2016 IEEE International Symposium on Information Theory (ISIT) 2016
DOI: 10.1109/isit.2016.7541658
|View full text |Cite
|
Sign up to set email alerts
|

Fundamental limits of cache-aided interference management

Abstract: We consider a system, comprising a library of N files (e.g., movies) and a wireless network with KT transmitters, each equipped with a local cache of size of MT files, and KR receivers, each equipped with a local cache of size of MR files. Each receiver will ask for one of the N files in the library, which needs to be delivered. The objective is to design the cache placement (without prior knowledge of receivers' future requests) and the communication scheme to maximize the throughput of the delivery. In this … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

5
160
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 74 publications
(166 citation statements)
references
References 32 publications
5
160
1
Order By: Relevance
“…from a continuous distribution, x (p,q) (t) is the transmitted signal from BS (p, q) subject to an average power constraint P , and n (i,j) (t) denotes the additive white Gaussian noise (AWGN) at user (i, j) with zero mean and unit variance. Following the convention in [9]- [11], [24]- [26], we assume that the perfect channel state information is available at all BSs and all users.…”
Section: System Model a Cellular Network Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…from a continuous distribution, x (p,q) (t) is the transmitted signal from BS (p, q) subject to an average power constraint P , and n (i,j) (t) denotes the additive white Gaussian noise (AWGN) at user (i, j) with zero mean and unit variance. Following the convention in [9]- [11], [24]- [26], we assume that the perfect channel state information is available at all BSs and all users.…”
Section: System Model a Cellular Network Modelmentioning
confidence: 99%
“…Remark 4: It is worth pointing out that the above delivery scheme of the cellular network differs from the cooperative transmission schemes of fully connected networks [9]- [11], [13], [32], [33]. In the proposed delivery scheme with partial BS cooperation (also the scheme with full BS cooperation introduced in the next subsection), we not only let the nearby BSs M (i,j) cooperatively serve user (i, j), but also let other BSs transmit the common messages desired by user (i, j) to increase per-user DoF of the network by interference neutralization and interference alignment.…”
Section: Performance Metricmentioning
confidence: 99%
“…Recently, in wireless networks, a line of prior works 55,[136][137][138] has considered caching in the presence of noisy links and feedback. In related works, [139][140][141][142][143] caching as an aide to wireless interference mitigation was studied. Yang et al 144 presented that gain from massive MIMO and caching is indeed complementary.…”
Section: Impact On System Performancementioning
confidence: 99%
“…The NDT described in Proposition 1 is achieved by means of an MDS coded caching scheme and a carefully designed delivery scheme. For the caching scheme, each file is split into d subfiles, and a (K, d) MDS code is 6 applied to create K coded subfiles. Each EN stores one coded subfile for each file.…”
Section: Cache-aided Blind Interference Avoidancementioning
confidence: 99%
“…Upper and lower bounds on the minimum Normalized Delivery Time (NDT), which is related to the inverse of the DoF, were provided in [5], and their optimality was shown for certain cache storage regimes. The scheme of [6] was shown to be within a constant multiplicative factor of 2 of the optimal in the presence of full CSI under linear precoding.…”
mentioning
confidence: 99%