Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing - STOC '98 1998
DOI: 10.1145/276698.276757
|View full text |Cite
|
Sign up to set email alerts
|

Spot-checkers

Abstract: On Labor Day Weekend, the highway patrol sets up spotchecka nt random points on the freeways with the intention of deterring a large fraction of motorists from driving incorrectly, WC explore a very similar idea in the context of program checking to ascertain with minimal overhead that a program output is reasonably correct. Our model of spotchecking requires that the spot-checker must run asymptotically much faster than the combined length of the input and output, We then show that the spot-checking model can… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
49
0

Year Published

2002
2002
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 59 publications
(52 citation statements)
references
References 29 publications
3
49
0
Order By: Relevance
“…To achieve this, we need two committed sequences, one sorted according to the measured values, and one sorted according to the sensor ids. We check that both sequences are sorted using Sort-Check-II spot checker from [11] with subsequent uniform sampling of pairs of neighboring elements (requiring O(log n/ε) and O(1/ε) samples, respectively; cf. Section 7.1).…”
Section: Our Approach For Medianmentioning
confidence: 99%
See 1 more Smart Citation
“…To achieve this, we need two committed sequences, one sorted according to the measured values, and one sorted according to the sensor ids. We check that both sequences are sorted using Sort-Check-II spot checker from [11] with subsequent uniform sampling of pairs of neighboring elements (requiring O(log n/ε) and O(1/ε) samples, respectively; cf. Section 7.1).…”
Section: Our Approach For Medianmentioning
confidence: 99%
“…. m. A verifies the correctness of the counts by deriving from them the positions in the committed sorted sequence, and check the values in the committed sorted sequence are well sorted using the method Sort-Check-II spot checker from [11]. If also this check succeeds, B computes the average directly from the occurrence-counts, and compares it toā.…”
Section: Computing the Average By Counting Frequenciesmentioning
confidence: 99%
“…Furthermore, as shown in [19], obfuscating programs while preserving its functionality is theoretically impossible. Result checking [20] examines the validity of intermediate results produced by the program, but it is inappropriate for use in battery-powered devices because it continuously incurs verification overhead. Aucsmith [21] proposed to store the encrypted executable and decrypt it before execution.…”
Section: Tamper-proofing Techniquesmentioning
confidence: 99%
“…. , n} → R, after querying O(log n)/ε function values, we can, with probability at least 2/3, accept f if it is monotone and reject it if it is ε-far from being monotone [3]. These methods do not provide for tolerant property testing, however.…”
Section: Introductionmentioning
confidence: 99%
“…The starting point of our algorithm is the property tester of Ergun et al [3], which relies on a key fact: There exist at least ε f n "critical" integers i ∈ {1, . .…”
Section: Introductionmentioning
confidence: 99%