Rate-Memory Trade-Off for Caching and Delivery of Correlated Sources

被引:11
|
作者
Hassanzadeh, Parisa [1 ,2 ]
Tulino, Antonia M. [1 ,3 ]
Llorca, Jaime [1 ,4 ]
Erkip, Elza [1 ]
机构
[1] NYU, ECE Dept, Brooklyn, NY 11201 USA
[2] JP Morgan AI Res, New York, NY 10017 USA
[3] Univ Naples Federico II, DIETI, I-80125 Naples, Italy
[4] Nokia Bell Labs, Holmdel, NJ 07733 USA
关键词
Caching; coded multicast; Gray-Wyner network; distributed lossless source coding; correlated content distribution;
D O I
10.1109/TIT.2020.2969918
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies the fundamental limits of content delivery in a cache-aided broadcast network for correlated content generated by a discrete memoryless source with arbitrary joint distribution. Each receiver is equipped with a cache of equal capacity, and the requested files are delivered over a shared error-free broadcast link. A class of achievable correlation-aware schemes based on a two-step source coding approach is proposed. Library files are first compressed, and then cached and delivered using a combination of multiple-request caching schemes that are agnostic to the content correlations. The first step uses Gray-Wyner source coding to represent the library via private descriptions and descriptions that are common to more than one file. The second step then becomes a multiple-request caching problem, where the demand structure is dictated by the configuration of the compressed library, and it is interesting in its own right. The performance of the proposed two-step scheme is evaluated by comparing its achievable rate with a lower bound on the optimal peak and average rate-memory trade-offs in a two-file multiple-receiver network, and in a three-file two-receiver network. Specifically, in a network with two files and two receivers, the achievable rate matches the lower bound for a significant memory regime and it is within half of the conditional entropy of files for all other memory values. In the three-file two-receiver network, the two-step strategy achieves the lower bound for large cache capacities, and it is within half of the joint entropy of two of the sources conditioned on the third one for all other cache sizes.
引用
收藏
页码:2219 / 2251
页数:33
相关论文
共 50 条
  • [41] Diversity-Rate Trade-off in Erasure Networks
    Gharan, Shahab Oveis
    Fashandi, Shervan
    Khandani, Amir K.
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [42] The Trade-off Between Transceiver Capacity and Symbol Rate
    Galdino, L.
    Lavery, D.
    Liu, Z.
    Balakier, K.
    Sillekens, E.
    Elson, D.
    Saavedra, G.
    Killey, R. I.
    Bayvel, P.
    2018 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXPOSITION (OFC), 2018,
  • [43] Reservoir computing decoupling memory-nonlinearity trade-off
    Xia, Ji
    Chu, Junyu
    Leng, Siyang
    Ma, Huanfei
    CHAOS, 2023, 33 (11)
  • [44] Reservoir Computing Beyond Memory-Nonlinearity Trade-off
    Masanobu Inubushi
    Kazuyuki Yoshimura
    Scientific Reports, 7
  • [45] TRADE-OFF BETWEEN MEMORY FOR VERBAL ITEMS AND THEIR VISUAL ATTRIBUTES
    LIGHT, LL
    BERGER, DE
    BARDALES, M
    JOURNAL OF EXPERIMENTAL PSYCHOLOGY-HUMAN LEARNING AND MEMORY, 1975, 104 (02): : 188 - 193
  • [47] Trade-off between Capacity and Precision in Visuospatial Working Memory
    Roggeman, Chantal
    Klingberg, Torkel
    Feenstra, Heleen E. M.
    Compte, Albert
    Almeida, Rita
    JOURNAL OF COGNITIVE NEUROSCIENCE, 2014, 26 (02) : 211 - 222
  • [48] Reservoir Computing Beyond Memory-Nonlinearity Trade-off
    Inubushi, Masanobu
    Yoshimura, Kazuyuki
    SCIENTIFIC REPORTS, 2017, 7
  • [49] A Runtime/Memory Trade-off of the Continous Ziggurat Method on GPUs
    Riesinger, Christoph
    Neckel, Tobias
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS 2015), 2015, : 27 - 34
  • [50] Cryptanalytic time–memory trade-off for password hashing schemes
    Donghoon Chang
    Arpan Jati
    Sweta Mishra
    Somitra Kumar Sanadhya
    International Journal of Information Security, 2019, 18 : 163 - 180