89 results on '"Tuninetti, A."'
Search Results
2. A Novel Scheme for Coded Caching with Coded Placement in Small Memory Regime
- Author
-
Ma, Yinbin and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
This paper presents a novel achievable scheme for coded caching systems with $N$ files and $K$ users, specifically when $N \leq K$. This new scheme employs linear coding both during the placement phase - where cache contents are linear combinations of files from the library - and the delivery phase. The multi-step delivery phase enables users to decode the cached coded content and eliminate interference effectively. In the small memory regime, the proposed scheme outperforms existing methods, particularly when $K$ and $N$ values are similar, it maintains manageable sub-packetization levels, and operates over a finite field of size $3$ regardless of the system parameters., Comment: Results have been proved in arXiv 1612.09071
- Published
- 2024
3. New optimal trade-off point for coded caching systems with limited cache size
- Author
-
Ma, Yinbin and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
This paper presents a new achievable scheme for coded caching systems with $\mathsf{N}$ files, $\mathsf{K}=\mathsf{N}$ users, and cache size $\mathsf{M}=1/(\mathsf{N}-1)$. The scheme employs linear coding during the cache placement phase, and a three-stage transmissions designed to eliminate interference in the delivery phase. The achievable load meets a known converse bound, which impose no constraint on the cache placement, and is thus optimal. This new result, together with known inner and outer bounds, shows optimality of linear coding placement for $\mathsf{M} \leq 1/(\mathsf{N}-1)$ when $\mathsf{K}=\mathsf{N}\geq 3$. Interestingly and surprisingly, the proposed scheme is relatively simple but requires operations on a finite field of size at least 3., Comment: Results have been proved in arXiv 1612.09071
- Published
- 2023
4. Demand Privacy in Hotplug Caching Systems
- Author
-
Ma, Yinbin and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
Coded caching, introduced by Maddah-Ali and Niesen (MAN), is a model where a server broadcasts multicast packets to users with a local cache that is leveraged so as to reduce the peak network communication load. The original MAN model does not consider missing demands (i.e., some users may not request a file) or privacy issues (i.e., decoding the multicast packets may expose the users' demands). The former issue was captured by the hotplug model with offline users, where the server starts sending multicast packets after having received a certain number of file requests. The latter issue was addressed by devoting part of the cache to store privacy keys to help users decode their requested file while remaining completely ignorant about the demands of the remaining users. This paper investigates the problem of private demands against colluding users in the hotplug model with offline users. Two achievable schemes are proposed based on Maximum Distance Separable (MDS) codes. They achieve lower subpacketization, and lower load in the small memory regime compared to baseline schemes that trivially include demand privacy or offline users in known schemes.
- Published
- 2023
5. On Second Order Rate Regions for the Static Scalar Gaussian Broadcast Channel
- Author
-
Tuninetti, Daniela, Sheldon, Paul, Smida, Besma, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
This paper considers the single antenna, static Gaussian broadcast channel in the finite blocklength regime. Second order achievable and converse rate regions are presented. Both a global reliability requirement and per-user reliability requirements are considered. The two-user case is analyzed in detail, and generalizations to the $K$-user case are also discussed. The largest second order achievable region presented here requires both superposition and rate splitting in the code construction, as opposed to the (infinite blocklength, first order) capacity region which does not require rate splitting. Indeed, the finite blocklength penalty causes superposition alone to under-perform other coding techniques in some parts of the region. In the two-user case with per-user reliability requirements, the capacity achieving superposition coding order (with the codeword of the user with the smallest SNR as cloud center) does not necessarily gives the largest second order region. Instead, the message of the user with the smallest point-to-point second order capacity should be encoded in the cloud center in order to obtain the largest second order region for the proposed scheme.
- Published
- 2022
6. On Coded Caching Systems with Offline Users
- Author
-
Ma, Yinbin and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
Coded caching is a technique that leverages locally cached contents at the users to reduce the network's peak-time communication load. Coded caching achieves significant performance gains compared to uncoded caching schemes and is thus a promising technique to boost performance in future networks. In the original model introduced by Maddah-Ali and Niesen (MAN), a server stores multiple files and is connected to multiple cache-aided users through an error-free shared link; once the local caches have been filled and all users have sent their demand to the server, the server can start sending coded multicast messages to satisfy all users' demands. A practical limitation of the original MAN model is that it halts if the server does not receive all users' demands, which is the limiting case of asynchronous coded caching when the requests of some users arrive with infinite delay. In this paper we formally define a coded caching system where some users are offline. We propose achievable and converse bounds for this novel setting and show under which conditions they meet, thus providing an optimal solution, and when they are to within a constant multiplicative gap of two. Interestingly, when optimality can be be shown, the optimal load-memory tradeoff only depends on the number active users, and not on the total (active plus offline) number of users.
- Published
- 2022
7. Capacity and Stability Regions for Layered Packet Erasure Broadcast Channels with Feedback
- Author
-
Li, Siyao, Tuninetti, Daniela, Devroye, Natasha, and Seferoglu, Hulya
- Subjects
Computer Science - Information Theory - Abstract
This paper focuses on the Layered Packet Erasure Broadcast Channel (LPE-BC) with Channel Output Feedback (COF) available at the transmitter. The LPE-BC is a high-SNR approximation of the fading Gaussian BC recently proposed by Tse and Yates, who characterized the capacity region for any number of users and any number of layers when there is no COF. This paper provides a comparative overview of this channel model along the following lines: First, inner and outer bounds to the capacity region (set of achievable rates with backlogged arrivals) are presented: a) a new outer bound based on the idea of the physically degraded broadcast channel, and b) an inner bound of the LPE-BC with COF for the case of two users and any number of layers. Next, an inner bound on the stability region (set of exogenous arrival rates for which packet arrival queues are stable) for the same model is derived. The capacity region inner bound generalizes past results for the two-user erasure BC, which is a special case of the LPE-BC with COF with only one layer. The novelty lies in the use of inter-user and inter-layer network coding retransmissions (for those packets that have only been received by the unintended user), where each random linear combination may involve packets intended for any user originally sent on any of the layers. For the case of $K = 2$ users and $Q \geq 1$ layers, the inner bounds to the capacity region and the stability region coincide; both strategically employ the novel retransmission protocol. For the case of $Q = 2$ layers, sufficient conditions are derived by Fourier-Motzkin elimination for the inner bound on the stability region to coincide with the capacity outer bound, thus showing that in those cases the capacity and stability regions coincide.
- Published
- 2021
8. Robust and Secure Cache-aided Private Linear Function Retrieval from Coded Servers
- Author
-
Yan, Qifa and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
This work investigates a system where each user aims to retrieve a scalar linear function of the files of a library, which are Maximum Distance Separable coded and stored at multiple distributed servers. The system needs to guarantee robust decoding in the sense that each user must decode its demanded function with signals received from any subset of servers whose cardinality exceeds a threshold. In addition, (a) the content of the library must be kept secure from a wiretapper who obtains all the signals from the servers;(b) any subset of users together can not obtain any information about the demands of the remaining users; and (c) the users' demands must be kept private against all the servers even if they collude. Achievable schemes are derived by modifying existing Placement Delivery Array (PDA) constructions, originally proposed for single-server single-file retrieval coded caching systems without any privacy or security or robustness constraints. It is shown that the PDAs describing the original Maddah-Ali and Niesen's coded caching scheme result in a load-memory tradeoff that is optimal to within a constant multiplicative gap, except for the small memory regime when the number of file is smaller than the number of users. As by-products, improved order optimality results are derived for three less restrictive systems in all parameter regimes., Comment: 23 pages, 4 figure
- Published
- 2021
9. A General Coded Caching Scheme for Scalar Linear Function Retrieval
- Author
-
Ma, Yinbin and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
Coded caching aims to minimize the network's peak-time communication load by leveraging the information pre-stored in the local caches at the users. The original single file retrieval setting by Maddah-Ali and Niesen has been recently extended to general Scalar Linear Function Retrieval (SLFR) by Wan et al., who proposed a linear scheme that surprisingly achieves the same optimal load (under the constraint of uncoded cache placement) as in single file retrieval. This paper's goal is to characterize the conditions under which a general SLFR linear scheme is optimal and gain practical insights into why the specific choices made by Wan et al. work. This paper shows that the optimal decoding coefficients are necessarily the product of two terms, one only involving the encoding coefficients and the other only the demands. In addition, the relationships among the encoding coefficients are shown to be captured by the cycles of certain graphs. Thus, a general linear scheme for SLFR can be found by solving a spanning tree problem., Comment: Submitted to ISIT 2021
- Published
- 2021
10. Cache-aided General Linear Function Retrieval
- Author
-
Wan, Kai, Sun, Hua, Ji, Mingyue, Tuninetti, Daniela, and Caire, Giuseppe
- Subjects
Computer Science - Information Theory - Abstract
Coded Caching, proposed by Maddah-Ali and Niesen (MAN), has the potential to reduce network traffic by pre-storing content in the users' local memories when the network is underutilized and transmitting coded multicast messages that simultaneously benefit many users at once during peak-hour times. This paper considers the linear function retrieval version of the original coded caching setting, where users are interested in retrieving a number of linear combinations of the data points stored at the server, as opposed to a single file. This extends the scope of the Authors' past work that only considered the class of linear functions that operate element-wise over the files. On observing that the existing cache-aided scalar linear function retrieval scheme does not work in the proposed setting, this paper designs a novel coded caching scheme that outperforms uncoded caching schemes that either use unicast transmissions or let each user recover all files in the library., Comment: 21 pages, 4 figures, published in Entropy 2021, 23(1), 25
- Published
- 2020
- Full Text
- View/download PDF
11. Link prediction in multiplex networks via triadic closure
- Author
-
Aleta, Alberto, Tuninetti, Marta, Paolotti, Daniela, Moreno, Yamir, and Starnini, Michele
- Subjects
Computer Science - Social and Information Networks ,Computer Science - Machine Learning ,Physics - Physics and Society - Abstract
Link prediction algorithms can help to understand the structure and dynamics of complex systems, to reconstruct networks from incomplete data sets and to forecast future interactions in evolving networks. Available algorithms based on similarity between nodes are bounded by the limited amount of links present in these networks. In this work, we reduce this latter intrinsic limitation and show that different kind of relational data can be exploited to improve the prediction of new links. To this aim, we propose a novel link prediction algorithm by generalizing the Adamic-Adar method to multiplex networks composed by an arbitrary number of layers, that encode diverse forms of interactions. We show that the new metric outperforms the classical single-layered Adamic-Adar score and other state-of-the-art methods, across several social, biological and technological systems. As a byproduct, the coefficients that maximize the Multiplex Adamic-Adar metric indicate how the information structured in a multiplex network can be optimized for the link prediction task, revealing which layers are redundant. Interestingly, this effect can be asymmetric with respect to predictions in different layers. Our work paves the way for a deeper understanding of the role of different relational data in predicting new interactions and provides a new algorithm for link prediction in multiplex networks that can be applied to a plethora of systems., Comment: arXiv admin note: substantial text overlap with arXiv:2005.04432
- Published
- 2020
- Full Text
- View/download PDF
12. Optimal Linear Coding Schemes for the Secure Decentralized Pliable Index Coding Problem
- Author
-
Liu, Tang and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
We study the secure decentralized Pliable Index CODing (PICOD) problem with circular side information sets at the users. The security constraint forbids every user to decode more than one message while a decentralized setting means there is no central transmitter in the system. Compared to the secure but centralized version of the problem, a converse bound from one of our previous works showed a factor of three difference in optimal code length under the constraint of linear encoding. In this paper, we first list the linearly infeasible cases, that is, problems where no linear code can simultaneously achieve both correctness/decodability and security. Then, we propose linear coding schemes for all remaining cases and show that their attained code length is to within an additive constant gap from our converse bound., Comment: 13 pages, 31 figures, 1 table
- Published
- 2020
13. Key Superposition Simultaneously Achieves Security and Privacy in Cache-Aided Linear Function Retrieval
- Author
-
Yan, Qifa and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
This work investigates the problem of cache-aided content Secure and demand Private Linear Function Retrieval (SP-LFR), where three constraints are imposed on the system:(a) each user is interested in retrieving an arbitrary linear combination of the files in the server's library;(b) the content of the library must be kept secure from a wiretapper who obtains the signal sent by the server; and (c) no colluding subset of users together obtain information about the demands of the remaining users. A procedure is proposed to derive an SP-LFR scheme from a given Placement Delivery Array (PDA), which is known to give coded caching schemes with low subpacketization for systems with neither security nor privacy constraints. This procedure uses the superposition of security keys and privacy keys in both the cache placement and transmitted signal to guarantee content security and demand privacy, respectively. In particular, among all PDA-based SP-LFR schemes, the memory-load pairs achieved by the PDA describing the Maddah-Ali and Niesen's scheme are Pareto-optimal and have the lowest subpacketization. Moreover, the achieved load-memory tradeoff is optimal to within a constant multiplicative gap except for the small memory regime (i.e., when the cache size is between 1 and 2) and the number of files is smaller than the number of users. Remarkably, the memory-load tradeoff does not increase compared to the best known schemes that guarantee either only content security in all regimes or only demand privacy in regime mentioned above., Comment: 24 pages, 4 figures
- Published
- 2020
14. Fundamental Limits of Caching for Demand Privacy against Colluding Users
- Author
-
Yan, Qifa and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
This work investigates the problem of demand privacy against colluding users for shared-link coded caching systems, where no subset of users can learn any information about the demands of the remaining users. The notion of privacy used here is stronger than similar notions adopted in past work and is motivated by the practical need to insure privacy regardless of the file distribution. Two scenarios are considered: Single File Retrieval (SFR) and Linear Function Retrieval (LFR), where in the latter case each user demands an arbitrary linear combination of the files at the server. The main contributions of this paper are a novel achievable scheme for LFR, referred as privacy key scheme, and a new information theoretic converse bound for SFR. Clearly, being SFR a special case of LFR, an achievable scheme for LFR works for SFR as well, and a converse for SFR is a valid converse for LFR as well. By comparing the performance of the achievable scheme with the converse bound derived in this paper (for the small cache size regime) and existing converse bounds without privacy constraints (in the remaining memory regime), the communication load of the privacy key scheme turns out to be optimal to within a constant multiplicative gap in all parameter regimes. Numerical results show that the new privacy key scheme outperforms in some regime known schemes based on the idea of virtual users, which also satisfy the stronger notion of user privacy against colluding users adopted here. Moreover, the privacy key scheme enjoys much lower subpacketization than known schemes based on virtual users., Comment: 31 pages, 4 figures
- Published
- 2020
15. Cache-Aided Matrix Multiplication Retrieval
- Author
-
Wan, Kai, Sun, Hua, Ji, Mingyue, Tuninetti, Daniela, and Caire, Giuseppe
- Subjects
Computer Science - Information Theory - Abstract
Coded caching is a promising technique to smooth out network traffic by storing part of the library content at the users' local caches. The seminal work on coded caching for single file retrieval by Maddah-Ali and Niesen (MAN) showed the existence of a global caching gain that scales with the total memory in the system, in addition to the known local caching gain in uncoded systems. This paper formulates a novel cache-aided matrix multiplication retrieval problem, relevant for data analytics and machine learning applications. In the considered problem, each cache-aided user requests the product of two matrices from the library. A structure-agnostic solution is to treat each possible matrix product as an independent file and use the MAN coded caching scheme for single file retrieval. This paper proposes two structure-aware schemes, which partition each matrix in the library by either rows or columns and let a subset of users cache some sub-matrices, that improve on the structure-agnostic scheme. For the case where the library matrices are "fat" matrices, the structure-aware row-partition scheme is shown to be order optimal under some constraint., Comment: 41 pages, 5 figures, submitted to Transactions on Information Theory
- Published
- 2020
16. Prediction of scientific collaborations through multiplex interaction networks
- Author
-
Tuninetti, Marta, Aleta, Alberto, Paolotti, Daniela, Moreno, Yamir, and Starnini, Michele
- Subjects
Physics - Physics and Society ,Computer Science - Digital Libraries - Abstract
Link prediction algorithms can help to understand the structure and dynamics of scientific collaborations and the evolution of Science. However, available algorithms based on similarity between nodes of collaboration networks are bounded by the limited amount of links present in these networks. In this work, we reduce the latter intrinsic limitation by generalizing the Adamic-Adar method to multiplex networks composed by an arbitrary number of layers, that encode diverse forms of scientific interactions. We show that the new metric outperforms other single-layered, similarity-based scores and that scientific credit, represented by citations, and common interests, measured by the usage of common keywords, can be predictive of new collaborations. Our work paves the way for a deeper understanding of the dynamics driving scientific collaborations, and provides a new algorithm for link prediction in multiplex networks that can be applied to a plethora of systems.
- Published
- 2020
- Full Text
- View/download PDF
17. An Index Coding Approach to Caching with Uncoded Cache Placement
- Author
-
Wan, Kai, Tuninetti, Daniela, and Piantanida, Pablo
- Subjects
Computer Science - Information Theory - Abstract
Caching is an efficient way to reduce network traffic congestion during peak hours, by storing some content at the user's local cache memory, even without knowledge of user's later demands. Maddah-Ali and Niesen proposed a two-phase (placement phase and delivery phase) coded caching strategy for broadcast channels with cache-aided users. This paper investigates the same model under the constraint that content is placed uncoded within the caches, that is, when bits of the files are simply copied within the caches. When the cache contents are uncoded and the users' demands are revealed, the caching problem can be connected to an index coding problem. This paper focuses on deriving fundamental performance limits for the caching problem by using tools for the index coding problem that were either known or are newly developed in this work. First, a converse bound for the caching problem under the constraint of uncoded cache placement is proposed based on the "acyclic index coding converse bound". This converse bound is proved to be achievable by the Maddah-Ali and Niesen's scheme when the number of files is not less than the number of users, and by a newly derived index coding achievable scheme otherwise. The proposed index coding achievable scheme is based on distributed source coding and strictly improves on the widely used "composite (index) coding" achievable bound and its improvements, and is of independent interest. An important consequence of the findings of this paper is that advancements on the coded caching problem posed by Maddah-Ali and Niesen are thus only possible by considering strategies with coded placement phase. A recent work by Yu et al. has however shown that coded cache placement can at most half the network load compared to the results presented in this paper., Comment: 15 pages, 5 figures, to appear in IEEE Transactions on Information Theory, the journal version of arXiv:1511.02256, arXiv:1601.06383, and arXiv:1702.07265
- Published
- 2020
18. Secure Decentralized Pliable Index Coding
- Author
-
Liu, Tang and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
This paper studies a variant of the Pliable Index CODing (PICOD) problem, i.e., an index coding problem where a user can be satisfied by decoding any message that is not in its side information set, where communication is decentralized, i.e., it occurs among users rather than by the central server, and secure, i.e., each user is allowed to decode only one message outside its side information set and must not be able to collect any information about any other message that is not its decoded one. Given the difficulty of the general version of this problem, this paper focuses on the case where the side information sets are `$s$~circular shifts', namely, user $u$'s side information set is the set of messages indexed by $\{u, u+1, \ldots, u+s-1\}$ for some fixed $s$ and where the indices are intended modulo the cardinality of the message set. This particular setting has been studied in the `decentralized non-secure' and in the `centralized secure' settings, thus allows one to quantify the cost of decentralized communication under security constraints on the number of transmissions. Interestingly, the decentralized vs the centralized secure setting incurs a multiplicative gap of approximately~three. This is in contrast to the cases without security constraint, where the multiplicative gap is known to be at most two., Comment: 6 pages, 1 figure, submitted to ISIT 2020
- Published
- 2020
19. On Optimal Load-Memory Tradeoff of Cache-Aided Scalar Linear Function Retrieval
- Author
-
Wan, Kai, Sun, Hua, Ji, Mingyue, Tuninetti, Daniela, and Caire, Giuseppe
- Subjects
Computer Science - Information Theory - Abstract
Coded caching has the potential to greatly reduce network traffic by leveraging the cheap and abundant storage available in end-user devices so as to create multicast opportunities in the delivery phase. In the seminal work by Maddah-Ali and Niesen (MAN), the shared-link coded caching problem was formulated, where each user demands one file (i.e., single file retrieval). This paper generalizes the MAN problem so as to allow users to request scalar linear functions of the files. This paper proposes a novel coded delivery scheme that, based on MAN uncoded cache placement, is shown to allow for the decoding of arbitrary scalar linear functions of the files (on arbitrary finite fields). Interestingly, and quite surprisingly, it is shown that the load for cache-aided scalar linear function retrieval depends on the number of linearly independent functions that are demanded, akin to the cache-aided single-file retrieval problem where the load depends on the number of distinct file requests. The proposed scheme is optimal under the constraint of uncoded cache placement, in terms of worst-case load, and within a factor 2 otherwise. The key idea of this paper can be extended to all scenarios which the original MAN scheme has been extended to, including demand-private and/or device-to-device settings., Comment: 33 pages, to be submitted to TIT, a short version submitted to ISIT 2020
- Published
- 2020
20. On the Fundamental Limits of Device-to-Device Private Caching under Uncoded Cache Placement and User Collusion
- Author
-
Wan, Kai, Sun, Hua, Ji, Mingyue, Tuninetti, Daniela, and Caire, Giuseppe
- Subjects
Computer Science - Information Theory - Abstract
In the coded caching problem, as originally formulated by Maddah-Ali and Niesen, a server communicates via a noiseless shared broadcast link to multiple users that have local storage capability. In order for a user to decode its demanded file from the coded multicast transmission, the demands of all the users must be globally known, which may violate the privacy of the users. To overcome this privacy problem, Wan and Caire recently proposed several schemes that attain coded multicasting gain while simultaneously guarantee information theoretic privacy of the users' demands. In Device-to-Device (D2D) networks, the demand privacy problem is further exacerbated by the fact that each user is also a transmitter, which appears to be needing the knowledge of the files demanded by the remaining users in order to form its coded multicast transmission. This paper shows how to solve this seemingly infeasible problem. The main contribution of this paper is the development of novel achievable and converse bounds for D2D coded caching that are to within a constant factor of one another when privacy of the users' demands must be guaranteed even in the presence of colluding users., Comment: 29 pages, accepted for publication in IEEE Trans. Information Theory
- Published
- 2019
21. Device-to-Device Private Caching with Trusted Server
- Author
-
Wan, Kai, Sun, Hua, Ji, Mingyue, Tuninetti, Daniela, and Caire, Giuseppe
- Subjects
Computer Science - Information Theory - Abstract
In order to preserve the privacy of the users demands from other users, in this paper we formulate a novel information theoretic Device-to-Device (D2D) private caching model by adding a trusted server. In the delivery phase, the trusted server collects the users demands and sends a query to each user, who then broadcasts packets according to this query. Two D2D private caching schemes (uncoded and coded) are proposed in this paper, which are shown to be order optimal., Comment: accepted in 2020 IEEE International Conference on Communications
- Published
- 2019
22. On Code Design for Wireless Channels with Additive Radar Interference
- Author
-
Brunero, Federico, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
This paper considers the problem of code design for a channel where communications and radar systems coexist, modeled as having both Additive White Gaussian Noise (AWGN) and Additive Radar Interference (ARI). The issue of how to adapt or re-design convolutional codes (decoded by the Viterbi algorithm) and LDPC codes (decoded by the sum-product algorithm and optimized by using the EXIT chart method) to effectively handle the overall non-Gaussian ARI noise is investigated. A decoding metric is derived from the non-Gaussian ARI channel transition probability as a function of the Signal-to-Noise Ratio (SNR) and Interference-to-Noise Ratio (INR). Two design methodologies are benchmarked against a baseline "unaltered legacy system", where a code designed for AWGN-only noise, but used on the non-Gaussian ARI channel, is decoded by using the AWGN-only metric (i.e., as if INR is zero). The methodologies are: M1) codes designed for AWGN-only noise, but decoded with the new metric that accounts for both SNR and INR; and M2) codes optimized for the overall non-Gaussian ARI channel. Both methodologies give better average Bit Error Rate (BER) in the high INR regime compared to the baseline. In the low INR regime, both methodologies perform as the baseline since in this case the radar interference is weak. Interestingly, the performance improvement of M2 over M1 is minimal. In practice, this implies that specifications in terms of channel error correcting codes for commercially available wireless systems need not be changed, and that it suffices to use an appropriate INR-based decoding metric in order to effectively cope with the ARI.
- Published
- 2019
23. Decentralized Pliable Index Coding
- Author
-
Liu, Tang and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
This paper introduces the ${\it decentralized}$ Pliable Index CODing (PICOD) problem: a variant of the Index Coding (IC) problem, where a central transmitter serves ${\it pliable}$ users with message side information; here, pliable refers to the fact that a user is satisfied by decoding ${\it any}$ $t$ messages that are not in its side information set. In the decentralized PICOD, a central transmitter with knowledge of all messages is not present, and instead users share among themselves massages that can only depend on their local side information set. This paper characterizes the capacity of two classes of decentralized complete--$S$ PICOD$(t)$ problems with $m$ messages (where the set $S\subset[m]$ contains the sizes of the side information sets, and the number of users is $n=\sum_{s\in S}\binom{m}{s}$, with no two users having the same side information set): (i) the consecutive case: $S=[s_\min:s_\max]$ for some $0 \leq s_\min\leq s_\max \leq m-t$, and (ii) the complement-consecutive case: $S=[0:m-t]\backslash[s_\min:s_\max]$, for some $0 < s_\min\leq s_\max < m-t$. Interestingly, the optimal code-length for the decentralized PICOD in those cases is the same as for the classical (centralized) PICOD counterpart, except when the problem is no longer pliable, that is, it reduces to an IC problem where every user needs to decode all messages not in its side information set. Although the optimal code-length may be the same in both centralized and decentralized settings, the actual optimal codes are not. For the decentralized PICOD, sparse Maximum Distance Separable (MDS) codes and vector linear index codes are used (as opposed to scalar linear codes)., Comment: 5 pages. To be presented at ISIT 2019
- Published
- 2019
24. Private Pliable Index Coding
- Author
-
Liu, Tang and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
The Pliable Index CODing (PICOD) problem is a variant of the Index Coding (IC) problem, where the desired messages by the users, who are equipped with message side information, is part of the optimization. This paper studies the PICOD problem where users are subject to a privacy constraint. In particular, the following spacial class of private PICODs is investigated: 1) the side information structure is circular, and 2) each user can decode one and only one message. The first condition is a special case of the "circular-arc network topology hypergraph" class of PICOD studied in [Liu and D. Tuninetti, "Tight information theoretic converse results for some pliable index coding problems," ITW, 2018], for which an optimal solution was given without the privacy constraint. The second condition was first studied in [S. Sasi and B. S. Rajan, "On pliable index coding," arXiv:1901.05809] and was motivated by the need to keep content privacy is some distribution networks. This paper proposes both converse and achievable bounds. The proposed achievable scheme not only strictly outperforms the one in [S. Sasi and B. S. Rajan, "On pliable index coding," arXiv:1901.05809] for some values of the system parameters, but it is also information theoretically optimal in some settings. For the remaining cases, the proposed linear code is shown to require at most one more transmission than the converse bound derived by restricting the sender to only use linear codes., Comment: 6 pages. Submitted to ITW 2019. Eq. 4 changed for a constraint on individual messages in v3
- Published
- 2019
25. On Coded Caching with Correlated Files
- Author
-
Wan, Kai, Tuninetti, Daniela, Ji, Mingyue, and Caire, Giuseppe
- Subjects
Computer Science - Information Theory - Abstract
This paper studies the fundamental limits of the shared-link coded caching problem with correlated files, where a server with a library of $N$ files communicates with $K$ users who can locally cache $M$ files. Given an integer $r \in [N]$, correlation is modeled as follows: each r-subset of files contains a unique common block. The tradeoff between the cache size and the average transmitted load is considered. First, a converse bound under the constraint of uncoded cache placement (i.e., each user directly stores a subset of the library bits) is derived. Then, a caching scheme for the case where every user demands a distinct file (possible for $N \geq K$) is shown to be optimal under the constraint of uncoded cache placement. This caching scheme is further proved to be decodable and optimal under the constraint of uncoded cache placement when (i) $KrM \leq 2N$ or $KrM \geq (K - 1)N $or $r \in \{1,2,N- 1,N\}$ for every demand type (i.e., when the demanded file are not necessarily distinct), and (ii) when the number of distinct demanded files is no larger than four. Finally, a two-phase delivery scheme based on interference alignment is shown to be optimal to within a factor of 2 under the constraint of uncoded cache placement for every possible demands. As a by-product, the proposed interference alignment scheme is shown to reduce the (worst-case or average) load of state-of-the-art schemes for the coded caching problem where the users can request multiple files., Comment: A short version of this paper was presented at the 2019 IEEE International Symposium on Information Theory
- Published
- 2019
26. On the Capacity Region of the Layered Packet Erasure Broadcast Channel with Feedback
- Author
-
Li, Siyao, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
In this paper, the capacity region of the Layered Packet Erasure Broadcast Channel (LPE-BC) with Channel Output Feedback (COF) available at the transmitter is investigated. The LPE-BC is a high-SNR approximation of the fading Gaussian BC recently proposed by Tse and Yates, who characterized the capacity region for any number of users and any number of layers when there is no COF. This paper derives capacity inner and outer bounds for the LPE-BC with COF for the case of two users and any number of layers. The inner bounds generalize past results for the two-user erasure BC, which is a special case of the LPE-BC with COF with only one layer. The novelty lies in the use of \emph{inter-user \& inter-layer network coding} retransmissions (for those packets that have only been received by the unintended user), where each random linear combination may involve packets intended for any user originally sent on any of the layers. Analytical and numerical examples show that the proposed outer bound is optimal for some LPE-BCs., Comment: 6 pages, 1 figure, submitted to 2019 IEEE International Conference on Communications (ICC)
- Published
- 2019
27. On the Fundamental Limits of Fog-RAN Cache-aided Networks with Downlink and Sidelink Communications
- Author
-
Wan, Kai, Tuninetti, Daniela, Ji, Mingyue, and Caire, Giuseppe
- Subjects
Computer Science - Information Theory - Abstract
Maddah-Ali and Niesen (MAN) in 2014 showed that coded caching in single bottleneck-link broadcast networks allows serving an arbitrarily large number of cache-equipped users with a total link load (bits per unit time) that does not scale with the number of users. Since then, the general topic of coded caching has generated enormous interest both from the information theoretic and (network) coding theoretic viewpoint, and from the viewpoint of applications. Building on the MAN work, this paper considers a particular network topology referred to as cache-aided Fog Radio Access Network (Fog-RAN), that includes a Macro-cell Base Station (MBS) co-located with the content server, several cache-equipped Small-cell Base Stations (SBSs), and many users without caches. Some users are served directly by the MBS broadcast downlink, while other users are served by the SBSs. The SBSs can also exchange data via rounds of direct communication via a side channel, referred to as "sidelink". For this novel Fog-RAN model, the fundamental tradeoff among (a) the amount of cache memory at the SBSs, (b) the load on the downlink (from MBS to directly served users and SBSs), and (c) the aggregate load on the sidelink is studied, under the standard worst-case demand scenario. Several existing results are recovered as special cases of this network model and byproduct results of independent interest are given. Finally, the role of topology-aware versus topology-agnostic caching is discussed., Comment: 53 pages, 6 figures, submitted to Transactions on Information Theory
- Published
- 2018
28. Tight Information Theoretic Converse Results for some Pliable Index Coding Problems
- Author
-
Liu, Tang and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
This paper studies the Pliable Index CODing problem (PICOD), which models content-type distribution networks. In the PICOD$(t)$ problem there are $m$ messages, $n$ users and each user has a distinct message side information set, as in the classical Index Coding problem (IC). Differently from IC, where each user has a pre-specified set of messages to decode, in the PICOD$(t)$ a user is "pliable" and is satisfied if it can decode any $t$ messages that are not in its side information set. The goal is to find a code with the shortest length that satisfies all the users. This flexibility in determining the desired message sets makes the PICOD$(t)$ behave quite differently compared to the IC, and its analysis challenging. This paper mainly focuses on the \emph{complete--$S$} PICOD$(t)$ with $m$ messages, where the set $S\subset[m]$ contains the sizes of the side information sets, and the number of users is $n=\sum_{s\in S}\binom{m}{s}$, with no two users having the same side information set. Capacity results are shown for: (i) the \emph{consecutive} complete--$S$ PICOD$(t)$, where $S=[s_{\min}:s_{\max}]$ for some $0 \leq s_{\min} \leq s_{\max} \leq m-t$, and (ii) the \emph{complement-consecutive} complete--$S$ PICOD$(t)$, where $S=[0:m-t]\backslash[s_{\min}:s_{\max}]$, for some $0 < s_{\min} \leq s_{\max} < m-t$. The novel converse proof is inspired by combinatorial design techniques and the key insight is to consider all messages that a user can eventually decode successfully, even those in excess of the $t$ required ones. This allows one to circumvent the need to consider all possible desired message set assignments at the users in order to find the one that leads to the shortest code length. In addition, tight converse results are also shown for those PICOD$(1)$ with circular-arc network topology hypergraph., Comment: 38 pages, 4 figures, submitted to IEEE Transactions on Information Theory
- Published
- 2018
29. On Erasure Broadcast Channels with Hard Deadlines
- Author
-
Ovaisi, Zohreh, Devroye, Natasha, Seferoglu, Hulya, Smida, Besma, and Tuninetti, Daniela
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
This paper considers packet scheduling over a broadcast channel with packet erasures to multiple receivers with different messages (multiple uni-cast) each with possibly different hard deadline constraints. A novel metric is proposed and evaluated: the global deadline outage probability, which gives the probability that the hard communication deadline is not met for at least one of the receivers. The cut-set upper bound is derived and a scheduling policy is proposed to determine which receiver's packets should be sent in each time slot. This policy is shown to be optimal among all scheduling policies, i.e., it achieves all boundary points of cut-set upper bounds when the transmitter knows the erasure patterns for all the receivers ahead of making the scheduling decision. An expression for the global deadline outage probability is obtained for two receivers and is plotted and interpreted for various system parameters. These plots are not Monte-Carlo simulations, and hence the obtained expression may be used in the design of future downlink broadcast networks. Future extensions to per-user deadline outage probabilities as well as to scenarios with causal knowledge of the channel states are briefly discussed.
- Published
- 2018
30. The Strongly Asynchronous Massive Access Channel
- Author
-
Shahi, Sara, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
This paper considers a Strongly Asynchronous and Slotted Massive Access Channel (SAS-MAC) where $K_n:=e^{n\nu}$ different users transmit a randomly selected message among $M_n:=e^{nR}$ ones within a strong asynchronous window of length $A_n:=e^{n\alpha}$ blocks, where each block lasts $n$ channel uses. A global probability of error is enforced, ensuring that all the users' identities and messages are correctly identified and decoded. Achievability bounds are derived for the case that different users have similar channels, the case that users' channels can be chosen from a set which has polynomially many elements in the blocklength $n$, and the case with no restriction on the users' channels. A general converse bound on the capacity region and a converse bound on the maximum growth rate of the number of users are derived., Comment: under submission
- Published
- 2018
31. Fundamental Limits of Decentralized Data Shuffling
- Author
-
Wan, Kai, Tuninetti, Daniela, Ji, Mingyue, Caire, Giuseppe, and Piantanida, Pablo
- Subjects
Computer Science - Information Theory - Abstract
Data shuffling of training data among different computing nodes (workers) has been identified as a core element to improve the statistical performance of modern large-scale machine learning algorithms. Data shuffling is often considered as one of the most significant bottlenecks in such systems due to the heavy communication load. Under a master-worker architecture (where a master has access to the entire dataset and only communication between the master and the workers is allowed) coding has been recently proved to considerably reduce the communication load. This work considers a different communication paradigm referred to as decentralized data shuffling, where workers are allowed to communicate with one another via a shared link. The decentralized data shuffling problem has two phases: workers communicate with each other during the data shuffling phase, and then workers update their stored content during the storage phase. The main challenge is to derive novel converse bounds and achievable schemes for decentralized data shuffling by considering the asymmetry of the workers' storages (i.e., workers are constrained to store different files in their storages based on the problem setting), in order to characterize the fundamental limits of this problem. For the case of uncoded storage (i.e., each worker directly stores a subset of bits of the dataset), this paper proposes converse and achievable bounds (based on distributed interference alignment and distributed clique-covering strategies) that are within a factor of 3/2 of one another. The proposed schemes are also exactly optimal under the constraint of uncoded storage for either large storage size or at most four workers in the system., Comment: 22 pages, 5 figures, to appear in IEEE Transactions on Information Theory
- Published
- 2018
32. An Information Theoretic Converse for the 'Consecutive Complete--$S$' PICOD Problem
- Author
-
Liu, Tang and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
Pliable Index CODing (PICOD) is a variant of the Index Coding (IC) problem in which a user is satisfied whenever it can successfully decode any one message that is not in its side information set, as opposed to a fixed pre-determined message. The complete--$S$ PICOD with $m$ messages, for $S\subseteq[0:m-1]$, has $n = \sum_{s\in S} \binom{m}{s}$ users with distinct side information sets. Past work on PICOD provided tight converse results when either the sender is constrained to use linear codes, or for some special classes of complete--$S$ PICOD. This paper provides a tight information theoretic converse result (i.e., no restriction to linear codes) for the so-called "consecutive complete--$S$" PICOD, where the set $S$ satisfies $S=[s_{min} : s_{max}]$ for some $0\leq s_{min} \leq s_{max} \leq m-1$. This result extends existing converse results and shows that linear codes have the smallest possible code length given by $\min(m-s_{\min},1+s_{\max})$. The central contribution is a novel proof technique rooted in combinatorics. The main idea is to consider all the messages a user can eventually successfully decode, in addition to its own desired message. This allows us to circumvent the necessity of essentially considering all possible assignments of desired messages for the users. The keystone of the proof is to show that, for the case of $S=\{s\}$ and $m = 2s+1$, there exists at least one user who can decode $s+1$ messages. From this, the extension to the "consecutive complete--$S$" PICOD follows., Comment: Submitted to ITW 2018
- Published
- 2018
33. On Combination Networks with Cache-aided Relays and Users
- Author
-
Wan, Kai, Tuninetti, Daniela, Piantanida, Pablo, and Ji, Mingyue
- Subjects
Computer Science - Information Theory - Abstract
Caching is an efficient way to reduce peak hour network traffic congestion by storing some contents at the user's cache without knowledge of later demands. Coded caching strategy was originally proposed by Maddah-Ali and Niesen to give an additional coded caching gain compared the conventional uncoded scheme. Under practical consideration, the caching model was recently considered in relay network, in particular the combination network, where the central server communicates with $K=\binom{H}{r}$ users (each is with a cache of $M$ files) through $H$ immediate relays, and each user is connected to a different $r-$subsets of relays. Several inner bounds and outer bounds were proposed for combination networks with end-user-caches. This paper extends the recent work by the authors on centralized combination networks with end-user caches to a more general setting, where both relays and users have caches. In contrast to the existing schemes in which the packets transmitted from the server are independent of the cached contents of relays, we propose a novel caching scheme by creating an additional coded caching gain to the transmitted load from the server with the help of the cached contents in relays. We also show that the proposed scheme outperforms the state-of-the-art approaches., Comment: 7 pages,2 figures, WSA 2018
- Published
- 2018
34. A Novel Asymmetric Coded Placement in Combination Networks with end-user Caches
- Author
-
Wan, Kai, Tuninetti, Daniela, Ji, Mingyue, and Piantanida, Pablo
- Subjects
Computer Science - Information Theory - Abstract
The tradeoff between the user's memory size and the worst-case download time in the $(H,r,M,N)$ combination network is studied, where a central server communicates with $K$ users through $H$ immediate relays, and each user has local cache of size $M$ files and is connected to a different subset of $r$ relays. The main contribution of this paper is the design of a coded caching scheme with asymmetric coded placement by leveraging coordination among the relays, which was not exploited in past work. Mathematical analysis and numerical results show that the proposed schemes outperform existing schemes., Comment: 5 pages, 2 figures, ITA 2018
- Published
- 2018
35. Caching in Combination Networks: A Novel Delivery by Leveraging the Network Topology
- Author
-
Wan, Kai, Ji, Mingyue, Piantanida, Pablo, and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
Maddah-Ali and Niesen (MAN) in 2014 surprisingly showed that it is possible to serve an arbitrarily large number of cache-equipped users with a constant number of transmissions by using coded caching in shared-link broadcast networks. This paper studies the tradeoff between the user's cache size and the file download time for combination networks, where users with caches communicate with the servers through intermediate relays. Motivated by the so-called separation approach, it is assumed that placement and multicast message generation are done according to the MAN original scheme and regardless of the network topology. The main contribution of this paper is the design of a novel two-phase delivery scheme that, accounting to the network topology, outperforms schemes available in the literature. The key idea is to create additional (compared to MAN) multicasting opportunities: in the first phase coded messages are sent with the goal of increasing the amount of `side information' at the users, which is then leveraged during the second phase. The download time with the novel scheme is shown to be proportional to 1=H (with H being the number or relays) and to be order optimal under the constraint of uncoded placement for some parameter regimes., Comment: 5 pages, 2 figures, submitted to ISIT 2018
- Published
- 2018
36. On the Benefits of Asymmetric Coded Cache Placement in Combination Networks with End-User Caches
- Author
-
Wan, Kai, Ji, Mingyue, Piantanida, Pablo, and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
This paper investigates the fundamental tradeoff between cache size and download time in the (H;r;M;N) combination network, where a server with N files is connected to H relays (without caches) and each of the K:=\binom{H}{r} users (with caches of size M files) is connected to a different subset of r relays. Existing schemes fall within two categories: either use the uncoded symmetric cache placement originally proposed for the shared-link model and design delivery phase dependent on the network topology, or effectively divide the combination network into H independent shared-link networks each serving \binom{H-1}{r-1} users; in either case, the placement phase is independent of network topology. In this paper, a novel strategy is proposed where the coded cache placement is dependent on network topology. The proposed scheme is shown to be information theoretically optimal for large cache size. In addition, when not exactly optimal, the proposed scheme can also outperform existing schemes., Comment: 7 pages, 2 figures, submitted to ISIT 2018
- Published
- 2018
37. On Identifying a Massive Number of Distributions
- Author
-
Shahi, Sara, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
Finding the underlying probability distributions of a set of observed sequences under the constraint that each sequence is generated i.i.d by a distinct distribution is considered. The number of distributions, and hence the number of observed sequences, are let to grow with the observation blocklength $n$. Asymptotically matching upper and lower bounds on the probability of error are derived., Comment: Under Submission
- Published
- 2018
- Full Text
- View/download PDF
38. Caching in Combination Networks: Novel Multicast Message Generation and Delivery by Leveraging the Network Topology
- Author
-
Wan, Kai, Ji, Mingyue, Piantanida, Pablo, and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
Maddah-Ali and Niesen's original coded caching scheme for shared-link broadcast networks is now known to be optimal to within a factor two, and has been applied to other types of networks. For practical reasons, this paper considers that a server communicates to cache-aided users through $H$ intermediate relays. In particular, it focuses on combination networks where each of the $K = \binom{H}{r}$ users is connected to a distinct $r$-subsets of relays. By leveraging the symmetric topology of the network, this paper proposes a novel method to general multicast messages and to deliver them to the users. By numerical evaluations, the proposed scheme is shown to reduce the download time compared to the schemes available in the literature. The idea is then extended to decentralized combination networks, more general relay networks, and combination networks with cache-aided relays and users. Also in these cases the proposed scheme outperforms known ones., Comment: 6 pages, 3 figures, accepted in ICC 2018, correct the typo in (6) of the previous version
- Published
- 2017
39. Half-Duplex Routing is NP-hard
- Author
-
Ezzeldin, Yahya H., Cardone, Martina, Fragouli, Christina, and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
Routing is a widespread approach to transfer information from a source node to a destination node in many deployed wireless ad-hoc networks. Today's implemented routing algorithms seek to efficiently find the path/route with the largest Full-Duplex (FD) capacity, which is given by the minimum among the point-to-point link capacities in the path. Such an approach may be suboptimal if then the nodes in the selected path are operated in Half-Duplex (HD) mode. Recently, the capacity (up to a constant gap that only depends on the number of nodes in the path) of an HD line network i.e., a path) has been shown to be equal to half of the minimum of the harmonic means of the capacities of two consecutive links in the path. This paper asks the questions of whether it is possible to design a polynomial-time algorithm that efficiently finds the path with the largest HD capacity in a relay network. This problem of finding that path is shown to be NP-hard in general. However, if the number of cycles in the network is polynomial in the number of nodes, then a polynomial-time algorithm can indeed be designed.
- Published
- 2017
- Full Text
- View/download PDF
40. A Novel Index Coding Scheme and its Application to Coded Caching
- Author
-
Wan, Kai, Tuninetti, Daniela, and Piantanida, Pablo
- Subjects
Computer Science - Information Theory - Abstract
This paper proposes a novel achievable scheme for the index problem and applies it to the caching problem. Index coding and caching are noiseless broadcast channel problems where receivers have message side information.In the index coding problem the side information sets are fixed, while in the caching problem the side information sets correspond the cache contents, which are under the control of the system designer. The proposed index coding scheme, based on distributed source coding and non-unique decoding,is shown to strictly enlarge the rate region achievable by composite coding.The novel index coding scheme applied to the caching problem is then shown to match an outer bound (previously proposed by the authors and also based on known results for the index coding problem) under the assumption of uncoded cache placement/prefetching., Comment: ITA 2017
- Published
- 2017
41. On the Capacity of the AWGN Channel with Additive Radar Interference
- Author
-
Shahi, Sara, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
This paper investigates the capacity of a communications channel that, in addition to additive white Gaussian noise, also suffers from interference caused by a co-existing radar transmission. The radar interference (of short duty-cycle and of much wider bandwidth than the intended communication signal) is modeled as an additive term whose amplitude is known and constant, but whose phase is independent and identically uniformly distributed at each channel use. The capacity achieving input distribution, under the standard average power constraint, is shown to have independent modulo and phase. The phase is uniformly distributed in $[0,2\pi]$. The modulo is discrete with countably infinitly many mass points, but only finitely many in any bounded interval. From numerical evaluations, a proper-complex Gaussian input is seen to perform quite well for weak radar interference. We also show that for very large radar interference, capacity is equal to $1/2\log (1 + S)$ and a proper-complex Gaussian input achieves it. It is concluded that the presence of the radar interference results in a loss of half of the degrees of freedom compared to an AWGN channel without radar interference., Comment: Under submission
- Published
- 2017
- Full Text
- View/download PDF
42. On the Capacity of the Slotted Strongly Asynchronous Channel with a Bursty User
- Author
-
Shahi, Sara, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
In this paper, the trade-off between the number of transmissions (or burstiness) $K_n=e^{n\nu}$ of a user, the asynchronism level $A_n=e^{n\alpha}$ in a slotted strongly asynchronous channel, and the ability to distinguish $M_n=e^{nR}$ messages per transmission with vanishingly error probability is investigated in the asymptotic regime as blocklength $n$ goes to infinity. The receiver must locate and decode, with vanishing error probability in $n$, all of the transmitted messages. Achievability and converse bounds on the trade-off among $(R,\alpha,\nu)$ is derived. For cases where $\nu=0$ and $ R=0$, achievability and converse bounds coincide. A second model for a bursty user with random access in which the user may access and transmit a message in each block with probability $e^{-n\beta}$ in then considered. Achievability and converse bounds on the trade-off between $(R, \alpha, \beta)$ is also characterized. For cases where $\beta =\alpha$ and $R=0$, the achievability and converse bounds match., Comment: Under submission
- Published
- 2017
43. Combination Networks with End-user-caches: Novel Achievable and Converse Bounds under Uncoded Cache Placement
- Author
-
Wan, Kai, Tuninetti, Daniela, Ji, Mingyue, and Piantanida, Pablo
- Subjects
Computer Science - Information Theory - Abstract
Caching is an efficient way to reduce network traffic congestion during peak hours by storing some content at the users' local caches. For the shared-link network with end-user-caches, Maddah-Ali and Niesen proposed a two-phase coded caching strategy. In practice, users may communicate with the server through intermediate relays. This paper studies the tradeoff between the memory size $M$ and the network load $R$ for networks where a server with $N$ files is connected to $H$ relays (without caches), which in turn are connected to $K$ users equipped with caches of $M$ files. When each user is connected to a different subset of $r$ relays, i.e., $K = \binom{H}{r}$, the system is referred to as a {\it combination network with end-user-caches}. In this work, converse bounds are derived for the practically motivated case of {\it uncoded} cache contents, that is, bits of the various files are directly pushed into the user caches without any coding. In this case, once the cache contents and the user demands are known, the problem reduces to a general index coding problem.This paper shows that relying on a well-known "acyclic index coding converse bound" results in converse bounds that are not tight for combination networks with end-user-caches. A novel converse bound that leverages the network topology is proposed, which is the tightest converse bound known to date. As a result of independent interest, an inequality that generalizes the well-known sub-modularity of entropy is derived. Several novel caching schemes are proposed, based on the Maddah-Ali and Niesen cache placement. The proposed schemes are proved: (i) to be (order) optimal for some $(N,M,H,r)$ parameters regimes under the constraint of uncoded cache placement, and (ii) to outperform the state-of-the-art schemes in numerical evaluations., Comment: 22 pages, 3 figures; accepted by IEEE TIT
- Published
- 2017
44. Efficiently Finding Simple Schedules in Gaussian Half-Duplex Relay Line Networks
- Author
-
Ezzeldin, Yahya H., Cardone, Martina, Fragouli, Christina, and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
The problem of operating a Gaussian Half-Duplex (HD) relay network optimally is challenging due to the exponential number of listen/transmit network states that need to be considered. Recent results have shown that, for the class of Gaussian HD networks with N relays, there always exists a simple schedule, i.e., with at most N +1 active states, that is sufficient for approximate (i.e., up to a constant gap) capacity characterization. This paper investigates how to efficiently find such a simple schedule over line networks. Towards this end, a polynomial-time algorithm is designed and proved to output a simple schedule that achieves the approximate capacity. The key ingredient of the algorithm is to leverage similarities between network states in HD and edge coloring in a graph. It is also shown that the algorithm allows to derive a closed-form expression for the approximate capacity of the Gaussian line network that can be evaluated distributively and in linear time. Additionally, it is shown using this closed-form that the problem of Half-Duplex routing is NP-Hard., Comment: A short version of this paper was submitted to ISIT 2017
- Published
- 2017
- Full Text
- View/download PDF
45. Novel Delivery Schemes for Decentralized Coded Caching in the Finite File Size Regime
- Author
-
Wan, Kai, Tuninetti, Daniela, and Piantanida, Pablo
- Subjects
Computer Science - Information Theory - Abstract
This paper analyzes the achievable tradeoff between cache~size and download~rate in decentralized caching systems with the uncoded cache placement originally proposed by Maddah-Ali and Niesen. It proposes two novel delivery schemes that take advantage of the multicasting opportunities that arise when a file is demanded by multiple users. These delivery schemes are extensions of known ones to the regime where the file size is finite. Numerical evaluations for the case of file uniform popularity show that the proposed schemes outperform previous ones for all value of the cache size., Comment: 6 pages, 1 figure, ICC 2017-WT10
- Published
- 2016
46. On the Minimum Mean $p$-th Error in Gaussian Noise Channels and its Applications
- Author
-
Dytso, Alex, Bustin, Ronit, Tuninetti, Daniela, Devroye, Natasha, Poor, H. Vincent, and Shamai, Shlomo
- Subjects
Computer Science - Information Theory - Abstract
The problem of estimating an arbitrary random vector from its observation corrupted by additive white Gaussian noise, where the cost function is taken to be the Minimum Mean $p$-th Error (MMPE), is considered. The classical Minimum Mean Square Error (MMSE) is a special case of the MMPE. Several bounds, properties and applications of the MMPE are derived and discussed. The optimal MMPE estimator is found for Gaussian and binary input distributions. Properties of the MMPE as a function of the input distribution, SNR and order $p$ are derived. In particular, it is shown that the MMPE is a continuous function of $p$ and SNR. These results are possible in view of interpolation and change of measure bounds on the MMPE. The `Single-Crossing-Point Property' (SCPP) that bounds the MMSE for all SNR values {\it above} a certain value, at which the MMSE is known, together with the I-MMSE relationship is a powerful tool in deriving converse proofs in information theory. By studying the notion of conditional MMPE, a unifying proof (i.e., for any $p$) of the SCPP is shown. A complementary bound to the SCPP is then shown, which bounds the MMPE for all SNR values {\it below} a certain value, at which the MMPE is known. As a first application of the MMPE, a bound on the conditional differential entropy in terms of the MMPE is provided, which then yields a generalization of the Ozarow-Wyner lower bound on the mutual information achieved by a discrete input on a Gaussian noise channel. As a second application, the MMPE is shown to improve on previous characterizations of the phase transition phenomenon that manifests, in the limit as the length of the capacity achieving code goes to infinity, as a discontinuity of the MMSE as a function of SNR. As a final application, the MMPE is used to show bounds on the second derivative of mutual information, that tighten previously known bounds.
- Published
- 2016
47. Network Simplification in Half-Duplex: Building on Submodularity
- Author
-
Cardone, Martina, Ezzeldin, Yahya H., Fragouli, Christina, and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
This paper explores the {\it network simplification} problem in the context of Gaussian Half-Duplex (HD) diamond networks. Specifically, given an $N$-relay diamond network, this problem seeks to derive fundamental guarantees on the capacity of the best $k$-relay subnetwork, as a function of the full network capacity. The main focus of this work is on the case when $k=N-1$ relays are selected out of the $N$ possible ones. First, a simple algorithm, which removes the relay with the minimum capacity (i.e., the worst relay), is analyzed and it is shown that the remaining $(N-1)$-relay subnetwork has an approximate (i.e., optimal up to a constant gap) HD capacity that is at least half of the approximate HD capacity of the full network. This fraction guarantee is shown to be tight if only the single relay capacities are known, i.e., there exists a class of Gaussian HD diamond networks with $N$ relays where, by removing the worst relay, the subnetwork of the remaining $k=N-1$ relays has an approximate capacity equal to half of the approximate capacity of the full network. Next, this work proves a fundamental guarantee, which improves over the previous fraction: there always exists a subnetwork of $k=N-1$ relays that achieves at least a fraction $\frac{N-1}{N}$ of the approximate capacity of the full network. This fraction is proved to be tight and it is shown that any optimal schedule of the full network can be used by at least one of the $N$ subnetworks of $N-1$ relays to achieve a worst-case performance guarantee of $\frac{N-1}{N}$. Additionally, these results are extended to derive lower bounds on the fraction guarantee for general $k \in [1:N]$. The key steps in the proofs lie in the derivation of properties of submodular functions, which provide a combinatorial handle on the network simplification problem in Gaussian HD diamond networks.
- Published
- 2016
48. On Communication through a Gaussian Channel with an MMSE Disturbance Constraint
- Author
-
Dytso, Alex, Bustin, Ronit, Tuninetti, Daniela, Devroye, Natasha, Poor, H. Vincent, and Shamai, Shlomo
- Subjects
Computer Science - Information Theory - Abstract
This paper considers a Gaussian channel with one transmitter and two receivers. The goal is to maximize the communication rate at the intended/primary receiver subject to a disturbance constraint at the unintended/secondary receiver. The disturbance is measured in terms of minimum mean square error (MMSE) of the interference that the transmission to the primary receiver inflicts on the secondary receiver. The paper presents a new upper bound for the problem of maximizing the mutual information subject to an MMSE constraint. The new bound holds for vector inputs of any length and recovers a previously known limiting (when the length of vector input tends to infinity) expression from the work of Bustin $\textit{et al.}$ The key technical novelty is a new upper bound on the MMSE. This bound allows one to bound the MMSE for all signal-to-noise ratio (SNR) values $\textit{below}$ a certain SNR at which the MMSE is known (which corresponds to the disturbance constraint). This bound complements the `single-crossing point property' of the MMSE that upper bounds the MMSE for all SNR values $\textit{above}$ a certain value at which the MMSE value is known. The MMSE upper bound provides a refined characterization of the phase-transition phenomenon which manifests, in the limit as the length of the vector input goes to infinity, as a discontinuity of the MMSE for the problem at hand. For vector inputs of size $n=1$, a matching lower bound, to within an additive gap of order $O \left( \log \log \frac{1}{\sf MMSE} \right)$ (where ${\sf MMSE}$ is the disturbance constraint), is shown by means of the mixed inputs technique recently introduced by Dytso $\textit{et al.}$, Comment: Submitted to IEEE Transactions on Information Theory
- Published
- 2016
49. On Caching with More Users than Files
- Author
-
Wan, Kai, Tuninetti, Daniela, and Piantanida, Pablo
- Subjects
Computer Science - Information Theory - Abstract
Caching appears to be an efficient way to reduce peak hour network traffic congestion by storing some content at the user's cache without knowledge of later demands. Recently, Maddah-Ali and Niesen proposed a two-phase, placement and delivery phase, coded caching strategy for centralized systems (where coordination among users is possible in the placement phase), and for decentralized systems. This paper investigates the same setup under the further assumption that the number of users is larger than the number of files. By using the same uncoded placement strategy of Maddah-Ali and Niesen, a novel coded delivery strategy is proposed to profit from the multicasting opportunities that arise because a file may be demanded by multiple users. The proposed delivery method is proved to be optimal under the constraint of uncoded placement for centralized systems with two files, moreover it is shown to outperform known caching strategies for both centralized and decentralized systems., Comment: 6 pages, 3 figures, submitted to ISIT 2016
- Published
- 2016
50. On Network Simplification for Gaussian Half-Duplex Diamond Networks
- Author
-
Cardone, Martina, Fragouli, Christina, and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
This paper investigates the simplification problem in Gaussian Half-Duplex (HD) diamond networks. The goal is to answer the following question: what is the minimum (worst-case) fraction of the total HD capacity that one can always achieve by smartly selecting a subset of $k$ relays, out of the $N$ possible ones? We make progress on this problem for $k=1$ and $k=2$ and show that for $N=k+1, \ k \in \{1,2\}$ at least $\frac{k}{k+1}$ of the total HD capacity is always {approximately (i.e., up to a constant gap)} achieved. Interestingly, and differently from the Full-Duplex (FD) case, the ratio in HD depends on $N$, and decreases as $N$ increases. For all values of $N$ and $k$ for which we derive worst case fractions, we also show these to be {approximately} tight. This is accomplished by presenting $N$-relay Gaussian HD diamond networks for which the best $k$-relay subnetwork has {an approximate} HD capacity equal to the worst-case fraction of the total {approximate} HD capacity. Moreover, we provide additional comparisons between the performance of this simplification problem for HD and FD networks, which highlight their different natures., Comment: Parts of this work will be presented at ISIT 2016
- Published
- 2016
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.