Index Coding & Caching in Wireless Networks. Salim El Rouayheb. ECE IIT, Chicago
|
|
- Lesley Chambers
- 6 years ago
- Views:
Transcription
1 Index Coding & Caching in Wireless Networks Salim El Rouayheb ECE IIT, Chicago
2 Big Data vs. Wireless Exabytes per month [Cisco]
3 Meanwhile, Storage is Getting Cheaper Storage cost per GB (USD)
4 Storage = Caching Index coding: [Birk & Kol 98] + Coded Caching: [Maddah-Ali & Niesen 13] + Femto-caching: [Golrezai et al. 12].... Content is cached (stored) on mobile devices during off-peak hours
5 Index Distributed Coding Storage Example Wants: X 1 Has: X 2 X 3 t 1 Transmission # Index code 1 Index code2 t 4 t 2 1 X 1 X 1 +X 2 2 X 2 X 3 3 X 3 X 4 Wants: X 4 Has: X 1 X 1 X 2 X 3 X 4 t 3 Wants: X 2 Has: X 1 X 3 Wants: X 3 Has: X 2 X 4 4 X 4 L=4" Min transmission rate? " Optimal schemes?" Content of the cache is given Birk & Kol, Informed-source coding-on-demand (ISCOD) over broadcast channels, INFOCOM 98 L=3" Cached data independent of a user s preferences still help
6 Talk Roadmap Graph Theory & Index Coding Rank Minimization & Index Coding Network Coding & Index Coding Privacy Problems
7 Index Coding & Coloring 1 2 X 1 +X X X 4 Side info graph G d Clique cover of G = Chromatic nbr of Ḡ X 1 +X 2 +X 3 +X G 5 X 5 Ḡ 5
8 Index Coding & Graph Coloring 1 2 X 1 +X user 1 caches X 3 3 X X 4 L* min min length of linear index code Finding L* min is NP hard by [R., Sprintson, Chaudhry ITW 07] 4 Clique cover of G= Side info graph G d Chromatic nbr of Ḡ Independ (G) apple c(g) apple L ence nbr min apple d f d (Ḡ) apple (Ḡ) Shannon capacity [Haemers 79 ] Fractional Chromatic nbr [Blasiak, Kleinberg, Lubetzky 11 ] More bounds [Dimakis et al.] [Arbobjalfoei & Kim], [Mazumdar et al.] etc
9 Index Coding on Erdős-Rényi Graphs Independence nbr (G) apple L min apple (Ḡ) When n!1, we have with prob 1 log n apple L min apple n log n G(n,p) Can improve the lower bound [Haviv & Langberg Index Coding on random graphs, ISIT 12 ] c p n apple L min apple Chromatic nbr n log n Recent results closes the gap L min = (n/ log n) [Golovnev, Regev & Weinstein, The Min Rank of Random graphs, Arxiv 16 ]
10 Talk Roadmap Graph Theory & Index Coding Rank Minimization & Index Coding Network Coding & Index Coding Privacy Problems
11 Index Coding & Rank Minimization X 1 X 2 X 3 X 4 X 1 t * 10 * 0 X 2 X 1 +X 2 X 1 +X 2 +X 3 X 3 X 3 t 2 t * 1 * * 1 10 * X 4 X 1 +X 4 X 4 t 4 10 * Linear case: L min =minrk(m) Matrix M [Bar-Yossef et al. '06] Min rank introduced by Haemers in 79 to upper bound the Shannon graph capacity Min rank can be a tighter bound on Shannon capacity then Lovász Theta function.
12 Use Matrix Completion Methods to Construct Index Codes Minimizing nuclear norm [Recht & Candes 09] does not work here because the index coding matrices have a special structure. Try other rank minimization methods [Fazel et al. 04] C D Two problems: 1) Regions not convex 2) Optimization over the reals Index coding via AP Theorem: [Alternating Projections (AP)] If C and D are convex, then an alternating projection sequence between these 2 regions converges to a point in their intersection.
13 Alternating Projection on Random Undirected Graphs [Huang & R. Index Coding via Rank minimization ITW 15] Caching prob. p Up to 13% savings over Greedy coloring. No theoretical guarantees. Recent work on min rank over finite field [Sauderson, Fazel, Hassibi ISIT 16] Index coding via LP [Blasiak et al. 10], via SDP [Chlamtac et al 14]
14 Performance with Increasing Number of Users
15
16 Talk Roadmap Graph Theory & Index Coding Rank Minimization & Index Coding Network Coding & Index Coding Privacy Problems
17 Equivalence to Network Coding L Terminals: t 4 t 1 t 2 t 3 Wants: X 4 X 1 X 2 X 3 An index code of length L that satisfies all the users A network code that satisfies all the terminals
18 From Network to Index Coding Index coding is equivalent to the general network coding. If you can solve index coding efficiently you can solve any general network coding problem efficiently. How to map the codes? X 1, X 2,, X r How many? Rates? Wants:??? Has:??? Theorem: [R,Sprintson, Georghiades 08] [Effros,R,Langberg ISIT 13] For any network coding problem, one can construct an index coding problem and an integer L such that given any linear network code, one can efficiently construct a linear index code of length L, and vice versa. (same block length, same error probability).
19 Network Code è Index Code The linear case first X 1 X 2 X 1 X 2 X 1 +X 2 X 1 X 2 X X 1 +X 1 +X 2 2 Butterfly network Y e1 +X 1 Y e2 +X 1 Y e3 +X 2 Y e4 +X 2 Y e5 +X 1 +X 2 Y e6 +X 1 +X 2 Y e7 +X 1 +X 2 X 1, X 2 Y e1, Y e2,, Y e7 H(Y ei )=c(e i )=1 Equivalent index code All terminals in the index coding problem can decode Any linear network code gives an index code of length L=7
20 Implications on Index Coding Linear index codes are not optimal Vector linear codes outperform scalar linear No linear network code but a nonlinear code over alphabet of size 4 [zeger et al. 06] Only vector linear codes exist when block length is even.
21 Connections to many problems Interference management: [Jafar et al. 12] Distributed storage & caching: [Mazumdar 14], [Shanmugam et al. 14 Matroid representations: [Rouayheb et al. 09] Graph coloring: [Fragouli, Soljanin, Shokrollahi 04] [Alon et al. 08], [Shanmugam & Dimakis 13] LP bounds: [Blasiak, Kleinberg, Lubetzky 11 ] Coded caching [Maddah-Ali & Niesen 13] +
22 Variations on Index Coding 1. Data Exchange Problem [R., Sprintson, Sadeghi ITW 10] [Milosavlevijc, Pawar, R., Ramchandran, 13] [Courtade et al. 13] a No Base station (D2D). Users wants missed parts 2. Pliable index coding [Fragouli et al 15] b User 1 File: User 2 Like index coding but users want anything they don t have User 3 3. Coded Caching [Maddah-Ali & Niesen 14] Cached content is not fixed and can be designed Best paper, lots of follow up work
23 Talk Roadmap Graph Theory & Index Coding Rank Minimization & Index Coding Network Coding & Index Coding Privacy Problems
24 Caching Distributed for Private Storage Information Retrieval (PIR) PIR: user wants to hide which file it wants [chor et al 95] One server: User need to download all the data Classical PIR: data replicated on many servers Recent work: coded PIR [Jafar et al.], [Vardy et al.], [Rouayheb et al.], [Ulukus et al], [Hollanti et al.] Caching for PIR: user does not reveal cached data X 1 X 2 X M Server user Wants: X 1 Kadhe, Garcia, Heidarzadeh, R., Sprintson, PIR with Side Information, Allerton 17
25 SECURE COOPERATIVE COMPUTING IN IOT Collaboration with Hulya Seferoglu UIC Local computations on untrusted workers Homomorphic Encryption very costly New codes for security Bitar, R., Staircase Codes for Secret Sharing with Optimal Communication Overhead, Trans. on info th., R. Bitar P. Parag, R., Minimizing Latency for Secure Distributed Computing, submitted to ISIT 17
26 Acknowledgment Collaborators My students: Rawad Bitar, Razan Tajeddine, Peiwen Tian Camilla Hollanti (Aalto University, Finland) Olgica Milenkovic (UIUC) Hulya Seferoglu, (UIC) Parimal Parag (IISC, India) Funding agencies: NSF: CCF NSF: CCF ARL: W911NF
27 QUESTIONS?
28 Network Code è Index Code The linear case first X 1 X 2 X 1 X 2 X 1 +X 2 X 1 X 2 X X 1 +X 1 +X 2 2 Butterfly network Y e1 +X 1 Y e2 +X 1 Y e3 +X 2 Y e4 +X 2 Y e5 +X 1 +X 2 Y e6 +X 1 +X 2 Y e7 +X 1 +X 2 X 1, X 2 Y e1, Y e2,, Y e7 H(Y ei )=c(e i )=1 Equivalent index code All terminals in the index coding problem can decode Any linear network code gives an index code of length L=7
29 Index Code è Network Code Given a linear index code Y e1 +X 1 Y e2 +X 1 Y e3 +X 2 Y e4 +X 2 Y e5 +X 1 +X 2 Y e6 +X 1 +X 2 Y e7 +X 1 +X 2 Can always diagonalize Y e1 +Y e2 Y e2 +X 1 Y e3 +X 2 Y e4 +X 2 Y e5 +Y e4 +X 1 Y e6 +X 1 +X 2 Y e6 +Y e7 Butterfly network Any linear index code of length L=7 can be mapped to a linear network code Works for scalar linear and vector linear
30 Non-Linear Network Code è Index Code Y e1 + f e1 (X 1,X 2 ) Y e2 + f e2 (X 1,X 2 ) Y e3 + f e3 (X 1,X 2 ) Y e4 + f e4 (X 1,X 2 ) Y e5 + f e5 (X 1,X 2 ) Y e6 + f e6 (X 1,X 2 ) Y e7 + f e7 (X 1,X 2 ) Butterfly network Equivalent index code f ei (X 1,X 2 ) : message on edge e i
31 Diagonalization May Not Work for Non-Linear Butterfly network B 0 1 = g 0 1(Y e1, X) B 0 2 = g 0 2(Y e2, X) B 0 3 = g 0 3(Y e3, X) B 0 4 = g 0 4(Y e4, X) B 0 5 = g 0 5(Y e5, X) B 0 6 = g 0 6(Y e6, X) B 0 7 = g 0 7(Y e7, X) If we can we diagonalize? Given a nonlinear index code B 1 = g 1 (Ȳe, X) B 2 = g 2 (Ȳe, X) B 3 = g 3 (Ȳe, X) B 4 = g 4 (Ȳe, X) B 5 = g 5 (Ȳe, X) B 6 = g 6 (Ȳe, X) B 7 = g 7 (Ȳe, X)
32 Non-linear Index Code è Network Code Broadcast message Decoding function D Ue2 (0,X 1 ) D Ue3 (0,X 2 ) D Ue1 (0,X 1 ) D Ue4 (0,X 2 ) D Ue5 (0,Y e2,y e3 ) X1 =D Ut1 (B,Y e4,y e7 ) Y e4 = D Ue4 (B,X 2 ) Y e7 = D Ue7 (B,Y e5 ) D Ue7 (0,Y e5 ) D Ue6 (0,Y e5 ) Fix a value for B, say B=0 Destinations can decode with no errors: Recall that B=f(X 1,X 2, Y e1,,y e7 ) For a fixed B and given values of X 1 and X 2, there is a unique possible vector (Y e1,,y e7 ) Otherwise, U* cannot decode correctly
33 Dealing with Errors Consider an index code where decoding errors only happen when the broadcast message B=0 ε: Prob of error in the index code =1/2 c =1/2 7 = Prob of error in the network code =1 (bad). Claim: There exists σ, such that for B=σ, in the previous construction, the network code will have a prob of error at most ε (ε=error prob of the index code). Intuition: if for every value of B, the resulting network code will have a prob of error>ε, this implies that the prob of error in the index code >ε. A contradiction. B X=(X 1,X 2 ) Ye= Σ X =2 2 D U (B,X 1,X 2 ) : decoding error Each corresponds to a different good value of (X,Ye) Σ B =2 c Total # of <(1-ε) Σ B. Σ X But Σ B = Σ Ye è Total # of good values<(1-ε) Σ Ye. Σ X contradiction
34 Capacity Regions R X2 R B R B =7 1 P P H R N 1 R X1 :Capacity region of a network R X1 1 1 R X2 R I :Capacity region of the equivalent index code If there is a code that achieves P exactly, then P is in R I \ H, and vice versa. What if a sequence of points (not necessarily in H) converges to P. Does this mean that P is in R N? If true this will solve a long-standing open problem: Is zero-error capacity= ε-error capacity of networks? True for index coding problems [Langberg, Effros 11]
35 The Case of Co-located Sources R X2 R B R B =7 1 P P H R N 1 R X1 :Capacity region of a network 1 1 R X2 R I :Capacity region of the equivalent index code Theorem: For any network N with co-located sources one can efficiently construct an index coding problem I and an integer L such that R is in the capacity region of N iff R is in the capacity region of with broadcast length L. I
Index Coding Algorithms for Constructing Network Codes. Salim El Rouayheb. Illinois Institute of Technology, Chicago
Index Coding Algorithms for Constructing Network Codes Salim El Rouayheb Illinois Institute of Technology, Chicago Matlab Code with GUI for Constructing Linear Network Codes Matlab outputs network code
More informationAn Equivalence between Network Coding and Index Coding
An Equivalence between Network Coding and Index Coding Michelle Effros, Fellow, IEEE, Salim El Rouayheb, Member, IEEE, Michael Langberg, Member, IEEE 1 Abstract We show that the network coding and index
More informationIndex Coding via Random Coding
204 Iran Workshop on Communication and Information Theory (IWCIT) Index Coding via Random Coding Fatemeh Arbabjolfaei,BerndBandemer,Young-HanKim Department of Electrical and Computer Engineering University
More informationLocal Graph Coloring and Index Coding
1 Local Graph Coloring and Index Coding Karthikeyan Shanmugam, Alexandros G. Dimakis and Michael Langberg Department of Electrical and Computer Engineering University of Texas at Austin Austin, TX 78712-1684
More informationBroadcasting With Side Information
Department of Electrical and Computer Engineering Texas A&M Noga Alon, Avinatan Hasidim, Eyal Lubetzky, Uri Stav, Amit Weinstein, FOCS2008 Outline I shall avoid rigorous math and terminologies and be more
More informationSTAIRCASE CODES FOR FAST AND SECURE DISTRIBUTED COMPUTING
SIP Seminar of INSPIRE Lab, Rutgers New Jersey STAIRCASE CODES FOR FAST AND SECURE DISTRIBUTED COMPUTING Rawad Bitar Illinois Ins/tute of Technology Rutgers University Collaborators Parimal Parag and Salim
More informationTutorial on Coded Private Information Retrieval
Tutorial on Coded Private Information Retrieval Camilla Hollanti Aalto University, Finland 5th ICMCTA, Vihula, August 2017 Based on joint work with Salim El Rouayheb, Ragnar Freij-Hollanti, Oliver Gnilke,
More informationIndex coding with side information
Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated
More informationOptimal Index Codes via a Duality between Index Coding and Network Coding
Optimal Index Codes via a Duality between Index Coding and Network Coding Ashok Choudhary, Vamsi Krishna Gummadi, Prasad Krishnan Signal Processing and Communications Research Centre, International Institute
More informationPrivate Information Retrieval from MDS Coded Data in Distributed Storage Systems
Private Information Retrieval from MDS Coded Data in Distributed Storage Systems Joint work with Razane Tajeddine Salim El Rouayheb ECE Department Illinois Institute of Technology Motivation 1 Secure Multiparty
More informationOn linear index coding from graph homomorphism perspective
On linear index coding from graph homomorphism perspective Javad B. Ebrahimi, Mahdi Jafari Siavoshani Institute of Network Coding, Chinese University of Hong Kong, Hong Kong Computer Engineering Department,
More informationOptimal Index Codes with Near-Extreme Rates
0 IEEE International Symposium on Information Theory Proceedings Optimal Index Codes with Near-Extreme Rates Son Hoang Dau Division of Mathematical Sciences School of Phys. and Math. Sciences Nanyang Technological
More informationIndex Coding. Trivandrum School on Communication, Coding and Networking Prasad Krishnan
Index Coding Trivandrum School on Communication, Coding and Networking 2017 Prasad Krishnan Signal Processing and Communications Research Centre, International Institute of Information Technology, Hyderabad
More informationPrivate Information Retrieval from Coded Databases
Private Information Retrieval from Coded Databases arim Banawan Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 kbanawan@umdedu ulukus@umdedu
More informationIndex Coding With Erroneous Side Information
Index Coding With Erroneous Side Information Jae-Won Kim and Jong-Seon No, Fellow, IEEE 1 Abstract arxiv:1703.09361v1 [cs.it] 28 Mar 2017 In this paper, new index coding problems are studied, where each
More informationOn the Index Coding Problem and its Relation to Network Coding and Matroid Theory
1 On the Index Coding Problem and its Relation to Network Coding and Matroid Theory Salim Y. El Rouayheb, Alex Sprintson, and Costas N. Georghiades Department of Electrical and Computer Engineering Texas
More informationarxiv: v1 [cs.it] 23 Jan 2019
Single-Server Single-Message Online Private Information Retrieval with Side Information Fatemeh azemi, Esmaeil arimi, Anoosheh Heidarzadeh, and Alex Sprintson arxiv:90.07748v [cs.it] 3 Jan 09 Abstract
More informationOn the Hardness of Approximating the Network Coding Capacity
On the Hardness of Approximating the Network Coding Capacity Michael Langberg, Member, IEEE, and Alex Sprintson, Member, IEEE. 1 Abstract This work addresses the computational complexity of achieving the
More informationOn the Capacity Region for Secure Index Coding
On the Capacity Region for Secure Index Coding Yuxin Liu, Badri N. Vellambi, Young-Han Kim, and Parastoo Sadeghi Research School of Engineering, Australian National University, {yuxin.liu, parastoo.sadeghi}@anu.edu.au
More informationA Novel Index Coding Scheme and its Application to Coded Caching
A ovel Index Coding Scheme and its Application to Coded Caching ai Wan Laboratoire des Signaux et Systèmes L2S CentraleSupèlec-CRS-Universitè Paris-Sud 91192 Gif-sur-Yvette, France Email: kai.wan@u-psud.fr
More informationOptimal Scalar Linear Index Codes for Symmetric and Neighboring Side-information Problems
Optimal Scalar Linear Index Codes for Symmetric and Neighboring Side-information Problems Mahesh Babu Vaddi and B Sundar Rajan Department of Electrical Communication Engineering, Indian Institute of Science,
More informationNon-linear index coding outperforming the linear optimum
Non-linear index coding outperforming the linear optimum Eyal Lubetzky Uri Stav Abstract The following source coding problem was introduced by Birk and Kol: a sender holds a word x {0, 1} n, and wishes
More informationSimplified Composite Coding for Index Coding
Simplified Composite Coding for Index Coding Yucheng Liu, Parastoo Sadeghi Research School of Engineering Australian National University {yucheng.liu, parastoo.sadeghi}@anu.edu.au Fatemeh Arbabjolfaei,
More informationOn Secure Index Coding with Side Information
On Secure Index Coding with Side Information Son Hoang Dau Division of Mathematical Sciences School of Phys. and Math. Sciences Nanyang Technological University 21 Nanyang Link, Singapore 637371 Email:
More informationWeakly Secure Data Exchange with Generalized Reed Solomon Codes
Weakly Secure Data Exchange with Generalized Reed Solomon Codes Muxi Yan, Alex Sprintson, and Igor Zelenko Department of Electrical and Computer Engineering, Texas A&M University Department of Mathematics,
More informationLexicographic Products and the Power of Non-Linear Network Coding
Lexicographic Products and the Power of Non-Linear Network Coding Anna Blasiak Dept. of Computer Science Cornell University. ablasiak@cs.cornell.edu Robert Kleinberg Dept. of Computer Science Cornell University.
More informationError Correcting Index Codes and Matroids
Error Correcting Index Codes and Matroids Anoop Thomas and B Sundar Rajan Dept of ECE, IISc, Bangalore 5612, India, Email: {anoopt,bsrajan}@eceiiscernetin arxiv:15156v1 [csit 21 Jan 215 Abstract The connection
More informationSecure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel
Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu
More informationThe Minrank of Random Graphs
The Minrank of Random Graphs Alexander Golovnev Oded Regev Omri Weinstein Abstract The minrank of a directed graph G is the minimum rank of a matrix M that can be obtained from the adjacency matrix of
More informationReverse Edge Cut-Set Bounds for Secure Network Coding
Reverse Edge Cut-Set Bounds for Secure Network Coding Wentao Huang and Tracey Ho California Institute of Technology Michael Langberg University at Buffalo, SUNY Joerg Kliewer New Jersey Institute of Technology
More informationSemidefinite and Second Order Cone Programming Seminar Fall 2001 Lecture 5
Semidefinite and Second Order Cone Programming Seminar Fall 2001 Lecture 5 Instructor: Farid Alizadeh Scribe: Anton Riabov 10/08/2001 1 Overview We continue studying the maximum eigenvalue SDP, and generalize
More informationOn the Relation Between the Index Coding and the Network Coding Problems
On the Relation Between the Index Coding and the Network Coding Problems Salim El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University,
More informationA Polynomial-Time Algorithm for Pliable Index Coding
1 A Polynomial-Time Algorithm for Pliable Index Coding Linqi Song and Christina Fragouli arxiv:1610.06845v [cs.it] 9 Aug 017 Abstract In pliable index coding, we consider a server with m messages and n
More informationThe Capacity of Private Information Retrieval from Coded Databases
The Capacity of Private Information Retrieval from Coded Databases Karim Banawan Sennur Ulukus arxiv:6090838v [csit] 6 Sep 06 Department of Electrical and Computer Engineering University of Maryland, College
More informationOptimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction
Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi, Nihar B Shah, and P Vijay Kumar, Fellow, IEEE Abstract Regenerating codes
More informationSecurity in Locally Repairable Storage
1 Security in Locally Repairable Storage Abhishek Agarwal and Arya Mazumdar Abstract In this paper we extend the notion of locally repairable codes to secret sharing schemes. The main problem we consider
More informationLATTICES AND CODES ISHAY HAVIV TEL AVIV UNIVERSITY THE RAYMOND AND BEVERLY SACKLER FACULTY OF EXACT SCIENCES THE BLAVATNIK SCHOOL OF COMPUTER SCIENCE
TEL AVIV UNIVERSITY THE RAYMOND AND BEVERLY SACKLER FACULTY OF EXACT SCIENCES THE BLAVATNIK SCHOOL OF COMPUTER SCIENCE LATTICES AND CODES THESIS SUBMITTED FOR THE DEGREE OF DOCTOR OF PHILOSOPHY BY ISHAY
More informationOn the Existence of Optimal Exact-Repair MDS Codes for Distributed Storage
On the Existence of Optimal Exact-Repair MDS Codes for Distributed Storage Changho Suh Kannan Ramchandran Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report
More informationDistributed storage systems from combinatorial designs
Distributed storage systems from combinatorial designs Aditya Ramamoorthy November 20, 2014 Department of Electrical and Computer Engineering, Iowa State University, Joint work with Oktay Olmez (Ankara
More informationFractional Repetition Codes For Repair In Distributed Storage Systems
Fractional Repetition Codes For Repair In Distributed Storage Systems 1 Salim El Rouayheb, Kannan Ramchandran Dept. of Electrical Engineering and Computer Sciences University of California, Berkeley {salim,
More informationPrivate Information Retrieval from Coded Databases with Colluding Servers
SIAM J APPL ALGEBRA GEOMETRY Vol 1, pp 647 664 c 2017 Society for Industrial and Applied Mathematics Private Information Retrieval from Coded Databases with Colluding Servers Ragnar Freij-Hollanti, Oliver
More informationThe two-unicast problem
The two-unicast problem Sudeep Kamath, Venkat Anantharam, David Tse, Chih-Chun Wang ECE Department, Princeton University, sukamath@princeton.edu EECS Department, University of California, Berkeley, ananth@eecs.berkeley.edu
More informationLatency analysis for Distributed Storage
Latency analysis for Distributed Storage Parimal Parag Archana Bura Jean-François Chamberland Electrical Communication Engineering Indian Institute of Science Electrical and Computer Engineering Texas
More informationarxiv: v2 [cs.it] 13 Jul 2011
Index coding via linear programming Anna Blasiak Robert Kleinberg Eyal Lubetzky arxiv:1004.1379v2 [cs.it] 13 Jul 2011 Abstract Index Coding has received considerable attention recently motivated in part
More informationOn the Equivalency of Reliability and Security Metrics for Wireline Networks
On the Equivalency of Reliability and Security Metrics for Wireline Networks Mohammad Mahdi Mojahedian, Amin Gohari and Mohammad Reza Aref arxiv:1609.04586v1 [cs.it] 15 Sep 2016 Information Systems and
More informationCoded Caching with Low Subpacketization Levels
Electrical and Computer Engineering Conference Papers, Posters and Presentations Electrical and Computer Engineering 06 Coded Caching with Low Subpacetization Levels Li Tang Iowa State University, litang@iastateedu
More informationCoded Caching for Files with Distinct File Sizes
Coded Caching for Files with Distinct File Sizes Jinbei Zhang, Xiaojun Lin, Chih-Chun Wang, Xinbing Wang Shanghai Jiao Tong University Purdue University The Importance of Caching Server cache cache cache
More informationarxiv: v2 [cs.it] 23 Aug 2018
Storage Capacity as an Information-Theoretic Vertex Cover and the Index Coding Rate Arya Mazumdar Andrew McGregor Sofya Vorotnikova arxiv:1706.09197v2 [cs.it] 23 Aug 2018 Abstract Motivated by applications
More informationAn Ins t Ins an t t an Primer
An Instant Primer Links from Course Web Page Network Coding: An Instant Primer Fragouli, Boudec, and Widmer. Network Coding an Introduction Koetter and Medard On Randomized Network Coding Ho, Medard, Shi,
More information2014 IEEE International Symposium on Information Theory. Two-unicast is hard. David N.C. Tse
Two-unicast is hard Sudeep Kamath ECE Department, University of California, San Diego, CA, USA sukamath@ucsd.edu David N.C. Tse EECS Department, University of California, Berkeley, CA, USA dtse@eecs.berkeley.edu
More informationOn the Simulatability Condition in Key Generation Over a Non-authenticated Public Channel
On the Simulatability Condition in Key Generation Over a Non-authenticated Public Channel Wenwen Tu and Lifeng Lai Department of Electrical and Computer Engineering Worcester Polytechnic Institute Worcester,
More informationIN THIS paper, we consider a cooperative data exchange
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 62, NO. 7, JULY 2016 3785 Coded Cooperative Data Exchange for a Secret Key Thomas A. Courtade, Member, IEEE, and Thomas R. Halford, Member, IEEE Abstract We
More informationSecure RAID Schemes from EVENODD and STAR Codes
Secure RAID Schemes from EVENODD and STAR Codes Wentao Huang and Jehoshua Bruck California Institute of Technology, Pasadena, USA {whuang,bruck}@caltechedu Abstract We study secure RAID, ie, low-complexity
More informationPerformance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University
Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Joint work with Jinbei Zhang (SJTU), Chih-Chun Wang (Purdue) and Xinbing Wang (SJTU)
More informationSource Coding and Function Computation: Optimal Rate in Zero-Error and Vanishing Zero-Error Regime
Source Coding and Function Computation: Optimal Rate in Zero-Error and Vanishing Zero-Error Regime Solmaz Torabi Dept. of Electrical and Computer Engineering Drexel University st669@drexel.edu Advisor:
More informationContinuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks
Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer
More informationCoded Caching under Arbitrary Popularity Distributions
Coded Caching under Arbitrary Popularity Distributions Jinbei Zhang, Xiaojun Lin, Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University, China School of Electrical and Computer Engineering,
More informationWeakly Secure Regenerating Codes for Distributed Storage
Weakly Secure Regenerating Codes for Distributed Storage Swanand Kadhe and Alex Sprintson 1 arxiv:1405.2894v1 [cs.it] 12 May 2014 Abstract We consider the problem of secure distributed data storage under
More informationCoding with Constraints: Minimum Distance. Bounds and Systematic Constructions
Coding with Constraints: Minimum Distance 1 Bounds and Systematic Constructions Wael Halbawi, Matthew Thill & Babak Hassibi Department of Electrical Engineering arxiv:1501.07556v2 [cs.it] 19 Feb 2015 California
More informationAnalyzing Large Communication Networks
Analyzing Large Communication Networks Shirin Jalali joint work with Michelle Effros and Tracey Ho Dec. 2015 1 The gap Fundamental questions: i. What is the best achievable performance? ii. How to communicate
More informationDistributed Reed-Solomon Codes
Distributed Reed-Solomon Codes Farzad Parvaresh f.parvaresh@eng.ui.ac.ir University of Isfahan Institute for Network Coding CUHK, Hong Kong August 216 Research interests List-decoding of algebraic codes
More informationRegenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems
Regenerating Codes and Locally Recoverable 1 Codes for Distributed Storage Systems Yongjune Kim and Yaoqing Yang Abstract We survey the recent results on applying error control coding to distributed storage
More informationDistributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient
Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Viveck R Cadambe, Syed A Jafar, Hamed Maleki Electrical Engineering and
More informationProgress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes
Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes Ankit Singh Rawat CS Department Carnegie Mellon University Pittsburgh, PA 523 Email: asrawat@andrewcmuedu O Ozan Koyluoglu Department
More informationDynamic Power Allocation and Routing for Time Varying Wireless Networks
Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,
More informationData Gathering and Personalized Broadcasting in Radio Grids with Interferences
Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,, Bi Li a,b, Nicolas Nisse a, Hervé Rivano c, Min-Li Yu d a Coati Project, INRIA I3S(CNRS/UNSA), Sophia
More informationPrivate Information Retrieval from MDS Coded Databases with Colluding Servers under Several Variant Models
1 Private Information Retrieval from MDS Coded Databases with Colluding Servers under Several Variant Models Yiwei Zhang and Gennian Ge arxiv:170503186v2 [csit] 11 Oct 2017 Abstract Private information
More informationOn Two Class-Constrained Versions of the Multiple Knapsack Problem
On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic
More informationGeneralized Alignment Chain: Improved Converse Results for Index Coding
Generalized Alignent Chain: Iproved Converse Results for Index Coding Yucheng Liu and Parastoo Sadeghi Research School of Electrical, Energy and Materials Engineering Australian National University, Canberra,
More informationPrivacy and Fault-Tolerance in Distributed Optimization. Nitin Vaidya University of Illinois at Urbana-Champaign
Privacy and Fault-Tolerance in Distributed Optimization Nitin Vaidya University of Illinois at Urbana-Champaign Acknowledgements Shripad Gade Lili Su argmin x2x SX i=1 i f i (x) Applications g f i (x)
More informationThe Power of Sparse and Low-Rank Optimization Paradigms for Network Densification
The Power of Sparse and Low-Rank Optimization Paradigms for Network Densification Yuanming Shi School of Information Science and Technology ShanghaiTech University 1 Outline Introduction Two Vignettes:
More informationCommunicating the sum of sources in a 3-sources/3-terminals network
Communicating the sum of sources in a 3-sources/3-terminals network Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel Email: mikel@openu.ac.il Aditya Ramamoorthy
More informationSparse Regression Codes for Multi-terminal Source and Channel Coding
Sparse Regression Codes for Multi-terminal Source and Channel Coding Ramji Venkataramanan Yale University Sekhar Tatikonda Allerton 2012 1 / 20 Compression with Side-Information X Encoder Rate R Decoder
More informationHarnessing Interaction in Bursty Interference Networks
215 IEEE Hong Kong-Taiwan Joint Workshop on Information Theory and Communications Harnessing Interaction in Bursty Interference Networks I-Hsiang Wang NIC Lab, NTU GICE 1/19, 215 Modern Wireless: Grand
More informationON INDEX CODING WITH SIDE INFORMATION
ON INDEX CODING WITH SIDE INFORMATION DAU SON HOANG SCHOOL OF PHYSICAL & MATHEMATICAL SCIENCES 2012 ON INDEX CODING WITH SIDE INFORMATION DAU SON HOANG School of Physical & Mathematical Sciences A thesis
More informationBounds on Shannon Capacity and Ramsey Numbers from Product of Graphs
Bounds on Shannon Capacity and Ramsey Numbers from Product of Graphs Xiaodong Xu Guangxi Academy of Sciences Nanning, Guangxi 530007, China xxdmaths@sina.com and Stanis law P. Radziszowski Department of
More informationStaircase Codes for Secret Sharing with Optimal Communication and Read Overheads
1 Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads Rawad Bitar, Student Member, IEEE and Salim El Rouayheb, Member, IEEE Abstract We study the communication efficient secret
More informationPrivacy of Numeric Queries Via Simple Value Perturbation. The Laplace Mechanism
Privacy of Numeric Queries Via Simple Value Perturbation The Laplace Mechanism Differential Privacy A Basic Model Let X represent an abstract data universe and D be a multi-set of elements from X. i.e.
More informationExplicit MBR All-Symbol Locality Codes
Explicit MBR All-Symbol Locality Codes Govinda M. Kamath, Natalia Silberstein, N. Prakash, Ankit S. Rawat, V. Lalitha, O. Ozan Koyluoglu, P. Vijay Kumar, and Sriram Vishwanath 1 Abstract arxiv:1302.0744v2
More informationStrong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach
Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach Silas Fong (Joint work with Vincent Tan) Department of Electrical & Computer Engineering National University
More informationCanonical Problem Forms. Ryan Tibshirani Convex Optimization
Canonical Problem Forms Ryan Tibshirani Convex Optimization 10-725 Last time: optimization basics Optimization terology (e.g., criterion, constraints, feasible points, solutions) Properties and first-order
More informationCan Linear Minimum Storage Regenerating Codes be Universally Secure?
Can Linear Minimum Storage Regenerating Codes be Universally Secure? Sreechakra Goparaju University of California, San Diego La Jolla, CA, USA Email: sgoparaju@ucsd.edu Salim El Rouayheb Illinois Institute
More informationOn Gaussian MIMO Broadcast Channels with Common and Private Messages
On Gaussian MIMO Broadcast Channels with Common and Private Messages Ersen Ekrem Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 ersen@umd.edu
More informationExploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions
Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions Jayant Apte John Walsh Department of Electrical and Computer Engineering Drexel University, Philadelphia NetCod, 205 NSF
More informationRobust Network Codes for Unicast Connections: A Case Study
Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,
More informationEfficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel
Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Ahmad Abu Al Haija ECE Department, McGill University, Montreal, QC, Canada Email: ahmad.abualhaija@mail.mcgill.ca
More informationECS 120 Lesson 18 Decidable Problems, the Halting Problem
ECS 120 Lesson 18 Decidable Problems, the Halting Problem Oliver Kreylos Friday, May 11th, 2001 In the last lecture, we had a look at a problem that we claimed was not solvable by an algorithm the problem
More informationChapter 1: Introduction to Probability Theory
ECE5: Stochastic Signals and Systems Fall 8 Lecture - September 6, 8 Prof. Salim El Rouayheb Scribe: Peiwen Tian, Lu Liu, Ghadir Ayache Chapter : Introduction to Probability Theory Axioms of Probability
More informationA Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying
A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,
More informationInstantly Decodable Network Codes for Real-Time Applications
Instantly Decodable Network Codes for Real-Time Applications Anh Le, Arash S. Tehrani +, Alexandros G. Dimakis, Athina Markopoulou {anh.le, athina}@uci.edu University of California, Irvine + arash.sabertehrani@usc.edu
More informationThe Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel
The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel Stefano Rini, Daniela Tuninetti, and Natasha Devroye Department
More informationKey words: Batch codes, error-correcting codes, computationally-private information retrieval, load balancing, distributed storage.
Linear Batch Codes Helger Lipmaa and Vitaly Skachek Abstract In an application, where a client wants to obtain many symbols from a large database, it is often desirable to balance the load. Batch codes
More informationLexicographic products and the power of non-linear network coding
Lexicographic products and the power of non-linear network coding Anna Blasiak Robert Kleinberg Eyal Lubetzky Abstract We introduce a technique for establishing and amplifying gaps between parameters of
More informationThe Capacity Region of the Gaussian Cognitive Radio Channels at High SNR
The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR 1 Stefano Rini, Daniela Tuninetti and Natasha Devroye srini2, danielat, devroye @ece.uic.edu University of Illinois at Chicago Abstract
More informationHierarchies. 1. Lovasz-Schrijver (LS), LS+ 2. Sherali Adams 3. Lasserre 4. Mixed Hierarchy (recently used) Idea: P = conv(subset S of 0,1 n )
Hierarchies Today 1. Some more familiarity with Hierarchies 2. Examples of some basic upper and lower bounds 3. Survey of recent results (possible material for future talks) Hierarchies 1. Lovasz-Schrijver
More informationReport on PIR with Low Storage Overhead
Report on PIR with Low Storage Overhead Ehsan Ebrahimi Targhi University of Tartu December 15, 2015 Abstract Private information retrieval (PIR) protocol, introduced in 1995 by Chor, Goldreich, Kushilevitz
More informationFundamental Limits on Latency in Small-Cell Caching Systems: An Information-Theoretic Analysis
Fundamental Limits on Latency in Small-ell aching Systems: An Information-Theoretic Analysis Seyyed Mohammadreza Azimi, Osvaldo Simeone, and Ravi Tandon Abstract aching of popular multimedia content at
More informationOn MBR codes with replication
On MBR codes with replication M. Nikhil Krishnan and P. Vijay Kumar, Fellow, IEEE Department of Electrical Communication Engineering, Indian Institute of Science, Bangalore. Email: nikhilkrishnan.m@gmail.com,
More informationNetworks and Matroids
Adaptive Signal Processing and Information Theory Research Group ECE Department, Drexel University June 1, 2012 Outline 1 Mappings and Definitions Source Mapping: S : V 2 µ, µ is message set. Message Assignment:
More informationSome Goodness Properties of LDA Lattices
Some Goodness Properties of LDA Lattices Shashank Vatedka and Navin Kashyap {shashank,nkashyap}@eceiiscernetin Department of ECE Indian Institute of Science Bangalore, India Information Theory Workshop
More information