Coded Caching for Files with Distinct File Sizes

Size: px
Start display at page:

Download "Coded Caching for Files with Distinct File Sizes"

Transcription

1 Coded Caching for Files with Distinct File Sizes Jinbei Zhang, Xiaojun Lin, Chih-Chun Wang, Xinbing Wang Shanghai Jiao Tong University Purdue University

2 The Importance of Caching Server cache cache cache User 1 User User 3 Data traffic continues to grow at significant rates A major fraction (60-80%) of traffic will be generated by multimedia content, such as video Caching is important for reducing backhaul requirement in serving large volumes of content that multiple users are interested in

3 An Example of Coded Caching [Maddah-Ali and Niesen 14] Server K=3 users Cache size M=1 Broadcast channel User 1 wants A User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3

4 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) K=3 users Cache size M=1 Broadcast channel Server User 1 wants A User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3

5 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Broadcast channel Server Back-hual Requirement: Uncoded Caching K=3 users Cache size M=1 (A 1, B 1, C 1 ) (A 1, B 1, C 1 ) (A 1, B 1, C 1 ) User 1 wants A User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3

6 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Back-hual Requirement: Uncoded Caching K=3 users Cache size M=1 (A 1, B 1, C 1 ) Broadcast channel Server (A 1, B 1, C 1 ) A, A 3 B, B 3 C, C 3 (A 1, B 1, C 1 ) User 1 wants A User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3

7 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Back-hual Requirement: Uncoded Caching K 1 M N = K=3 users Cache size M=1 (A 1, B 1, C 1 ) Broadcast channel Server (A 1, B 1, C 1 ) A, A 3 B, B 3 C, C 3 (A 1, B 1, C 1 ) User 1 wants A User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3

8 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Back-hual Requirement: Uncoded Caching K 1 M N = Coded Caching [1] K=3 users Cache size M=1 (A 1, B 1, C 1 ) Broadcast channel Server User 1 wants A User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3

9 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Back-hual Requirement: Uncoded Caching K 1 M N = Coded Caching [1] K=3 users Cache size M=1 Broadcast channel Server (A 1, B 1, C 1 ) (A, B, C ) (A 3, B 3, C 3 ) User 1 wants A User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3

10 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Back-hual Requirement: Uncoded Caching K 1 M N = Coded Caching [1] K=3 users Cache size M=1 Broadcast channel Server A B 1 (A 1, B 1, C 1 ) (A, B, C ) (A 3, B 3, C 3 ) A B 1 User 1 wants A User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3

11 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Back-hual Requirement: Uncoded Caching K 1 M N = Coded Caching [1] K=3 users Cache size M=1 Broadcast channel Server A B 1 A 3 C 1 (A 1, B 1, C 1 ) (A, B, C ) (A 3, B 3, C 3 ) A B 1 A 3 C 1 User 1 wants A User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3

12 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Back-hual Requirement: Uncoded Caching K 1 M N = Coded Caching [1] K=3 users Cache size M=1 A B 1 A 3 C 1 B 3 C (A 1, B 1, C 1 ) (A, B, C ) (A 3, B 3, C 3 ) A B 1 A 3 C 1 B 3 C User 1 wants A Broadcast channel Server User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3

13 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Back-hual Requirement: Uncoded Caching K 1 M N = Coded Caching [1] K 1 M N KM N = 1 K=3 users Cache size M=1 A B 1 A 3 C 1 B 3 C (A 1, B 1, C 1 ) (A, B, C ) (A 3, B 3, C 3 ) A B 1 A 3 C 1 B 3 C User 1 wants A Broadcast channel Server User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3

14 An Example of Coded Caching [Maddah-Ali and Niesen 14] N=3 files: A = (A 1, A, A 3 ) B = (B 1, B, B 3 ) C = (C 1, C, C 3 ) Back-hual Requirement: Uncoded Caching K 1 M N = Coded Caching [1] K 1 M N KM N = 1 K=3 users Cache size M=1 Global caching gain A B 1 A 3 C 1 B 3 C (A 1, B 1, C 1 ) (A, B, C ) (A 3, B 3, C 3 ) A B 1 A 3 C 1 B 3 C User 1 wants A Broadcast channel Server User wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, 014. User 3 wants C 3

15 Recent Efforts [Maddah-Ali and Niesen 14] shows that the worst-case transmission rate K 1 M N 1 1+ KM N is at most a constant factor (1x) away from the (information-theoretic) minimum possible Generalized to Decentralized/probabilistic caching schemes [Ali and Niesen `14] Hierarchical caching [Karamchandani et al `14 ] Online caching [Pedarsani et al `13] Expected Rate [Niesen and Ali `14, Ji et al `14, Hachem et al `14] These studies all assume a homogeneous setting where all files are of a same size 4

16 The Question In practice, file sizes are often quite different In heterogeneous settings: Should larger files be cached more aggressively? What is the fundamental limit of the performance of coded caching with distinct file sizes? 5

17 Our Contribution Heterogeneous file-sizes (Roughly) quadratically more content is cached for larger files We show logarithmic-factor bounds While the new achievable schemes are quite intuitive, the corresponding lower bounds are more involved and reveal useful insights 6

18 Network Model: Distinct File Sizes Server with a broadcast channel File 1... Server File N K users: cache size M N files: F = F 1,, F N Request pattern: W i = f i1,, f ik, f ik F Rate for W i is r(w i ) User 1 User... User K Worst-case rate: R = max r(w i ) i 7

19 Network Model: Distinct File Sizes Server with a broadcast channel K users: cache size M File 1 1 File Placement... Server File N N files: F = F 1,, F N Request pattern: W i = f i1,, f ik, f ik F Rate for W i is r(w i ) User 1 User... User K Worst-case rate: R = max r(w i ) i 7

20 Network Model: Distinct File Sizes Server with a broadcast channel File 1... Server File N K users: cache size M 1 File Placement N files: F = F 1,, F N Request pattern: W i = f i1,, f ik, f ik F Rate for W i is r(w i ) File Request User 1 User... File Request User K Worst-case rate: R = max r(w i ) i 7

21 Network Model: Distinct File Sizes Server with a broadcast channel K users: cache size M File 1 1 File Placement... Server 3 File N File Transmission N files: F = F 1,, F N Request pattern: W i = f i1,, f ik, f ik F Rate for W i is r(w i ) File Request User 1 User... File Request User K Worst-case rate: R = max r(w i ) i 7

22 Power-of- Simplification All files 8

23 Power-of- Simplification F 1 All files Re-arrangement 8

24 Power-of- Simplification F 1 F 1,N 1 F = F 1,N 0.6F 1 F T = F 1 T 1,N T F 1,N 1 F = F 1,N All files Re-arrangement F T = F 1 T 1,N T 8

25 Power-of- Simplification F 1 F 1,N 1 F = F 1,N 0.6F 1 F T = F 1 T 1,N T F 1,N 1 F = F 1,N All files Re-arrangement F T = F 1 T 1,N T 8

26 Power-of- Simplification F 1,N 1 File 1 1 File Placement... Server 3 File N File Transmission F = F 1,N File Request File Request User 1 User... User K F T = F 1 T 1,N F T = F 1 T 1,N T 9

27 Power-of- Simplification F 1,N 1 File 1 1 File Placement... Server 3 File N File Transmission F = F 1,N File Request File Request User 1 User... User K F T = F 1 T 1,N F T = F 1 T 1,N T T = min{t, log K} Files of type l > T can be virtually neglected Their sizes F 1 /K 9

28 Power-of- Simplification F 1,N 1 File 1 1 File Placement... Server 3 File N File Transmission F = F 1,N File Request File Request User 1 User... User K F T = F 1 T 1,N F T = F 1 T 1,N T T = min{t, log K} Files of type l > T can be virtually neglected Their sizes F 1 /K 9

29 Intuition Towards Quadratic Caching The worst-case rate with uniform file size of 1 [Maddah-Ali & Niesen `14] is given by K 1 M N 1 1+ KM N N M 1 N M, when K >> N M and M<<N Each user caches every bit of each file with probability q = M N Worst-case rate N M = 1 q When the uniform file-size is F, these numbers become: Caching probability q = M NF, Worst-case rate: KF 1 M NF 1 1+ KM NF NF = F, when q << 1 and K >> 1/q M q 10

30 Two Achievable Schemes (UB1 vs UB) Achievable Scheme 1 (UB1) All files are cached with an equal probability q Linearly more content is cached for larger files Cache constraint: T q l=1 N l F l = M with T = min(t, log K) R UB1 O(max l F l q ) 11

31 Two Achievable Schemes (UB1 vs UB) Achievable Scheme 1 (UB1) All files are cached with an equal probability q Linearly more content is cached for larger files Cache constraint: T q l=1 N l F l = M with T = min(t, log K) R UB1 O(max l F l q ) F 1 suffers 11

32 Two Achievable Schemes (UB1 vs UB) Achievable Scheme 1 (UB1) All files are cached with an equal probability q Linearly more content is cached for larger files Cache constraint: T q l=1 N l F l = M with T = min(t, log K) R UB1 O(max l F l q ) F 1 suffers Achievable Scheme (UB) Let the caching probability be q l = F l /c Quadratically more content is cached for larger files Cache constraint: T T l=1 q l N l F l = M l=1 N l F l = cm R UB T l=1 Fl q l + K F T+1 11

33 Two Achievable Schemes (UB1 vs UB) Achievable Scheme 1 (UB1) All files are cached with an equal probability q Linearly more content is cached for larger files Cache constraint: T q l=1 N l F l = M with T = min(t, log K) R UB1 O(max l F l q ) F 1 suffers Achievable Scheme (UB) Let the caching probability be q l = F l /c Quadratically more content is cached for larger files Cache constraint: T T l=1 q l N l F l = M l=1 N l F l = cm R UB T Fl q l + K F T+1 l=1 Type T # of types * rate for each type 11

34 Two Achievable Schemes (UB1 vs UB) Achievable Scheme 1 (UB1) R UB1 O( F T 1 l=1 4M Nl F l Consider T = log K, N l+1 = 4N l Achievable Scheme (UB) ) R UB ( T + 1) l=1 T N l F l M 1

35 log(rate) Two Achievable Schemes (UB1 vs UB) Achievable Scheme 1 (UB1) R UB1 O( F T 1 l=1 4M Nl F l Achievable Scheme (UB) ) R UB ( T + 1) T l=1 N l F l M Consider T = log K, N l+1 = 4N l R UB1 K N 1F 1 8M R UB ( T + 1) T N 1F 1 M UB1 UB1 K/(log K) UB UB Number of types 1

36 log(rate) Two Achievable Schemes (UB1 vs UB) Achievable Scheme 1 (UB1) R UB1 O( F T 1 l=1 4M Nl F l Achievable Scheme (UB) ) R UB ( T + 1) T l=1 N l F l M Consider T = log K, N l+1 = 4N l R UB1 K N 1F 1 8M R UB ( T + 1) T N 1F 1 M Critical to cache quadratically more content for larger files! UB1 UB1 K/(log K) UB UB Number of types 1

37 Lower Bound: Uniform File-size NF/(M) users 1 NF/(M) M/F Request patterns N Files In order to serve all request patterns, we must have [Maddah-Ali & Niesen `14] M F R F + NF M M NF R F NF 4M = F 4q 13

38 Lower Bound: First Try L users l Φ N l L Request patterns l Φ N l Files of types in Φ In order to serve all request patterns, we must have l Φ N l R F + L M N L l F l Maximizing over L and Φ l Φ R l Φ N l F l F max Φ 4M l Φ N l (LB1) 14

39 log(rate) LB1 vs UB Lower Bound 1 (LB1) Achievable Bound (UB) Consider N l+1 = 4N l R LB1 N 1F 1 M R UB = ( T + 1) l=1 T N l F l M UB1 UB (log K) LB1 Number of types 15

40 log(rate) LB1 vs UB Lower Bound 1 (LB1) Achievable Bound (UB) Consider N l+1 = 4N l R LB1 N 1F 1 M R UB = ( T + 1) l=1 T N l F l M UB1 LB1 fails to account for heterogeneous caching probabilities! UB (log K) LB1 Number of types 15

41 log(rate) An Improved Lower Bound (LB) Proposition 1: Under Assumption 1: M F 1 and N lf l M are integers for all 1 l T Assumption : We must have T l=1 N l F l M K R F (LB) T Nl F l l=1 4M UB1 UB log K Compared with UB: R UB = ( T + 1) l=1 T N l F l M Number of types LB LB1 16

42 Intuition for LB (Two types: F = F 1 /) R T N F l F l l=1 4M =N 1F 1 4M +N F 4M (LB) s 1 = N 1F 1 M users (U 1 ) s = N F M users (U ) 17

43 Intuition for LB (Two types: F = F 1 /) R T N F l F l l=1 4M =N 1F 1 4M +N F 4M (LB) s 1 = N 1F 1 M users (U 1 ) s = N F M users (U ) patterns N 1 files of type 1 (F 1 ) 17

44 Intuition for LB (Two types: F = F 1 /) R T N F l F l l=1 4M =N 1F 1 4M +N F 4M (LB) s 1 = N 1F 1 M users (U 1 ) s = N F M users (U ) patterns N 1 files of type 1 (F 1 ) R F N 1F 1 4M 17

45 Intuition for LB (Two types: F = F 1 /) R T N F l F l l=1 4M =N 1F 1 4M +N F 4M (LB) s 1 = N 1F 1 M users (U 1 ) s = N F M users (U ) patterns N 1 files of type 1 (F 1 ) F 1 17

46 Intuition for LB (Two types: F = F 1 /) R T N F l F l l=1 4M =N 1F 1 4M +N F 4M (LB) s 1 = N 1F 1 M users (U 1 ) s = N F M users (U ) patterns N 1 files of type 1 (F 1 ) F 1 patterns N 1 files of type 1 (F 1 ) 17

47 Intuition for LB (Two types: F = F 1 /) R T N F l F l l=1 4M =N 1F 1 4M +N F 4M (LB) s 1 = N 1F 1 M users (U 1 ) s = N F M users (U ) patterns N 1 files of type 1 (F 1 ) F 1 patterns N 1 files of type 1 (F 1 ) F 17

48 Intuition for LB (Two types: F = F 1 /) R T N F l F l l=1 4M =N 1F 1 4M +N F 4M (LB) s 1 = N 1F 1 M users (U 1 ) s = N F M users (U ) patterns patterns N 1 files of type 1 (F 1 ) N 1 files of type 1 (F 1 ) F 1 N files of type (F ) F 17

49 Proof: (Two types: F = F 1 /) s 1 = N 1F 1, s M = N F M H M 1 = 0.5H F 1 = N 1F 1 H M = 0.5H F = N F H R D1, M 1 = H(R D1, M 1 F 1 ) + I R D1, M 1 ; F 1 18

50 Proof: (Two types: F = F 1 /) s 1 = N 1F 1, s M = N F M H M 1 = 0.5H F 1 = N 1F 1 H M = 0.5H F = N F H R D1, M 1 = H(R D1, M 1 F 1 ) + I R D1, M 1 ; F 1 0.5H(F 1 ) H(F 1 ) 18

51 Proof: (Two types: F = F 1 /) s 1 = N 1F 1, s M = N F M H M 1 = 0.5H F 1 = N 1F 1 H M = 0.5H F = N F H R D1, M 1 = H(R D1, M 1 F 1 ) + I R D1, M 1 ; F 1 0.5H(F 1 ) H(F 1 ) H R D1 H(R D1, M 1 F 1 ) + 0.5H(F 1 ) 18

52 Proof: (Two types: F = F 1 /) s 1 = N 1F 1, s M = N F M H M 1 = 0.5H F 1 = N 1F 1 H M = 0.5H F = N F H R D1, M 1 = H(R D1, M 1 F 1 ) + I R D1, M 1 ; F 1 0.5H(F 1 ) H(F 1 ) H R D1 H(R D1, M 1 F 1 ) + 0.5H(F 1 ) H R D H(R D, M 1 F 1 ) + 0.5H(F 1 ) 18

53 Proof: (Two types: F = F 1 /) s 1 = N 1F 1, s M = N F M H M 1 = 0.5H F 1 = N 1F 1 H M = 0.5H F = N F H R D1, M 1 = H(R D1, M 1 F 1 ) + I R D1, M 1 ; F 1 0.5H(F 1 ) H(F 1 ) H R D1 H(R D1, M 1 F 1 ) + 0.5H(F 1 ) H R D H(R D, M 1 F 1 ) + 0.5H(F 1 ) H(M ) H R D1 + H R D H F 0.5H(F ) +H(F 1 ) 18

54 Proof: (T>=3) 4N 1 s 1 R F 4I R D1 ; F N 1F 1 I R D1 R D ; F F 1 N F + I R D1 R D R D3 R D4 ; F 3 F 1, F N 3 F 3 19

55 Without Assumptions 1 & Intuition Memory sharing argument Assume there exists a lower bound R File Size R R A user s storage Effective Cache T 1 M = M N l (F l R) M l=1 Group 1 F l R Cache F l R portion Group (can be empty) F l < R, F l > M Each user requests 1 file Group 3 F l M Using previous results T 1 T 3 T T 4 File Type 0

56 Comparisons With Assumptions 1 & 1

57 Comparisons With Assumptions 1 & General Result (without Assumptions 1 and ): R UB (3log K + )R LB 1

58 Conclusion and Discussions Heterogeneous file-sizes Quadratically more content is cached for larger files We show logarithmic-factor gap While the new achievable schemes are quite intuitive, the corresponding lower bounds more involved and reveal useful insights Future Work: A tighter lower-bound? New techniques in the achievable scheme? Remove the logarithmic factor Sharper insights into the general lower bound

59 Thank you!

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Joint work with Jinbei Zhang (SJTU), Chih-Chun Wang (Purdue) and Xinbing Wang (SJTU)

More information

Coded Caching under Arbitrary Popularity Distributions

Coded Caching under Arbitrary Popularity Distributions Coded Caching under Arbitrary Popularity Distributions Jinbei Zhang, Xiaojun Lin, Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University, China School of Electrical and Computer Engineering,

More information

Coded Caching with Low Subpacketization Levels

Coded Caching with Low Subpacketization Levels Electrical and Computer Engineering Conference Papers, Posters and Presentations Electrical and Computer Engineering 06 Coded Caching with Low Subpacetization Levels Li Tang Iowa State University, litang@iastateedu

More information

Fundamental Limits on Latency in Small-Cell Caching Systems: An Information-Theoretic Analysis

Fundamental Limits on Latency in Small-Cell Caching Systems: An Information-Theoretic Analysis Fundamental Limits on Latency in Small-ell aching Systems: An Information-Theoretic Analysis Seyyed Mohammadreza Azimi, Osvaldo Simeone, and Ravi Tandon Abstract aching of popular multimedia content at

More information

Content Caching and Delivery over Heterogeneous Wireless Networks

Content Caching and Delivery over Heterogeneous Wireless Networks Content Caching and Delivery over Heterogeneous Wireless Networks Jad Hachem University of California, Los Angeles Email: jadhachem@uclaedu khil Karamchandani Indian Institute of Technology, Bombay Email:

More information

Coded Caching for Multi-level Popularity and Access

Coded Caching for Multi-level Popularity and Access Coded Caching for Multi-level Popularity and Access Jad Hachem, Student Member, IEEE, Nikhil Karamchandani, Member, IEEE, and Suhas Diggavi, Fellow, IEEE Abstract arxiv:4046563v2 [csit] 3 Dec 205 To address

More information

Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching

Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching entropy Article Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching Chao Tian Department of Electrical and Computer Engineering, Texas A&M

More information

Cache-Enabled Broadcast Packet Erasure Channels with State Feedback

Cache-Enabled Broadcast Packet Erasure Channels with State Feedback Cache-Enabled Broadcast Pacet Erasure Channels with State Feedbac Asma Ghorbel, Mari Kobayashi, Sheng Yang To cite this version: Asma Ghorbel, Mari Kobayashi, Sheng Yang. Cache-Enabled Broadcast Pacet

More information

On Coded Caching with Correlated Files

On Coded Caching with Correlated Files On Coded Caching with Correlated Files Kai Wan, Daniela Tuninetti, Mingyue Ji, Giuseppe Care, Technische Universität Berlin, Berlin, Germany, {kai.wan, caire}@tu-berlin.de University of Illinois at Chicago,

More information

Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes

Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes Jingjing Zhang and Osvaldo Simeone arxiv:72.04266v4 [cs.it] 2 Mar 208 Abstract In fog-aided cellular systems,

More information

Cloud and Cache-Aided Wireless Networks: Fundamental Latency Trade-Offs

Cloud and Cache-Aided Wireless Networks: Fundamental Latency Trade-Offs Cloud and Cache-Aided Wireless Networks: Fundamental Latency Trade-Offs Avik Sengupta, Student Member, IEEE, Ravi Tandon, Member, IEEE, Osvaldo Simeone, Fellow, IEEE Abstract A cloud and cache-aided wireless

More information

Optimal Geographical Caching in Heterogeneous Cellular Networks

Optimal Geographical Caching in Heterogeneous Cellular Networks 1 Optimal Geographical Caching in Heterogeneous Cellular Networks Berksan Serbetci, and Jasper Goseling arxiv:1710.09626v2 [cs.ni] 22 Nov 2018 Abstract We investigate optimal geographical caching in heterogeneous

More information

Alpha Fair Coded Caching

Alpha Fair Coded Caching Alpha Fair Coded Caching Apostolos Destounis 1, Mari Kobayashi 2, Georgios Paschos 1, Asma Ghorbel 2 1 France Research Center, Huawei Technologies Co. Ltd., email: firstname.lastname@huawei.com 2 Centrale-Supélec,

More information

Coded Caching for Files with Distinct File Sizes

Coded Caching for Files with Distinct File Sizes Coded Caching for Fies with Distinct Fie Sizes Jinbei Zhang iaojun Lin Chih-Chun Wang inbing Wang Department of Eectronic Engineering Shanghai Jiao ong University China Schoo of Eectrica and Computer Engineering

More information

On Allocating Cache Resources to Content Providers

On Allocating Cache Resources to Content Providers On Allocating Cache Resources to Content Providers Weibo Chu, Mostafa Dehghan, Don Towsley, Zhi-Li Zhang wbchu@nwpu.edu.cn Northwestern Polytechnical University Why Resource Allocation in ICN? Resource

More information

Analysis and Optimization of Caching and Multicasting for Multi-Quality Videos in Large-Scale Wireless Networks

Analysis and Optimization of Caching and Multicasting for Multi-Quality Videos in Large-Scale Wireless Networks Analysis and Optimization of Caching and Multicasting for Multi-Quality Videos in Large-Scale Wireless Networks Dongdong Jiang, Student Member, IEEE and Ying Cui, Member, IEEE Abstract Efficient dissemination

More information

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage 1 Minimum Repair andwidth for Exact Regeneration in Distributed Storage Vivec R Cadambe, Syed A Jafar, Hamed Malei Electrical Engineering and Computer Science University of California Irvine, Irvine, California,

More information

Fundamental Limits on Delivery Time in Cloud- and Cache-Aided Heterogeneous Networks

Fundamental Limits on Delivery Time in Cloud- and Cache-Aided Heterogeneous Networks DRAFT Fundamental Limits on Delivery Time in Cloud- and Cache-Aided Heterogeneous Networks Jaber Kakar Member IEEE Soheil Gherekhloo Member IEEE arxiv:706.0767v [cs.it] 3 Jun 07 and Aydin Sezgin Senior

More information

How to Optimally Allocate Resources for Coded Distributed Computing?

How to Optimally Allocate Resources for Coded Distributed Computing? 1 How to Optimally Allocate Resources for Coded Distributed Computing? Qian Yu, Songze Li, Mohammad Ali Maddah-Ali, and A. Salman Avestimehr Department of Electrical Engineering, University of Southern

More information

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel /33 Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel Presented by Paul de Kerret Joint work with Antonio Bazco, Nicolas Gresset, and David Gesbert ESIT 2017 in Madrid,

More information

A Novel Index Coding Scheme and its Application to Coded Caching

A Novel Index Coding Scheme and its Application to Coded Caching A ovel Index Coding Scheme and its Application to Coded Caching ai Wan Laboratoire des Signaux et Systèmes L2S CentraleSupèlec-CRS-Universitè Paris-Sud 91192 Gif-sur-Yvette, France Email: kai.wan@u-psud.fr

More information

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Viveck R Cadambe, Syed A Jafar, Hamed Maleki Electrical Engineering and

More information

On the Worst-case Communication Overhead for Distributed Data Shuffling

On the Worst-case Communication Overhead for Distributed Data Shuffling On the Worst-case Communication Overhead for Distributed Data Shuffling Mohamed Adel Attia Ravi Tandon Department of Electrical and Computer Engineering University of Arizona, Tucson, AZ 85721 E-mail:{madel,

More information

On Two Class-Constrained Versions of the Multiple Knapsack Problem

On Two Class-Constrained Versions of the Multiple Knapsack Problem On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic

More information

Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks

Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks 1 Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks Bo Zhou, Ying Cui, Member, IEEE, and Meixia Tao, Senior Member, IEEE Abstract Caching at small base stations

More information

Channel Dependent Adaptive Modulation and Coding Without Channel State Information at the Transmitter

Channel Dependent Adaptive Modulation and Coding Without Channel State Information at the Transmitter Channel Dependent Adaptive Modulation and Coding Without Channel State Information at the Transmitter Bradford D. Boyle, John MacLaren Walsh, and Steven Weber Modeling & Analysis of Networks Laboratory

More information

A Polynomial-Time Algorithm for Pliable Index Coding

A Polynomial-Time Algorithm for Pliable Index Coding 1 A Polynomial-Time Algorithm for Pliable Index Coding Linqi Song and Christina Fragouli arxiv:1610.06845v [cs.it] 9 Aug 017 Abstract In pliable index coding, we consider a server with m messages and n

More information

ECE Information theory Final (Fall 2008)

ECE Information theory Final (Fall 2008) ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1

More information

Joint and Competitive Caching Designs in Large-Scale Multi-Tier Wireless Multicasting Networks

Joint and Competitive Caching Designs in Large-Scale Multi-Tier Wireless Multicasting Networks Joint and Competitive Caching Designs in Large-Scale Multi-Tier Wireless Multicasting Networks Zitian Wang, Zhehan Cao, Ying Cui Shanghai Jiao Tong University, China Yang Yang Intel Deutschland GmbH, Germany

More information

Fundamental Tradeoff between Computation and Communication in Distributed Computing

Fundamental Tradeoff between Computation and Communication in Distributed Computing Fundamental Tradeoff between Computation and Communication in Distributed Computing Songze Li, Mohammad Ali Maddah-Ali, and A. Salman Avestimehr Department of Electrical Engineering, University of Southern

More information

Index coding with side information

Index coding with side information Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated

More information

Exploiting Mobility in Cache-Assisted D2D Networks: Performance Analysis and Optimization

Exploiting Mobility in Cache-Assisted D2D Networks: Performance Analysis and Optimization 1 Exploiting Mobility in Cache-Assisted D2D Networks: Performance Analysis and Optimization Rui Wang, Jun Zhang, Senior Member, IEEE, S.H. Song, Member, IEEE, and arxiv:1806.04069v1 [cs.it] 11 Jun 2018

More information

Copyright Warning & Restrictions

Copyright Warning & Restrictions Copyright Warning & Restrictions The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions

More information

Cache Aided Wireless Networks: Tradeoffs between Storage and Latency

Cache Aided Wireless Networks: Tradeoffs between Storage and Latency Cache Aided Wireless Networks: radeoffs between Storage and Latency Avik Sengupta ume Center, Department of ECE Virginia ech, Blacksburg, VA 24060, USA Email: aviksg@vt.edu Ravi andon Department of ECE

More information

PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS. Pratik Patil, Binbin Dai, and Wei Yu

PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS. Pratik Patil, Binbin Dai, and Wei Yu PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS Pratik Patil, Binbin Dai, and Wei Yu Department of Electrical and Computer Engineering University of Toronto,

More information

2014 IEEE International Symposium on Information Theory. Two-unicast is hard. David N.C. Tse

2014 IEEE International Symposium on Information Theory. Two-unicast is hard. David N.C. Tse Two-unicast is hard Sudeep Kamath ECE Department, University of California, San Diego, CA, USA sukamath@ucsd.edu David N.C. Tse EECS Department, University of California, Berkeley, CA, USA dtse@eecs.berkeley.edu

More information

CS 310 Advanced Data Structures and Algorithms

CS 310 Advanced Data Structures and Algorithms CS 310 Advanced Data Structures and Algorithms Runtime Analysis May 31, 2017 Tong Wang UMass Boston CS 310 May 31, 2017 1 / 37 Topics Weiss chapter 5 What is algorithm analysis Big O, big, big notations

More information

Cache-Enabled Heterogeneous Cellular Networks: Optimal Tier- Level Content Placement. Title. Wen, W; Huang, K; Yang, S.; Li, VOK

Cache-Enabled Heterogeneous Cellular Networks: Optimal Tier- Level Content Placement. Title. Wen, W; Huang, K; Yang, S.; Li, VOK Title Cache-Enabled Heterogeneous Cellular Networks: Optimal Tier- Level Content Placement Author(s) Wen, W; Huang, K; Yang, S.; Li, VOK Citation IEEE Transactions on Wireless Communications, 2017, v.

More information

P e = 0.1. P e = 0.01

P e = 0.1. P e = 0.01 23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function

More information

On the Properties of a Tree-Structured Server Process

On the Properties of a Tree-Structured Server Process On the Properties of a Tree-Structured Server Process J. Komlos Rutgers University A. Odlyzko L. Ozarow L. A. Shepp AT&T Bell Laboratories Murray Hill, New Jersey 07974 I. INTRODUCTION In this paper we

More information

Generalized Degrees-of-Freedom of the 2-User Case MISO Broadcast Channel with Distributed CSIT

Generalized Degrees-of-Freedom of the 2-User Case MISO Broadcast Channel with Distributed CSIT 207 IEEE IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, June 207 DOI: 009/ECCE2078096480 Generalized Degrees-of-Freedom of the 2-User Case MISO Broadcast Channel with Distributed

More information

On the Fundamental Limits of Coded Data Shuffling for Distributed Learning Systems

On the Fundamental Limits of Coded Data Shuffling for Distributed Learning Systems 1 On the undamental Limits of oded Data Shuffling for Distributed Learning Systems del lmahdy, and Soheil Mohajer Department of lectrical and omputer ngineering, University of Minnesota, Minneapolis, MN,

More information

Inter-Session Network Coding Schemes for 1-to-2 Downlink Access-Point Networks with Sequential Hard Deadline Constraints

Inter-Session Network Coding Schemes for 1-to-2 Downlink Access-Point Networks with Sequential Hard Deadline Constraints Inter-Session Network Coding Schemes for -to- Downlink Access-Point Networks with Sequential Hard Deadline Constraints Xiaohang Li, Chih-Chun Wang, and Xiaojun Lin Center for Wireless Systems and Applications,

More information

Quadratic Interval Refinement

Quadratic Interval Refinement (QIR) Analysis of Seminar on Computational Geometry and Geometric Computing Outline Introduction (QIR) Analysis of 1 Introduction in Short Main Goal of this Work 2 3 (QIR) Bisection Method Algorithm 4

More information

Index Coding & Caching in Wireless Networks. Salim El Rouayheb. ECE IIT, Chicago

Index Coding & Caching in Wireless Networks. Salim El Rouayheb. ECE IIT, Chicago Index Coding & Caching in Wireless Networks Salim El Rouayheb ECE IIT, Chicago Big Data vs. Wireless Exabytes per month [Cisco] Meanwhile, Storage is Getting Cheaper Storage cost per GB (USD) http://www.mkomo.com/cost-per-gigabyte-update

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

Upper Bounds on the Capacity of Binary Intermittent Communication

Upper Bounds on the Capacity of Binary Intermittent Communication Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,

More information

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps 2012 IEEE International Symposium on Information Theory Proceedings Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps Yeow Meng Chee and Punarbasu Purkayastha Division of Mathematical

More information

Energy-Efficient Broadcast Scheduling. Speed-Controlled Transmission Channels

Energy-Efficient Broadcast Scheduling. Speed-Controlled Transmission Channels for Speed-Controlled Transmission Channels Joint work with Christian Gunia from Freiburg University in ISAAC 06. 25.10.07 Outline Problem Definition and Motivation 1 Problem Definition and Motivation 2

More information

A New SLNR-based Linear Precoding for. Downlink Multi-User Multi-Stream MIMO Systems

A New SLNR-based Linear Precoding for. Downlink Multi-User Multi-Stream MIMO Systems A New SLNR-based Linear Precoding for 1 Downlin Multi-User Multi-Stream MIMO Systems arxiv:1008.0730v1 [cs.it] 4 Aug 2010 Peng Cheng, Meixia Tao and Wenjun Zhang Abstract Signal-to-leaage-and-noise ratio

More information

Interference Channels with Source Cooperation

Interference Channels with Source Cooperation Interference Channels with Source Cooperation arxiv:95.319v1 [cs.it] 19 May 29 Vinod Prabhakaran and Pramod Viswanath Coordinated Science Laboratory University of Illinois, Urbana-Champaign Urbana, IL

More information

Simplified Composite Coding for Index Coding

Simplified Composite Coding for Index Coding Simplified Composite Coding for Index Coding Yucheng Liu, Parastoo Sadeghi Research School of Engineering Australian National University {yucheng.liu, parastoo.sadeghi}@anu.edu.au Fatemeh Arbabjolfaei,

More information

arxiv: v1 [cs.it] 23 Jan 2019

arxiv: v1 [cs.it] 23 Jan 2019 Single-Server Single-Message Online Private Information Retrieval with Side Information Fatemeh azemi, Esmaeil arimi, Anoosheh Heidarzadeh, and Alex Sprintson arxiv:90.07748v [cs.it] 3 Jan 09 Abstract

More information

Computer Arithmetic. MATH 375 Numerical Analysis. J. Robert Buchanan. Fall Department of Mathematics. J. Robert Buchanan Computer Arithmetic

Computer Arithmetic. MATH 375 Numerical Analysis. J. Robert Buchanan. Fall Department of Mathematics. J. Robert Buchanan Computer Arithmetic Computer Arithmetic MATH 375 Numerical Analysis J. Robert Buchanan Department of Mathematics Fall 2013 Machine Numbers When performing arithmetic on a computer (laptop, desktop, mainframe, cell phone,

More information

On Common Information and the Encoding of Sources that are Not Successively Refinable

On Common Information and the Encoding of Sources that are Not Successively Refinable On Common Information and the Encoding of Sources that are Not Successively Refinable Kumar Viswanatha, Emrah Akyol, Tejaswi Nanjundaswamy and Kenneth Rose ECE Department, University of California - Santa

More information

Technion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling

Technion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling On Centralized Smooth Scheduling Ami Litman January 25, 2005 Abstract Shiri Moran-Schein This paper studies evenly distributed sets of natural numbers and their applications to scheduling in a centralized

More information

Sparse and low-rank decomposition for big data systems via smoothed Riemannian optimization

Sparse and low-rank decomposition for big data systems via smoothed Riemannian optimization Sparse and low-rank decomposition for big data systems via smoothed Riemannian optimization Yuanming Shi ShanghaiTech University, Shanghai, China shiym@shanghaitech.edu.cn Bamdev Mishra Amazon Development

More information

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS The 8th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 7) STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS Ka-Hung

More information

Optimal Resource Allocation for Multi-User MEC with Arbitrary Task Arrival Times and Deadlines

Optimal Resource Allocation for Multi-User MEC with Arbitrary Task Arrival Times and Deadlines Optimal Resource Allocation for Multi-User MEC with Arbitrary Task Arrival Times and Deadlines Xinyun Wang, Ying Cui, Zhi Liu, Junfeng Guo, Mingyu Yang Abstract In this paper, we would like to investigate

More information

Centralized Coded Caching of Correlated Contents

Centralized Coded Caching of Correlated Contents Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv:1711.03798v1

More information

Paging with Multiple Caches

Paging with Multiple Caches Paging with Multiple Caches Rahul Vaze School of Technology and Computer Science Tata Institute of Fundamental Research Email: vaze@tcs.tifr.res.in Sharayu Moharir Department of Electrical Engineering

More information

Single Frame Rate-Quantization Model for MPEG-4 AVC/H.264 Video Encoders

Single Frame Rate-Quantization Model for MPEG-4 AVC/H.264 Video Encoders Single Frame Rate-Quantization Model for MPEG-4 AVC/H.264 Video Encoders Tomasz Grajek and Marek Domański Poznan University of Technology Chair of Multimedia Telecommunications and Microelectronics ul.

More information

Pinning Control and Controllability of Complex Networks

Pinning Control and Controllability of Complex Networks Pinning Control and Controllability of Complex Networks Guanrong (Ron) Chen City University of Hong Kong, China Joint work with Xiaofan Wang, Lin Wang Shanghai Jiao Tong University, China Xiang Li, Baoyu

More information

Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing

Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing Junfeng Guo, Zhaozhe Song, Ying Cui Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, P. R. China

More information

Achieving Spatial Scalability for Coded. Caching over Wireless Networks

Achieving Spatial Scalability for Coded. Caching over Wireless Networks Achieving Spatial Scalability for Coded 1 Caching over Wireless Networks Mozhgan Bayat, Ratheesh K. Mungara, and Giuseppe Caire arxiv:183.572v1 [cs.it] 15 Mar 218 Abstract The coded caching scheme proposed

More information

Coding for a Non-symmetric Ternary Channel

Coding for a Non-symmetric Ternary Channel Coding for a Non-symmetric Ternary Channel Nicolas Bitouzé and Alexandre Graell i Amat Department of Electronics, Institut TELECOM-TELECOM Bretagne, 938 Brest, France Email: nicolas.bitouze@telecom-bretagne.eu,

More information

Lecture 2: Paging and AdWords

Lecture 2: Paging and AdWords Algoritmos e Incerteza (PUC-Rio INF2979, 2017.1) Lecture 2: Paging and AdWords March 20 2017 Lecturer: Marco Molinaro Scribe: Gabriel Homsi In this class we had a brief recap of the Ski Rental Problem

More information

The Poisson Channel with Side Information

The Poisson Channel with Side Information The Poisson Channel with Side Information Shraga Bross School of Enginerring Bar-Ilan University, Israel brosss@macs.biu.ac.il Amos Lapidoth Ligong Wang Signal and Information Processing Laboratory ETH

More information

15-451/651: Design & Analysis of Algorithms September 13, 2018 Lecture #6: Streaming Algorithms last changed: August 30, 2018

15-451/651: Design & Analysis of Algorithms September 13, 2018 Lecture #6: Streaming Algorithms last changed: August 30, 2018 15-451/651: Design & Analysis of Algorithms September 13, 2018 Lecture #6: Streaming Algorithms last changed: August 30, 2018 Today we ll talk about a topic that is both very old (as far as computer science

More information

Joint Optimization of Cloud and Edge Processing for Fog Radio Access Networks

Joint Optimization of Cloud and Edge Processing for Fog Radio Access Networks Joint Optimization of Cloud and Edge Processing for Fog Radio Access Networks Seok-Hwan Park 1, Osvaldo Simeone 2 and Shlomo Shamai (Shitz) 3 1 Division of Electronic Engineering, Chonbuk National University,

More information

Resource Allocation for Video Streaming in Wireless Environment

Resource Allocation for Video Streaming in Wireless Environment Resource Allocation for Video Streaming in Wireless Environment Shahrokh Valaee and Jean-Charles Gregoire Abstract This paper focuses on the development of a new resource allocation scheme for video streaming

More information

Optimal matching in wireless sensor networks

Optimal matching in wireless sensor networks Optimal matching in wireless sensor networks A. Roumy, D. Gesbert INRIA-IRISA, Rennes, France. Institute Eurecom, Sophia Antipolis, France. Abstract We investigate the design of a wireless sensor network

More information

Computing and Communications 2. Information Theory -Entropy

Computing and Communications 2. Information Theory -Entropy 1896 1920 1987 2006 Computing and Communications 2. Information Theory -Entropy Ying Cui Department of Electronic Engineering Shanghai Jiao Tong University, China 2017, Autumn 1 Outline Entropy Joint entropy

More information

Algorithms and Their Complexity

Algorithms and Their Complexity CSCE 222 Discrete Structures for Computing David Kebo Houngninou Algorithms and Their Complexity Chapter 3 Algorithm An algorithm is a finite sequence of steps that solves a problem. Computational complexity

More information

STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING

STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING Applied Probability Trust (7 May 2015) STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING RAMTIN PEDARSANI and JEAN WALRAND, University of California,

More information

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding Tim Roughgarden October 29, 2014 1 Preamble This lecture covers our final subtopic within the exact and approximate recovery part of the course.

More information

Simplification of Network Dynamics in Large Systems

Simplification of Network Dynamics in Large Systems Simplification of Network Dynamics in Large Systems Xiaojun Lin and Ness B. Shroff Abstract In this paper we show that significant simplicity can be exploited for pricing-based control of large networks.

More information

Gibbsian On-Line Distributed Content Caching Strategy for Cellular Networks

Gibbsian On-Line Distributed Content Caching Strategy for Cellular Networks Gibbsian On-Line Distributed Content Caching Strategy for Cellular Networks Arpan Chattopadhyay, Bartłomiej Błaszczyszyn, H. Paul Keeler arxiv:1610.02318v2 [cs.ni] 6 Nov 2017 Abstract In this paper, we

More information

Clinic Scheduling Models with Overbooking for Patients with Heterogeneous No-show Probabilities

Clinic Scheduling Models with Overbooking for Patients with Heterogeneous No-show Probabilities 1 2 3 4 5 6 7 8 9 Clinic Scheduling Models with Overbooking for Patients with Heterogeneous No-show Probabilities Bo Zeng, Ji Lin and Mark Lawley email: {bzeng, lin35, malawley}@purdue.edu Weldon School

More information

On the Energy-Distortion Tradeoff of Gaussian Broadcast Channels with Feedback

On the Energy-Distortion Tradeoff of Gaussian Broadcast Channels with Feedback On the Energy-Distortion Tradeoff of Gaussian Broadcast Channels with Feedback Yonathan Murin, Yonatan Kaspi, Ron Dabora 3, and Deniz Gündüz 4 Stanford University, USA, University of California, San Diego,

More information

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,

More information

The Applicability of Adaptive Control Theory to QoS Design: Limitations and Solutions

The Applicability of Adaptive Control Theory to QoS Design: Limitations and Solutions The Applicability of Adaptive Control Theory to QoS Design: Limitations and Solutions Keqiang Wu David J. Lilja Haowei Bai Electrical and Computer Engineering University of Minnesota Minneapolis, MN 55455,

More information

Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems

Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems Behrouz Khoshnevis and Wei Yu Department of Electrical and Computer Engineering University of Toronto, Toronto, Ontario,

More information

Revenue Maximization in a Cloud Federation

Revenue Maximization in a Cloud Federation Revenue Maximization in a Cloud Federation Makhlouf Hadji and Djamal Zeghlache September 14th, 2015 IRT SystemX/ Telecom SudParis Makhlouf Hadji Outline of the presentation 01 Introduction 02 03 04 05

More information

Caching with Time Domain Buffer Sharing

Caching with Time Domain Buffer Sharing SUBMITTED PAPER 1 Caching with Time Domain Buffer Sharing Wei Chen, Senior Member, IEEE, and H. Vincent Poor, Fellow, IEEE arxiv:1804.02797v1 [cs.it] 9 Apr 2018 Abstract In this paper, storage efficient

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

A Generic Bound on Cycles in Two-Player Games

A Generic Bound on Cycles in Two-Player Games A Generic Bound on Cycles in Two-Player Games David S. Ahn February 006 Abstract We provide a bound on the size of simultaneous best response cycles for generic finite two-player games. The bound shows

More information

Impact of traffic mix on caching performance

Impact of traffic mix on caching performance Impact of traffic mix on caching performance Jim Roberts, INRIA/RAP joint work with Christine Fricker, Philippe Robert, Nada Sbihi BCAM, 27 June 2012 A content-centric future Internet most Internet traffic

More information

IS 709/809: Computational Methods in IS Research Fall Exam Review

IS 709/809: Computational Methods in IS Research Fall Exam Review IS 709/809: Computational Methods in IS Research Fall 2017 Exam Review Nirmalya Roy Department of Information Systems University of Maryland Baltimore County www.umbc.edu Exam When: Tuesday (11/28) 7:10pm

More information

Accurate Fourier Analysis for Circuit Simulators

Accurate Fourier Analysis for Circuit Simulators Accurate Fourier Analysis for Circuit Simulators Kenneth S. Kundert Cadence Design Systems (Based on Presentation to CICC 94) Abstract A new approach to Fourier analysis within the context of circuit simulation

More information

Energy Harvesting Communications with Batteries having Cycle Constraints

Energy Harvesting Communications with Batteries having Cycle Constraints 1 Energy Harvesting Communications with Batteries having Cycle Constraints Rajshekhar Vishweshwar Bhat, Graduate Student Member, IEEE, Mehul Motani, Fellow, IEEE, Chandra R Murthy, Senior Member, IEEE,

More information

Cache me if you can Capacitated Selfish Replica0on Games

Cache me if you can Capacitated Selfish Replica0on Games Cache me if you can Capacitated Selfish Replica0on Games Dimitrios Kanoulas R. Rajaraman, R. Sundaram R. Gopalakrishnan, N. Karuturi, C. P. Rangan LATIN 12, CCIS Department, Northeastern University Capacitated

More information

Concatenated Coding Using Linear Schemes for Gaussian Broadcast Channels with Noisy Channel Output Feedback

Concatenated Coding Using Linear Schemes for Gaussian Broadcast Channels with Noisy Channel Output Feedback IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. XX, NO. Y, MONTH 204 Concatenated Coding Using Linear Schemes for Gaussian Broadcast Channels with Noisy Channel Output Feedback Ziad Ahmad, Student Member, IEEE,

More information

UNIQUE RANGE SETS FOR MEROMORPHIC FUNCTIONS CONSTRUCTED WITHOUT AN INJECTIVITY HYPOTHESIS

UNIQUE RANGE SETS FOR MEROMORPHIC FUNCTIONS CONSTRUCTED WITHOUT AN INJECTIVITY HYPOTHESIS UNIQUE RANGE SETS FOR MEROMORPHIC FUNCTIONS CONSTRUCTED WITHOUT AN INJECTIVITY HYPOTHESIS TA THI HOAI AN Abstract. A set is called a unique range set (counting multiplicities) for a particular family of

More information

(Structured) Coding for Real-Time Streaming Communication

(Structured) Coding for Real-Time Streaming Communication (Structured) Coding for Real-Time Streaming Communication Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Joint work with: Ahmed Badr (Toronto), Farrokh Etezadi (Toronto),

More information

Cache Placement in Two-Tier HetNets with Limited Storage Capacity: Cache or Buffer?

Cache Placement in Two-Tier HetNets with Limited Storage Capacity: Cache or Buffer? Cache Placement in Two-Tier HetNets with Limited Storage Capacity: Cache or Buffer? Zhaohui Yang, Cunhua Pan, Yijin Pan, Yongpeng Wu, Senior Member, IEEE, Wei Xu, Senior Member, IEEE, Mohammad Shikh-Bahaei,

More information

Real-Time Course. Clock synchronization. June Peter van der TU/e Computer Science, System Architecture and Networking

Real-Time Course. Clock synchronization. June Peter van der TU/e Computer Science, System Architecture and Networking Real-Time Course Clock synchronization 1 Clocks Processor p has monotonically increasing clock function C p (t) Clock has drift rate For t1 and t2, with t2 > t1 (1-ρ)(t2-t1)

More information

to be almost surely min{n 0, 3

to be almost surely min{n 0, 3 1 The DoF Region of the Three-Receiver MIMO Broadcast Channel with Side Information and Its Relation to Index Coding Capacity Behzad Asadi, Lawrence Ong, and Sarah J Johnson arxiv:160803377v1 [csit] 11

More information

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel Stefano Rini, Daniela Tuninetti, and Natasha Devroye Department

More information

A Systematic Description of Source Significance Information

A Systematic Description of Source Significance Information A Systematic Description of Source Significance Information Norbert Goertz Institute for Digital Communications School of Engineering and Electronics The University of Edinburgh Mayfield Rd., Edinburgh

More information