Steve Uurtamo
University at Buffalo
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Steve Uurtamo.
international colloquium on automata languages and programming | 2010
Atri Rudra; Steve Uurtamo
Motivated by applications in storage systems and property testing, we study data stream algorithms for local testing and tolerant testing of codes. Ideally, we would like to know whether there exist asymptotically good codes that can be local/tolerant tested with one-pass, poly-log space data stream algorithms. We show that for the error detection problem (and hence, the local testing problem), there exists a one-pass, log-space data stream algorithm for a broad class of asymptotically good codes, including the Reed-Solomon (RS) code and expander codes. In our technically more involved result, we give a one-pass, O(e log2n)-space algorithm for RS (and related) codes with dimension k and block length n that can distinguish between the cases when the Hamming distance between the received word and the code is at most e and at least a ċ e for some absolute constant a > 1. For RS codes with random errors, we can obtain e ≤ O(n/k). For folded RS codes, we obtain similar results for worst-case errors as long as e ≤ (n/k)1-e for any constant e > 0. These results follow by reducing the tolerant testing problem to the error detection problem using results from group testing and the list decodability of the code. We also show that using our techniques, the space requirement and the upper bound of e ≤ O(n/k) cannot be improved by more than logarithmic factors.
Journal of Network and Computer Applications | 2014
Mohammad Iftekhar Husain; Steven Y. Ko; Steve Uurtamo; Atri Rudra; Ramalingam Sridhar
This paper presents a storage enforcing remote verification scheme, PGV (Pretty Good Verification) as a bidirectional data integrity checking mechanism for cloud storage. At its core, PGV relies on the well-known polynomial hash; we show that the polynomial hash provably possesses the storage enforcement property and is also efficient in terms of performance. In addition to the traditional application of a client verifying the storage content at a remote server, PGV can also be applied to de-duplication scenarios where the server wants to verify whether the client possesses a significant amount of information about a file (and not just a partial knowledge/fingerprint of the file) before granting access to an existing file.While existing schemes are often developed to handle a malicious adversarial model, we argue that such a model is often too strong of an assumption, resulting in over-engineered, resource-intensive mechanisms. Instead, the storage enforcement property of PGV aims at removing a practical incentive for a storage server to cheat in order to save on storage space in a covert adversarial model.We theoretically prove the power of PGV by combining Kolmogorov complexity and list decoding and experimentally show the simplicity and low overhead of PGV by comparing it with existing schemes. Altogether, PGV provides a good, practical way to perform storage enforcing remote verification.
international workshop and international workshop on approximation randomization and combinatorial optimization algorithms and techniques | 2010
Atri Rudra; Steve Uurtamo
We prove the following results concerning the list decoding of error-correcting codes: 1. We show that for any code with a relative distance of δ (over a large enough alphabet), the following result holds for random errors: With high probability, for a ρ ≤ δ - e fraction of random errors (for any e > 0), the received word will have only the transmitted codeword in a Hamming ball of radius ρ around it. Thus, for random errors, one can correct twice the number of errors uniquely correctable from worst-case errors for any code. A variant of our result also gives a simple algorithm to decode Reed-Solomon codes from random errors that, to the best of our knowledge, runs faster than known algorithms for certain ranges of parameters. 2. We show that concatenated codes can achieve the list decoding capacity for erasures. A similar result for worst-case errors was proven by Guruswami and Rudra (SODA 08), although their result does not directly imply our result. Our results show that a subset of the random ensemble of codes considered by Guruswami and Rudra also achieve the list decoding capacity for erasures. We also show that the exponential list size bound in our result with outer random linear codes cannot be improved using the recent techniques of Guruswami, Hastad and Kopparty that achieved similar improvements for errors. Our proofs employ simple counting and probabilistic arguments.
symposium on theoretical aspects of computer science | 2011
Andrew McGregor; Atri Rudra; Steve Uurtamo
Given a stream of
symposium on reliable distributed systems | 2012
Mohammad Iftekhar Husain; Steve Uurtamo; Steven Y. Ko; Atri Rudra; Ramalingam Sridhar
(x,y)
Electronic Colloquium on Computational Complexity | 2010
Atri Rudra; Steve Uurtamo
points, we consider the problem of finding univariate polynomials that best fit the data. Over finite fields, this problem encompasses the well-studied problem of decoding Reed-Solomon codes while over the reals it corresponds to the well-studied polynomial regression problem. We present one-pass algorithms for two natural problems: i) find the polynomial of a given degree
arXiv: Information Theory | 2012
Mohammad Iftekhar Husain; Steven Y. Ko; Atri Rudra; Steve Uurtamo
k
ALGOSENSORS'10 Proceedings of the 6th international conference on Algorithms for sensor systems, wireless adhoc networks, and autonomous mobile entities | 2010
James Aspnes; Eric Blais; Murat Demirbas; Ryan O'Donnell; Atri Rudra; Steve Uurtamo
that minimizes the error and ii) find the polynomial of smallest degree that interpolates through the points with at most a given error bound. We consider a range of error models including the average error per point, the maximum error, and the number of points that are not fitted exactly. Many of our results apply to both the reals and finite fields. As a consequence we also solve an open question regarding the tolerant testing of codes in the data stream model.
international workshop and international workshop on approximation, randomization, and combinatorial optimization. algorithms and techniques | 2010
Atri Rudra; Steve Uurtamo
This paper presents a storage enforcing remote verification scheme, PGV (Pretty Good Verification). While existing schemes are often developed to handle a malicious adversarial model, we argue that such a model is often too strong of an assumption, resulting in over-engineered, resource-intensive mechanisms. Instead, the storage enforcement property of PGV aims at removing a practical incentive for a storage server to cheat in order to save on storage space in a covert adversarial model. At its core, PGV relies on the well-known polynomial hash, we show that the polynomial hash provably possesses the storage enforcement property and is also efficient in terms of performance. In addition to the traditional application of a client verifying the storage content at a remote server, PGV can also be applied to de-duplication scenarios where the server wants to verify whether the client possesses a significant amount of information about a file (and not just a partial knowledge/fingerprint of the file) before granting access to an existing file. We theoretically prove the power of PGV by combining Kolmogorov complexity and list decoding, and experimentally show the simplicity and low overhead of PGV by comparing it with existing schemes. Altogether, PGV provides a good, practical way to perform storage enforcing remote verification.
Scopus | 2010
J. Aspnes; E. Blais; Murat Demirbas; R. O'Donnell; Atri Rudra; Steve Uurtamo