Coded Caching for Files with Distinct File Sizes
|
|
- Julian Boone
- 6 years ago
- Views:
Transcription
1 Coded Caching for Files with Distinct File Sizes Jinbei Zhang, Xiaojun Lin, Chih-Chun Wang, Xinbing Wang Shanghai Jiao Tong University Purdue University
2 The Importance of Caching Server cache cache cache User 1 User User 3 Data traffic continues to grow at significant rates A major fraction (60-80%) of traffic will be generated by multimedia content, such as video Caching is important for reducing backhaul requirement in serving large volumes of content that multiple users are interested in
3 An Example of Coded Caching [Maddah-Ali and Niesen 14] Server K=3 users Cache size M=1 Broadcast channel User 1 wants A User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3
4 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) K=3 users Cache size M=1 Broadcast channel Server User 1 wants A User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3
5 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Broadcast channel Server Back-hual Requirement: Uncoded Caching K=3 users Cache size M=1 (A 1, B 1, C 1 ) (A 1, B 1, C 1 ) (A 1, B 1, C 1 ) User 1 wants A User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3
6 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Back-hual Requirement: Uncoded Caching K=3 users Cache size M=1 (A 1, B 1, C 1 ) Broadcast channel Server (A 1, B 1, C 1 ) A, A 3 B, B 3 C, C 3 (A 1, B 1, C 1 ) User 1 wants A User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3
7 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Back-hual Requirement: Uncoded Caching K 1 M N = K=3 users Cache size M=1 (A 1, B 1, C 1 ) Broadcast channel Server (A 1, B 1, C 1 ) A, A 3 B, B 3 C, C 3 (A 1, B 1, C 1 ) User 1 wants A User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3
8 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Back-hual Requirement: Uncoded Caching K 1 M N = Coded Caching [1] K=3 users Cache size M=1 (A 1, B 1, C 1 ) Broadcast channel Server User 1 wants A User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3
9 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Back-hual Requirement: Uncoded Caching K 1 M N = Coded Caching [1] K=3 users Cache size M=1 Broadcast channel Server (A 1, B 1, C 1 ) (A, B, C ) (A 3, B 3, C 3 ) User 1 wants A User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3
10 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Back-hual Requirement: Uncoded Caching K 1 M N = Coded Caching [1] K=3 users Cache size M=1 Broadcast channel Server A B 1 (A 1, B 1, C 1 ) (A, B, C ) (A 3, B 3, C 3 ) A B 1 User 1 wants A User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3
11 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Back-hual Requirement: Uncoded Caching K 1 M N = Coded Caching [1] K=3 users Cache size M=1 Broadcast channel Server A B 1 A 3 C 1 (A 1, B 1, C 1 ) (A, B, C ) (A 3, B 3, C 3 ) A B 1 A 3 C 1 User 1 wants A User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3
12 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Back-hual Requirement: Uncoded Caching K 1 M N = Coded Caching [1] K=3 users Cache size M=1 A B 1 A 3 C 1 B 3 C (A 1, B 1, C 1 ) (A, B, C ) (A 3, B 3, C 3 ) A B 1 A 3 C 1 B 3 C User 1 wants A Broadcast channel Server User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3
13 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Back-hual Requirement: Uncoded Caching K 1 M N = Coded Caching [1] K 1 M N KM N = 1 K=3 users Cache size M=1 A B 1 A 3 C 1 B 3 C (A 1, B 1, C 1 ) (A, B, C ) (A 3, B 3, C 3 ) A B 1 A 3 C 1 B 3 C User 1 wants A Broadcast channel Server User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3
14 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Back-hual Requirement: Uncoded Caching K 1 M N = Coded Caching [1] K 1 M N KM N = 1 K=3 users Cache size M=1 Global caching gain A B 1 A 3 C 1 B 3 C (A 1, B 1, C 1 ) (A, B, C ) (A 3, B 3, C 3 ) A B 1 A 3 C 1 B 3 C User 1 wants A Broadcast channel Server User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3
15 Recent Efforts [Maddah-Ali and Niesen 14] shows that the worst-case transmission rate K 1 M N 1 1+ KM N is at most a constant factor (1x) away from the (information-theoretic) minimum possible Generalized to Decentralized/probabilistic caching schemes [Ali and Niesen `14] Hierarchical caching [Karamchandani et al `14 ] Online caching [Pedarsani et al `13] Expected Rate [Niesen and Ali `14, Ji et al `14, Hachem et al `14] These studies all assume a homogeneous setting where all files are of a same size 4
16 The Question In practice, file sizes are often quite different In heterogeneous settings: Should larger files be cached more aggressively? What is the fundamental limit of the performance of coded caching with distinct file sizes? 5
17 Our Contribution Heterogeneous file-sizes (Roughly) quadratically more content is cached for larger files We show logarithmic-factor bounds While the new achievable schemes are quite intuitive, the corresponding lower bounds are more involved and reveal useful insights 6
18 Network Model: Distinct File Sizes Server with a broadcast channel File 1... Server File N K users: cache size M N files: F = F 1,, F N Request pattern: W i = f i1,, f ik, f ik F Rate for W i is r(w i ) User 1 User... User K Worst-case rate: R = max r(w i ) i 7
19 Network Model: Distinct File Sizes Server with a broadcast channel K users: cache size M File 1 1 File Placement... Server File N N files: F = F 1,, F N Request pattern: W i = f i1,, f ik, f ik F Rate for W i is r(w i ) User 1 User... User K Worst-case rate: R = max r(w i ) i 7
20 Network Model: Distinct File Sizes Server with a broadcast channel File 1... Server File N K users: cache size M 1 File Placement N files: F = F 1,, F N Request pattern: W i = f i1,, f ik, f ik F Rate for W i is r(w i ) File Request User 1 User... File Request User K Worst-case rate: R = max r(w i ) i 7
21 Network Model: Distinct File Sizes Server with a broadcast channel K users: cache size M File 1 1 File Placement... Server 3 File N File Transmission N files: F = F 1,, F N Request pattern: W i = f i1,, f ik, f ik F Rate for W i is r(w i ) File Request User 1 User... File Request User K Worst-case rate: R = max r(w i ) i 7
22 Power-of- Simplification All files 8
23 Power-of- Simplification F 1 All files Re-arrangement 8
24 Power-of- Simplification F 1 F 1,N 1 F = F 1,N 0.6F 1 F T = F 1 T 1,N T F 1,N 1 F = F 1,N All files Re-arrangement F T = F 1 T 1,N T 8
25 Power-of- Simplification F 1 F 1,N 1 F = F 1,N 0.6F 1 F T = F 1 T 1,N T F 1,N 1 F = F 1,N All files Re-arrangement F T = F 1 T 1,N T 8
26 Power-of- Simplification F 1,N 1 File 1 1 File Placement... Server 3 File N File Transmission F = F 1,N File Request File Request User 1 User... User K F T = F 1 T 1,N F T = F 1 T 1,N T 9
27 Power-of- Simplification F 1,N 1 File 1 1 File Placement... Server 3 File N File Transmission F = F 1,N File Request File Request User 1 User... User K F T = F 1 T 1,N F T = F 1 T 1,N T T = min{t, log K} Files of type l > T can be virtually neglected Their sizes F 1 /K 9
28 Power-of- Simplification F 1,N 1 File 1 1 File Placement... Server 3 File N File Transmission F = F 1,N File Request File Request User 1 User... User K F T = F 1 T 1,N F T = F 1 T 1,N T T = min{t, log K} Files of type l > T can be virtually neglected Their sizes F 1 /K 9
29 Intuition Towards Quadratic Caching The worst-case rate with uniform file size of 1 [Maddah-Ali & Niesen `14] is given by K 1 M N 1 1+ KM N N M 1 N M, when K >> N M and M<<N Each user caches every bit of each file with probability q = M N Worst-case rate N M = 1 q When the uniform file-size is F, these numbers become: Caching probability q = M NF, Worst-case rate: KF 1 M NF 1 1+ KM NF NF = F, when q << 1 and K >> 1/q M q 10
30 Two Achievable Schemes (UB1 vs UB) Achievable Scheme 1 (UB1) All files are cached with an equal probability q Linearly more content is cached for larger files Cache constraint: T q l=1 N l F l = M with T = min(t, log K) R UB1 O(max l F l q ) 11
31 Two Achievable Schemes (UB1 vs UB) Achievable Scheme 1 (UB1) All files are cached with an equal probability q Linearly more content is cached for larger files Cache constraint: T q l=1 N l F l = M with T = min(t, log K) R UB1 O(max l F l q ) F 1 suffers 11
32 Two Achievable Schemes (UB1 vs UB) Achievable Scheme 1 (UB1) All files are cached with an equal probability q Linearly more content is cached for larger files Cache constraint: T q l=1 N l F l = M with T = min(t, log K) R UB1 O(max l F l q ) F 1 suffers Achievable Scheme (UB) Let the caching probability be q l = F l /c Quadratically more content is cached for larger files Cache constraint: T T l=1 q l N l F l = M l=1 N l F l = cm R UB T l=1 Fl q l + K F T+1 11
33 Two Achievable Schemes (UB1 vs UB) Achievable Scheme 1 (UB1) All files are cached with an equal probability q Linearly more content is cached for larger files Cache constraint: T q l=1 N l F l = M with T = min(t, log K) R UB1 O(max l F l q ) F 1 suffers Achievable Scheme (UB) Let the caching probability be q l = F l /c Quadratically more content is cached for larger files Cache constraint: T T l=1 q l N l F l = M l=1 N l F l = cm R UB T Fl q l + K F T+1 l=1 Type T # of types * rate for each type 11
34 Two Achievable Schemes (UB1 vs UB) Achievable Scheme 1 (UB1) R UB1 O( F T 1 l=1 4M Nl F l Consider T = log K, N l+1 = 4N l Achievable Scheme (UB) ) R UB ( T + 1) l=1 T N l F l M 1
35 log(rate) Two Achievable Schemes (UB1 vs UB) Achievable Scheme 1 (UB1) R UB1 O( F T 1 l=1 4M Nl F l Achievable Scheme (UB) ) R UB ( T + 1) T l=1 N l F l M Consider T = log K, N l+1 = 4N l R UB1 K N 1F 1 8M R UB ( T + 1) T N 1F 1 M UB1 UB1 K/(log K) UB UB Number of types 1
36 log(rate) Two Achievable Schemes (UB1 vs UB) Achievable Scheme 1 (UB1) R UB1 O( F T 1 l=1 4M Nl F l Achievable Scheme (UB) ) R UB ( T + 1) T l=1 N l F l M Consider T = log K, N l+1 = 4N l R UB1 K N 1F 1 8M R UB ( T + 1) T N 1F 1 M Critical to cache quadratically more content for larger files! UB1 UB1 K/(log K) UB UB Number of types 1
37 Lower Bound: Uniform File-size NF/(M) users 1 NF/(M) M/F Request patterns N Files In order to serve all request patterns, we must have [Maddah-Ali & Niesen `14] M F R F + NF M M NF R F NF 4M = F 4q 13
38 Lower Bound: First Try L users l Φ N l L Request patterns l Φ N l Files of types in Φ In order to serve all request patterns, we must have l Φ N l R F + L M N L l F l Maximizing over L and Φ l Φ R l Φ N l F l F max Φ 4M l Φ N l (LB1) 14
39 log(rate) LB1 vs UB Lower Bound 1 (LB1) Achievable Bound (UB) Consider N l+1 = 4N l R LB1 N 1F 1 M R UB = ( T + 1) l=1 T N l F l M UB1 UB (log K) LB1 Number of types 15
40 log(rate) LB1 vs UB Lower Bound 1 (LB1) Achievable Bound (UB) Consider N l+1 = 4N l R LB1 N 1F 1 M R UB = ( T + 1) l=1 T N l F l M UB1 LB1 fails to account for heterogeneous caching probabilities! UB (log K) LB1 Number of types 15
41 log(rate) An Improved Lower Bound (LB) Proposition 1: Under Assumption 1: M F 1 and N lf l M are integers for all 1 l T Assumption : We must have T l=1 N l F l M K R F (LB) T Nl F l l=1 4M UB1 UB log K Compared with UB: R UB = ( T + 1) l=1 T N l F l M Number of types LB LB1 16
42 Intuition for LB (Two types: F = F 1 /) R T N F l F l l=1 4M =N 1F 1 4M +N F 4M (LB) s 1 = N 1F 1 M users (U 1 ) s = N F M users (U ) 17
43 Intuition for LB (Two types: F = F 1 /) R T N F l F l l=1 4M =N 1F 1 4M +N F 4M (LB) s 1 = N 1F 1 M users (U 1 ) s = N F M users (U ) patterns N 1 files of type 1 (F 1 ) 17
44 Intuition for LB (Two types: F = F 1 /) R T N F l F l l=1 4M =N 1F 1 4M +N F 4M (LB) s 1 = N 1F 1 M users (U 1 ) s = N F M users (U ) patterns N 1 files of type 1 (F 1 ) R F N 1F 1 4M 17
45 Intuition for LB (Two types: F = F 1 /) R T N F l F l l=1 4M =N 1F 1 4M +N F 4M (LB) s 1 = N 1F 1 M users (U 1 ) s = N F M users (U ) patterns N 1 files of type 1 (F 1 ) F 1 17
46 Intuition for LB (Two types: F = F 1 /) R T N F l F l l=1 4M =N 1F 1 4M +N F 4M (LB) s 1 = N 1F 1 M users (U 1 ) s = N F M users (U ) patterns N 1 files of type 1 (F 1 ) F 1 patterns N 1 files of type 1 (F 1 ) 17
47 Intuition for LB (Two types: F = F 1 /) R T N F l F l l=1 4M =N 1F 1 4M +N F 4M (LB) s 1 = N 1F 1 M users (U 1 ) s = N F M users (U ) patterns N 1 files of type 1 (F 1 ) F 1 patterns N 1 files of type 1 (F 1 ) F 17
48 Intuition for LB (Two types: F = F 1 /) R T N F l F l l=1 4M =N 1F 1 4M +N F 4M (LB) s 1 = N 1F 1 M users (U 1 ) s = N F M users (U ) patterns patterns N 1 files of type 1 (F 1 ) N 1 files of type 1 (F 1 ) F 1 N files of type (F ) F 17
49 Proof: (Two types: F = F 1 /) s 1 = N 1F 1, s M = N F M H M 1 = 0.5H F 1 = N 1F 1 H M = 0.5H F = N F H R D1, M 1 = H(R D1, M 1 F 1 ) + I R D1, M 1 ; F 1 18
50 Proof: (Two types: F = F 1 /) s 1 = N 1F 1, s M = N F M H M 1 = 0.5H F 1 = N 1F 1 H M = 0.5H F = N F H R D1, M 1 = H(R D1, M 1 F 1 ) + I R D1, M 1 ; F 1 0.5H(F 1 ) H(F 1 ) 18
51 Proof: (Two types: F = F 1 /) s 1 = N 1F 1, s M = N F M H M 1 = 0.5H F 1 = N 1F 1 H M = 0.5H F = N F H R D1, M 1 = H(R D1, M 1 F 1 ) + I R D1, M 1 ; F 1 0.5H(F 1 ) H(F 1 ) H R D1 H(R D1, M 1 F 1 ) + 0.5H(F 1 ) 18
52 Proof: (Two types: F = F 1 /) s 1 = N 1F 1, s M = N F M H M 1 = 0.5H F 1 = N 1F 1 H M = 0.5H F = N F H R D1, M 1 = H(R D1, M 1 F 1 ) + I R D1, M 1 ; F 1 0.5H(F 1 ) H(F 1 ) H R D1 H(R D1, M 1 F 1 ) + 0.5H(F 1 ) H R D H(R D, M 1 F 1 ) + 0.5H(F 1 ) 18
53 Proof: (Two types: F = F 1 /) s 1 = N 1F 1, s M = N F M H M 1 = 0.5H F 1 = N 1F 1 H M = 0.5H F = N F H R D1, M 1 = H(R D1, M 1 F 1 ) + I R D1, M 1 ; F 1 0.5H(F 1 ) H(F 1 ) H R D1 H(R D1, M 1 F 1 ) + 0.5H(F 1 ) H R D H(R D, M 1 F 1 ) + 0.5H(F 1 ) H(M ) H R D1 + H R D H F 0.5H(F ) +H(F 1 ) 18
54 Proof: (T>=3) 4N 1 s 1 R F 4I R D1 ; F N 1F 1 I R D1 R D ; F F 1 N F + I R D1 R D R D3 R D4 ; F 3 F 1, F N 3 F 3 19
55 Without Assumptions 1 & Intuition Memory sharing argument Assume there exists a lower bound R File Size R R A user s storage Effective Cache T 1 M = M N l (F l R) M l=1 Group 1 F l R Cache F l R portion Group (can be empty) F l < R, F l > M Each user requests 1 file Group 3 F l M Using previous results T 1 T 3 T T 4 File Type 0
56 Comparisons With Assumptions 1 & 1
57 Comparisons With Assumptions 1 & General Result (without Assumptions 1 and ): R UB (3log K + )R LB 1
58 Conclusion and Discussions Heterogeneous file-sizes Quadratically more content is cached for larger files We show logarithmic-factor gap While the new achievable schemes are quite intuitive, the corresponding lower bounds more involved and reveal useful insights Future Work: A tighter lower-bound? New techniques in the achievable scheme? Remove the logarithmic factor Sharper insights into the general lower bound
59 Thank you!
Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University
Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Joint work with Jinbei Zhang (SJTU), Chih-Chun Wang (Purdue) and Xinbing Wang (SJTU)
More informationCoded Caching under Arbitrary Popularity Distributions
Coded Caching under Arbitrary Popularity Distributions Jinbei Zhang, Xiaojun Lin, Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University, China School of Electrical and Computer Engineering,
More informationCoded Caching with Low Subpacketization Levels
Electrical and Computer Engineering Conference Papers, Posters and Presentations Electrical and Computer Engineering 06 Coded Caching with Low Subpacetization Levels Li Tang Iowa State University, litang@iastateedu
More informationFundamental Limits on Latency in Small-Cell Caching Systems: An Information-Theoretic Analysis
Fundamental Limits on Latency in Small-ell aching Systems: An Information-Theoretic Analysis Seyyed Mohammadreza Azimi, Osvaldo Simeone, and Ravi Tandon Abstract aching of popular multimedia content at
More informationContent Caching and Delivery over Heterogeneous Wireless Networks
Content Caching and Delivery over Heterogeneous Wireless Networks Jad Hachem University of California, Los Angeles Email: jadhachem@uclaedu khil Karamchandani Indian Institute of Technology, Bombay Email:
More informationCoded Caching for Multi-level Popularity and Access
Coded Caching for Multi-level Popularity and Access Jad Hachem, Student Member, IEEE, Nikhil Karamchandani, Member, IEEE, and Suhas Diggavi, Fellow, IEEE Abstract arxiv:4046563v2 [csit] 3 Dec 205 To address
More informationSymmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching
entropy Article Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching Chao Tian Department of Electrical and Computer Engineering, Texas A&M
More informationCache-Enabled Broadcast Packet Erasure Channels with State Feedback
Cache-Enabled Broadcast Pacet Erasure Channels with State Feedbac Asma Ghorbel, Mari Kobayashi, Sheng Yang To cite this version: Asma Ghorbel, Mari Kobayashi, Sheng Yang. Cache-Enabled Broadcast Pacet
More informationOn Coded Caching with Correlated Files
On Coded Caching with Correlated Files Kai Wan, Daniela Tuninetti, Mingyue Ji, Giuseppe Care, Technische Universität Berlin, Berlin, Germany, {kai.wan, caire}@tu-berlin.de University of Illinois at Chicago,
More informationFundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes
Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes Jingjing Zhang and Osvaldo Simeone arxiv:72.04266v4 [cs.it] 2 Mar 208 Abstract In fog-aided cellular systems,
More informationCloud and Cache-Aided Wireless Networks: Fundamental Latency Trade-Offs
Cloud and Cache-Aided Wireless Networks: Fundamental Latency Trade-Offs Avik Sengupta, Student Member, IEEE, Ravi Tandon, Member, IEEE, Osvaldo Simeone, Fellow, IEEE Abstract A cloud and cache-aided wireless
More informationOptimal Geographical Caching in Heterogeneous Cellular Networks
1 Optimal Geographical Caching in Heterogeneous Cellular Networks Berksan Serbetci, and Jasper Goseling arxiv:1710.09626v2 [cs.ni] 22 Nov 2018 Abstract We investigate optimal geographical caching in heterogeneous
More informationAlpha Fair Coded Caching
Alpha Fair Coded Caching Apostolos Destounis 1, Mari Kobayashi 2, Georgios Paschos 1, Asma Ghorbel 2 1 France Research Center, Huawei Technologies Co. Ltd., email: firstname.lastname@huawei.com 2 Centrale-Supélec,
More informationCoded Caching for Files with Distinct File Sizes
Coded Caching for Fies with Distinct Fie Sizes Jinbei Zhang iaojun Lin Chih-Chun Wang inbing Wang Department of Eectronic Engineering Shanghai Jiao ong University China Schoo of Eectrica and Computer Engineering
More informationOn Allocating Cache Resources to Content Providers
On Allocating Cache Resources to Content Providers Weibo Chu, Mostafa Dehghan, Don Towsley, Zhi-Li Zhang wbchu@nwpu.edu.cn Northwestern Polytechnical University Why Resource Allocation in ICN? Resource
More informationAnalysis and Optimization of Caching and Multicasting for Multi-Quality Videos in Large-Scale Wireless Networks
Analysis and Optimization of Caching and Multicasting for Multi-Quality Videos in Large-Scale Wireless Networks Dongdong Jiang, Student Member, IEEE and Ying Cui, Member, IEEE Abstract Efficient dissemination
More informationMinimum Repair Bandwidth for Exact Regeneration in Distributed Storage
1 Minimum Repair andwidth for Exact Regeneration in Distributed Storage Vivec R Cadambe, Syed A Jafar, Hamed Malei Electrical Engineering and Computer Science University of California Irvine, Irvine, California,
More informationFundamental Limits on Delivery Time in Cloud- and Cache-Aided Heterogeneous Networks
DRAFT Fundamental Limits on Delivery Time in Cloud- and Cache-Aided Heterogeneous Networks Jaber Kakar Member IEEE Soheil Gherekhloo Member IEEE arxiv:706.0767v [cs.it] 3 Jun 07 and Aydin Sezgin Senior
More informationHow to Optimally Allocate Resources for Coded Distributed Computing?
1 How to Optimally Allocate Resources for Coded Distributed Computing? Qian Yu, Songze Li, Mohammad Ali Maddah-Ali, and A. Salman Avestimehr Department of Electrical Engineering, University of Southern
More informationDegrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel
/33 Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel Presented by Paul de Kerret Joint work with Antonio Bazco, Nicolas Gresset, and David Gesbert ESIT 2017 in Madrid,
More informationA Novel Index Coding Scheme and its Application to Coded Caching
A ovel Index Coding Scheme and its Application to Coded Caching ai Wan Laboratoire des Signaux et Systèmes L2S CentraleSupèlec-CRS-Universitè Paris-Sud 91192 Gif-sur-Yvette, France Email: kai.wan@u-psud.fr
More informationDistributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient
Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Viveck R Cadambe, Syed A Jafar, Hamed Maleki Electrical Engineering and
More informationOn the Worst-case Communication Overhead for Distributed Data Shuffling
On the Worst-case Communication Overhead for Distributed Data Shuffling Mohamed Adel Attia Ravi Tandon Department of Electrical and Computer Engineering University of Arizona, Tucson, AZ 85721 E-mail:{madel,
More informationOn Two Class-Constrained Versions of the Multiple Knapsack Problem
On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic
More informationStochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks
1 Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks Bo Zhou, Ying Cui, Member, IEEE, and Meixia Tao, Senior Member, IEEE Abstract Caching at small base stations
More informationChannel Dependent Adaptive Modulation and Coding Without Channel State Information at the Transmitter
Channel Dependent Adaptive Modulation and Coding Without Channel State Information at the Transmitter Bradford D. Boyle, John MacLaren Walsh, and Steven Weber Modeling & Analysis of Networks Laboratory
More informationA Polynomial-Time Algorithm for Pliable Index Coding
1 A Polynomial-Time Algorithm for Pliable Index Coding Linqi Song and Christina Fragouli arxiv:1610.06845v [cs.it] 9 Aug 017 Abstract In pliable index coding, we consider a server with m messages and n
More informationECE Information theory Final (Fall 2008)
ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1
More informationJoint and Competitive Caching Designs in Large-Scale Multi-Tier Wireless Multicasting Networks
Joint and Competitive Caching Designs in Large-Scale Multi-Tier Wireless Multicasting Networks Zitian Wang, Zhehan Cao, Ying Cui Shanghai Jiao Tong University, China Yang Yang Intel Deutschland GmbH, Germany
More informationFundamental Tradeoff between Computation and Communication in Distributed Computing
Fundamental Tradeoff between Computation and Communication in Distributed Computing Songze Li, Mohammad Ali Maddah-Ali, and A. Salman Avestimehr Department of Electrical Engineering, University of Southern
More informationIndex coding with side information
Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated
More informationExploiting Mobility in Cache-Assisted D2D Networks: Performance Analysis and Optimization
1 Exploiting Mobility in Cache-Assisted D2D Networks: Performance Analysis and Optimization Rui Wang, Jun Zhang, Senior Member, IEEE, S.H. Song, Member, IEEE, and arxiv:1806.04069v1 [cs.it] 11 Jun 2018
More informationCopyright Warning & Restrictions
Copyright Warning & Restrictions The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions
More informationCache Aided Wireless Networks: Tradeoffs between Storage and Latency
Cache Aided Wireless Networks: radeoffs between Storage and Latency Avik Sengupta ume Center, Department of ECE Virginia ech, Blacksburg, VA 24060, USA Email: aviksg@vt.edu Ravi andon Department of ECE
More informationPERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS. Pratik Patil, Binbin Dai, and Wei Yu
PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS Pratik Patil, Binbin Dai, and Wei Yu Department of Electrical and Computer Engineering University of Toronto,
More information2014 IEEE International Symposium on Information Theory. Two-unicast is hard. David N.C. Tse
Two-unicast is hard Sudeep Kamath ECE Department, University of California, San Diego, CA, USA sukamath@ucsd.edu David N.C. Tse EECS Department, University of California, Berkeley, CA, USA dtse@eecs.berkeley.edu
More informationCS 310 Advanced Data Structures and Algorithms
CS 310 Advanced Data Structures and Algorithms Runtime Analysis May 31, 2017 Tong Wang UMass Boston CS 310 May 31, 2017 1 / 37 Topics Weiss chapter 5 What is algorithm analysis Big O, big, big notations
More informationCache-Enabled Heterogeneous Cellular Networks: Optimal Tier- Level Content Placement. Title. Wen, W; Huang, K; Yang, S.; Li, VOK
Title Cache-Enabled Heterogeneous Cellular Networks: Optimal Tier- Level Content Placement Author(s) Wen, W; Huang, K; Yang, S.; Li, VOK Citation IEEE Transactions on Wireless Communications, 2017, v.
More informationP e = 0.1. P e = 0.01
23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function
More informationOn the Properties of a Tree-Structured Server Process
On the Properties of a Tree-Structured Server Process J. Komlos Rutgers University A. Odlyzko L. Ozarow L. A. Shepp AT&T Bell Laboratories Murray Hill, New Jersey 07974 I. INTRODUCTION In this paper we
More informationGeneralized Degrees-of-Freedom of the 2-User Case MISO Broadcast Channel with Distributed CSIT
207 IEEE IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, June 207 DOI: 009/ECCE2078096480 Generalized Degrees-of-Freedom of the 2-User Case MISO Broadcast Channel with Distributed
More informationOn the Fundamental Limits of Coded Data Shuffling for Distributed Learning Systems
1 On the undamental Limits of oded Data Shuffling for Distributed Learning Systems del lmahdy, and Soheil Mohajer Department of lectrical and omputer ngineering, University of Minnesota, Minneapolis, MN,
More informationInter-Session Network Coding Schemes for 1-to-2 Downlink Access-Point Networks with Sequential Hard Deadline Constraints
Inter-Session Network Coding Schemes for -to- Downlink Access-Point Networks with Sequential Hard Deadline Constraints Xiaohang Li, Chih-Chun Wang, and Xiaojun Lin Center for Wireless Systems and Applications,
More informationQuadratic Interval Refinement
(QIR) Analysis of Seminar on Computational Geometry and Geometric Computing Outline Introduction (QIR) Analysis of 1 Introduction in Short Main Goal of this Work 2 3 (QIR) Bisection Method Algorithm 4
More informationIndex Coding & Caching in Wireless Networks. Salim El Rouayheb. ECE IIT, Chicago
Index Coding & Caching in Wireless Networks Salim El Rouayheb ECE IIT, Chicago Big Data vs. Wireless Exabytes per month [Cisco] Meanwhile, Storage is Getting Cheaper Storage cost per GB (USD) http://www.mkomo.com/cost-per-gigabyte-update
More informationOn queueing in coded networks queue size follows degrees of freedom
On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,
More informationUpper Bounds on the Capacity of Binary Intermittent Communication
Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,
More informationEfficient Decoding of Permutation Codes Obtained from Distance Preserving Maps
2012 IEEE International Symposium on Information Theory Proceedings Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps Yeow Meng Chee and Punarbasu Purkayastha Division of Mathematical
More informationEnergy-Efficient Broadcast Scheduling. Speed-Controlled Transmission Channels
for Speed-Controlled Transmission Channels Joint work with Christian Gunia from Freiburg University in ISAAC 06. 25.10.07 Outline Problem Definition and Motivation 1 Problem Definition and Motivation 2
More informationA New SLNR-based Linear Precoding for. Downlink Multi-User Multi-Stream MIMO Systems
A New SLNR-based Linear Precoding for 1 Downlin Multi-User Multi-Stream MIMO Systems arxiv:1008.0730v1 [cs.it] 4 Aug 2010 Peng Cheng, Meixia Tao and Wenjun Zhang Abstract Signal-to-leaage-and-noise ratio
More informationInterference Channels with Source Cooperation
Interference Channels with Source Cooperation arxiv:95.319v1 [cs.it] 19 May 29 Vinod Prabhakaran and Pramod Viswanath Coordinated Science Laboratory University of Illinois, Urbana-Champaign Urbana, IL
More informationSimplified Composite Coding for Index Coding
Simplified Composite Coding for Index Coding Yucheng Liu, Parastoo Sadeghi Research School of Engineering Australian National University {yucheng.liu, parastoo.sadeghi}@anu.edu.au Fatemeh Arbabjolfaei,
More informationarxiv: v1 [cs.it] 23 Jan 2019
Single-Server Single-Message Online Private Information Retrieval with Side Information Fatemeh azemi, Esmaeil arimi, Anoosheh Heidarzadeh, and Alex Sprintson arxiv:90.07748v [cs.it] 3 Jan 09 Abstract
More informationComputer Arithmetic. MATH 375 Numerical Analysis. J. Robert Buchanan. Fall Department of Mathematics. J. Robert Buchanan Computer Arithmetic
Computer Arithmetic MATH 375 Numerical Analysis J. Robert Buchanan Department of Mathematics Fall 2013 Machine Numbers When performing arithmetic on a computer (laptop, desktop, mainframe, cell phone,
More informationOn Common Information and the Encoding of Sources that are Not Successively Refinable
On Common Information and the Encoding of Sources that are Not Successively Refinable Kumar Viswanatha, Emrah Akyol, Tejaswi Nanjundaswamy and Kenneth Rose ECE Department, University of California - Santa
More informationTechnion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling
On Centralized Smooth Scheduling Ami Litman January 25, 2005 Abstract Shiri Moran-Schein This paper studies evenly distributed sets of natural numbers and their applications to scheduling in a centralized
More informationSparse and low-rank decomposition for big data systems via smoothed Riemannian optimization
Sparse and low-rank decomposition for big data systems via smoothed Riemannian optimization Yuanming Shi ShanghaiTech University, Shanghai, China shiym@shanghaitech.edu.cn Bamdev Mishra Amazon Development
More informationSTABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS
The 8th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 7) STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS Ka-Hung
More informationOptimal Resource Allocation for Multi-User MEC with Arbitrary Task Arrival Times and Deadlines
Optimal Resource Allocation for Multi-User MEC with Arbitrary Task Arrival Times and Deadlines Xinyun Wang, Ying Cui, Zhi Liu, Junfeng Guo, Mingyu Yang Abstract In this paper, we would like to investigate
More informationCentralized Coded Caching of Correlated Contents
Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv:1711.03798v1
More informationPaging with Multiple Caches
Paging with Multiple Caches Rahul Vaze School of Technology and Computer Science Tata Institute of Fundamental Research Email: vaze@tcs.tifr.res.in Sharayu Moharir Department of Electrical Engineering
More informationSingle Frame Rate-Quantization Model for MPEG-4 AVC/H.264 Video Encoders
Single Frame Rate-Quantization Model for MPEG-4 AVC/H.264 Video Encoders Tomasz Grajek and Marek Domański Poznan University of Technology Chair of Multimedia Telecommunications and Microelectronics ul.
More informationPinning Control and Controllability of Complex Networks
Pinning Control and Controllability of Complex Networks Guanrong (Ron) Chen City University of Hong Kong, China Joint work with Xiaofan Wang, Lin Wang Shanghai Jiao Tong University, China Xiang Li, Baoyu
More informationEnergy-Efficient Resource Allocation for Multi-User Mobile Edge Computing
Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing Junfeng Guo, Zhaozhe Song, Ying Cui Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, P. R. China
More informationAchieving Spatial Scalability for Coded. Caching over Wireless Networks
Achieving Spatial Scalability for Coded 1 Caching over Wireless Networks Mozhgan Bayat, Ratheesh K. Mungara, and Giuseppe Caire arxiv:183.572v1 [cs.it] 15 Mar 218 Abstract The coded caching scheme proposed
More informationCoding for a Non-symmetric Ternary Channel
Coding for a Non-symmetric Ternary Channel Nicolas Bitouzé and Alexandre Graell i Amat Department of Electronics, Institut TELECOM-TELECOM Bretagne, 938 Brest, France Email: nicolas.bitouze@telecom-bretagne.eu,
More informationLecture 2: Paging and AdWords
Algoritmos e Incerteza (PUC-Rio INF2979, 2017.1) Lecture 2: Paging and AdWords March 20 2017 Lecturer: Marco Molinaro Scribe: Gabriel Homsi In this class we had a brief recap of the Ski Rental Problem
More informationThe Poisson Channel with Side Information
The Poisson Channel with Side Information Shraga Bross School of Enginerring Bar-Ilan University, Israel brosss@macs.biu.ac.il Amos Lapidoth Ligong Wang Signal and Information Processing Laboratory ETH
More information15-451/651: Design & Analysis of Algorithms September 13, 2018 Lecture #6: Streaming Algorithms last changed: August 30, 2018
15-451/651: Design & Analysis of Algorithms September 13, 2018 Lecture #6: Streaming Algorithms last changed: August 30, 2018 Today we ll talk about a topic that is both very old (as far as computer science
More informationJoint Optimization of Cloud and Edge Processing for Fog Radio Access Networks
Joint Optimization of Cloud and Edge Processing for Fog Radio Access Networks Seok-Hwan Park 1, Osvaldo Simeone 2 and Shlomo Shamai (Shitz) 3 1 Division of Electronic Engineering, Chonbuk National University,
More informationResource Allocation for Video Streaming in Wireless Environment
Resource Allocation for Video Streaming in Wireless Environment Shahrokh Valaee and Jean-Charles Gregoire Abstract This paper focuses on the development of a new resource allocation scheme for video streaming
More informationOptimal matching in wireless sensor networks
Optimal matching in wireless sensor networks A. Roumy, D. Gesbert INRIA-IRISA, Rennes, France. Institute Eurecom, Sophia Antipolis, France. Abstract We investigate the design of a wireless sensor network
More informationComputing and Communications 2. Information Theory -Entropy
1896 1920 1987 2006 Computing and Communications 2. Information Theory -Entropy Ying Cui Department of Electronic Engineering Shanghai Jiao Tong University, China 2017, Autumn 1 Outline Entropy Joint entropy
More informationAlgorithms and Their Complexity
CSCE 222 Discrete Structures for Computing David Kebo Houngninou Algorithms and Their Complexity Chapter 3 Algorithm An algorithm is a finite sequence of steps that solves a problem. Computational complexity
More informationSTABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING
Applied Probability Trust (7 May 2015) STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING RAMTIN PEDARSANI and JEAN WALRAND, University of California,
More informationCS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding
CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding Tim Roughgarden October 29, 2014 1 Preamble This lecture covers our final subtopic within the exact and approximate recovery part of the course.
More informationSimplification of Network Dynamics in Large Systems
Simplification of Network Dynamics in Large Systems Xiaojun Lin and Ness B. Shroff Abstract In this paper we show that significant simplicity can be exploited for pricing-based control of large networks.
More informationGibbsian On-Line Distributed Content Caching Strategy for Cellular Networks
Gibbsian On-Line Distributed Content Caching Strategy for Cellular Networks Arpan Chattopadhyay, Bartłomiej Błaszczyszyn, H. Paul Keeler arxiv:1610.02318v2 [cs.ni] 6 Nov 2017 Abstract In this paper, we
More informationClinic Scheduling Models with Overbooking for Patients with Heterogeneous No-show Probabilities
1 2 3 4 5 6 7 8 9 Clinic Scheduling Models with Overbooking for Patients with Heterogeneous No-show Probabilities Bo Zeng, Ji Lin and Mark Lawley email: {bzeng, lin35, malawley}@purdue.edu Weldon School
More informationOn the Energy-Distortion Tradeoff of Gaussian Broadcast Channels with Feedback
On the Energy-Distortion Tradeoff of Gaussian Broadcast Channels with Feedback Yonathan Murin, Yonatan Kaspi, Ron Dabora 3, and Deniz Gündüz 4 Stanford University, USA, University of California, San Diego,
More informationEnergy Harvesting Multiple Access Channel with Peak Temperature Constraints
Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,
More informationThe Applicability of Adaptive Control Theory to QoS Design: Limitations and Solutions
The Applicability of Adaptive Control Theory to QoS Design: Limitations and Solutions Keqiang Wu David J. Lilja Haowei Bai Electrical and Computer Engineering University of Minnesota Minneapolis, MN 55455,
More informationTwo-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems
Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems Behrouz Khoshnevis and Wei Yu Department of Electrical and Computer Engineering University of Toronto, Toronto, Ontario,
More informationRevenue Maximization in a Cloud Federation
Revenue Maximization in a Cloud Federation Makhlouf Hadji and Djamal Zeghlache September 14th, 2015 IRT SystemX/ Telecom SudParis Makhlouf Hadji Outline of the presentation 01 Introduction 02 03 04 05
More informationCaching with Time Domain Buffer Sharing
SUBMITTED PAPER 1 Caching with Time Domain Buffer Sharing Wei Chen, Senior Member, IEEE, and H. Vincent Poor, Fellow, IEEE arxiv:1804.02797v1 [cs.it] 9 Apr 2018 Abstract In this paper, storage efficient
More informationContinuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks
Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer
More informationA Generic Bound on Cycles in Two-Player Games
A Generic Bound on Cycles in Two-Player Games David S. Ahn February 006 Abstract We provide a bound on the size of simultaneous best response cycles for generic finite two-player games. The bound shows
More informationImpact of traffic mix on caching performance
Impact of traffic mix on caching performance Jim Roberts, INRIA/RAP joint work with Christine Fricker, Philippe Robert, Nada Sbihi BCAM, 27 June 2012 A content-centric future Internet most Internet traffic
More informationIS 709/809: Computational Methods in IS Research Fall Exam Review
IS 709/809: Computational Methods in IS Research Fall 2017 Exam Review Nirmalya Roy Department of Information Systems University of Maryland Baltimore County www.umbc.edu Exam When: Tuesday (11/28) 7:10pm
More informationAccurate Fourier Analysis for Circuit Simulators
Accurate Fourier Analysis for Circuit Simulators Kenneth S. Kundert Cadence Design Systems (Based on Presentation to CICC 94) Abstract A new approach to Fourier analysis within the context of circuit simulation
More informationEnergy Harvesting Communications with Batteries having Cycle Constraints
1 Energy Harvesting Communications with Batteries having Cycle Constraints Rajshekhar Vishweshwar Bhat, Graduate Student Member, IEEE, Mehul Motani, Fellow, IEEE, Chandra R Murthy, Senior Member, IEEE,
More informationCache me if you can Capacitated Selfish Replica0on Games
Cache me if you can Capacitated Selfish Replica0on Games Dimitrios Kanoulas R. Rajaraman, R. Sundaram R. Gopalakrishnan, N. Karuturi, C. P. Rangan LATIN 12, CCIS Department, Northeastern University Capacitated
More informationConcatenated Coding Using Linear Schemes for Gaussian Broadcast Channels with Noisy Channel Output Feedback
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. XX, NO. Y, MONTH 204 Concatenated Coding Using Linear Schemes for Gaussian Broadcast Channels with Noisy Channel Output Feedback Ziad Ahmad, Student Member, IEEE,
More informationUNIQUE RANGE SETS FOR MEROMORPHIC FUNCTIONS CONSTRUCTED WITHOUT AN INJECTIVITY HYPOTHESIS
UNIQUE RANGE SETS FOR MEROMORPHIC FUNCTIONS CONSTRUCTED WITHOUT AN INJECTIVITY HYPOTHESIS TA THI HOAI AN Abstract. A set is called a unique range set (counting multiplicities) for a particular family of
More information(Structured) Coding for Real-Time Streaming Communication
(Structured) Coding for Real-Time Streaming Communication Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Joint work with: Ahmed Badr (Toronto), Farrokh Etezadi (Toronto),
More informationCache Placement in Two-Tier HetNets with Limited Storage Capacity: Cache or Buffer?
Cache Placement in Two-Tier HetNets with Limited Storage Capacity: Cache or Buffer? Zhaohui Yang, Cunhua Pan, Yijin Pan, Yongpeng Wu, Senior Member, IEEE, Wei Xu, Senior Member, IEEE, Mohammad Shikh-Bahaei,
More informationReal-Time Course. Clock synchronization. June Peter van der TU/e Computer Science, System Architecture and Networking
Real-Time Course Clock synchronization 1 Clocks Processor p has monotonically increasing clock function C p (t) Clock has drift rate For t1 and t2, with t2 > t1 (1-ρ)(t2-t1)
More informationto be almost surely min{n 0, 3
1 The DoF Region of the Three-Receiver MIMO Broadcast Channel with Side Information and Its Relation to Index Coding Capacity Behzad Asadi, Lawrence Ong, and Sarah J Johnson arxiv:160803377v1 [csit] 11
More informationThe Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel
The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel Stefano Rini, Daniela Tuninetti, and Natasha Devroye Department
More informationA Systematic Description of Source Significance Information
A Systematic Description of Source Significance Information Norbert Goertz Institute for Digital Communications School of Engineering and Electronics The University of Edinburgh Mayfield Rd., Edinburgh
More information