Abstract 1 Introduction 2 Preliminaries 3 Query complexity separation 4 Randomness complexity separation References

Online Versus Offline Adversaries in Property Testing

Esty Kelman ORCID Boston University, MA, USA
Massachusetts Institute of Technology, Cambridge, MA, USA
Ephraim Linder ORCID Boston University, MA, USA Sofya Raskhodnikova ORCID Boston University, MA, USA
Abstract

We study property testing with incomplete or noisy inputs. The models we consider allow for adversarial manipulation of the input, but differ in whether the manipulation can be done only offline, i.e., before the execution of the algorithm, or online, i.e., as the algorithm runs. The manipulations by an adversary can come in the form of erasures or corruptions. We compare the query complexity and the randomness complexity of property testing in the offline and online models. Kalemaj, Raskhodnikova, and Varma (Theory Comput. ‘23) provide properties that can be tested with a small number of queries with offline erasures, but cannot be tested at all with online erasures. We demonstrate that the two models are incomparable in terms of query complexity: we construct properties that can be tested with a constant number of queries in the online corruption model, but require querying a significant fraction of the input in the offline erasure model. We also construct properties that exhibit a strong separation between the randomness complexity of testing in the presence of offline and online adversaries: testing these properties in the online model requires exponentially more random bits than in the offline model, even when they are tested with nearly the same number of queries in both models. Our randomness separation relies on a novel reduction from randomness-efficient testers in the adversarial online model to query-efficient testers in the standard model.

Keywords and phrases:
Property Testing, Online Adversary, Offline Adversary, Query Complexity, Randomness Complexity, Separations
Funding:
Esty Kelman: Supported in part by the National Science Foundation under Grant No. 2022446 and in part by NSF TRIPODS program (award DMS-2022448).
Copyright and License:
[Uncaptioned image] © Esty Kelman, Ephraim Linder, and Sofya Raskhodnikova; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Streaming, sublinear and near linear time algorithms
Related Version:
Full Version: https://arxiv.org/abs/2411.18617 [22]
Acknowledgements:
The authors thank Uri Meir for fruitful discussions regarding the online model.
Editors:
Raghu Meka

1 Introduction

Property testing [31, 15] aims to lay algorithmic foundations for processing big data. It is a formal study of fast algorithms that accept objects with a given property and reject objects that are far. The goal of this work is to compare models of property testing that address the situations when the data that needs to be analyzed is not only large, but also incomplete or noisy. The models we consider allow for adversarial manipulation of the input, but differ in whether the manipulation can be done only offline, i.e., before the execution of the algorithm, or online, i.e., as the algorithm runs. The manipulations by an adversary can come in the form of erasures or corruptions. The offline erasure-resilient property testing model was proposed by Dixit et al. [9]. The model that captures offline corruptions is called tolerant testing and was introduced by Parnas et al. [25]. The online analogues of these models were recently defined by Kalemaj et al. [21].

We compare the query complexity and the randomness complexity of property testing in the offline and online models. In the offline-erasure model, a constant fraction of the input is erased adversarially before the execution of the algorithm, whereas in the online-erasure model, the adversary is allowed to make a fixed number of erasures after each query. It may seem that the online adversary has strictly more power, and thus testing in the online models should require more queries. Indeed, [21] justify this intuition and show that simple properties – sortedness and the Lipschitz property of sequences – cannot be tested at all with online erasures111In contrast, in the offline models, testing is always possible when the entire input is read., even though they are testable using a small number of queries when erasures are offline. Intuitively, [21] show that testing in the presence of one online erasure per query (performed by an adversary with the knowledge of previous queries) can be harder than testing when a constant fraction of the input is adversarially erased offline (in advance). The following natural open question is stated in [21]: “Is there a property that has smaller query complexity in the online-erasure-resilient model than in the (offline) erasure-resilient model of [9]?” We answer this question in the affirmative: specifically, we construct a property that can be tested with a constant number of queries in the online-erasure model (and even in the (harder) online-corruption model), but requires a nearly linear number of queries in the offline-erasure model. We conclude that the two adversarial erasure models are incomparable.

Our second result concerns the randomness complexity of testing in the online and offline manipulation models. Randomness is an important tool in the design of a wide variety of algorithms, and extensive research has been conducted to understand the power of randomness in computation. The investigation of the randomness complexity of property testing algorithms was initiated by Goldreich and Sheffet [18]. They showed that all property testers in the standard model can be derandomized to a large extent: they can be converted to testers that use the number of random bits that is logarithmic in the size of the input, while incurring at most a constant factor blowup in query complexity. The result of [18] easily extends to all offline testing models, but does not apply in the online setting. Moreover, the existing testers in the online model [21, 24, 6, 33, 3] use lots of randomness to fool the adversary. A natural question that arises is how much derandomization is possible in the online setting. We show that a lot of randomness is sometimes indeed necessary to test in the presence of an online adversary. In particular, we exhibit a property that requires exponentially more random bits to test in the online manipulation model than in the offline manipulation model. This result provides a natural converse to the statement of [24] that “the (online) adversary cannot foil our plan if there is no plan” – i.e., random queries are robust to online manipulation of the input.

1.1 Our results

We represent the input to our property testing algorithm as a string. The algorithm is given access to its input string via queries (specifically, of the form “what is the character at index i?”). For each proximity parameter ε(0,1), the algorithm has to distinguish between strings that have a specified property and strings that are ε-far from having the property – i.e., strings that need to be changed on at least an ε-fraction of indices in order to satisfy the property. The query complexity (the number of queries to the input) of the tester is measured in terms of ε and the input length n. In this section, for simplicity, ε is considered to be a constant and omitted from the statements.

1.1.1 Query complexity: Model Incomparability

We show that the online and offline adversarial models of property testing are incomparable in terms of the query complexity. Recall that [21] prove that sortedness and Lipschitzness of sequences are efficiently testable with offline erasures, but cannot be tested at all even with one online erasure per query222We note that there is an even simpler property than sortedness and Lipschitzness of sequences that is easily testable with offline erasures or corruptions, but is not testable at all with online erasures. Moreover, this property is over the alphabet Σ={0,1}. Specifically, 𝒫={ww:w{0,1}}. We can estimate the distance to this property within additive error ε using O(1ε2) queries (and therefore it is easily tolerantly testable). However, we cannot test it with online erasures because, whenever the tester queries some position p in an input string of length 2n, the adversary can erase the corresponding position (n+p if pn and pn if p>n).. We complement this result with the following theorems, which show that testing in the presence of a small fraction of offline erasures can be harder than testing with online erasures. The first of this theorems (Theorem 1.1) considers the regime with many online erasures per query; the second (Theorem 1.1) considers the regime with one erasure per query. The former exhibits a logarithmic gap in query complexity, where as the latter exhibits a nearly linear gap.

Theorem 1.1 (Informal version of Corollary 3.2).

There exists a property that can be tested using a constant number of queries in the presence of an online adversary that makes O(nlogn) erasures per query; but requires Ω~(logn) queries333The notation Ω~(f(n)) hides polylogf(n) factors, e.g., Ω~(logn)=Ω(logn/polyloglogn). to test when the characters at Θ(nloglogn) indices are erased offline (in advance).

We cannot expect to prove an analogue of Theorem 1.1 for the case when the number of online erasures per query is the same as the total number of offline erasures. This is because, after the first query, an online adversary can erase the same part of the input that the offline adversary would have erased in advance.

 Remark 1.2.

Although the online erasure rate in Theorem 1.1 is very large, the total number of erasures available to the online adversary is smaller than the number of offline erasures we considered. It is an intriguing open question whether there exists a property for which every tester in the online model accumulates at least as many erasures as the best tester in the offline model, but also requires fewer queries to test in the online model than in the offline model.

At the other end of the spectrum, we show that if the number of erasures is much smaller in the online model than in the offline model, then there is an exponentially large gap – i.e., there are properties that can be tested with a constant number of queries when the erasures are online but require a nearly linear number of queries in the offline erasure model.

Theorem 1.3 (Informal version of Corollary 3.3).

There exists a property that can be tested with a constant number of queries in the presence of an online adversary that makes one erasure per query, but requires Ω~(n) queries to test when the characters at Θ(nlogn) indices are erased offline (in advance).

In fact, the query complexity separations in Theorems 1.1 and 1.3 hold even if the online adversary can make corruptions instead of erasures.

To prove Theorems 1.1 and 1.3, we show that any property that separates the offline model from the standard one, i.e., a property that is easy to test in the standard model but hard in the offline model, can be “lifted” to separate the offline and online models. We can then leverage the state of the art separation (between the standard and offline-manipulation testing models) of [5] to obtain strong separations between the online and offline manipulation models.

Our “lifting” operation is simply encoding the property with a repetition code. Intuitively, repetition won’t make the property easier to test in the presence of offline erasures since the same erasures can be made on all copies. Our main technical proof for this part is to show that repetition code is robust against online adversaries. We prove the following general result.

Lemma 1.4 (Informal version of Lemma 3.5).

If a property 𝒫 is testable when no adversary is present then the repeated version 𝒫r, given by concatenating each string in 𝒫 with itself r times, is testable in the presence of an online adversary (as long as the number of erasures per query is not too large).

1.1.2 Randomness complexity separations

As discussed earlier, the investigation of the randomness complexity of property testing algorithms was initiated by Goldreich and Sheffet [18] who showed that every property that is testable in the standard model using q queries can be tested using O(q) queries and O(logn) random bits. We build on their investigation by studying the randomness complexity of the erasure models. Though their result easily extends to the offline models, the same extension does not work in the online model. Indeed, we show that the derandomization of [18] cannot be extended to the online testing model – that is, we construct a property that requires ω(logn) random bits to test in the online model.

Note that a randomness separation trivially holds for properties which are not testable with online erasures, or when the offline-erasure-resilient tester is allowed to query the entire input444In this case, the tester in the offline model is deterministic. Note that it is impossible to deterministically test any nontrivial property in the online model, since the adversary can erase all but the first query made by a deterministic tester.. Prior to our work it was not clear if there is a randomness separation that applies to properties that are testable in the online model, and still holds if we require that the testers in both models to have a sublinear (in n) query complexity.

We demonstrate such a separation. In particular, we show that there exists a property that is testable in both models using a sublinear number of queries, and, moreover, testing this property in the online erasure model requires exponentially more random bits than testing it in the offline erasure model.

Theorem 1.5 (Informal version of Corollary 4.2).

There exists a property that can be tested using O(n) queries in the presence of either an online or an offline adversary. The tester against the offline adversary uses O(logn) random bits, whereas every tester in the presence of an online adversary that makes one erasure per query requires Ω~(n) random bits to succeed with constant probability.

Theorem 1.5 follows easily from a more general result, Theorem 4.1, which we prove in Section 4 and which yields meaningful separations for larger online erasure rates as well. The main technique we develop to prove a lower bound on the randomness complexity of testing with an online adversary is a transformation from randomness-efficient testers in the online model to query efficient testers in the standard model. A special case of the guarantees of our transformation is stated in Lemma 1.6. (The general version appears in Lemma 4.3.)

To prove Theorem 4.1, we combine our transformation with existing results regarding the property of strings called τ-Distinct-Elements, which is parametrized by τ, and consists of strings that have at most τ distinct characters. Testing τ-Distinct-Elements was recently investigated in [17, 2, 1, 20], and it is a natural testing version of the distinct elements approximation problem studied in [28, 32]. For a more detailed exposition regarding the history of the τ-Distinct-Elements property and its variants see [20].

Lemma 1.6 (Special case of Lemma 4.3 for one online erasure per query).

Fix r. If a property 𝒫 can be tested using r random bits in the presence of an online adversary that makes one erasure per query, then 𝒫 can be tested in the standard model (with the same proximity parameter ε) using at most r queries.

The technique from Lemma 1.6, combined with the derandomization results of [18], immediately yields a separation for ε=o(1logn): Consider the property 𝒫{0,1}n of being the zero string. By the folklore property testing bound, Θ(1ε) queries are necessary and sufficient to test 𝒫. By [18], there exists a tester in the offline erasure model that uses O(logn) random bits. However, by Lemma 1.6, every tester in the online model must use Ω(1ε)=ω(logn) random bits. While this works for small ε, the separation we show in Theorem 1.5 (and the more general Theorem 4.1) holds for constant ε as well.

1.2 Related work

Relationship between offline and standard models

In terms of query complexity, testing with offline erasures lies between standard and tolerant testing. By definition, an offline-erasure-resilient tester is also a property tester in the standard model, because it has to work on the inputs with no erasures. Not surprisingly, offline testing with erasures is no harder than offline testing with corruptions. This is formalized in [9, Theorem 1.4] that shows that the existence of a tolerant tester for a property implies the existence of an offline-erasure-resilient tester for that property for a comparable setting of parameters. There are also separations that show that standard testing is strictly easier than offline-erasure-resilient testing, which in turn is strictly easier than tolerant testing. Specifically, Dixit et al. [9] showed that a property defined by Fischer and Fortnow [13] can be tested in the standard model with a constant number of queries, but requires nΩ(1) queries in the offline-erasure-resilient model. This separation was strengthened by Ben-Eliezer et al. [5], improving nΩ(1) to Ω~(n). Finally, Raskhodnikova et al. [29] prove a separation similar to that of [9] between offline-erasure-resilient testing and tolerant testing. Thus, at a high level, we have a complete picture in terms of the relative difficulty of testing in the three offline models.

Relationship between offline and online testing

Kalemaj et al. [21] exhibit two properties of strings for which testing with online erasures is impossible for every proximity parameter ε12, whereas testing in the offline models is easy. The first property, sortedness, consists of sorted arrays, i.e., strings x of length n such that xixi+1 for all i[n1]. The query complexity of testing sortedness (for constant ε) is Θ(logn) in both the standard and the offline erasures model (when the erased part is at most a constant fraction of the input) [11, 10, 26, 12, 7, 8, 27, 4, 9]. The second property, Lipschitzness, consists of strings x{0,1,2}n satisfying |xixi+1|1 for all i[n1]. It can be tested with Θ(1ε) queries in both the standard and the offline models [19, 9].

2 Preliminaries

Notation

We use [n] to denote the set of integers {1,2,,n}, and to denote the set of positive integers.

Property testing

We start by stating standard property testing definitions. We represent an input to a property testing algorithm as a string of length n over some alphabet Σn that might depend on n. For example, Σn might be {0,1} or [n].

Definition 2.1 (Relative Hamming distance, property, ε-far).

The relative Hamming distance between two strings x,y of length n is δH(x,y)=Pri[n][xiyi] where i is uniformly random index from [n]. For a set 𝒮 of strings of length n, define δH(x,𝒮)=miny𝒮δH(x,y). A property 𝒫 is a subset of Σ given by n𝒫n, where each 𝒫n consists of strings of length n over some alphabet Σn. A string x of length n is ε-far from 𝒫 if δH(x,𝒫n)ε.

Definition 2.2 (ε-tester in the standard model [31, 15]).

For every property 𝒫Σ and proximity parameter ε(0,1), an algorithm 𝒯 is an ε-tester for 𝒫 if, given a parameter n and oracle access to input xΣn, the algorithm 𝒯 accepts with probability at least 23 whenever x𝒫 and rejects with probability at least 23 whenever x is ε-far from 𝒫. A tester has a one-sided error if it always accepts inputs x𝒫.

Offline manipulations

The offline model with erasures was introduced by [9] and subsequently studied in [30, 29, 5, 23]. The definition we use here is adapted from [23] and only differs from the original definition in how the parameter ε is interpreted. We use to denote an erased symbol in the input.

Definition 2.3 (α-erased string, completion).

For each α(0,1), a string x(Σ{})n is α-erased if at most an α fraction of symbols in it are . The indices of the symbols in the string are called erased. A string yΣn that differs from a string x(Σ{})n only on indices erased in x is called a completion of x.

Definition 2.4 (Offline-erasure-resilient tester [9]).

For every property 𝒫Σ and parameters α[0,1) and ε(0,1), an algorithm 𝒯 is an α-offline-erasure-resilient ε-tester for 𝒫 if, given a parameter n and oracle access to an α-erased input xΣn, the algorithm 𝒯 accepts with probability at least 23 whenever there exists a completion y𝒫 of x and rejects with probability at least 23 whenever every completion y of x is ε-far from 𝒫.

When α=0, the α-offline-erasure-resilient model is the same as the standard model. Another generalization of property testing is tolerant testing, introduced by [25] and extensively studied over the last decades. It can be viewed as guaranteeing resilience to an α fraction of the input being corrupted by an offline adversary.

Definition 2.5 ((α,ε)-tolerant tester [25]).

For every property 𝒫Σ and parameters α,ε(0,1), an algorithm 𝒯 is an (α,ε)-tolerant tester for 𝒫 if, given a parameter n and oracle access to input xΣn, the algorithm 𝒯 accepts with probability at least 23 whenever x is α-close to 𝒫 and rejects with probability at least 23 whenever x is ε-far from 𝒫.

When we want to stress comparison to other models we study, we call an (α,ε)-tolerant tester an α-offline-corruption-resilient ε-tester.

Online manipulations

In this model, the input string xΣn is accessed via an adversarial oracle 𝒪. After answering each query made by the algorithm, the adversary can erase or corrupt a small number of data points. At the beginning of the execution of the algorithm, 𝒪(i)=xi for all i[n]. So, the first query is always answered correctly. The number of queries the adversary can manipulate after answering each query is parameterized by t. The manipulated values are used by the oracle to answer future queries to the corresponding indices. The algorithm does not know which input locations have been tempered with. As stated in [21], “the actions of the oracle can depend on the input, the queries made so far, and even on the publicly known code that the algorithm is running, but not on future coin tosses of the algorithm.”

Definition 2.6 (Adversarial oracle, online testers [21]).

Fix t. A t-online-erasure oracle can replace values 𝒪(i) on up to t indices i[n] with the erasure symbol after answering each query. A t-online-corruption oracle is defined analogously, except that it replaces each symbol with an arbitrary symbol from Σ instead of erasing it. For each t, a t-online-erasure-resilient ε-tester 𝒯 is defined as in the standard model (Definition 2.2), except that it accesses its input via a t-online-erasure oracle as opposed to querying the input directly. The t-online-corruption-resilient ε-tester is defined analogously.

The standard property testing model is a special case of this enhanced model and corresponds to the case when t=0. Moreover, it is clear from the definition that testing with online erasures is no harder than testing with online corruptions. Specifically, every t-online-corruption-resilient tester can be simulated by a tester that accesses its input via a t-online-erasure oracle – the tester can simply replace each with an arbitrary value from Σ.

3 Query complexity separation

In this section, we prove that testing with an offline adversary can require more queries than testing with an online adversary.

Theorem 3.1 (Query complexity separation).

Fix and let r=r(n)<n be a function of the input length n. There exists a property 𝒫{0,1} and a constant ε1=ε1()(0,1) such that:555We use log() to denote the log function applied times.

  1. 1.

    For all ε(0,1) and t=(ε2)O()r, the property 𝒫 is t-online-corruption-resiliently ε-testable using (2ε)O() queries.

  2. 2.

    For all n, ε(0,ε1), and α=Ω(1log()(n/r)) such that ε+α<1, every α-offline-erasure-resilient ε-tester for 𝒫 must make Ω(nrpolylog()(n/r)) queries on inputs of length n.

For =1 and r=nlogn, we obtain the following corollary.

Corollary 3.2.

There exist a property 𝒫 such that for all ε(0,1) and tpoly(ε)nlogn, the property 𝒫 is ε-testable using poly(1ε) queries in the t-online-corruption model. However, for all α=Ω(1loglogn) such that α+ε<1, every α-offline-erasure-resilient ε-tester requires Ω~(logn) queries.

While Corollary 3.2 shows that testing in the α-offline-erasure model can be harder than testing in the t-online-model for large t and small α, the difference in query complexity is quite mild. To obtain a large gap in query complexity from Theorem 3.1, we fix and constant proximity parameter εε1(), and r=r(ε,) such that t=1. This yields the following corollary.

Corollary 3.3.

Fix and a constant ε=ε(). There exists a property 𝒫 such that 𝒫 is ε-testable in the 1-online-corruption model using constantly many queries. But, for all α=Ω(1log()n) such that α+ε<1, every α-offline-erasure-resilient ε-tester requires Ω(n/polylog()n) queries.

One feature of the results in Theorem 3.1 (as well as Corollaries 3.2 and 3.3) is that they hold even when the adversary in the online model is allowed to make corruptions, while the adversary in the offline model is restricted to erasures.

To prove Theorem 3.1, we introduce the following “lifting” result (Lemma 3.5). Informally, the lemma states that every property 𝒫 that is testable in the standard model has an encoding 𝒫 that is testable with the same query complexity even in the presence of an online-corruption adversary. This result allows us to transfer existing separations between the standard model and the offline-erasure model to a separation between the online-corruption model and the offline-erasure model.

To “lift” a property 𝒫, we simply encoded it with a repetition code, that is, repeat the corresponding input string.

Definition 3.4 (r-concatenated string xr and property 𝒫r).

For all r and strings x, let xr denote the concatenation of r copies of x, written xr[1]xr[2]xr[r]. Additionally, for a property 𝒫 of strings, let 𝒫r denote the property {xr:x𝒫}.

Our lifting lemma holds for properties of strings over any alphabet.

Lemma 3.5 (Lifting lemma).

Let Σ be an alphabet and δ(0,1) be a sufficiently small constant. Let 𝒫Σ be a property of strings that is ε-testable in the standard model using q(m,ε) queries on inputs of length m, where q(m,ε)=Ω(1ε). Then, for all r and tδr[q(m,ε2)logq(m,ε2)]2, the property 𝒫r is t-online-corruption-resiliently ε-testable using O~(q(m,ε2)) queries on inputs of length n=mr.

Next we use Lemma 3.5 to prove Theorem 3.1, deferring the proof of Lemma 3.5 to Section 3.1. We leverage the following result of Ben-Eliezer, Fisher, Levi, and Rothblum [5], which separates the offline-erasure-resilient model from the standard model.

Theorem 3.6 ([5, Theorem 6.2]).

For all constant , there exist a property 𝒬(){0,1} and a constant ε1=ε1()(0,1) such that the following hold:

  1. 1.

    For every ε(0,1), the property 𝒬() can be ε-tested using (2ε)O() queries.

  2. 2.

    For all m, ε(0,ε1), and α=Ω(1/log()m) satisfying ε+α<1, every α-erasure resilient ε-tester for 𝒬() must make Ω(m/(10polylog()m)) queries on inputs of length m.

Proof of Theorem 3.1.

Fix and let m,r be sufficiently large. Let 𝒫 denote the property 𝒬() of strings of length m given by Theorem 3.6. By Theorem 3.6, the property 𝒫 can be ε-tested using (2ε)O() queries. Thus, Lemma 3.5 guarantees that for all t=(ε2)O()r, the property 𝒫r is t-online-corruption-resiliently ε-testable using (2ε)O() queries on inputs of length n=mr.

Now we prove that 𝒫r requires Ω(nrpolylog()(n/r)) queries to ε-test in the α-offline-erasure-resilient model. To do that, we show how to use any α-offline-erasure-resilient ε-tester 𝒯r for 𝒫r to construct an α-offline-erasure-resilient ε-tester 𝒯 for 𝒫 with the same query complexity as 𝒯r. Given a string xr, let xr[i]j denote index j of the i-th copy of x. Observe that for every α-erased input x, the string xr is also α-erased and the distance of x from 𝒫 is the same as the distance of xr from 𝒫r; moreover, for all i[r] and j[m], we have xr[i]j=xj. Thus, the tester 𝒯, given query access to x, can simulate 𝒯r executed with query access to xr and output the result given by 𝒯r. By Theorem 3.6, the tester 𝒯r has query complexity Ω(mpolylog()m)=Ω(nrpolylog()(n/r)) whenever α=Ω(1log()(n/r)).

3.1 Proof of the lifting lemma (Lemma 3.5)

Recall that Lemma 3.5 states that if a property 𝒫 is testable in the standard model, then the property 𝒫r is testable in the online-corruption model. Let 𝒯 be an ε-tester for 𝒫 that has failure probability 112, and query complexity c0q(m,ε) for some constant c0>0 (we can obtain such a tester via standard amplification techniques). We construct a tester 𝒯 for 𝒫r (Algorithm 1) and show that it is t-online-corruption-resilient. The tester 𝒯 consists of two phases: first, 𝒯(s) calls repetition-test (Algorithm 2) to test that s is a repetition of some string, w, and second, 𝒯(s) simulates 𝒯 with query access to w.

For a string s of length n=rm composed of r substrings each of length m, we use the notation s[i]j to denote index j, in the i-th substring of s.

Algorithm 1 t-online-corruption-resilient ε-tester 𝒯.

Parameters: length parameter m, repetition parameter r, proximity parameter ε(0,1)
Input: query access to string s=s[1]s[r] such that |s[i]|=m for each i[r]
Subroutines: repetition-test (Algorithm 2) and c0q(m,ε)-query tester 𝒯 for 𝒫

1:c124c0
2:if repetition-test(s,ε2) rejects then reject
3: simulate 𝒯 with proximity parameter ε2, answering each query j made by 𝒯 as follows: sample a set of d=log(c1q(m,ε2)) uniform indices i1,,id[r] if there exists a pair of indices k,k[d] such that s[ik]js[ik]j then reject else provide the answer s[i1]j to 𝒯
4:if the simulation of 𝒯 rejects then reject
5:else accept
Algorithm 2 repetition-test.

Parameters: length parameter m, repetition parameter r, proximity parameter ε(0,1)
Input: query access to string s=s[1]s[r] such that |s[i]|=m for each i[r]

1:repeat 2ε times: sample i1,i2[r] and j[m] uniformly and independently at random
2:if s[i1]js[i2]j then reject
3:else accept

We start by analyzing repetition-test (Algorithm 2).

Claim 3.7.

For all alphabets Σ and parameters ε(0,1) and r,m, repetition-test is a one-sided error ε-tester for the repetition code defined as 𝒞m,r={sr:sΣm}. It makes O(1ε) queries and has error probability at most 16.

Proof.

Let s=s[1]s[r], where s[i]=s[i]1s[i]m for all i[r], be the input string over the alphabet Σ. If s𝒞m,r, then repetition-test always accepts s.

Suppose that string s is ε-far from 𝒞m,r. Let pluralityi[r](ai) denote a function that takes inputs a1,,arΣ and outputs the most frequent among them, resolving ties arbitrarily. Let w^ be the string of length m defined by w^j=pluralityi[r]s[i]j for all j[m]. Since s is ε-far from 𝒞m,r, we can bound the distance between the input string and w^ repeated r times:

δH(s,w^r)ε. (1)

For all j[m] and aΣ, let pj(a) denote Pri[r][s[i]j=a], the probability that a randomly chosen repetition of the j-th character in s is equal to a. The probability that one iteration of the loop in repetition-test accepts s is

Pri1,i2[r]j[m][s[i1]j=s[i2]j] =1mj[m]aΣ[pj(a)]2 by law of total probability
1mj[m]pj(w^j)aΣpj(a)   as pj(a)pj(w^j)j[m],aΣ
=1mj[m]pj(w^j) since aΣpj(a)=1j[m]
=Pri[r]j[m][s[i]j=w^j] by law of total probability
=1δH(s,w^r) by definition of δH
1ε by (1).

Hence, each iteration of the loop in repetition-test rejects with probability at least ε. Therefore, repetition-test accepts s with probability at most (1ε)2/εeε2/ε16.

Next, we analyze the tester 𝒯.

Claim 3.8 (𝒯 is a tester in the standard model).

For all ε(0,1),r, alphabets Σ, and properties 𝒫Σ, Algorithm 1 is an ε-tester for 𝒫r in the standard model (without any adversary). Moreover, it accepts ε-far inputs with probability at most 16, and has one-sided error whenever 𝒯 has one-sided error.

Proof.

If the input s is in 𝒫r then s=wr for some string w𝒫. In this case, repetition-test accepts with probability 1, and 𝒯 accepts with the same probability as 𝒯. Next, suppose s is ε-far from 𝒫r. Consider the string w^Σm, where w^j=pluralityi[r]s[i]j for all j[m]. Recall that the repetition code is defined as 𝒞m,r={sr:sΣm}. Observe that the distance from s to 𝒞m,r is equal to δH(s,w^r). If this distance is at least ε2 then, by 3.7, repetition-test accepts with probability at most 16, completing the proof.

Now assume δH(s,w^r)<ε2. We will show that, in this case, the simulation of 𝒯 in Algorithm 1 accepts with probability at most 16. Specifically, we consider two failure events: let E1 be the event that the simulation of 𝒯 feeds 𝒯 at least one query answer inconsistent with w^, and E2 be the event that the simulation of 𝒯 accepts string w^. We will show that Pr[E1]112 and Pr[E2]112. Then a union bound over E1 and E2 completes the proof.

Since s is ε-far from 𝒫r and δH(s,w^r)<ε2, we get

εδH(s,𝒫r)δH(s,w^r)+δH(w^r,𝒫r)ε2+δH(w^,𝒫),

implying that δH(w^,𝒫)ε2. Since 𝒯 is a tester for 𝒫 with amplified success probability, and w^ is ε2-far from 𝒫, algorithm 𝒯 accepts with probability at most 112 when run on input w^ and with proximity parameter ε2; that is, Pr[E2]112.

Next we analyze Pr[E1]. Fix j[m], and let aj denote the answer provided by 𝒯 to query j in the simulation. If 𝒯 does not reject while simulating this query, then

Pr[ajw^j] =Pri1,,id[r][s[ik]j=s[ik]js[ik]jw^jk,k[d]]
=Pri1,,id[r][s[ik]j=s[i1]jk{2,,d}s[i1]jw^j]Pri1[r][s[i1]jw^j]
2d+1 (2)
=2(c1q(m,ε/2))1.

The inequality in (2) follows from the following simple observation: once s[i1]j has been sampled, if it is not the plurality, then for each k{2,,d}, every subsequent s[ik]j is equal to s[i1]j with probability at most 12. By our choice of c1, and a union bound over all the c0q(m,ε/2) queries made by 𝒯, the probability of E1 is at most 112.

Since 𝒯 can accept only if E1E2 occurs, a union bound over E1 and E2 implies that 𝒯 is indeed a tester for 𝒫r, and has error probability at most 16 when no adversary is present.

Finally, we prove the lifting lemma.

Proof of Lemma 3.5.

First, we argue that the probability 𝒯 (Algorithm 1) queries a corrupted index is small. Recall that n=mr is the length of the input to 𝒯 and that c0q(m,ε) is the query complexity of 𝒯 with proximity parameter ε. Let q=q(n,ε)=8ε+c0q(m,ε2)log(c1q(m,ε2)) be the number of queries made by 𝒯. Then, there are at most qt corruptions at any point during the execution. Moreover, each query made by 𝒯 is an index that is uniform over the set of corresponding indices in the r different segments of s. It follows that each query made by 𝒯 is corrupted with probability at most qtr. By a union bound over the q queries,

Pr[𝒯 queries a corrupted index](q)2tr16. (3)

The upper bound follows from the hypothesis that tδr[q(m,ε/2)logq(m,ε/2)]2, that q(m,ε)=Ω(1ε), and that δ is a sufficiently small constant. By a union bound, the probability that 𝒯 errs in the presence of the adversary is at most the probability 𝒯 errs when no adversary is present plus the probability 𝒯 queries a corrupted index. By 3.8 and (3), this probability is at most 13, which completes the proof of Lemma 3.5.

4 Randomness complexity separation

In this section, we prove our result separating the randomness complexity of testing in the online and offline models.

Theorem 4.1 (Randomness separation).

For all τ=τ(n), there exist a property 𝒫(τ)=n𝒫n(τ), where 𝒫n(τ)[n]n, and an algorithm 𝒯 that takes ε(0,1) as an input and, for all ε(0,1), is a one-sided error ε-tester for 𝒫(τ) that make O(τε) queries. Additionally, the following hold:

  1. 1.

    For all ε,α(0,1), tester 𝒯 is an α-offline-erasure-resilient ε-tester for 𝒫(τ). Moreover, 𝒯 can be simulated using O(logn) random bits and no additional queries.

  2. 2.

    For all ε(0,1) and t(0.01εnτ)2, tester 𝒯 is a t-online-erasure-resilient ε-tester for 𝒫(τ).

  3. 3.

    There exists a constant ε>0 such that for all t and τ0.01nlogn, every t-online-erasure-resilient ε-tester for 𝒫(τ) uses Ω(τlog(t+1)logτ) random bits. Moreover, if the tester has one-sided error, then it uses Ω(τlog(t+1)) random bits.

Theorem 4.1 yields meaningful separations for all settings of τ between Ω(logn) and O(nlogn). As an example, the following corollary is derived by setting τ=0.01εnlogn and t=1.

Corollary 4.2.

There exists a property that can be ε-tested (for every constant ε) using O(nlogn) queries in the presence of either an online or offline adversary. The offline-erasure-resilient tester uses O(logn) random bits, but there exists a constant ε such that every 1-online-erasure-resilient ε-tester, requires Ω(npolylogn) random bits to succeed with constant probability. Moreover, if the 1-online-erasure-resilient tester has one-sided error then it requires Ω(n) random bits.

To prove our randomness lower bound, we present a general reduction from randomness-efficient testers in the online-erasure model to query-efficient testers in the standard model.

Lemma 4.3 (Generalization of Lemma 1.6).

For all r,t and properties 𝒫, if 𝒫 is ε-testable in the presence of a t-online-erasure adversary using only r bits of randomness then 𝒫 is ε-testable in the standard model using at most rlog(t+1) queries.

Proof.

Let 𝒯 be a t-online-erasure-resilient ε-tester for 𝒫 that uses at most r random bits. We construct an adversary that allows 𝒯 to make at most rlog(t+1) non-erased queries. Consider the following random seed elimination adversary 𝒜. Given an input x, the description of algorithm 𝒯, and query-answer history of 𝒯 on input x, the adversary simulates the next query of 𝒯 on every random seed s{0,1}r that is consistent with the query-answer history of 𝒯 thus far and erases the t most queried indices of x. Intuitively, these are the indices that are most likely to be queried by the tester at this step, based on the random seeds that are consistent with the current query-answer history. Each index that the oracle decides not to erase at this step can appear in at most 1t+1 fraction of currently relevant random seeds. If 𝒯 queries such an index, all random seeds that would have lead to a different query can be eliminated. Thus, each time 𝒯 makes a non-erased query, at most a 1t+1 fraction of the relevant random seeds remain. Consequently, 𝒯 can make at most rlog(t+1) non-erased queries before 𝒜 can exactly determine the random seed being used. Once 𝒜 determines the random seed, it can exactly predict the queries of 𝒯 and erase all of them.

Next, we use the adversary strategy 𝒜 to construct an rlog(t+1)-query tester for 𝒫. Let 𝒯 be defined as follows. Draw a random seed s{0,1}r and simulate 𝒯 with random seed s. After making each query, 𝒯 simulates 𝒜 with the query-answer history of 𝒯. If 𝒜 erases the next query of 𝒯, then 𝒯 answers the query with and continues the simulation (the algorithm 𝒯 need not make any queries in this case). Otherwise, if 𝒜 does not erase the next query of 𝒯, then 𝒯 queries x, provides 𝒯 with the answer, and continues the simulation. Since 𝒯 makes at most rlog(t+1) non-erased queries and successfully tests 𝒫, the algorithm 𝒯 makes at most rlog(t+1) queries and also successfully tests 𝒫.

4.1 The 𝝉-Distinct-Elements property

The property testing problem we use to prove Theorem 4.1 is a version of support size approximation. In support size approximation, one is given sample access to a distribution 𝒟 over the domain [n] and asked to approximate |supp(𝒟)| up to additive error ε. We study the analogous testing problem over strings: Given parameters τ and ε(0,1), and a string x of length n, we wish to ε-test whether |{x1,x2,,xn}|τ, that is, to determine whether x has at most τ distinct elements or x is ε-far from every x (of length n) with at most τ distinct elements.

Definition 4.4 (τ-Distinct-Elements).

For all n and τ=τ(n), let 𝒫n(τ) be the set of strings in [n]n with at most τ distinct symbols. The property τ-Distinct-Elements is defined as 𝒫(τ)=n𝒫n(τ).

The following tester for τ-Distinct-Elements appeared in [17]. We include the analysis of its guarantees here for completeness.

Fact 4.5 (A tester for τ-Distinct-Elements).

For all ε(0,1), there exists a one-sided error tester for 𝒫(τ) that uses O(τε) samples and fails with probability at most 110.

Proof.

We first make the following observation: if x is ε-far from 𝒫(τ), then every collection of τ distinct elements occupies at most a 1ε fraction of the indices in x. Suppose we sample uniformly random elements from x until we have seen τ+1 distinct elements. Notice that while we have seen at most τ distinct elements, our next sample is a new distinct element with probability at least ε (the at most τ distinct elements we have seen can have probability mass at most 1ε). Let Xi be the number of samples to get the i-th distinct element given we have seen i1 distinct elements, and set X=i=1τ+1Xi. Then 𝔼[X](τ+1)/ε, and hence, by Markov’s inequality, the probability we need more than 3(τ+1)/ε samples is at most 13. This analysis inspires the following simple tester:

Sample s=3(τ+1)/ε elements from x and accept if and only if there are at most τ distinct symbols from [n] in the sample (not counting the erasure symbol ).

Repeating the tester constantly many times suffices to make the failure probability smaller than 110.

Recall that Lemma 4.3 states that to prove a lower bound on the randomness complexity of testing in the online model, it suffices to prove a lower bound on the query complexity of testing in the standard model. In Lemma 4.6, we show a lower bound on the query complexity of testing τ-Distinct-Elements. Our lower bound is a direct corollary of the lower bound of [32].

Lemma 4.6 (Query lower bound for testing τ-Distinct-Elements).

There exists ε(0,1) such that for all input lengths n, if τnlogn, then the query complexity of ε-testing 𝒫(τ) is Ω(τlogτ). Moreover, the query complexity of ε-testing 𝒫(τ) with one-sided error is Ω(τ).

Proof.

We use the following fact to argue that we can assume the tester is sample-based with no loss of generality.

Fact 4.7 (Theorem 6.1 [16]).

A property of strings is symmetric if it is closed under permutations of the string indices (that is, under reordering of the characters in the string). Let 𝒫 be a symmetric property of strings that is ε-testable with query complexity q. Then there exists a sample-based tester for 𝒫 with sample complexity O(q).

Since 𝒫(τ) is symmetric, we can without loss of generality consider sample-based testers. First, we prove the lower bound for two-sided error testers. The essence of our proof is a reduction from the hard instances used in [32] for estimating the support size of a distribution. While we cannot use the lower bound of [32] as a black box, we can nonetheless leverage their hard instances. Indeed, combining Theorem 1, Fact 5, and the remarks regarding the support size of their hard distributions (following Definition 12) from [32], we obtain the following immediate corollary.

Fact 4.8 (Support size approximation lower bound [32]).

Let α>0 be a sufficiently small constant. There exist distributions 𝒟+ and 𝒟 over [m] such that

  1. 1.

    Every element in the support of 𝒟+ or 𝒟 has probability mass at least 1m.

  2. 2.

    |supp(𝒟+)|m(12+α), and 𝒟 is (122α)-far from every distribution with support size at most m(12+α).

Moreover, every algorithm that successfully distinguishes 𝒟+ from 𝒟 with constant probability requires Ω(mlogm) samples.

While the distributions in [32] are defined over , they all have support size at most m. Thus, we can, without loss of generality, consider distributions over [m]. Indeed, given a distribution 𝒟 over , the distribution 𝒟π obtained by choosing a uniformly random permutation π of [m], and then mapping the i-th element in the support of 𝒟 to π(i), has domain [m] and the same support size as 𝒟. Moreover, if two distributions 𝒟0 and 𝒟1 each have support size at most m, then for b{0,1}, the distribution 𝒟bπ can be generated by first, sampling a random permutation π of [m], second, sampling from 𝒟b, and third, sending each distinct sample to the first available element of π. Thus, any algorithm which distinguishes 𝒟1π and 𝒟0π can be used to distinguish 𝒟0 and 𝒟1 with the same sample complexity.

To apply 4.8 in our setting, we note that whenever mnlogn, there exists x[m]n such that the distribution obtained by sampling a uniform index in x has total variation distance at most mn=1nlogn from 𝒟. Thus, for sufficiently large n, there exist strings x+,x[m]n such that x+ has at most m(12+α) distinct symbols, and the distributions generated by sampling from x+ and x have total variation distance 1nlogn from 𝒟+ and 𝒟, respectively. Let τ=m(12+α) and ε=122αo(1), then x+𝒫(τ) and x is ε-far from 𝒫(τ). By 4.8, every algorithm for distinguishing x+ from x uses Ω(mlogm)=Ω(τlogτ) samples. By 4.7, every tester for 𝒫(τ) has query complexity Ω(τlogτ).

To prove the one-sided error lower bound, it suffices to note that every one-sided error algorithm must accept if its sample contains at most τ symbols. Thus, every one-sided error tester requires Ω(τ) samples. This completes the proof of Lemma 4.6.

4.2 Proof of the randomness separation (Theorem 4.1)

To complete the proof of the theorem, we argue that the tester given by 4.5 is a valid tester for τ-Distinct-Elements in both the online and offline erasure models. To prove the lower bound on the randomness complexity of testing τ-Distinct-Elements in the online model, we combine the query lower bound of Lemma 4.6 with the reduction stated in Lemma 4.3. To prove the upper bound on the randomness complexity of testing τ-Distinct-Elements in the offline model, we argue that the offline tester can be simulated with few bits of randomness at a small cost in error probability.

We first prove the part of the theorem regarding testing τ-Distinct-Elements in the offline erasure model.

Proof of Theorem 4.1, Item 1.

First, for all τ, we construct an offline-erasure-resilient tester for τ-Distinct-Elements, and second, we argue that the tester can be simulated with O(logn) random bits and no additional queries. Let 𝒯 be the tester given by 4.5. Recall that 𝒯 accepts if and only if the number of nonerased symbols in the sample is at most τ. Below, we argue that 𝒯 is an α-offline-erasure-resilient ε-tester.

Let x be an α-erased string in [n]n. If some completion of x is in 𝒫(τ), then the number of nonerased symbols in the sample drawn by 𝒯 is at most τ, so the algorithm accepts. Next we argue that 𝒯 accepts with probability at most 14 when every completion of x is ε-far from 𝒫(τ). Let x denote the erased portion of x, and x denote the nonerased portion of x. Notice that |x|=(1α)n, and thus if x is ε1α-close to 𝒫(τ), then there is a completion of x that is ε-close to 𝒫(τ) (change εn symbols in x and fill out x with an arbitrary symbol from x). Thus, if every completion of x is ε-far from 𝒫(τ), then x is ε1α-far from 𝒫(τ). By the proof of 4.5, a set of O(τ(1α)ε) uniform and independent samples from x contains at least τ+1 distinct symbols with probability at least 910. Moreover, a sample of O(τε) elements from x contains Ω(τ(1α)ε) such samples from x with probability at least 910. By the union bound, 𝒯 accepts x with probability at most 14.

It remains to show that 𝒯 can be simulated by a tester 𝒯 that uses O(logn) random bits and has the same query complexity as 𝒯. 4.9 states that any randomized oracle machine that solves a promise problem can be simulated using logn+loglog|Σ|+O(1) random bits, where |Σ| is the size of the alphabet. This fact was originally proven by Goldreich and Sheffet [18] and is stated as an exercise in [14]. We use the statement from the exercise since it is more convenient for our setting.

Fact 4.9 (Exercise 1.21 [14]).

Fix n and let Π be a promise problem regarding strings in Σn. Suppose that is a randomized q-query oracle machine that solves Π with error probability at most 14. Then there exists a randomized q-query oracle machine that solves Π with error probability at most 13 and logn+loglog|Σ|+O(1) random bits.

Let Π be the promise problem defined by α-offline-erasure-resilient ε-testing 𝒫(τ). By the first part of the proof, there exists a randomized oracle machine 𝒯 that solves Π with error probability at most 14. Applying 4.9 directly, we see that 𝒯 can be simulated by a tester 𝒯 using logn+loglog|Σ|+O(1) random bits; since Σ=[n], tester 𝒯 uses O(logn) random bits, and has error probability at most 13. To complete the proof, it suffices to note that 𝒯 has the same query complexity as 𝒯.

Next, we prove the part of the theorem regarding testing τ-Distinct-Elements in the online erasure model.

Proof of Theorem 4.1, Items 2 and 3.

We will show that for all τ, the tester given by 4.5 is online-erasure-resilient. Let 𝒯 be the tester for τ-Distinct-Elements given by 4.5. Recall that 𝒯 accepts if and only if the number of nonerased symbols in its sample is at most τ. We show that 𝒯 can test in the presence of a t-online-erasure-oracle, by arguing that with high constant probability, none of the queries made by 𝒯 are erased. Notice that with proximity parameter ε, the tester makes O(τε) queries. Thus, there are O(tτε) erasures at every point during the execution of 𝒯. Since 𝒯 makes uniform and independent queries, the probability that any particular query is erased is O(tτnε). Since 𝒯 makes O(τε) queries, we can apply the union bound to see that some query is erased with probability at most O(tτ2nε2). By the hypothesis that t(.01εnτ)2, we have O(tτ2nε2).01 – that is, 𝒯 sees an erasure with probability at most .01. By 4.5, the algorithm 𝒯 is a t-online-erasure-resilient ε-tester for 𝒫(τ). Moreover, since an erasure cannot increase number of distinct nonerased symbols in x, tester 𝒯 has one-sided error. This completes the proof of Item 2.

To see why Item 3 holds, recall that by Lemma 4.6, there exists ε(0,1) such that for all n,τ with τnlogn, every ε-tester for 𝒫(τ) has query complexity Ω(τlogτ). Similarly every tester with one-sided error has query complexity Ω(τ). Thus, applying Lemma 4.3, the reduction from query complexity to randomness complexity, suffices to complete the proof.

References

  • [1] Tomer Adar and Eldar Fischer. Refining the adaptivity notion in the huge object model. In Amit Kumar and Noga Ron-Zewi, editors, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2024, August 28-30, 2024, London School of Economics, London, UK, volume 317 of LIPIcs, pages 45:1–45:16. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.APPROX/RANDOM.2024.45.
  • [2] Tomer Adar, Eldar Fischer, and Amit Levi. Support testing in the huge object model. In Amit Kumar and Noga Ron-Zewi, editors, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2024, August 28-30, 2024, London School of Economics, London, UK, volume 317 of LIPIcs, pages 46:1–46:16. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.APPROX/RANDOM.2024.46.
  • [3] Vipul Arora, Esty Kelman, and Uri Meir. On optimal testing of linearity. In Symposium on Simplicity in Algorithms (SOSA). SIAM, 2025. To appear.
  • [4] Aleksandrs Belovs. Adaptive lower bound for testing monotonicity on the line. In Proceedings of Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM), pages 31:1–31:10, 2018. doi:10.4230/LIPIcs.APPROX-RANDOM.2018.31.
  • [5] Omri Ben-Eliezer, Eldar Fischer, Amit Levi, and Ron D. Rothblum. Hard properties with (very) short PCPPs and their applications. In Proceedings, Innovations in Theoretical Computer Science (ITCS), pages 9:1–9:27, 2020. doi:10.4230/LIPIcs.ITCS.2020.9.
  • [6] Omri Ben-Eliezer, Esty Kelman, Uri Meir, and Sofya Raskhodnikova. Property testing with online adversaries. In Venkatesan Guruswami, editor, 15th Innovations in Theoretical Computer Science Conference, ITCS 2024, January 30 to February 2, 2024, Berkeley, CA, USA, volume 287 of LIPIcs, pages 11:1–11:25. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.ITCS.2024.11.
  • [7] Arnab Bhattacharyya, Elena Grigorescu, Kyomin Jung, Sofya Raskhodnikova, and David P. Woodruff. Transitive-closure spanners. SIAM Journal on Computing, 41(6):1380–1425, 2012. doi:10.1137/110826655.
  • [8] Deeparnab Chakrabarty and C. Seshadhri. An optimal lower bound for monotonicity testing over hypergrids. Theory of Computing, 10:453–464, 2014. doi:10.4086/toc.2014.v010a017.
  • [9] Kashyap Dixit, Sofya Raskhodnikova, Abhradeep Thakurta, and Nithin Varma. Erasure-resilient property testing. SIAM Journal on Computing, 47(2):295–329, 2018. doi:10.1137/16M1075661.
  • [10] Yevgeniy Dodis, Oded Goldreich, Eric Lehman, Sofya Raskhodnikova, Dana Ron, and Alex Samorodnitsky. Improved testing algorithms for monotonicity. In Proceedings of Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM), pages 97–108, 1999. doi:10.1007/978-3-540-48413-4_10.
  • [11] Funda Ergün, Sampath Kannan, Ravi Kumar, Ronitt Rubinfeld, and Mahesh Viswanathan. Spot-checkers. J. Comput. Syst. Sci., 60(3):717–751, 2000. doi:10.1006/JCSS.1999.1692.
  • [12] Eldar Fischer. On the strength of comparisons in property testing. Inf. Comput., 189(1):107–116, 2004. doi:10.1016/j.ic.2003.09.003.
  • [13] Eldar Fischer and Lance Fortnow. Tolerant versus intolerant testing for boolean properties. Theory Comput., 2(9):173–183, 2006. doi:10.4086/TOC.2006.V002A009.
  • [14] Oded Goldreich. Introduction to property testing. Cambridge University Press, 2017. doi:10.1017/9781108135252.
  • [15] Oded Goldreich, Shafi Goldwasser, and Dana Ron. Property testing and its connection to learning and approximation. J. ACM, 45(4):653–750, 1998. doi:10.1145/285055.285060.
  • [16] Oded Goldreich and Dana Ron. On sample-based testers. In Tim Roughgarden, editor, Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, ITCS 2015, Rehovot, Israel, January 11-13, 2015, pages 337–345. ACM, 2015. doi:10.1145/2688073.2688080.
  • [17] Oded Goldreich and Dana Ron. Testing distributions of huge objects. CoRR, abs/2212.12802, 2022. doi:10.48550/arXiv.2212.12802.
  • [18] Oded Goldreich and Or Sheffet. On the randomness complexity of property testing. Computational Complexity, 19:99–133, 2010. doi:10.1007/S00037-009-0282-4.
  • [19] Madhav Jha and Sofya Raskhodnikova. Testing and reconstruction of Lipschitz functions with applications to data privacy. SIAM Journal on Computing, 42(2):700–731, 2013. doi:10.1137/110840741.
  • [20] Renato Ferreira Pinto Jr. and Nathaniel Harms. Testing support size more efficiently than learning histograms. CoRR, 2024. arXiv:2410.18915, doi:10.48550/arXiv.2410.18915.
  • [21] Iden Kalemaj, Sofya Raskhodnikova, and Nithin Varma. Sublinear-time computation in the presence of online erasures. Theory Comput., 19 (1):1–48, 2023. URL: https://theoryofcomputing.org/articles/v019a001/v019a001.pdf, doi:10.4086/TOC.2023.V019A001.
  • [22] Esty Kelman, Ephraim Linder, and Sofya Raskhodnikova. Online versus offline adversaries in property testing. CoRR, 2024. arXiv:2411.18617.
  • [23] Amit Levi, Ramesh Krishnan S. Pallavoor, Sofya Raskhodnikova, and Nithin Varma. Erasure-resilient sublinear-time graph algorithms. ACM Trans. Comput. Theory, 14(1):1:1–1:22, 2022. doi:10.1145/3488250.
  • [24] Dor Minzer and Kai Zhe Zheng. Adversarial low degree testing. In David P. Woodruff, editor, Proceedings of the 2024 ACM-SIAM Symposium on Discrete Algorithms, SODA 2024, Alexandria, VA, USA, January 7-10, 2024, pages 4395–4409. SIAM, 2024. doi:10.1137/1.9781611977912.154.
  • [25] Michal Parnas, Dana Ron, and Ronitt Rubinfeld. Tolerant property testing and distance approximation. J. Comput. Syst. Sci., 72(6):1012–1042, 2006. doi:10.1016/j.jcss.2006.03.002.
  • [26] Sofya Raskhodnikova. Monotonicity testing. Masters Thesis, MIT, 1999.
  • [27] Sofya Raskhodnikova. Testing if an array is sorted. Encyclopedia of Algorithms, pages 2219–2222, 2016. doi:10.1007/978-1-4939-2864-4_700.
  • [28] Sofya Raskhodnikova, Dana Ron, Amir Shpilka, and Adam Smith. Strong lower bounds for approximating distribution support size and the distinct elements problem. In Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, FOCS ’07, pages 559–569. IEEE Computer Society, 2007. doi:10.1109/FOCS.2007.67.
  • [29] Sofya Raskhodnikova, Noga Ron-Zewi, and Nithin Varma. Erasures versus errors in local decoding and property testing. Random Structures and Algorithms, 59(4):640–670, 2021. doi:10.1002/rsa.21031.
  • [30] Sofya Raskhodnikova and Nithin Varma. Brief announcement: Erasure-resilience versus tolerance to errors. In Proceedings, International Colloquium on Automata, Languages and Programming (ICALP), pages 111:1–111:3, 2018. doi:10.4230/LIPIcs.ICALP.2018.111.
  • [31] Ronitt Rubinfeld and Madhu Sudan. Robust characterizations of polynomials with applications to program testing. SIAM Journal on Computing, 25(2):252–271, 1996. doi:10.1137/S0097539793255151.
  • [32] Gregory Valiant and Paul Valiant. A CLT and tight lower bounds for estimating entropy. Electron. Colloquium Comput. Complex., TR10-179, 2010. URL: https://eccc.weizmann.ac.il/report/2010/179.
  • [33] Alek Westover, Edward Yu, and Kai Zheng. New direct sum tests. CoRR, abs/2409.10464, 2024. doi:10.48550/arXiv.2409.10464.