Coded Caching for Files with Distinct File Sizes

Size: px
Start display at page:

Download "Coded Caching for Files with Distinct File Sizes"

Transcription

1 Coded Caching for Fies with Distinct Fie Sizes Jinbei Zhang iaojun Lin Chih-Chun Wang inbing Wang Department of Eectronic Engineering Shanghai Jiao ong University China Schoo of Eectrica and Computer Engineering Purdue University USA Emai: {abechina Abstract Coded caching can expoit new muticast opportunities even when mutipe users request different pieces of content and thus can significanty reduce the backhau requirement for serving high-voume content However existing studies of coded caching have been imited to the scenarios where a fies of interest are of a common size his work studies the performance imits of coded caching when the fie sizes are different We derive a new ower bound and an achievabe upper bound for the worstcase transmission rate under coded caching and show that these two bounds differ by at most a Θ(og K) factor where K is the number of users in the system here are two key noveties in our anaysis First our ower bound is derived by considering a new cut-set bound where arger fies are requested more times he anaysis of this new cut-set bound requires carefu concatenation of severa entropy inequaities Compared to a ower bound using standard cut-set arguments our ower bound is improved by a Θ(og K) factor Second our achievabe scheme uses a caching probabiity that increases proportionay with the fie size Compared to schemes that use a common caching probabiity K the achievabe rate of our scheme is reduced by a Θ( ) og K factor I INRODUCION A new form of caching schemes caed coded caching have received significant attention atey in reducing the backhau requirement for serving a arge voume of content to mutipe users [] he significant performance improvement of coded caching arises from its capabiity to expoit potentia muticast opportunities even when each user requests a different piece of content Consider the setting of [] where one server serves K users via a broadcast channe Each user has a storage/cache of size bits he server has N fies (N > K) with equa size F bits (F > N ) and each user can request any one of the N fies Note that in the worst case each user may request a distinct fie In conventiona uncoded caching schemes the server woud be unabe to expoit the broadcast capabiity of the channe in such a worst case and thus had to transmit to each user a difference piece of content that is not stored in the user s cache It is then easy to see that the tota transmission rate needed from the server in the worst case is KF ( NF ) since each user can ony cache NF fraction of each fie In contrast in a coded caching scheme [] the worst-case transmission rate from the server /NF is reduced to KF +K/NF he additiona reduction factor of /[ + K/(NF )] is significant when the goba storage capabiity of the system is arge and thus is caed the goba caching gain in [] he key idea behind this performance improvement is to expoit muticast opportunities even when different users request different fies For exampe suppose that there are two users A B and each user requests a different fie If user A has cached some content requested by user B and user B has cached some content requested by user A the server can broadcast the OR of these two parts which aows both users to decode their requested content Aong this ine [] [7] have studied the fundamenta imits of coded caching under the assumption that a fies are of the same size A common theme of these studies is to first find an information-theoretic ower bound of the transmission rate hen characterize the performance of an achievabe scheme with a common caching probabiity ie which caches a common fraction of every content in each user s cache Finay prove that the performance of the achievabe scheme is a constant factor away from the ower bound Such approaches are ater generaized to decentraized coded caching schemes [] hierarchica networks [3] and muti-eve coded caching [4] average rate [5] [6] and onine caching [7] respectivey However one imitation of these previous studies is that they assume a fies to be of the same size In practice it is common that different types of content are of significanty different sizes In this paper we carry out the first study of the performance imits of coded caching when the fies are of different sizes We derive a ower bound and an achievabe upper bound for the worst-case transmission rate that differ by at most a Θ(og K) factor he contributions of our resuts are two-fod First our ower bound (Proposition ) considers a new cut-set bound that is different from those used in prior work As a resut we tighten the ower bound by a Θ(og K) factor (see the comparison with Lemma ) In contrast to the cut-set bounds in [] [7] where each fie is requested ony once in our new cut-set bound each fie coud be requested mutipe times in proportion to its fie size Anayzing this cut-set bound aso requires carefu concatenation of severa entropy inequaities [8] and coud be of independent interest Second our achievabe upper bound (see Sec IV) uses a caching probabiity that is proportiona to the fie size In other words the amount of cached content for a fie is quadraticay proportiona to its fie size In contrast to a scheme that uses a common caching probabiity for a fies the transmission rate of our achievabe scheme is reduced by a Θ(K/ og K) factor As iustrated in abe I for a system with 8 users and types of fie sizes (the detaied setting provided in Section V) our new ower bound (LB Proposition ) is higher than the conventiona ower bound (LB Lemma ) by about % and our achievabe scheme (UB) attains a transmission rate ower

2 than that using a common caching probabiity (UB) by about 6% For a system with 8 users and 3 types of fie sizes our ower bound is 30% higher and our achievabe upper bound is about 3% ower he trend when the number of users and number of fie types further increase is iustrated in Figure hese resuts thus provide significant new insights in the performance imits of coded caching in the more practica s- cenarios of distinct fie sizes he rest of the paper is organized as foows In Section II we present the network mode We provide the ower bounds of the worst-case transmission rate in Section III and derive the achievabe rate in Section IV Numerica comparison is presented in Section V Finay we concude ABLE I: Comparisons Rate LB/LB Gain UB/UB Gain types 4/36 % 53757/353 6% 3 types 5/ % 593/696 3% og(rate) LB LB UB UB Number of types K/og K Fig : An iustration on the trend when the number of types increases II NEWORK ODEL We assume there are N fies from the set F = {F F F N } he size of the i-th fie F i is denoted by F i = Fi Without oss of generaity we assume that the fie size is non-increasing ie F i F j if i j A the fies are stored in a server which serves K users through a broadcast channe Each user is equipped with a cache of a common size he content of P the data cached N in user k is denoted by k We assume that i= F i and N K which is true in most situations where cache size is imited During off-peak hours the server can pace some of the contents (possiby coded) in each user s cache k with the hope of reducing the rate needed to satisfy users requests during peak hours his process is caed the caching phase We emphasize that the caching phase must be competed before any fie requests are made During peak hours the k-th user wi request the content of the w k -th fie namey F wk Denote the requests of a K users as a K-dimensiona vector w Since there are N fies to choose from there are totay N K request patterns w and we denote the coection of a patterns by W If part of the fie F wk has been cached in k it wi be retrieved ocay For those uncached content the server wi broadcast some additiona ogk ogk ogk content denoted by R to a K users simutaneousy he goa is that every user k must be abe to reconstruct the fie F wk based on the content R received during peak hours and the cached data k Obviousy what content R to transmit depends on the request pattern w and on the set of fies F As a resut we often denote it by R w (F) From the above discussion given a set of fies F a coded caching scheme needs to decide (a) what is the content to be cached in each k k = K; and (b) for each pattern w W what is the additiona data to send ie {R w (F) : w W} he objective is to minimize the worst-case transmission rate max w W R w (F) denoted by R(F) We said that the rate R(F) is achievabe if for every ε > 0 and every arge enough fie size there exists a caching and transmission scheme such that regardess of the request pattern w with probabiity of error ess than ε every user can reconstruct the requested fie Let R (F) denote the infimum over a achievabe R(F) A wo Approximate Systems In the previous formuation the minima rate R (F) depends on the sizes of the N fies and we did not impose any constraints on the fie sizes We now consider two quantized versions from F constructed as F UB = {Fi UB F UB i = F og F F i i N} F LB = {Fi LB Fi LB = F og F F i i N} It is easy to see that Fi LB thus naturay impies R (F LB ) R (F) R (F UB ) () F i Fi UB for any i N his P N For the practica scenarios in which i= F i and K N one can prove that the two rates R (F LB ) and R (F UB ) differ by at most a constant term since F LB i = F UB i / for a i Hence for the purpose of proving constant-factor performance gaps it is sufficient to focus on those fie sets F such that the fie sizes differ by power-of- factors hus in the seque we wi ony consider those F with the above property Assume that there are at most distinct fie sizes in F We now ca the fies of the same size as of the same type hus we introduce the foowing equivaent notations he -th type = has fie size F = F where F is the argest fie size in the system Suppose that the -th type has N different fies hen the coection of a N fies of type is denoted by F and we re-index each fie of the -th type by F = {F j j N } III LOWER BOUNDS OF HE WORS-CASE RANSISSION RAE We now present two ower bounds on R (F) he first ower bound (Lemma ) is derived using standard cut-set bounds in the iterature which is then compared with the second and tighter ower bound (Prop ) We then highight the difference in the anaysis Lemma : he worst-case transmission rate is ower bounded by R (F) max Φ P N Φ /L Φ N F L! ()

3 where L = P Φ N F / ž and the maximization is taken P over any subset Φ of { } that satisfies Φ N F K If the expressions inside the foor and cei functions in () are integers the ower bound in () can be represented as R (F) max Φ P ( Φ P N F ) 4 Φ N (3) he ower bound in Lemma can be easiy obtained using standard cut-set bounds in the iterature which we provide a high-eve sketch beow For a subset Φ of fie types we choose h (h K) users to request fies from F Φ As in prior studies [] [7] we can construct P Φ N h request patterns for these h users such that every fie in F Φ is requested once Since a the fies requested can be retrieved from the transmissions and the oca storages we have the foowing cut-set ie P Φ N h R (F)+h P Φ N F Choosing h = L we obtain () We next present the second and tighter ower bound For ease of exposition we first focus on the case when the foowing two assumptions hod Assumption : F and N F are both integers for a types such that P min( og K) min(og Assumption : K) N F = K With Assumption we wi not need to be concerned with the use of foor and ceiing functions which simpifies the discussions beow On the other hand Assumption is simiar to the constraint on the set Φ in Lemma Whie Assumptions - simpify the anaysis of Proposition they sti aow us to expose the key new insights of the proof We wi then reax Assumptions - in Proposition Proposition : Under Assumptions - the worst-case transmission rate can be ower bounded by R (F) min(og K) = N F 4 (4) o compare (3) and (4) we et = og K and N + = 4N Reca that F + = F hen the fie set Φ chosen in Lemma equas to { og K} he RHS of (3) is smaer than NF On the other hand the RHS of (4) equas to og K NF 4 which is a Θ(og K) factor higher than (3) he key novety in the proof of Proposition is to use a new cut-set bound that is different from that in () Unike the derivation of () where we consider a set of request patterns so that every fie is requested once in the new cut-set bound we consider a new set of request patterns so that arger fies are requested more times he study of this new scenario aso requires more carefu concatenation of severa entropy inequaities [8] some of which have been used in [] and [4] For ease of exposition next we focus on the simper case with ony two types = which however sti iustrates the novety of our constructions Let s = N F and s = N F By Assumption both s and s are integers and min(s s ) We then choose two user sets U and U which satisfy U = s U = s U U = By Assumption we can aways find U and U among the K different users Divide fie set F into two non-overapping subsets F and F with equa size N / We then choose two disjoint sets of request S pattern D and D which satisfy D = D = N S S and w D k U F wk = F w D Sk U F wk = F S s S S w D Sk U F wk = F w D k U F wk = F We first expain the construction of D In the very first request pattern w in D we et the s users in U request the first s fies in F and et the s users in U request the first s fies in F hen in the second request w in D we et the s users in U requests the second s fies in F and et the s users in U request the second s fies in F Continue this construction unti D = N /s ie each of the N fies in F has a been requested once At the same time totay N s s fies of F have been requested by users in U Since s = NF s = N F and F = F we have N s s = N / hat is a fies in the first haf F have been requested he construction of D is simiar he difference is that we aow the fies in F to be requested by users in U the second time during D whie the users in U wi now request the second haf F instead See Figure for iustration Fig : An iustration on the requesting process for fie systems with two types However even with this new set of request patterns new anaysis is needed in order to produce a better ower bound on the transmission rate Specificay if we directy appy the idea that the overa rate from a the transmissions pus a the cache sizes must be greater than the tota size of a fies combined (as in the derivation of ()) we woud obtain N R (F) + NF + NF N F + N F (5) s On the other hand a stricty better bound than (5) can be obtained as stated in the foowing emma Lemma : For the request patterns constructed as in Figure the worst-case transmission rate shoud satisfy N R (F) N F + N F (6) s hus the ower bound on N s R (F) is increased by another term N F his increase is the key step towards the tighter ower bound in Proposition Indeed substituting s = NF and noting that F = F the = case of Proposition foows immediatey from Lemma ie R (F) NF +NF 4 3

4 4 Proof of Lemma : For ease of presentation we denote R D S w D R w R D S w D R w U S k U k S and U k U k Summing over a rates for each transmission we have N s R (F) H(R D ) + H(R D ) = H(R D F ) + I(R D ; F ) + H(R D F ) + I(R D ; F ) H(R D R D F ) + I(R D ; F ) + I(R D ; F ) = I(R D R D ; F F ) + I(R D ; F ) + I(R D ; F ) Here the first second and third ines foow from the definition and basic properties of entropy he fourth ine is due to H(R D R D F ) = H(R D R D F F ) + I(R D R D ; F F ) and the fact that H(R D R D F F ) = 0 since R w is generated by fie-sets F and F We then bound each of the mutua-information terms in (7) Noting that a fies in F can be reconstructed from: (i) the transmissions for the request patterns in D and (ii) the oca storages of users in U we have H(F ) = I(F ; R D U ) (8) I(F ; R D ) + H( U ) where the second equaity is due to the chain rue Since the tota cache size S k U k is s = N F we have I(F ; R D ) H(F ) H( U ) NF (9) Simiary we have I(F ; R D ) NF Finay using a simiar ogic the entropy of type- fies F can be written as H(F ) = I(F ; R D R D U F ) I(F ; R D R D F ) + H( U ) (7) (0) Here the first equaity is due to the independence of F and F aong with the fact that F can be decoded from S w D D R w and S k U k S Since the size of k U k is s = NF we have I(F ; R D R D F ) NF () he resut of Lemma then foows We can then easiy generaize the above proof for the case of 3 by choosing groups of users U to U each having s = N F users his is aways possibe when Assumptions - hod he rest of the derivation for Proposition foows by appying the above techniques iterativey A Reaxing Assumptions & o reax Assumptions - the anaysis is more compicated as we need to consider many corner cases In the foowing we provide the genera ower bound without these assumptions and provide a sketch of the proof Proposition : he worst-case transmission rate is ower bounded by R (F) where R (F) is the infimum of a vaues of R that satisfy N F R > max + N F 4! 3 + N 4 F 4 3 = + = 3 N F P where = = N (F R) and the parameters to 4 N and N 4 are of integer vaues and can be uniquey computed (for any given R) in the foowing way (i) is the argest index such that F > R If no such exists choose = 0; (ii) is the argest P index satisfying (a) > (b) F > and (c) = + N < K If no such exists then choose = P and N = 0 Otherwise choose N = min(n K = + N ) (iii) 3 is the smaest index such that F If no such exists then 3 = + ; (iv) P 4 is the argest index satisfying (a) 4 3 and (b) 4 = 3 N F < K If no such 4 exists then choose 4 = 3 and P N 4 = 0 Otherwise choose N 4 = min(n 4 (K 4 = 3 N F )/F 4 ) he main intuition of this genera ower bound is as foows We divide the fie types into three groups Group : types to Group : ( + ) to and Group 3: 3 to 4 Suppose that there exists a scheme that can achieve a worstcase transmission rate R It impies that the transmission rate R has to cover a possibe request patterns chosen from a three groups of fies hen we quantify the impact of the requests for each fie group and derive the condition on R First note that each fie of type in Group is arger than R o satisfy a requests for a given fie from Group each node needs to store at east (F R) amount of its contents herefore the remaining cache size that can be used to satisfy fie requests for Groups and 3 is upper bounded by (his argument can be made precise using conditiona entropy) As a resut when considering Groups and 3 we can treat it equivaenty as if the effective cache size has been reduced to We now consider Group We first notice that for any = + to we must P have < F a request pattern in which P = + N + N We then consider = + N + N users request distinct fies By a simpe cut-set bound P argument we can obtain R > N F = + + N F For Group 3 we use the same bounding techniques as in Prop ie we choose arger fies mutipe times in the set of request patterns We can then show that in order to satisfy the requests for fies in Group 3 it requires a minimum rate that is P arger than 4 N F = N F Proposition then foows Note that the rate for fies in Group 3 can be compared to (4) It is ooser now since we have reaxed Assumptions - IV A NEW ACHIEVABLE SCHEE In this section we compare two achievabe schemes One assumes a uniform caching probabiity he other adopts a proportiona caching probabiity It wi be shown that the second scheme achieves a ower rate than the first one Consider an achievabe scheme where the fractions of every fie are cached with an equa probabiity q as in [] [7] Due P to the memory constraint we have Φ qn F = and q = Using the resuts in [] we can show that its P Φ N F achievabe rate R uni is ower bounded by R uni KF ( q) + Kq P F = N F () 4

5 5 By choosing = og K and N + = 4N we can show that the ower bound (4) is og K N F /(4) and the achievabe bound () is arger than KN F /(8) he gap between those bounds can be as arge as Θ(K/ og K) Next we present the second scheme Again we first impose Assumptions - Let = min( og K) For every fie in F ( ) denote its caching probabiity as q Namey each user k wi cache q F of every P fie in F he overa cache-size constraint thus impies that = q N F = he key difference from the first scheme is that we choose q to be ineary proportiona to F In other words the amount of cached content for a fie of type is quadraticay proportiona to F he motivation for this choice of q is as foows Note that if we consider a request patterns where a K users request ony the fies with size F the rate needed can be approximated by F q hus in order to minimize the F worst-case vaue ie max q we shoud choose q to be proportiona to the fie size P F ie q = QF where the constant Q equas to /( = N F ) his choice is aso consistent with the choice of request patterns D in the proof of Lemma and Proposition Since the arger fies in F is requested twice as frequenty as the shorter fies in F it suggests that more cache space may be aocated to F We now describe the transmission design Initiaization: each user k reconstructs the portion of the requested fie F wk that is stored in its oca cache k ransmission: for any non-empty subset U { K} we do the foowing For each k U we assembe the portion of the requested fie F wk that is cached by a users h U\k but not by user k as a continuous bit-string and denote the assembed L bit-string by B k hen we send the bit-wise ORed string k U B k Note that some bit string B k may be shorter than the other B k We simpy zero-padded the shorter bit strings during OR In the end the tota amount of bits sent for a given U is max k U B k After finishing transmission for a U it is guaranteed that a users can recover the desired packets Note that in our construction those fies of type > wi never be cached As a resut if any user k requests such a fie the entire fie wi be treated as a singe bit-string and transmitted separatey By anayzing the bit-ength of each transmission U we can upper bound the transmission rate by R prop = max B k ( + ) N F / (3) k U U Comparing eqs (3) and (4) the gap is at most 4(og K +) which is a dramatic improvement from () hus using a caching probabiity q proportiona to F is critica Note that whie our scheme aows coding across different fie-types the inequaity in (3) does not expoit this gain which may be the reason for the Θ(og K)-factor gap between our upper and ower bounds For future work it woud be interesting to see whether this gap can be removed his approximation can be observed from the first inequaity in () If users request the same fie then we ony OR the string once he reason is that OR the same string twice wi give a zero-string = When reaxing Assumptions - the anaysis becomes more compicated due to many corner cases We can have the foowing resut Proposition 3: We can construct a modified scheme that achieves R prop (3 og K + )R (F) where R (F) is specified in Proposition Namey the gap to the ower bound is at most Θ(og K) V NUERICAL COPARISON We compare the two ower bounds (3) and (4) and the two upper bounds () and (3) in the foowing two numeric exampes here are K = 8 users each with a cache size = 8 System has fie types with F = 8 N = 6 F = 4 and N = 64 System has 3 fie types with F = 8 N = 6 F = 4 N = 64 F 3 = and N 3 = 8 For the achievabe schemes instead of deriving the bounds we ist the exact R prop (UB in abe I) P and R uni (UB in abe I) vaues by numericay computing U max k U B k hese numerica resuts verify our findings ie not ony the proposed ower bound (4) is greater than the resut in (3) that uses the traditiona cut-set bounds but aso R prop is much arger than R uni hat is proportiona caching probabiity significanty outperforms uniform caching probabiity VI CONCLUSION In this paper we study coded caching for systems where fies of interest are of different sizes We provide tighter owerbound and achievabe bound for the worst-case transmission rate which differ by at most a Θ(og K) factor he key novety is a new cut-set (ower) bound that considers request patterns where arger fies are requested more times ACKNOWLEDGEN his work was partiay supported by NSF grants: CCF ECCS and CCF-4997 a grant from the Army Research Office W9NF and two grants from NSF China (No ) REFERENCES [] A addah-ai and U Niesen Fundamenta Limits of Caching in IEEE rans Inform heory vo 60 no 5 pp ay 04 [] A addah-ai and U Niesen Decentraized Coded Caching Attains Order-Optima emory-rate radeoff to appear in IEEE/AC rans Netw 04 [3] N Karamchandani U Niesen A addah-ai and S Diggavi Hierarchica Coded Caching ariv: v [csi] Jun 04 [4] J Hachem N Karamchandani and S Diggavi uti-eve Coded Caching ariv: [csi] Apr 04 [5] U Niesen and A addah-ai Coded Caching with Nonuniform Demands ariv:308078v [csi] ar 04 [6] Ji A uino J Lorca and G Caire On the Average Performance of Caching and Coded uticasting with Random Demands ariv:404576v [csi] Ju 04 [7] R Pedarsani A addah-ai and U Niesen Onine Coded Caching ariv:33646 [csi] Nov 03 [8] RW Yeung A Framework for Linear Information Inequaities in IEEE rans Inform heory vo 43 no 6 pp Nov 997

6 6 Appendix : Suppementa aterias A Proof of Proposition Proposition : he worst-case transmission rate is ower bounded by R (F) where R (F) is the infimum of a vaues of R that satisfy N F R > max + N F 4! 3 + N 4 F 4 3 = + = 3 N F P where = = N (F R) and the parameters to 4 N and N 4 are of integer vaues and can be uniquey computed (for any given R) in the foowing way (i) is the argest index such that F > R If no such exists choose = 0; (ii) is the maximum P vaue satisfying (a) > (b) F > and (c) = + N < K If not such exists then choose = P and N = 0 Otherwise choose N = min(n K = + N ) (iii) 3 is the smaest index such that F If no such exists then 3 = + ; (iv) P 4 is the maximum vaue satisfying (a) 4 3 and (b) 4 = N 3+ F < K If no such 4 exists then choose 4 = 3 and P N 4 = 0 Otherwise choose = min(n 4 (K 4 = N 3+ F )/F 4 ) N 4 Proof ogic: Suppose that a rate R is achievabe to satisfy users worst-case request We wi first show the achievabe rate shoud satisfy (4) hen since we do not know the exact vaue of R before-hand we take the minimum over a vaues of R that satisfy (4) which then becomes a ower bound for R (F) he resut of Proposition then foows owards that end we divide the fies into 4 groups he division is cosey reated to the parameter As we wi see shorty can be interpreted as the effective cache size in each user s storage that can be used to retrieve fies outside Group Group : First consider the fies in Group which contains P a the fies with size F > R Now consider Φ N request patterns as foows A fixed user say k wi request one distinct fie in Group for each of request patterns hen since user k must be abe to retrieve each requested fie we must have H( [ [ j N j F j [ [ S S j N j R w k ) = 0 (4) Let A = j N j F j and B = j N R j w hen Eq (4) can be simpified to H(A B k ) = 0 According to the property of entropy we have S S 0 = H(A B k ) = H(A k ) I(A; B k ) Further we have H(A k ) H(B) H( k A) = H( k ) I(A; k ) = H( k ) H(A) + H(A k ) H( k ) H(A) + H(B) (5) (6) P where in the ast step we P have used (5) Note that H(A) = = N F H(B) = N R and H( k ) = herefore P for any user k we must have H( k A) = (F R) = Reca that A is exacty a the information in Group herefore when user k request a fie outside Group user k must be abe to retrieve the fie with k A and its received rate R Intuitivey this means that the amount of cached information in k that can be used for recovering fies outside Group is no arger than herefore when we quantify the impact of fies in Group and Group 3 we wi take as iteray the cache size Group P : Reca that the tota number of fies in Group is L = = + N + N Note that L K according to our construction Consider one request pattern where L users request the L fies in Group hen we must have H(R) + L L k= H(F wk ) (7) For every fie F wk in Group requested by user k H(F wk ) > Reca that H( k ) herefore we have R > = + N F + N F (8) Group 3: For fies in Group 3 we want to use the resuts in Proposition herefore we need two conditions ie F 3 N 4 F and N F For fies in Group 3 we have with 3 4 are a integers F We now construct a system where user k is equipped with a cache of size which is chosen as the smaest vaue satisfying F is an integer and herefore < Ceary if there exists a scheme that can satisfy a the requests using the storage size there must exist another scheme that can satisfy a the requests using the arger storage size Let H = N for 3 4 and H 4 = N 4 he fies in Group 3 can then be divided into two subsets ie Φ 4 = { H F < } and Φ 5 = { H F } For fies in Φ 4 we have H F H F 4 < (since H F < for a ) Φ 4 Φ 4 < F Φ 4 (since F + = F / for a ) < max F Φ 4 (since F R for a ) 4R (9) For fies in Φ 5 we further choose G H to be the argest vaue satisfying that G H and G F is an integer G aways exists since F is an integer and H N Hence we have H < G H Note that Assumption now hods with G F and Further Assumption hods because K herefore for G F and we can use P 4 = 3 H F

7 7 Proposition and have G F R 4 Φ 5 H F > 6 Φ 5 Combining Equations (9)(0) we have 4 (0) H F R > 3 () = 3 Combing Equations (8) and () we concude that R must satisfy (4) he resut of the proposition then foows B Proof of Proposition 3 Proposition 3: We can construct a modified scheme that achieves R prop (3 og K + )R (F) where R (F) is specified in Proposition Proof: Caching: For each fie F in Group reca that we have F R (F) We divide F into two parts One part is of size F R (F) which is cached in every user s storage he other part is of size R (F) For the second part each user caches of it herefore at each user P the amount of storage used to cache fies in Group is = (F R (F)) hen the amount of storage that can be used for other fies is exacty as defined in Prop Let 5 be the argest vaue satisfying (i) F 5 > R (F) K and (ii) 5 4 For fies F j 3 5 j N proportiona caching as in Sec IV is used For a other fies they are not cached ransmission: For users requesting fies in Group the rate can be upper bounded by R (F) o see this consider another system where each fie is of size R (F) and the caching probabiity is / which woud requires a rate at most K R (F)( q)/( + Kq) < R (F) Let H = N for + and H = N For fies outside P Group we have two cases P Case : If = + N > K we have = + H = K For fies outside P Group the tota rate needed must be no arger than = H + F which is smaer than R (F) according to P Prop Case : If = + N K there wi be no fie with type + 3 For users requesting fies in Group transmitting P the fies directy woud require a rate ess than = + H F R (F) For fies of type with 3 5 the caching probabiity for F is F and thus arger than Q = F P 5 = 3 H F P 4 = 3 H F herefore the rate for serving fies of type can be upper bounded by F Q 3R (F) Note that 5 3 og K since F 3 R (F) and F 5 > R (F) K herefore the tota rate needed for fies of type with 3 5 is no arger than 3 og K R (F) For users requesting other fies with type arger than 5 the rate needed is ess than max(kf 4 KF 5 +) Note that P 4 = 3 H F > K herefore R (F) > K and KF 4 < 8R (F) And KF 5 + R (F) Combing a these rates together we concude 6 F 4

Centralized Coded Caching of Correlated Contents

Centralized Coded Caching of Correlated Contents Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv:1711.03798v1

More information

Coded Caching for Files with Distinct File Sizes

Coded Caching for Files with Distinct File Sizes Coded Caching for Files with Distinct File Sizes Jinbei Zhang, Xiaojun Lin, Chih-Chun Wang, Xinbing Wang Shanghai Jiao Tong University Purdue University The Importance of Caching Server cache cache cache

More information

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines Recursive Constructions of Parae FIFO and LIFO Queues with Switched Deay Lines Po-Kai Huang, Cheng-Shang Chang, Feow, IEEE, Jay Cheng, Member, IEEE, and Duan-Shin Lee, Senior Member, IEEE Abstract One

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Joint work with Jinbei Zhang (SJTU), Chih-Chun Wang (Purdue) and Xinbing Wang (SJTU)

More information

Limited magnitude error detecting codes over Z q

Limited magnitude error detecting codes over Z q Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica

More information

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes A Fundamenta Storage-Communication Tradeoff in Distributed Computing with Stragging odes ifa Yan, Michèe Wigger LTCI, Téécom ParisTech 75013 Paris, France Emai: {qifa.yan, michee.wigger} @teecom-paristech.fr

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

Problem set 6 The Perron Frobenius theorem.

Problem set 6 The Perron Frobenius theorem. Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

ORTHOGONAL MULTI-WAVELETS FROM MATRIX FACTORIZATION

ORTHOGONAL MULTI-WAVELETS FROM MATRIX FACTORIZATION J. Korean Math. Soc. 46 2009, No. 2, pp. 281 294 ORHOGONAL MLI-WAVELES FROM MARIX FACORIZAION Hongying Xiao Abstract. Accuracy of the scaing function is very crucia in waveet theory, or correspondingy,

More information

arxiv: v1 [math.co] 17 Dec 2018

arxiv: v1 [math.co] 17 Dec 2018 On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea-Time Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 2, FEBRUARY

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 2, FEBRUARY IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO. 2, FEBRUARY 206 857 Optima Energy and Data Routing in Networks With Energy Cooperation Berk Gurakan, Student Member, IEEE, OmurOze,Member, IEEE,

More information

Competitive Diffusion in Social Networks: Quality or Seeding?

Competitive Diffusion in Social Networks: Quality or Seeding? Competitive Diffusion in Socia Networks: Quaity or Seeding? Arastoo Fazei Amir Ajorou Ai Jadbabaie arxiv:1503.01220v1 [cs.gt] 4 Mar 2015 Abstract In this paper, we study a strategic mode of marketing and

More information

Cache Aided Wireless Networks: Tradeoffs between Storage and Latency

Cache Aided Wireless Networks: Tradeoffs between Storage and Latency Cache Aided Wireess Networks: Tradeoffs between Storage and Latency Avik Sengupta Hume Center, Department of ECE Virginia Tech, Backsburg, VA 24060, USA Emai: aviksg@vt.edu Ravi Tandon Department of ECE

More information

<C 2 2. λ 2 l. λ 1 l 1 < C 1

<C 2 2. λ 2 l. λ 1 l 1 < C 1 Teecommunication Network Contro and Management (EE E694) Prof. A. A. Lazar Notes for the ecture of 7/Feb/95 by Huayan Wang (this document was ast LaT E X-ed on May 9,995) Queueing Primer for Muticass Optima

More information

Online Load Balancing on Related Machines

Online Load Balancing on Related Machines Onine Load Baancing on Reated Machines ABSTRACT Sungjin Im University of Caifornia at Merced Merced, CA, USA sim3@ucmerced.edu Debmaya Panigrahi Duke University Durham, NC, USA debmaya@cs.duke.edu We give

More information

12.2. Maxima and Minima. Introduction. Prerequisites. Learning Outcomes

12.2. Maxima and Minima. Introduction. Prerequisites. Learning Outcomes Maima and Minima 1. Introduction In this Section we anayse curves in the oca neighbourhood of a stationary point and, from this anaysis, deduce necessary conditions satisfied by oca maima and oca minima.

More information

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract Stochastic Compement Anaysis of Muti-Server Threshod Queues with Hysteresis John C.S. Lui The Dept. of Computer Science & Engineering The Chinese University of Hong Kong Leana Goubchik Dept. of Computer

More information

On colorings of the Boolean lattice avoiding a rainbow copy of a poset arxiv: v1 [math.co] 21 Dec 2018

On colorings of the Boolean lattice avoiding a rainbow copy of a poset arxiv: v1 [math.co] 21 Dec 2018 On coorings of the Booean attice avoiding a rainbow copy of a poset arxiv:1812.09058v1 [math.co] 21 Dec 2018 Baázs Patkós Afréd Rényi Institute of Mathematics, Hungarian Academy of Scinces H-1053, Budapest,

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

Unit 48: Structural Behaviour and Detailing for Construction. Deflection of Beams

Unit 48: Structural Behaviour and Detailing for Construction. Deflection of Beams Unit 48: Structura Behaviour and Detaiing for Construction 4.1 Introduction Defection of Beams This topic investigates the deformation of beams as the direct effect of that bending tendency, which affects

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

Unconditional security of differential phase shift quantum key distribution

Unconditional security of differential phase shift quantum key distribution Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

Integrality ratio for Group Steiner Trees and Directed Steiner Trees

Integrality ratio for Group Steiner Trees and Directed Steiner Trees Integraity ratio for Group Steiner Trees and Directed Steiner Trees Eran Haperin Guy Kortsarz Robert Krauthgamer Aravind Srinivasan Nan Wang Abstract The natura reaxation for the Group Steiner Tree probem,

More information

New Efficiency Results for Makespan Cost Sharing

New Efficiency Results for Makespan Cost Sharing New Efficiency Resuts for Makespan Cost Sharing Yvonne Beischwitz a, Forian Schoppmann a, a University of Paderborn, Department of Computer Science Fürstenaee, 3302 Paderborn, Germany Abstract In the context

More information

FRIEZE GROUPS IN R 2

FRIEZE GROUPS IN R 2 FRIEZE GROUPS IN R 2 MAXWELL STOLARSKI Abstract. Focusing on the Eucidean pane under the Pythagorean Metric, our goa is to cassify the frieze groups, discrete subgroups of the set of isometries of the

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

FOURIER SERIES ON ANY INTERVAL

FOURIER SERIES ON ANY INTERVAL FOURIER SERIES ON ANY INTERVAL Overview We have spent considerabe time earning how to compute Fourier series for functions that have a period of 2p on the interva (-p,p). We have aso seen how Fourier series

More information

Rate-Distortion Theory of Finite Point Processes

Rate-Distortion Theory of Finite Point Processes Rate-Distortion Theory of Finite Point Processes Günther Koiander, Dominic Schuhmacher, and Franz Hawatsch, Feow, IEEE Abstract We study the compression of data in the case where the usefu information

More information

THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE

THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE KATIE L. MAY AND MELISSA A. MITCHELL Abstract. We show how to identify the minima path network connecting three fixed points on

More information

Optimality of Gaussian Fronthaul Compression for Uplink MIMO Cloud Radio Access Networks

Optimality of Gaussian Fronthaul Compression for Uplink MIMO Cloud Radio Access Networks Optimaity of Gaussian Fronthau Compression for Upink MMO Coud Radio Access etworks Yuhan Zhou, Yinfei Xu, Jun Chen, and Wei Yu Department of Eectrica and Computer Engineering, University of oronto, Canada

More information

Pattern Frequency Sequences and Internal Zeros

Pattern Frequency Sequences and Internal Zeros Advances in Appied Mathematics 28, 395 420 (2002 doi:10.1006/aama.2001.0789, avaiabe onine at http://www.ideaibrary.com on Pattern Frequency Sequences and Interna Zeros Mikós Bóna Department of Mathematics,

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea- Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process Management,

More information

Discrete Techniques. Chapter Introduction

Discrete Techniques. Chapter Introduction Chapter 3 Discrete Techniques 3. Introduction In the previous two chapters we introduced Fourier transforms of continuous functions of the periodic and non-periodic (finite energy) type, we as various

More information

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law Gauss Law 1. Review on 1) Couomb s Law (charge and force) 2) Eectric Fied (fied and force) 2. Gauss s Law: connects charge and fied 3. Appications of Gauss s Law Couomb s Law and Eectric Fied Couomb s

More information

Manipulation in Financial Markets and the Implications for Debt Financing

Manipulation in Financial Markets and the Implications for Debt Financing Manipuation in Financia Markets and the Impications for Debt Financing Leonid Spesivtsev This paper studies the situation when the firm is in financia distress and faces bankruptcy or debt restructuring.

More information

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Agorithmic Operations Research Vo.4 (29) 49 57 Approximated MLC shape matrix decomposition with intereaf coision constraint Antje Kiese and Thomas Kainowski Institut für Mathematik, Universität Rostock,

More information

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS TONY ALLEN, EMILY GEBHARDT, AND ADAM KLUBALL 3 ADVISOR: DR. TIFFANY KOLBA 4 Abstract. The phenomenon of noise-induced stabiization occurs

More information

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC (January 8, 2003) A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC DAMIAN CLANCY, University of Liverpoo PHILIP K. POLLETT, University of Queensand Abstract

More information

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay Throughput Optima Scheduing for Wireess Downinks with Reconfiguration Deay Vineeth Baa Sukumaran vineethbs@gmai.com Department of Avionics Indian Institute of Space Science and Technoogy. Abstract We consider

More information

Optimal Control of Assembly Systems with Multiple Stages and Multiple Demand Classes 1

Optimal Control of Assembly Systems with Multiple Stages and Multiple Demand Classes 1 Optima Contro of Assemby Systems with Mutipe Stages and Mutipe Demand Casses Saif Benjaafar Mohsen EHafsi 2 Chung-Yee Lee 3 Weihua Zhou 3 Industria & Systems Engineering, Department of Mechanica Engineering,

More information

Problem Set 6: Solutions

Problem Set 6: Solutions University of Aabama Department of Physics and Astronomy PH 102 / LeCair Summer II 2010 Probem Set 6: Soutions 1. A conducting rectanguar oop of mass M, resistance R, and dimensions w by fas from rest

More information

The Group Structure on a Smooth Tropical Cubic

The Group Structure on a Smooth Tropical Cubic The Group Structure on a Smooth Tropica Cubic Ethan Lake Apri 20, 2015 Abstract Just as in in cassica agebraic geometry, it is possibe to define a group aw on a smooth tropica cubic curve. In this note,

More information

Provisions estimation for portfolio of CDO in Gaussian financial environment

Provisions estimation for portfolio of CDO in Gaussian financial environment Technica report, IDE1123, October 27, 2011 Provisions estimation for portfoio of CDO in Gaussian financia environment Master s Thesis in Financia Mathematics Oeg Maximchuk and Yury Vokov Schoo of Information

More information

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient

More information

Discrete Techniques. Chapter Introduction

Discrete Techniques. Chapter Introduction Chapter 3 Discrete Techniques 3. Introduction In the previous two chapters we introduced Fourier transforms of continuous functions of the periodic and non-periodic (finite energy) type, as we as various

More information

High Efficiency Development of a Reciprocating Compressor by Clarification of Loss Generation in Bearings

High Efficiency Development of a Reciprocating Compressor by Clarification of Loss Generation in Bearings Purdue University Purdue e-pubs Internationa Compressor Engineering Conference Schoo of Mechanica Engineering 2010 High Efficiency Deveopment of a Reciprocating Compressor by Carification of Loss Generation

More information

Coded Caching under Arbitrary Popularity Distributions

Coded Caching under Arbitrary Popularity Distributions Coded Caching under Arbitrary Popularity Distributions Jinbei Zhang, Xiaojun Lin, Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University, China School of Electrical and Computer Engineering,

More information

A Statistical Framework for Real-time Event Detection in Power Systems

A Statistical Framework for Real-time Event Detection in Power Systems 1 A Statistica Framework for Rea-time Event Detection in Power Systems Noan Uhrich, Tim Christman, Phiip Swisher, and Xichen Jiang Abstract A quickest change detection (QCD) agorithm is appied to the probem

More information

AALBORG UNIVERSITY. The distribution of communication cost for a mobile service scenario. Jesper Møller and Man Lung Yiu. R June 2009

AALBORG UNIVERSITY. The distribution of communication cost for a mobile service scenario. Jesper Møller and Man Lung Yiu. R June 2009 AALBORG UNIVERSITY The distribution of communication cost for a mobie service scenario by Jesper Møer and Man Lung Yiu R-29-11 June 29 Department of Mathematica Sciences Aaborg University Fredrik Bajers

More information

arxiv:math/ v2 [math.pr] 6 Mar 2005

arxiv:math/ v2 [math.pr] 6 Mar 2005 ASYMPTOTIC BEHAVIOR OF RANDOM HEAPS arxiv:math/0407286v2 [math.pr] 6 Mar 2005 J. BEN HOUGH Abstract. We consider a random wa W n on the ocay free group or equivaenty a signed random heap) with m generators

More information

On the Goal Value of a Boolean Function

On the Goal Value of a Boolean Function On the Goa Vaue of a Booean Function Eric Bach Dept. of CS University of Wisconsin 1210 W. Dayton St. Madison, WI 53706 Lisa Heerstein Dept of CSE NYU Schoo of Engineering 2 Metrotech Center, 10th Foor

More information

Physics Dynamics: Springs

Physics Dynamics: Springs F A C U L T Y O F E D U C A T I O N Department of Curricuum and Pedagogy Physics Dynamics: Springs Science and Mathematics Education Research Group Supported by UBC Teaching and Learning Enhancement Fund

More information

Distributed average consensus: Beyond the realm of linearity

Distributed average consensus: Beyond the realm of linearity Distributed average consensus: Beyond the ream of inearity Usman A. Khan, Soummya Kar, and José M. F. Moura Department of Eectrica and Computer Engineering Carnegie Meon University 5 Forbes Ave, Pittsburgh,

More information

Partial permutation decoding for MacDonald codes

Partial permutation decoding for MacDonald codes Partia permutation decoding for MacDonad codes J.D. Key Department of Mathematics and Appied Mathematics University of the Western Cape 7535 Bevie, South Africa P. Seneviratne Department of Mathematics

More information

C. Fourier Sine Series Overview

C. Fourier Sine Series Overview 12 PHILIP D. LOEWEN C. Fourier Sine Series Overview Let some constant > be given. The symboic form of the FSS Eigenvaue probem combines an ordinary differentia equation (ODE) on the interva (, ) with a

More information

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization Improved Min-Sum Decoding of LDPC Codes sing -Dimensiona Normaization Juntan Zhang and Marc Fossorier Department of Eectrica Engineering niversity of Hawaii at Manoa Honouu, HI 968 Emai: juntan, marc@spectra.eng.hawaii.edu

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao, Vivek Raghunathan, Stephen Hany, Vinod Sharma and. R. Kumar Abstract We consider a joint power contro

More information

Mat 1501 lecture notes, penultimate installment

Mat 1501 lecture notes, penultimate installment Mat 1501 ecture notes, penutimate instament 1. bounded variation: functions of a singe variabe optiona) I beieve that we wi not actuay use the materia in this section the point is mainy to motivate the

More information

Reichenbachian Common Cause Systems

Reichenbachian Common Cause Systems Reichenbachian Common Cause Systems G. Hofer-Szabó Department of Phiosophy Technica University of Budapest e-mai: gszabo@hps.ete.hu Mikós Rédei Department of History and Phiosophy of Science Eötvös University,

More information

Primal and dual active-set methods for convex quadratic programming

Primal and dual active-set methods for convex quadratic programming Math. Program., Ser. A 216) 159:469 58 DOI 1.17/s117-15-966-2 FULL LENGTH PAPER Prima and dua active-set methods for convex quadratic programming Anders Forsgren 1 Phiip E. Gi 2 Eizabeth Wong 2 Received:

More information

Generalized Bell polynomials and the combinatorics of Poisson central moments

Generalized Bell polynomials and the combinatorics of Poisson central moments Generaized Be poynomias and the combinatorics of Poisson centra moments Nicoas Privaut Division of Mathematica Sciences Schoo of Physica and Mathematica Sciences Nanyang Technoogica University SPMS-MAS-05-43,

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

Lecture 17 - The Secrets we have Swept Under the Rug

Lecture 17 - The Secrets we have Swept Under the Rug Lecture 17 - The Secrets we have Swept Under the Rug Today s ectures examines some of the uirky features of eectrostatics that we have negected up unti this point A Puzze... Let s go back to the basics

More information

CONSISTENT LABELING OF ROTATING MAPS

CONSISTENT LABELING OF ROTATING MAPS CONSISTENT LABELING OF ROTATING MAPS Andreas Gemsa, Martin Nöenburg, Ignaz Rutter Abstract. Dynamic maps that aow continuous map rotations, for exampe, on mobie devices, encounter new geometric abeing

More information

How many random edges make a dense hypergraph non-2-colorable?

How many random edges make a dense hypergraph non-2-colorable? How many random edges make a dense hypergraph non--coorabe? Benny Sudakov Jan Vondrák Abstract We study a mode of random uniform hypergraphs, where a random instance is obtained by adding random edges

More information

Limits on Support Recovery with Probabilistic Models: An Information-Theoretic Framework

Limits on Support Recovery with Probabilistic Models: An Information-Theoretic Framework Limits on Support Recovery with Probabiistic Modes: An Information-Theoretic Framewor Jonathan Scarett and Voan Cevher arxiv:5.744v3 cs.it 3 Aug 6 Abstract The support recovery probem consists of determining

More information

arxiv: v1 [math.fa] 23 Aug 2018

arxiv: v1 [math.fa] 23 Aug 2018 An Exact Upper Bound on the L p Lebesgue Constant and The -Rényi Entropy Power Inequaity for Integer Vaued Random Variabes arxiv:808.0773v [math.fa] 3 Aug 08 Peng Xu, Mokshay Madiman, James Mebourne Abstract

More information

The Streaming-DMT of Fading Channels

The Streaming-DMT of Fading Channels The Streaming-DMT of Fading Channes Ashish Khisti Member, IEEE, and Star C. Draper Member, IEEE arxiv:30.80v3 cs.it] Aug 04 Abstract We consider the sequentia transmission of a stream of messages over

More information

Improved Converses and Gap-Results for Coded Caching

Improved Converses and Gap-Results for Coded Caching Improved Converses and Gap-Resuts for Coded Caching Chien-Yi Wang, Shirin Saeedi Bidokhti, and Michèe Wigger Abstract arxiv:702.04834v [cs.it] 6 Feb 207 Improved ower bounds on the average and the worst-case

More information

Pricing Multiple Products with the Multinomial Logit and Nested Logit Models: Concavity and Implications

Pricing Multiple Products with the Multinomial Logit and Nested Logit Models: Concavity and Implications Pricing Mutipe Products with the Mutinomia Logit and Nested Logit Modes: Concavity and Impications Hongmin Li Woonghee Tim Huh WP Carey Schoo of Business Arizona State University Tempe Arizona 85287 USA

More information

Age of Information: The Gamma Awakening

Age of Information: The Gamma Awakening Age of Information: The Gamma Awakening Eie Najm and Rajai Nasser LTHI, EPFL, Lausanne, Switzerand Emai: {eie.najm, rajai.nasser}@epf.ch arxiv:604.086v [cs.it] 5 Apr 06 Abstract Status update systems is

More information

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Approximated MLC shape matrix decomposition with intereaf coision constraint Thomas Kainowski Antje Kiese Abstract Shape matrix decomposition is a subprobem in radiation therapy panning. A given fuence

More information

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS ISEE 1 SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS By Yingying Fan and Jinchi Lv University of Southern Caifornia This Suppementary Materia

More information

Candidate Number. General Certificate of Education Advanced Level Examination June 2010

Candidate Number. General Certificate of Education Advanced Level Examination June 2010 Centre Number Surname Candidate Number For Examiner s Use Other Names Candidate Signature Examiner s Initias Genera Certificate of Education Advanced Leve Examination June 2010 Question 1 2 Mark Physics

More information

THINKING IN PYRAMIDS

THINKING IN PYRAMIDS ECS 178 Course Notes THINKING IN PYRAMIDS Kenneth I. Joy Institute for Data Anaysis and Visuaization Department of Computer Science University of Caifornia, Davis Overview It is frequenty usefu to think

More information

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems Componentwise Determination of the Interva Hu Soution for Linear Interva Parameter Systems L. V. Koev Dept. of Theoretica Eectrotechnics, Facuty of Automatics, Technica University of Sofia, 1000 Sofia,

More information

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION Hsiao-Chang Chen Dept. of Systems Engineering University of Pennsyvania Phiadephia, PA 904-635, U.S.A. Chun-Hung Chen

More information

Nearest Neighbor Decoding and Pilot-Aided Channel Estimation for Fading Channels

Nearest Neighbor Decoding and Pilot-Aided Channel Estimation for Fading Channels Nearest Neighbor Decoding and Piot-Aided Channe Estimation for Fading Channes A. Taufiq Asyhari, Tobias Koch and Abert Guién i Fàbregas arxiv:30.223v2 [cs.it] 8 Apr 204 Abstract We study the information

More information

Multi-server queueing systems with multiple priority classes

Multi-server queueing systems with multiple priority classes Muti-server queueing systems with mutipe priority casses Mor Harcho-Bater Taayui Osogami Aan Scheer-Wof Adam Wierman Abstract We present the first near-exact anaysis of an M/PH/ queue with m > 2 preemptive-resume

More information

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems Convergence Property of the Iri-Imai Agorithm for Some Smooth Convex Programming Probems S. Zhang Communicated by Z.Q. Luo Assistant Professor, Department of Econometrics, University of Groningen, Groningen,

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

In-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017

In-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017 In-pane shear stiffness of bare stee deck through she finite eement modes G. Bian, B.W. Schafer June 7 COLD-FORMED STEEL RESEARCH CONSORTIUM REPORT SERIES CFSRC R-7- SDII Stee Diaphragm Innovation Initiative

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

Heavy-traffic Delay Optimality in Pull-based Load Balancing Systems: Necessary and Sufficient Conditions

Heavy-traffic Delay Optimality in Pull-based Load Balancing Systems: Necessary and Sufficient Conditions Heavy-traffic Deay Optimaity in Pu-based Load Baancing Systems: Necessary and Sufficient Conditions XINGYU ZHOU, The Ohio State University JIAN TAN, The Ohio State University NSS SHROFF, The Ohio State

More information

Arbitrary Throughput Versus Complexity Tradeoffs in Wireless Networks using Graph Partitioning

Arbitrary Throughput Versus Complexity Tradeoffs in Wireless Networks using Graph Partitioning University of Pennsyvania SchoaryCommons Departmenta Papers (ESE) Department of Eectrica & Systems Engineering November 2006 Arbitrary Throughput Versus Compexity Tradeoffs in Wireess Networks using Graph

More information

Section 6: Magnetostatics

Section 6: Magnetostatics agnetic fieds in matter Section 6: agnetostatics In the previous sections we assumed that the current density J is a known function of coordinates. In the presence of matter this is not aways true. The

More information

c 2016 Georgios Rovatsos

c 2016 Georgios Rovatsos c 2016 Georgios Rovatsos QUICKEST CHANGE DETECTION WITH APPLICATIONS TO LINE OUTAGE DETECTION BY GEORGIOS ROVATSOS THESIS Submitted in partia fufiment of the requirements for the degree of Master of Science

More information

Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity

Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity Error-free Muti-vaued Broadcast and Byzantine Agreement with Optima Communication Compexity Arpita Patra Department of Computer Science Aarhus University, Denmark. arpita@cs.au.dk Abstract In this paper

More information

Stochastic Variational Inference with Gradient Linearization

Stochastic Variational Inference with Gradient Linearization Stochastic Variationa Inference with Gradient Linearization Suppementa Materia Tobias Pötz * Anne S Wannenwetsch Stefan Roth Department of Computer Science, TU Darmstadt Preface In this suppementa materia,

More information

BICM Performance Improvement via Online LLR Optimization

BICM Performance Improvement via Online LLR Optimization BICM Performance Improvement via Onine LLR Optimization Jinhong Wu, Mostafa E-Khamy, Jungwon Lee and Inyup Kang Samsung Mobie Soutions Lab San Diego, USA 92121 Emai: {Jinhong.W, Mostafa.E, Jungwon2.Lee,

More information