Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University

Size: px
Start display at page:

Download "Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University"

Transcription

1 Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Joint work with Jinbei Zhang (SJTU), Chih-Chun Wang (Purdue) and Xinbing Wang (SJTU)

2 The Importance of Caching Server cache cache cache User 1 User 2 User 3 Data traffic continues to grow at significant rates A major fraction (60-80%) of traffic will be generated by multimedia content, such as video Caching is important for reducing backhaul requirement in serving large volumes of content that multiple users are interested in 2

3 Traditional (Uncoded) Caching: Individual cache size needs to be large N=3 files (unit-size): A = (A 1, A 2, A 3 ) B = (B 1, B 2, B 3 ) C = (C 1, C 2, C 3 ) Back-haul Requirement: Uncoded Caching K 1 M N = 2 Individual caching gain K=3 users Cache size M=1 (A 1, B 1, C 1 ) Broadcast channel Server A 2, A 3 B 2, B 3 C 2, C 3 (A 1, B 1, C 1 ) (A 1, B 1, C 1 ) User 1 wants A User 2 wants B User 3 wants C 3

4 Coded Caching: Global Caching Gains N=3 files: A = (A 1, A 2, A 3 ) B = (B 1, B 2, B 3 ) C = (C 1, C 2, C 3 ) Back-haul Requirement: Uncoded Caching K 1 M N = 2 Coded Caching [1] K 1 M N KM N = 1 K=3 users Cache size M=1 Global caching gain A 2 B 1 A 3 C 1 B 3 C 2 (A 1, B 1, C 1 ) (A 2, B 2, C 2 ) (A 3, B 3, C 3 ) A 2 B 1 A 3 C 1 B 3 C 2 User 1 wants A Broadcast channel Server User 2 wants B [1] Fundamental Limits of Caching, M. Maddah-Ali and U. Niesen, IEEE Trans. Inf. Theory, User 3 wants C 4

5 Homogeneous vs Heterogeneous Settings [Maddah-Ali and Niesen 14] shows that the worst-case transmission rate K 1 M N 1 1+ KM N is at most a constant factor (12x) away from the (information-theoretic) minimum possible Generalized to Decentralized/probabilistic caching schemes [Maddah-Ali and Niesen `14] Hierarchical caching [Karamchandani et al `14 ] Online caching [Pedarsani et al `13] These studies assume a homogeneous setting where all files are equally important and are with the same parameters 5

6 Homogeneous vs Heterogeneous Settings In practice, heterogeneity arises naturally In homogeneous settings, all files are cached uniformly In heterogeneous settings: Should more popular files be cached more aggressively [Niesen and Maddah-Ali `14, Ji et al `14, Hachem et al `14]? Should larger files be cached more aggressively? 6

7 Our Contribution Coded caching needs to be adapted in different ways to different aspects of heterogeneity Heterogeneous popularity: Only files above a popularity threshold are cached However, all popular files are cached uniformly (similar to [Ji et al 14]) We show constant-factor bounds that are independent of the popularity distribution Heterogeneous file-sizes (Roughly) quadratically more content is cached for larger files We show logarithmic-factor bounds While the new achievable schemes are quite intuitive, the corresponding lower bounds are more involved and reveal useful insights 7

8 Outline Coded Caching under Arbitrary Popularity Distributions System Model Achievable Bounds and Intuitions Lower Bounds Coded Caching under Distinct File Sizes System Model Achievable Bounds and Intuitions Lower Bounds Conclusion and Discussions 8

9 Network Model: Heterogeneous Popularity Server with a broadcast channel K users: cache size M N (unit-size) files: F = F 1,, F N Popularity (decreasing): P = p 1,, p N Random request W i W i = f i1,, f ik, f ik F 2 File Request User 1 File 1 1 File Placement 2 User 2... Server File N File Transmission 2 File Request User K Rate for serving W i is r(w i ) Expected rate: N K R K, F, P = r(w i )P(W i ) i=1 9

10 Average-Case vs. Worst-Case Expected rate: Worst-case rate [Maddah-Ali and Niesen `14]: Obviously: N K i=1 N K i=1 r(w i )P(W i ) max r(w i) i=1,,n K r(w i )P W i max i=1,,n K r(w i) However, constant-factor results do NOT carry over from the worst case to the average case max r(w i) i=1,,n K max i=1,,n r (W i ) K c N K i=1 N K i=1 r(w i )P(W i ) r (W i )P(W i ) c 10

11 Related Work on the Average Case U. Niesen, and M.A. Maddah-Ali, Coded Caching with Nonuniform Demands, arxiv: v2 [cs.it], Mar Divide the files into groups The gap between the lower bound and the achievable (upper) bound increases with # of groups (unbounded) J. Hachem, N. Karamchandani and S. Diggavi, Multi-level Coded Caching, arxiv: [cs.it], Apr Popularity has multiple levels The gap increases with # of levels (unbounded) M. Ji, A. Tulino, J. Llorca and G. Caire, On the Average Performance of Caching and Coded Multicasting with Random Demands, arxiv: v2 [cs.it], Jul Zipf popularity distribution p i 1 i α The gap increases with 1 α 1 when α > 1 (unbounded) 11

12 Our Main Results Constant-factor gap between the lower bound (R lb ) and the achievable (upper) bound (R ub ) of the expected backhual transmission rate: R ub 87R lb +2 The achievable bound (R ub ) is attained by a simple coded caching scheme similar to [Ji et al 14] Perform coded caching only among the most popular N 1 files However, all N 1 popular files are treated uniformly 1 KM Popularity The key step is to show a matching lower bound N 1 Arbitrary Popularity Distribution! File Index 12

13 Main Intuition: An Insensitivity Property The best worst-case rate for serving N files can be achieved by uniform caching [Maddah-Ali and Niesen 14] N M N M 1 Uncoded caching Coded caching M 1 N M N K (1 ) (1 ) 1 N KM 1 M N M N whenever K >> N/M Key Insight: Beyond K=N/M, the above rate is independent of the number of users K Due to its global caching gain, coded caching significantly reduce the threshold for this insensitivity to arise N M N K 13

14 Main Intuition: Average Case Consider the following scheme: Only perform coded caching among most popular files 1 to N 1 The average transmission rate for the popular files will be upperbounded by the worst-case rate: M 1 N1 M N1 K ' (1 ) (1 ) 1 N K' M 1 1 M N1 M N 1? Popularity N 1 File Index whenever K >> N 1 /M If these files are indeed very popular, K will be large. Thus, the N expected rate will likely be close to this upper bound 1 1 M Once a file is popular, its popularity does not matter! 14

15 Achievable Bound An achievable rate: N 1 [ 1] Kpi M i N Popular The minimum occurs at 1 M Kp N 1 Unpopular 1 p N Proposition 1: Assume M 2. There exists an achievable scheme whose average transmission rate satisfies: R K, F, P R ub = N 1 M KM 1 KM Popularity + Kp i i>n 1 where N 1 satisfies p N1 1 KM and p N 1 +1 < 1 KM. 15 N 1 File Index

16 Outline Coded Caching under Arbitrary Popularity Distributions System Model Achievable Bounds and Intuitions Lower Bounds Coded Caching under Distinct File Sizes System Model Achievable Bounds and Intuitions Lower Bounds Conclusion and Discussions 16

17 Lower Bound: Statement Proposition 2: Assume that M 2. Let N 1 be the least popular file with popularity no smaller than 1 KM, i.e., p N1 1 KM and p N 1 +1 < 1 KM For all possible coded caching schemes, the average transmission rate is lower bounded by R K, F, P R lb = max{ KM Popularity N 1 N 1 M 1 1, + 58 [ Kp i 2] + } i>n 1 File Index Lower bound for serving popular files 1 to N 1 Lower bound for serving unpopular files N 1 +1 to N 17

18 Lower Bound: Challenges Need to show: For popular files, popularity does not matter Reduce to uniform popularity 1/KM and use stochastic dominance With uniform popularity for all popular files, their worst-case rate and average-case rate are on the same order [Niesen and Maddah-Ali `14] For unpopular files, it is a good idea not to use any caching 1 KM Popularity N 1 File Index 18

19 Popular Files: Popularity Does Not Matter F, P F 1, p 1 F N1, p N1 F N1 +1, p N1 +1 F N, p N R K, F, P Remove all unpopular files Reduce all popularity to the lowest value p N1 F 1, p 1 F N1, p N F N1 (empty file),1 1 1, P 1 p i R K, F 1, P 1 i=1 F 1, P 2 F 1, p N1 F N1, p N1 (empty file),1 N 1 p N1 R K, F 1, P 2 System 2 19

20 System 2 K, F 1, P 2 : Worst-case vs. Average-Case Each of the K user request one of the N 1 popular files with equal probability p N1 1 KM The average number of users requesting popular files is KN 1 p N1 N 1 M Property 1: with reasonable probability, the number of users K r requesting popular files is no smaller than N 1 M P K r N 1 M 0.5. More precisely, Property 2: with reasonable probability, the number of distinct files K d requested is no smaller than 0.5K r. More precisely P K d 1 2 K r K r 0.56 P K d 1 2 N 1 M 0.28 denoted as K 3 20

21 Popular Files: Further Reduction from System 2 System 2 R K, F 1, P 2 F 1, p N1 F N1, p N1 (empty file),1 N 1 p N1 If K d K 3, i.e., the number of distinct files requested is no smaller than K 3 (This happens with probability 0.28) Users 1 2 K If K d < K 3, 1 2 K Exactly K 3 users requests K 3 distinct files. No files are requested Each pattern is equally likely. For the left hand side: Minimizing the average case will be equivalent to minimizing the worst case R 1 8 N 1 M 1 + R K, F, P N 1 M N 1 M

22 Lower Bound: Unpopular Files R K, F, P max{ 1 29 N 1 M 1 1, + 58 [ Kp i 2] + } i>n 1 Bound for serving popular files Bound for serving unpopular files F 1, p 1 F N1, p N1 F N1 +1, p N1 +1 F i, p i F N, p N Remove all popular files F j, p j N,1 i=n 1 +1 p i F N1 +1, p N1 +1 F i, p i F j, p j F N, p N R K, F, P R K, F 3, P 3 Merge any two unpopular files into one Lower Rate N,1 i=n 1 +1 p i F N1 +1, p N1 +1 V k, p i + p j F N, p N 22

23 Unpopular Files: Reduction to System 2 N,1 i=n 1 +1 p i F N1 +1, p N1 +1 V k, p i + p j F N, p N Merge files until the sum popularity is just above 1/KM 2 > v KM i 1, KM N 2 ( i>n 1 p i )KM /2 N,1 2 i=1 p i V 1, v 1 V 2, v 2 V N2, v N2 R K, F 4, P 4 Reduce all popularity to 1/KM,1 N 2 KM 1 V 1, KM 1 V 1, KM 1 V N2, KM R K, F 4, P 5 This is exactly like System 2! R K, F, P 1 29 N 2 M i>n1 2Kp i

24 Constant Factor We have shown the lower bound: R K, F, P R lb = max{ 1 29 Recall the achievable bound Constant-factor: N 1 M 1 + R K, F, P R ub = N 1 M 1 + R ub 87R lb +2, 1 58 [ Kp i i>n 1 2] + } + Kp i i>n 1 Arbitrary Popularity Distribution! 24

25 Numerical Comparison LFU [Lee et al 01]: Cache the M most popular contents (No coding) Uniform-caching [Maddah-Ali and Niesen 14]: Randomly cache M portion of every content, regardless of popularity N Group-caching [Niesen and Maddah-Ali, 14]: Divide the files into groups with similar popularity; perform coded caching within each group Include an additional cache-allocation optimization RLFU (Random LFU) [Ji et al 14]: Assume Zipf popularity distribution; perform coded caching among the most popular files 1 to N 1 Numerically optimize N 1 based on some upper bound For uniform-caching, group-caching and RLFU, we plot the upper bound on the average transmission rate 25

26 Upper Bound Numerical Results: Zipf Distribution p i 1 iα and α = 1.1 N = 5000, K = 500, α = 1.1 Uniform caching LFU (no coding) Group-caching [Maddah-Ali and Niesen 14] Proposed scheme RLFU [Ji et al 14] (Numerically optimized N 1 ) Note: For RLFU, Group-Caching, Uniform-Caching, we plot the upper bound 26

27 Non-Zipf Distribution Zipf-Mandelbrot law distribution p i 1 (i+r) α, α = 1.4,r = 2, N = 5000, K = 500 Uniform caching LFU (no coding) Group-caching [Maddah-Ali and Niesen 14] Proposed scheme 27

28 Summary: Arbitrary Popularity Distributions We study the expected transmission rate of coded caching under arbitrary popularity distributions We obtain achievable bounds that differ from the information-theoretic lower bound by at most a constant factor (except for a small additive term) Threshold Structure: Perform coded caching only among popular files p N1 1 KM However, all popular files are cached uniformly Similar to [Ji et al 14], but use a different N 1 28

29 Outline Coded Caching under Arbitrary Popularity Distributions System Model Achievable Bounds and Intuitions Lower Bounds Coded Caching under Distinct File-Sizes System Model Achievable Bounds and Intuitions Lower Bounds Conclusion and Discussions 29

30 Network Model: Distinct File Sizes Server with a broadcast channel K users: cache size M N files: F = F 1,, F N File-size (nonincreasing): F i = F i F i F j, if i j Request pattern: W i = f i1,, f ik, f ik F Rate for W i is r(w i ) 2 File Request User 1 File 1 1 File Placement 2 User 2... Server File N File Transmission 2 File Request User K Worst-case rate: R = max r(w i ) i 30

31 Power-of-2 Simplification File-sizes differ by power-of-2 factors F 1 File Size l-th type: F l = F 1 /2 l 1 N l files of type l F 1 /2 F 1 /4 File Index T distinct types The total number of files TX N l = N l=1 N 1 N 2 N 3 N T ¹T = minft; log 2 Kg Files of type l > T can be virtually neglected Their sizes F 1 /K 31

32 log(rate) Our Main Results Logarithmic-factor gap between the lower bound (R LB2 ) and the achievable (upper) bound (R UB2 ) for the worst-case transmission rate: R UB2 32 log 2 K R LB The achievable bound (R UB2 ) is attained by caching larger files more aggressively Quadratically more content is cached for larger files The key step is to show a tighter lower bound, which involves careful use of entropy inequalities Number of types UB1 K/(log K) 2 UB2 LB2 LB1 32

33 Recall Insensitivity under Unit File-size The worst-case rate with uniform file size of 1 [Maddah-Ali & Niesen `14] is given by K 1 M N 1 1+ KM N N M 1 N M, when K >> N M and M<<N Each user caches every bit of each file with probability q = M N Worst-case rate N M = 1 q When the uniform file-size is F, these numbers become: Caching probability q = M NF, Worst-case rate: KF 1 M NF 1 1+ KM NF NF2 = F, when q << 1 and K >> 1/q M q 33

34 Two Achievable Schemes (UB1 vs UB2) Achievable Scheme 1 (UB1) All files are cached with an equal probability q Linearly more content is cached for larger files Cache constraint: T q l=1 N l F l = M with T = min(t, log 2 K) R UB1 O(max l F l q ) Achievable Scheme 2 (UB2) Let the caching probability q l = F l /c Quadratically more content is cached for larger files Cache constraint: ¹TX l=1 q l N l F l = M R UB2 ¹TX l=1 ¹TX l=1 N l F 2 l F l q l + KF ¹ T +1 = cm = O( F 1 P T ¹ l=1 N lf l ) M = T ¹ c + KF T ¹ +1 P T ¹ l=1 ( ¹T + 1) N lfl 2 M 34

35 log(rate) Two Achievable Schemes (UB1 vs UB2) Achievable Scheme 1 (UB1) Achievable Scheme 2 (UB2) R UB1 O( F 1 P T ¹ l=1 N lf l ) M R UB2 ( ¹ T + 1) P ¹ T l=1 N lf 2 l M Consider T = log 2 K, N l+1 = 4N l R UB1 K N 1F 2 1 8M Critical to cache quadratically more content for larger files! R UB2 ( T ¹ + 1) T ¹ N 1Fl 2 M UB1 UB1 K/(log K) 2 UB2 UB2 Number of types 35

36 Outline Coded Caching under Arbitrary Popularity Distributions System Model Achievable Bounds and Intuitions Lower Bounds Coded Caching under Distinct File-Sizes System Model Achievable Bounds and Intuitions Lower Bounds Conclusion and Discussions 36

37 Lower Bound: Uniform File-size NF/(2M) users 2M/F Request patterns 1 2 NF/(2M) NF/(2M)+1 NF/M N-NF/(2M)+1 N In order to serve all request patterns, we must have [Maddah-Ali & Niesen `14] 2M F R (F) + NF 2M M NF R (F) NF 2 4M = F 4q

38 Lower Bound: First Try L users P l2 N l L Request patterns X l2 N l Files of types in Φ In order to serve all request patterns, we must have l Φ L N l R F + L M N l Maximizing over L and Φ l Φ R l Φ N l F 2 l F max Φ 4M l Φ N l F l (LB1)

39 log(rate) LB1 vs UB2 Lower Bound 1 (LB1) Achievable Bound 2 (UB2) R R LB1 = max Φ 2 l Φ N l F l 4M l Φ N l R R UB2 = ( ¹ T + 1) P ¹ T l=1 N lf 2 l M Consider N l+1 = 4N l R LB1 N 1 F 2 1 4M R UB2 ( T ¹ + 1) T ¹ N 1F1 2 M UB1 LB1 fails to account for heterogeneous caching probabilities! UB2 (log K) 2 LB1 Number of types 39

40 log(rate) An Improved Lower Bound (LB2) Proposition 3: Under Assumption 1: 2M F 1 and N lf l 2M are integers for all 1 l T Assumption 2: We must have T l=1 N l F l 2M K R F T l=1 N l F l 2 4M UB1 UB2 (LB2) log K Compared with UB2: P T ¹ R UB2 ( T ¹ l=1 + 1) N lfl 2 M Number of types LB2 LB1 40

41 Intuition for LB2 (Two types: F 2 = F 1 /2) R F 2 T N l F l l=1 = N 2 1F 1 4M 2 4M +N 2F 2 4M Assumption 2 ensures that s 1 +s 2 = N 1F 1 + N 2F 2 2M 2M (LB2) K s 1 = N 1F 1 2M users (U 1 ) s 2 = N 2F 2 2M users (U 2 ) patterns patterns N 1 files of type 1 (F 1 ) N 1 files of R (F) N1F1 2 type 1 (F 1 4M ) N 2 files of type 2 (F 2 ) 41

42 Proof: (Two types: F2 = F1/2) s 1 = N 1F 1, s 2M 2 = N 2F 2 2M H M 1 = 0.5H F 1 = N 1F 1 2 H M 2 = 0.5H F 2 = N 2F 2 2 I R D1 ; F 1 + H IMR D1 ; F 1 1 I N 1F 1 R D1 M 1 ; F 1 = H(F 1 ), I R 2 D 2 ; F 1 N 1F 1 2 I R D1 R D2 ; F 2 F 1 I + R D1 H R M D2 2 ; F 2 F 1 I R N 2F D1 R 2 D2, M 2 ; F 2 F 1 = H(F 2 ) 2 42

43 Proof: (Two types: F2 = F1/2) s 1 = N 1F 1, s 2M 2 = N 2F 2 2M From 2N 1 R F N s 1 F 1 + N 2F M R F N F 1 F 1 + N 2F R F N 2 1F 1 4M + N 2F 2 F 1 8M R F N 2 1F 1 4M + N 2 2F 2 4M (LB2) 43

44 Beyond Power-of-2 File Size Original file-set: F = F 1,, F N, F i = F i Upper-quantized version F UB = F i UB F i UB = F 1 2 log 2 F 1 F i Lower-quantized version N File Index F LB = F i LB F i LB = F 1 2 log 2 F 1 F i 1 R F LB R F R F UB Under certain conditions (Assumption 2), R F LB is in a constant gap with R F UB 44

45 Comparisons With Assumptions 1 & 2 General Result (without Assumptions 1 and 2): R UB2 (32log 2 K + 22)R LB2 45

46 Conclusions Heterogeneous popularity: A simple threshold-based policy (similar to [Ji et al 14]): files above a popularity threshold are cached uniformly We show constant-factor gap that is independent of the popularity distribution Heterogeneous file-sizes Quadratically more content is cached for larger files We show logarithmic-factor gap While the new achievable schemes are quite intuitive, the corresponding lower bounds more involved and reveal useful insights 46

47 Potential Future Directions Refinements: Combining heterogeneous popularity and file-sizes? Reduce the logarithmic factor? Other aspects of heterogeneity: Heterogeneous cache size? The role of cache location? Wireless environments (HetNet): Is coded caching still helpful? Practical considerations: Low-complexity coding/transmission schemes Real-time transmissions [Niesen and Maddah-Ali `15] 47

48 Thank you! J. Zhang, X. Lin and X. Wang, Coded Caching under Arbitrary Popularity Distributions,'' in ITA Workshop, UCSD, February J. Zhang, X. Lin, C.-C. Wang and X. Wang, Coded Caching for Files with Distinct File Sizes, in ISIT, June 2015 (to appear). 48

Coded Caching for Files with Distinct File Sizes

Coded Caching for Files with Distinct File Sizes Coded Caching for Files with Distinct File Sizes Jinbei Zhang, Xiaojun Lin, Chih-Chun Wang, Xinbing Wang Shanghai Jiao Tong University Purdue University The Importance of Caching Server cache cache cache

More information

Coded Caching under Arbitrary Popularity Distributions

Coded Caching under Arbitrary Popularity Distributions Coded Caching under Arbitrary Popularity Distributions Jinbei Zhang, Xiaojun Lin, Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University, China School of Electrical and Computer Engineering,

More information

Coded Caching with Low Subpacketization Levels

Coded Caching with Low Subpacketization Levels Electrical and Computer Engineering Conference Papers, Posters and Presentations Electrical and Computer Engineering 06 Coded Caching with Low Subpacetization Levels Li Tang Iowa State University, litang@iastateedu

More information

Coded Caching for Multi-level Popularity and Access

Coded Caching for Multi-level Popularity and Access Coded Caching for Multi-level Popularity and Access Jad Hachem, Student Member, IEEE, Nikhil Karamchandani, Member, IEEE, and Suhas Diggavi, Fellow, IEEE Abstract arxiv:4046563v2 [csit] 3 Dec 205 To address

More information

Content Caching and Delivery over Heterogeneous Wireless Networks

Content Caching and Delivery over Heterogeneous Wireless Networks Content Caching and Delivery over Heterogeneous Wireless Networks Jad Hachem University of California, Los Angeles Email: jadhachem@uclaedu khil Karamchandani Indian Institute of Technology, Bombay Email:

More information

Fundamental Limits on Latency in Small-Cell Caching Systems: An Information-Theoretic Analysis

Fundamental Limits on Latency in Small-Cell Caching Systems: An Information-Theoretic Analysis Fundamental Limits on Latency in Small-ell aching Systems: An Information-Theoretic Analysis Seyyed Mohammadreza Azimi, Osvaldo Simeone, and Ravi Tandon Abstract aching of popular multimedia content at

More information

On Coded Caching with Correlated Files

On Coded Caching with Correlated Files On Coded Caching with Correlated Files Kai Wan, Daniela Tuninetti, Mingyue Ji, Giuseppe Care, Technische Universität Berlin, Berlin, Germany, {kai.wan, caire}@tu-berlin.de University of Illinois at Chicago,

More information

Cache-Enabled Broadcast Packet Erasure Channels with State Feedback

Cache-Enabled Broadcast Packet Erasure Channels with State Feedback Cache-Enabled Broadcast Pacet Erasure Channels with State Feedbac Asma Ghorbel, Mari Kobayashi, Sheng Yang To cite this version: Asma Ghorbel, Mari Kobayashi, Sheng Yang. Cache-Enabled Broadcast Pacet

More information

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel /33 Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel Presented by Paul de Kerret Joint work with Antonio Bazco, Nicolas Gresset, and David Gesbert ESIT 2017 in Madrid,

More information

Alpha Fair Coded Caching

Alpha Fair Coded Caching Alpha Fair Coded Caching Apostolos Destounis 1, Mari Kobayashi 2, Georgios Paschos 1, Asma Ghorbel 2 1 France Research Center, Huawei Technologies Co. Ltd., email: firstname.lastname@huawei.com 2 Centrale-Supélec,

More information

Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes

Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes Jingjing Zhang and Osvaldo Simeone arxiv:72.04266v4 [cs.it] 2 Mar 208 Abstract In fog-aided cellular systems,

More information

Optimal Geographical Caching in Heterogeneous Cellular Networks

Optimal Geographical Caching in Heterogeneous Cellular Networks 1 Optimal Geographical Caching in Heterogeneous Cellular Networks Berksan Serbetci, and Jasper Goseling arxiv:1710.09626v2 [cs.ni] 22 Nov 2018 Abstract We investigate optimal geographical caching in heterogeneous

More information

Fundamental Limits on Delivery Time in Cloud- and Cache-Aided Heterogeneous Networks

Fundamental Limits on Delivery Time in Cloud- and Cache-Aided Heterogeneous Networks DRAFT Fundamental Limits on Delivery Time in Cloud- and Cache-Aided Heterogeneous Networks Jaber Kakar Member IEEE Soheil Gherekhloo Member IEEE arxiv:706.0767v [cs.it] 3 Jun 07 and Aydin Sezgin Senior

More information

How to Optimally Allocate Resources for Coded Distributed Computing?

How to Optimally Allocate Resources for Coded Distributed Computing? 1 How to Optimally Allocate Resources for Coded Distributed Computing? Qian Yu, Songze Li, Mohammad Ali Maddah-Ali, and A. Salman Avestimehr Department of Electrical Engineering, University of Southern

More information

Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching

Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching entropy Article Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching Chao Tian Department of Electrical and Computer Engineering, Texas A&M

More information

Cache-Enabled Heterogeneous Cellular Networks: Optimal Tier- Level Content Placement. Title. Wen, W; Huang, K; Yang, S.; Li, VOK

Cache-Enabled Heterogeneous Cellular Networks: Optimal Tier- Level Content Placement. Title. Wen, W; Huang, K; Yang, S.; Li, VOK Title Cache-Enabled Heterogeneous Cellular Networks: Optimal Tier- Level Content Placement Author(s) Wen, W; Huang, K; Yang, S.; Li, VOK Citation IEEE Transactions on Wireless Communications, 2017, v.

More information

Fundamental Tradeoff between Computation and Communication in Distributed Computing

Fundamental Tradeoff between Computation and Communication in Distributed Computing Fundamental Tradeoff between Computation and Communication in Distributed Computing Songze Li, Mohammad Ali Maddah-Ali, and A. Salman Avestimehr Department of Electrical Engineering, University of Southern

More information

Joint and Competitive Caching Designs in Large-Scale Multi-Tier Wireless Multicasting Networks

Joint and Competitive Caching Designs in Large-Scale Multi-Tier Wireless Multicasting Networks Joint and Competitive Caching Designs in Large-Scale Multi-Tier Wireless Multicasting Networks Zitian Wang, Zhehan Cao, Ying Cui Shanghai Jiao Tong University, China Yang Yang Intel Deutschland GmbH, Germany

More information

Cloud and Cache-Aided Wireless Networks: Fundamental Latency Trade-Offs

Cloud and Cache-Aided Wireless Networks: Fundamental Latency Trade-Offs Cloud and Cache-Aided Wireless Networks: Fundamental Latency Trade-Offs Avik Sengupta, Student Member, IEEE, Ravi Tandon, Member, IEEE, Osvaldo Simeone, Fellow, IEEE Abstract A cloud and cache-aided wireless

More information

arxiv: v1 [cs.it] 23 Jan 2019

arxiv: v1 [cs.it] 23 Jan 2019 Single-Server Single-Message Online Private Information Retrieval with Side Information Fatemeh azemi, Esmaeil arimi, Anoosheh Heidarzadeh, and Alex Sprintson arxiv:90.07748v [cs.it] 3 Jan 09 Abstract

More information

Optimal Data and Training Symbol Ratio for Communication over Uncertain Channels

Optimal Data and Training Symbol Ratio for Communication over Uncertain Channels Optimal Data and Training Symbol Ratio for Communication over Uncertain Channels Ather Gattami Ericsson Research Stockholm, Sweden Email: athergattami@ericssoncom arxiv:50502997v [csit] 2 May 205 Abstract

More information

A Polynomial-Time Algorithm for Pliable Index Coding

A Polynomial-Time Algorithm for Pliable Index Coding 1 A Polynomial-Time Algorithm for Pliable Index Coding Linqi Song and Christina Fragouli arxiv:1610.06845v [cs.it] 9 Aug 017 Abstract In pliable index coding, we consider a server with m messages and n

More information

On Allocating Cache Resources to Content Providers

On Allocating Cache Resources to Content Providers On Allocating Cache Resources to Content Providers Weibo Chu, Mostafa Dehghan, Don Towsley, Zhi-Li Zhang wbchu@nwpu.edu.cn Northwestern Polytechnical University Why Resource Allocation in ICN? Resource

More information

K User Interference Channel with Backhaul

K User Interference Channel with Backhaul 1 K User Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load Trade Off Borna Kananian,, Mohammad A. Maddah-Ali,, Babak H. Khalaj, Department of Electrical Engineering, Sharif University

More information

Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems

Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems Behrouz Khoshnevis and Wei Yu Department of Electrical and Computer Engineering University of Toronto, Toronto, Ontario,

More information

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,

More information

Exploiting User Mobility for Wireless Content Delivery

Exploiting User Mobility for Wireless Content Delivery Exploiting User Mobility for Wireless Content Delivery Konstantinos Poularakis and Leandros Tassiulas Department of Electrical and Computer Engineering, University of Thessaly, Volos, Greece kopoular,leandros

More information

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Jung Hoon Lee and Huaiyu Dai Department of Electrical and Computer Engineering, North Carolina State University,

More information

Exploiting Mobility in Cache-Assisted D2D Networks: Performance Analysis and Optimization

Exploiting Mobility in Cache-Assisted D2D Networks: Performance Analysis and Optimization 1 Exploiting Mobility in Cache-Assisted D2D Networks: Performance Analysis and Optimization Rui Wang, Jun Zhang, Senior Member, IEEE, S.H. Song, Member, IEEE, and arxiv:1806.04069v1 [cs.it] 11 Jun 2018

More information

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Viveck R Cadambe, Syed A Jafar, Hamed Maleki Electrical Engineering and

More information

Optimal Scalar Linear Index Codes for Symmetric and Neighboring Side-information Problems

Optimal Scalar Linear Index Codes for Symmetric and Neighboring Side-information Problems Optimal Scalar Linear Index Codes for Symmetric and Neighboring Side-information Problems Mahesh Babu Vaddi and B Sundar Rajan Department of Electrical Communication Engineering, Indian Institute of Science,

More information

Weakly Secure Data Exchange with Generalized Reed Solomon Codes

Weakly Secure Data Exchange with Generalized Reed Solomon Codes Weakly Secure Data Exchange with Generalized Reed Solomon Codes Muxi Yan, Alex Sprintson, and Igor Zelenko Department of Electrical and Computer Engineering, Texas A&M University Department of Mathematics,

More information

Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks

Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks 1 Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks Bo Zhou, Ying Cui, Member, IEEE, and Meixia Tao, Senior Member, IEEE Abstract Caching at small base stations

More information

Harnessing Interaction in Bursty Interference Networks

Harnessing Interaction in Bursty Interference Networks 215 IEEE Hong Kong-Taiwan Joint Workshop on Information Theory and Communications Harnessing Interaction in Bursty Interference Networks I-Hsiang Wang NIC Lab, NTU GICE 1/19, 215 Modern Wireless: Grand

More information

A Novel Index Coding Scheme and its Application to Coded Caching

A Novel Index Coding Scheme and its Application to Coded Caching A ovel Index Coding Scheme and its Application to Coded Caching ai Wan Laboratoire des Signaux et Systèmes L2S CentraleSupèlec-CRS-Universitè Paris-Sud 91192 Gif-sur-Yvette, France Email: kai.wan@u-psud.fr

More information

arxiv: v4 [cs.it] 17 Oct 2015

arxiv: v4 [cs.it] 17 Oct 2015 Upper Bounds on the Relative Entropy and Rényi Divergence as a Function of Total Variation Distance for Finite Alphabets Igal Sason Department of Electrical Engineering Technion Israel Institute of Technology

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

Generalized Degrees-of-Freedom of the 2-User Case MISO Broadcast Channel with Distributed CSIT

Generalized Degrees-of-Freedom of the 2-User Case MISO Broadcast Channel with Distributed CSIT 207 IEEE IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, June 207 DOI: 009/ECCE2078096480 Generalized Degrees-of-Freedom of the 2-User Case MISO Broadcast Channel with Distributed

More information

Copyright Warning & Restrictions

Copyright Warning & Restrictions Copyright Warning & Restrictions The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions

More information

Joint Optimization of Cloud and Edge Processing for Fog Radio Access Networks

Joint Optimization of Cloud and Edge Processing for Fog Radio Access Networks Joint Optimization of Cloud and Edge Processing for Fog Radio Access Networks Seok-Hwan Park 1, Osvaldo Simeone 2 and Shlomo Shamai (Shitz) 3 1 Division of Electronic Engineering, Chonbuk National University,

More information

The Balanced Unicast and Multicast Capacity Regions of Large Wireless Networks

The Balanced Unicast and Multicast Capacity Regions of Large Wireless Networks 1 The Balanced Unicast and Multicast Capacity Regions of Large Wireless Networks Urs Niesen, Piyush Gupta, and Devavrat Shah Abstract arxiv:0809.1344v3 [cs.it] 24 Jun 2009 We consider the question of determining

More information

Multiuser Successive Refinement and Multiple Description Coding

Multiuser Successive Refinement and Multiple Description Coding Multiuser Successive Refinement and Multiple Description Coding Chao Tian Laboratory for Information and Communication Systems (LICOS) School of Computer and Communication Sciences EPFL Lausanne Switzerland

More information

Impact of traffic mix on caching performance

Impact of traffic mix on caching performance Impact of traffic mix on caching performance Jim Roberts, INRIA/RAP joint work with Christine Fricker, Philippe Robert, Nada Sbihi BCAM, 27 June 2012 A content-centric future Internet most Internet traffic

More information

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,

More information

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Chongbin Xu, Peng Wang, Zhonghao Zhang, and Li Ping City University of Hong Kong 1 Outline Background Mutual Information

More information

On the Required Accuracy of Transmitter Channel State Information in Multiple Antenna Broadcast Channels

On the Required Accuracy of Transmitter Channel State Information in Multiple Antenna Broadcast Channels On the Required Accuracy of Transmitter Channel State Information in Multiple Antenna Broadcast Channels Giuseppe Caire University of Southern California Los Angeles, CA, USA Email: caire@usc.edu Nihar

More information

Response Time in Data Broadcast Systems: Mean, Variance and Trade-O. Shu Jiang Nitin H. Vaidya. Department of Computer Science

Response Time in Data Broadcast Systems: Mean, Variance and Trade-O. Shu Jiang Nitin H. Vaidya. Department of Computer Science Response Time in Data Broadcast Systems: Mean, Variance and Trade-O Shu Jiang Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX 7784-11, USA Email: fjiangs,vaidyag@cs.tamu.edu

More information

Optimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint

Optimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 29 proceedings Optimal Power Allocation for Cognitive Radio

More information

Bayesian Congestion Control over a Markovian Network Bandwidth Process

Bayesian Congestion Control over a Markovian Network Bandwidth Process Bayesian Congestion Control over a Markovian Network Bandwidth Process Parisa Mansourifard 1/30 Bayesian Congestion Control over a Markovian Network Bandwidth Process Parisa Mansourifard (USC) Joint work

More information

On Two Class-Constrained Versions of the Multiple Knapsack Problem

On Two Class-Constrained Versions of the Multiple Knapsack Problem On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic

More information

Information Theory Meets Game Theory on The Interference Channel

Information Theory Meets Game Theory on The Interference Channel Information Theory Meets Game Theory on The Interference Channel Randall A. Berry Dept. of EECS Northwestern University e-mail: rberry@eecs.northwestern.edu David N. C. Tse Wireless Foundations University

More information

Fairness and Optimal Stochastic Control for Heterogeneous Networks

Fairness and Optimal Stochastic Control for Heterogeneous Networks λ 91 λ 93 Fairness and Optimal Stochastic Control for Heterogeneous Networks sensor network wired network wireless 9 8 7 6 5 λ 48 λ 42 4 3 0 1 2 λ n R n U n Michael J. Neely (USC) Eytan Modiano (MIT) Chih-Ping

More information

Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback

Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback Achaleshwar Sahai Department of ECE, Rice University, Houston, TX 775. as27@rice.edu Vaneet Aggarwal Department of

More information

Gibbsian On-Line Distributed Content Caching Strategy for Cellular Networks

Gibbsian On-Line Distributed Content Caching Strategy for Cellular Networks Gibbsian On-Line Distributed Content Caching Strategy for Cellular Networks Arpan Chattopadhyay, Bartłomiej Błaszczyszyn, H. Paul Keeler arxiv:1610.02318v2 [cs.ni] 6 Nov 2017 Abstract In this paper, we

More information

Cache Aided Wireless Networks: Tradeoffs between Storage and Latency

Cache Aided Wireless Networks: Tradeoffs between Storage and Latency Cache Aided Wireless Networks: radeoffs between Storage and Latency Avik Sengupta ume Center, Department of ECE Virginia ech, Blacksburg, VA 24060, USA Email: aviksg@vt.edu Ravi andon Department of ECE

More information

Coded Caching for Files with Distinct File Sizes

Coded Caching for Files with Distinct File Sizes Coded Caching for Fies with Distinct Fie Sizes Jinbei Zhang iaojun Lin Chih-Chun Wang inbing Wang Department of Eectronic Engineering Shanghai Jiao ong University China Schoo of Eectrica and Computer Engineering

More information

PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS. Pratik Patil, Binbin Dai, and Wei Yu

PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS. Pratik Patil, Binbin Dai, and Wei Yu PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS Pratik Patil, Binbin Dai, and Wei Yu Department of Electrical and Computer Engineering University of Toronto,

More information

Multicast With Prioritized Delivery: How Fresh is Your Data?

Multicast With Prioritized Delivery: How Fresh is Your Data? Multicast With Prioritized Delivery: How Fresh is Your Data? Jing Zhong, Roy D Yates and Emina Solanin Department of ECE, Rutgers University, {ingzhong, ryates, eminasolanin}@rutgersedu arxiv:885738v [csit

More information

Analysis and Optimization of Caching and Multicasting for Multi-Quality Videos in Large-Scale Wireless Networks

Analysis and Optimization of Caching and Multicasting for Multi-Quality Videos in Large-Scale Wireless Networks Analysis and Optimization of Caching and Multicasting for Multi-Quality Videos in Large-Scale Wireless Networks Dongdong Jiang, Student Member, IEEE and Ying Cui, Member, IEEE Abstract Efficient dissemination

More information

Index coding with side information

Index coding with side information Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated

More information

Bayesian Congestion Control over a Markovian Network Bandwidth Process: A multiperiod Newsvendor Problem

Bayesian Congestion Control over a Markovian Network Bandwidth Process: A multiperiod Newsvendor Problem Bayesian Congestion Control over a Markovian Network Bandwidth Process: A multiperiod Newsvendor Problem Parisa Mansourifard 1/37 Bayesian Congestion Control over a Markovian Network Bandwidth Process:

More information

Design and Analysis of LT Codes with Decreasing Ripple Size

Design and Analysis of LT Codes with Decreasing Ripple Size Design and Analysis of LT Codes with Decreasing Ripple Size 1 Jesper H. Sørensen, Petar Popovski, Jan Østergaard, Aalborg University, Department of Electronic Systems, E-mail: {jhs, petarp, arxiv:1011.2078v2

More information

Data Rate Theorem for Stabilization over Time-Varying Feedback Channels

Data Rate Theorem for Stabilization over Time-Varying Feedback Channels Data Rate Theorem for Stabilization over Time-Varying Feedback Channels Workshop on Frontiers in Distributed Communication, Sensing and Control Massimo Franceschetti, UCSD (joint work with P. Minero, S.

More information

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Syracuse University SURFACE Dissertations - ALL SURFACE June 2017 Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Yi Li Syracuse University Follow this and additional works

More information

Interference Channels with Source Cooperation

Interference Channels with Source Cooperation Interference Channels with Source Cooperation arxiv:95.319v1 [cs.it] 19 May 29 Vinod Prabhakaran and Pramod Viswanath Coordinated Science Laboratory University of Illinois, Urbana-Champaign Urbana, IL

More information

2014 IEEE International Symposium on Information Theory. Two-unicast is hard. David N.C. Tse

2014 IEEE International Symposium on Information Theory. Two-unicast is hard. David N.C. Tse Two-unicast is hard Sudeep Kamath ECE Department, University of California, San Diego, CA, USA sukamath@ucsd.edu David N.C. Tse EECS Department, University of California, Berkeley, CA, USA dtse@eecs.berkeley.edu

More information

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel Stefano Rini, Daniela Tuninetti, and Natasha Devroye Department

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

Improved On-line Broadcast Scheduling with Deadlines

Improved On-line Broadcast Scheduling with Deadlines Improved On-line Broadcast Scheduling with Deadlines Feifeng Zheng 1, Stanley P. Y. Fung 2, Wun-Tat Chan 3, Francis Y. L. Chin 3, Chung Keung Poon 4, and Prudence W. H. Wong 5 1 School of Management, Xi

More information

Revenue Maximization in a Cloud Federation

Revenue Maximization in a Cloud Federation Revenue Maximization in a Cloud Federation Makhlouf Hadji and Djamal Zeghlache September 14th, 2015 IRT SystemX/ Telecom SudParis Makhlouf Hadji Outline of the presentation 01 Introduction 02 03 04 05

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

On the Worst-case Communication Overhead for Distributed Data Shuffling

On the Worst-case Communication Overhead for Distributed Data Shuffling On the Worst-case Communication Overhead for Distributed Data Shuffling Mohamed Adel Attia Ravi Tandon Department of Electrical and Computer Engineering University of Arizona, Tucson, AZ 85721 E-mail:{madel,

More information

Fountain Uncorrectable Sets and Finite-Length Analysis

Fountain Uncorrectable Sets and Finite-Length Analysis Fountain Uncorrectable Sets and Finite-Length Analysis Wen Ji 1, Bo-Wei Chen 2, and Yiqiang Chen 1 1 Beijing Key Laboratory of Mobile Computing and Pervasive Device Institute of Computing Technology, Chinese

More information

Network Control: A Rate-Distortion Perspective

Network Control: A Rate-Distortion Perspective Network Control: A Rate-Distortion Perspective Jubin Jose and Sriram Vishwanath Dept. of Electrical and Computer Engineering The University of Texas at Austin {jubin, sriram}@austin.utexas.edu arxiv:8.44v2

More information

Policy Optimization for Content Push via. Energy Harvesting Small Cells in Heterogeneous Networks

Policy Optimization for Content Push via. Energy Harvesting Small Cells in Heterogeneous Networks Policy Optimization for Content Push via 1 Energy Harvesting Small Cells in Heterogeneous Networks arxiv:1611.02380v1 [cs.it] 8 Nov 2016 Jie Gong Member, IEEE, Sheng Zhou Member, IEEE, Zhenyu Zhou Member,

More information

Caching with Time Domain Buffer Sharing

Caching with Time Domain Buffer Sharing SUBMITTED PAPER 1 Caching with Time Domain Buffer Sharing Wei Chen, Senior Member, IEEE, and H. Vincent Poor, Fellow, IEEE arxiv:1804.02797v1 [cs.it] 9 Apr 2018 Abstract In this paper, storage efficient

More information

ECE Information theory Final (Fall 2008)

ECE Information theory Final (Fall 2008) ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1

More information

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Xiaolu Zhang, Meixia Tao and Chun Sum Ng Department of Electrical and Computer Engineering National

More information

Towards a theory of information for energy-efficient communication

Towards a theory of information for energy-efficient communication Towards a theory of information for energy-efficient communication Pulkit Grover Wireless Foundations and Berkeley Wireless Research Center, UC Berkeley with Anant Sahai, Hari Palaiyanur, Kristen Woyach

More information

Caching Policy Toward Maximal Success Probability and Area Spectral Efficiency of Cache-enabled HetNets

Caching Policy Toward Maximal Success Probability and Area Spectral Efficiency of Cache-enabled HetNets 1 Caching Policy Toward Maximal Success Probability and Area Spectral Efficiency of Cache-enabled HetNets Dong Liu and Chenyang Yang Abstract In this paper, we investigate the optimal caching policy respectively

More information

Resource Allocation for Video Streaming in Wireless Environment

Resource Allocation for Video Streaming in Wireless Environment Resource Allocation for Video Streaming in Wireless Environment Shahrokh Valaee and Jean-Charles Gregoire Abstract This paper focuses on the development of a new resource allocation scheme for video streaming

More information

Interference Decoding for Deterministic Channels Bernd Bandemer, Student Member, IEEE, and Abbas El Gamal, Fellow, IEEE

Interference Decoding for Deterministic Channels Bernd Bandemer, Student Member, IEEE, and Abbas El Gamal, Fellow, IEEE 2966 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY 2011 Interference Decoding for Deterministic Channels Bernd Bemer, Student Member, IEEE, Abbas El Gamal, Fellow, IEEE Abstract An inner

More information

Approximate Capacity of Fast Fading Interference Channels with no CSIT

Approximate Capacity of Fast Fading Interference Channels with no CSIT Approximate Capacity of Fast Fading Interference Channels with no CSIT Joyson Sebastian, Can Karakus, Suhas Diggavi Abstract We develop a characterization of fading models, which assigns a number called

More information

arxiv: v2 [cs.it] 27 Aug 2016

arxiv: v2 [cs.it] 27 Aug 2016 GDoF of the MISO BC: Bridging the Gap between Finite Precision and Perfect CSIT arxiv:1602.02203v2 [cs.it 27 Aug 2016 Arash Gholami Davoodi, Bofeng Yuan and Syed A. Jafar Center for Pervasive Communications

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

On Common Information and the Encoding of Sources that are Not Successively Refinable

On Common Information and the Encoding of Sources that are Not Successively Refinable On Common Information and the Encoding of Sources that are Not Successively Refinable Kumar Viswanatha, Emrah Akyol, Tejaswi Nanjundaswamy and Kenneth Rose ECE Department, University of California - Santa

More information

Inter-Session Network Coding Schemes for 1-to-2 Downlink Access-Point Networks with Sequential Hard Deadline Constraints

Inter-Session Network Coding Schemes for 1-to-2 Downlink Access-Point Networks with Sequential Hard Deadline Constraints Inter-Session Network Coding Schemes for -to- Downlink Access-Point Networks with Sequential Hard Deadline Constraints Xiaohang Li, Chih-Chun Wang, and Xiaojun Lin Center for Wireless Systems and Applications,

More information

Centralized Coded Caching of Correlated Contents

Centralized Coded Caching of Correlated Contents Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv:1711.03798v1

More information

Asymptotic redundancy and prolixity

Asymptotic redundancy and prolixity Asymptotic redundancy and prolixity Yuval Dagan, Yuval Filmus, and Shay Moran April 6, 2017 Abstract Gallager (1978) considered the worst-case redundancy of Huffman codes as the maximum probability tends

More information

A Numerical Study on the Wiretap Network with a Simple Network Topology

A Numerical Study on the Wiretap Network with a Simple Network Topology 1 A Numerical Study on the Wiretap Network with a Simple Network Topology Fan Cheng, Member, IEEE and Vincent Y. F. Tan, Senior Member, IEEE arxiv:1505.02862v3 [cs.it] 15 Jan 2016 Fig. 1. Abstract In this

More information

Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach

Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach Mehran Elyasi Department of ECE University of Minnesota melyasi@umn.edu Soheil Mohajer Department of ECE University

More information

to be almost surely min{n 0, 3

to be almost surely min{n 0, 3 1 The DoF Region of the Three-Receiver MIMO Broadcast Channel with Side Information and Its Relation to Index Coding Capacity Behzad Asadi, Lawrence Ong, and Sarah J Johnson arxiv:160803377v1 [csit] 11

More information

Upper Bounds on the Capacity of Binary Intermittent Communication

Upper Bounds on the Capacity of Binary Intermittent Communication Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,

More information

Energy-Efficient Broadcast Scheduling. Speed-Controlled Transmission Channels

Energy-Efficient Broadcast Scheduling. Speed-Controlled Transmission Channels for Speed-Controlled Transmission Channels Joint work with Christian Gunia from Freiburg University in ISAAC 06. 25.10.07 Outline Problem Definition and Motivation 1 Problem Definition and Motivation 2

More information

Information Hiding and Covert Communication

Information Hiding and Covert Communication Information Hiding and Covert Communication Andrew Ker adk @ comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory Foundations of Security Analysis and Design

More information

Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing

Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing Junfeng Guo, Zhaozhe Song, Ying Cui Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, P. R. China

More information

Interference Alignment at Finite SNR for TI channels

Interference Alignment at Finite SNR for TI channels Interference Alignment at Finite SNR for Time-Invariant channels Or Ordentlich Joint work with Uri Erez EE-Systems, Tel Aviv University ITW 20, Paraty Background and previous work The 2-user Gaussian interference

More information

Vector Channel Capacity with Quantized Feedback

Vector Channel Capacity with Quantized Feedback Vector Channel Capacity with Quantized Feedback Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 9697-65 Email: syed@ece.uci.edu,

More information

Cooperative Multi-Sender Index Coding

Cooperative Multi-Sender Index Coding Cooperative Multi-Sender Index Coding 1 Min Li Lawrence Ong and Sarah J. Johnson Abstract arxiv:1701.03877v3 [cs.it] 6 Feb 2017 In this paper we establish new capacity bounds for the multi-sender unicast

More information

Multiple Bits Distributed Moving Horizon State Estimation for Wireless Sensor Networks. Ji an Luo

Multiple Bits Distributed Moving Horizon State Estimation for Wireless Sensor Networks. Ji an Luo Multiple Bits Distributed Moving Horizon State Estimation for Wireless Sensor Networks Ji an Luo 2008.6.6 Outline Background Problem Statement Main Results Simulation Study Conclusion Background Wireless

More information