On the Fundamental Limits of Device-to-Device Private Caching Under Uncoded Cache Placement and User Collusion
暂无分享,去创建一个
[1] G. Caire,et al. Coded Caching With Private Demands and Caches , 2022, 2022 IEEE International Symposium on Information Theory (ISIT).
[2] G. Caire,et al. On the Optimal Load-Memory Tradeoff of Cache-Aided Scalar Linear Function Retrieval , 2021, IEEE Transactions on Information Theory.
[3] B. Sundar Rajan,et al. Optimal Demand Private Coded Caching for Users with Small Buffers , 2021, 2021 IEEE International Symposium on Information Theory (ISIT).
[4] Kai Wan,et al. On Coded Caching With Private Demands , 2021, IEEE Transactions on Information Theory.
[5] Daniela Tuninetti,et al. Fundamental Limits of Caching for Demand Privacy Against Colluding Users , 2020, IEEE Journal on Selected Areas in Information Theory.
[6] A. Thangaraj,et al. Lifting Constructions of PDAs for Coded Caching With Linear Subpacketization , 2020, IEEE Transactions on Communications.
[7] Pradeep Kiran Sarvepalli,et al. Coded Caching with Demand Privacy: Constructions for Lower Subpacketization and Generalizations , 2020, ArXiv.
[8] Giuseppe Caire,et al. Novel Converse for Device-to-Device Demand-Private Caching with a Trusted Server , 2020, 2020 IEEE International Symposium on Information Theory (ISIT).
[9] Giuseppe Caire,et al. Cache-Aided Scalar Linear Function Retrieval , 2020, 2020 IEEE International Symposium on Information Theory (ISIT).
[10] Daniela Tuninetti,et al. An Index Coding Approach to Caching With Uncoded Cache Placement , 2020, IEEE Transactions on Information Theory.
[11] B. Dey,et al. Demand-Private Coded Caching and the Exact Trade-off for N=K=2 , 2019, National Conference on Communications.
[12] Giuseppe Caire,et al. Device-to-Device Private Caching with Trusted Server , 2019, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).
[13] Sneha Kamath,et al. Demand Private Coded Caching , 2019, ArXiv.
[14] Giuseppe Caire,et al. On Coded Caching With Private Demands , 2019, IEEE Transactions on Information Theory.
[15] Daniela Tuninetti,et al. Private Pliable Index Coding , 2019, 2019 IEEE Information Theory Workshop (ITW).
[16] Mary Wootters,et al. Embedded Index Coding , 2019, 2019 IEEE Information Theory Workshop (ITW).
[17] Giuseppe Caire,et al. On the Optimality of D2D Coded Caching With Uncoded Cache Placement and One-Shot Delivery , 2019, IEEE Transactions on Communications.
[18] Camilla Hollanti,et al. Private Information Retrieval From Coded Storage Systems With Colluding, Byzantine, and Unresponsive Servers , 2018, IEEE Transactions on Information Theory.
[19] Sennur Ulukus,et al. The Capacity of Private Information Retrieval from Byzantine and Colluding Databases , 2017, IEEE Transactions on Information Theory.
[20] Mohammad Ali Maddah-Ali,et al. The exact rate-memory tradeoff for caching with uncoded prefetching , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[21] Petros Elia,et al. A content-delivery protocol, exploiting the privacy benefits of coded caching , 2017, 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).
[22] Gennian Ge,et al. Private Information Retrieval from MDS Coded Databases with Colluding Servers under Several Variant Models , 2017, 1705.03186.
[23] Mohammad Ali Maddah-Ali,et al. Characterizing the rate-memory tradeoff in cache networks within a factor of 2 , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[24] Camilla Hollanti,et al. Private information retrieval schemes for codec data with arbitrary collusion patterns , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[25] Chao Tian,et al. Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching , 2016, 2017 IEEE International Symposium on Information Theory (ISIT).
[26] A. Salman Avestimehr,et al. The Exact Rate-Memory Tradeoff for Caching With Uncoded Prefetching , 2016, IEEE Transactions on Information Theory.
[27] Hua Sun,et al. The Capacity of Robust Private Information Retrieval With Colluding Databases , 2016, IEEE Transactions on Information Theory.
[28] S. Jafar,et al. The Capacity of Private Information Retrieval , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[29] Daniela Tuninetti,et al. On the optimality of uncoded cache placement , 2015, 2016 IEEE Information Theory Workshop (ITW).
[30] Hooshang Ghasemi,et al. Improved lower bounds for coded caching , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[31] Mehdi Bennis,et al. Living on the edge: The role of proactive caching in 5G wireless networks , 2014, IEEE Communications Magazine.
[32] Giuseppe Caire,et al. Fundamental Limits of Caching in Wireless D2D Networks , 2014, IEEE Transactions on Information Theory.
[33] Lele Wang,et al. On the capacity region for index coding , 2013, 2013 IEEE International Symposium on Information Theory.
[34] Urs Niesen,et al. Fundamental Limits of Caching , 2012, IEEE Transactions on Information Theory.
[35] Syed Ali Jafar,et al. Interference Alignment and Degrees of Freedom of the $K$-User Interference Channel , 2008, IEEE Transactions on Information Theory.
[36] Hua Wang,et al. Gaussian Interference Channel Capacity to Within One Bit , 2007, IEEE Transactions on Information Theory.
[37] Yuval Ishai,et al. General constructions for information-theoretic private information retrieval , 2005, J. Comput. Syst. Sci..
[38] Thomas M. Cover,et al. Network Information Theory , 2001 .
[39] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[40] János Körner,et al. General broadcast channels with degraded message sets , 1977, IEEE Trans. Inf. Theory.