Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Steve Uurtamo is active.

Publication


Featured researches published by Steve Uurtamo.


international colloquium on automata languages and programming | 2010

Data stream algorithms for codeword testing

Atri Rudra; Steve Uurtamo

Motivated by applications in storage systems and property testing, we study data stream algorithms for local testing and tolerant testing of codes. Ideally, we would like to know whether there exist asymptotically good codes that can be local/tolerant tested with one-pass, poly-log space data stream algorithms. We show that for the error detection problem (and hence, the local testing problem), there exists a one-pass, log-space data stream algorithm for a broad class of asymptotically good codes, including the Reed-Solomon (RS) code and expander codes. In our technically more involved result, we give a one-pass, O(e log2n)-space algorithm for RS (and related) codes with dimension k and block length n that can distinguish between the cases when the Hamming distance between the received word and the code is at most e and at least a ċ e for some absolute constant a > 1. For RS codes with random errors, we can obtain e ≤ O(n/k). For folded RS codes, we obtain similar results for worst-case errors as long as e ≤ (n/k)1-e for any constant e > 0. These results follow by reducing the tolerant testing problem to the error detection problem using results from group testing and the list decodability of the code. We also show that using our techniques, the space requirement and the upper bound of e ≤ O(n/k) cannot be improved by more than logarithmic factors.


Journal of Network and Computer Applications | 2014

Bidirectional data verification for cloud storage

Mohammad Iftekhar Husain; Steven Y. Ko; Steve Uurtamo; Atri Rudra; Ramalingam Sridhar

This paper presents a storage enforcing remote verification scheme, PGV (Pretty Good Verification) as a bidirectional data integrity checking mechanism for cloud storage. At its core, PGV relies on the well-known polynomial hash; we show that the polynomial hash provably possesses the storage enforcement property and is also efficient in terms of performance. In addition to the traditional application of a client verifying the storage content at a remote server, PGV can also be applied to de-duplication scenarios where the server wants to verify whether the client possesses a significant amount of information about a file (and not just a partial knowledge/fingerprint of the file) before granting access to an existing file.While existing schemes are often developed to handle a malicious adversarial model, we argue that such a model is often too strong of an assumption, resulting in over-engineered, resource-intensive mechanisms. Instead, the storage enforcement property of PGV aims at removing a practical incentive for a storage server to cheat in order to save on storage space in a covert adversarial model.We theoretically prove the power of PGV by combining Kolmogorov complexity and list decoding and experimentally show the simplicity and low overhead of PGV by comparing it with existing schemes. Altogether, PGV provides a good, practical way to perform storage enforcing remote verification.


international workshop and international workshop on approximation randomization and combinatorial optimization algorithms and techniques | 2010

Two theorems on list decoding

Atri Rudra; Steve Uurtamo

We prove the following results concerning the list decoding of error-correcting codes: 1. We show that for any code with a relative distance of δ (over a large enough alphabet), the following result holds for random errors: With high probability, for a ρ ≤ δ - e fraction of random errors (for any e > 0), the received word will have only the transmitted codeword in a Hamming ball of radius ρ around it. Thus, for random errors, one can correct twice the number of errors uniquely correctable from worst-case errors for any code. A variant of our result also gives a simple algorithm to decode Reed-Solomon codes from random errors that, to the best of our knowledge, runs faster than known algorithms for certain ranges of parameters. 2. We show that concatenated codes can achieve the list decoding capacity for erasures. A similar result for worst-case errors was proven by Guruswami and Rudra (SODA 08), although their result does not directly imply our result. Our results show that a subset of the random ensemble of codes considered by Guruswami and Rudra also achieve the list decoding capacity for erasures. We also show that the exponential list size bound in our result with outer random linear codes cannot be improved using the recent techniques of Guruswami, Hastad and Kopparty that achieved similar improvements for errors. Our proofs employ simple counting and probabilistic arguments.


symposium on theoretical aspects of computer science | 2011

Polynomial fitting of data streams with applications to codeword testing

Andrew McGregor; Atri Rudra; Steve Uurtamo

Given a stream of


symposium on reliable distributed systems | 2012

PGV: A Storage Enforcing Remote Verification Scheme

Mohammad Iftekhar Husain; Steve Uurtamo; Steven Y. Ko; Atri Rudra; Ramalingam Sridhar

(x,y)


Electronic Colloquium on Computational Complexity | 2010

Two Theorems in List Decoding

Atri Rudra; Steve Uurtamo

points, we consider the problem of finding univariate polynomials that best fit the data. Over finite fields, this problem encompasses the well-studied problem of decoding Reed-Solomon codes while over the reals it corresponds to the well-studied polynomial regression problem. We present one-pass algorithms for two natural problems: i) find the polynomial of a given degree


arXiv: Information Theory | 2012

Almost Universal Hash Families are also Storage Enforcing

Mohammad Iftekhar Husain; Steven Y. Ko; Atri Rudra; Steve Uurtamo

k


ALGOSENSORS'10 Proceedings of the 6th international conference on Algorithms for sensor systems, wireless adhoc networks, and autonomous mobile entities | 2010

k + decision trees

James Aspnes; Eric Blais; Murat Demirbas; Ryan O'Donnell; Atri Rudra; Steve Uurtamo

that minimizes the error and ii) find the polynomial of smallest degree that interpolates through the points with at most a given error bound. We consider a range of error models including the average error per point, the maximum error, and the number of points that are not fitted exactly. Many of our results apply to both the reals and finite fields. As a consequence we also solve an open question regarding the tolerant testing of codes in the data stream model.


international workshop and international workshop on approximation, randomization, and combinatorial optimization. algorithms and techniques | 2010

Two Theorems on List Decoding - (Extended Abstract).

Atri Rudra; Steve Uurtamo

This paper presents a storage enforcing remote verification scheme, PGV (Pretty Good Verification). While existing schemes are often developed to handle a malicious adversarial model, we argue that such a model is often too strong of an assumption, resulting in over-engineered, resource-intensive mechanisms. Instead, the storage enforcement property of PGV aims at removing a practical incentive for a storage server to cheat in order to save on storage space in a covert adversarial model. At its core, PGV relies on the well-known polynomial hash, we show that the polynomial hash provably possesses the storage enforcement property and is also efficient in terms of performance. In addition to the traditional application of a client verifying the storage content at a remote server, PGV can also be applied to de-duplication scenarios where the server wants to verify whether the client possesses a significant amount of information about a file (and not just a partial knowledge/fingerprint of the file) before granting access to an existing file. We theoretically prove the power of PGV by combining Kolmogorov complexity and list decoding, and experimentally show the simplicity and low overhead of PGV by comparing it with existing schemes. Altogether, PGV provides a good, practical way to perform storage enforcing remote verification.


Scopus | 2010

k+ decision trees – (extended abstract)

J. Aspnes; E. Blais; Murat Demirbas; R. O'Donnell; Atri Rudra; Steve Uurtamo

Collaboration


Dive into the Steve Uurtamo's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Steven Y. Ko

State University of New York System

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ryan O'Donnell

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Eric Blais

University of Waterloo

View shared research outputs
Top Co-Authors

Avatar

Andrew McGregor

University of Massachusetts Amherst

View shared research outputs
Researchain Logo
Decentralizing Knowledge