Centralized Coded Caching of Correlated Contents
|
|
- Lucinda Chapman
- 5 years ago
- Views:
Transcription
1 Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv: v1 [cs.it] 10 Nov 2017 Abstract Coded caching and deivery is studied taking into account the correations among the contents in the ibrary. Correations are modeed as common parts shared by mutipe contents; that is, each fie in the database is composed of a group of subfies, where each subfie is shared by a different subset of fies. The number of fies that incude a certain subfie is defined as the eve of commonness of this subfie. First, a correation-aware uncoded caching scheme is proposed, and it is shown that the optima pacement for this scheme gives priority to the subfies with the highest eves of commonness. Then a correation-aware coded caching scheme is presented, and the cache capacity aocated to subfies with different eves of commonness is optimized in order to minimize the deivery rate. The proposed correation-aware coded caching scheme is shown to remarkaby outperform state-of-the-art correation-ignorant soutions, indicating the benefits of expoiting content correations in coded caching and deivery in networks. I. INTRODUCTION In proactive caching, popuar contents are stored in user devices during off-peak traffic periods even before they are requested by the users [1] [3]. Proactive caching is considered as a promising soution for the recent exposive growth of wireess data traffic, and can aeviate both the network congestion and the atency during peak traffic periods (see [1] [4], and references therein. Proactive caching typicay takes pace in two phases: the first phase takes pace during off-peak traffic periods, when users caches are fied as a function of the whoe ibrary of fies, referred to as the pacement phase; whie the second, deivery phase, takes pace during the peak traffic period when the users demands are reveaed and satisfied simutaneousy. In contrast to traditiona uncoded caching schemes, which simpy empoy orthogona unicast transmissions during the deivery phase, recenty proposed coded caching [4] creates coded muticasting opportunities, significanty reducing the amount of data that needs to be deivered to the users to satisfy their demands, even when these demands are distinct. Coded caching benefits from the aggregate cache capacity across the network, rather than oca cache capacities as in conventiona uncoded caching [4]. This significant improvement has motivated intense research interest on coded caching in recent years [5] [12]. Some works foow the simpified mode proposed in [4], and aim to improve the fundamenta imits of caching [6], [7], [13]; others consider more reaistic settings, such as decentraized caching [5], nonuniform popuarities across fies [9], [10], audience retention rate aware caching [14], or heterogeneous quaity of service requirements [12]. An important feature of video contents, which is the main source of the recent exposive traffic growth, is that, there may be significant overaps among different fies, e.g., the recordings of the same event from different anges and different cameras, or even the frames of the same scene in the same video. In [15], Hassanzadeh et a. propose a correationaware caching scheme, which groups the contents in the ibrary into two sets according to their correations as we as popuarity, where each fie in second set is compressed with respect to a fie in the first set. This scheme is shown to outperform correation-ignorant caching schemes. A more information theoretic formuation for caching of correated sources is considered in [16], focusing on a specia scenario with two receivers and one cache. A simiar informationtheoretic anaysis is carried out in [17] for two fies and two receivers, each with its own cache. In this paper, we consider a server with a ibrary of N correated fies, serving users equipped with oca caches. Different from [15], which ony expoits a fixed eve of common information among the fies, we consider a more genera mode in order to fuy expoit the potentia correations among different subsets of fies. We mode each fie in the server to be composed of a group of subfies, such that each subfie is shared by a different subset of fies. The number of fies to which each subfie beongs is defined as its eve of commonness. Equivaenty, in our mode, any subset of fies S share a common part that is independent of the rest of the ibrary, and shared excusivey by the fies in S. We first propose a correation-aware uncoded caching scheme, and show that the optima pacement for this scheme is achieved by giving priority to the subfies with the highest eves of commonness in the pacement phase. We then propose a correation-aware coded caching scheme, and derive a cosed-form expression of the achievabe deivery rate, based on which the cache capacity is optimay aocated to the subfies according to their eve of commonness. Then, we compare the performance of the proposed correation-aware schemes with those that ignore the correation, and the cutset bound; and show that, expoiting fie correations in coded caching can significanty reduce the deivery rate. Notations: The set of integers {i,..., j}, where i j, is denoted by [i : j], particuary, {1,..., j} is denoted by [j]. For sets A and B, we define A\B {x : x A, x / B}, and A denotes the cardinaity of A. ( j i represents the binomia coefficient if j i; otherwise, ( j i = 0. For event E, 1{E} = 1 if E is true; and 1{E} = 0, otherwise.
2 II. SYSTEM MODEL We consider a server with a database of N correated fies, W 1,..., W N, where each fie consists of 2 independent subfies, e.g., W i = W S, i [N]. Here, W S denotes S [N] i S the subfie shared excusivey by the subset of fies {W i : i S}. For simpicity, we assume that for S [N], W S = F, if S =, i.e., the common subfies shared excusivey by fies are of the same size of F bits. Let F (F 1,..., F N. As a resut, each fie in the ibrary is aso of the same size of F bits, given by F = N =1 ( N 1 F. (1 1 For S [N], S =, we say that the subfies W S have a commonness eve of. For exampe, W {1,2,3} and W {3,4,5} both have eve 3 commonness. For brevity, we refer to a the subfies with eve commonness as -subfies, = 1,..., N. We consider users connected to the server through a shared, error-free ink, each equipped with a cache of size MF bits. We consider centraized caching; that is, the server has the knowedge of the active users during the pacement phase, though not the knowedge of their demands. Centraized caching aows the server to fi the user caches in a coordinated manner. After the pacement phase, each user requests a singe fie from the ibrary, where d k [N] denotes user k s request, k []. A the requests are satisfied simutaneousy over the error-free shared ink. An (F, M, R caching code for this system consists of: caching functions f k, k [], f k : [2 F ] [2 F ] [2 MF ], (2 }{{} N fies such that the contents of user k s cache at the end of the pacement phase, denoted by Z k, is given by Z k = f k ({W i } N i=1 ; a deivery function g, g : [2 F ] [2 F ] D [2 RF ], (3 }{{} N fies where D (d 1,..., d, such that a singe message of RF bits, X D = g((w 1,..., W N, D, is sent by the server over the shared ink according to users demands; decoding functions h k, k [], h k : D [2 MF ] [2 RF ] [2 F ], (4 where Ŵd k = h k (D, Z k, X D, is the reconstruction of W dk at user k. Definition 1. A user cache capacity-deivery rate pair (M, R is achievabe for a system described above, if there exists a sequence of (F, M, R codes such that for any demand reaization D [N], im Pr } {Ŵdk W dk = 0. (5 F 1,...,F N k [] For a system with N fies and users, our goa is to characterize the minimum achievabe rate R as a function of the user cache capacity M, i.e., R (M inf{r : (M, R is achievabe}. III. CORRELATION-AWARE UNCODED CACHING AND DELIVERY (CAUC SCHEME We first present an uncoded caching and deivery scheme expoiting the correation among fies, referred to as CAUC. 1 Pacement phase: Each user caches the same p F bits from each -subfie, where 0 p 1, [N], such that N ( N MF = p F, (6 =1 which meets the imitation of the cache capacities. We refer to P (p 1,..., p N as the cache aocation vector, which wi be specified in the seque. 2 Deivery phase: The server deivers the remaining bits of each requested subfie that have not been cached by the users, i.e., W S for which 1{d k S} 1. k=1 In the worst case, when the demand combination is the most distinct, i.e., users request distinct fies for the case N, or each fie is requested by at east one user for the case N <, the deivery rate is given by N (( ( N min{n, 0} R CAUC (P = (1 p F. =1 (7 The optima P can be derived by soving the foowing optimization probem min R CAUC (P N ( N such that p F MF, =1 which, straightforwardy, eads to: p = 1, if C( MF ; p MF C(+1 =, if C( + 1 < MF < C(; and p ( N F = 0, otherwise; where we have defined C( N Fi, for [N]. We remark that the optima cache aocation gives priority to the subfies with the highest eve of commonness. i= IV. CORRELATION-AWARE CODED CACHING AND DELIVERY (CACC SCHEME In this section, we present a correation-aware coded caching and deivery scheme, referred to as CACC. Simiary to the CAUC scheme, we aocate different cache capacities to subfies of different eves of commonness, again specified by the cache aocation vector, P = (p 1,..., p N, which satisfies the constraint in (6, such that each user caches p F bits from each -subfie, [N]. In the foowing, we first present how coded caching and deivery of the subfies with the same eve of commonness is carried out, and then specify the aocation of cache capacity. ( N i (8
3 A. Coded Caching and Deivery of -subfies Here, for a given cache aocation vector P, we present the coded caching and deivery of -subfies, [N]. We define t p, 0 t. If t = 0, users do not cache the -subfies at a, whie if t =, each user stores a the - subfies in its cache. In the foowing, we focus on the cases where t [ 1]. 1 Pacement Phase: We empoy the prefetching scheme proposed by [4] for the subfies rather than the fies themseves: each -subfie is partitioned into ( t disjoint parts, each with approximatey the same size of F / ( t bits. We abe these ( t disjoint parts of each -subfie W S by W A S, where A = t, A []; that is, we have W S = A: A =t, A [] W A S. Each of these parts, W A S, is paced into the cache of user k if k A. Thus, each user caches a tota of ( 1 t 1 disjoint parts of each -subfie with a tota size of t F / bits, which sums up to p F bits. 2 Deivery Phase: We first focus on the case when N. There are a tota of ( N -subfies. We denote the set of these -subfies by W = { W S : S [N], S = }. Each user requires a tota of ( 1 -subfies, i.e., user k needs to recover subfies in { W S : S [N], S =, d k S }, k []. For each user, we can regard these ( 1 -subfies as ( 1 distinct demands. Our deivery scheme for the - subfies operates in ( 1 steps, and satisfies one demand of each user at each step. We define C j (c 1j,..., c Nj, where c ij {S : S [N], S =, i S}, i [N], j [ ( 1 ], which specifies which subfie shoud be deivered in the jth step of the deivery phase. C j is generated by Agorithm 1 by setting R = [N] and R =. Note that these vectors are generated independenty of the number of users or their demands. Exampe 1. Consider N = 5 and = 2. From Agorithm 1 we obtain: C 1 = ({1, 2}, {1, 2}, {3, 4}, {3, 4}, {1, 5}; C 2 = ({1, 5}, {2, 3}, {2, 3}, {4, 5}, {4, 5}; C 3 = ({1, 3}, {2, 5}, {1, 3}, {2, 4}, {2, 5}; C 4 = ({1, 4}, {2, 4}, {3, 5}, {1, 4}, {3, 5}. This means, for exampe, that, in the first step, subfies W 12, W 34, and W 15 wi be deivered (if there is a user requesting them. We denote by d j k c d k j the demand of user k to be satisfied in the jth step, i.e., user k recovers W d j after the jth step. k ( 1 We emphasize that W cij = {W S : S [N], S = j=1, i S}, i [N]; that is a the required -subfies wi be recovered by each user after step ( 1 for any demand combination. Exampe 2. Consider N = = 5 and = 2 as in Exampe 1. Consider distinct demands, i.e., D = {1, 2, 3, 4, 5}. Thus, Agorithm 1 Generate C j, j [ ( R 1 R 1 ] 1: procedure ASSIGNMENT 2: W t W, j 1, W ast, c ast 3: whie W t do 4: c t R 5: whie c t do 6: if c t R then 7: if c ast = then 8: Randomy seect one -subfie W S from W t such that S \ R c t, remove W S from W t, and c t c t \ S 9: for i S \ R do 10: c ij W ast 11: end for 12: ese 13: for i c ast \ R do 14: c ij S 15: end for 16: c t c t \ c ast, W ast 1, and c ast 17: end if 18: ese 19: Randomy seect one -subfie W S from W t such that c t S 20: for i c t do 21: c ij S 22: end for 23: for i R do 24: c ij 25: end for 26: W ast S, c ast S \ c t, c t, and j j : end if 28: end whie 29: end whie 30: end procedure based on C 1, we have d 1 1 = d 1 2 = {1, 2}, d 1 3 = d 1 4 = {3, 4}, and d 1 5 = {1, 5}; that is, at the end of the first step, users 1 and 2 shoud recover W 12, users 3 and 4 shoud recover W 34, whie user 5 shoud recover W 15. Exampe 3. With the same setting as in Exampe 2, consider now a non-distinct demand combination D = {1, 1, 1, 3, 4}. Based on C 1, we have d 1 1 = d 1 2 = d 1 3 = {1, 2}, and d 1 4 = d 1 5 = {3, 4}; that is, at the end of the first step users 1, 2 and 3 shoud recover W 12, whie users 4 and 5 shoud recover W 34. Based on the deivery scheme proposed in [13], we present our coded transmission scheme in Agorithm 2 according to C j, j [ ( 1 ], where R =, R = [N]. In Agorithm 2, we define A j as the number of distinct d j k for each j [( 1 ]. We note that, among the CODED DELIVERY and RANDOM
4 Agorithm 2 Coded transmission based on C j 1: procedure CODED DELIVERY 2: for k = 1,..., do 3: d j k c d k j 4: end for 5: U j Any subset of A j users with distinct d j k 6: for V [] : V = t + 1, 1{k V} 1 do k U j 7: Send k V W V\{k}. d j k 8: end for 9: end procedure 10: procedure RANDOM DELIVERY 11: for S R : S = R do 12: Server sends enough random inear combinations of the bits of -subfie W S R to enabe the users demanding it to decode it. 13: end for 14: end procedure DELIVERY procedures of Agorithm. 2, the one that requires a smaer deivery rate is performed. Exampe 2 - continued. In Exampe 2, assume that t = 1, i.e., each -subfie is divided into disjoint parts of equa size, and each disjoint part is cached exacty by one user. Based on D, we have A 1 = 3. Assume that U 1 = {1, 3, 5}. Then, the server sends {1,2} W {3} W {3} W W W W {3} W, W W {3}, W. By receiving these coded bits, users 1 and 2 can recover W {1,2} together with the contents of their own caches. Simiary, users 3 and 4 can recover W, whie user 5 recovers W. In the same manner, by coded transmission based on C 2, user 1 can recover W, users 2 and 3 recover W {2,3}, and users 4 and 5 recover W {4,5} in the second step. After four deivery steps based on C 1,..., C 4 each user decodes a the 2-subfies of their requests. The tota number of bits deivered in these four steps is 36F 2 /5. Exampe 3 - continued. Assume again that t = 1. Based on D, we have A 1 = 2, and et U 1 = {1, 4}. Then, the server sends W W {3} {1,2} W {1,2} W {3} W W, such that users 1, 2 and 3 can recover W {1,2}, whie users 4 and 5 can recover W. Based on C 2, the server sends {3} W W W {2,3} W {4,5}, {2,3}, W {3} {2,5}, W {3} {4,5}, {4,5}, W {2,3},, {4,5},, such that users 1, 2 and 3 can recover W, whie user 4 and user 5 can recover W {2,3} and W {4,5}, respectivey. Based on C 3, the server sends W {1,3} W {3} {1,3} {1,3}, {1,3}, W {1,3}, {1,3} {1,3}, W {3} {1,3}, {1,3}, W W {1,3}, based on which users 1,2,3 and 4 can recover W {1,3}, whie user 5 recovers W. Finay, based on C 4, the server sends {3} W W {1,4} W {1,4}, {1,4} {1,4}, W {3} {1,4} {1,4}, {1,4}, W {1,4}, {1,4}, {1,4}, such that users 1, 2, 3 and 4 are abe to recover W {1,4}, whie user 4 recovers W. Thus, a the users are abe to decode the 2-subfies they requested. The tota number of bits deivered in this case is 30F 2 /5. Next, we consider the case N >. We first seect a subset of fies R, R [N], such that R =, and d k R for k = 1,...,. For any subset R [N] \ R, R = s, s [max{, 0} : min{ 1, N }}], Agorithm 1 is appied to a subset of -subfies W = {W S R : S R, S = R } to derive C j, j [ ( R 1 R 1 ], based on which Agorithm 2 is appied to enabe each user to decode its demanded -subfies in W. Therefore, each user can decode a the -subfies it is demanding. B. Achievabe rate The foowing theorem presents the deivery rate achieved by the proposed coded caching and deivery scheme for any demand combination, for a given cache aocation vector P. Theorem 1. For the caching system described in Section II, given a cache aocation vector P, the foowing deivery rate is achievabe N R CACC (P = R (t, (9 =1 where t = p, and for t [0 : ], and α (t R (t = min{α (t, m (t }, (10 max{min{ 1,N },0} s=max{,0} ( ( N min{n, } 1 s s 1 [ ( ( max{ min{n,} ] s 1, 0} F t + 1 t + 1 F (, t (( ( (11 N min{n, 0} m (t (F t F //F. (12 For t / [0 : ], R (t is given by the ower convex enveop of the above achievabe points. Proof. We show that R (t given above is achievabe t [0 : ]. The ower convex enveop of these integer points can then be achieved by memory sharing. For the case N, reca that the requested -subfies are deivered in ( 1 steps based on C j, j = [ ( 1 ], derived by Agorithm 1. In each step, the server sends at most N/ + 1 -subfies. Therefore, for any demand combination, the number of distinct d j k based
5 on C j, i.e., A j N/ + 1, n = 1,..., ( 1. Simiar to the deivery scheme proposed in [13], by the CODED DELIVERY procedure of Agorithm 2, the server broadcasts binary sums that hep at east one user in U j based on C j. The tota number of such subsets of t users that contain at east one user in U j is given by ( ( t +1 max{ N/ 1,0} t +1. Hence, given t {1,..., 1}, the tota number of bits sent by CODED DELIVERY procedure of Agorithm 2 for the deivery of the -subfies is bounded by (normaized by F : ( N 1 [ ( ( max{ N/ 1, 0} ] F R (t 1 t + 1 t + 1 F ( t (13 The right hand side (RHS of 13 is equa to (11 for N. Since each user caches t F / bits of each -subfie, according to [5, Appendix A], the number of bits sent by the RANDOM DELIVERY procedure is bounded by ( N R (t (F t F //F. (14 The RHS equas to (12 for N. Hence, for t {1,..., 1}, we have proven R (t given in (10 is achievabe for N. We then focus on the case where N >. For any ( max{, 0} s min{ 1, N }, there are a tota of N s subsets R such that R [N] \ R, R = s. Foowing the simiar anaysis for the case where N, given R containing a the demanded fies such that R =, and any R such that R [N] \ R, R = s, requested -subfies in W = {W S R : S R, S = R } are sent in ( 1 s 1 step. At each step, there are at most N s + 1 -subfies to be sent. Therefore, with simiar arguments, the tota number of bits sent by CODED DELIVERY procedure of Agorithm 2 in each step is bounded by ( ( ( 1 ( s 1 t +1 max{ N s 1,0} F t +1 F( t, whie the number of bits send by the RANDOM DELIVERY procedure is bounded by ( s (F t F //F. By summing over a ( N s subsets R for each s [max{, 0} : min{ 1, N }], we have and, R (t min{ 1,N } ( N R (t s s=max{,0} ( ( ( max{ N 1, 0} s t + 1 t + 1 min{ 1,N } s=max{,0} ( N s ( 1 s 1 F F ( t, (15 ( (F t F //F, (16 s by which, we have proven the correctness of (10 for the case N >. Remark 1. At each step of sending -subfies in W = {W S R : S R, S = R }, there are sometimes N N s + 1 and sometimes s distinct demands, whie when N is a mutipe of s, there are aways N s distinct demands (R = [N], R =, s = 0, for the case N. To obtain a cosed-form expression for the achievabe deivery rate, we simpy assume N s + 1 distinct demands at each step. Note that, the more the number of distinct demands at each step, the arger the deivery rate. Therefore R CACC (P in (9 is an upper bound on the actua achievabe deivery rate of CACC. Fig. 1. Deivery rate (R vs. ratio of 2-subfies (r 2,r 3 = = r 10 = 0. C. Aocation of Cache Capacity We can further optimize the cache content distribution P by soving: min R CACC (P N ( N such that p F MF, =1 (17a (17b where the objective is to minimize the achievabe deivery rate under the cache capacity constraint. The probem in (17 can be soved numericay. V. LOWER BOUND In this section, we present a ower bound derived using cutset arguments. Theorem 2. (Cut-set Bound For the caching probem described in Section II, the optima achievabe deivery rate is ower bounded by R (M max p [1:min{N,}] ( p N/p N p N/p s=0 p N/p =1 F+s N/p pm N/p. ( N p N/p s (18a Proof. The proof wi be provided in a onger version of the paper. VI. NUMERICAL RESULTS In this section, we numericay compare the deivery rates of the proposed correation-aware caching schemes CAUC and CACC with the ower bound and the state-of-the-art coded caching scheme from [13], which does not take the content
6 Fig. 2. Deivery rate (R vs. ratio of 10-subfies (r 10, r 2 = = r 10 = 0. correations into account. We refer to the ater scheme as the correation-ignorant coded caching scheme (CICC. We consider N = 10 fies and k = 10 users. Each user is equipped with a cache of size F bits, i.e., M = 1. We denote ( by r the ratio of -subfies among each fie, i.e., r 1 F /F. Note that, we have =1 r = 1. In Fig. IV-C, we assume that the fies have ony pairwise correations, that is, r 3 = = r 10 = 0, and we pot the deivery rate as a function of r 2. Meanwhie, in Fig. VI, we assume that each fie consists of a private part, i.e., 1-subfie, and a common subfie that is shared by a the fies in the ibrary, i.e., 10- subfie, i.e., r 2 = = r 9 = 0. We pot the deivery rate as a function of r 10. We observe in both figures that the deivery rate achieved by the correation-ignorant scheme, CICC, remains the same no matter how high the ratio of common subfies, whie the deivery rates of the correation-aware schemes, CAUC and CACC, decrease as the ratio of the common subfies increases. Obviousy, CACC achieves a ower deivery rate than both CAUC and CICC, since it benefits both from incorporating the correations among the fies as we as coded muticasting. When the ratio of the common subfies is sufficienty arge, even without coded muticasting CAUC achieves a ower deivery rate than CICC. It can aso be observed that the deivery rates of correation-aware schemes decrease faster with the percentage of common subfies in Fig. VI than in Fig. IV-C. That is because the gain from expoiting correation is more pronounced as the common parts are shared among more fies. Whie there is a gap between the cut-set ower bound and the achievabe deivery rate, we note that the gap is smaer in Fig VI, where the eve of commonness is higher. VII. CONCLUSIONS We have studied coded caching taking into account the avaiabe correations among the fies in the ibrary. To capture arbitrary correations, we assume that each fie consists of a number of subfies, each of which is shared by a different subset of fies in the ibrary, and the number of fies that share a certain subfie is defined as its eve of commonness. We proposed both a correation-aware uncoded caching scheme, the optima pacement of which is proven to be caching the subfies with the highest eves of commonness, and a correation-aware coded caching scheme (CACC, the pacement of which is optimized in terms of the achievabe deivery rate. The proposed CACC scheme, or even the uncoded caching scheme when the correation among fies is strong enough, is shown to significanty outperform the best known achievabe deivery rate by correation-unaware soution in the iterature. REFERENCES [1] M. Gregori, J. Gomez-Viardebo, J. Matamoros, and D. Gündüz, Wireess content caching for sma ce and D2D networks, IEEE J. Se. Areas Commun., vo. 34, no. 5, pp , Mar [2] E. Bastug, M. Bennis, and M. Debbah, Living on the edge: The roe of proactive caching in 5g wireess networks, IEEE Communications Magazine, vo. 52, no. 8, pp , Aug [3] S. O. Somuyiwa, A. György, and D. Gündüz, Improved poicy representation and poicy search for proactive content caching in wireess networks, in Proc. IEEE Int Symp. on Modeing and Opt. in Mobie, Ad Hoc, and Wireess Netw. (WiOpt, Paris, France, May [4] M. A. Maddah-Ai and U. Niesen, Fundamenta imits of caching, IEEE Trans. Inform. Theory, vo. 60, no. 5, pp , May [5], Decentraized caching attains order optima memory-rate tradeoff, IEEE/ACM Trans. Netw, vo. 23, no. 4, pp , Apr [6] M. Mohammadi Amiri, Q. Yang, and D. Gündüz, Coded caching for a arge number of users, in Proc. IEEE Inform. Theory Workshop (ITW, Cambridge, U, Sep. 2016, pp [7] M. Mohammadi Amiri and D. Gündüz, Fundamenta imits of coded caching: Improved deivery rate-cache capacity trade-off, IEEE Trans. Commun., vo. 65, no. 2, pp , Feb [8] J. Gomez-Viardebo, Fundamenta imits of caching: Improved bounds with coded prefetching, arxiv: v2 [cs.it], Jan [9] M. Ji, A. M. Tuino, J. Lorca, and G. Caire, Order-optima rate of caching and coded muticasting with random demands, arxiv: v1 [cs.it], Feb [10] U. Niesen and M. A. Maddah-Ai, Coded caching with nonuniform demands, IEEE Trans. Inform. Theory, vo. 63, no. 2, pp , Feb [11] R. Pedarsani, M. A. Maddah-Ai, and U. Niesen, Onine coded caching, in Proc. IEEE Int Conf. Commun. (ICC, Sydney, Austraia, Jun. 2014, pp [12] Q. Yang and D. Gündüz, Coded caching and content deivery with heterogeneous distortion requirements, arxiv: v1 [cs.it], Aug [13] Q. Yu, M. A. Maddah-Ai, and A. S. Avestimehr, The exact ratememory tradeoff for caching with uncoded prefetching, in Proc. IEEE Int Symp. on Inform. Theory (ISIT, Aachen, Germany, Jun 2017, pp [14] Q. Yang, M. Mohammadi Amiri, and D. Gündüz, Audience retention rate aware coded video caching, in Proc. IEEE Int Conf. on Commun. Workshop (ICC Workshop, Paris, France, Jun. 2017, pp [15] P. Hassanzadeh, A. Tuino, J. Lorca, and E. Erkip, Correation-aware distributed caching and coded deivery, in Proc. IEEE Inform. Theory Workshop (ITW, Cambridge, U, Sep. 2016, pp [16] R. Timo, S. S. Bidokhti, M. Wigger, and B. C. Geiger, A rate-distortion approach to caching, arxiv: v1 [cs.it], Oct [17] P. Hassanzadeh, A. Tuino, J. Lorca, and E. Erkip, Rate-memory tradeoff for the two-user broadcast caching network with correated sources, arxiv: v1 [cs.it], May 2017.
A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes
A Fundamenta Storage-Communication Tradeoff in Distributed Computing with Stragging odes ifa Yan, Michèe Wigger LTCI, Téécom ParisTech 75013 Paris, France Emai: {qifa.yan, michee.wigger} @teecom-paristech.fr
More informationCoded Caching for Files with Distinct File Sizes
Coded Caching for Fies with Distinct Fie Sizes Jinbei Zhang iaojun Lin Chih-Chun Wang inbing Wang Department of Eectronic Engineering Shanghai Jiao ong University China Schoo of Eectrica and Computer Engineering
More informationImproved Converses and Gap-Results for Coded Caching
Improved Converses and Gap-Resuts for Coded Caching Chien-Yi Wang, Shirin Saeedi Bidokhti, and Michèe Wigger Abstract arxiv:702.04834v [cs.it] 6 Feb 207 Improved ower bounds on the average and the worst-case
More informationCache Aided Wireless Networks: Tradeoffs between Storage and Latency
Cache Aided Wireess Networks: Tradeoffs between Storage and Latency Avik Sengupta Hume Center, Department of ECE Virginia Tech, Backsburg, VA 24060, USA Emai: aviksg@vt.edu Ravi Tandon Department of ECE
More informationOn Coded Caching with Correlated Files
On Coded Caching with Correlated Files Kai Wan, Daniela Tuninetti, Mingyue Ji, Giuseppe Care, Technische Universität Berlin, Berlin, Germany, {kai.wan, caire}@tu-berlin.de University of Illinois at Chicago,
More informationSource and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems
Source and Reay Matrices Optimization for Mutiuser Muti-Hop MIMO Reay Systems Yue Rong Department of Eectrica and Computer Engineering, Curtin University, Bentey, WA 6102, Austraia Abstract In this paper,
More informationScalable Spectrum Allocation for Large Networks Based on Sparse Optimization
Scaabe Spectrum ocation for Large Networks ased on Sparse Optimization innan Zhuang Modem R&D Lab Samsung Semiconductor, Inc. San Diego, C Dongning Guo, Ermin Wei, and Michae L. Honig Department of Eectrica
More informationInformation Theoretic Caching: The Multi-User Case
Information Theoretic Caching: The Muti-User Case Sung Hoon Lim, Chien-Yi Wang, and Michae Gastpar arxiv:604.02333v [cs.it] 8 Apr 206 Abstract In this paper, we consider a cache aided network in which
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 2, FEBRUARY
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO. 2, FEBRUARY 206 857 Optima Energy and Data Routing in Networks With Energy Cooperation Berk Gurakan, Student Member, IEEE, OmurOze,Member, IEEE,
More informationImproved Approximation of Storage-Rate Tradeoff for Caching via New Outer Bounds
Improved Approximation of Storage-Rate Tradeoff for Caching via New Outer Bound Avik Sengupta, Ravi Tandon, T. Chare Cancy Hume Center & Dept. of Eectrica and Computer Engineering Dicovery Anaytic Center
More informationApproximated MLC shape matrix decomposition with interleaf collision constraint
Approximated MLC shape matrix decomposition with intereaf coision constraint Thomas Kainowski Antje Kiese Abstract Shape matrix decomposition is a subprobem in radiation therapy panning. A given fuence
More informationApproximated MLC shape matrix decomposition with interleaf collision constraint
Agorithmic Operations Research Vo.4 (29) 49 57 Approximated MLC shape matrix decomposition with intereaf coision constraint Antje Kiese and Thomas Kainowski Institut für Mathematik, Universität Rostock,
More informationPower Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks
ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao, Vivek Raghunathan, Stephen Hany, Vinod Sharma and. R. Kumar Abstract We consider a joint power contro
More informationAsynchronous Control for Coupled Markov Decision Systems
INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of
More informationTarget Location Estimation in Wireless Sensor Networks Using Binary Data
Target Location stimation in Wireess Sensor Networks Using Binary Data Ruixin Niu and Pramod K. Varshney Department of ectrica ngineering and Computer Science Link Ha Syracuse University Syracuse, NY 344
More information<C 2 2. λ 2 l. λ 1 l 1 < C 1
Teecommunication Network Contro and Management (EE E694) Prof. A. A. Lazar Notes for the ecture of 7/Feb/95 by Huayan Wang (this document was ast LaT E X-ed on May 9,995) Queueing Primer for Muticass Optima
More informationMaximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR
1 Maximizing Sum Rate and Minimizing MSE on Mutiuser Downink: Optimaity, Fast Agorithms and Equivaence via Max-min SIR Chee Wei Tan 1,2, Mung Chiang 2 and R. Srikant 3 1 Caifornia Institute of Technoogy,
More informationAn Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
An Adaptive Opportunistic Routing Scheme for Wireess Ad-hoc Networks A.A. Bhorkar, M. Naghshvar, T. Javidi, and B.D. Rao Department of Eectrica Engineering, University of Caifornia San Diego, CA, 9093
More informationA Brief Introduction to Markov Chains and Hidden Markov Models
A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,
More informationTransmit Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance
Transmit ntenna Seection for Physica-Layer Networ Coding ased on Eucidean Distance 1 arxiv:179.445v1 [cs.it] 13 Sep 17 Vaibhav Kumar, arry Cardiff, and Mar F. Fanagan Schoo of Eectrica and Eectronic Engineering,
More informationA Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)
A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,
More informationA. Distribution of the test statistic
A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch
More informationPerformance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University
Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Joint work with Jinbei Zhang (SJTU), Chih-Chun Wang (Purdue) and Xinbing Wang (SJTU)
More informationLimited magnitude error detecting codes over Z q
Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica
More information(This is a sample cover image for this issue. The actual cover is not yet available at this time.)
(This is a sampe cover image for this issue The actua cover is not yet avaiabe at this time) This artice appeared in a journa pubished by Esevier The attached copy is furnished to the author for interna
More informationSequential Decoding of Polar Codes with Arbitrary Binary Kernel
Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient
More informationDiscrete Applied Mathematics
Discrete Appied Mathematics 159 (2011) 812 825 Contents ists avaiabe at ScienceDirect Discrete Appied Mathematics journa homepage: www.esevier.com/ocate/dam A direct barter mode for course add/drop process
More informationUnconditional security of differential phase shift quantum key distribution
Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice
More informationNEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION
NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION Hsiao-Chang Chen Dept. of Systems Engineering University of Pennsyvania Phiadephia, PA 904-635, U.S.A. Chun-Hung Chen
More informationAn Algorithm for Pruning Redundant Modules in Min-Max Modular Network
An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai
More informationSydU STAT3014 (2015) Second semester Dr. J. Chan 18
STAT3014/3914 Appied Stat.-Samping C-Stratified rand. sampe Stratified Random Samping.1 Introduction Description The popuation of size N is divided into mutuay excusive and exhaustive subpopuations caed
More informationu(x) s.t. px w x 0 Denote the solution to this problem by ˆx(p, x). In order to obtain ˆx we may simply solve the standard problem max x 0
Bocconi University PhD in Economics - Microeconomics I Prof M Messner Probem Set 4 - Soution Probem : If an individua has an endowment instead of a monetary income his weath depends on price eves In particuar,
More informationLOW-COMPLEXITY LINEAR PRECODING FOR MULTI-CELL MASSIVE MIMO SYSTEMS
LOW-COMPLEXITY LINEAR PRECODING FOR MULTI-CELL MASSIVE MIMO SYSTEMS Aba ammoun, Axe Müer, Emi Björnson,3, and Mérouane Debbah ing Abduah University of Science and Technoogy (AUST, Saudi Arabia Acate-Lucent
More informationOptimality of Gaussian Fronthaul Compression for Uplink MIMO Cloud Radio Access Networks
Optimaity of Gaussian Fronthau Compression for Upink MMO Coud Radio Access etworks Yuhan Zhou, Yinfei Xu, Jun Chen, and Wei Yu Department of Eectrica and Computer Engineering, University of oronto, Canada
More informationCoded Caching under Arbitrary Popularity Distributions
Coded Caching under Arbitrary Popularity Distributions Jinbei Zhang, Xiaojun Lin, Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University, China School of Electrical and Computer Engineering,
More informationStochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract
Stochastic Compement Anaysis of Muti-Server Threshod Queues with Hysteresis John C.S. Lui The Dept. of Computer Science & Engineering The Chinese University of Hong Kong Leana Goubchik Dept. of Computer
More informationA Novel Index Coding Scheme and its Application to Coded Caching
A ovel Index Coding Scheme and its Application to Coded Caching ai Wan Laboratoire des Signaux et Systèmes L2S CentraleSupèlec-CRS-Universitè Paris-Sud 91192 Gif-sur-Yvette, France Email: kai.wan@u-psud.fr
More informationTracking Control of Multiple Mobile Robots
Proceedings of the 2001 IEEE Internationa Conference on Robotics & Automation Seou, Korea May 21-26, 2001 Tracking Contro of Mutipe Mobie Robots A Case Study of Inter-Robot Coision-Free Probem Jurachart
More informationCryptanalysis of PKP: A New Approach
Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in
More informationThroughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay
Throughput Optima Scheduing for Wireess Downinks with Reconfiguration Deay Vineeth Baa Sukumaran vineethbs@gmai.com Department of Avionics Indian Institute of Space Science and Technoogy. Abstract We consider
More informationPrecoding for the Sparsely Spread MC-CDMA Downlink with Discrete-Alphabet Inputs
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.*, NO.*, MONTH 2016 1 Precoding for the Sparsey Spread MC-CDMA Downin with Discrete-Aphabet Inputs Min Li, Member, IEEE, Chunshan Liu, Member, IEEE, and Stephen
More informationTight Approximation Algorithms for Maximum Separable Assignment Problems
MATHEMATICS OF OPERATIONS RESEARCH Vo. 36, No. 3, August 011, pp. 416 431 issn 0364-765X eissn 156-5471 11 3603 0416 10.187/moor.1110.0499 011 INFORMS Tight Approximation Agorithms for Maximum Separabe
More informationCoded Caching for Files with Distinct File Sizes
Coded Caching for Files with Distinct File Sizes Jinbei Zhang, Xiaojun Lin, Chih-Chun Wang, Xinbing Wang Shanghai Jiao Tong University Purdue University The Importance of Caching Server cache cache cache
More informationReliability: Theory & Applications No.3, September 2006
REDUNDANCY AND RENEWAL OF SERVERS IN OPENED QUEUING NETWORKS G. Sh. Tsitsiashvii M.A. Osipova Vadivosto, Russia 1 An opened queuing networ with a redundancy and a renewa of servers is considered. To cacuate
More informationBICM Performance Improvement via Online LLR Optimization
BICM Performance Improvement via Onine LLR Optimization Jinhong Wu, Mostafa E-Khamy, Jungwon Lee and Inyup Kang Samsung Mobie Soutions Lab San Diego, USA 92121 Emai: {Jinhong.W, Mostafa.E, Jungwon2.Lee,
More informationCompetitive Diffusion in Social Networks: Quality or Seeding?
Competitive Diffusion in Socia Networks: Quaity or Seeding? Arastoo Fazei Amir Ajorou Ai Jadbabaie arxiv:1503.01220v1 [cs.gt] 4 Mar 2015 Abstract In this paper, we study a strategic mode of marketing and
More informationMC-CDMA CDMA Systems. Introduction. Ivan Cosovic. Stefan Kaiser. IEEE Communication Theory Workshop 2005 Park City, USA, June 15, 2005
On the Adaptivity in Down- and Upink MC- Systems Ivan Cosovic German Aerospace Center (DLR) Institute of Comm. and Navigation Oberpfaffenhofen, Germany Stefan Kaiser DoCoMo Euro-Labs Wireess Soution Laboratory
More informationReliability Improvement with Optimal Placement of Distributed Generation in Distribution System
Reiabiity Improvement with Optima Pacement of Distributed Generation in Distribution System N. Rugthaicharoencheep, T. Langtharthong Abstract This paper presents the optima pacement and sizing of distributed
More informationLinear Network Coding for Multiple Groupcast Sessions: An Interference Alignment Approach
Linear Network Coding for Mutipe Groupcast Sessions: An Interference Aignment Approach Abhik Kumar Das, Siddhartha Banerjee and Sriram Vishwanath Dept. of ECE, The University of Texas at Austin, TX, USA
More informationA Statistical Framework for Real-time Event Detection in Power Systems
1 A Statistica Framework for Rea-time Event Detection in Power Systems Noan Uhrich, Tim Christman, Phiip Swisher, and Xichen Jiang Abstract A quickest change detection (QCD) agorithm is appied to the probem
More informationThe Streaming-DMT of Fading Channels
The Streaming-DMT of Fading Channes Ashish Khisti Member, IEEE, and Star C. Draper Member, IEEE arxiv:30.80v3 cs.it] Aug 04 Abstract We consider the sequentia transmission of a stream of messages over
More informationRate-Distortion Theory of Finite Point Processes
Rate-Distortion Theory of Finite Point Processes Günther Koiander, Dominic Schuhmacher, and Franz Hawatsch, Feow, IEEE Abstract We study the compression of data in the case where the usefu information
More informationIntegrality ratio for Group Steiner Trees and Directed Steiner Trees
Integraity ratio for Group Steiner Trees and Directed Steiner Trees Eran Haperin Guy Kortsarz Robert Krauthgamer Aravind Srinivasan Nan Wang Abstract The natura reaxation for the Group Steiner Tree probem,
More informationStochastic Variational Inference with Gradient Linearization
Stochastic Variationa Inference with Gradient Linearization Suppementa Materia Tobias Pötz * Anne S Wannenwetsch Stefan Roth Department of Computer Science, TU Darmstadt Preface In this suppementa materia,
More informationArbitrary Throughput Versus Complexity Tradeoffs in Wireless Networks using Graph Partitioning
University of Pennsyvania SchoaryCommons Departmenta Papers (ESE) Department of Eectrica & Systems Engineering November 2006 Arbitrary Throughput Versus Compexity Tradeoffs in Wireess Networks using Graph
More informationarxiv: v1 [cs.db] 25 Jun 2013
Communication Steps for Parae Query Processing Pau Beame, Paraschos Koutris and Dan Suciu {beame,pkoutris,suciu}@cs.washington.edu University of Washington arxiv:1306.5972v1 [cs.db] 25 Jun 2013 June 26,
More informationCoded Caching with Low Subpacketization Levels
Electrical and Computer Engineering Conference Papers, Posters and Presentations Electrical and Computer Engineering 06 Coded Caching with Low Subpacetization Levels Li Tang Iowa State University, litang@iastateedu
More informationSteepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1
Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rues 1 R.J. Marks II, S. Oh, P. Arabshahi Λ, T.P. Caude, J.J. Choi, B.G. Song Λ Λ Dept. of Eectrica Engineering Boeing Computer Services University
More informationRecursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines
Recursive Constructions of Parae FIFO and LIFO Queues with Switched Deay Lines Po-Kai Huang, Cheng-Shang Chang, Feow, IEEE, Jay Cheng, Member, IEEE, and Duan-Shin Lee, Senior Member, IEEE Abstract One
More informationSupplemental Information
Suppementa Information A Singe-eve Tunne Mode to Account for Eectrica Transport through Singe Moecue- Sef-Assembed Monoayer-based Junctions by A. R. Garrigues,. Yuan,. Wang, E. R. Muccioo, D. Thompson,
More informationPolite Water-filling for the Boundary of the Capacity/Achievable Regions of MIMO MAC/BC/Interference Networks
2011 IEEE Internationa Symposium on Information Theory Proceedings Poite Water-fiing for the Boundary of the Capacity/Achievabe Regions of MIMO MAC/BC/Interference Networks An iu 1, Youjian iu 2, Haige
More informationIntroduction to LMTO method
1 Introduction to MTO method 24 February 2011; V172 P.Ravindran, FME-course on Ab initio Modeing of soar ce Materias 24 February 2011 Introduction to MTO method Ab initio Eectronic Structure Cacuations
More informationOptimality of Inference in Hierarchical Coding for Distributed Object-Based Representations
Optimaity of Inference in Hierarchica Coding for Distributed Object-Based Representations Simon Brodeur, Jean Rouat NECOTIS, Département génie éectrique et génie informatique, Université de Sherbrooke,
More informationHow to Optimally Allocate Resources for Coded Distributed Computing?
1 How to Optimally Allocate Resources for Coded Distributed Computing? Qian Yu, Songze Li, Mohammad Ali Maddah-Ali, and A. Salman Avestimehr Department of Electrical Engineering, University of Southern
More informationGokhan M. Guvensen, Member, IEEE, and Ender Ayanoglu, Fellow, IEEE. Abstract
A Generaized Framework on Beamformer esign 1 and CSI Acquisition for Singe-Carrier Massive MIMO Systems in Miimeter Wave Channes Gokhan M. Guvensen, Member, IEEE, and Ender Ayanogu, Feow, IEEE arxiv:1607.01436v1
More information$, (2.1) n="# #. (2.2)
Chapter. Eectrostatic II Notes: Most of the materia presented in this chapter is taken from Jackson, Chap.,, and 4, and Di Bartoo, Chap... Mathematica Considerations.. The Fourier series and the Fourier
More informationDownlink Transmission of Short Packets: Framing and Control Information Revisited
1 Downin ransmission of Short Pacets: Frag and Contro Information Revisited Kasper Føe riingsgaard, Student Member, IEEE and Petar Popovsi, Feow, IEEE arxiv:1605.01829v1 cs.i 6 May 2016 Abstract Ceuar
More informationSeparation of Variables and a Spherical Shell with Surface Charge
Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation
More informationDOCUMENT DE TRAVAIL
Pubié par : Pubished by: Pubicación de a: Facuté des sciences de administration 2325, rue de a Terrasse Pavion Paasis-Prince, Université Lava Québec (Québec) Canada G1V 0A6 Té. Ph. Te. : (418) 656-3644
More informationCodes between MBR and MSR Points with Exact Repair Property
Codes between MBR and MSR Points with Exact Repair Property 1 Toni Ernva arxiv:1312.5106v1 [cs.it] 18 Dec 2013 Abstract In this paper distributed storage systems with exact repair are studied. A construction
More informationRadar/ESM Tracking of Constant Velocity Target : Comparison of Batch (MLE) and EKF Performance
adar/ racing of Constant Veocity arget : Comparison of Batch (LE) and EKF Performance I. Leibowicz homson-csf Deteis/IISA La cef de Saint-Pierre 1 Bd Jean ouin 7885 Eancourt Cede France Isabee.Leibowicz
More informationMARKOV CHAINS AND MARKOV DECISION THEORY. Contents
MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After
More informationCONSISTENT LABELING OF ROTATING MAPS
CONSISTENT LABELING OF ROTATING MAPS Andreas Gemsa, Martin Nöenburg, Ignaz Rutter Abstract. Dynamic maps that aow continuous map rotations, for exampe, on mobie devices, encounter new geometric abeing
More informationc 2016 Georgios Rovatsos
c 2016 Georgios Rovatsos QUICKEST CHANGE DETECTION WITH APPLICATIONS TO LINE OUTAGE DETECTION BY GEORGIOS ROVATSOS THESIS Submitted in partia fufiment of the requirements for the degree of Master of Science
More informationThe influence of temperature of photovoltaic modules on performance of solar power plant
IOSR Journa of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vo. 05, Issue 04 (Apri. 2015), V1 PP 09-15 www.iosrjen.org The infuence of temperature of photovotaic modues on performance
More informationImproving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees
Improving the Accuracy of Booean Tomography by Expoiting Path Congestion Degrees Zhiyong Zhang, Gaoei Fei, Fucai Yu, Guangmin Hu Schoo of Communication and Information Engineering, University of Eectronic
More informationFast Blind Recognition of Channel Codes
Fast Bind Recognition of Channe Codes Reza Moosavi and Erik G. Larsson Linköping University Post Print N.B.: When citing this work, cite the origina artice. 213 IEEE. Persona use of this materia is permitted.
More informationVALIDATED CONTINUATION FOR EQUILIBRIA OF PDES
VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES SARAH DAY, JEAN-PHILIPPE LESSARD, AND KONSTANTIN MISCHAIKOW Abstract. One of the most efficient methods for determining the equiibria of a continuous parameterized
More informationHYDROGEN ATOM SELECTION RULES TRANSITION RATES
DOING PHYSICS WITH MATLAB QUANTUM PHYSICS Ian Cooper Schoo of Physics, University of Sydney ian.cooper@sydney.edu.au HYDROGEN ATOM SELECTION RULES TRANSITION RATES DOWNLOAD DIRECTORY FOR MATLAB SCRIPTS
More informationConditions for Saddle-Point Equilibria in Output-Feedback MPC with MHE
Conditions for Sadde-Point Equiibria in Output-Feedback MPC with MHE David A. Copp and João P. Hespanha Abstract A new method for soving output-feedback mode predictive contro (MPC) and moving horizon
More informationGauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law
Gauss Law 1. Review on 1) Couomb s Law (charge and force) 2) Eectric Fied (fied and force) 2. Gauss s Law: connects charge and fied 3. Appications of Gauss s Law Couomb s Law and Eectric Fied Couomb s
More informationDecentralized Event-Driven Algorithms for Multi-Agent Persistent Monitoring Tasks
2017 IEEE 56th Annua Conference on Decision and Contro (CDC) December 12-15, 2017, Mebourne, Austraia Decentraized Event-Driven Agorithms for Muti-Agent Persistent Monitoring Tasks Nan Zhou 1, Christos
More informationSpace-Division Approach for Multi-pair MIMO Two Way Relaying: A Principal-Angle Perspective
Gobecom 03 - Wireess Communications Symposium Space-Division Approach for Muti-pair MIMO Two Way Reaying: A Principa-Ange Perspective Haiyang Xin, Xiaojun Yuan, and Soung-Chang Liew Dept. of Information
More informationNew Efficiency Results for Makespan Cost Sharing
New Efficiency Resuts for Makespan Cost Sharing Yvonne Beischwitz a, Forian Schoppmann a, a University of Paderborn, Department of Computer Science Fürstenaee, 3302 Paderborn, Germany Abstract In the context
More informationFirst-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries
c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische
More informationPreconditioned Locally Harmonic Residual Method for Computing Interior Eigenpairs of Certain Classes of Hermitian Matrices
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.mer.com Preconditioned Locay Harmonic Residua Method for Computing Interior Eigenpairs of Certain Casses of Hermitian Matrices Vecharynski, E.; Knyazev,
More informationIterative Decoding Performance Bounds for LDPC Codes on Noisy Channels
Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University
More informationBayesian Unscented Kalman Filter for State Estimation of Nonlinear and Non-Gaussian Systems
Bayesian Unscented Kaman Fiter for State Estimation of Noninear and Non-aussian Systems Zhong Liu, Shing-Chow Chan, Ho-Chun Wu and iafei Wu Department of Eectrica and Eectronic Engineering, he University
More informationBP neural network-based sports performance prediction model applied research
Avaiabe onine www.jocpr.com Journa of Chemica and Pharmaceutica Research, 204, 6(7:93-936 Research Artice ISSN : 0975-7384 CODEN(USA : JCPRC5 BP neura networ-based sports performance prediction mode appied
More informationFractional Power Control for Decentralized Wireless Networks
Fractiona Power Contro for Decentraized Wireess Networks Nihar Jinda, Steven Weber, Jeffrey G. Andrews Abstract We consider a new approach to power contro in decentraized wireess networks, termed fractiona
More informationImproved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization
Improved Min-Sum Decoding of LDPC Codes sing -Dimensiona Normaization Juntan Zhang and Marc Fossorier Department of Eectrica Engineering niversity of Hawaii at Manoa Honouu, HI 968 Emai: juntan, marc@spectra.eng.hawaii.edu
More informationA Solution to the 4-bit Parity Problem with a Single Quaternary Neuron
Neura Information Processing - Letters and Reviews Vo. 5, No. 2, November 2004 LETTER A Soution to the 4-bit Parity Probem with a Singe Quaternary Neuron Tohru Nitta Nationa Institute of Advanced Industria
More informationVALIDATED CONTINUATION FOR EQUILIBRIA OF PDES
SIAM J. NUMER. ANAL. Vo. 0, No. 0, pp. 000 000 c 200X Society for Industria and Appied Mathematics VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES SARAH DAY, JEAN-PHILIPPE LESSARD, AND KONSTANTIN MISCHAIKOW
More informationLobontiu: System Dynamics for Engineering Students Website Chapter 3 1. z b z
Chapter W3 Mechanica Systems II Introduction This companion website chapter anayzes the foowing topics in connection to the printed-book Chapter 3: Lumped-parameter inertia fractions of basic compiant
More informationOptimal islanding and load shedding
Optima isanding and oad shedding Pau Trodden, Waqquas Bukhsh, Andreas Grothey, Jacek Gondzio, Ken McKinnon March 11, 2011 Contents 1 Introduction 3 2 Optima oad shedding 3 2.1 AC OLS probem...............................
More informationOptimal Control of Assembly Systems with Multiple Stages and Multiple Demand Classes 1
Optima Contro of Assemby Systems with Mutipe Stages and Mutipe Demand Casses Saif Benjaafar Mohsen EHafsi 2 Chung-Yee Lee 3 Weihua Zhou 3 Industria & Systems Engineering, Department of Mechanica Engineering,
More informationDuality, Polite Water-filling, and Optimization for MIMO B-MAC Interference Networks and itree Networks
Duaity, Poite Water-fiing, and Optimization for MIMO B-MAC Interference Networks and itree Networks 1 An Liu, Youjian Eugene) Liu, Haige Xiang, Wu Luo arxiv:1004.2484v3 [cs.it] 4 Feb 2014 Abstract This
More informationExpectation-Maximization for Estimating Parameters for a Mixture of Poissons
Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Brandon Maone Department of Computer Science University of Hesini February 18, 2014 Abstract This document derives, in excrutiating
More informationTurbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University
Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver
More informationIn-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017
In-pane shear stiffness of bare stee deck through she finite eement modes G. Bian, B.W. Schafer June 7 COLD-FORMED STEEL RESEARCH CONSORTIUM REPORT SERIES CFSRC R-7- SDII Stee Diaphragm Innovation Initiative
More information