Search Results - "Cadambe, Viveck"
-
1
Numerically Stable Polynomially Coded Computing
Published in IEEE transactions on information theory (01-05-2021)“…We study the numerical stability of polynomial based encoding methods, which has emerged to be a powerful class of techniques for providing straggler and fault…”
Get full text
Journal Article -
2
Bounds on the Size of Locally Recoverable Codes
Published in IEEE transactions on information theory (01-11-2015)“…In a locally recoverable or repairable code, any symbol of a codeword can be recovered by reading only a small (constant) number of other symbols. The notion…”
Get full text
Journal Article -
3
A Distributed Numerical Approach to Interference Alignment and Applications to Wireless Interference Networks
Published in IEEE transactions on information theory (01-06-2011)“…Recent results establish the optimality of interference alignment to approach the Shannon capacity of interference networks at high SNR. However, the extent to…”
Get full text
Journal Article -
4
Interference Alignment and Degrees of Freedom of the K-User Interference Channel
Published in IEEE transactions on information theory (01-08-2008)“…For the fully connected K user wireless interference channel where the channel coefficients are time-varying and are drawn from a continuous distribution, the…”
Get full text
Journal Article -
5
Multi-Version Coding-An Information-Theoretic Perspective of Consistent Distributed Storage
Published in IEEE transactions on information theory (01-06-2018)“…In applications of distributed storage systems to distributed computing and implementation of key-value stores, the following property, usually referred to as…”
Get full text
Journal Article -
6
Expanding the Compute-and-Forward Framework: Unequal Powers, Signal Levels, and Multiple Linear Combinations
Published in IEEE transactions on information theory (01-09-2016)“…The compute-and-forward framework permits each receiver in a Gaussian network to directly decode a linear combination of the transmitted messages. The…”
Get full text
Journal Article -
7
Interference Alignment and the Degrees of Freedom of Wireless X Networks
Published in IEEE transactions on information theory (01-09-2009)“…We explore the degrees of freedom of M times N user wireless X networks, i.e., networks of M transmitters and N receivers where every transmitter has an…”
Get full text
Journal Article -
8
Asymptotic Interference Alignment for Optimal Repair of MDS Codes in Distributed Storage
Published in IEEE transactions on information theory (01-05-2013)“…The high repair bandwidth cost of ( n , k ) maximum distance separable (MDS) erasure codes has motivated a new class of codes that can reduce repair bandwidth…”
Get full text
Journal Article -
9
Interference Alignment With Asymmetric Complex Signaling-Settling the Høst-Madsen-Nosratinia Conjecture
Published in IEEE transactions on information theory (01-09-2010)“…It has been conjectured by Hø-Madsen and Nosratinia that complex Gaussian interference channels with constant channel coefficients have only one…”
Get full text
Journal Article -
10
Harnessing Correlations in Distributed Erasure-Coded Key-Value Stores
Published in IEEE transactions on communications (01-09-2019)“…Motivated by applications of distributed storage systems to key-value stores, the multi-version coding problem has been formulated to efficiently store…”
Get full text
Journal Article -
11
Degrees of Freedom of Wireless Networks With Relays, Feedback, Cooperation, and Full Duplex Operation
Published in IEEE transactions on information theory (01-05-2009)“…We find the degrees of freedom of a network with S source nodes, R relay nodes, and D destination nodes, with random time-varying/frequency-selective channel…”
Get full text
Journal Article -
12
Repair Optimal Erasure Codes Through Hadamard Designs
Published in IEEE transactions on information theory (01-05-2013)“…In distributed storage systems that employ erasure coding, the issue of minimizing the total communication required to exactly rebuild a storage node after a…”
Get full text
Journal Article -
13
ϵ-Approximate Coded Matrix Multiplication Is Nearly Twice as Efficient as Exact Multiplication
Published in IEEE journal on selected areas in information theory (01-09-2021)“…We study coded distributed matrix multiplication from an approximate recovery viewpoint. We consider a system of <inline-formula> <tex-math notation="LaTeX">P…”
Get full text
Journal Article -
14
Fundamental Limits of Erasure-Coded Key-Value Stores With Side Information
Published in IEEE transactions on communications (01-07-2020)“…The multi-version coding problem is a recently formulated information-theoretic framework to study the storage cost of consistent key-value data stores…”
Get full text
Journal Article -
15
Interference Alignment and the Generalized Degrees of Freedom of the X Channel
Published in IEEE transactions on information theory (01-08-2012)“…We explore the capacity and generalized degrees of freedom (GDOF) of the two-user Gaussian X channel, i.e., a generalization of the two-user interference…”
Get full text
Journal Article -
16
File Updates Under Random/Arbitrary Insertions and Deletions
Published in IEEE transactions on information theory (01-10-2017)“…The problem of one-way file synchronization, henceforth called "file updates", is studied in this paper. Specifically, a client edits a file, where the edits…”
Get full text
Journal Article -
17
Alignment-Based Network Coding for Two-Unicast-Z Networks
Published in IEEE transactions on information theory (01-06-2016)“…In this paper, we study the wireline two-unicast-Z communication network over directed acyclic graphs. The two-unicast-Z network is a two-unicast network where…”
Get full text
Journal Article -
18
A coded shared atomic memory algorithm for message passing architectures
Published in Distributed computing (01-02-2017)“…This paper considers the communication and storage costs of emulating atomic (linearizable) multi-writer multi-reader shared memory in distributed…”
Get full text
Journal Article -
19
Parallel Gaussian Interference Channels Are Not Always Separable
Published in IEEE transactions on information theory (01-09-2009)“…It is known that the capacity of parallel (multicarrier) Gaussian point-to-point, multiple access and broadcast channels can be achieved by separate encoding…”
Get full text
Journal Article -
20
Interference Alignment on the Deterministic Channel and Application to Fully Connected Gaussian Interference Networks
Published in IEEE transactions on information theory (01-01-2009)“…An interference alignment example is constructed for the deterministic channel model of the K -user interference channel. The deterministic channel example is…”
Get full text
Journal Article