RESEARCH STATEMENT SHIRIN SAEEDI BIDOKHTI
|
|
- Lauren Payne
- 6 years ago
- Views:
Transcription
1 RESEARCH STATEMENT SHIRIN SAEEDI BIDOKHTI The emerging technology of Internet of Things (IoT) has raised fundamental challenges in the design of practical and high performance data transmission and storage systems. Current network architectures and communication schemes are incapable of supporting the massive data, high rate, low latency, and large number of users that are envisioned in the applications of IoT. I am interested in novel cloud-based and cache-aided network architectures, and the opportunities they can provide to fundamentally boost the performance of communication networks. In particular, I seek to answer questions such as: How much coordination is needed in a network to support a desired rate and how to establish this coordination among the network nodes? How to utilize local storage units at network nodes to improve rate and latency? What is the tradeoff between communication and computation in distributed systems? How to compress data using minimum storage cost such that the important features of the data are preserved in the compressed domain? To approach these questions, I use tools from information theory, network theory, optimization, and algorithms to develop coding strategies that are efficient with respect to rate, energy, memory, complexity, latency, and cost. In the long term, I aim to develop a mathematical understanding of information extraction, storage and communication for data analysis, where the challenge is to learn certain information, rather than to reconstruct the entire data exactly. In the following, I present some of my past research contributions and future research directions. 1. Cloud Radio Access Networks Virtual BBU Pool BBU BBU BBU Centralized Baseband Pool Cloud Computing Fronthaul Network Collaborative Radio Interference Management Fig 1 A Cloud Radio Access Network Cloud Radio Access Networks (C-RANs) are among the most promising proposed technologies for the next generation of mobile networks. They combine advances in both wireless networks and cloud distributed processing to improve spectral efficiency and energy efficiency. By aggregating all processing units (BBUs) into a central cloud and distributing the radio heads (s) in desired areas, the C-RAN architecture creates novel opportunities for coordination, advanced interference management, and multi-cell processing. This architecture is shown in Fig. 1 and consists of a cloud processor, a fronthaul network, and an interference network. One of the main challenges in exploiting the above mentioned opportunities is due to the inherent interplay between coordination and rate. On the one hand, we would like to design and harness the interference to the benefit of the users, rather than avoid it. To this end, we need to jointly design the code accross the s and thus fully coordinate them. On the other hand, the fronthaul links are costly and scarce; therefore, they can not support the communication overhead that having full coordination imposes. To overcome these challenges in a single-user C-RAN, we proposed a coordinated coding scheme [1, 2, 3, 4] that utilizes the fronthaul network to send not only information bits, but also coordination bits. We could thus establish partial coordination among the s depending on the available fronthaul bandwidth and the interference network. In particular, we provided a fundamental interplay between coordination and rate, as explained below. We study the behavior of any coding scheme across network cuts. While the cut-set bound has remained the upper bound of choice in networks due to its simplicity, it is well known that it is not tight. In particular, in the context of C-RAN downlinks, we show in [1] that the cut-set bound does not well capture
2 the tradeoff between efficiency of communication on the fronthaul links and the desired coordination among the s. For example for the network of Fig. 2, the simplest cut-set bound is given by (1) R max min{c 1 + C 2, I(X p(x 1,x 2 ) }{{} 1 X 2 ; Y )} }{{} Cut #1 Cut #2 where R is the rate with which the user is served and I(X 1 X 2 ; Y ) captures the amount of information passing through the second cut. Suppose we Fig 2 Cut-set bound have a scheme that performs with a rate close to the first term in (1). This means that the fronthaul links carry independent information. However, by transmitting independent information to the two s, one cannot establish coordination between them (i.e., we can only establish product distributions p(x 1 )p(x 2 ), rather than general joint distributions p(x 1, x 2 ) which is allowed in the maximization in (1)). So the tradeoff between rate and coordination is not well-captured through the cutset bound. In a series of works [5, 3, 4, 1, 2], we developed a new technique to better capture and quantify this tradeoff. This is done by introducing an auxiliary channel from the output of the channel Y with the goal of making X 1 and X 2 conditionally independent. In other words, we find the common information between the s signals and relate it to the overhead that is needed on the fronthaul network to establish the desired coordination among the s. Future Work. Our previous work points to the fact that the component of coordination is missing from the existing frameworks for wireless network information flow and it lays a clear and promising path to capture the essence of coordination in general networks. To see why coordination bits (in addition to the actual information bits) need to flow in a network (in an efficient code design), we proceed as follows: Make a cut in the network, disconnecting the source and the destination into two layers (see Fig. 3). We ask two questions that are inter-related: (i) For a given rate to be feasible on the second layer, how much coordination is needed among the involved nodes? (ii) How should coordination be established on the nodes of the second layer, and what is its associated communication cost on the first layer? Many interesting questions remain open and timely to pursue: How can we develop a general framework to explain how information and coordination flow on wireless networks? How does coordination among network nodes provide new opportunities and techniques in interference management for multi-user C-RANs? When is coordination necessary and what is its cost? How can we trade rate with complexity of code design in order to come up with low complexity and near-optimal schemes? 2. Cache-Aided Networks Fig 3 Interplay between coordination and fronthaul link capacities Caching is an idea from content delivery networks to replicate and store information across networks to balance traffic load and improve accessibility/latency. Recently, caching has found its way into wireless networks and promised new opportunities that build on the inherent features of wireless networks, namely the broadcast nature of transmission and the superposition nature of reception. In cache-aided systems, communication takes place in two phases: a caching phase (typically done in low-traffic periods) in which the server stores parts of its data in local storage units of the users before knowing their demands, and a delivery phase (typically done in peak hours) in which users are served based on their actual demands. Prior work showed that in a noise-free system, a smart design of the caching scheme offers global caching gains that scale with the number of users [6]. To investigate the gains of caching in wireless networks, we initiated a study on the role of caching in 2
3 broadcast networks, where a noisy version of the sent signal is overheard at every user (see Fig 4). A common approach, which was believed to be near-optimal, is to combine caching and channel coding using separate cachechannel architectures (see Fig 5). Separation is however suboptimal, as we explain below. In [7, 8], we proposed a joint cache-channel coding architecture where the cache content is not only helpful in conveying desired information bits, but Fig 4 A cache-aided broadcast network is also essential for channel decoding. The role of caches is thus two-fold: to store information and to help with the decoding. This approach significantly improves on state-of-the-art schemes in terms of rate and latency and offers new global caching gains. In particular, it provides a scheme where weaker users are not rate bottlenecks in the network. Joint cache-channel coding is particularly beneficial in heterogeneous networks. Consequently, we have developed coding schemes for broadcast networks (including Gaussian networks) with heterogeneous cache sizes and asked the following question: Given a total amount of cache memory, how should one allocate it to individual users in order to maximize the overall communication rate? We answered this question in a series of works [9, 10, 11] and proposed a cache allocation that carefully assigns larger cache memories to weaker receivers to best utilize the dual role of the caches. An interesting application of this coding scheme is in (virtual) state-adaptive cache allocation in time-varying channels. In particular, we showed the benefits of the scheme in terms of rate and decoding latency in [12]. We have further proved performance guarantees for the scheme in [7, 13, 14]. Our bounds are tighter than all previously known bounds in noisy and noiseless broadcast networks and provide good approximations on the rate-memory tradeoffs. Caching Encoder Channel Encoder Encoding Channel Decoder Caching Decoder Decoding Fig 5 Separate cachechannel architecture is not optimal Arguably, there is a close connection between the problems of caching, index coding, network coding, and feedback in broadcast networks. For example, the coding technique proposed in [6] is a reminiscent of the feedback algorithm in [15] and both use ideas from network coding and index coding. The idea is to treat any information that is stored and/or overheard by a user as side information in later stages. This becomes challenging in practical systems where the environment is dynamic; e.g. channels with memory. In a series of works, we considered broadcast packet erasure channels and investigated the role of feedback when channels have memory. This problem was brought to our attention by Munich Aerospace (DLR) in a joint project, and our results were published in [16, 17, 18]. We modeled the channel memory using a finite-state machine and considered the following scenarios: (i) the channel state is visible to the transmitter, (ii) the channel state is not observable. In both scenarios, we used tools from network coding and queuing theory and developed max-weight backpressure algorithms that are rate-optimal and implementable. Moreover, we provided an analytic framework for our algorithms by devising their probabilistic counterparts which have a similar performance. We showed that in this probabilistic paradigm, analyzing the performance of an algorithm is equivalent to solving a max-flow min-cut problem. Future Work. Caching and feedback will be key components in future wireless networks as a solution to the rapidly growing number of users and demands. They both create novel opportunities for broadcasting and thus rate efficiency. In current code designs, rate-efficiency usually comes at the expense of complex code designs, and complexity of code design often manifests itself in decoding delay. Motivated by the importance of decoding delay in streaming applications, I am interested in developing a new understanding of the fundamental tradeoffs between rate and decoding delay and studying the role of feedback and caching in this regard. While these questions, in their general forms, are challenging open problems, I believe that they could be approached and fundamentally understood in the class of network codes. In particular, given a network coding scheme, one could develop an equivalent network of queues where different queues store 3
4 and represent different classes of coded symbols (depending on how many information bits they encode). Using tools from information theory, network coding, queuing theory, and graph theory, we can then analyze the behavior of the code with respect to network stability, rate-performance, decoding latency, etc. Many interesting research directions are also unpaved in dynamic environments and under practical constraints (noisy feedback, cache failure, etc.). Although these constraints are often well captured and dealt with on the network layer, a separate treatment of the network layer and the physical layer is oftentimes suboptimal compared to what information theoretical limits promise. How can we design cache/delivery schemes in networks where users demands depend on their browsing history? When should we use the network to cache and when should we use it to deliver messages in a dynamic network environment? How can we devise robust caching and feedback algorithms that allow reliable storage and transmission even when local storage units fail or when the network dynamics are unknown? 3. Data Compression for Data Analysis In the era of big data, the high rate at which data is acquired and the high dimensional nature of it makes its storage, processing, and analysis a grand challenge in terms of accuracy as well as computational feasibility. Conventional data compression techniques, such as the Lempel-Ziv algorithm, are used in practice to reduce the space required for storing data. Unfortunately, many important features of the data are inaccessible in the compressed domain. For example, in genomic data analysis, we may need to access certain positions of the genome sequence (i.e., random access) across several individuals. To access the data and analyze it, under the common existing architectures, one has to fully decompress the data and work with the original dataset from scratch. Existing solutions in the computer science literature include succinct data structures that allow certain types of query in the compressed domain [19] and heuristic hashing methods for similarity search. Previous work on this topic is limited [20, 21] but suggests that information theory is a complementary aspect that is missing from current literature. Two of my recent and ongoing works are on developing compression techniques for similarity search and random access query. In [22], we have developed and analyzed compressors that encode two independent sources for similarity query. Here, the goal of compression is not to recover the source sequences, but to ensure a reliable answer to the following question: Are the source sequences similar with respect to a given distance measure?. The outputs of such compressors provide us with hashing of the source sequences such that similarity search can be run on the compressed (hashed) dataset rather than the original dataset. In [23], we have built on the constructions in [20] and [24], and developed a universal two-step compressor that can compress any unknown iid source to its entropy (optimal compression), while ensuring random access to the source sequence by accessing only a constant number of stored bits. The merit of such compressors is that one does not need to decompress the entire sequence (and hence access all stored bits) in order to query a single position of the sequence. Our construction is fairly general and we believe its adaptations may be capable of transforming any good source code into one with random access property. We are currently working on such universal compressors for stationary sources. Future Work. More broadly, my goal is to develop the underlying theory and algorithms for modern compressors that keep the geometric structure of the dataset accessible in the compressed domain. With this approach, I aim to create a counterpart for many of the basic analysis tools (e.g., similarity search, clustering) in the lower dimensional compressed domain. This will significantly reduce the storage/processing memory and speed up the analysis. References [1] S. Saeedi Bidokhti and G. Kramer, Capacity bounds for diamond networks with an orthogonal broadcast channel, IEEE Trans. Inf. Theory, vol. 62, pp , Dec [2] S. Saeedi Bidokhti, G. Kramer, and S. Shamai, Capacity bounds on the downlink of symmetric, multi-relay, singlereceiver C-RAN networks, Entropy, vol. 19, no. 11, [3] S. Saeedi Bidokhti and G. Kramer, Capacity bounds for a class of diamond networks, in IEEE Int. Symp. Inf. Theory, Jun
5 [4] S. Saeedi Bidokhti and G. Kramer, Capacity of two-relay diamond networks with rate-limited links to the relays and a binary adder multiple access channel, in IEEE Int. Symp. Inf. Theory, Jul [5] S. Saeedi Bidokhti and G. Kramer, An application of a wringing lemma to the multiple access channel with cooperative encoders, in Proc. Iran Workshop on Commun. and Inf. Theory, May [6] M. Maddah-Ali and U. Niesen, Fundamental limits of caching, IEEE Trans. Inf. Theory, vol. 60, pp , May [7] S. Saeedi Bidokhti, M. Wigger, and R. Timo, Noisy broadcast networks with receiver caching, submitted to IEEE Trans. Inf. Theory, May [8] S. Saeedi Bidokhti, M. Wigger, and R. Timo, Erasure broadcast networks with receiver caching, in IEEE Int. Symp. Inf. Theory, Jul [9] S. Saeedi Bidokhti, M. Wigger, and A. Yener, Cache assignment on noisy broadcast channels, to be submitted to IEEE Trans. Inf. Theory, [10] S. Saeedi Bidokhti, M. Wigger, and A. Yener, Gaussian broadcast channels with receiver cache assignment, submitted to Int. Conf. Communications, Oct [11] S. S. Bidokhti, M. Wigger, and A. Yener, Benefits of cache assignment on degraded broadcast channels, in IEEE Int. Symp. Inf. Theory, pp , June [12] S. Saeedi Bidokhti, M. Wigger, A. Yener, and A. E. Gamal, State-adaptive coded caching for symmetric broadcast channels, in Asilomar, Nov [13] S. Saeedi Bidokhti, M. Wigger, and R. Timo, An upper bound on the capacity-memory tradeoff of degraded broadcast channels, in Int. Symp. Turbo Codes & Iterative Information Processing, Sept [14] C.-Y. Wang, S. Saeedi Bidokhti, and M. Wigger, Improved converses and gap-results for coded caching, submitted to IEEE Int. Symp. Inf. Theory, [15] L. Georgiadis and L. Tassiulas, Broadcast erasure channel with feedback-capacity and algorithms, in IEEE Workshop on Network Coding, Jun [16] M. Heindelmair, N. Reyhanian, and S. Saeedi Bidokhti, On the capacity region of the two-user broadcast packet erasure channel with feedback and memory, in Allerton Conf. Comm., Control, and Computing, Oct [17] M. Heindelmair and S. Saeedi Bidokhti, Capacity regions of two-user broadcast erasure channels with feedback and hidden memory, in IEEE Int. Symp. Inf. Theory, Jun [18] M. Heindelmair and S. Saeedi Bidokhti, Capacity regions of two-user broadcast erasure channels with feedback and memory, submitted to IEEE Trans. Inf. Theory, Dec [19] G. J. Jacobson, Succinct static data structures. PhD thesis, Carnegie Mellon University, [20] A. Mazumdar, V. Chandar, and G. W. Wornell, Local recovery in data compression for general sources, in Int. Symp. Inf. Theory, [21] A. Ingber, T. Courtade, and T. Weissman, Compression for quadratic similarity queries, IEEE Trans. Inf. Theory, vol. 61, pp , May [22] K. Tatwawadi, S. Saeedi Bidokhti, and T. Weissman, Universal compression of stationary sources with constant random access, work in preparation. [23] S. Saeedi Bidokhti and T. Weissman, Compression of independent sources for similarity query, work in preparation. [24] H. Buhrman, P. B. Miltersen, J. Radhakrishnan, and S. Venkatesh, Are bitvectors optimal?, SIAM J. Comput., vol. 31, pp , June
Storage-Latency Trade-off in Cache-Aided Fog Radio Access Networks
Storage-Latency Trade-off in Cache-Aided Fog Radio Access Networks Joan S. Pujol Roig Imperial College London jp5215@imperial.ac.uk Filippo Tosato Toshiba Research Europe filippo.tosato@toshiba-trel.com
More informationOptimization of Heterogeneous Caching Systems with Rate Limited Links
IEEE ICC Communication Theory Symposium Optimization of Heterogeneous Caching Systems with Rate Limited Links Abdelrahman M Ibrahim, Ahmed A Zewail, and Aylin Yener Wireless Communications and Networking
More informationIEEE networking projects
IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified
More informationDiversity Coded 5G Fronthaul Wireless Networks
IEEE Wireless Telecommunication Symposium (WTS) 2017 Diversity Coded 5G Fronthaul Wireless Networks Nabeel Sulieman, Kemal Davaslioglu, and Richard D. Gitlin Department of Electrical Engineering University
More informationDegrees of Freedom in Cached Interference Networks with Limited Backhaul
Degrees of Freedom in Cached Interference Networks with Limited Backhaul Vincent LAU, Department of ECE, Hong Kong University of Science and Technology (A) Motivation Interference Channels 3 No side information
More informationCorrelation-Aware Distributed Caching and Coded Delivery
Correlation-Aware Distributed Caching and Coded Delivery P. Hassanzadeh, A. Tulino, J. Llorca, E. Erkip arxiv:1609.05836v1 [cs.it] 19 Sep 2016 Abstract Cache-aided coded multicast leverages side information
More informationRandomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching
Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching An Liu, Vincent LAU and Wei Han the Hong Kong University of Science and Technology Background 2 Cloud Radio Access Networks
More informationEnergy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks
Energy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks Reza Aminzadeh Electrical Engineering Department Khavaran Higher Education Institute Mashhad, Iran. reza.aminzadeh@ieee.com
More informationResource Allocation Algorithms Design for 5G Wireless Networks
Resource Allocation Algorithms Design for 5G Wireless Networks Vincent Wong Department of Electrical and Computer Engineering The University of British Columbia November 5, 2016 0 5G Overview User Data
More informationDelay-minimal Transmission for Energy Constrained Wireless Communications
Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu
More informationBenefits of Coded Placement for Networks with Heterogeneous Cache Sizes
Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes Abdelrahman M. Ibrahim, Ahmed A. Zewail, and Aylin Yener ireless Communications and Networking Laboratory CAN Electrical Engineering
More informationA New Combinatorial Design of Coded Distributed Computing
A New Combinatorial Design of Coded Distributed Computing Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT, USA
More informationCloud Processing and Edge Caching in HetNets: A Delivery Time Perspective
Cloud Processing and Edge Caching in HetNets: A Delivery Time Perspective Aydin Sezgin Joint work with: Jaber Kakar, Soheil Gherekhloo and Zohaib Hassan Awan Institute for Digital Communication Systems
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY 2011 2837 Approximate Capacity of a Class of Gaussian Interference-Relay Networks Soheil Mohajer, Member, IEEE, Suhas N. Diggavi, Member, IEEE,
More informationNovel Decentralized Coded Caching through Coded Prefetching
ovel Decentralized Coded Caching through Coded Prefetching Yi-Peng Wei Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 2072 ypwei@umd.edu ulukus@umd.edu
More informationDynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication
Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication P.Deepa 1, Dr. P.S.K Patra 2 1 Department of Computer Science and Engineering, 2 Head of the Department, Agni College of
More informationA CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK
Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,
More informationEfficient, Scalable, and Provenance-Aware Management of Linked Data
Efficient, Scalable, and Provenance-Aware Management of Linked Data Marcin Wylot 1 Motivation and objectives of the research The proliferation of heterogeneous Linked Data on the Web requires data management
More informationAPP-PHY Interactions in Wireless Networks
University of Minnesota September 29, 2009 APP-PHY Interactions in Wireless Networks Vince Poor (poor@princeton.edu) APP-PHY Interactions in Wireless Nets Wireless Networks: Layers Application (APP) Web
More informationA Theory of Network Equivalence Part I: Point-to-Point Channels
972 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 2, FEBRUARY 2011 A Theory of Network Equivalence Part I: Point-to-Point Channels Ralf Koetter, Fellow, IEEE, Michelle Effros, Fellow, IEEE, and
More informationResearch Statement. Alon Kipnis. Research overview: Signal processing under communication constraints
Research overview: Signal processing under communication constraints Modern challenges in signal processing and statistics impose severe limitations on the amount of memory in the digital representation
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3413 Relay Networks With Delays Abbas El Gamal, Fellow, IEEE, Navid Hassanpour, and James Mammen, Student Member, IEEE Abstract The
More informationInformation Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast
2005 Conference on Information Sciences and Systems, The Johns Hopkins University, March 16 18, 2005 Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast Yunnan Wu
More informationOPTIMIZING THE DELAY IN MULTIHOP WIRELESS NETWORK USING NETWORK CODING AND SUCCESSIVE INTERFERENCE CANCELLATION
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN
I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 19-24 ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN 1 R. MANIKANDAN, 2 K. ARULMANI AND 3 K. SELVAKUMAR Department of Computer Science and Engineering,
More informationCDMA-Based MAC Protocol for Wireless Ad Hoc Networks
CDMA-Based MAC Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz Presented by: Habibullah Pagarkar for 600.647-Advanced Topics in Wireless Networks. JHU. Spring 04 Today s Presentation
More informationSome Optimization Trade-offs in Wireless Network Coding
Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,
More informationOptimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions
Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions 2007 IEEE Communication Theory Workshop Christian R. Berger 1, Shengli Zhou 1, Yonggang Wen 2, Peter Willett 1 and
More informationKeywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION
Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1
More informationCache-Aided Coded Multicast for Correlated Sources
Cache-Aided Coded Multicast for Correlated Sources P. Hassanzadeh A. Tulino J. Llorca E. Erkip arxiv:1609.05831v1 [cs.it] 19 Sep 2016 Abstract The combination of edge caching and coded multicasting is
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 3, MARCH Lifeng Lai, Ke Liu, Member, IEEE, and Hesham El Gamal, Senior Member, IEEE
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 3, MARCH 2006 805 The Three-Node Wireless Network: Achievable Rates and Cooperation Strategies Lifeng Lai, Ke Liu, Member, IEEE, and Hesham El Gamal,
More informationQUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose
QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California,
More informationVolume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient
More informationCLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS
http:// CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS M.Sengaliappan 1, K.Kumaravel 2, Dr. A.Marimuthu 3 1 Ph.D( Scholar), Govt. Arts College, Coimbatore, Tamil Nadu, India 2 Ph.D(Scholar), Govt.,
More informationARELAY network consists of a pair of source and destination
158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper
More informationFundamental Limits of Caching: Improved Bounds For Small Buffer Users
Fundamental Limits of Caching: Improved Bounds For Small Buffer Users Zhi Chen Member, IEEE Pingyi Fan Senior Member, IEEE and Khaled Ben Letaief Fellow, IEEE 1 Abstract arxiv:1407.1935v2 [cs.it] 6 Nov
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationCoded Caching for a Large Number Of Users
Coded Caching for a Large Number Of Users 1 Mohammad Mohammadi Amiri, Qianqian Yang, and Deniz Gündüz Abstract arxiv:1605.01993v1 [cs.it] 6 May 2016 Information theoretic analysis of a coded caching system
More informationModule 1. Introduction. Version 2, CSE IIT, Kharagpur
Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 9, SEPTEMBER
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 9, SEPTEMBER 2005 3037 Cooperative Strategies and Capacity Theorems for Relay Networks Gerhard Kramer, Member, IEEE, Michael Gastpar, Member, IEEE,
More informationADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT
ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision
More informationExact Optimized-cost Repair in Multi-hop Distributed Storage Networks
Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Majid Gerami, Ming Xiao Communication Theory Lab, Royal Institute of Technology, KTH, Sweden, E-mail: {gerami, mingx@kthse arxiv:14012774v1
More informationPUBLICATIONS. Journal Papers
PUBLICATIONS Journal Papers [J1] X. Wu and L.-L. Xie, Asymptotic equipartition property of output when rate is above capacity, submitted to IEEE Transactions on Information Theory, August 2009. [J2] A.
More informationDISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK
DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:
More informationAbstract of the Book
Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the
More informationVenkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91)
Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: +91-94482 26130 Dept. of Electrical Communication Engg. (ECE) Fax: (+91)-80-2360 0991 Indian Institute of Science E-mail: rvenkat@ece.iisc.ernet.in
More informationEfficient Message Caching Scheme for MANET
Efficient Message Caching Scheme for MANET S. Manju 1, Mrs. K. Vanitha, M.E., (Ph.D) 2 II ME (CSE), Dept. of CSE, Al-Ameen Engineering College, Erode, Tamil Nadu, India 1 Assistant Professor, Dept. of
More informationWireless Map-Reduce Distributed Computing with Full-Duplex Radios and Imperfect CSI
1 Wireless Map-Reduce Distributed Computing with Full-Duplex Radios and Imperfect CSI Sukjong Ha 1, Jingjing Zhang 2, Osvaldo Simeone 2, and Joonhyuk Kang 1 1 KAIST, School of Electrical Engineering, South
More informationSpatio-temporal Range Searching Over Compressed Kinetic Sensor Data. Sorelle A. Friedler Google Joint work with David M. Mount
Spatio-temporal Range Searching Over Compressed Kinetic Sensor Data Sorelle A. Friedler Google Joint work with David M. Mount Motivation Kinetic data: data generated by moving objects Sensors collect data
More informationCHARACTERIZING the capacity region of wireless
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 5, MAY 2010 2249 The Balanced Unicast and Multicast Capacity Regions of Large Wireless Networks Abstract We consider the question of determining the
More informationWireless Networks Research Seminar April 22nd 2013
Wireless Networks Research Seminar April 22nd 2013 Distributed Transmit Power Minimization in Wireless Sensor Networks via Cross-Layer Optimization NETS2020 Markus Leinonen, Juha Karjalainen, Marian Codreanu,
More informationUniversity of Notre Dame Department of Electrical Engineering. EE-87005: Advanced Topics in Multiuser Communications
University of Notre Dame Department of Electrical Engineering EE-87005: Advanced Topics in Multiuser Communications Issued: Wednesday, August 23, 2006 Literature Resources & References Fall 2006 Literature
More informationTransaction Processing in Mobile Database Systems
Ashish Jain* 1 http://dx.doi.org/10.18090/samriddhi.v7i2.8631 ABSTRACT In a mobile computing environment, a potentially large number of mobile and fixed users may simultaneously access shared data; therefore,
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationVideo-Aware Wireless Networks (VAWN) Final Meeting January 23, 2014
Video-Aware Wireless Networks (VAWN) Final Meeting January 23, 2014 1/26 ! Real-time Video Transmission! Challenges and Opportunities! Lessons Learned for Real-time Video! Mitigating Losses in Scalable
More informationOptimising Bit Error Rate and Power Consumption Through Systematic Approach for OFDM Systems
Optimising Bit Error Rate and Power Consumption Through Systematic Approach for OFDM Systems Ms.A.Vijayadev 1, Mr.T.Barath Kumar 1, Ms.A.Brinda Devi 1, Ms.P.S.Sivakami 1, Mrs.P.G.Padma Gowri 1 AP, Department
More informationAdaptive Linear Programming Decoding of Polar Codes
Adaptive Linear Programming Decoding of Polar Codes Veeresh Taranalli and Paul H. Siegel University of California, San Diego, La Jolla, CA 92093, USA Email: {vtaranalli, psiegel}@ucsd.edu Abstract Polar
More informationpresented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ]
presented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ] Category Application Invention Title Principle Investigator CUHK Tech ID HTTP-based Video Streaming Devices and Methods for Scheduling Transmission
More informationBroadcast Repair for Wireless Distributed Storage Systems
Broadcast Repair for Wireless Distributed Storage Systems Ping Hu Department of Electronic Engineering City University of Hong Kong Email: ping.hu@my.cityu.edu.hk Chi Wan Sung Department of Electronic
More informationA Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks
A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks Jing Ai, Damla Turgut, and Ladislau Bölöni Networking and Mobile Computing Research Laboratory (NetMoC) Department of Electrical
More informationCompressive Sensing for Multimedia. Communications in Wireless Sensor Networks
Compressive Sensing for Multimedia 1 Communications in Wireless Sensor Networks Wael Barakat & Rabih Saliba MDDSP Project Final Report Prof. Brian L. Evans May 9, 2008 Abstract Compressive Sensing is an
More informationITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS
ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS An Undergraduate Research Scholars Thesis by KATHERINE CHRISTINE STUCKMAN Submitted to Honors and Undergraduate Research Texas A&M University in partial
More informationCENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS. Jaime Adeane, Miguel R.D. Rodrigues, and Ian J.
CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering,
More informationAdvanced Concepts 5G
Advanced Concepts 5G Background Applications & Requirements Radio Technology Candidates Networking Trends Status and Timeline Parts of the presentation are taken from material that has been provided by
More informationThe Design of Degree Distribution for Distributed Fountain Codes in Wireless Sensor Networks
The Design of Degree Distribution for Distributed Fountain Codes in Wireless Sensor Networks Jing Yue, Zihuai Lin, Branka Vucetic, and Pei Xiao School of Electrical and Information Engineering, The University
More informationNetwork Image Coding for Multicast
Network Image Coding for Multicast David Varodayan, David Chen and Bernd Girod Information Systems Laboratory, Stanford University Stanford, California, USA {varodayan, dmchen, bgirod}@stanford.edu Abstract
More information554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE
554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY 2008 Cross-Layer Optimization of MAC and Network Coding in Wireless Queueing Tandem Networks Yalin Evren Sagduyu, Member, IEEE, and
More informationCodes, Bloom Filters, and Overlay Networks. Michael Mitzenmacher
Codes, Bloom Filters, and Overlay Networks Michael Mitzenmacher 1 Today... Erasure codes Digital Fountain Bloom Filters Summary Cache, Compressed Bloom Filters Informed Content Delivery Combining the two
More informationTopology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications
Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications 1 S.Shahinsha, 2 Mr.M.Sri Raghavendra 1 PG Scholar, St. Johns College of Engineering &Technology, Yerakota, AP, India 2 Assistant
More informationStudy and Development of Image Authentication using Slepian Wolf Coding
e t International Journal on Emerging Technologies 6(2): 126-130(2015) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 Study and Development of Image Authentication using Slepian Wolf Coding
More information(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)
Qos of Network Using Advanced Hybrid Routing in WMN, Abstract - Maximizing the network throughput in a multichannel multiradio wireless mesh network various efforts have been devoted. The recent solutions
More informationMobile Edge Computing for 5G: The Communication Perspective
Mobile Edge Computing for 5G: The Communication Perspective Kaibin Huang Dept. of Electrical & Electronic Engineering The University of Hong Kong Hong Kong Joint Work with Yuyi Mao (HKUST), Changsheng
More informationCoded Cooperative Data Exchange for Multiple Unicasts
Coded Cooperative Data Exchange for Multiple Unicasts Shahriar Etemadi Tajbakhsh and Parastoo Sadeghi Research School of Engineering The Australian National University Canberra, 000, Australia Emails:
More informationDesign and Evaluation of the Ultra- Reliable Low-Latency Wireless Protocol EchoRing
Design and Evaluation of the Ultra- Reliable Low-Latency Wireless Protocol EchoRing BWRC, September 22 nd 2017 joint work with C. Dombrowski, M. Serror, Y. Hu, S. Junges Machine-Type Communications: Origins
More informationCS 268: Computer Networking. Taking Advantage of Broadcast
CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic
More information2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006
2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,
More informationMulti-path Forward Error Correction Control Scheme with Path Interleaving
Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,
More informationMeasurements and Bits: Compressed Sensing meets Information Theory. Dror Baron ECE Department Rice University dsp.rice.edu/cs
Measurements and Bits: Compressed Sensing meets Information Theory Dror Baron ECE Department Rice University dsp.rice.edu/cs Sensing by Sampling Sample data at Nyquist rate Compress data using model (e.g.,
More informationMultipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network
1 Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network Nilima Walde, Assistant Professor, Department of Information Technology, Army Institute of Technology, Pune, India Dhananjay
More informationCHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS
130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based
More informationSINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC
SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC Randa Atta, Rehab F. Abdel-Kader, and Amera Abd-AlRahem Electrical Engineering Department, Faculty of Engineering, Port
More informationD DAVID PUBLISHING. Big Data; Definition and Challenges. 1. Introduction. Shirin Abbasi
Journal of Energy and Power Engineering 10 (2016) 405-410 doi: 10.17265/1934-8975/2016.07.004 D DAVID PUBLISHING Shirin Abbasi Computer Department, Islamic Azad University-Tehran Center Branch, Tehran
More informationRCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks
RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks JEONGYEUP PAEK, RAMESH GOVINDAN University of Southern California 1 Applications that require the transport of high-rate data
More informationStretch-Optimal Scheduling for On-Demand Data Broadcasts
Stretch-Optimal Scheduling for On-Demand Data roadcasts Yiqiong Wu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 6 E-mail: fywu,gcaog@cse.psu.edu
More informationJoint Coding/Routing Optimization for Correlated Sources in Wireless Visual Sensor Networks
Joint Coding/Routing Optimization for Correlated Sources in Wireless Visual Sensor Networks Chenglin Li 1, Junni Zou 2, Hongkai Xiong 1, Yongsheng Zhang 1 1 Department of Electronic Engineering, Shanghai
More informationOptimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 9, SEPTEMBER 2008 4119 Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE
More informationResearch Article Cooperative Signaling with Soft Information Combining
Electrical and Computer Engineering Volume 2010, Article ID 530190, 5 pages doi:10.1155/2010/530190 Research Article Cooperative Signaling with Soft Information Combining Rui Lin, Philippa A. Martin, and
More informationComputing over Multiple-Access Channels with Connections to Wireless Network Coding
ISIT 06: Computing over MACS 1 / 20 Computing over Multiple-Access Channels with Connections to Wireless Network Coding Bobak Nazer and Michael Gastpar Wireless Foundations Center Department of Electrical
More informationSource Coding with Distortion through Graph Coloring
Source Coding with Distortion through Graph Coloring Vishal Doshi, Devavrat Shah, and Muriel Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge, MA 02139
More informationReconstruction Improvements on Compressive Sensing
SCITECH Volume 6, Issue 2 RESEARCH ORGANISATION November 21, 2017 Journal of Information Sciences and Computing Technologies www.scitecresearch.com/journals Reconstruction Improvements on Compressive Sensing
More informationIN distributed random multiple access, nodes transmit
414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and
More informationBounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks
Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks Alireza Keshavarz-Haddad Rudolf Riedi Department of Electrical and Computer Engineering and Department of
More informationExploiting Route Diversity in Multi-packet Transmission using Mutual Information Accumulation
Exploiting Route Diversity in Multi-packet Transmission using Mutual Information Accumulation Yanpei Liu, Jing Yang and Stark C. Draper Electrical and Computer Engineering, University of Wisconsin Madison
More informationOptimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game
2012 7th International ICST Conference on Communications and Networking in China (CHINACOM) Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game Yuhua Xu, Zhan Gao and Wei
More informationSpecial Articles on PREMIUM 4G Introduction of LTE Advanced. large-capacity, and low-delay to improve
LTE-Advanced as Further Evolution of LTE for Smart Life LTE-Advanced CA Advanced C-RAN Special Articles on PREMIUM 4G Introduction of LTE Advanced NTT DOCOMO Technical Journal LTE-Advanced, which was launched
More information2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)
2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing
More informationA Unified Coding Framework for Distributed Computing with Straggling Servers
A Unified Coding Framewor for Distributed Computing with Straggling Servers Songze Li, Mohammad Ali Maddah-Ali, and A. Salman Avestimehr Department of Electrical Engineering, University of Southern California,
More informationScalable Sparse Optimization in Dense Cloud-RAN
Scalable Sparse Optimization in Dense Cloud-RAN Yuanming Shi Supervisor: Khaled B. Letaief Department of Electronic and Computer Engineering, HKUST August 19, 2015 1 Outline Introduction Three Vignettes:
More informationRobust Header Compression for Multimedia Services
Robust Header Compression for Multimedia Services Frank Fitzek Arizona State University 06/03/2002 Content Motivation, Introduction, Problems Related Work Robust Header Compression Wireless JSQ Testbed
More informationCongestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem
Congestion Control Andreas Pitsillides 1 Congestion control problem growing demand of computer usage requires: efficient ways of managing network traffic to avoid or limit congestion in cases where increases
More information