221 research outputs found
Making recommendations bandwidth aware
This paper asks how much we can gain in terms of bandwidth and user
satisfaction, if recommender systems became bandwidth aware and took into
account not only the user preferences, but also the fact that they may need to
serve these users under bandwidth constraints, as is the case over wireless
networks. We formulate this as a new problem in the context of index coding: we
relax the index coding requirements to capture scenarios where each client has
preferences associated with messages. The client is satisfied to receive any
message she does not already have, with a satisfaction proportional to her
preference for that message. We consistently find, over a number of scenarios
we sample, that although the optimization problems are in general NP-hard,
significant bandwidth savings are possible even when restricted to polynomial
time algorithms
Wireless Network Simplification: the Gaussian N-Relay Diamond Network
We consider the Gaussian N-relay diamond network, where a source wants to
communicate to a destination node through a layer of N-relay nodes. We
investigate the following question: what fraction of the capacity can we
maintain by using only k out of the N available relays? We show that
independent of the channel configurations and the operating SNR, we can always
find a subset of k relays which alone provide a rate (kC/(k+1))-G, where C is
the information theoretic cutset upper bound on the capacity of the whole
network and G is a constant that depends only on N and k (logarithmic in N and
linear in k). In particular, for k = 1, this means that half of the capacity of
any N-relay diamond network can be approximately achieved by routing
information over a single relay. We also show that this fraction is tight:
there are configurations of the N-relay diamond network where every subset of k
relays alone can at most provide approximately a fraction k/(k+1) of the total
capacity. These high-capacity k-relay subnetworks can be also discovered
efficiently. We propose an algorithm that computes a constant gap approximation
to the capacity of the Gaussian N-relay diamond network in O(N log N) running
time and discovers a high-capacity k-relay subnetwork in O(kN) running time.
This result also provides a new approximation to the capacity of the Gaussian
N-relay diamond network which is hybrid in nature: it has both multiplicative
and additive gaps. In the intermediate SNR regime, this hybrid approximation is
tighter than existing purely additive or purely multiplicative approximations
to the capacity of this network.Comment: Submitted to Transactions on Information Theory in October 2012. The
new version includes discussions on the algorithmic complexity of discovering
a high-capacity subnetwork and on the performance of amplify-and-forwar
Simplifying Wireless Social Caching
Social groups give the opportunity for a new form of caching. In this paper,
we investigate how a social group of users can jointly optimize bandwidth
usage, by each caching parts of the data demand, and then opportunistically
share these parts among themselves upon meeting. We formulate this problem as a
Linear Program (LP) with exponential complexity. Based on the optimal solution,
we propose a simple heuristic inspired by the bipartite set-cover problem that
operates in polynomial time. Furthermore, we prove a worst case gap between the
heuristic and the LP solutions. Finally, we assess the performance of our
algorithm using real-world mobility traces from the MIT Reality Mining project
dataset and two mobility traces that were synthesized using the SWIM model. Our
heuristic performs closely to the optimal in most cases, showing a better
performance with respect to alternative solutions.Comment: Parts of this work were accepted for publication in ISIT 2016. A
complete version is submitted to Transactions on Mobile Computin
Secret message capacity of a line network
We investigate the problem of information theoretically secure communication
in a line network with erasure channels and state feedback. We consider a
spectrum of cases for the private randomness that intermediate nodes can
generate, ranging from having intermediate nodes generate unlimited private
randomness, to having intermediate nodes generate no private randomness, and
all cases in between. We characterize the secret message capacity when either
only one of the channels is eavesdropped or all of the channels are
eavesdropped, and we develop polynomial time algorithms that achieve these
capacities. We also give an outer bound for the case where an arbitrary number
of channels is eavesdropped. Our work is the first to characterize the secrecy
capacity of a network of arbitrary size, with imperfect channels and feedback.
As a side result, we derive the secret key and secret message capacity of an
one-hop network, when the source has limited randomness
- …