Trading group theory for randomness, Proceedings of the seventeenth annual ACM symposium on Theory of computing , STOC '85, 1985. ,
DOI : 10.1145/22145.22192
URL : http://www.cs.umd.edu/~gasarch/652/trading-group-theory.pdf
Verifiable Delegation of Computation over Large Datasets, Advances in Cryptology?CRYPTO, 2011. ,
DOI : 10.1007/978-3-642-22792-9_7
Query Planning in the Presence of Overlapping Sources, EDBT, 2006. ,
DOI : 10.1007/11687238_48
Metamorphic testing: a new approach for generating next test cases, 1998. ,
Fault-based testing in the absence of an oracle, International Conference on Computer Software and Applications, 2001. ,
Budgeted maximum coverage with overlapping costs: monitoring the emerging infections network, Algorithm Engineering & Expermiments, 2010. ,
Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee, 2013 IEEE 13th International Conference on Data Mining, 2013. ,
DOI : 10.1109/ICDM.2013.81
Result Integrity Verification of Outsourced Frequent Itemset Mining, Data and Applications Security and Privacy XXVII, 2013. ,
DOI : 10.1007/978-3-642-39256-6_17
URL : https://hal.archives-ouvertes.fr/hal-01490709
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers, Advances in Cryptology, 2010. ,
DOI : 10.1007/978-3-642-14623-7_25
URL : http://sparrow.ece.cmu.edu/~parno/app/parno-verifiable.pdf
The knowledge complexity of interactive proof systems, SIAM Journal on Computing, 1989. ,
Mining frequent patterns without candidate generation, In ACM Sigmod Record, 2000. ,
DOI : 10.1145/342009.335372
URL : http://www.cs.uiuc.edu/~hanj/pdf/dami04_fptree.pdf
Techniques for testing scientific programs without an oracle, 2013 5th International Workshop on Software Engineering for Computational Science and Engineering (SE-CSE), 2013. ,
DOI : 10.1109/SECSE.2013.6615099
The budgeted maximum coverage problem, Information Processing Letters, vol.70, issue.1, 1999. ,
DOI : 10.1016/S0020-0190(99)00031-9
Audio: An integrity auditing framework of outlier-mining-asa-service systems, Machine Learning and Knowledge Discovery in Databases, 2012. ,
-means Clustering Outsourced to Infrastructure as a Service (IaaS) Providers, SDM, 2013. ,
DOI : 10.1137/1.9781611972832.70
Result Integrity Verification of Outsourced Bayesian Network Structure Learning, SDM, 2014. ,
DOI : 10.1137/1.9781611973440.82
Optimal Verification of Operations on Dynamic Sets, Advances in Cryptology, 2011. ,
DOI : 10.1007/978-3-642-22792-9_6
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption, Theory of Cryptography, 2012. ,
DOI : 10.1007/978-3-642-28914-9_24
Sharing-aware algorithms for virtual machine colocation, Proceedings of the 23rd ACM symposium on Parallelism in algorithms and architectures, SPAA '11, 2011. ,
DOI : 10.1145/1989493.1989554
Efficient Integrity Verification for Outsourced Collaborative Filtering, 2014 IEEE International Conference on Data Mining, 2014. ,
DOI : 10.1109/ICDM.2014.145
Security in outsourcing of association rule mining, VLDB, 2007. ,
Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations, 2017. ,
DOI : 10.1109/ICDM.2014.145
URL : https://hal.archives-ouvertes.fr/hal-01684361