[1] Hartman A. Software and hardware testing using combinatorial covering suites[J]. Graph Theory, Combinatorics and Algorithms, 2005, 34(1):237-266.
[2] Xu Baowen, Nie Changhai, Shi Liang, et al. A software failure debugging method based on combinatorial design approach for testing[J]. Chinese Journal of Computers, 2006, 29(1): 132-138.
[3] Sloane N J A. Covering arrays and intersecting codes[J]. Journal of Combinatorial Designs, 1993, 1(1):51-63.
[4] Colbour C J. Strength two covering arrays: existence tables and projection[J]. Discrete Mathematics, 2008, 308(6):772-786.
[5] Chateaunenf M, Colbour C J, Kreher D L. Covering arrays of strength three[J]. Designs, Codes and Cryptography, 1999, 16(3): 235-242.
[6] Chateaunenf M, Kreher D L. On the state of strength three covering arrays[J]. Journal of Combinatorial Designs, 2002, 10(4):217-238.
[7] Walker Ⅱ R A, Colbourn C J. Tabu search for covering arrays using permutation vectors[J]. Journal of Statistical Planning and Inference, 2009, 139(1):69-80.
[8] Godbole A P, Skipper D E, Sunley R A. T-covering arrays: upper bounds and Poission approximations[J]. Combinatorics, Probability and Computing, 1996, 5(1): 105-117.
[9] Martirosyan S, van Trung T. On t-covering arrays[J]. Designs, Codes and Cryptography, 2004, 32(1):323-339.
[10] Bryce R C, Colbourn C J. A density-based greedy algorithm for higher strength covering arrays[J]. Software Testing, Verification and Reliability, 2009, 19(1):37-53.
[11] Lei Y, Kacker R, Kuhn R D, et al. IPOG: a general strategy for t-way software testing[C]//Proceedings of the 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems. Tucson, Arizona, USA, 2007:549-556.
[12] Hedayat A S, Sloane N J A, Stufken J. Orthogonal arrays: theory and applications[M]. New York: Springer, 1999.