{"title":"Certification of large distributed computations with task dependencies in hostile environments","authors":"A. Krings, Jean-Louis Roch, S. Jafar","doi":"10.1109/EIT.2005.1626985","DOIUrl":null,"url":null,"abstract":"This research addresses certification of large distributed applications executing in hostile environments, where tasks or the results they produce may have been corrupted due to benign or malicious act. We extend recent results addressing applications with task dependencies and introduce new probabilistic certification algorithms that establish whether the computations have been massively attacked. The probabilistic approach does not make any assumptions about task behavior as the result of an attack and certification errors are only due to unlucky random choices. Bounds associated with certification are provided for general graphs and for out-trees found in medical image analysis applications of the French ragtime project","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2005 IEEE International Conference on Electro Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIT.2005.1626985","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16
Abstract
This research addresses certification of large distributed applications executing in hostile environments, where tasks or the results they produce may have been corrupted due to benign or malicious act. We extend recent results addressing applications with task dependencies and introduce new probabilistic certification algorithms that establish whether the computations have been massively attacked. The probabilistic approach does not make any assumptions about task behavior as the result of an attack and certification errors are only due to unlucky random choices. Bounds associated with certification are provided for general graphs and for out-trees found in medical image analysis applications of the French ragtime project