2019 IEEE International Symposium on Information Theory (ISIT) 2019
DOI: 10.1109/isit.2019.8849314
|View full text |Cite
|
Sign up to set email alerts
|

On Coded Caching with Correlated Files

Abstract: This paper studies the fundamental limits of the shared-link caching problem with correlated files, where a server with a library of N files communicates with K users who can store M files. Given an integer r ∈ [N], correlation is modelled as follows: each r−subset of files contains a common block. The tradeoff between the cache size and the average transmitted load is considered. We first propose a converse bound under the constraint of uncoded cache placement (i.e., each user directly caches a subset of the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

2
14
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(16 citation statements)
references
References 15 publications
2
14
0
Order By: Relevance
“…1) We first show in Theorem 2 that the memory-rate pair (M, min{N, K}(1 − M/N )) is achievable for coded caching under information theoretic demand privacy. Our achievable scheme uses broadcast transmissions in the delivery phase, and this complements a similar result in [2] for their model using private unicast transmissions in the delivery stage. 2) We show in Theorem 3 that a demand-private scheme for N files and K users with the same memory-rate pair (M, R) can be obtained from a non-private scheme that serves only a subset of demands for N files and N K users.…”
Section: Introductionsupporting
confidence: 57%
See 4 more Smart Citations
“…1) We first show in Theorem 2 that the memory-rate pair (M, min{N, K}(1 − M/N )) is achievable for coded caching under information theoretic demand privacy. Our achievable scheme uses broadcast transmissions in the delivery phase, and this complements a similar result in [2] for their model using private unicast transmissions in the delivery stage. 2) We show in Theorem 3 that a demand-private scheme for N files and K users with the same memory-rate pair (M, R) can be obtained from a non-private scheme that serves only a subset of demands for N files and N K users.…”
Section: Introductionsupporting
confidence: 57%
“…2) We show in Theorem 3 that a demand-private scheme for N files and K users with the same memory-rate pair (M, R) can be obtained from a non-private scheme that serves only a subset of demands for N files and N K users. This is a refinement of results of [2], [3], and the scheme uses the idea in [3]. However, the observation that the particular non-private scheme is required to serve only a subset of demands is new, and this is used later for the case of N = K = 2, discussed in the next item.…”
Section: Introductionmentioning
confidence: 92%
See 3 more Smart Citations