Logic testing and design for testability
Logic testing and design for testability
Software reliability via run-time result-checking
Journal of the ACM (JACM)
Sabotage-tolerance mechanisms for volunteer computing systems
Future Generation Computer Systems - Best papers from symp. on cluster computing and the grid (CCGRID 2001)
LSSC '01 Proceedings of the Third International Conference on Large-Scale Scientific Computing-Revised Papers
HPDC '03 Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing
Using Data-Flow Analysis for Resilience and Result Checking in Peer-To-Peer Computations
DEXA '04 Proceedings of the Database and Expert Systems Applications, 15th International Workshop
Internet computing of tasks with dependencies using unreliable workers
OPODIS'04 Proceedings of the 8th international conference on Principles of Distributed Systems
Proceedings of the 2007 international workshop on Parallel symbolic computation
Design for survivability: a tradeoff space
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
Euro-Par 2008 Workshops - Parallel Processing
An adaptive and safe ubicomp for HPC applications
International Journal of Ad Hoc and Ubiquitous Computing
Group-based adaptive result certification mechanism in Desktop Grids
Future Generation Computer Systems
A novel adaptive and safe framework for ubicomp
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Hi-index | 0.00 |
This paper presents a new approach for certifying the correctness of program executions in hostile environments, where tasks or their results have been corrupted due to benign or malicious act. Extending previous results in the restricted context of independent tasks, we introduce a probabilistic certification that establishes whether the results of computations are correct. This probabilistic approach does not make any assumptions about the attack and certification errors are only due to unlucky random choices. Bounds associated with certification are provided for general graphs and for tasks with out-tree dependencies found in a medical image analysis application that motivated the research.