2013
DOI: 10.1109/jsac.2013.130408
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Session Function Computation and Multicasting in Undirected Graphs

Abstract: Abstract-In the function computation problem, certain nodes of an undirected graph have access to independent data, while some other nodes of the graph require certain functions of the data; this model, motivated by sensor networks and cloud computing, is the focus of this paper. We study the maximum rates at which function computation is possible on a capacitated graph; the capacities on the edges of the graph impose constraints on the communication rate.We consider a simple class of computation strategies ba… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(20 citation statements)
references
References 38 publications
0
20
0
Order By: Relevance
“…• Induction step: Suppose that the first k − 1 inequalities in (16) hold for some W * 1 , · · · , W * k−1 that satisfy conditions (3) and (4), and such that W * u , 1 ≤ u ≤ k − 1, take values over the maximal independent sets of…”
Section: Inner and Outer Bound Match: Inductionmentioning
confidence: 99%
See 1 more Smart Citation
“…• Induction step: Suppose that the first k − 1 inequalities in (16) hold for some W * 1 , · · · , W * k−1 that satisfy conditions (3) and (4), and such that W * u , 1 ≤ u ≤ k − 1, take values over the maximal independent sets of…”
Section: Inner and Outer Bound Match: Inductionmentioning
confidence: 99%
“…The following claim, whose proof is deferred to Appendix E, says that the graph entropy term on the right-hand side of the k-th inequality in (16) is equal to another graph entropy that we shall analyze here below:…”
Section: Inner and Outer Bound Match: Inductionmentioning
confidence: 99%
“…In a classic function computation scenario, the nodes exchange messages through authenticated, noiseless, and public communication links, which results in undesired information leakage about the computed function [ 3 , 4 , 5 ]. Furthermore, it is possible to reduce the amount of public communication [ 6 , 7 ] by using distributed lossless or lossy source coding methods; see [ 8 , 9 , 10 , 11 , 12 ] for several extensions. The former method uses Slepian-Wolf (SW) coding [ 13 ] constructions, and the latter allows the computed function to be a distorted version of the target function and applies Wyner-Ziv (WZ) coding [ 14 ] methods, which result in further reductions compared to the former.…”
Section: Introductionmentioning
confidence: 99%
“…However, we have different definitions of the estimate random variables for leaves and non-leaf nodes ((29) and (30)) but the same definition of description random variables. Note that the Gaussian test channel (31) and the definitions in (29) and (30) involve linear transformations. Therefore, all estimate random variables U TC i 's and description random variables V TC i 's are scalar Gaussian random variables with zero mean.…”
Section: A Notation On Typicality-based Codingmentioning
confidence: 99%