Loading...
Search for: maximum-distance
0.008 seconds

    Cache-aided fog radio access networks with partial connectivity

    , Article IEEE Wireless Communications and Networking Conference, WCNC ; Volume 2018-April , 8 June , 2018 , Pages 1-6 ; 15253511 (ISSN) ; 9781538617342 (ISBN) Roushdy, A ; Motahari,S. A ; Nafie, M ; Gunduz, D ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Centralized coded caching and delivery is studied for a partially-connected fog radio access network (F-RAN), whereby a set of H edge nodes (ENs) (without caches), connected to a cloud server via orthogonal fronthaul links, serve K users over the wireless edge. The cloud server is assumed to hold a library of N files, each of size F bits; and each user, equipped with a cache of size MF bits, is connected to a distinct set of r ENs; or equivalently, the wireless edge from the ENs to the users is modeled as a partial interference channel. The objective is to minimize the normalized delivery time (NDT), which refers to the worst case delivery latency, when each user requests a single file from... 

    Improved algorithms for distributed balanced clustering

    , Article 3rd IFIP WG 1.8 International Conference on Topics in Theoretical Computer Science, TTCS 2020, 1 July 2020 through 2 July 2020 ; Volume 12281 LNCS , 2020 , Pages 72-84 Mirjalali, K ; Zarrabizadeh, H ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2020
    Abstract
    We study a weighted balanced version of the k-center problem, where each center has a fixed capacity, and each element has an arbitrary demand. The objective is to assign demands of the elements to the centers, so as the total demand assigned to each center does not exceed its capacity, while the maximum distance between centers and their assigned elements is minimized. We present a deterministic O(1)-approximation algorithm for this generalized version of the k-center problem in the distributed setting, where data is partitioned among a number of machines. Our algorithm substantially improves the approximation factor of the current best randomized algorithm available for the problem. We... 

    The price of anarchy in network creation games

    , Article ACM Transactions on Algorithms ; Volume 8, Issue 2 , 2012 ; 15496325 (ISSN) Demaine, E. D ; Hajiaghayi, M ; Mahini, H ; Zadimoghaddam, M ; Sharif University of Technology
    2012
    Abstract
    We study Nash equilibria in the setting of network creation games introduced recently by Fabrikant, Luthra, Maneva, Papadimitriou, and Shenker. In this game we have a set of selfish node players, each creating some incident links, and the goal is to minimize α times the cost of the created links plus sum of the distances to all other players. Fabrikant et al. proved an upper bound O(√α) on the price of anarchy: the relative cost of the lack of coordination. Albers, Eilts, Even-Dar, Mansour, and Roditty show that the price of anarchy is constant for α = O(√n) and for α ≥ 12n[lgn], and that the price of anarchy is 15(1 + (min{α/n, n 2/alpha;}) 1/3) for any α. The latter bound shows the first... 

    On a bounded budget network creation game

    , Article Annual ACM Symposium on Parallelism in Algorithms and Architectures, 4 June 2011 through 6 June 2011, San Jose, CA ; June , 2011 , Pages 207-214 ; 9781450307437 (ISBN) Ehsani, S ; Fazli, M ; Mehrabian, A ; Sadeghian Sadeghabad, S ; Safari, M ; Saghafian, M ; Shokat Fadaee, S ; Sharif University of Technology
    2011
    Abstract
    We consider a network creation game in which, each player (vertex) has a limited budget to establish links to other players. In our model, each link has a unit cost and each agent tries to minimize its cost which is its local diameter or its total distance to other players in the (undirected) underlying graph of the created network. Two variants of the game are studied: in the MAX version, the cost incurred to a vertex is the maximum distance between that vertex and other vertices, and in the SUM version, the cost incurred to a vertex is the sum of distances between that vertex and other vertices. We prove that in both versions pure Nash equilibria exist, but the problem of finding the best... 

    A bounded budget network creation game

    , Article ACM Transactions on Algorithms ; Volume 11, Issue 4 , June , 2015 ; 15496325 (ISSN) Ehsani, S ; Shokat Fadaee, S ; Fazli, M ; Mehrabian, A ; Sadeghian Sadeghabad, S ; Safari, M ; Saghafian, M ; Sharif University of Technology
    Association for Computing Machinery  2015
    Abstract
    We introduce a network creation game in which each player (vertex) has a fixed budget to establish links to other players. In this model, each link has a unit price, and each agent tries to minimize its cost, which is either its eccentricity or its total distance to other players in the underlying (undirected) graph of the created network. Two versions of the game are studied: In the MAX version, the cost incurred to a vertex is the maximum distance between the vertex and other vertices, and, in the SUM version, the cost incurred to a vertex is the sum of distances between the vertex and other vertices. We prove that in both versions pure Nash equilibria exist, but the problem of finding the... 

    Optimal quantum error correcting codes from absolutely maximally entangled states

    , Article Journal of Physics A: Mathematical and Theoretical ; Volume 51, Issue 7 , 2018 ; 17518113 (ISSN) Raissi, Z ; Gogolin, C ; Riera, A ; Acin, A ; Sharif University of Technology
    Institute of Physics Publishing  2018
    Abstract
    Absolutely maximally entangled (AME) states are pure multi-partite generalizations of the bipartite maximally entangled states with the property that all reduced states of at most half the system size are in the maximally mixed state. AME states are of interest for multipartite teleportation and quantum secret sharing and have recently found new applications in the context of high-energy physics in toy models realizing the AdS/CFT-correspondence. We work out in detail the connection between AME states of minimal support and classical maximum distance separable (MDS) error correcting codes and, in particular, provide explicit closed form expressions for AME states of n parties with local... 

    Implicit effect of decoding time on fault tolerance in erasure coded cloud storage systems

    , Article 20th International Computer Science and Engineering Conference: Smart Ubiquitos Computing and Knowledge, ICSEC 2016, 14 December 2016 through 17 December 2016 ; 2017 ; 9781509044207 (ISBN) Safaei, B ; Miremadi, S. G ; Alinezhad Chamazcoti, S ; Sharif University of Technology
    Abstract
    International Data Company (IDC) has estimated the total amount of digital data stored in the world will reach 40 thousand Exabytes at the end of 2020. The idea of accessing this volume of data, anywhere at any time by exploiting commodity hardware, led to the introduction of cloud storage. The abounded rate and variety of failures in the equipment used in cloud storage systems, placed fault tolerance, at top of the challenges in these systems. Hadoop Distributed File System (HDFS) has provided cloud with reliable storage via replication. Storage overhead of replication is high and therefore it's going to be replaced with erasure codes. Despite the significant number of researches on... 

    Cache-Aided combination networks with interference

    , Article IEEE Transactions on Wireless Communications ; Volume 19, Issue 1 , 2020 , Pages 148-161 Elkordy, A. R ; Motahari, A. S ; Nafie, M ; Gunduz, D ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Centralized coded caching and delivery is studied for a radio access combination network (RACN), whereby a set of H edge nodes (ENs), connected to a cloud server via orthogonal fronthaul links with limited capacity, serve a total of K user equipments (UEs) over wireless links. The cloud server is assumed to hold a library of N files, each of size F bits; and each user, equipped with a cache of size μ R N F bits, is connected to a distinct set of r ENs each of which equipped with a cache of size μTNF bits, where μT , μ R in [{0,1}] are the fractional cache capacities of the UEs and the ENs, respectively. The objective is to minimize the normalized delivery time (NDT), which refers to the...