• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

对称性、外部界限与编码构造:关于缓存基本限制的计算机辅助研究

Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching.

作者信息

Tian Chao

机构信息

Department of Electrical and Computer Engineering, Texas A&M University, College Station, TX 77843, USA.

出版信息

Entropy (Basel). 2018 Aug 13;20(8):603. doi: 10.3390/e20080603.

DOI:10.3390/e20080603
PMID:33265692
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7513129/
Abstract

We illustrate how computer-aided methods can be used to investigate the fundamental limits of the caching systems, which are significantly different from the conventional analytical approach usually seen in the information theory literature. The linear programming (LP) outer bound of the entropy space serves as the starting point of this approach; however, our effort goes significantly beyond using it to prove information inequalities. We first identify and formalize the symmetry structure in the problem, which enables us to show the existence of optimal symmetric solutions. A symmetry-reduced linear program is then used to identify the boundary of the memory-transmission-rate tradeoff for several small cases, for which we obtain a set of tight outer bounds. General hypotheses on the optimal tradeoff region are formed from these computed data, which are then analytically proven. This leads to a complete characterization of the optimal tradeoff for systems with only two users, and certain partial characterization for systems with only two files. Next, we show that by carefully analyzing the joint entropy structure of the outer bounds for certain cases, a novel code construction can be reverse-engineered, which eventually leads to a general class of codes. Finally, we show that outer bounds can be computed through strategically relaxing the LP in different ways, which can be used to explore the problem computationally. This allows us firstly to deduce generic characteristic of the converse proof, and secondly to compute outer bounds for larger problem cases, despite the seemingly impossible computation scale.

摘要

我们阐述了如何使用计算机辅助方法来研究缓存系统的基本限制,这与信息论文献中常见的传统分析方法有显著不同。熵空间的线性规划(LP)外边界是此方法的起点;然而,我们的工作远不止于用它来证明信息不等式。我们首先识别并形式化问题中的对称结构,这使我们能够证明最优对称解的存在性。然后,使用一个对称简化的线性规划来确定几个小案例中内存 - 传输速率权衡的边界,我们由此获得了一组紧密的外边界。基于这些计算数据形成了关于最优权衡区域的一般假设,然后进行了分析证明。这导致了对仅具有两个用户的系统的最优权衡的完整刻画,以及对仅具有两个文件的系统的某些部分刻画。接下来,我们表明,通过仔细分析某些情况下外边界的联合熵结构,可以逆向设计一种新颖的编码构造,最终得到一类通用的码。最后,我们表明可以通过以不同方式策略性地放宽线性规划来计算外边界,这可用于通过计算探索该问题。这首先使我们能够推断逆证的一般特征,其次能够计算更大问题案例的外边界,尽管计算规模看似不可能。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c56a/7513129/2cf2c58a123b/entropy-20-00603-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c56a/7513129/e752c16b5158/entropy-20-00603-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c56a/7513129/af185963d8c1/entropy-20-00603-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c56a/7513129/7ec0af4b063e/entropy-20-00603-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c56a/7513129/cea05b576326/entropy-20-00603-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c56a/7513129/32370714a099/entropy-20-00603-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c56a/7513129/8235484ae773/entropy-20-00603-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c56a/7513129/2cf2c58a123b/entropy-20-00603-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c56a/7513129/e752c16b5158/entropy-20-00603-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c56a/7513129/af185963d8c1/entropy-20-00603-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c56a/7513129/7ec0af4b063e/entropy-20-00603-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c56a/7513129/cea05b576326/entropy-20-00603-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c56a/7513129/32370714a099/entropy-20-00603-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c56a/7513129/8235484ae773/entropy-20-00603-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c56a/7513129/2cf2c58a123b/entropy-20-00603-g007.jpg

相似文献

1
Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching.对称性、外部界限与编码构造:关于缓存基本限制的计算机辅助研究
Entropy (Basel). 2018 Aug 13;20(8):603. doi: 10.3390/e20080603.
2
Bounds on the Sum-Rate of MIMO Causal Source Coding Systems with Memory under Spatio-Temporal Distortion Constraints.具有记忆的MIMO因果源编码系统在时空失真约束下的和速率界
Entropy (Basel). 2020 Jul 30;22(8):842. doi: 10.3390/e22080842.
3
Beyond Equal-Power Sparse NOMA: Two User Classes and Closed-Form Bounds on the Achievable Region.超越等功率稀疏非正交多址接入:两类用户及可达区域的闭式界
Entropy (Basel). 2022 Jan 31;24(2):227. doi: 10.3390/e24020227.
4
Conservation-Law-Based Global Bounds to Quantum Optimal Control.基于守恒律的量子最优控制全局界。
Phys Rev Lett. 2021 Sep 10;127(11):110506. doi: 10.1103/PhysRevLett.127.110506.
5
On the linear programming bound for linear Lee codes.关于线性李码的线性规划界。
Springerplus. 2016 Mar 1;5:246. doi: 10.1186/s40064-016-1863-8. eCollection 2016.
6
An Umbrella Converse for Data Exchange: Applied to Caching, Computing, and Shuffling.一种用于数据交换的通用转换:应用于缓存、计算和混洗。
Entropy (Basel). 2021 Jul 30;23(8):985. doi: 10.3390/e23080985.
7
Explicit Content Caching at Mobile Edge Networks with Cross-Layer Sensing.基于跨层感知的移动边缘网络中的显式内容缓存
Sensors (Basel). 2018 Mar 22;18(4):940. doi: 10.3390/s18040940.
8
Mathematical fundamentals for the noise immunity of the genetic code.遗传密码抗噪性的数学基础。
Biosystems. 2018 Feb;164:186-198. doi: 10.1016/j.biosystems.2017.09.007. Epub 2017 Sep 14.
9
Solving and analyzing side-chain positioning problems using linear and integer programming.使用线性规划和整数规划解决和分析侧链定位问题。
Bioinformatics. 2005 Apr 1;21(7):1028-36. doi: 10.1093/bioinformatics/bti144. Epub 2004 Nov 16.
10
Optimal multiplexed sensing: bounds, conditions and a graph theory link.最优复用传感:界限、条件及图论联系
Opt Express. 2007 Dec 10;15(25):17072-92. doi: 10.1364/oe.15.017072.

引用本文的文献

1
Information Theory for Data Communications and Processing.数据通信与处理中的信息论。
Entropy (Basel). 2020 Nov 3;22(11):1250. doi: 10.3390/e22111250.
2
Efficient Algorithms for Coded Multicasting in Heterogeneous Caching Networks.异构缓存网络中编码多播的高效算法
Entropy (Basel). 2019 Mar 25;21(3):324. doi: 10.3390/e21030324.