Encyclopedia of Algorithms 2016
DOI: 10.1007/978-1-4939-2864-4_798
|View full text |Cite
|
Sign up to set email alerts
|

Data Stream Verification

Abstract: We survey models and algorithms for stream verification. Problem DefinitionStream verification is concerned with the following setting. A computationally limited client wants to compute some property of a massive input, but lacks the resources to store even a small fraction of the input, and hence cannot perform the desired computation locally. The client therefore accesses a powerful but untrusted service provider (e.g., a commercial cloud computing service), who not only performs the requested computation, b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 20 publications
(45 reference statements)
0
3
0
Order By: Relevance
“…Chakrabarti et al [CCM + 15] and Abdullah et al [ADRV16] further studied this generalized setting. We refer to the expository article of Thaler [Tha16a] for a more detailed survey of this area.…”
Section: Other Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Chakrabarti et al [CCM + 15] and Abdullah et al [ADRV16] further studied this generalized setting. We refer to the expository article of Thaler [Tha16a] for a more detailed survey of this area.…”
Section: Other Related Workmentioning
confidence: 99%
“…This intuitively clear fact has been given precise meanings in several settings, leading to such landmark results as the IP = PSPACE [Sha92] and PCP Theorems [ALM + 98, AS98]. There is a growing body of work on results of this flavor for space-efficient computations on large data streams [Tha16a]. In this setting, a space-bounded client (henceforth named Verifier) that can only process inputs in the restrictive data streaming setting has access to a computationally powerful entity (henceforth named Prover), such as cloud computing service, that has no such space limitations.…”
Section: Introductionmentioning
confidence: 99%
“…The latter setting was further studied by multiple works [ADRV16, CCM + 15, KP14]. We refer the reader to the expository article by Thaler [Tha16a] for a detailed survey of this area.…”
Section: Related Workmentioning
confidence: 99%