L. Babai, Trading group theory for randomness, Proceedings of the seventeenth annual ACM symposium on Theory of computing , STOC '85, 1985.
DOI : 10.1145/22145.22192

URL : http://www.cs.umd.edu/~gasarch/652/trading-group-theory.pdf

S. Benabbas, Verifiable Delegation of Computation over Large Datasets, Advances in Cryptology?CRYPTO, 2011.
DOI : 10.1007/978-3-642-22792-9_7

J. Bleiholder, Query Planning in the Presence of Overlapping Sources, EDBT, 2006.
DOI : 10.1007/11687238_48

Y. Tsong and . Chen, Metamorphic testing: a new approach for generating next test cases, 1998.

C. Tsong-yueh, Fault-based testing in the absence of an oracle, International Conference on Computer Software and Applications, 2001.

E. Donald and . Curtis, Budgeted maximum coverage with overlapping costs: monitoring the emerging infections network, Algorithm Engineering & Expermiments, 2010.

B. Dong, Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee, 2013 IEEE 13th International Conference on Data Mining, 2013.
DOI : 10.1109/ICDM.2013.81

B. Dong, Result Integrity Verification of Outsourced Frequent Itemset Mining, Data and Applications Security and Privacy XXVII, 2013.
DOI : 10.1007/978-3-642-39256-6_17

URL : https://hal.archives-ouvertes.fr/hal-01490709

R. Gennaro, Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers, Advances in Cryptology, 2010.
DOI : 10.1007/978-3-642-14623-7_25

URL : http://sparrow.ece.cmu.edu/~parno/app/parno-verifiable.pdf

S. Goldwasser, The knowledge complexity of interactive proof systems, SIAM Journal on Computing, 1989.

J. Han, Mining frequent patterns without candidate generation, In ACM Sigmod Record, 2000.
DOI : 10.1145/342009.335372

URL : http://www.cs.uiuc.edu/~hanj/pdf/dami04_fptree.pdf

U. Kanewala, Techniques for testing scientific programs without an oracle, 2013 5th International Workshop on Software Engineering for Computational Science and Engineering (SE-CSE), 2013.
DOI : 10.1109/SECSE.2013.6615099

S. Khuller, The budgeted maximum coverage problem, Information Processing Letters, vol.70, issue.1, 1999.
DOI : 10.1016/S0020-0190(99)00031-9

R. Liu, Audio: An integrity auditing framework of outlier-mining-asa-service systems, Machine Learning and Knowledge Discovery in Databases, 2012.

R. Liu, -means Clustering Outsourced to Infrastructure as a Service (IaaS) Providers, SDM, 2013.
DOI : 10.1137/1.9781611972832.70

R. Liu, Result Integrity Verification of Outsourced Bayesian Network Structure Learning, SDM, 2014.
DOI : 10.1137/1.9781611973440.82

C. Papamanthou, Optimal Verification of Operations on Dynamic Sets, Advances in Cryptology, 2011.
DOI : 10.1007/978-3-642-22792-9_6

B. Parno, How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption, Theory of Cryptography, 2012.
DOI : 10.1007/978-3-642-28914-9_24

M. Sindelar, Sharing-aware algorithms for virtual machine colocation, Proceedings of the 23rd ACM symposium on Parallelism in algorithms and architectures, SPAA '11, 2011.
DOI : 10.1145/1989493.1989554

J. Vaidya, Efficient Integrity Verification for Outsourced Collaborative Filtering, 2014 IEEE International Conference on Data Mining, 2014.
DOI : 10.1109/ICDM.2014.145

K. Wai and . Wong, Security in outsourcing of association rule mining, VLDB, 2007.

B. Zhang, Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations, 2017.
DOI : 10.1109/ICDM.2014.145

URL : https://hal.archives-ouvertes.fr/hal-01684361