZiNfJ0gT7IN7djChbkw3yiL87ip9ApGxxOKolzbll3xCQU3tcSyed3TQdfH5Axj-B_aFZcghNLWVH_JRLR_FzFES2mM8meWhd3J9dsqLwAtOOlCkLNCihpOJGgWsETiNwpWSA0IjbuhCGO8rRRnkhhFxzfKIdgIaFkwDgKXeLzMaDGLYJNeDgMpcBCC28plaSc9eA4UqrhjDGrZBaOeq-LljJbXGMF3_Mp2wH0beXdhD9eoUcj5oMc0qO34RPymnyi9WZ_Cy98yfpQ7LQPW_57avO9S5ZzANJ7NnMHpnF-YF9Mq_f0yh5PciU8gs2RuOn
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=New+combinatorial+structures+with+applications+to%C2%A0efficient+group+testing+with+inhibitors&rft.jtitle=Journal+of+combinatorial+optimization&rft.au=De+Bonis%2C+Annalisa&rft.date=2008-01-01&rft.issn=1382-6905&rft.eissn=1573-2886&rft.volume=15&rft.issue=1&rft.spage=77&rft.epage=94&rft_id=info:doi/10.1007%2Fs10878-007-9085-1&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s10878_007_9085_1
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1382-6905&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1382-6905&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1382-6905&client=summon