Abstract
In group testing we are concerned with determining the state of items, each one of which can be either in a good state (denoted “g”) or a defective state (denoted “d”). We assume that we have a universal test which can be applied simultaneously to any number of the items. In classical group testing there can be two outcomes of the universal test. One of the outcomes is that all items tested are good (denoted “G”) and the other outcome is that there was at least one defective in the group tested (denoted “D”). The choice of the items to be tested in any given to test can depend upon the entire history of the testing to that point. That is, the items to be tested in the i-th test can depend upon which items were tested in all preceding tests and the outcomes of these tests. A test plan is a set of test and the corresponding rules for choosing which items are to be tested in each test. If the number of items is finite, the test plan is concluded when the states of all items are determined. The problem of group testing is to specify an efficient test plan. Our criterion for efficiency will be discussed later.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
R. Dorfman, “The Detection of Defective Members of Large Populations,” Annals of Mathematical Statistics, Vol. 14, pp. 436–440, 1943.
A. Sterrett, “On the Detection of Defective Members of Large Populations,” Annals of Mathematical Statistics, Vol. 28, pp. 1033–1036, 1957.
M. Sobel and P.A. Groll, “Group Testing to Eliminate Efficiently All Defectives in a Binomial Sample,” Bell Systems Technical Journal, Vol. 38, pp. 1178–1252, 1959.
C.H. Li, “A Sequential Method for Screening Experimental Variables,” Journal American Statistical Association, Vol. 57, pp. 455–477 1962.
A. Gill and D. Gottleib, “The Identification of a Set of Successive Interactions,” Information and Control, Vol. 24, pp. 20–35, 1974.
G.T. Duncan, “Heterogeneous Questionnaire Theory,” SIAM Journal of Applied Mathematics, Vol. 27, pp. 59–71, 1974.
M.R. Garey, ‘Optimal Binary Identification Procedures,’ SIAM Journal of Applied Mathematics, Vol. 23, pp. 173–186, 1972.
M. Sobel, “Group Testing to Classify Efficiently All Units in a Binomial Sample,” Information and Decision Processes, edited by Robert Machol, McGraw-Hill, New York, pp. 127–161, 1960.
M. Sobel, “Optimal Group Testing,” Colloquium on Information Theory, Bolyai Mathematics Society Debrecen, Hungary, 1967.
F.K. Hwang, “On Finding a Single Defective in Binomial Group Testing,” Journal of the American Statistical Association Theory and Methods Section, Vol. 69, pp. 146–150, 1974.
F.K. Hwang, “On Optimum Nested Procedures in Binomial Group Testing,” Biometrics, Vol. 32, pp. 939–943.
F.K. Hwang, “A Generalized Binomial Group Testing Problem, Journal of the American Statistical Association Theory and Methods Section, Vol. 70, pp. 923–926,1975.
F.K. Hwang, “Hypergeometric Group Testing Procedures and Merging Procedures,” Bulletin of the Institute of Mathematics, Academy Senica, Vol. 5, pp. 335–343, 1977.
F.K. Hwang, “A Note on Hypergeometric Group Testing Procedures,” SIAM Journal of Applied Mathematics, Vol. 34, pp. 371–375, 1978.
P. Ungar, “The Cutoff Point for Group Testing,” Communications on Pure and Applied Mathematics, Vol. XIII, pp. 49–54, 1960.
F.K. Hwang, S. Lin and C.L. Mallows, “Some Realizability Theorems in Group Testing, ” SIAM Journal on Applied Mathematics, Vol. 37, pp. 396–400, 1979.
D.A. Huffman, “A Method for the Construction of Minimum Redundancy Codes,” Proceeding of the Institute of Radio Engineers, Vol. 40, p. 1098, 1952.
C.E. Shannon, “A Mathematical Theory of Communication,” Bell System Technical Journal, Vol. 27, pp. 379–423 623–656, 1948.
D. Towsley and J.K. Wolf, Group Testing, Polling, and Multi-Access Communications,” submitted for publication to IEEE Transactions on Communications.
J. Massey and J.K. Wolf, unpublished research conducted in August 1982 at the E.T.H., Zurich, Switzerland.
R.G. Gallager and D.C. Van Voorhis, “Optimal Source Codes for Geometrically Distributed Integer Alphabets,” IEEE Trans. on Information Theory, Vol. 21, pp. 228–229, 1975.
M. Schwartz, Computer-Communication Network Design and Analysis, Prentice-Hall, Inc., Englewood Cliffs, N. J., 1977: Chapters 1, 12, and 13.
L. Kleinrock, Queueing Systems, Vol. II: Computer Applications, John Wiley & Sons, New York, 1976: Chapters 5 and 6.
A. Tanenbaum, Computer Networks, Prentice-Hall, Inc., Englewood Cliffs, N.J., 1981: Chapters 6 and 7.
N. Abramson, “Packet-Switching with Satellites,” AFIPS Conference Proceedings, National Computer Conference, Vol. 42, pp. 695–702, 1973.
R.G. Gallager, “Conflict Resolution in Random Access Broadcast Network,” Proc. AFOSR Workshop on Communication Theory and Application, pp. 74–76, 1978.
N. Pippenger, “Bounds on the Performance of Protocols for a Multiple-Access Broadcast Channel,” IEEE Transactions on Information Theory, Vol. IT-27, pp. 145–151, 1981.
J.I. Capetanakis, “Tree Algorithms for Packet Broadcast Channels,” IEEE Transactions on Information Theory, Vol. IT-25, pp. 505–515, 1979.
J. Mosely, An Efficient Contention Resolution Algorithm for Multiple Access Channels, LIDS-TH-918, Laboratory for Information and Decision Systems, MIT, Cambridge, MA, 1979.
M.L. Molle, “On the Capacity of Infinite Population Multiple Access Protocols,” IEEE Transactions on Information Theory, Vol. IT-28, pp. 396–401, 1982.
T. Berger, letter to J. Hayes, dated February 1, 1983.
N. Pippenger, private conversation with Toby Berger, February 1977.
T. Berger, proposal to National Science Foundation, 1979.
D. Towsley and J.K. Wolf, “An Application of Group Testing to the Design of Multi-User Access Protocols,” Proceedings of Nineteenth Annual Allerton Conference on Communications, Control and Computing, Urbana, Illinois, PP. 397–403, 1981.
B.S. Tsybakov and V. Mikhailov, “An Upper Bound to Capacity of Random Multiple Access Systems,” Probl. Peredach. Inform, Vol. 17, January, 1981.
R. Cruz and B. Hajek, “A New Upper Bound to the Throughput of a Multi-Access Broadcast Channel,” IEEE Trans. on Information Theory, Vol. IT-28,pp, 402–405, 1982.
R. Rueppel, “A Unification of All Existing Upper Bounds for the Random-Access Problem,” IEEE International Symposium on Information Theory, St. Jovite, Quebec, Canada, September 26–30, 1983.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1985 Martinus Nijhoff Publishers, Dordrecht
About this chapter
Cite this chapter
Wolf, J.K. (1985). Principles of Group Testing and an Application to the Design and Analysis of Multi-Access Protocols. In: Skwirzynski, J.K. (eds) The Impact of Processing Techniques on Communications. NATO ASI Series, vol 91. Springer, Dordrecht. https://doi.org/10.1007/978-94-009-5113-6_12
Download citation
DOI: https://doi.org/10.1007/978-94-009-5113-6_12
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-010-8760-5
Online ISBN: 978-94-009-5113-6
eBook Packages: Springer Book Archive