Search Results - "Cadambe, Viveck"

Refine Results
  1. 1

    Numerically Stable Polynomially Coded Computing by Fahim, Mohammad, Cadambe, Viveck R.

    Published in IEEE transactions on information theory (01-05-2021)
    “…We study the numerical stability of polynomial based encoding methods, which has emerged to be a powerful class of techniques for providing straggler and fault…”
    Get full text
    Journal Article
  2. 2

    Bounds on the Size of Locally Recoverable Codes by Cadambe, Viveck R., Mazumdar, Arya

    Published in IEEE transactions on information theory (01-11-2015)
    “…In a locally recoverable or repairable code, any symbol of a codeword can be recovered by reading only a small (constant) number of other symbols. The notion…”
    Get full text
    Journal Article
  3. 3

    A Distributed Numerical Approach to Interference Alignment and Applications to Wireless Interference Networks by Gomadam, K, Cadambe, V R, Jafar, S A

    Published in IEEE transactions on information theory (01-06-2011)
    “…Recent results establish the optimality of interference alignment to approach the Shannon capacity of interference networks at high SNR. However, the extent to…”
    Get full text
    Journal Article
  4. 4

    Interference Alignment and Degrees of Freedom of the K-User Interference Channel by Cadambe, V.R., Jafar, S.A.

    Published in IEEE transactions on information theory (01-08-2008)
    “…For the fully connected K user wireless interference channel where the channel coefficients are time-varying and are drawn from a continuous distribution, the…”
    Get full text
    Journal Article
  5. 5

    Multi-Version Coding-An Information-Theoretic Perspective of Consistent Distributed Storage by Wang, Zhiying, Cadambe, Viveck R.

    Published in IEEE transactions on information theory (01-06-2018)
    “…In applications of distributed storage systems to distributed computing and implementation of key-value stores, the following property, usually referred to as…”
    Get full text
    Journal Article
  6. 6

    Expanding the Compute-and-Forward Framework: Unequal Powers, Signal Levels, and Multiple Linear Combinations by Nazer, Bobak, Cadambe, Viveck R., Ntranos, Vasilis, Caire, Giuseppe

    Published in IEEE transactions on information theory (01-09-2016)
    “…The compute-and-forward framework permits each receiver in a Gaussian network to directly decode a linear combination of the transmitted messages. The…”
    Get full text
    Journal Article
  7. 7

    Interference Alignment and the Degrees of Freedom of Wireless X Networks by Cadambe, V.R., Jafar, S.A.

    Published in IEEE transactions on information theory (01-09-2009)
    “…We explore the degrees of freedom of M times N user wireless X networks, i.e., networks of M transmitters and N receivers where every transmitter has an…”
    Get full text
    Journal Article
  8. 8

    Asymptotic Interference Alignment for Optimal Repair of MDS Codes in Distributed Storage by Cadambe, V. R., Jafar, S. A., Maleki, H., Ramchandran, K., Changho Suh

    Published in IEEE transactions on information theory (01-05-2013)
    “…The high repair bandwidth cost of ( n , k ) maximum distance separable (MDS) erasure codes has motivated a new class of codes that can reduce repair bandwidth…”
    Get full text
    Journal Article
  9. 9

    Interference Alignment With Asymmetric Complex Signaling-Settling the Høst-Madsen-Nosratinia Conjecture by Cadambe, V R, Jafar, S A, Chenwei Wang

    Published in IEEE transactions on information theory (01-09-2010)
    “…It has been conjectured by Hø-Madsen and Nosratinia that complex Gaussian interference channels with constant channel coefficients have only one…”
    Get full text
    Journal Article
  10. 10

    Harnessing Correlations in Distributed Erasure-Coded Key-Value Stores by Ali, Ramy E., Cadambe, Viveck R.

    Published in IEEE transactions on communications (01-09-2019)
    “…Motivated by applications of distributed storage systems to key-value stores, the multi-version coding problem has been formulated to efficiently store…”
    Get full text
    Journal Article
  11. 11

    Degrees of Freedom of Wireless Networks With Relays, Feedback, Cooperation, and Full Duplex Operation by Cadambe, V.R., Jafar, S.A.

    Published in IEEE transactions on information theory (01-05-2009)
    “…We find the degrees of freedom of a network with S source nodes, R relay nodes, and D destination nodes, with random time-varying/frequency-selective channel…”
    Get full text
    Journal Article
  12. 12

    Repair Optimal Erasure Codes Through Hadamard Designs by Papailiopoulos, DimitrisS, Dimakis, Alexandros G., Cadambe, Viveck R.

    Published in IEEE transactions on information theory (01-05-2013)
    “…In distributed storage systems that employ erasure coding, the issue of minimizing the total communication required to exactly rebuild a storage node after a…”
    Get full text
    Journal Article
  13. 13

    ϵ-Approximate Coded Matrix Multiplication Is Nearly Twice as Efficient as Exact Multiplication by Jeong, Haewon, Devulapalli, Ateet, Cadambe, Viveck R., Calmon, Flavio P.

    “…We study coded distributed matrix multiplication from an approximate recovery viewpoint. We consider a system of <inline-formula> <tex-math notation="LaTeX">P…”
    Get full text
    Journal Article
  14. 14

    Fundamental Limits of Erasure-Coded Key-Value Stores With Side Information by Ali, Ramy E., Cadambe, Viveck R., Llorca, Jaime, Tulino, Antonia M.

    Published in IEEE transactions on communications (01-07-2020)
    “…The multi-version coding problem is a recently formulated information-theoretic framework to study the storage cost of consistent key-value data stores…”
    Get full text
    Journal Article
  15. 15

    Interference Alignment and the Generalized Degrees of Freedom of the X Channel by Huang, Chiachi, Cadambe, V. R., Jafar, S. A.

    Published in IEEE transactions on information theory (01-08-2012)
    “…We explore the capacity and generalized degrees of freedom (GDOF) of the two-user Gaussian X channel, i.e., a generalization of the two-user interference…”
    Get full text
    Journal Article
  16. 16

    File Updates Under Random/Arbitrary Insertions and Deletions by Wang, Qiwen, Jaggi, Sidharth, Medard, Muriel, Cadambe, Viveck R., Schwartz, Moshe

    Published in IEEE transactions on information theory (01-10-2017)
    “…The problem of one-way file synchronization, henceforth called "file updates", is studied in this paper. Specifically, a client edits a file, where the edits…”
    Get full text
    Journal Article
  17. 17

    Alignment-Based Network Coding for Two-Unicast-Z Networks by Weifei Zeng, Cadambe, Viveck R., Medard, Muriel

    Published in IEEE transactions on information theory (01-06-2016)
    “…In this paper, we study the wireline two-unicast-Z communication network over directed acyclic graphs. The two-unicast-Z network is a two-unicast network where…”
    Get full text
    Journal Article
  18. 18

    A coded shared atomic memory algorithm for message passing architectures by Cadambe, Viveck R., Lynch, Nancy, Mèdard, Muriel, Musial, Peter

    Published in Distributed computing (01-02-2017)
    “…This paper considers the communication and storage costs of emulating atomic (linearizable) multi-writer multi-reader shared memory in distributed…”
    Get full text
    Journal Article
  19. 19

    Parallel Gaussian Interference Channels Are Not Always Separable by Cadambe, V.R., Jafar, S.A.

    Published in IEEE transactions on information theory (01-09-2009)
    “…It is known that the capacity of parallel (multicarrier) Gaussian point-to-point, multiple access and broadcast channels can be achieved by separate encoding…”
    Get full text
    Journal Article
  20. 20

    Interference Alignment on the Deterministic Channel and Application to Fully Connected Gaussian Interference Networks by Cadambe, V.R., Jafar, S.A., Shamai, S.

    Published in IEEE transactions on information theory (01-01-2009)
    “…An interference alignment example is constructed for the deterministic channel model of the K -user interference channel. The deterministic channel example is…”
    Get full text
    Journal Article