2019
DOI: 10.48550/arxiv.1901.06383
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Coded Caching based on Combinatorial Designs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
5
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…In addition to this using Y m , the m th user gets the subfile indices shown in the sequence of expressions numbered (11) to (17). Notice that the last expression in (17) is the union of all the blocks in a parallel class.…”
Section: Appendixmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition to this using Y m , the m th user gets the subfile indices shown in the sequence of expressions numbered (11) to (17). Notice that the last expression in (17) is the union of all the blocks in a parallel class.…”
Section: Appendixmentioning
confidence: 99%
“…In addition to this using Y m , the m th user gets the subfile indices shown in the sequence of expressions numbered (11) to (17). Notice that the last expression in (17) is the union of all the blocks in a parallel class. So from the property of resolvable designs the above set is equal to the set containing all the subfile indices of all the files and therefore it also contains all the subfiles of the demanded file W dm .…”
Section: Appendixmentioning
confidence: 99%
See 1 more Smart Citation
“…The problem of designing a coded caching scheme thus becomes that of designing the appropriate PDA for some given parameters. Although the schemes proposed by Yan et al in [11] have significantly lower complexity than that of the Ali-Niesen schemes (i.e., the value of F is smaller) [6] at the cost of a slight increase in rate, F still increases exponentially with K. Several new methods for constructing PDAs have since been reported, see for example [1], [2], [9], [5], [11], [12].…”
Section: Introductionmentioning
confidence: 99%
“…In order to find subfile indices that m th user get from all (b r − 1) z transmissions, we have to vary the value of e s such that e s = a s , ∀s ∈[z].The m th user is able to receive subfile indices given bybr es = 1, es = as ∀s ∈ [z] {C 1,e1 ∩ C 2,e2 ∩ • • • ∩ C z,ez }.In addition to this using Y m , the m th user gets the subfile indices shown in the sequence of expressions numbered (14) to (20), as shown at the top of the page 13. Notice that the last expression in(17) is the union of all the blocks in a parallel class. So from the property of resolvable designs the above set is equal to the set∩ t∈X \m Y t = ls = {is,js}, ∀s ∈ [z] (l1,l2,...,lz) = (a1,a2,...,az) {C 1,l1 ∪ C 2,l2 ∪ • • • ∪ C z,lz } ls = {is,js}, ∀s ∈ [2,z] {C 1,e1 ∪ C 2,l2 ∪ • • • ∪ C z,lz } ⎪ ⎪ ⎪ ⎪ ⎪ ⎩ ls = {is,js}, ∀s ∈ [2,z] (l2,l3,...,lz) = (a2,a3,...,az) {C 1,a1 ∪ C 2,l2 ∪ • • • ∪ C z,lz } ⎫ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎬ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎭ = C 1,e1 ⎧ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎨ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎩ ls = {is,js}, ∀s ∈ [2,z] (l2,l3,...,lz) = (a2,a3,...,az) {C 1,a1 ∪ C 2,l2 ∪ C 3,l3 ∪ • • • ∪ C z,lz } ⎪ ⎪ ⎪ ⎪ ⎪ ⎨ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎩ ls = {is,js},∀s ∈ [2,z] (l2,l3,...,lz) = (a2,a3,...,az)…”
mentioning
confidence: 99%