Optimization of Heterogeneous Caching Systems with Rate Limited Links

Size: px
Start display at page:

Download "Optimization of Heterogeneous Caching Systems with Rate Limited Links"

Transcription

1 IEEE ICC Communication Theory Symposium Optimization of Heterogeneous Caching Systems with Rate Limited Links Abdelrahman M Ibrahim, Ahmed A Zewail, and Aylin Yener Wireless Communications and Networking Laboratory (WCAN Electrical Engineering and Computer Science Department The Pennsylvania State University, University Park, PA 8 {ami,zewail@psuedu yener@engrpsuedu Abstract This paper considers centralized coded caching, where the server not only designs the users cache contents, but also assigns their cache sizes under a total cache memory budget The server is connected to each user via a link of given finite capacity For given link capacities and total memory budget, we minimize the worst-case delivery completion time by jointly optimizing the cache sizes, the cache placement and delivery schemes The optimal memory allocation and caching scheme are characterized explicitly for the case where the total memory budget is smaller than that of the server library Numerical results confirm the savings in delivery time obtained by optimizing the memory allocation I INTRODUCTION Caching [] [] exploits under utilization of network resources during off-peak hours in order to reduce network traffic during congestion periods In caching, the placement phase refers to low traffic periods during which contents are prefetched and stored at the end users cache memories, and the delivery phase refers to congestion periods during which we try to reduce the traffic needed for the delivery of the requested files Reference [] has shown that the delivery load can be significantly reduced by using coded caching, in which the cache contents are designed in order to create multicast opportunities during the delivery phase Whereas references [] [] have considered a noiseless setup for delivery and followed a source-channel separation approach, recent work in design of coded caching schemes takes into account the channel noise In particular, references [] [] consider degraded broadcast channels with cache-aided receivers and propose a joint cache-channel coding approach showing improvement in fundamental limits A middle ground between [] [] and [] [] is to consider capacity limited links in lieu of a particular channel description, a modeling approach we shall follow in this paper Recently, in reference [8], we have proposed cache placement and delivery schemes for centralized caching with unequal fixed cache sizes, where the network links have equal finite capacities We have characterized the optimal caching scheme that minimizes the worst-case delivery load for given cache sizes Different from [8], in this paper, we consider a caching system, where the server is connected to the users via a multicast network that consists of rate limited links of different capacities similar to the model in [9] In particular, Fig : Heterogeneous centralized caching system the link from the server to user k has a fixed capacity bits per channel use, see Fig In turn, a multicast signal to the users in the set T needs to be transmitted with a rate less than min j T [9] Furthermore, the server controls the users cache sizes subject to a cache memory budget, which can be implemented via communicating the optimal cache size to each user via a control channel In other words, the server, eg, a base station, determines the optimal fractions of the users physical memories to be dedicated to caching in order to minimize the worst-case delivery completion time (DCT More specifically, building on the caching scheme in [8], we formulate the problem of minimizing the worst-case delivery completion time by jointly optimizing the caching scheme and the users cache sizes subject to a cache memory budget constraint The optimal memory allocation and caching scheme are obtained by solving a linear program In addition, for the case where the cache memory budget is less than or equal to the library size at the server, we find closed form expressions for the optimal cache sizes, placement and delivery policies The optimal solution balances between allocating larger cache memories to users with low capacities and equalizing the cache memory sizes The former implies transmitting fewer number of bits in order to satisfy their demands, while the latter maximizes the multicast gain Additionally, we compare the optimal memory allocation and caching scheme with the state-of-art, showing the improvement in delivery time Notation: Vectors are represented by boldface letters, refers to bitwise XOR operation, W denotes the size of W, [] := {,,, and [] denotes the power set of [] //$ IEEE

2 IEEE ICC Communication Theory Symposium II SYSTEM MODEL We consider a multicast network connecting one server to users via links of different capacities, see Fig The link between the server and userk has capacity bits per channel use, which we refer to as the download rate at user k The download rates vector is denoted by C = [C,,C ] Additionally, the server contains a library of N files, W,,W N, each with size F bits The size of the users cache memories are determined by the server In particular, the server allocates M k F bits to user k such that M kf NF bits, where is the cache memory budget normalized by the library size NF We also define m k = M k /N, to denote the memory size at user k normalized by the library size NF We assume that the number of files is greater than or equal the number of users, ie, N, and M k [,N], k [], which implies m k [,], k [] We denote the memory size vector by M = [M,,M ] and its normalized version by the library size by m = [m,,m ] The system operates over two phases: placement phase where the server populates the users cache memories, and delivery phase where the server delivers the files requested by the users The users demands are unknown until the beginning of the delivery phase In the placement phase, user k stores a subset Z k of the files library, subject to its cache size constraint In the delivery phase, user k requests a file W dk from the server and the users demands are assumed to be uniform and independent, ie, the demand vector d = [d,,d ] consists of identical and independent uniform random variables over the files [] In order to deliver the requested files, the server transmits a sequence of unicast/multicast signals, X T,d, where T [] User k should be able to reconstruct W dk from the signals X T,d, k T, T [] and Z k In this work, we consider the set of caching policies A that satisfies the following assumptions: We consider uncoded prefetching [], where the server places uncoded data at the users cache memories, ie, there is no coding over files Under uniform demands, the cache memory at user k is divided equally over the files, ie, m k F bits are dedicated to each file A cache placement policy in A is identified by an allocation vector a which represents the partitions of the files stored exclusively at each subset of users S [] On the other hand, the set of delivery schemes D satisfies the following assumptions: A multicast signal X T,d is created by XORing T file pieces of equal size, and X T,d = F bits A unicast signal X {k,d delivers the missing pieces to user k, ie, the pieces that are not delivered by the multicast signals and are not stored at user k X T,d is intended for the users in T, hence it is transmitted with a rate less than or equal to min j T [9] It worth noting that the third assumption implies that the users outside the sett may not be able to decode the signalx T,d, as their decoding rates may be lower than min j T A delivery policy in D is identified by a transmission vector v, representing the size of the transmitted signals, and an assignment vector u representing the structure of the transmitted signals Our goal in this work is to minimize the worst-case delivery completion time (DCT over all possible demand instances, which is defined as follows Definition The worst-case delivery completion time (DCT under a cache placement policy in A and a delivery policy in D, is defined as Θ A,D := max d Θ d,a,d = T [] { min j T III PROBLEM FORMULATION For given rates vectorc, and normalized cache budget, we minimize the worst-case delivery completion time (DCT, by jointly optimizing the caching scheme and the users cache sizes In particular, the following optimization problem identifies the minimum worst-case DCT, Θ A,D (,C, the optimal memory allocation, and the optimal caching scheme in A,D, ie, the optimal values for m, a, v, and u O: min a,u,v,m T [] { min j T (a subject to a A(m, (b (v,u D(m,a, m k, (c (d m k, k [], (e where A(m is the set of feasible allocation vectors defined in ( and D(m,a is the set of feasible assignment and transmission vectors defined by (8-( The caching scheme is detailed in [8], and recapped briefly in Section V IV CACHE SIZE OPTIMIZATION In general, the optimal memory allocation and caching scheme are obtained by solving the linear program in (, which are illustrated numerically in Section VI In addition, for the case where, a closed form solution is possible to be obtained which we present next A Optimal Solution for For the case, where, the optimal memory allocation balances between uniform memory allocation and allocating larger cache memories to users with low decoding rates In particular, the cache memory budget is allocated uniformly over users {,,q, where q is determined by C as illustrated in the following theorem Theorem For C C and, the minimum worst-case delivery completion time Θ A,D (m i jm tot tot,c = max i [] i, j= j=

3 IEEE ICC Communication Theory Symposium and the optimal memory allocation { is m = = m q = q, where q = argmax i j i [] j= Moreover, if i the solution is not unique, ie, q {q,,q L, for some L, then m = [ ] L i= α mtot i q i,, mtot q i,,,, where L i= α i = and α i The proof of Theorem is provided in Appendix A In the following, we describe the optimal caching scheme that achieves the DCT in Theorem In particular, the optimal cache placement scheme is to split each file W l into + subfiles, Wl,{, W l,{,, W l,{, such that W l,{ = ( F, W l,{j = m jf and user j caches subfiles W l,{j, l [N] On the other hand, the optimal delivery scheme for this case, considers only the pairwise multicast signals X {i,j,d and the unicast signals X {j,d Specifically, a multicast signal to users {i,j is defined by where W {i,j d i W {i,j X {i,j,d = W {i,j d i W {i,j, ( W di,{j, W {i,j W dj,{i, and W {i,j d i = F Additionally, a unicast signal = min{m i,m j to user j completes the missing pieces from W dj, which is defined by X {j,d = W dj W dj,{j W {i,j, ( i=,i j ie, X {j,d = (m j i=,i j min{m i,m j F B Uniform Memory Allocation In this section, we consider uniform cache allocation which maximizes the multicast opportunities, without taking into account the impact of different channels on the DCT, and conclude its suboptimality Lemma considers uniform memory allocation combined with the MaddahAli-Niesen caching scheme [] Lemma For [] and uniform memory allocation, the MaddahAli-Niesen caching scheme [] is a feasible solution to ( Moreover, for C C C, the worstcase delivery completion time under this scheme is given by Θ unif (,C = ( m tot j= ( j ( The proof is discussed in Appendix B From Lemma, we observe that ( yields an upper bound on the minimum worst-case DCT Corollary For given C and, Θ A,D (,C is less than or equal to Θ unif (,C, which is obtained by uniform memory allocation, ie, m j = /, j [], and applying the MaddahAli-Niesen caching scheme [] V CACHING MODEL We adopt the cache placement scheme proposed in [8], which we compactly summarize here for completeness The caching scheme defines the sets A(m and D(m,a A Cache Placement Phase For a system with users, each file W l is partitioned into subfiles, which are denoted by W l,s,s [], and the fraction of W l stored at the users in S is represented by the allocation variable a S [,] Additionally, the aforementioned partitioning is symmetric over all files, ie, W l,s = a S F bits, l [N] Therefore, for a given m, the set of feasible placement schemes A(m is defined as follows { a [,] a S =, a S m k, k [], ( S [] S [] : k S and the content of the cache memory at user k is given by Z k = W l,s B Delivery Phase l [N] S [] : k S The delivery scheme is defined by the unicast/multicast signals X T,d,T [] {, where [] { denotes all possible transmission sets In particular, user k is able to reconstructw dk from the signals X T,d, k T, T [] { and its cache content Z k The signal intended to the users in T is formed by XORing pieces from W dj,j T, each with size F bits, ie, X T,d = j T W T, ( where Wd T j W dj is the piece of the file requested by j and delivered via X T,d The unicast signal to j delivers the pieces of W dj that had not been delivered by multicast signals and are not available locally In order to guarantee that each user j T is able to extract its requested piece Wd T j from the signal X T,d, the remaining pieces that formx T,d must be contained in Z j, j T Define Wd T as the subset of j,s WT stored at the users in S, ie, Wd T j := Wd T, ( j,s S B T j where Bj T := { S [] : T {j S,j S, for j T, are the sets storing the side information at T {j and not available at j Additionally, denote all allocation sets related to T by B T := j T BT j Moreover, WT d = j,s ut S F bits, which implies that the fraction of Wdj,S involved in the multicast transmission to the users in T, is represented by the assignment variable u T S [,a S] Hence, the structure of Wd T j is represented by u T S =, T [] {, j T (8 S B T j The amount of side information stored at the users limits the size of the multicast signalsx T,d Specifically, the amount of side information stored at the users in S and not available at user j, imposes the following constraints a S, j S, T [] { : {j S T S [] : S S,j S

4 IEEE ICC Communication Theory Symposium DCT Optimal allocation Uniform allocation Cache sizes 8 m m m Fig : ComparingΘ A,D (,C and Θ unif (,C for =, and C = [,,,, 8, 8, ] S { S [] : S (9 Moreover, in order to prevent the transmission of redundant bits from W dj,s to user j, we need to ensure u T S a S, j S, T [] { : j T,T S { S { S [] : S ( Finally, the users demands are satisfied by m k, k [], ( T [] { : k T since m k represents the local caching gain In summary, a delivery scheme is defined by the assignment and transmission variables, identified by the assignment vector u and transmission vector v, respectively The set of feasible delivery schemes for given m and a, which we denote by D(m, a, must satisfy (8-(, and u T S a S, T [] {, S B T, (, T [] { ( Remark For m k, the general caching scheme reduces to the simple scheme described in Section IV-A VI NUMERICAL RESULTS In this section, we present our numerical results solving (, and compare the optimal solution with the MaddahAli-Niesen caching scheme under uniform memory allocation Example Consider a three-user caching system with memory budget =, and C C C, which implies Θ unif (,C = ( ( j = ( +, C C j= { i j and q = argmax i [] j= We consider the following cases for the link i rates: C Fig : The optimal memory allocations for =,C = and C = For C = [,, ], we get q =, hence the optimal solution is the MaddahAli-Niesen caching scheme under uniform memory allocation In particular, we have Θ unif = Θ A,D =, m = [/, /, /], and the optimal caching scheme is given by a { = a { = a { = /, v{, = u {, { = u {, { = /, v{, = u {, { = u {, { = /, v{, = u {, { = u {, { = / For C = [,, ], we get q {,, ie, the optimal solution is not unique In particular, we have m = [ α + α, α + α, α ], where α [,], and Θ A,D = Θ unif =, eg, for α = 8, m = [8, 8, ] and the optimal caching scheme is given by a { = a { = 8, a { =, v{, = u {, { = u {, { = 8, v{, = u {, { = u {, { =, v{, = u {, { = u {, { =, v{ = 8 For C = [,, ], we get q =, hence m = [,, ] and the optimal caching scheme is given by a { = a { =, v {, = u {, { = u {, { =, v{ =, which results in Θ A,D = On the other hand, Θ unif = In Fig, we compare Θ A,D (,C with Θ unif (,C for =, and C = [,,,, 8, 8, ] We observe that Θ A,D (,C Θ unif (,C, and for, we haveargmax i [] { i j= (j/(i =, which implies Θ A,D (,C = Θ unif (,C Moreover, Fig shows the optimal memory allocation versus C for =,C = and C =, we observe that the memory allocated to user is non-increasing in its link capacity In Fig and, we show the optimal memory allocation for C = [,,,,,, ] and C =

5 IEEE ICC Communication Theory Symposium mk 8 User k mk 8 User k Fig : The optimal memory allocations for =, and rates vector C = [,,,,,, ] [,,,,,, 8], respectively A general observation is that the optimal memory allocation balances the gain attained from assigning larger memories for users with weak links and the multicast gain achieved by equating the cache sizes Consequently, in the optimal memory allocation the users are divided into groups according to their rates, the groups that include users with low rates are assigned larger fractions of the cache memory budget, and users within each group are given equal cache sizes These characteristics are illustrated in Fig, which shows that the users are grouped into G = {,, and G = {,,, for all [, For example, for =, we have m = [,,,,,, ] On the other hand, Fig shows that the users grouping not only depend on the rates C, but also on the cache memory budget For instance, for =, we have m = [,, 88, 88, 88, 88, 88], while in the case =, the allocation becomes m = [,,,,,, ], ie, for =, we have two groups G = {, and G = {,,,,, however, for =, we have three groups G = {,, G = {,, and G = {,, VII CONCLUSIONS In this paper, we have considered centralized coded caching system where the links between the server and the users have fixed and unequal capacities The server not only designs the users cache contents, but also assigns their cache memory sizes subject to a cache memory budget We have formulated an optimization problem for minimizing the worst-case delivery completion time (DCT by jointly optimizing the memory allocation and caching scheme We have characterized explicitly the optimal cache sizes and caching scheme for the case where the cache memory budget is smaller than or equal to the library size In particular, the optimal memory allocation is to allocate the cache memory budget uniformly over the users with the q lowest link capacities That is the solution balances the multicast gain and the gain achieved by Fig : The optimal memory allocations for =, and rates vector C = [,,,,,, 8] transmitting less data to users with low rates Additionally, we have shown that the solution obtained from the optimization problem outperforms the MaddahAli-Niesen caching scheme [] under uniform memory allocation Future directions include systems with multiple servers storing distinct libraries and total memory budget at the end users that can be partitioned over the libraries APPENDIX A PROOF OF THEOREM In order to characterize explicitly the optimal memory allocation and caching scheme for and C C, we first quantify the optimal caching scheme for a given memory allocation with m k, as follows Lemma For C C and memory allocation m satisfying m k, the optimal caching scheme for ( is given by a {j = m j, v{i,j = u {i,j {i = u {i,j {j = min{a {i,a {j, andv {j = m j i=,i j min{m i,m j Proof By dividing ( by and summing over k, we get T [] {:k T v {k m k Therefore, we get the lower bound Θ A,D m k T [] {: T m k, T [] {: T ( Additionally, for C C, we have Θ A,D m k m k j T min i T C i + j T C i= j=i+ j T [] {:{i,j T i= j=i+ min{m i,m j,

6 IEEE ICC Communication Theory Symposium where the last inequality follows from the fact that the multicast transmissions that include users {i, j are limited by the side information stored at each of them, which is upper bounded by the cache memory size, ie, T [] {:{i,j T min{m i,m j Moreover, for i= m i, the lower bound is achieved by setting a {j = m j, v {j = m j i=,i j min{m i,m j, and v {i,j = u {i,j {i = u {i,j {j = min{a {i,a {j Now, using Lemma, we can simplify ( to min m subject to m k m k, i= j=i+ min{m i,m j (a (b m k, k [] (c Next, we show that the optimal memory allocation obtained from ( satisfies m m m Lemma For C C and, the objective function of ( satisfies Θ A,D (m Θ A,D ( m, where m i = m i, for i []{r,r+, and some r [] Additionally, m r = m r+ = α + δ, m r+ = m r = α, for δ,α, and m m m r Proof For m = [m,m,,m r,α+δ,α,m r+,,m ] and m = [m,m,,m r,α,α+δ,m r+,,m ], we have Θ A,D (mθ A,D ( m = χ +χ, where χ = m r + m r+ C r C ( r+ = δ C r+ C r m r C r m r+ C r+ r ( min{mi, m r χ = + min{m i, m r+ C i= r C r+ r ( min{mi,m r + min{m i,m r+ C i= r C r+ ( = r (min{m i,α+δmin{m i,α C r+ C r i= ( = δ(r C r+ C r ( Thus, χ +χ = rδ C r+ C r, as C r+ C r Using Lemma, ( can be simplified to ( Lemma For C C and, optimization problem ( reduces to min m subject to km k m k, (a (b m k+ m k, k [], m k, k [] (c (d Moreover, the optimal memory allocation for (, can be obtained from the following maximization problem max m km k subject to m m m m (a (b Finally, the optimal memory allocation in Theorem is obtained by solving the dual of the linear program in ( APPENDIX B PROOF OF LEMMA First, we distribute uniformly over the users, ie, m j = m( tot /, j [] In the placement phase, each user caches pieces from each file, and the size of each piece is F/ ( bits Therefore, the placement scheme is described by a S = / ( { for S S [] : S = On the other hand, the delivery phase is defined by = / ( for T = + Additionally, u T S = for S {T {j : j T In turn, the DCT under this scheme is given by Θ unif (,C =, min j T = T [] {: T =+ T [] { / ( = min j T ( m tot j= ( j, since C C C and there are ( j sets of size + that include user j and do not include users {,,,j REFERENCES [] M A Maddah-Ali and U Niesen, Fundamental limits of caching, IEEE Trans Info Theory, vol, no, pp 8 8, Mar [], Decentralized coded caching attains order-optimal memory-rate tradeoff, IEEE/ACM Trans Netw, vol, no, pp 9, Aug [] S Wang, W Li, X Tian, and H Liu, Coded caching with heterogenous cache sizes, arxiv:, [] M M Amiri, Q Yang, and D Gündüz, Decentralized coded caching with distinct cache capacities, arxiv:9, [] R Timo and M Wigger, Joint cache-channel coding over erasure broadcast channels, in IEEE ISWCS,, pp [] S S Bidokhti, M Wigger, and R Timo, Noisy broadcast networks with receiver caching, arxiv:, [] S S Bidokhti, M Wigger, and A Yener, Gaussian broadcast channels with receiver cache assignment, IEEE ICC, [8] A M Ibrahim, A A Zewail, and A Yener, Centralized coded caching with heterogeneous cache sizes, IEEE WCNC, [9] A F Dana, R Gowaikar, R Palanki, B Hassibi, and M Effros, Capacity of wireless erasure networks, IEEE Trans Info Theory, vol, no, pp 89 8, Mar [] Q Yu, M A Maddah-Ali, and A S Avestimehr, The exact rate-memory tradeoff for caching with uncoded prefetching, arxiv:98,

Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes

Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes Abdelrahman M. Ibrahim, Ahmed A. Zewail, and Aylin Yener ireless Communications and Networking Laboratory CAN Electrical Engineering

More information

On Coded Caching with Heterogeneous Distortion Requirements

On Coded Caching with Heterogeneous Distortion Requirements On Coded Caching with Heterogeneous Distortion Requirements Abdelrahman M. Ibrahim, Ahmed A. Zewail, and Aylin Yener Wireless Communications and Networking Laboratory (WCAN) chool of Electrical Engineering

More information

Novel Decentralized Coded Caching through Coded Prefetching

Novel Decentralized Coded Caching through Coded Prefetching ovel Decentralized Coded Caching through Coded Prefetching Yi-Peng Wei Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 2072 ypwei@umd.edu ulukus@umd.edu

More information

Storage-Latency Trade-off in Cache-Aided Fog Radio Access Networks

Storage-Latency Trade-off in Cache-Aided Fog Radio Access Networks Storage-Latency Trade-off in Cache-Aided Fog Radio Access Networks Joan S. Pujol Roig Imperial College London jp5215@imperial.ac.uk Filippo Tosato Toshiba Research Europe filippo.tosato@toshiba-trel.com

More information

Coded Caching for a Large Number Of Users

Coded Caching for a Large Number Of Users Coded Caching for a Large Number Of Users 1 Mohammad Mohammadi Amiri, Qianqian Yang, and Deniz Gündüz Abstract arxiv:1605.01993v1 [cs.it] 6 May 2016 Information theoretic analysis of a coded caching system

More information

Correlation-Aware Distributed Caching and Coded Delivery

Correlation-Aware Distributed Caching and Coded Delivery Correlation-Aware Distributed Caching and Coded Delivery P. Hassanzadeh, A. Tulino, J. Llorca, E. Erkip arxiv:1609.05836v1 [cs.it] 19 Sep 2016 Abstract Cache-aided coded multicast leverages side information

More information

Cascaded Coded Distributed Computing on Heterogeneous Networks

Cascaded Coded Distributed Computing on Heterogeneous Networks Cascaded Coded Distributed Computing on Heterogeneous Networks Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT,

More information

A New Combinatorial Design of Coded Distributed Computing

A New Combinatorial Design of Coded Distributed Computing A New Combinatorial Design of Coded Distributed Computing Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT, USA

More information

Cache-Aided Coded Multicast for Correlated Sources

Cache-Aided Coded Multicast for Correlated Sources Cache-Aided Coded Multicast for Correlated Sources P. Hassanzadeh A. Tulino J. Llorca E. Erkip arxiv:1609.05831v1 [cs.it] 19 Sep 2016 Abstract The combination of edge caching and coded multicasting is

More information

Hierarchical Coded Caching

Hierarchical Coded Caching Hierarchical Coded Caching ikhil Karamchandani, Urs iesen, Mohammad Ali Maddah-Ali, and Suhas Diggavi Abstract arxiv:403.7007v2 [cs.it] 6 Jun 204 Caching of popular content during off-peak hours is a strategy

More information

Fundamental Limits of Coded Caching: Improved Delivery Rate-Cache Capacity Trade-off

Fundamental Limits of Coded Caching: Improved Delivery Rate-Cache Capacity Trade-off Fundamental Limits of Coded Caching: Improved Delivery Rate-Cache Capacity Trade-off Mohammad Mohammadi Amiri, Student Member, IEEE and Deniz Gündüz, Senior Member, IEEE Abstract A centralized coded caching

More information

Fundamental Limits of Caching: Improved Bounds For Small Buffer Users

Fundamental Limits of Caching: Improved Bounds For Small Buffer Users Fundamental Limits of Caching: Improved Bounds For Small Buffer Users Zhi Chen Member, IEEE Pingyi Fan Senior Member, IEEE and Khaled Ben Letaief Fellow, IEEE 1 Abstract arxiv:1407.1935v2 [cs.it] 6 Nov

More information

Degrees of Freedom in Cached Interference Networks with Limited Backhaul

Degrees of Freedom in Cached Interference Networks with Limited Backhaul Degrees of Freedom in Cached Interference Networks with Limited Backhaul Vincent LAU, Department of ECE, Hong Kong University of Science and Technology (A) Motivation Interference Channels 3 No side information

More information

RESEARCH STATEMENT SHIRIN SAEEDI BIDOKHTI

RESEARCH STATEMENT SHIRIN SAEEDI BIDOKHTI RESEARCH STATEMENT SHIRIN SAEEDI BIDOKHTI The emerging technology of Internet of Things (IoT) has raised fundamental challenges in the design of practical and high performance data transmission and storage

More information

Wireless Map-Reduce Distributed Computing with Full-Duplex Radios and Imperfect CSI

Wireless Map-Reduce Distributed Computing with Full-Duplex Radios and Imperfect CSI 1 Wireless Map-Reduce Distributed Computing with Full-Duplex Radios and Imperfect CSI Sukjong Ha 1, Jingjing Zhang 2, Osvaldo Simeone 2, and Joonhyuk Kang 1 1 KAIST, School of Electrical Engineering, South

More information

Group Secret Key Generation Algorithms

Group Secret Key Generation Algorithms Group Secret Key Generation Algorithms Chunxuan Ye and Alex Reznik InterDigital Communications Corporation King of Prussia, PA 9406 Email: {Chunxuan.Ye, Alex.Reznik}@interdigital.com arxiv:cs/07024v [cs.it]

More information

ARELAY network consists of a pair of source and destination

ARELAY network consists of a pair of source and destination 158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper

More information

Generalized Interlinked Cycle Cover for Index Coding

Generalized Interlinked Cycle Cover for Index Coding Generalized Interlinked Cycle Cover for Index Coding Chandra Thapa, Lawrence Ong, and Sarah J. Johnson School of Electrical Engineering and Computer Science, The University of Newcastle, Newcastle, Australia

More information

Mobility-Aware Coded Storage and Delivery

Mobility-Aware Coded Storage and Delivery Mobility-Aware Coded Storage and Delivery Emre Ozfatura and Deniz Gündüz Information Processing and Communications Lab Department of Electrical and Electronic Engineering Imperial College London Email:

More information

Cache-Aided Private Information Retrieval with Partially Known Uncoded Prefetching

Cache-Aided Private Information Retrieval with Partially Known Uncoded Prefetching Cache-Aided Private Information Retrieval with Partially Known Uncoded Prefetching Yi-Peng Wei Karim Banawan Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College

More information

A Unified Coding Framework for Distributed Computing with Straggling Servers

A Unified Coding Framework for Distributed Computing with Straggling Servers A Unified Coding Framewor for Distributed Computing with Straggling Servers Songze Li, Mohammad Ali Maddah-Ali, and A. Salman Avestimehr Department of Electrical Engineering, University of Southern California,

More information

Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks

Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Majid Gerami, Ming Xiao Communication Theory Lab, Royal Institute of Technology, KTH, Sweden, E-mail: {gerami, mingx@kthse arxiv:14012774v1

More information

Robust Wireless Delivery of Scalable Videos using Inter-layer Network Coding

Robust Wireless Delivery of Scalable Videos using Inter-layer Network Coding Robust Wireless Delivery of Scalable Videos using Inter-layer Network Coding Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 19122 Abstract

More information

Device-to-Device Networking Meets Cellular via Network Coding

Device-to-Device Networking Meets Cellular via Network Coding Device-to-Device Networking Meets Cellular via Network Coding Yasaman Keshtkarjahromi, Student Member, IEEE, Hulya Seferoglu, Member, IEEE, Rashid Ansari, Fellow, IEEE, and Ashfaq Khokhar, Fellow, IEEE

More information

Coded Distributed Computing: Fundamental Limits and Practical Challenges

Coded Distributed Computing: Fundamental Limits and Practical Challenges Coded Distributed Computing: Fundamental Limits and Practical Challenges Songze Li, Qian Yu, Mohammad Ali Maddah-Ali, and A. Salman Avestimehr Department of Electrical Engineering, University of Southern

More information

An Improved Secretive Coded Caching Scheme exploiting Common Demands

An Improved Secretive Coded Caching Scheme exploiting Common Demands n Improved Secretive Coded Caching Scheme exploiting Common Demands by hari.hara, Chugh Ishani, prasad.krishnan in 2017 IEEE Information Theory Workshop Report No: IIIT/TR/2017/-1 Centre for Communications

More information

554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE

554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE 554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY 2008 Cross-Layer Optimization of MAC and Network Coding in Wireless Queueing Tandem Networks Yalin Evren Sagduyu, Member, IEEE, and

More information

Stretch-Optimal Scheduling for On-Demand Data Broadcasts

Stretch-Optimal Scheduling for On-Demand Data Broadcasts Stretch-Optimal Scheduling for On-Demand Data roadcasts Yiqiong Wu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 6 E-mail: fywu,gcaog@cse.psu.edu

More information

FUTURE communication networks are expected to support

FUTURE communication networks are expected to support 1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,

More information

Memory Placement in Network Compression: Line and Grid Topologies

Memory Placement in Network Compression: Line and Grid Topologies ISITA212, Honolulu, Hawaii, USA, October 28-31, 212 Memory Placement in Network Compression: Line and Grid Topologies Mohsen Sardari, Ahmad Beirami, Faramarz Fekri School of Electrical and Computer Engineering,

More information

Minimization of Storage Cost in Distributed Storage Systems with Repair Consideration

Minimization of Storage Cost in Distributed Storage Systems with Repair Consideration Minimization of Storage Cost in Distributed Storage Systems with Repair Consideration Quan Yu Department of Electronic Engineering City University of Hong Kong Email: quanyu2@student.cityu.edu.hk Kenneth

More information

Fountain Codes Based on Zigzag Decodable Coding

Fountain Codes Based on Zigzag Decodable Coding Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes

More information

Coded Caching with Heterogenous Cache Sizes

Coded Caching with Heterogenous Cache Sizes Coded Caching with Heterogenous Cache Sizes Sinong Wang, Wenxin Li, Xiaohua Tian, Hui Liu Department of Electronic Engineering, Shanghai Jiao Tong University {snwang,xtian,huiliu}@sjtu.edu.cn arxiv:1504.0113v3

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Polynomial Codes: an Optimal Design for High-Dimensional Coded Matrix Multiplication

Polynomial Codes: an Optimal Design for High-Dimensional Coded Matrix Multiplication Polynomial Codes: an Optimal Design for High-Dimensional Coded Matrix Multiplication Qian Yu, Mohammad Ali Maddah-Ali, and A. Salman Avestimehr Department of Electrical Engineering, University of Southern

More information

SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC

SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC Randa Atta, Rehab F. Abdel-Kader, and Amera Abd-AlRahem Electrical Engineering Department, Faculty of Engineering, Port

More information

IN A WIRELINE network having a single source and a single

IN A WIRELINE network having a single source and a single IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 3, MARCH 2007 463 A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Student Member, IEEE, Amir F. Dana, Student Member, IEEE, Babak Hassibi,

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT

More information

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 8, AUGUST 2011 5227 Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi,

More information

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 191

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY 2011 2837 Approximate Capacity of a Class of Gaussian Interference-Relay Networks Soheil Mohajer, Member, IEEE, Suhas N. Diggavi, Member, IEEE,

More information

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks Gabriel E. Arrobo and Richard D. Gitlin Department of Electrical Engineering University of South Florida Tampa,

More information

Some Optimization Trade-offs in Wireless Network Coding

Some Optimization Trade-offs in Wireless Network Coding Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,

More information

CHARACTERIZING the capacity region of wireless

CHARACTERIZING the capacity region of wireless IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 5, MAY 2010 2249 The Balanced Unicast and Multicast Capacity Regions of Large Wireless Networks Abstract We consider the question of determining the

More information

MAXIMAL FLOW THROUGH A NETWORK

MAXIMAL FLOW THROUGH A NETWORK MAXIMAL FLOW THROUGH A NETWORK L. R. FORD, JR. AND D. R. FULKERSON Introduction. The problem discussed in this paper was formulated by T. Harris as follows: "Consider a rail network connecting two cities

More information

TDMA is Optimal for All-unicast DoF Region of TIM if and only if Topology is Chordal Bipartite

TDMA is Optimal for All-unicast DoF Region of TIM if and only if Topology is Chordal Bipartite 1 TDMA is Optimal for All-unicast DoF Region of TIM if and only if Topology is Chordal Bipartite Xinping Yi, Hua Sun, Syed A. Jafar, and David Gesbert arxiv:1501.07870v2 [cs.it] 5 Feb 2017 Abstract The

More information

ITERATIVE decoders have gained widespread attention

ITERATIVE decoders have gained widespread attention IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 11, NOVEMBER 2007 4013 Pseudocodewords of Tanner Graphs Christine A. Kelley, Member, IEEE, and Deepak Sridhara, Member, IEEE Abstract This paper presents

More information

Cache-Aided Private Information Retrieval with Unknown and Uncoded Prefetching

Cache-Aided Private Information Retrieval with Unknown and Uncoded Prefetching Cache-Aided Private Information Retrieval with Unknown and Uncoded Prefetching Yi-Peng Wei Karim Banawan Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College

More information

A Communication Architecture for Large Heterogeneous Wireless Networks

A Communication Architecture for Large Heterogeneous Wireless Networks A Communication Architecture for Large Heterogeneous Wireless Networks Urs Niesen Bell Laboratories, Alcatel-Lucent Murray Hill, NJ 07974 urs.niesen@alcatel-lucent.com Piyush upta Bell Laboratories, Alcatel-Lucent

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Optimal Reverse Carpooling Over Wireless Networks - A Distributed Optimization Approach

Optimal Reverse Carpooling Over Wireless Networks - A Distributed Optimization Approach 1 Optimal Reverse Carpooling Over Wireless Networks - A Distributed Optimization Approach Ali ParandehGheibi, Asu Ozdaglar, Michelle Effros, Muriel Médard parandeh@mit.edu, asuman@mit.edu, effros@caltech.edu,

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 3, MARCH Lifeng Lai, Ke Liu, Member, IEEE, and Hesham El Gamal, Senior Member, IEEE

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 3, MARCH Lifeng Lai, Ke Liu, Member, IEEE, and Hesham El Gamal, Senior Member, IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 3, MARCH 2006 805 The Three-Node Wireless Network: Achievable Rates and Cooperation Strategies Lifeng Lai, Ke Liu, Member, IEEE, and Hesham El Gamal,

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

The Index Coding Problem: A Game-Theoretical Perspective

The Index Coding Problem: A Game-Theoretical Perspective The Index Coding Problem: A Game-Theoretical Perspective Yu-Pin Hsu, I-Hong Hou, and Alex Sprintson Department of Electrical and Computer Engineering Texas A&M University {yupinhsu, ihou, spalex}@tamu.edu

More information

Multicast-aware Caching for Small Cell Networks

Multicast-aware Caching for Small Cell Networks Multicast-aware Caching for Small Cell Networks Konstantinos Poularakis, George Iosifidis, Vasilis Sourlas and Leandros Tassiulas arxiv:142.7314v1 [cs.ni] 28 Feb 214 Abstract The deployment of small cells

More information

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based 1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,

More information

Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks

Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks Alireza Keshavarz-Haddad Rudolf Riedi Department of Electrical and Computer Engineering and Department of

More information

Splitter Placement in All-Optical WDM Networks

Splitter Placement in All-Optical WDM Networks plitter Placement in All-Optical WDM Networks Hwa-Chun Lin Department of Computer cience National Tsing Hua University Hsinchu 3003, TAIWAN heng-wei Wang Institute of Communications Engineering National

More information

Adaptations of the A* Algorithm for the Computation of Fastest Paths in Deterministic Discrete-Time Dynamic Networks

Adaptations of the A* Algorithm for the Computation of Fastest Paths in Deterministic Discrete-Time Dynamic Networks 60 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 3, NO. 1, MARCH 2002 Adaptations of the A* Algorithm for the Computation of Fastest Paths in Deterministic Discrete-Time Dynamic Networks

More information

Modeling and Trade-off for Mobile Communication, Computing and Caching Networks

Modeling and Trade-off for Mobile Communication, Computing and Caching Networks Modeling and Trade-off for Mobile ommunication, omputing and aching Networks Yaping Sun, Zhiyong hen, Meixia Tao and Hui Liu Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai,

More information

An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing

An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing Sudipta Sengupta Shravan Rayanchu,2 Suman Banerjee 2 Bell Laboratories, Lucent Technologies, Murray Hill,

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1

4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 Mathematical programming (optimization) problem: min f (x) s.t. x X R n set of feasible solutions with linear objective function

More information

Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast

Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast 2005 Conference on Information Sciences and Systems, The Johns Hopkins University, March 16 18, 2005 Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast Yunnan Wu

More information

The Price of Selfishness in Network Coding Jason R. Marden, Member, IEEE, and Michelle Effros, Fellow, IEEE

The Price of Selfishness in Network Coding Jason R. Marden, Member, IEEE, and Michelle Effros, Fellow, IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 4, APRIL 2012 2349 The Price of Selfishness in Network Coding Jason R. Marden, Member, IEEE, and Michelle Effros, Fellow, IEEE Abstract A game-theoretic

More information

Distributed Caching in Device-to-Device Networks: A Stochastic Geometry Perspective

Distributed Caching in Device-to-Device Networks: A Stochastic Geometry Perspective Distributed Caching in Device-to-Device Networks: A Stochastic Geometry Perspective Shankar Krishnan and Harpreet S. Dhillon Abstract Increasing spatio-temporal correlation in the data demand makes it

More information

Cloud Processing and Edge Caching in HetNets: A Delivery Time Perspective

Cloud Processing and Edge Caching in HetNets: A Delivery Time Perspective Cloud Processing and Edge Caching in HetNets: A Delivery Time Perspective Aydin Sezgin Joint work with: Jaber Kakar, Soheil Gherekhloo and Zohaib Hassan Awan Institute for Digital Communication Systems

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Technical Report, April 2011 Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu

More information

DUE to the exponential growth in the number of smart

DUE to the exponential growth in the number of smart 1 Placement Delivery Array Design via Attention-Based Deep Neural Network Zhengming Zhang, Meng Hua, Chunguo Li, Senior Member, IEEE, Yongming Huang, Senior Member, IEEE, Luxi Yang, Member, IEEE arxiv:1805.00599v1

More information

A Theory of Network Equivalence Part I: Point-to-Point Channels

A Theory of Network Equivalence Part I: Point-to-Point Channels 972 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 2, FEBRUARY 2011 A Theory of Network Equivalence Part I: Point-to-Point Channels Ralf Koetter, Fellow, IEEE, Michelle Effros, Fellow, IEEE, and

More information

ON A WEAKER VERSION OF SUM LABELING OF GRAPHS

ON A WEAKER VERSION OF SUM LABELING OF GRAPHS ON A WEAKER VERSION OF SUM LABELING OF GRAPHS IMRAN JAVAID, FARIHA KHALID, ALI AHMAD and M. IMRAN Communicated by the former editorial board In this paper, we introduce super weak sum labeling and weak

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can 208 IEEE TRANSACTIONS ON MAGNETICS, VOL 42, NO 2, FEBRUARY 2006 Structured LDPC Codes for High-Density Recording: Large Girth and Low Error Floor J Lu and J M F Moura Department of Electrical and Computer

More information

Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE

Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 9, SEPTEMBER 2008 4119 Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE

More information

Joint BS Assignment and End-to-End Scheduling for Wireless Cellular Networks with Heterogeneous Services

Joint BS Assignment and End-to-End Scheduling for Wireless Cellular Networks with Heterogeneous Services 5th International Symposium on Wireless Pervasive Computing (ISWPC) Joint BS Assignment and End-to-End Scheduling for Wireless Cellular Networks with Heterogeneous Services Walid Saad, Sanaa Sharafeddine

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Figure 1: An example of a hypercube 1: Given that the source and destination addresses are n-bit vectors, consider the following simple choice of rout

Figure 1: An example of a hypercube 1: Given that the source and destination addresses are n-bit vectors, consider the following simple choice of rout Tail Inequalities Wafi AlBalawi and Ashraf Osman Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV fwafi,osman@csee.wvu.edug 1 Routing in a Parallel Computer

More information

Coded Cooperative Data Exchange for Multiple Unicasts

Coded Cooperative Data Exchange for Multiple Unicasts Coded Cooperative Data Exchange for Multiple Unicasts Shahriar Etemadi Tajbakhsh and Parastoo Sadeghi Research School of Engineering The Australian National University Canberra, 000, Australia Emails:

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Basics A 4 credit unit course Part of Theoretical Computer Science courses at the Laboratory of Mathematics There will be 4 hours

More information

Private Information Retrieval from Non-Replicated Databases

Private Information Retrieval from Non-Replicated Databases Private Information Retrieval from Non-Replicated Databases Karim Banawan Sennur Ulukus arxiv:1901.00004v1 [cs.it] 31 Dec 2018 Department of Electrical and Computer Engineering University of Maryland,

More information

Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching

Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching An Liu, Vincent LAU and Wei Han the Hong Kong University of Science and Technology Background 2 Cloud Radio Access Networks

More information

Content Caching and Scheduling in Wireless Networks with Elastic and Inelastic Traffic B.Muniswamy, Dr. N. Geethanjali

Content Caching and Scheduling in Wireless Networks with Elastic and Inelastic Traffic B.Muniswamy, Dr. N. Geethanjali www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issue 5 May 2016, Page No. 16679-16679 Content Caching and Scheduling in Wireless Networks with Elastic and

More information

Optimal Overlapped Message Passing Decoding of Quasi-Cyclic LDPC Codes

Optimal Overlapped Message Passing Decoding of Quasi-Cyclic LDPC Codes Optimal Overlapped Message Passing Decoding of Quasi-Cyclic LDPC Codes Yongmei Dai and Zhiyuan Yan Department of Electrical and Computer Engineering Lehigh University, PA 18015, USA E-mails: {yod304, yan}@lehigh.edu

More information

The Multi-Sender Multicast Index Coding

The Multi-Sender Multicast Index Coding The Multi-Sender Multicast Index Coding Lawrence Ong The University of Newcastle, Australia Email: lawrence.ong@cantab.net Fabian Lim Massachusetts Institute of Technology, USA Email: flim@mit.edu Chin

More information

Joint Routing, Scheduling, and Network Coding for Wireless Multihop Networks

Joint Routing, Scheduling, and Network Coding for Wireless Multihop Networks 211 International Symposium of Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks Joint Routing, Scheduling, and Network Coding for Wireless Multihop Networks Samat Shabdanov, Catherine

More information

Delay-Throughput Tradeoff for Supportive Two-Tier Networks

Delay-Throughput Tradeoff for Supportive Two-Tier Networks Delay-Throughput Tradeoff for Supportive Two-Tier Networks arxiv:082.4826v [cs.it] 28 Dec 2008 Long Gao, Rui Zhang, Changchuan Yin, Shuguang Cui Department of Electrical and Computer Engineering Texas

More information

Bounds on the signed domination number of a graph.

Bounds on the signed domination number of a graph. Bounds on the signed domination number of a graph. Ruth Haas and Thomas B. Wexler September 7, 00 Abstract Let G = (V, E) be a simple graph on vertex set V and define a function f : V {, }. The function

More information

Digital Image Processing Laboratory: MAP Image Restoration

Digital Image Processing Laboratory: MAP Image Restoration Purdue University: Digital Image Processing Laboratories 1 Digital Image Processing Laboratory: MAP Image Restoration October, 015 1 Introduction This laboratory explores the use of maximum a posteriori

More information

Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game

Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game 2012 7th International ICST Conference on Communications and Networking in China (CHINACOM) Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game Yuhua Xu, Zhan Gao and Wei

More information

Rank Minimization over Finite Fields

Rank Minimization over Finite Fields Rank Minimization over Finite Fields Vincent Y. F. Tan Laura Balzano, Stark C. Draper Department of Electrical and Computer Engineering, University of Wisconsin-Madison ISIT 2011 Vincent Tan (UW-Madison)

More information

Computing over Multiple-Access Channels with Connections to Wireless Network Coding

Computing over Multiple-Access Channels with Connections to Wireless Network Coding ISIT 06: Computing over MACS 1 / 20 Computing over Multiple-Access Channels with Connections to Wireless Network Coding Bobak Nazer and Michael Gastpar Wireless Foundations Center Department of Electrical

More information

13 Sensor networks Gathering in an adversarial environment

13 Sensor networks Gathering in an adversarial environment 13 Sensor networks Wireless sensor systems have a broad range of civil and military applications such as controlling inventory in a warehouse or office complex, monitoring and disseminating traffic conditions,

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

Private Information Retrieval with Side Information: the Single Server Case

Private Information Retrieval with Side Information: the Single Server Case Private Information Retrieval with Side Information: the Single Server Case Swanand adhe, Brenden Garcia, Anoosheh Heidarzadeh, Salim El Rouayheb, and Alex Sprintson Abstract We study the problem of Private

More information

Delay Minimization for Relay-based Cooperative Data Exchange with Network Coding

Delay Minimization for Relay-based Cooperative Data Exchange with Network Coding Delay Minimization for Relay-based Cooperative Data Exchange with Network Coding Zheng Dong,XiuminWang,S.H.Dau, Chau Yuen Singapore University of Technology and Design, Singapore Hefei University of Technology,

More information

Coded Caching via Projective Geometry: A new low subpacketization scheme

Coded Caching via Projective Geometry: A new low subpacketization scheme Coded Caching via Projective Geometry: A new low subpacketization scheme Hari Hara Suthan C, Bhavana, Prasad rishnan Signal Processing and Communications Research Center, International Institute of Information

More information

ROUGH MEMBERSHIP FUNCTIONS: A TOOL FOR REASONING WITH UNCERTAINTY

ROUGH MEMBERSHIP FUNCTIONS: A TOOL FOR REASONING WITH UNCERTAINTY ALGEBRAIC METHODS IN LOGIC AND IN COMPUTER SCIENCE BANACH CENTER PUBLICATIONS, VOLUME 28 INSTITUTE OF MATHEMATICS POLISH ACADEMY OF SCIENCES WARSZAWA 1993 ROUGH MEMBERSHIP FUNCTIONS: A TOOL FOR REASONING

More information

Beyond Interference Avoidance: Distributed Sub-network Scheduling in Wireless Networks with Local Views

Beyond Interference Avoidance: Distributed Sub-network Scheduling in Wireless Networks with Local Views Beyond Interference Avoidance: Distributed Sub-network Scheduling in Wireless etworks with Local Views Pedro E. Santacruz, Vaneet Aggarwal, and Ashutosh Sabharwal Abstract In most wireless networks, nodes

More information

IN mobile wireless networks, communications typically take

IN mobile wireless networks, communications typically take IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, VOL 2, NO 2, APRIL 2008 243 Optimal Dynamic Resource Allocation for Multi-Antenna Broadcasting With Heterogeneous Delay-Constrained Traffic Rui Zhang,

More information