2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton) 2017
DOI: 10.1109/allerton.2017.8262882
|View full text |Cite
|
Sign up to set email alerts
|

On the optimal recovery threshold of coded matrix multiplication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
125
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 74 publications
(127 citation statements)
references
References 16 publications
2
125
0
Order By: Relevance
“…BACKGROUND: GENERALIZED POLYDOT CODE WITHOUT SECURITY CONSTRAINT In this section, we consider the system model shown in Fig. 1 and review the GPD construction first proposed in [15] and later improved in [14], [27] for the special case of no secrecy constrains, i.e., P C = 0. In the process, we propose a novel intuitive interpretation of GPD encoding and decoding based on the distributed computation of samples from convolutions via z-transforms.…”
Section: Private and Secure Matrix Multiplicationmentioning
confidence: 99%
See 1 more Smart Citation
“…BACKGROUND: GENERALIZED POLYDOT CODE WITHOUT SECURITY CONSTRAINT In this section, we consider the system model shown in Fig. 1 and review the GPD construction first proposed in [15] and later improved in [14], [27] for the special case of no secrecy constrains, i.e., P C = 0. In the process, we propose a novel intuitive interpretation of GPD encoding and decoding based on the distributed computation of samples from convolutions via z-transforms.…”
Section: Private and Secure Matrix Multiplicationmentioning
confidence: 99%
“…We also derive the corresponding achievable set of triples (P C , P R , C L ). As we will discuss, the projection of this set onto the plane defined by the condition P C = 0 includes the set of pairs (P R , C L ) in (15) and (16) obtained by the GPD code [14]. The proposed secure GPD (SGPD) code augments matrices A and B by adding P C random block matrices to the input matrices A and B, in a manner similar to prior works [18]- [21], [23], yielding augmented matrices A * and B * .…”
Section: Secure Polydot Codementioning
confidence: 99%
“…With memory per worker fixed, the recovery threshold of polynomial codes is further improved by MatDot codes [10], albeit at the cost of increased per-worker computation. In addition to MatDot coding, [10] introduces polyDot coding as a generalization and unification of polynomial and MatDot codes. PolyDot codes provide a tradeoff between the recovery threshold and the computation load assigned to each worker.…”
Section: A Background: Stragglers and Coded Computingmentioning
confidence: 99%
“…PolyDot codes [10] and entangled polynomial codes [11] slice the 3D cuboid along all (x-, y-, z-) axes. This is what we termed combinatorial partitioning (cf., Fig.2d).…”
Section: B 3d Visualization: Data Partitioning In Coded Computingmentioning
confidence: 99%
“…In particular, in [13], the code is designed such that the results of different workers form a maximum separable code (MDS), meaning that the final result can be recovered from any subset of servers with the minimum size. That approach has been extended to general matrix partitioning in [14], [15], and to the cases where only an approximate result of the matrix multiplication is needed [17], [20].…”
Section: Introductionmentioning
confidence: 99%