2010 IEEE International Symposium on Information Theory 2010
DOI: 10.1109/isit.2010.5513313
|View full text |Cite
|
Sign up to set email alerts
|

A randomized algorithm and performance bounds for coded cooperative data exchange

Abstract: We consider scenarios where wireless clients are missing some packets, but they collectively know every packet. The clients collaborate to exchange missing packets over an error-free broadcast channel with capacity of one packet per channel use. First, we present an algorithm that allows each client to obtain missing packets, with minimum number of transmissions. The algorithm employs random linear coding over a sufficiently large field. Next, we show that the field size can be reduced while maintaining the sa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
138
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 79 publications
(139 citation statements)
references
References 7 publications
1
138
0
Order By: Relevance
“…More analyses based on the simulation results are discussed in the following section. In the simulation, to evaluate the performance of CACM, we compare it with existing algorithms, such as Random [23], BitTorrent [24], Random+LoadBalance, and BitTorrent+LoadBalance [25].…”
Section: Results Analysis and Discussionmentioning
confidence: 99%
“…More analyses based on the simulation results are discussed in the following section. In the simulation, to evaluate the performance of CACM, we compare it with existing algorithms, such as Random [23], BitTorrent [24], Random+LoadBalance, and BitTorrent+LoadBalance [25].…”
Section: Results Analysis and Discussionmentioning
confidence: 99%
“…Each user knows a subset of the frame and wants all the remaining packets he is missing. Soon after the introduction of this problem, NC community become applying coding technique [161,162,163,164,165] to improve the system performance. Using a network information flow formulation, the problem of minimizing the throughput (i.e.…”
Section: Trade-off Of Completion Time and Decoding Delaymentioning
confidence: 99%
“…The notable difference is that there is no BS and the users exchanging information by broadcasting packets (possibly network coded packets). In [165], Sprintson et al proposed a randomized polynomial-time solution to minimize the number of transmission in the DX problem. In [171] a deterministic polynomial time solution was proposed.…”
Section: Trade-off Of Completion Time and Decoding Delaymentioning
confidence: 99%
“…Although the number of constraints grows exponentially with the number of nodes, this integer linear program can be solved by polynomial-time algorithms due to the submodularity of the constraints. A randomized algorithm was proposed to estimate the minimum number of required transmissions [5]. Deterministic algorithms based on Dilworth Truncation optimization were proposed to compute the exact minimum number of required transmissions [3], [4], [6].…”
Section: A Related Workmentioning
confidence: 99%