2017 IEEE International Symposium on Information Theory (ISIT) 2017
DOI: 10.1109/isit.2017.8007038
|View full text |Cite
|
Sign up to set email alerts
|

Low subpacketization schemes for coded caching

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…For a large number of receivers, a large coding times is a problem in the coded caching schemes and beyond the scope of discussion in this paper. This problem has been discussed in [14]- [16]. In future works, these methods will be applied to proposed scheme and the conventional schemes and we will evaluate the partical delay time of these scheme in multi-rate wireless networks.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…For a large number of receivers, a large coding times is a problem in the coded caching schemes and beyond the scope of discussion in this paper. This problem has been discussed in [14]- [16]. In future works, these methods will be applied to proposed scheme and the conventional schemes and we will evaluate the partical delay time of these scheme in multi-rate wireless networks.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…Note that the achievable bound in (10) has been shown to be achievable for any integers r, h with r < h in [11], by using MDS code before placement phase. From (16), is inferior to the new scheme when M = N · 1 − h−r+1 K .…”
Section: Transforming Pdas Into Larger C-pdasmentioning
confidence: 94%
“…They have been introduced in the literature through several other equivalent formulations (like placement delivery array etc.) [13]- [18]. In the next section,…”
Section: A Centralized Schemes -Ruzsa-szemerédi Constructionsmentioning
confidence: 97%
“…Initial centralized schemes required file sizes exponential in K to obtain constant worst case rate (we always assume ratio M/N is a constant in this work that does not scale with K). Subsequent works [13]- [18] have explored centralized schemes that attain sub-exponential file size and constant worst-case rate. Even linear file size for near-constant rates is feasible in theory although this requires impractically large values of K [19].…”
Section: Introductionmentioning
confidence: 99%