2018
DOI: 10.3390/e20080603
|View full text |Cite
|
Sign up to set email alerts
|

Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching

Abstract: Abstract:We illustrate how computer-aided methods can be used to investigate the fundamental limits of the caching systems, which are significantly different from the conventional analytical approach usually seen in the information theory literature. The linear programming (LP) outer bound of the entropy space serves as the starting point of this approach; however, our effort goes significantly beyond using it to prove information inequalities. We first identify and formalize the symmetry structure in the prob… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
112
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 52 publications
(113 citation statements)
references
References 51 publications
1
112
0
Order By: Relevance
“…Based on the proof idea of Theorem 1, we can completely characterize the rate-memory tradeoff for the two-user case, for any possible values of N and M , for both peak rate and average rate. Prior to this work, the peak rate vs. memory tradeoff for the two-user case was characterized in [2] for N ≤ 2, and is characterized in [25] for N ≥ 3 very recently using non-parallel bounding techniques. However the average rate vs. memory tradeoff has never been completely characterized for any non-trivial case.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Based on the proof idea of Theorem 1, we can completely characterize the rate-memory tradeoff for the two-user case, for any possible values of N and M , for both peak rate and average rate. Prior to this work, the peak rate vs. memory tradeoff for the two-user case was characterized in [2] for N ≤ 2, and is characterized in [25] for N ≥ 3 very recently using non-parallel bounding techniques. However the average rate vs. memory tradeoff has never been completely characterized for any non-trivial case.…”
Section: Resultsmentioning
confidence: 99%
“…In prior works, despite various attempts, this tradeoff has only been exactly characterized in two instances: the single-user case [2] and, more recently, the two-user case [25]. Our second converse bound improves the bounds introduced in those results, and allows us to characterize the rate-memory tradeoff for systems with up to 5 users.…”
Section: Introductionmentioning
confidence: 81%
See 1 more Smart Citation
“…For N = 2 and N K = 4, the demands in D RS and their correspondingc(d s ) are given in Table I. A related concept is the "demand type" used in [14]. Definition 2 (Demand Types) In (N, K)-non-private coded caching problem, for a given demand vectord, let t i denote the number of users requesting file i, where i = 0, .…”
Section: (U)mentioning
confidence: 99%
“…The proof will construct an (N, K, M, R)-private scheme using an (N, N K, M, R) D RS -non-private scheme as a blackbox using ideas from [3]. We first give an example to illustrate this construction for N = 2, K = 2 using only the restricted demand subset for a (2, 4, 1 3 , 4 3 ) D (2,2) -non-private scheme from [14]. We will see that this allows a better achievable rate ( 1 3 , 4 3 ) for the (N = 2, K = 2) demand-private coded caching problem than what can be achieved for the N = 2, K = 4 non-private caching problem.…”
Section: (U)mentioning
confidence: 99%