2019 IEEE International Symposium on Information Theory (ISIT) 2019
DOI: 10.1109/isit.2019.8849812
|View full text |Cite
|
Sign up to set email alerts
|

Code Construction for Pliable Index Coding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
19
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(19 citation statements)
references
References 5 publications
0
19
0
Order By: Relevance
“…This paper proposes both converse and achievable bounds. The proposed achievable scheme not only strictly outperforms the one in [8] for some values of the system parameters, but it is also information theoretically optimal in some settings. For the remaining cases, the proposed linear code is shown to require at most one more transmission than the converse bound derived by restricting the sender to only use linear codes.…”
mentioning
confidence: 90%
See 2 more Smart Citations
“…This paper proposes both converse and achievable bounds. The proposed achievable scheme not only strictly outperforms the one in [8] for some values of the system parameters, but it is also information theoretically optimal in some settings. For the remaining cases, the proposed linear code is shown to require at most one more transmission than the converse bound derived by restricting the sender to only use linear codes.…”
mentioning
confidence: 90%
“…Recently, in [8], the Authors extended the private IC problem in [7] to the PICOD framework. Only the case where the side information structure is "circular", and where each user can decode one and only one message was considered in [8].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, the Authors of [14] studied the case of 'weak security against other users' in PICOD's with 's circular shift' side information set structure, namely, user u's side information set is the set of messages indexed by {u, u + 1, . .…”
Section: Introductionmentioning
confidence: 99%
“…. , u + s − 1} for some fixed s and where the indices are intended modulo the cardinality of the message set m. In [6] we generalized the problem setup of [14] and provided linear codes whose length is at most one more than a converse bound under the constraint of linear encoding. Our results for centralized PICOD with 's circular shift' side information structure demonstrate a multiplicative gap between secure and non-secure versions of the problem that is not bounded in general; in particular, for s ≥ m/2 the two cases have the same information theoretic optimal code-length; however, for 1 ≤ s < m/2 and under the constraint of linear encoding, the minimal number of transmissions for the secure PICOD is lowered bounded by essentially m/(2s), while the non-secure PICOD can always be satisfied by at most 2 transmissions.…”
Section: Introductionmentioning
confidence: 99%