RESEARCH STATEMENT SHIRIN SAEEDI BIDOKHTI

Size: px
Start display at page:

Download "RESEARCH STATEMENT SHIRIN SAEEDI BIDOKHTI"

Transcription

1 RESEARCH STATEMENT SHIRIN SAEEDI BIDOKHTI The emerging technology of Internet of Things (IoT) has raised fundamental challenges in the design of practical and high performance data transmission and storage systems. Current network architectures and communication schemes are incapable of supporting the massive data, high rate, low latency, and large number of users that are envisioned in the applications of IoT. I am interested in novel cloud-based and cache-aided network architectures, and the opportunities they can provide to fundamentally boost the performance of communication networks. In particular, I seek to answer questions such as: How much coordination is needed in a network to support a desired rate and how to establish this coordination among the network nodes? How to utilize local storage units at network nodes to improve rate and latency? What is the tradeoff between communication and computation in distributed systems? How to compress data using minimum storage cost such that the important features of the data are preserved in the compressed domain? To approach these questions, I use tools from information theory, network theory, optimization, and algorithms to develop coding strategies that are efficient with respect to rate, energy, memory, complexity, latency, and cost. In the long term, I aim to develop a mathematical understanding of information extraction, storage and communication for data analysis, where the challenge is to learn certain information, rather than to reconstruct the entire data exactly. In the following, I present some of my past research contributions and future research directions. 1. Cloud Radio Access Networks Virtual BBU Pool BBU BBU BBU Centralized Baseband Pool Cloud Computing Fronthaul Network Collaborative Radio Interference Management Fig 1 A Cloud Radio Access Network Cloud Radio Access Networks (C-RANs) are among the most promising proposed technologies for the next generation of mobile networks. They combine advances in both wireless networks and cloud distributed processing to improve spectral efficiency and energy efficiency. By aggregating all processing units (BBUs) into a central cloud and distributing the radio heads (s) in desired areas, the C-RAN architecture creates novel opportunities for coordination, advanced interference management, and multi-cell processing. This architecture is shown in Fig. 1 and consists of a cloud processor, a fronthaul network, and an interference network. One of the main challenges in exploiting the above mentioned opportunities is due to the inherent interplay between coordination and rate. On the one hand, we would like to design and harness the interference to the benefit of the users, rather than avoid it. To this end, we need to jointly design the code accross the s and thus fully coordinate them. On the other hand, the fronthaul links are costly and scarce; therefore, they can not support the communication overhead that having full coordination imposes. To overcome these challenges in a single-user C-RAN, we proposed a coordinated coding scheme [1, 2, 3, 4] that utilizes the fronthaul network to send not only information bits, but also coordination bits. We could thus establish partial coordination among the s depending on the available fronthaul bandwidth and the interference network. In particular, we provided a fundamental interplay between coordination and rate, as explained below. We study the behavior of any coding scheme across network cuts. While the cut-set bound has remained the upper bound of choice in networks due to its simplicity, it is well known that it is not tight. In particular, in the context of C-RAN downlinks, we show in [1] that the cut-set bound does not well capture

2 the tradeoff between efficiency of communication on the fronthaul links and the desired coordination among the s. For example for the network of Fig. 2, the simplest cut-set bound is given by (1) R max min{c 1 + C 2, I(X p(x 1,x 2 ) }{{} 1 X 2 ; Y )} }{{} Cut #1 Cut #2 where R is the rate with which the user is served and I(X 1 X 2 ; Y ) captures the amount of information passing through the second cut. Suppose we Fig 2 Cut-set bound have a scheme that performs with a rate close to the first term in (1). This means that the fronthaul links carry independent information. However, by transmitting independent information to the two s, one cannot establish coordination between them (i.e., we can only establish product distributions p(x 1 )p(x 2 ), rather than general joint distributions p(x 1, x 2 ) which is allowed in the maximization in (1)). So the tradeoff between rate and coordination is not well-captured through the cutset bound. In a series of works [5, 3, 4, 1, 2], we developed a new technique to better capture and quantify this tradeoff. This is done by introducing an auxiliary channel from the output of the channel Y with the goal of making X 1 and X 2 conditionally independent. In other words, we find the common information between the s signals and relate it to the overhead that is needed on the fronthaul network to establish the desired coordination among the s. Future Work. Our previous work points to the fact that the component of coordination is missing from the existing frameworks for wireless network information flow and it lays a clear and promising path to capture the essence of coordination in general networks. To see why coordination bits (in addition to the actual information bits) need to flow in a network (in an efficient code design), we proceed as follows: Make a cut in the network, disconnecting the source and the destination into two layers (see Fig. 3). We ask two questions that are inter-related: (i) For a given rate to be feasible on the second layer, how much coordination is needed among the involved nodes? (ii) How should coordination be established on the nodes of the second layer, and what is its associated communication cost on the first layer? Many interesting questions remain open and timely to pursue: How can we develop a general framework to explain how information and coordination flow on wireless networks? How does coordination among network nodes provide new opportunities and techniques in interference management for multi-user C-RANs? When is coordination necessary and what is its cost? How can we trade rate with complexity of code design in order to come up with low complexity and near-optimal schemes? 2. Cache-Aided Networks Fig 3 Interplay between coordination and fronthaul link capacities Caching is an idea from content delivery networks to replicate and store information across networks to balance traffic load and improve accessibility/latency. Recently, caching has found its way into wireless networks and promised new opportunities that build on the inherent features of wireless networks, namely the broadcast nature of transmission and the superposition nature of reception. In cache-aided systems, communication takes place in two phases: a caching phase (typically done in low-traffic periods) in which the server stores parts of its data in local storage units of the users before knowing their demands, and a delivery phase (typically done in peak hours) in which users are served based on their actual demands. Prior work showed that in a noise-free system, a smart design of the caching scheme offers global caching gains that scale with the number of users [6]. To investigate the gains of caching in wireless networks, we initiated a study on the role of caching in 2

3 broadcast networks, where a noisy version of the sent signal is overheard at every user (see Fig 4). A common approach, which was believed to be near-optimal, is to combine caching and channel coding using separate cachechannel architectures (see Fig 5). Separation is however suboptimal, as we explain below. In [7, 8], we proposed a joint cache-channel coding architecture where the cache content is not only helpful in conveying desired information bits, but Fig 4 A cache-aided broadcast network is also essential for channel decoding. The role of caches is thus two-fold: to store information and to help with the decoding. This approach significantly improves on state-of-the-art schemes in terms of rate and latency and offers new global caching gains. In particular, it provides a scheme where weaker users are not rate bottlenecks in the network. Joint cache-channel coding is particularly beneficial in heterogeneous networks. Consequently, we have developed coding schemes for broadcast networks (including Gaussian networks) with heterogeneous cache sizes and asked the following question: Given a total amount of cache memory, how should one allocate it to individual users in order to maximize the overall communication rate? We answered this question in a series of works [9, 10, 11] and proposed a cache allocation that carefully assigns larger cache memories to weaker receivers to best utilize the dual role of the caches. An interesting application of this coding scheme is in (virtual) state-adaptive cache allocation in time-varying channels. In particular, we showed the benefits of the scheme in terms of rate and decoding latency in [12]. We have further proved performance guarantees for the scheme in [7, 13, 14]. Our bounds are tighter than all previously known bounds in noisy and noiseless broadcast networks and provide good approximations on the rate-memory tradeoffs. Caching Encoder Channel Encoder Encoding Channel Decoder Caching Decoder Decoding Fig 5 Separate cachechannel architecture is not optimal Arguably, there is a close connection between the problems of caching, index coding, network coding, and feedback in broadcast networks. For example, the coding technique proposed in [6] is a reminiscent of the feedback algorithm in [15] and both use ideas from network coding and index coding. The idea is to treat any information that is stored and/or overheard by a user as side information in later stages. This becomes challenging in practical systems where the environment is dynamic; e.g. channels with memory. In a series of works, we considered broadcast packet erasure channels and investigated the role of feedback when channels have memory. This problem was brought to our attention by Munich Aerospace (DLR) in a joint project, and our results were published in [16, 17, 18]. We modeled the channel memory using a finite-state machine and considered the following scenarios: (i) the channel state is visible to the transmitter, (ii) the channel state is not observable. In both scenarios, we used tools from network coding and queuing theory and developed max-weight backpressure algorithms that are rate-optimal and implementable. Moreover, we provided an analytic framework for our algorithms by devising their probabilistic counterparts which have a similar performance. We showed that in this probabilistic paradigm, analyzing the performance of an algorithm is equivalent to solving a max-flow min-cut problem. Future Work. Caching and feedback will be key components in future wireless networks as a solution to the rapidly growing number of users and demands. They both create novel opportunities for broadcasting and thus rate efficiency. In current code designs, rate-efficiency usually comes at the expense of complex code designs, and complexity of code design often manifests itself in decoding delay. Motivated by the importance of decoding delay in streaming applications, I am interested in developing a new understanding of the fundamental tradeoffs between rate and decoding delay and studying the role of feedback and caching in this regard. While these questions, in their general forms, are challenging open problems, I believe that they could be approached and fundamentally understood in the class of network codes. In particular, given a network coding scheme, one could develop an equivalent network of queues where different queues store 3

4 and represent different classes of coded symbols (depending on how many information bits they encode). Using tools from information theory, network coding, queuing theory, and graph theory, we can then analyze the behavior of the code with respect to network stability, rate-performance, decoding latency, etc. Many interesting research directions are also unpaved in dynamic environments and under practical constraints (noisy feedback, cache failure, etc.). Although these constraints are often well captured and dealt with on the network layer, a separate treatment of the network layer and the physical layer is oftentimes suboptimal compared to what information theoretical limits promise. How can we design cache/delivery schemes in networks where users demands depend on their browsing history? When should we use the network to cache and when should we use it to deliver messages in a dynamic network environment? How can we devise robust caching and feedback algorithms that allow reliable storage and transmission even when local storage units fail or when the network dynamics are unknown? 3. Data Compression for Data Analysis In the era of big data, the high rate at which data is acquired and the high dimensional nature of it makes its storage, processing, and analysis a grand challenge in terms of accuracy as well as computational feasibility. Conventional data compression techniques, such as the Lempel-Ziv algorithm, are used in practice to reduce the space required for storing data. Unfortunately, many important features of the data are inaccessible in the compressed domain. For example, in genomic data analysis, we may need to access certain positions of the genome sequence (i.e., random access) across several individuals. To access the data and analyze it, under the common existing architectures, one has to fully decompress the data and work with the original dataset from scratch. Existing solutions in the computer science literature include succinct data structures that allow certain types of query in the compressed domain [19] and heuristic hashing methods for similarity search. Previous work on this topic is limited [20, 21] but suggests that information theory is a complementary aspect that is missing from current literature. Two of my recent and ongoing works are on developing compression techniques for similarity search and random access query. In [22], we have developed and analyzed compressors that encode two independent sources for similarity query. Here, the goal of compression is not to recover the source sequences, but to ensure a reliable answer to the following question: Are the source sequences similar with respect to a given distance measure?. The outputs of such compressors provide us with hashing of the source sequences such that similarity search can be run on the compressed (hashed) dataset rather than the original dataset. In [23], we have built on the constructions in [20] and [24], and developed a universal two-step compressor that can compress any unknown iid source to its entropy (optimal compression), while ensuring random access to the source sequence by accessing only a constant number of stored bits. The merit of such compressors is that one does not need to decompress the entire sequence (and hence access all stored bits) in order to query a single position of the sequence. Our construction is fairly general and we believe its adaptations may be capable of transforming any good source code into one with random access property. We are currently working on such universal compressors for stationary sources. Future Work. More broadly, my goal is to develop the underlying theory and algorithms for modern compressors that keep the geometric structure of the dataset accessible in the compressed domain. With this approach, I aim to create a counterpart for many of the basic analysis tools (e.g., similarity search, clustering) in the lower dimensional compressed domain. This will significantly reduce the storage/processing memory and speed up the analysis. References [1] S. Saeedi Bidokhti and G. Kramer, Capacity bounds for diamond networks with an orthogonal broadcast channel, IEEE Trans. Inf. Theory, vol. 62, pp , Dec [2] S. Saeedi Bidokhti, G. Kramer, and S. Shamai, Capacity bounds on the downlink of symmetric, multi-relay, singlereceiver C-RAN networks, Entropy, vol. 19, no. 11, [3] S. Saeedi Bidokhti and G. Kramer, Capacity bounds for a class of diamond networks, in IEEE Int. Symp. Inf. Theory, Jun

5 [4] S. Saeedi Bidokhti and G. Kramer, Capacity of two-relay diamond networks with rate-limited links to the relays and a binary adder multiple access channel, in IEEE Int. Symp. Inf. Theory, Jul [5] S. Saeedi Bidokhti and G. Kramer, An application of a wringing lemma to the multiple access channel with cooperative encoders, in Proc. Iran Workshop on Commun. and Inf. Theory, May [6] M. Maddah-Ali and U. Niesen, Fundamental limits of caching, IEEE Trans. Inf. Theory, vol. 60, pp , May [7] S. Saeedi Bidokhti, M. Wigger, and R. Timo, Noisy broadcast networks with receiver caching, submitted to IEEE Trans. Inf. Theory, May [8] S. Saeedi Bidokhti, M. Wigger, and R. Timo, Erasure broadcast networks with receiver caching, in IEEE Int. Symp. Inf. Theory, Jul [9] S. Saeedi Bidokhti, M. Wigger, and A. Yener, Cache assignment on noisy broadcast channels, to be submitted to IEEE Trans. Inf. Theory, [10] S. Saeedi Bidokhti, M. Wigger, and A. Yener, Gaussian broadcast channels with receiver cache assignment, submitted to Int. Conf. Communications, Oct [11] S. S. Bidokhti, M. Wigger, and A. Yener, Benefits of cache assignment on degraded broadcast channels, in IEEE Int. Symp. Inf. Theory, pp , June [12] S. Saeedi Bidokhti, M. Wigger, A. Yener, and A. E. Gamal, State-adaptive coded caching for symmetric broadcast channels, in Asilomar, Nov [13] S. Saeedi Bidokhti, M. Wigger, and R. Timo, An upper bound on the capacity-memory tradeoff of degraded broadcast channels, in Int. Symp. Turbo Codes & Iterative Information Processing, Sept [14] C.-Y. Wang, S. Saeedi Bidokhti, and M. Wigger, Improved converses and gap-results for coded caching, submitted to IEEE Int. Symp. Inf. Theory, [15] L. Georgiadis and L. Tassiulas, Broadcast erasure channel with feedback-capacity and algorithms, in IEEE Workshop on Network Coding, Jun [16] M. Heindelmair, N. Reyhanian, and S. Saeedi Bidokhti, On the capacity region of the two-user broadcast packet erasure channel with feedback and memory, in Allerton Conf. Comm., Control, and Computing, Oct [17] M. Heindelmair and S. Saeedi Bidokhti, Capacity regions of two-user broadcast erasure channels with feedback and hidden memory, in IEEE Int. Symp. Inf. Theory, Jun [18] M. Heindelmair and S. Saeedi Bidokhti, Capacity regions of two-user broadcast erasure channels with feedback and memory, submitted to IEEE Trans. Inf. Theory, Dec [19] G. J. Jacobson, Succinct static data structures. PhD thesis, Carnegie Mellon University, [20] A. Mazumdar, V. Chandar, and G. W. Wornell, Local recovery in data compression for general sources, in Int. Symp. Inf. Theory, [21] A. Ingber, T. Courtade, and T. Weissman, Compression for quadratic similarity queries, IEEE Trans. Inf. Theory, vol. 61, pp , May [22] K. Tatwawadi, S. Saeedi Bidokhti, and T. Weissman, Universal compression of stationary sources with constant random access, work in preparation. [23] S. Saeedi Bidokhti and T. Weissman, Compression of independent sources for similarity query, work in preparation. [24] H. Buhrman, P. B. Miltersen, J. Radhakrishnan, and S. Venkatesh, Are bitvectors optimal?, SIAM J. Comput., vol. 31, pp , June

Storage-Latency Trade-off in Cache-Aided Fog Radio Access Networks

Storage-Latency Trade-off in Cache-Aided Fog Radio Access Networks Storage-Latency Trade-off in Cache-Aided Fog Radio Access Networks Joan S. Pujol Roig Imperial College London jp5215@imperial.ac.uk Filippo Tosato Toshiba Research Europe filippo.tosato@toshiba-trel.com

More information

Optimization of Heterogeneous Caching Systems with Rate Limited Links

Optimization of Heterogeneous Caching Systems with Rate Limited Links IEEE ICC Communication Theory Symposium Optimization of Heterogeneous Caching Systems with Rate Limited Links Abdelrahman M Ibrahim, Ahmed A Zewail, and Aylin Yener Wireless Communications and Networking

More information

IEEE networking projects

IEEE networking projects IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified

More information

Diversity Coded 5G Fronthaul Wireless Networks

Diversity Coded 5G Fronthaul Wireless Networks IEEE Wireless Telecommunication Symposium (WTS) 2017 Diversity Coded 5G Fronthaul Wireless Networks Nabeel Sulieman, Kemal Davaslioglu, and Richard D. Gitlin Department of Electrical Engineering University

More information

Degrees of Freedom in Cached Interference Networks with Limited Backhaul

Degrees of Freedom in Cached Interference Networks with Limited Backhaul Degrees of Freedom in Cached Interference Networks with Limited Backhaul Vincent LAU, Department of ECE, Hong Kong University of Science and Technology (A) Motivation Interference Channels 3 No side information

More information

Correlation-Aware Distributed Caching and Coded Delivery

Correlation-Aware Distributed Caching and Coded Delivery Correlation-Aware Distributed Caching and Coded Delivery P. Hassanzadeh, A. Tulino, J. Llorca, E. Erkip arxiv:1609.05836v1 [cs.it] 19 Sep 2016 Abstract Cache-aided coded multicast leverages side information

More information

Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching

Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching An Liu, Vincent LAU and Wei Han the Hong Kong University of Science and Technology Background 2 Cloud Radio Access Networks

More information

Energy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks

Energy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks Energy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks Reza Aminzadeh Electrical Engineering Department Khavaran Higher Education Institute Mashhad, Iran. reza.aminzadeh@ieee.com

More information

Resource Allocation Algorithms Design for 5G Wireless Networks

Resource Allocation Algorithms Design for 5G Wireless Networks Resource Allocation Algorithms Design for 5G Wireless Networks Vincent Wong Department of Electrical and Computer Engineering The University of British Columbia November 5, 2016 0 5G Overview User Data

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes

Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes Abdelrahman M. Ibrahim, Ahmed A. Zewail, and Aylin Yener ireless Communications and Networking Laboratory CAN Electrical Engineering

More information

A New Combinatorial Design of Coded Distributed Computing

A New Combinatorial Design of Coded Distributed Computing A New Combinatorial Design of Coded Distributed Computing Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT, USA

More information

Cloud Processing and Edge Caching in HetNets: A Delivery Time Perspective

Cloud Processing and Edge Caching in HetNets: A Delivery Time Perspective Cloud Processing and Edge Caching in HetNets: A Delivery Time Perspective Aydin Sezgin Joint work with: Jaber Kakar, Soheil Gherekhloo and Zohaib Hassan Awan Institute for Digital Communication Systems

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY 2011 2837 Approximate Capacity of a Class of Gaussian Interference-Relay Networks Soheil Mohajer, Member, IEEE, Suhas N. Diggavi, Member, IEEE,

More information

Novel Decentralized Coded Caching through Coded Prefetching

Novel Decentralized Coded Caching through Coded Prefetching ovel Decentralized Coded Caching through Coded Prefetching Yi-Peng Wei Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 2072 ypwei@umd.edu ulukus@umd.edu

More information

Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication

Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication P.Deepa 1, Dr. P.S.K Patra 2 1 Department of Computer Science and Engineering, 2 Head of the Department, Agni College of

More information

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,

More information

Efficient, Scalable, and Provenance-Aware Management of Linked Data

Efficient, Scalable, and Provenance-Aware Management of Linked Data Efficient, Scalable, and Provenance-Aware Management of Linked Data Marcin Wylot 1 Motivation and objectives of the research The proliferation of heterogeneous Linked Data on the Web requires data management

More information

APP-PHY Interactions in Wireless Networks

APP-PHY Interactions in Wireless Networks University of Minnesota September 29, 2009 APP-PHY Interactions in Wireless Networks Vince Poor (poor@princeton.edu) APP-PHY Interactions in Wireless Nets Wireless Networks: Layers Application (APP) Web

More information

A Theory of Network Equivalence Part I: Point-to-Point Channels

A Theory of Network Equivalence Part I: Point-to-Point Channels 972 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 2, FEBRUARY 2011 A Theory of Network Equivalence Part I: Point-to-Point Channels Ralf Koetter, Fellow, IEEE, Michelle Effros, Fellow, IEEE, and

More information

Research Statement. Alon Kipnis. Research overview: Signal processing under communication constraints

Research Statement. Alon Kipnis. Research overview: Signal processing under communication constraints Research overview: Signal processing under communication constraints Modern challenges in signal processing and statistics impose severe limitations on the amount of memory in the digital representation

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3413 Relay Networks With Delays Abbas El Gamal, Fellow, IEEE, Navid Hassanpour, and James Mammen, Student Member, IEEE Abstract The

More information

Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast

Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast 2005 Conference on Information Sciences and Systems, The Johns Hopkins University, March 16 18, 2005 Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast Yunnan Wu

More information

OPTIMIZING THE DELAY IN MULTIHOP WIRELESS NETWORK USING NETWORK CODING AND SUCCESSIVE INTERFERENCE CANCELLATION

OPTIMIZING THE DELAY IN MULTIHOP WIRELESS NETWORK USING NETWORK CODING AND SUCCESSIVE INTERFERENCE CANCELLATION Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 19-24 ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN 1 R. MANIKANDAN, 2 K. ARULMANI AND 3 K. SELVAKUMAR Department of Computer Science and Engineering,

More information

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks CDMA-Based MAC Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz Presented by: Habibullah Pagarkar for 600.647-Advanced Topics in Wireless Networks. JHU. Spring 04 Today s Presentation

More information

Some Optimization Trade-offs in Wireless Network Coding

Some Optimization Trade-offs in Wireless Network Coding Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,

More information

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions 2007 IEEE Communication Theory Workshop Christian R. Berger 1, Shengli Zhou 1, Yonggang Wen 2, Peter Willett 1 and

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

Cache-Aided Coded Multicast for Correlated Sources

Cache-Aided Coded Multicast for Correlated Sources Cache-Aided Coded Multicast for Correlated Sources P. Hassanzadeh A. Tulino J. Llorca E. Erkip arxiv:1609.05831v1 [cs.it] 19 Sep 2016 Abstract The combination of edge caching and coded multicasting is

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 3, MARCH Lifeng Lai, Ke Liu, Member, IEEE, and Hesham El Gamal, Senior Member, IEEE

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 3, MARCH Lifeng Lai, Ke Liu, Member, IEEE, and Hesham El Gamal, Senior Member, IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 3, MARCH 2006 805 The Three-Node Wireless Network: Achievable Rates and Cooperation Strategies Lifeng Lai, Ke Liu, Member, IEEE, and Hesham El Gamal,

More information

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California,

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS http:// CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS M.Sengaliappan 1, K.Kumaravel 2, Dr. A.Marimuthu 3 1 Ph.D( Scholar), Govt. Arts College, Coimbatore, Tamil Nadu, India 2 Ph.D(Scholar), Govt.,

More information

ARELAY network consists of a pair of source and destination

ARELAY network consists of a pair of source and destination 158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper

More information

Fundamental Limits of Caching: Improved Bounds For Small Buffer Users

Fundamental Limits of Caching: Improved Bounds For Small Buffer Users Fundamental Limits of Caching: Improved Bounds For Small Buffer Users Zhi Chen Member, IEEE Pingyi Fan Senior Member, IEEE and Khaled Ben Letaief Fellow, IEEE 1 Abstract arxiv:1407.1935v2 [cs.it] 6 Nov

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Coded Caching for a Large Number Of Users

Coded Caching for a Large Number Of Users Coded Caching for a Large Number Of Users 1 Mohammad Mohammadi Amiri, Qianqian Yang, and Deniz Gündüz Abstract arxiv:1605.01993v1 [cs.it] 6 May 2016 Information theoretic analysis of a coded caching system

More information

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Module 1. Introduction. Version 2, CSE IIT, Kharagpur Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 9, SEPTEMBER

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 9, SEPTEMBER IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 9, SEPTEMBER 2005 3037 Cooperative Strategies and Capacity Theorems for Relay Networks Gerhard Kramer, Member, IEEE, Michael Gastpar, Member, IEEE,

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks

Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Majid Gerami, Ming Xiao Communication Theory Lab, Royal Institute of Technology, KTH, Sweden, E-mail: {gerami, mingx@kthse arxiv:14012774v1

More information

PUBLICATIONS. Journal Papers

PUBLICATIONS. Journal Papers PUBLICATIONS Journal Papers [J1] X. Wu and L.-L. Xie, Asymptotic equipartition property of output when rate is above capacity, submitted to IEEE Transactions on Information Theory, August 2009. [J2] A.

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91)

Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91) Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: +91-94482 26130 Dept. of Electrical Communication Engg. (ECE) Fax: (+91)-80-2360 0991 Indian Institute of Science E-mail: rvenkat@ece.iisc.ernet.in

More information

Efficient Message Caching Scheme for MANET

Efficient Message Caching Scheme for MANET Efficient Message Caching Scheme for MANET S. Manju 1, Mrs. K. Vanitha, M.E., (Ph.D) 2 II ME (CSE), Dept. of CSE, Al-Ameen Engineering College, Erode, Tamil Nadu, India 1 Assistant Professor, Dept. of

More information

Wireless Map-Reduce Distributed Computing with Full-Duplex Radios and Imperfect CSI

Wireless Map-Reduce Distributed Computing with Full-Duplex Radios and Imperfect CSI 1 Wireless Map-Reduce Distributed Computing with Full-Duplex Radios and Imperfect CSI Sukjong Ha 1, Jingjing Zhang 2, Osvaldo Simeone 2, and Joonhyuk Kang 1 1 KAIST, School of Electrical Engineering, South

More information

Spatio-temporal Range Searching Over Compressed Kinetic Sensor Data. Sorelle A. Friedler Google Joint work with David M. Mount

Spatio-temporal Range Searching Over Compressed Kinetic Sensor Data. Sorelle A. Friedler Google Joint work with David M. Mount Spatio-temporal Range Searching Over Compressed Kinetic Sensor Data Sorelle A. Friedler Google Joint work with David M. Mount Motivation Kinetic data: data generated by moving objects Sensors collect data

More information

CHARACTERIZING the capacity region of wireless

CHARACTERIZING the capacity region of wireless IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 5, MAY 2010 2249 The Balanced Unicast and Multicast Capacity Regions of Large Wireless Networks Abstract We consider the question of determining the

More information

Wireless Networks Research Seminar April 22nd 2013

Wireless Networks Research Seminar April 22nd 2013 Wireless Networks Research Seminar April 22nd 2013 Distributed Transmit Power Minimization in Wireless Sensor Networks via Cross-Layer Optimization NETS2020 Markus Leinonen, Juha Karjalainen, Marian Codreanu,

More information

University of Notre Dame Department of Electrical Engineering. EE-87005: Advanced Topics in Multiuser Communications

University of Notre Dame Department of Electrical Engineering. EE-87005: Advanced Topics in Multiuser Communications University of Notre Dame Department of Electrical Engineering EE-87005: Advanced Topics in Multiuser Communications Issued: Wednesday, August 23, 2006 Literature Resources & References Fall 2006 Literature

More information

Transaction Processing in Mobile Database Systems

Transaction Processing in Mobile Database Systems Ashish Jain* 1 http://dx.doi.org/10.18090/samriddhi.v7i2.8631 ABSTRACT In a mobile computing environment, a potentially large number of mobile and fixed users may simultaneously access shared data; therefore,

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Video-Aware Wireless Networks (VAWN) Final Meeting January 23, 2014

Video-Aware Wireless Networks (VAWN) Final Meeting January 23, 2014 Video-Aware Wireless Networks (VAWN) Final Meeting January 23, 2014 1/26 ! Real-time Video Transmission! Challenges and Opportunities! Lessons Learned for Real-time Video! Mitigating Losses in Scalable

More information

Optimising Bit Error Rate and Power Consumption Through Systematic Approach for OFDM Systems

Optimising Bit Error Rate and Power Consumption Through Systematic Approach for OFDM Systems Optimising Bit Error Rate and Power Consumption Through Systematic Approach for OFDM Systems Ms.A.Vijayadev 1, Mr.T.Barath Kumar 1, Ms.A.Brinda Devi 1, Ms.P.S.Sivakami 1, Mrs.P.G.Padma Gowri 1 AP, Department

More information

Adaptive Linear Programming Decoding of Polar Codes

Adaptive Linear Programming Decoding of Polar Codes Adaptive Linear Programming Decoding of Polar Codes Veeresh Taranalli and Paul H. Siegel University of California, San Diego, La Jolla, CA 92093, USA Email: {vtaranalli, psiegel}@ucsd.edu Abstract Polar

More information

presented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ]

presented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ] presented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ] Category Application Invention Title Principle Investigator CUHK Tech ID HTTP-based Video Streaming Devices and Methods for Scheduling Transmission

More information

Broadcast Repair for Wireless Distributed Storage Systems

Broadcast Repair for Wireless Distributed Storage Systems Broadcast Repair for Wireless Distributed Storage Systems Ping Hu Department of Electronic Engineering City University of Hong Kong Email: ping.hu@my.cityu.edu.hk Chi Wan Sung Department of Electronic

More information

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks Jing Ai, Damla Turgut, and Ladislau Bölöni Networking and Mobile Computing Research Laboratory (NetMoC) Department of Electrical

More information

Compressive Sensing for Multimedia. Communications in Wireless Sensor Networks

Compressive Sensing for Multimedia. Communications in Wireless Sensor Networks Compressive Sensing for Multimedia 1 Communications in Wireless Sensor Networks Wael Barakat & Rabih Saliba MDDSP Project Final Report Prof. Brian L. Evans May 9, 2008 Abstract Compressive Sensing is an

More information

ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS

ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS An Undergraduate Research Scholars Thesis by KATHERINE CHRISTINE STUCKMAN Submitted to Honors and Undergraduate Research Texas A&M University in partial

More information

CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS. Jaime Adeane, Miguel R.D. Rodrigues, and Ian J.

CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS. Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering,

More information

Advanced Concepts 5G

Advanced Concepts 5G Advanced Concepts 5G Background Applications & Requirements Radio Technology Candidates Networking Trends Status and Timeline Parts of the presentation are taken from material that has been provided by

More information

The Design of Degree Distribution for Distributed Fountain Codes in Wireless Sensor Networks

The Design of Degree Distribution for Distributed Fountain Codes in Wireless Sensor Networks The Design of Degree Distribution for Distributed Fountain Codes in Wireless Sensor Networks Jing Yue, Zihuai Lin, Branka Vucetic, and Pei Xiao School of Electrical and Information Engineering, The University

More information

Network Image Coding for Multicast

Network Image Coding for Multicast Network Image Coding for Multicast David Varodayan, David Chen and Bernd Girod Information Systems Laboratory, Stanford University Stanford, California, USA {varodayan, dmchen, bgirod}@stanford.edu Abstract

More information

554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE

554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE 554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY 2008 Cross-Layer Optimization of MAC and Network Coding in Wireless Queueing Tandem Networks Yalin Evren Sagduyu, Member, IEEE, and

More information

Codes, Bloom Filters, and Overlay Networks. Michael Mitzenmacher

Codes, Bloom Filters, and Overlay Networks. Michael Mitzenmacher Codes, Bloom Filters, and Overlay Networks Michael Mitzenmacher 1 Today... Erasure codes Digital Fountain Bloom Filters Summary Cache, Compressed Bloom Filters Informed Content Delivery Combining the two

More information

Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications

Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications 1 S.Shahinsha, 2 Mr.M.Sri Raghavendra 1 PG Scholar, St. Johns College of Engineering &Technology, Yerakota, AP, India 2 Assistant

More information

Study and Development of Image Authentication using Slepian Wolf Coding

Study and Development of Image Authentication using Slepian Wolf Coding e t International Journal on Emerging Technologies 6(2): 126-130(2015) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 Study and Development of Image Authentication using Slepian Wolf Coding

More information

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL) Qos of Network Using Advanced Hybrid Routing in WMN, Abstract - Maximizing the network throughput in a multichannel multiradio wireless mesh network various efforts have been devoted. The recent solutions

More information

Mobile Edge Computing for 5G: The Communication Perspective

Mobile Edge Computing for 5G: The Communication Perspective Mobile Edge Computing for 5G: The Communication Perspective Kaibin Huang Dept. of Electrical & Electronic Engineering The University of Hong Kong Hong Kong Joint Work with Yuyi Mao (HKUST), Changsheng

More information

Coded Cooperative Data Exchange for Multiple Unicasts

Coded Cooperative Data Exchange for Multiple Unicasts Coded Cooperative Data Exchange for Multiple Unicasts Shahriar Etemadi Tajbakhsh and Parastoo Sadeghi Research School of Engineering The Australian National University Canberra, 000, Australia Emails:

More information

Design and Evaluation of the Ultra- Reliable Low-Latency Wireless Protocol EchoRing

Design and Evaluation of the Ultra- Reliable Low-Latency Wireless Protocol EchoRing Design and Evaluation of the Ultra- Reliable Low-Latency Wireless Protocol EchoRing BWRC, September 22 nd 2017 joint work with C. Dombrowski, M. Serror, Y. Hu, S. Junges Machine-Type Communications: Origins

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Multi-path Forward Error Correction Control Scheme with Path Interleaving Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,

More information

Measurements and Bits: Compressed Sensing meets Information Theory. Dror Baron ECE Department Rice University dsp.rice.edu/cs

Measurements and Bits: Compressed Sensing meets Information Theory. Dror Baron ECE Department Rice University dsp.rice.edu/cs Measurements and Bits: Compressed Sensing meets Information Theory Dror Baron ECE Department Rice University dsp.rice.edu/cs Sensing by Sampling Sample data at Nyquist rate Compress data using model (e.g.,

More information

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network 1 Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network Nilima Walde, Assistant Professor, Department of Information Technology, Army Institute of Technology, Pune, India Dhananjay

More information

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based

More information

SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC

SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC Randa Atta, Rehab F. Abdel-Kader, and Amera Abd-AlRahem Electrical Engineering Department, Faculty of Engineering, Port

More information

D DAVID PUBLISHING. Big Data; Definition and Challenges. 1. Introduction. Shirin Abbasi

D DAVID PUBLISHING. Big Data; Definition and Challenges. 1. Introduction. Shirin Abbasi Journal of Energy and Power Engineering 10 (2016) 405-410 doi: 10.17265/1934-8975/2016.07.004 D DAVID PUBLISHING Shirin Abbasi Computer Department, Islamic Azad University-Tehran Center Branch, Tehran

More information

RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks

RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks JEONGYEUP PAEK, RAMESH GOVINDAN University of Southern California 1 Applications that require the transport of high-rate data

More information

Stretch-Optimal Scheduling for On-Demand Data Broadcasts

Stretch-Optimal Scheduling for On-Demand Data Broadcasts Stretch-Optimal Scheduling for On-Demand Data roadcasts Yiqiong Wu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 6 E-mail: fywu,gcaog@cse.psu.edu

More information

Joint Coding/Routing Optimization for Correlated Sources in Wireless Visual Sensor Networks

Joint Coding/Routing Optimization for Correlated Sources in Wireless Visual Sensor Networks Joint Coding/Routing Optimization for Correlated Sources in Wireless Visual Sensor Networks Chenglin Li 1, Junni Zou 2, Hongkai Xiong 1, Yongsheng Zhang 1 1 Department of Electronic Engineering, Shanghai

More information

Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE

Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 9, SEPTEMBER 2008 4119 Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE

More information

Research Article Cooperative Signaling with Soft Information Combining

Research Article Cooperative Signaling with Soft Information Combining Electrical and Computer Engineering Volume 2010, Article ID 530190, 5 pages doi:10.1155/2010/530190 Research Article Cooperative Signaling with Soft Information Combining Rui Lin, Philippa A. Martin, and

More information

Computing over Multiple-Access Channels with Connections to Wireless Network Coding

Computing over Multiple-Access Channels with Connections to Wireless Network Coding ISIT 06: Computing over MACS 1 / 20 Computing over Multiple-Access Channels with Connections to Wireless Network Coding Bobak Nazer and Michael Gastpar Wireless Foundations Center Department of Electrical

More information

Source Coding with Distortion through Graph Coloring

Source Coding with Distortion through Graph Coloring Source Coding with Distortion through Graph Coloring Vishal Doshi, Devavrat Shah, and Muriel Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge, MA 02139

More information

Reconstruction Improvements on Compressive Sensing

Reconstruction Improvements on Compressive Sensing SCITECH Volume 6, Issue 2 RESEARCH ORGANISATION November 21, 2017 Journal of Information Sciences and Computing Technologies www.scitecresearch.com/journals Reconstruction Improvements on Compressive Sensing

More information

IN distributed random multiple access, nodes transmit

IN distributed random multiple access, nodes transmit 414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and

More information

Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks

Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks Alireza Keshavarz-Haddad Rudolf Riedi Department of Electrical and Computer Engineering and Department of

More information

Exploiting Route Diversity in Multi-packet Transmission using Mutual Information Accumulation

Exploiting Route Diversity in Multi-packet Transmission using Mutual Information Accumulation Exploiting Route Diversity in Multi-packet Transmission using Mutual Information Accumulation Yanpei Liu, Jing Yang and Stark C. Draper Electrical and Computer Engineering, University of Wisconsin Madison

More information

Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game

Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game 2012 7th International ICST Conference on Communications and Networking in China (CHINACOM) Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game Yuhua Xu, Zhan Gao and Wei

More information

Special Articles on PREMIUM 4G Introduction of LTE Advanced. large-capacity, and low-delay to improve

Special Articles on PREMIUM 4G Introduction of LTE Advanced. large-capacity, and low-delay to improve LTE-Advanced as Further Evolution of LTE for Smart Life LTE-Advanced CA Advanced C-RAN Special Articles on PREMIUM 4G Introduction of LTE Advanced NTT DOCOMO Technical Journal LTE-Advanced, which was launched

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

A Unified Coding Framework for Distributed Computing with Straggling Servers

A Unified Coding Framework for Distributed Computing with Straggling Servers A Unified Coding Framewor for Distributed Computing with Straggling Servers Songze Li, Mohammad Ali Maddah-Ali, and A. Salman Avestimehr Department of Electrical Engineering, University of Southern California,

More information

Scalable Sparse Optimization in Dense Cloud-RAN

Scalable Sparse Optimization in Dense Cloud-RAN Scalable Sparse Optimization in Dense Cloud-RAN Yuanming Shi Supervisor: Khaled B. Letaief Department of Electronic and Computer Engineering, HKUST August 19, 2015 1 Outline Introduction Three Vignettes:

More information

Robust Header Compression for Multimedia Services

Robust Header Compression for Multimedia Services Robust Header Compression for Multimedia Services Frank Fitzek Arizona State University 06/03/2002 Content Motivation, Introduction, Problems Related Work Robust Header Compression Wireless JSQ Testbed

More information

Congestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem

Congestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem Congestion Control Andreas Pitsillides 1 Congestion control problem growing demand of computer usage requires: efficient ways of managing network traffic to avoid or limit congestion in cases where increases

More information