A survey on applications of cache-aided NOMA
Contrary to orthogonal multiple-access (OMA), non-orthogonal multiple-access (NOMA)
schemes can serve a pool of users without exploiting the scarce frequency or time domain …
schemes can serve a pool of users without exploiting the scarce frequency or time domain …
Fundamental limits of coded caching with multiple antennas, shared caches and uncoded prefetching
The work explores the fundamental limits of coded caching in the setting where a transmitter
with potentially multiple (N 0) antennas serves different users that are assisted by a smaller …
with potentially multiple (N 0) antennas serves different users that are assisted by a smaller …
Fog-aided wireless networks for content delivery: Fundamental latency tradeoffs
A fog-aided wireless network architecture is studied in which edge nodes (ENs), such as
base stations, are connected to a cloud processor via dedicated fronthaul links while also …
base stations, are connected to a cloud processor via dedicated fronthaul links while also …
Efficient scheduling and power allocation for D2D-assisted wireless caching networks
We study a one-hop device-to-device (D2D)-assisted wireless caching network, where
popular files are randomly and independently cached in the memory of end users. Each …
popular files are randomly and independently cached in the memory of end users. Each …
A novel transformation approach of shared-link coded caching schemes for multiaccess networks
This paper considers the multiaccess coded caching systems formulated by Hachem et al.,
including a central server containing files connected to cache-less users through an error …
including a central server containing files connected to cache-less users through an error …
Fundamental limits of combinatorial multi-access caching
This work identifies the fundamental limits of multi-access coded caching (MACC) where
each user is connected to multiple caches in a manner that follows a generalized …
each user is connected to multiple caches in a manner that follows a generalized …
Degrees of freedom of cache-aided wireless interference networks
We study the role of caches in wireless interference networks. We focus on content caching
and delivery across a Gaussian interference network, where both transmitters and receivers …
and delivery across a Gaussian interference network, where both transmitters and receivers …
Rate-memory trade-off for multi-access coded caching with uncoded placement
We study a multi-access variant of the popular coded caching framework, which consists of a
central server with a catalog of N files, K caches with limited memory M, and K users such …
central server with a catalog of N files, K caches with limited memory M, and K users such …
Toward an internet of battlefield things: A resilience perspective
The Internet of Battlefield Things (IoBT) might be one of the most expensive cyber-physical
systems of the next decade, yet much research remains to develop its fundamental enablers …
systems of the next decade, yet much research remains to develop its fundamental enablers …
Multi-access coded caching scheme with linear sub-packetization using PDAs
We consider multi-access coded caching problem introduced by Hachem et. al., where each
user has access to neighboring caches in a cyclic wrap-around fashion. We focus on the …
user has access to neighboring caches in a cyclic wrap-around fashion. We focus on the …