Centralized Coded Caching of Correlated Contents

Size: px
Start display at page:

Download "Centralized Coded Caching of Correlated Contents"

Transcription

1 Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv: v1 [cs.it] 10 Nov 2017 Abstract Coded caching and deivery is studied taking into account the correations among the contents in the ibrary. Correations are modeed as common parts shared by mutipe contents; that is, each fie in the database is composed of a group of subfies, where each subfie is shared by a different subset of fies. The number of fies that incude a certain subfie is defined as the eve of commonness of this subfie. First, a correation-aware uncoded caching scheme is proposed, and it is shown that the optima pacement for this scheme gives priority to the subfies with the highest eves of commonness. Then a correation-aware coded caching scheme is presented, and the cache capacity aocated to subfies with different eves of commonness is optimized in order to minimize the deivery rate. The proposed correation-aware coded caching scheme is shown to remarkaby outperform state-of-the-art correation-ignorant soutions, indicating the benefits of expoiting content correations in coded caching and deivery in networks. I. INTRODUCTION In proactive caching, popuar contents are stored in user devices during off-peak traffic periods even before they are requested by the users [1] [3]. Proactive caching is considered as a promising soution for the recent exposive growth of wireess data traffic, and can aeviate both the network congestion and the atency during peak traffic periods (see [1] [4], and references therein. Proactive caching typicay takes pace in two phases: the first phase takes pace during off-peak traffic periods, when users caches are fied as a function of the whoe ibrary of fies, referred to as the pacement phase; whie the second, deivery phase, takes pace during the peak traffic period when the users demands are reveaed and satisfied simutaneousy. In contrast to traditiona uncoded caching schemes, which simpy empoy orthogona unicast transmissions during the deivery phase, recenty proposed coded caching [4] creates coded muticasting opportunities, significanty reducing the amount of data that needs to be deivered to the users to satisfy their demands, even when these demands are distinct. Coded caching benefits from the aggregate cache capacity across the network, rather than oca cache capacities as in conventiona uncoded caching [4]. This significant improvement has motivated intense research interest on coded caching in recent years [5] [12]. Some works foow the simpified mode proposed in [4], and aim to improve the fundamenta imits of caching [6], [7], [13]; others consider more reaistic settings, such as decentraized caching [5], nonuniform popuarities across fies [9], [10], audience retention rate aware caching [14], or heterogeneous quaity of service requirements [12]. An important feature of video contents, which is the main source of the recent exposive traffic growth, is that, there may be significant overaps among different fies, e.g., the recordings of the same event from different anges and different cameras, or even the frames of the same scene in the same video. In [15], Hassanzadeh et a. propose a correationaware caching scheme, which groups the contents in the ibrary into two sets according to their correations as we as popuarity, where each fie in second set is compressed with respect to a fie in the first set. This scheme is shown to outperform correation-ignorant caching schemes. A more information theoretic formuation for caching of correated sources is considered in [16], focusing on a specia scenario with two receivers and one cache. A simiar informationtheoretic anaysis is carried out in [17] for two fies and two receivers, each with its own cache. In this paper, we consider a server with a ibrary of N correated fies, serving users equipped with oca caches. Different from [15], which ony expoits a fixed eve of common information among the fies, we consider a more genera mode in order to fuy expoit the potentia correations among different subsets of fies. We mode each fie in the server to be composed of a group of subfies, such that each subfie is shared by a different subset of fies. The number of fies to which each subfie beongs is defined as its eve of commonness. Equivaenty, in our mode, any subset of fies S share a common part that is independent of the rest of the ibrary, and shared excusivey by the fies in S. We first propose a correation-aware uncoded caching scheme, and show that the optima pacement for this scheme is achieved by giving priority to the subfies with the highest eves of commonness in the pacement phase. We then propose a correation-aware coded caching scheme, and derive a cosed-form expression of the achievabe deivery rate, based on which the cache capacity is optimay aocated to the subfies according to their eve of commonness. Then, we compare the performance of the proposed correation-aware schemes with those that ignore the correation, and the cutset bound; and show that, expoiting fie correations in coded caching can significanty reduce the deivery rate. Notations: The set of integers {i,..., j}, where i j, is denoted by [i : j], particuary, {1,..., j} is denoted by [j]. For sets A and B, we define A\B {x : x A, x / B}, and A denotes the cardinaity of A. ( j i represents the binomia coefficient if j i; otherwise, ( j i = 0. For event E, 1{E} = 1 if E is true; and 1{E} = 0, otherwise.

2 II. SYSTEM MODEL We consider a server with a database of N correated fies, W 1,..., W N, where each fie consists of 2 independent subfies, e.g., W i = W S, i [N]. Here, W S denotes S [N] i S the subfie shared excusivey by the subset of fies {W i : i S}. For simpicity, we assume that for S [N], W S = F, if S =, i.e., the common subfies shared excusivey by fies are of the same size of F bits. Let F (F 1,..., F N. As a resut, each fie in the ibrary is aso of the same size of F bits, given by F = N =1 ( N 1 F. (1 1 For S [N], S =, we say that the subfies W S have a commonness eve of. For exampe, W {1,2,3} and W {3,4,5} both have eve 3 commonness. For brevity, we refer to a the subfies with eve commonness as -subfies, = 1,..., N. We consider users connected to the server through a shared, error-free ink, each equipped with a cache of size MF bits. We consider centraized caching; that is, the server has the knowedge of the active users during the pacement phase, though not the knowedge of their demands. Centraized caching aows the server to fi the user caches in a coordinated manner. After the pacement phase, each user requests a singe fie from the ibrary, where d k [N] denotes user k s request, k []. A the requests are satisfied simutaneousy over the error-free shared ink. An (F, M, R caching code for this system consists of: caching functions f k, k [], f k : [2 F ] [2 F ] [2 MF ], (2 }{{} N fies such that the contents of user k s cache at the end of the pacement phase, denoted by Z k, is given by Z k = f k ({W i } N i=1 ; a deivery function g, g : [2 F ] [2 F ] D [2 RF ], (3 }{{} N fies where D (d 1,..., d, such that a singe message of RF bits, X D = g((w 1,..., W N, D, is sent by the server over the shared ink according to users demands; decoding functions h k, k [], h k : D [2 MF ] [2 RF ] [2 F ], (4 where Ŵd k = h k (D, Z k, X D, is the reconstruction of W dk at user k. Definition 1. A user cache capacity-deivery rate pair (M, R is achievabe for a system described above, if there exists a sequence of (F, M, R codes such that for any demand reaization D [N], im Pr } {Ŵdk W dk = 0. (5 F 1,...,F N k [] For a system with N fies and users, our goa is to characterize the minimum achievabe rate R as a function of the user cache capacity M, i.e., R (M inf{r : (M, R is achievabe}. III. CORRELATION-AWARE UNCODED CACHING AND DELIVERY (CAUC SCHEME We first present an uncoded caching and deivery scheme expoiting the correation among fies, referred to as CAUC. 1 Pacement phase: Each user caches the same p F bits from each -subfie, where 0 p 1, [N], such that N ( N MF = p F, (6 =1 which meets the imitation of the cache capacities. We refer to P (p 1,..., p N as the cache aocation vector, which wi be specified in the seque. 2 Deivery phase: The server deivers the remaining bits of each requested subfie that have not been cached by the users, i.e., W S for which 1{d k S} 1. k=1 In the worst case, when the demand combination is the most distinct, i.e., users request distinct fies for the case N, or each fie is requested by at east one user for the case N <, the deivery rate is given by N (( ( N min{n, 0} R CAUC (P = (1 p F. =1 (7 The optima P can be derived by soving the foowing optimization probem min R CAUC (P N ( N such that p F MF, =1 which, straightforwardy, eads to: p = 1, if C( MF ; p MF C(+1 =, if C( + 1 < MF < C(; and p ( N F = 0, otherwise; where we have defined C( N Fi, for [N]. We remark that the optima cache aocation gives priority to the subfies with the highest eve of commonness. i= IV. CORRELATION-AWARE CODED CACHING AND DELIVERY (CACC SCHEME In this section, we present a correation-aware coded caching and deivery scheme, referred to as CACC. Simiary to the CAUC scheme, we aocate different cache capacities to subfies of different eves of commonness, again specified by the cache aocation vector, P = (p 1,..., p N, which satisfies the constraint in (6, such that each user caches p F bits from each -subfie, [N]. In the foowing, we first present how coded caching and deivery of the subfies with the same eve of commonness is carried out, and then specify the aocation of cache capacity. ( N i (8

3 A. Coded Caching and Deivery of -subfies Here, for a given cache aocation vector P, we present the coded caching and deivery of -subfies, [N]. We define t p, 0 t. If t = 0, users do not cache the -subfies at a, whie if t =, each user stores a the - subfies in its cache. In the foowing, we focus on the cases where t [ 1]. 1 Pacement Phase: We empoy the prefetching scheme proposed by [4] for the subfies rather than the fies themseves: each -subfie is partitioned into ( t disjoint parts, each with approximatey the same size of F / ( t bits. We abe these ( t disjoint parts of each -subfie W S by W A S, where A = t, A []; that is, we have W S = A: A =t, A [] W A S. Each of these parts, W A S, is paced into the cache of user k if k A. Thus, each user caches a tota of ( 1 t 1 disjoint parts of each -subfie with a tota size of t F / bits, which sums up to p F bits. 2 Deivery Phase: We first focus on the case when N. There are a tota of ( N -subfies. We denote the set of these -subfies by W = { W S : S [N], S = }. Each user requires a tota of ( 1 -subfies, i.e., user k needs to recover subfies in { W S : S [N], S =, d k S }, k []. For each user, we can regard these ( 1 -subfies as ( 1 distinct demands. Our deivery scheme for the - subfies operates in ( 1 steps, and satisfies one demand of each user at each step. We define C j (c 1j,..., c Nj, where c ij {S : S [N], S =, i S}, i [N], j [ ( 1 ], which specifies which subfie shoud be deivered in the jth step of the deivery phase. C j is generated by Agorithm 1 by setting R = [N] and R =. Note that these vectors are generated independenty of the number of users or their demands. Exampe 1. Consider N = 5 and = 2. From Agorithm 1 we obtain: C 1 = ({1, 2}, {1, 2}, {3, 4}, {3, 4}, {1, 5}; C 2 = ({1, 5}, {2, 3}, {2, 3}, {4, 5}, {4, 5}; C 3 = ({1, 3}, {2, 5}, {1, 3}, {2, 4}, {2, 5}; C 4 = ({1, 4}, {2, 4}, {3, 5}, {1, 4}, {3, 5}. This means, for exampe, that, in the first step, subfies W 12, W 34, and W 15 wi be deivered (if there is a user requesting them. We denote by d j k c d k j the demand of user k to be satisfied in the jth step, i.e., user k recovers W d j after the jth step. k ( 1 We emphasize that W cij = {W S : S [N], S = j=1, i S}, i [N]; that is a the required -subfies wi be recovered by each user after step ( 1 for any demand combination. Exampe 2. Consider N = = 5 and = 2 as in Exampe 1. Consider distinct demands, i.e., D = {1, 2, 3, 4, 5}. Thus, Agorithm 1 Generate C j, j [ ( R 1 R 1 ] 1: procedure ASSIGNMENT 2: W t W, j 1, W ast, c ast 3: whie W t do 4: c t R 5: whie c t do 6: if c t R then 7: if c ast = then 8: Randomy seect one -subfie W S from W t such that S \ R c t, remove W S from W t, and c t c t \ S 9: for i S \ R do 10: c ij W ast 11: end for 12: ese 13: for i c ast \ R do 14: c ij S 15: end for 16: c t c t \ c ast, W ast 1, and c ast 17: end if 18: ese 19: Randomy seect one -subfie W S from W t such that c t S 20: for i c t do 21: c ij S 22: end for 23: for i R do 24: c ij 25: end for 26: W ast S, c ast S \ c t, c t, and j j : end if 28: end whie 29: end whie 30: end procedure based on C 1, we have d 1 1 = d 1 2 = {1, 2}, d 1 3 = d 1 4 = {3, 4}, and d 1 5 = {1, 5}; that is, at the end of the first step, users 1 and 2 shoud recover W 12, users 3 and 4 shoud recover W 34, whie user 5 shoud recover W 15. Exampe 3. With the same setting as in Exampe 2, consider now a non-distinct demand combination D = {1, 1, 1, 3, 4}. Based on C 1, we have d 1 1 = d 1 2 = d 1 3 = {1, 2}, and d 1 4 = d 1 5 = {3, 4}; that is, at the end of the first step users 1, 2 and 3 shoud recover W 12, whie users 4 and 5 shoud recover W 34. Based on the deivery scheme proposed in [13], we present our coded transmission scheme in Agorithm 2 according to C j, j [ ( 1 ], where R =, R = [N]. In Agorithm 2, we define A j as the number of distinct d j k for each j [( 1 ]. We note that, among the CODED DELIVERY and RANDOM

4 Agorithm 2 Coded transmission based on C j 1: procedure CODED DELIVERY 2: for k = 1,..., do 3: d j k c d k j 4: end for 5: U j Any subset of A j users with distinct d j k 6: for V [] : V = t + 1, 1{k V} 1 do k U j 7: Send k V W V\{k}. d j k 8: end for 9: end procedure 10: procedure RANDOM DELIVERY 11: for S R : S = R do 12: Server sends enough random inear combinations of the bits of -subfie W S R to enabe the users demanding it to decode it. 13: end for 14: end procedure DELIVERY procedures of Agorithm. 2, the one that requires a smaer deivery rate is performed. Exampe 2 - continued. In Exampe 2, assume that t = 1, i.e., each -subfie is divided into disjoint parts of equa size, and each disjoint part is cached exacty by one user. Based on D, we have A 1 = 3. Assume that U 1 = {1, 3, 5}. Then, the server sends {1,2} W {3} W {3} W W W W {3} W, W W {3}, W. By receiving these coded bits, users 1 and 2 can recover W {1,2} together with the contents of their own caches. Simiary, users 3 and 4 can recover W, whie user 5 recovers W. In the same manner, by coded transmission based on C 2, user 1 can recover W, users 2 and 3 recover W {2,3}, and users 4 and 5 recover W {4,5} in the second step. After four deivery steps based on C 1,..., C 4 each user decodes a the 2-subfies of their requests. The tota number of bits deivered in these four steps is 36F 2 /5. Exampe 3 - continued. Assume again that t = 1. Based on D, we have A 1 = 2, and et U 1 = {1, 4}. Then, the server sends W W {3} {1,2} W {1,2} W {3} W W, such that users 1, 2 and 3 can recover W {1,2}, whie users 4 and 5 can recover W. Based on C 2, the server sends {3} W W W {2,3} W {4,5}, {2,3}, W {3} {2,5}, W {3} {4,5}, {4,5}, W {2,3},, {4,5},, such that users 1, 2 and 3 can recover W, whie user 4 and user 5 can recover W {2,3} and W {4,5}, respectivey. Based on C 3, the server sends W {1,3} W {3} {1,3} {1,3}, {1,3}, W {1,3}, {1,3} {1,3}, W {3} {1,3}, {1,3}, W W {1,3}, based on which users 1,2,3 and 4 can recover W {1,3}, whie user 5 recovers W. Finay, based on C 4, the server sends {3} W W {1,4} W {1,4}, {1,4} {1,4}, W {3} {1,4} {1,4}, {1,4}, W {1,4}, {1,4}, {1,4}, such that users 1, 2, 3 and 4 are abe to recover W {1,4}, whie user 4 recovers W. Thus, a the users are abe to decode the 2-subfies they requested. The tota number of bits deivered in this case is 30F 2 /5. Next, we consider the case N >. We first seect a subset of fies R, R [N], such that R =, and d k R for k = 1,...,. For any subset R [N] \ R, R = s, s [max{, 0} : min{ 1, N }}], Agorithm 1 is appied to a subset of -subfies W = {W S R : S R, S = R } to derive C j, j [ ( R 1 R 1 ], based on which Agorithm 2 is appied to enabe each user to decode its demanded -subfies in W. Therefore, each user can decode a the -subfies it is demanding. B. Achievabe rate The foowing theorem presents the deivery rate achieved by the proposed coded caching and deivery scheme for any demand combination, for a given cache aocation vector P. Theorem 1. For the caching system described in Section II, given a cache aocation vector P, the foowing deivery rate is achievabe N R CACC (P = R (t, (9 =1 where t = p, and for t [0 : ], and α (t R (t = min{α (t, m (t }, (10 max{min{ 1,N },0} s=max{,0} ( ( N min{n, } 1 s s 1 [ ( ( max{ min{n,} ] s 1, 0} F t + 1 t + 1 F (, t (( ( (11 N min{n, 0} m (t (F t F //F. (12 For t / [0 : ], R (t is given by the ower convex enveop of the above achievabe points. Proof. We show that R (t given above is achievabe t [0 : ]. The ower convex enveop of these integer points can then be achieved by memory sharing. For the case N, reca that the requested -subfies are deivered in ( 1 steps based on C j, j = [ ( 1 ], derived by Agorithm 1. In each step, the server sends at most N/ + 1 -subfies. Therefore, for any demand combination, the number of distinct d j k based

5 on C j, i.e., A j N/ + 1, n = 1,..., ( 1. Simiar to the deivery scheme proposed in [13], by the CODED DELIVERY procedure of Agorithm 2, the server broadcasts binary sums that hep at east one user in U j based on C j. The tota number of such subsets of t users that contain at east one user in U j is given by ( ( t +1 max{ N/ 1,0} t +1. Hence, given t {1,..., 1}, the tota number of bits sent by CODED DELIVERY procedure of Agorithm 2 for the deivery of the -subfies is bounded by (normaized by F : ( N 1 [ ( ( max{ N/ 1, 0} ] F R (t 1 t + 1 t + 1 F ( t (13 The right hand side (RHS of 13 is equa to (11 for N. Since each user caches t F / bits of each -subfie, according to [5, Appendix A], the number of bits sent by the RANDOM DELIVERY procedure is bounded by ( N R (t (F t F //F. (14 The RHS equas to (12 for N. Hence, for t {1,..., 1}, we have proven R (t given in (10 is achievabe for N. We then focus on the case where N >. For any ( max{, 0} s min{ 1, N }, there are a tota of N s subsets R such that R [N] \ R, R = s. Foowing the simiar anaysis for the case where N, given R containing a the demanded fies such that R =, and any R such that R [N] \ R, R = s, requested -subfies in W = {W S R : S R, S = R } are sent in ( 1 s 1 step. At each step, there are at most N s + 1 -subfies to be sent. Therefore, with simiar arguments, the tota number of bits sent by CODED DELIVERY procedure of Agorithm 2 in each step is bounded by ( ( ( 1 ( s 1 t +1 max{ N s 1,0} F t +1 F( t, whie the number of bits send by the RANDOM DELIVERY procedure is bounded by ( s (F t F //F. By summing over a ( N s subsets R for each s [max{, 0} : min{ 1, N }], we have and, R (t min{ 1,N } ( N R (t s s=max{,0} ( ( ( max{ N 1, 0} s t + 1 t + 1 min{ 1,N } s=max{,0} ( N s ( 1 s 1 F F ( t, (15 ( (F t F //F, (16 s by which, we have proven the correctness of (10 for the case N >. Remark 1. At each step of sending -subfies in W = {W S R : S R, S = R }, there are sometimes N N s + 1 and sometimes s distinct demands, whie when N is a mutipe of s, there are aways N s distinct demands (R = [N], R =, s = 0, for the case N. To obtain a cosed-form expression for the achievabe deivery rate, we simpy assume N s + 1 distinct demands at each step. Note that, the more the number of distinct demands at each step, the arger the deivery rate. Therefore R CACC (P in (9 is an upper bound on the actua achievabe deivery rate of CACC. Fig. 1. Deivery rate (R vs. ratio of 2-subfies (r 2,r 3 = = r 10 = 0. C. Aocation of Cache Capacity We can further optimize the cache content distribution P by soving: min R CACC (P N ( N such that p F MF, =1 (17a (17b where the objective is to minimize the achievabe deivery rate under the cache capacity constraint. The probem in (17 can be soved numericay. V. LOWER BOUND In this section, we present a ower bound derived using cutset arguments. Theorem 2. (Cut-set Bound For the caching probem described in Section II, the optima achievabe deivery rate is ower bounded by R (M max p [1:min{N,}] ( p N/p N p N/p s=0 p N/p =1 F+s N/p pm N/p. ( N p N/p s (18a Proof. The proof wi be provided in a onger version of the paper. VI. NUMERICAL RESULTS In this section, we numericay compare the deivery rates of the proposed correation-aware caching schemes CAUC and CACC with the ower bound and the state-of-the-art coded caching scheme from [13], which does not take the content

6 Fig. 2. Deivery rate (R vs. ratio of 10-subfies (r 10, r 2 = = r 10 = 0. correations into account. We refer to the ater scheme as the correation-ignorant coded caching scheme (CICC. We consider N = 10 fies and k = 10 users. Each user is equipped with a cache of size F bits, i.e., M = 1. We denote ( by r the ratio of -subfies among each fie, i.e., r 1 F /F. Note that, we have =1 r = 1. In Fig. IV-C, we assume that the fies have ony pairwise correations, that is, r 3 = = r 10 = 0, and we pot the deivery rate as a function of r 2. Meanwhie, in Fig. VI, we assume that each fie consists of a private part, i.e., 1-subfie, and a common subfie that is shared by a the fies in the ibrary, i.e., 10- subfie, i.e., r 2 = = r 9 = 0. We pot the deivery rate as a function of r 10. We observe in both figures that the deivery rate achieved by the correation-ignorant scheme, CICC, remains the same no matter how high the ratio of common subfies, whie the deivery rates of the correation-aware schemes, CAUC and CACC, decrease as the ratio of the common subfies increases. Obviousy, CACC achieves a ower deivery rate than both CAUC and CICC, since it benefits both from incorporating the correations among the fies as we as coded muticasting. When the ratio of the common subfies is sufficienty arge, even without coded muticasting CAUC achieves a ower deivery rate than CICC. It can aso be observed that the deivery rates of correation-aware schemes decrease faster with the percentage of common subfies in Fig. VI than in Fig. IV-C. That is because the gain from expoiting correation is more pronounced as the common parts are shared among more fies. Whie there is a gap between the cut-set ower bound and the achievabe deivery rate, we note that the gap is smaer in Fig VI, where the eve of commonness is higher. VII. CONCLUSIONS We have studied coded caching taking into account the avaiabe correations among the fies in the ibrary. To capture arbitrary correations, we assume that each fie consists of a number of subfies, each of which is shared by a different subset of fies in the ibrary, and the number of fies that share a certain subfie is defined as its eve of commonness. We proposed both a correation-aware uncoded caching scheme, the optima pacement of which is proven to be caching the subfies with the highest eves of commonness, and a correation-aware coded caching scheme (CACC, the pacement of which is optimized in terms of the achievabe deivery rate. The proposed CACC scheme, or even the uncoded caching scheme when the correation among fies is strong enough, is shown to significanty outperform the best known achievabe deivery rate by correation-unaware soution in the iterature. REFERENCES [1] M. Gregori, J. Gomez-Viardebo, J. Matamoros, and D. Gündüz, Wireess content caching for sma ce and D2D networks, IEEE J. Se. Areas Commun., vo. 34, no. 5, pp , Mar [2] E. Bastug, M. Bennis, and M. Debbah, Living on the edge: The roe of proactive caching in 5g wireess networks, IEEE Communications Magazine, vo. 52, no. 8, pp , Aug [3] S. O. Somuyiwa, A. György, and D. Gündüz, Improved poicy representation and poicy search for proactive content caching in wireess networks, in Proc. IEEE Int Symp. on Modeing and Opt. in Mobie, Ad Hoc, and Wireess Netw. (WiOpt, Paris, France, May [4] M. A. Maddah-Ai and U. Niesen, Fundamenta imits of caching, IEEE Trans. Inform. Theory, vo. 60, no. 5, pp , May [5], Decentraized caching attains order optima memory-rate tradeoff, IEEE/ACM Trans. Netw, vo. 23, no. 4, pp , Apr [6] M. Mohammadi Amiri, Q. Yang, and D. Gündüz, Coded caching for a arge number of users, in Proc. IEEE Inform. Theory Workshop (ITW, Cambridge, U, Sep. 2016, pp [7] M. Mohammadi Amiri and D. Gündüz, Fundamenta imits of coded caching: Improved deivery rate-cache capacity trade-off, IEEE Trans. Commun., vo. 65, no. 2, pp , Feb [8] J. Gomez-Viardebo, Fundamenta imits of caching: Improved bounds with coded prefetching, arxiv: v2 [cs.it], Jan [9] M. Ji, A. M. Tuino, J. Lorca, and G. Caire, Order-optima rate of caching and coded muticasting with random demands, arxiv: v1 [cs.it], Feb [10] U. Niesen and M. A. Maddah-Ai, Coded caching with nonuniform demands, IEEE Trans. Inform. Theory, vo. 63, no. 2, pp , Feb [11] R. Pedarsani, M. A. Maddah-Ai, and U. Niesen, Onine coded caching, in Proc. IEEE Int Conf. Commun. (ICC, Sydney, Austraia, Jun. 2014, pp [12] Q. Yang and D. Gündüz, Coded caching and content deivery with heterogeneous distortion requirements, arxiv: v1 [cs.it], Aug [13] Q. Yu, M. A. Maddah-Ai, and A. S. Avestimehr, The exact ratememory tradeoff for caching with uncoded prefetching, in Proc. IEEE Int Symp. on Inform. Theory (ISIT, Aachen, Germany, Jun 2017, pp [14] Q. Yang, M. Mohammadi Amiri, and D. Gündüz, Audience retention rate aware coded video caching, in Proc. IEEE Int Conf. on Commun. Workshop (ICC Workshop, Paris, France, Jun. 2017, pp [15] P. Hassanzadeh, A. Tuino, J. Lorca, and E. Erkip, Correation-aware distributed caching and coded deivery, in Proc. IEEE Inform. Theory Workshop (ITW, Cambridge, U, Sep. 2016, pp [16] R. Timo, S. S. Bidokhti, M. Wigger, and B. C. Geiger, A rate-distortion approach to caching, arxiv: v1 [cs.it], Oct [17] P. Hassanzadeh, A. Tuino, J. Lorca, and E. Erkip, Rate-memory tradeoff for the two-user broadcast caching network with correated sources, arxiv: v1 [cs.it], May 2017.

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes A Fundamenta Storage-Communication Tradeoff in Distributed Computing with Stragging odes ifa Yan, Michèe Wigger LTCI, Téécom ParisTech 75013 Paris, France Emai: {qifa.yan, michee.wigger} @teecom-paristech.fr

More information

Coded Caching for Files with Distinct File Sizes

Coded Caching for Files with Distinct File Sizes Coded Caching for Fies with Distinct Fie Sizes Jinbei Zhang iaojun Lin Chih-Chun Wang inbing Wang Department of Eectronic Engineering Shanghai Jiao ong University China Schoo of Eectrica and Computer Engineering

More information

Improved Converses and Gap-Results for Coded Caching

Improved Converses and Gap-Results for Coded Caching Improved Converses and Gap-Resuts for Coded Caching Chien-Yi Wang, Shirin Saeedi Bidokhti, and Michèe Wigger Abstract arxiv:702.04834v [cs.it] 6 Feb 207 Improved ower bounds on the average and the worst-case

More information

Cache Aided Wireless Networks: Tradeoffs between Storage and Latency

Cache Aided Wireless Networks: Tradeoffs between Storage and Latency Cache Aided Wireess Networks: Tradeoffs between Storage and Latency Avik Sengupta Hume Center, Department of ECE Virginia Tech, Backsburg, VA 24060, USA Emai: aviksg@vt.edu Ravi Tandon Department of ECE

More information

On Coded Caching with Correlated Files

On Coded Caching with Correlated Files On Coded Caching with Correlated Files Kai Wan, Daniela Tuninetti, Mingyue Ji, Giuseppe Care, Technische Universität Berlin, Berlin, Germany, {kai.wan, caire}@tu-berlin.de University of Illinois at Chicago,

More information

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems Source and Reay Matrices Optimization for Mutiuser Muti-Hop MIMO Reay Systems Yue Rong Department of Eectrica and Computer Engineering, Curtin University, Bentey, WA 6102, Austraia Abstract In this paper,

More information

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization Scaabe Spectrum ocation for Large Networks ased on Sparse Optimization innan Zhuang Modem R&D Lab Samsung Semiconductor, Inc. San Diego, C Dongning Guo, Ermin Wei, and Michae L. Honig Department of Eectrica

More information

Information Theoretic Caching: The Multi-User Case

Information Theoretic Caching: The Multi-User Case Information Theoretic Caching: The Muti-User Case Sung Hoon Lim, Chien-Yi Wang, and Michae Gastpar arxiv:604.02333v [cs.it] 8 Apr 206 Abstract In this paper, we consider a cache aided network in which

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 2, FEBRUARY

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 2, FEBRUARY IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO. 2, FEBRUARY 206 857 Optima Energy and Data Routing in Networks With Energy Cooperation Berk Gurakan, Student Member, IEEE, OmurOze,Member, IEEE,

More information

Improved Approximation of Storage-Rate Tradeoff for Caching via New Outer Bounds

Improved Approximation of Storage-Rate Tradeoff for Caching via New Outer Bounds Improved Approximation of Storage-Rate Tradeoff for Caching via New Outer Bound Avik Sengupta, Ravi Tandon, T. Chare Cancy Hume Center & Dept. of Eectrica and Computer Engineering Dicovery Anaytic Center

More information

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Approximated MLC shape matrix decomposition with intereaf coision constraint Thomas Kainowski Antje Kiese Abstract Shape matrix decomposition is a subprobem in radiation therapy panning. A given fuence

More information

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Agorithmic Operations Research Vo.4 (29) 49 57 Approximated MLC shape matrix decomposition with intereaf coision constraint Antje Kiese and Thomas Kainowski Institut für Mathematik, Universität Rostock,

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao, Vivek Raghunathan, Stephen Hany, Vinod Sharma and. R. Kumar Abstract We consider a joint power contro

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

Target Location Estimation in Wireless Sensor Networks Using Binary Data

Target Location Estimation in Wireless Sensor Networks Using Binary Data Target Location stimation in Wireess Sensor Networks Using Binary Data Ruixin Niu and Pramod K. Varshney Department of ectrica ngineering and Computer Science Link Ha Syracuse University Syracuse, NY 344

More information

<C 2 2. λ 2 l. λ 1 l 1 < C 1

<C 2 2. λ 2 l. λ 1 l 1 < C 1 Teecommunication Network Contro and Management (EE E694) Prof. A. A. Lazar Notes for the ecture of 7/Feb/95 by Huayan Wang (this document was ast LaT E X-ed on May 9,995) Queueing Primer for Muticass Optima

More information

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR 1 Maximizing Sum Rate and Minimizing MSE on Mutiuser Downink: Optimaity, Fast Agorithms and Equivaence via Max-min SIR Chee Wei Tan 1,2, Mung Chiang 2 and R. Srikant 3 1 Caifornia Institute of Technoogy,

More information

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks An Adaptive Opportunistic Routing Scheme for Wireess Ad-hoc Networks A.A. Bhorkar, M. Naghshvar, T. Javidi, and B.D. Rao Department of Eectrica Engineering, University of Caifornia San Diego, CA, 9093

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

Transmit Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance

Transmit Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance Transmit ntenna Seection for Physica-Layer Networ Coding ased on Eucidean Distance 1 arxiv:179.445v1 [cs.it] 13 Sep 17 Vaibhav Kumar, arry Cardiff, and Mar F. Fanagan Schoo of Eectrica and Eectronic Engineering,

More information

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c) A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Joint work with Jinbei Zhang (SJTU), Chih-Chun Wang (Purdue) and Xinbing Wang (SJTU)

More information

Limited magnitude error detecting codes over Z q

Limited magnitude error detecting codes over Z q Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica

More information

(This is a sample cover image for this issue. The actual cover is not yet available at this time.)

(This is a sample cover image for this issue. The actual cover is not yet available at this time.) (This is a sampe cover image for this issue The actua cover is not yet avaiabe at this time) This artice appeared in a journa pubished by Esevier The attached copy is furnished to the author for interna

More information

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient

More information

Discrete Applied Mathematics

Discrete Applied Mathematics Discrete Appied Mathematics 159 (2011) 812 825 Contents ists avaiabe at ScienceDirect Discrete Appied Mathematics journa homepage: www.esevier.com/ocate/dam A direct barter mode for course add/drop process

More information

Unconditional security of differential phase shift quantum key distribution

Unconditional security of differential phase shift quantum key distribution Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice

More information

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION Hsiao-Chang Chen Dept. of Systems Engineering University of Pennsyvania Phiadephia, PA 904-635, U.S.A. Chun-Hung Chen

More information

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai

More information

SydU STAT3014 (2015) Second semester Dr. J. Chan 18

SydU STAT3014 (2015) Second semester Dr. J. Chan 18 STAT3014/3914 Appied Stat.-Samping C-Stratified rand. sampe Stratified Random Samping.1 Introduction Description The popuation of size N is divided into mutuay excusive and exhaustive subpopuations caed

More information

u(x) s.t. px w x 0 Denote the solution to this problem by ˆx(p, x). In order to obtain ˆx we may simply solve the standard problem max x 0

u(x) s.t. px w x 0 Denote the solution to this problem by ˆx(p, x). In order to obtain ˆx we may simply solve the standard problem max x 0 Bocconi University PhD in Economics - Microeconomics I Prof M Messner Probem Set 4 - Soution Probem : If an individua has an endowment instead of a monetary income his weath depends on price eves In particuar,

More information

LOW-COMPLEXITY LINEAR PRECODING FOR MULTI-CELL MASSIVE MIMO SYSTEMS

LOW-COMPLEXITY LINEAR PRECODING FOR MULTI-CELL MASSIVE MIMO SYSTEMS LOW-COMPLEXITY LINEAR PRECODING FOR MULTI-CELL MASSIVE MIMO SYSTEMS Aba ammoun, Axe Müer, Emi Björnson,3, and Mérouane Debbah ing Abduah University of Science and Technoogy (AUST, Saudi Arabia Acate-Lucent

More information

Optimality of Gaussian Fronthaul Compression for Uplink MIMO Cloud Radio Access Networks

Optimality of Gaussian Fronthaul Compression for Uplink MIMO Cloud Radio Access Networks Optimaity of Gaussian Fronthau Compression for Upink MMO Coud Radio Access etworks Yuhan Zhou, Yinfei Xu, Jun Chen, and Wei Yu Department of Eectrica and Computer Engineering, University of oronto, Canada

More information

Coded Caching under Arbitrary Popularity Distributions

Coded Caching under Arbitrary Popularity Distributions Coded Caching under Arbitrary Popularity Distributions Jinbei Zhang, Xiaojun Lin, Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University, China School of Electrical and Computer Engineering,

More information

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract Stochastic Compement Anaysis of Muti-Server Threshod Queues with Hysteresis John C.S. Lui The Dept. of Computer Science & Engineering The Chinese University of Hong Kong Leana Goubchik Dept. of Computer

More information

A Novel Index Coding Scheme and its Application to Coded Caching

A Novel Index Coding Scheme and its Application to Coded Caching A ovel Index Coding Scheme and its Application to Coded Caching ai Wan Laboratoire des Signaux et Systèmes L2S CentraleSupèlec-CRS-Universitè Paris-Sud 91192 Gif-sur-Yvette, France Email: kai.wan@u-psud.fr

More information

Tracking Control of Multiple Mobile Robots

Tracking Control of Multiple Mobile Robots Proceedings of the 2001 IEEE Internationa Conference on Robotics & Automation Seou, Korea May 21-26, 2001 Tracking Contro of Mutipe Mobie Robots A Case Study of Inter-Robot Coision-Free Probem Jurachart

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay Throughput Optima Scheduing for Wireess Downinks with Reconfiguration Deay Vineeth Baa Sukumaran vineethbs@gmai.com Department of Avionics Indian Institute of Space Science and Technoogy. Abstract We consider

More information

Precoding for the Sparsely Spread MC-CDMA Downlink with Discrete-Alphabet Inputs

Precoding for the Sparsely Spread MC-CDMA Downlink with Discrete-Alphabet Inputs IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.*, NO.*, MONTH 2016 1 Precoding for the Sparsey Spread MC-CDMA Downin with Discrete-Aphabet Inputs Min Li, Member, IEEE, Chunshan Liu, Member, IEEE, and Stephen

More information

Tight Approximation Algorithms for Maximum Separable Assignment Problems

Tight Approximation Algorithms for Maximum Separable Assignment Problems MATHEMATICS OF OPERATIONS RESEARCH Vo. 36, No. 3, August 011, pp. 416 431 issn 0364-765X eissn 156-5471 11 3603 0416 10.187/moor.1110.0499 011 INFORMS Tight Approximation Agorithms for Maximum Separabe

More information

Coded Caching for Files with Distinct File Sizes

Coded Caching for Files with Distinct File Sizes Coded Caching for Files with Distinct File Sizes Jinbei Zhang, Xiaojun Lin, Chih-Chun Wang, Xinbing Wang Shanghai Jiao Tong University Purdue University The Importance of Caching Server cache cache cache

More information

Reliability: Theory & Applications No.3, September 2006

Reliability: Theory & Applications No.3, September 2006 REDUNDANCY AND RENEWAL OF SERVERS IN OPENED QUEUING NETWORKS G. Sh. Tsitsiashvii M.A. Osipova Vadivosto, Russia 1 An opened queuing networ with a redundancy and a renewa of servers is considered. To cacuate

More information

BICM Performance Improvement via Online LLR Optimization

BICM Performance Improvement via Online LLR Optimization BICM Performance Improvement via Onine LLR Optimization Jinhong Wu, Mostafa E-Khamy, Jungwon Lee and Inyup Kang Samsung Mobie Soutions Lab San Diego, USA 92121 Emai: {Jinhong.W, Mostafa.E, Jungwon2.Lee,

More information

Competitive Diffusion in Social Networks: Quality or Seeding?

Competitive Diffusion in Social Networks: Quality or Seeding? Competitive Diffusion in Socia Networks: Quaity or Seeding? Arastoo Fazei Amir Ajorou Ai Jadbabaie arxiv:1503.01220v1 [cs.gt] 4 Mar 2015 Abstract In this paper, we study a strategic mode of marketing and

More information

MC-CDMA CDMA Systems. Introduction. Ivan Cosovic. Stefan Kaiser. IEEE Communication Theory Workshop 2005 Park City, USA, June 15, 2005

MC-CDMA CDMA Systems. Introduction. Ivan Cosovic. Stefan Kaiser. IEEE Communication Theory Workshop 2005 Park City, USA, June 15, 2005 On the Adaptivity in Down- and Upink MC- Systems Ivan Cosovic German Aerospace Center (DLR) Institute of Comm. and Navigation Oberpfaffenhofen, Germany Stefan Kaiser DoCoMo Euro-Labs Wireess Soution Laboratory

More information

Reliability Improvement with Optimal Placement of Distributed Generation in Distribution System

Reliability Improvement with Optimal Placement of Distributed Generation in Distribution System Reiabiity Improvement with Optima Pacement of Distributed Generation in Distribution System N. Rugthaicharoencheep, T. Langtharthong Abstract This paper presents the optima pacement and sizing of distributed

More information

Linear Network Coding for Multiple Groupcast Sessions: An Interference Alignment Approach

Linear Network Coding for Multiple Groupcast Sessions: An Interference Alignment Approach Linear Network Coding for Mutipe Groupcast Sessions: An Interference Aignment Approach Abhik Kumar Das, Siddhartha Banerjee and Sriram Vishwanath Dept. of ECE, The University of Texas at Austin, TX, USA

More information

A Statistical Framework for Real-time Event Detection in Power Systems

A Statistical Framework for Real-time Event Detection in Power Systems 1 A Statistica Framework for Rea-time Event Detection in Power Systems Noan Uhrich, Tim Christman, Phiip Swisher, and Xichen Jiang Abstract A quickest change detection (QCD) agorithm is appied to the probem

More information

The Streaming-DMT of Fading Channels

The Streaming-DMT of Fading Channels The Streaming-DMT of Fading Channes Ashish Khisti Member, IEEE, and Star C. Draper Member, IEEE arxiv:30.80v3 cs.it] Aug 04 Abstract We consider the sequentia transmission of a stream of messages over

More information

Rate-Distortion Theory of Finite Point Processes

Rate-Distortion Theory of Finite Point Processes Rate-Distortion Theory of Finite Point Processes Günther Koiander, Dominic Schuhmacher, and Franz Hawatsch, Feow, IEEE Abstract We study the compression of data in the case where the usefu information

More information

Integrality ratio for Group Steiner Trees and Directed Steiner Trees

Integrality ratio for Group Steiner Trees and Directed Steiner Trees Integraity ratio for Group Steiner Trees and Directed Steiner Trees Eran Haperin Guy Kortsarz Robert Krauthgamer Aravind Srinivasan Nan Wang Abstract The natura reaxation for the Group Steiner Tree probem,

More information

Stochastic Variational Inference with Gradient Linearization

Stochastic Variational Inference with Gradient Linearization Stochastic Variationa Inference with Gradient Linearization Suppementa Materia Tobias Pötz * Anne S Wannenwetsch Stefan Roth Department of Computer Science, TU Darmstadt Preface In this suppementa materia,

More information

Arbitrary Throughput Versus Complexity Tradeoffs in Wireless Networks using Graph Partitioning

Arbitrary Throughput Versus Complexity Tradeoffs in Wireless Networks using Graph Partitioning University of Pennsyvania SchoaryCommons Departmenta Papers (ESE) Department of Eectrica & Systems Engineering November 2006 Arbitrary Throughput Versus Compexity Tradeoffs in Wireess Networks using Graph

More information

arxiv: v1 [cs.db] 25 Jun 2013

arxiv: v1 [cs.db] 25 Jun 2013 Communication Steps for Parae Query Processing Pau Beame, Paraschos Koutris and Dan Suciu {beame,pkoutris,suciu}@cs.washington.edu University of Washington arxiv:1306.5972v1 [cs.db] 25 Jun 2013 June 26,

More information

Coded Caching with Low Subpacketization Levels

Coded Caching with Low Subpacketization Levels Electrical and Computer Engineering Conference Papers, Posters and Presentations Electrical and Computer Engineering 06 Coded Caching with Low Subpacetization Levels Li Tang Iowa State University, litang@iastateedu

More information

Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1

Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1 Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rues 1 R.J. Marks II, S. Oh, P. Arabshahi Λ, T.P. Caude, J.J. Choi, B.G. Song Λ Λ Dept. of Eectrica Engineering Boeing Computer Services University

More information

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines Recursive Constructions of Parae FIFO and LIFO Queues with Switched Deay Lines Po-Kai Huang, Cheng-Shang Chang, Feow, IEEE, Jay Cheng, Member, IEEE, and Duan-Shin Lee, Senior Member, IEEE Abstract One

More information

Supplemental Information

Supplemental Information Suppementa Information A Singe-eve Tunne Mode to Account for Eectrica Transport through Singe Moecue- Sef-Assembed Monoayer-based Junctions by A. R. Garrigues,. Yuan,. Wang, E. R. Muccioo, D. Thompson,

More information

Polite Water-filling for the Boundary of the Capacity/Achievable Regions of MIMO MAC/BC/Interference Networks

Polite Water-filling for the Boundary of the Capacity/Achievable Regions of MIMO MAC/BC/Interference Networks 2011 IEEE Internationa Symposium on Information Theory Proceedings Poite Water-fiing for the Boundary of the Capacity/Achievabe Regions of MIMO MAC/BC/Interference Networks An iu 1, Youjian iu 2, Haige

More information

Introduction to LMTO method

Introduction to LMTO method 1 Introduction to MTO method 24 February 2011; V172 P.Ravindran, FME-course on Ab initio Modeing of soar ce Materias 24 February 2011 Introduction to MTO method Ab initio Eectronic Structure Cacuations

More information

Optimality of Inference in Hierarchical Coding for Distributed Object-Based Representations

Optimality of Inference in Hierarchical Coding for Distributed Object-Based Representations Optimaity of Inference in Hierarchica Coding for Distributed Object-Based Representations Simon Brodeur, Jean Rouat NECOTIS, Département génie éectrique et génie informatique, Université de Sherbrooke,

More information

How to Optimally Allocate Resources for Coded Distributed Computing?

How to Optimally Allocate Resources for Coded Distributed Computing? 1 How to Optimally Allocate Resources for Coded Distributed Computing? Qian Yu, Songze Li, Mohammad Ali Maddah-Ali, and A. Salman Avestimehr Department of Electrical Engineering, University of Southern

More information

Gokhan M. Guvensen, Member, IEEE, and Ender Ayanoglu, Fellow, IEEE. Abstract

Gokhan M. Guvensen, Member, IEEE, and Ender Ayanoglu, Fellow, IEEE. Abstract A Generaized Framework on Beamformer esign 1 and CSI Acquisition for Singe-Carrier Massive MIMO Systems in Miimeter Wave Channes Gokhan M. Guvensen, Member, IEEE, and Ender Ayanogu, Feow, IEEE arxiv:1607.01436v1

More information

$, (2.1) n="# #. (2.2)

$, (2.1) n=# #. (2.2) Chapter. Eectrostatic II Notes: Most of the materia presented in this chapter is taken from Jackson, Chap.,, and 4, and Di Bartoo, Chap... Mathematica Considerations.. The Fourier series and the Fourier

More information

Downlink Transmission of Short Packets: Framing and Control Information Revisited

Downlink Transmission of Short Packets: Framing and Control Information Revisited 1 Downin ransmission of Short Pacets: Frag and Contro Information Revisited Kasper Føe riingsgaard, Student Member, IEEE and Petar Popovsi, Feow, IEEE arxiv:1605.01829v1 cs.i 6 May 2016 Abstract Ceuar

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

DOCUMENT DE TRAVAIL

DOCUMENT DE TRAVAIL Pubié par : Pubished by: Pubicación de a: Facuté des sciences de administration 2325, rue de a Terrasse Pavion Paasis-Prince, Université Lava Québec (Québec) Canada G1V 0A6 Té. Ph. Te. : (418) 656-3644

More information

Codes between MBR and MSR Points with Exact Repair Property

Codes between MBR and MSR Points with Exact Repair Property Codes between MBR and MSR Points with Exact Repair Property 1 Toni Ernva arxiv:1312.5106v1 [cs.it] 18 Dec 2013 Abstract In this paper distributed storage systems with exact repair are studied. A construction

More information

Radar/ESM Tracking of Constant Velocity Target : Comparison of Batch (MLE) and EKF Performance

Radar/ESM Tracking of Constant Velocity Target : Comparison of Batch (MLE) and EKF Performance adar/ racing of Constant Veocity arget : Comparison of Batch (LE) and EKF Performance I. Leibowicz homson-csf Deteis/IISA La cef de Saint-Pierre 1 Bd Jean ouin 7885 Eancourt Cede France Isabee.Leibowicz

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

CONSISTENT LABELING OF ROTATING MAPS

CONSISTENT LABELING OF ROTATING MAPS CONSISTENT LABELING OF ROTATING MAPS Andreas Gemsa, Martin Nöenburg, Ignaz Rutter Abstract. Dynamic maps that aow continuous map rotations, for exampe, on mobie devices, encounter new geometric abeing

More information

c 2016 Georgios Rovatsos

c 2016 Georgios Rovatsos c 2016 Georgios Rovatsos QUICKEST CHANGE DETECTION WITH APPLICATIONS TO LINE OUTAGE DETECTION BY GEORGIOS ROVATSOS THESIS Submitted in partia fufiment of the requirements for the degree of Master of Science

More information

The influence of temperature of photovoltaic modules on performance of solar power plant

The influence of temperature of photovoltaic modules on performance of solar power plant IOSR Journa of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vo. 05, Issue 04 (Apri. 2015), V1 PP 09-15 www.iosrjen.org The infuence of temperature of photovotaic modues on performance

More information

Improving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees

Improving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees Improving the Accuracy of Booean Tomography by Expoiting Path Congestion Degrees Zhiyong Zhang, Gaoei Fei, Fucai Yu, Guangmin Hu Schoo of Communication and Information Engineering, University of Eectronic

More information

Fast Blind Recognition of Channel Codes

Fast Blind Recognition of Channel Codes Fast Bind Recognition of Channe Codes Reza Moosavi and Erik G. Larsson Linköping University Post Print N.B.: When citing this work, cite the origina artice. 213 IEEE. Persona use of this materia is permitted.

More information

VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES

VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES SARAH DAY, JEAN-PHILIPPE LESSARD, AND KONSTANTIN MISCHAIKOW Abstract. One of the most efficient methods for determining the equiibria of a continuous parameterized

More information

HYDROGEN ATOM SELECTION RULES TRANSITION RATES

HYDROGEN ATOM SELECTION RULES TRANSITION RATES DOING PHYSICS WITH MATLAB QUANTUM PHYSICS Ian Cooper Schoo of Physics, University of Sydney ian.cooper@sydney.edu.au HYDROGEN ATOM SELECTION RULES TRANSITION RATES DOWNLOAD DIRECTORY FOR MATLAB SCRIPTS

More information

Conditions for Saddle-Point Equilibria in Output-Feedback MPC with MHE

Conditions for Saddle-Point Equilibria in Output-Feedback MPC with MHE Conditions for Sadde-Point Equiibria in Output-Feedback MPC with MHE David A. Copp and João P. Hespanha Abstract A new method for soving output-feedback mode predictive contro (MPC) and moving horizon

More information

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law Gauss Law 1. Review on 1) Couomb s Law (charge and force) 2) Eectric Fied (fied and force) 2. Gauss s Law: connects charge and fied 3. Appications of Gauss s Law Couomb s Law and Eectric Fied Couomb s

More information

Decentralized Event-Driven Algorithms for Multi-Agent Persistent Monitoring Tasks

Decentralized Event-Driven Algorithms for Multi-Agent Persistent Monitoring Tasks 2017 IEEE 56th Annua Conference on Decision and Contro (CDC) December 12-15, 2017, Mebourne, Austraia Decentraized Event-Driven Agorithms for Muti-Agent Persistent Monitoring Tasks Nan Zhou 1, Christos

More information

Space-Division Approach for Multi-pair MIMO Two Way Relaying: A Principal-Angle Perspective

Space-Division Approach for Multi-pair MIMO Two Way Relaying: A Principal-Angle Perspective Gobecom 03 - Wireess Communications Symposium Space-Division Approach for Muti-pair MIMO Two Way Reaying: A Principa-Ange Perspective Haiyang Xin, Xiaojun Yuan, and Soung-Chang Liew Dept. of Information

More information

New Efficiency Results for Makespan Cost Sharing

New Efficiency Results for Makespan Cost Sharing New Efficiency Resuts for Makespan Cost Sharing Yvonne Beischwitz a, Forian Schoppmann a, a University of Paderborn, Department of Computer Science Fürstenaee, 3302 Paderborn, Germany Abstract In the context

More information

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische

More information

Preconditioned Locally Harmonic Residual Method for Computing Interior Eigenpairs of Certain Classes of Hermitian Matrices

Preconditioned Locally Harmonic Residual Method for Computing Interior Eigenpairs of Certain Classes of Hermitian Matrices MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.mer.com Preconditioned Locay Harmonic Residua Method for Computing Interior Eigenpairs of Certain Casses of Hermitian Matrices Vecharynski, E.; Knyazev,

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

Bayesian Unscented Kalman Filter for State Estimation of Nonlinear and Non-Gaussian Systems

Bayesian Unscented Kalman Filter for State Estimation of Nonlinear and Non-Gaussian Systems Bayesian Unscented Kaman Fiter for State Estimation of Noninear and Non-aussian Systems Zhong Liu, Shing-Chow Chan, Ho-Chun Wu and iafei Wu Department of Eectrica and Eectronic Engineering, he University

More information

BP neural network-based sports performance prediction model applied research

BP neural network-based sports performance prediction model applied research Avaiabe onine www.jocpr.com Journa of Chemica and Pharmaceutica Research, 204, 6(7:93-936 Research Artice ISSN : 0975-7384 CODEN(USA : JCPRC5 BP neura networ-based sports performance prediction mode appied

More information

Fractional Power Control for Decentralized Wireless Networks

Fractional Power Control for Decentralized Wireless Networks Fractiona Power Contro for Decentraized Wireess Networks Nihar Jinda, Steven Weber, Jeffrey G. Andrews Abstract We consider a new approach to power contro in decentraized wireess networks, termed fractiona

More information

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization Improved Min-Sum Decoding of LDPC Codes sing -Dimensiona Normaization Juntan Zhang and Marc Fossorier Department of Eectrica Engineering niversity of Hawaii at Manoa Honouu, HI 968 Emai: juntan, marc@spectra.eng.hawaii.edu

More information

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron Neura Information Processing - Letters and Reviews Vo. 5, No. 2, November 2004 LETTER A Soution to the 4-bit Parity Probem with a Singe Quaternary Neuron Tohru Nitta Nationa Institute of Advanced Industria

More information

VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES

VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES SIAM J. NUMER. ANAL. Vo. 0, No. 0, pp. 000 000 c 200X Society for Industria and Appied Mathematics VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES SARAH DAY, JEAN-PHILIPPE LESSARD, AND KONSTANTIN MISCHAIKOW

More information

Lobontiu: System Dynamics for Engineering Students Website Chapter 3 1. z b z

Lobontiu: System Dynamics for Engineering Students Website Chapter 3 1. z b z Chapter W3 Mechanica Systems II Introduction This companion website chapter anayzes the foowing topics in connection to the printed-book Chapter 3: Lumped-parameter inertia fractions of basic compiant

More information

Optimal islanding and load shedding

Optimal islanding and load shedding Optima isanding and oad shedding Pau Trodden, Waqquas Bukhsh, Andreas Grothey, Jacek Gondzio, Ken McKinnon March 11, 2011 Contents 1 Introduction 3 2 Optima oad shedding 3 2.1 AC OLS probem...............................

More information

Optimal Control of Assembly Systems with Multiple Stages and Multiple Demand Classes 1

Optimal Control of Assembly Systems with Multiple Stages and Multiple Demand Classes 1 Optima Contro of Assemby Systems with Mutipe Stages and Mutipe Demand Casses Saif Benjaafar Mohsen EHafsi 2 Chung-Yee Lee 3 Weihua Zhou 3 Industria & Systems Engineering, Department of Mechanica Engineering,

More information

Duality, Polite Water-filling, and Optimization for MIMO B-MAC Interference Networks and itree Networks

Duality, Polite Water-filling, and Optimization for MIMO B-MAC Interference Networks and itree Networks Duaity, Poite Water-fiing, and Optimization for MIMO B-MAC Interference Networks and itree Networks 1 An Liu, Youjian Eugene) Liu, Haige Xiang, Wu Luo arxiv:1004.2484v3 [cs.it] 4 Feb 2014 Abstract This

More information

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Brandon Maone Department of Computer Science University of Hesini February 18, 2014 Abstract This document derives, in excrutiating

More information

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver

More information

In-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017

In-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017 In-pane shear stiffness of bare stee deck through she finite eement modes G. Bian, B.W. Schafer June 7 COLD-FORMED STEEL RESEARCH CONSORTIUM REPORT SERIES CFSRC R-7- SDII Stee Diaphragm Innovation Initiative

More information