2017 IEEE International Symposium on Information Theory (ISIT) 2017
DOI: 10.1109/isit.2017.8006723
|View full text |Cite
|
Sign up to set email alerts
|

Benefits of cache assignment on degraded broadcast channels

Abstract: Degraded K-user broadcast channels (BC) are studied when receivers are facilitated with cache memories. Lower and upper bounds are derived on the capacity-memory tradeoff, i.e., on the largest rate of reliable communication over the BC as a function of the receivers' cache sizes, and the bounds are shown to match for some special cases.The lower bounds are achieved by two new coding schemes that benefit from non-uniform cache assignment. Lower and upper bounds are also established on the global capacity-memory… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
44
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 40 publications
(44 citation statements)
references
References 36 publications
0
44
0
Order By: Relevance
“…Hence, the rate of each packet is only limited by the channel capacity of the intended user. A rather similar phenomena is observed in the single antenna case, by using multiple nested codebooks [22], [31], [32]. In MIMO setting, however, this can be done naturally, since each message is sent along a different spatial direction, and users can suppress the effect of the undesired but cached messages from the received signal, even before the decoding process starts.…”
Section: A Related Workmentioning
confidence: 69%
“…Hence, the rate of each packet is only limited by the channel capacity of the intended user. A rather similar phenomena is observed in the single antenna case, by using multiple nested codebooks [22], [31], [32]. In MIMO setting, however, this can be done naturally, since each message is sent along a different spatial direction, and users can suppress the effect of the undesired but cached messages from the received signal, even before the decoding process starts.…”
Section: A Related Workmentioning
confidence: 69%
“…Consider a system with four users and a library consists of four files, W 1 , W 2 , W 3 , W 4 , i.e., K = N = 4. Each user has a normalized memory size M = 11 2 , which gives us t = 2 and indicates that each of the resulting shares will be cached by two different users. The server encodes each file using (6,12) non-perfect secret sharing scheme.…”
Section: E An Illustrative Examplementioning
confidence: 99%
“…We extend the piggyback coding in [14] to the case when each user has cached contents. In a cache-aided K-user degraded Gaussian BC with h 2 1 ≤ h 2 2 ≤ · · · ≤ h 2 K , where message V r k , with rate ρ r k , is locally available at user k ∈ [K], message V c k , with rate ρ c k , can be reliably transmitted to user k, and message V k = (V r k , V c k ), with rate ρ k = ρ r k + ρ c k , can be decoded by users k + 1, .…”
Section: A Preliminariesmentioning
confidence: 99%
“…The works in [11]- [15] consider a more realistic noisy broadcast channel (BC) model from the server to the user. In [14], the authors consider a degraded BC and a total memory budget, and optimize the cache assignment to the users depending on their channel capacities. A different perspective is taken in [12], which highlights the benefits of caching and coded delivery in terms of the energy-efficiency in a Gaussian BC.…”
mentioning
confidence: 99%