Hermite normal form computation using modulo determinant arithmetic
Mathematics of Operations Research
Arthur-Merlin games: a randomized proof system, and a hierarchy of complexity class
Journal of Computer and System Sciences - 17th Annual ACM Symposium in the Theory of Computing, May 6-8, 1985
Journal of the ACM (JACM)
Information Processing Letters
The space complexity of approximating the frequency moments
Journal of Computer and System Sciences
On randomized one-round communication complexity
Computational Complexity
Introduction to Coding Theory
Optimal Lower Bounds for Quantum Automata and Random Access Codes
FOCS '99 Proceedings of the 40th Annual Symposium on Foundations of Computer Science
QMA/qpoly \subseteq PSPACE/poly: De-Merlinizing Quantum Protocols
CCC '06 Proceedings of the 21st Annual IEEE Conference on Computational Complexity
Data streams: algorithms and applications
Foundations and Trends® in Theoretical Computer Science
Communication Complexity
Estimating the sortedness of a data stream
SODA '07 Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms
FOCS '07 Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science
On distance to monotonicity and longest increasing subsequence of a data stream
Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms
Delegating computation: interactive proofs for muggles
STOC '08 Proceedings of the fortieth annual ACM symposium on Theory of computing
Algebrization: A New Barrier in Complexity Theory
ACM Transactions on Computation Theory (TOCT)
Numerical linear algebra in the streaming model
Proceedings of the forty-first annual ACM symposium on Theory of computing
Computational Complexity: A Modern Approach
Computational Complexity: A Modern Approach
ICALP '09 Proceedings of the 36th International Colloquium on Automata, Languages and Programming: Part I
Streaming graph computations with a helpful advisor
ESA'10 Proceedings of the 18th annual European conference on Algorithms: Part I
Practical delegation of computation using multiple servers
Proceedings of the 18th ACM conference on Computer and communications security
Verifying computations with streaming interactive proofs
Proceedings of the VLDB Endowment
Practical verified computation with streaming interactive proofs
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
A note on randomized streaming space bounds for the longest increasing subsequence problem
Information Processing Letters
Hi-index | 0.00 |
We define a new model of data streaming algorithms that employ a prover/helper to outsource difficult computations in a verifiable way. While for the verifier the usual time (per symbol read) and space constraints of the data streaming model are in place, the prover has unbounded space. Both parties cannot look into the future (i.e., do not know data arriving later). Previous work on such models either severely restricted the total communication between the prover and the verifier, or extended the computation by a long annotation that has to be streamed from the prover to the verifier offline after the original stream has ended, delaying the computation of the result. We argue that restricting the total communication severely is unnatural and investigate a model that only bounds the communication overhead, i.e., the amount of communication sent from the prover to the verifier per symbol of the data stream. This allows for vastly more communication between prover and verifier while maintaining the online nature of the model (in particular long annotations sent after the stream has ended are not allowed). Relaxing the communication requirement allows us to find simple algorithms for problems like the Longest Increasing Subsequence Problem (LIS), finding the Median, and for deciding whether the rank of a matrix is full or not. All our algorithms have a similar structure with phases whose length shrinks geometrically, and phase i being used to verify certain properties of the stream up to phase i-1 using re-streaming of parts of the previous stream. The challenge in each case is to tie the different phases together. Furthermore, while in previous work it was shown that all problems in the class NC can be computed in a streaming model with a prover, this general purpose algorithm tends to be inefficient, and this as well as related algorithms based on arithmetization techniques suffer from the following bottleneck: they employ a final verification phase (taking place after the end of the stream), which uses polylogarithmic communication (essentially the only communication in the whole protocol), yet the prover needs to perform computations that take at least linear time during that phase. While we show that such a verification phase with a large number of communication rounds between the prover and the verifier is unavoidable for certain problems, most algorithms we describe in our model (for problems like Median or LIS or Rank) avoid this bottleneck.