Private retrieval, computing, and learning: Recent progress and future challenges
Most of our lives are conducted in the cyberspace. The human notion of privacy translates
into a cyber notion of privacy on many functions that take place in the cyberspace. This …
into a cyber notion of privacy on many functions that take place in the cyberspace. This …
Fundamental limits of caching
MA Maddah-Ali, U Niesen - IEEE Transactions on information …, 2014 - ieeexplore.ieee.org
Caching is a technique to reduce peak traffic rates by prefetching popular content into
memories at the end users. Conventionally, these memories are used to deliver requested …
memories at the end users. Conventionally, these memories are used to deliver requested …
Decentralized coded caching attains order-optimal memory-rate tradeoff
MA Maddah-Ali, U Niesen - IEEE/ACM Transactions On …, 2014 - ieeexplore.ieee.org
Replicating or caching popular content in memories distributed across the network is a
technique to reduce peak network loads. Conventionally, the main performance gain of this …
technique to reduce peak network loads. Conventionally, the main performance gain of this …
Online coded caching
R Pedarsani, MA Maddah-Ali… - IEEE/ACM Transactions …, 2015 - ieeexplore.ieee.org
We consider a basic content distribution scenario consisting of a single origin server
connected through a shared bottleneck link to a number of users each equipped with a …
connected through a shared bottleneck link to a number of users each equipped with a …
Topological interference management through index coding
SA Jafar - IEEE Transactions on Information Theory, 2013 - ieeexplore.ieee.org
This paper studies linear interference networks, both wired and wireless, with no channel
state information at the transmitters except a coarse knowledge of the end-to-end one-hop …
state information at the transmitters except a coarse knowledge of the end-to-end one-hop …
Private information retrieval with side information
S Kadhe, B Garcia, A Heidarzadeh… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
We study the problem of Private Information Retrieval (PIR) in the presence of prior side
information. The problem setup includes a database of K independent messages possibly …
information. The problem setup includes a database of K independent messages possibly …
Finite-length analysis of caching-aided coded multicasting
We study a noiseless broadcast link serving K users whose requests arise from a library of N
files. Every user is equipped with a cache of size M files each. It has been shown that by …
files. Every user is equipped with a cache of size M files each. It has been shown that by …
Index coding—An interference alignment perspective
The index coding problem is studied from an interference alignment perspective providing
new results as well as new insights into, and generalizations of, previously known results …
new results as well as new insights into, and generalizations of, previously known results …
On the capacity region for index coding
A new inner bound on the capacity region of the general index coding problem is
established. Unlike most existing bounds that are based on graph theoretic or algebraic …
established. Unlike most existing bounds that are based on graph theoretic or algebraic …
Local graph coloring and index coding
K Shanmugam, AG Dimakis… - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
We present a novel upper bound for the optimal index coding rate. Our bound uses a graph
theoretic quantity called the local chromatic number. We show how a good local coloring …
theoretic quantity called the local chromatic number. We show how a good local coloring …