A computer-aided investigation on the fundamental limits of caching

C. Tian
{"title":"A computer-aided investigation on the fundamental limits of caching","authors":"C. Tian","doi":"10.1109/ISIT.2017.8006556","DOIUrl":null,"url":null,"abstract":"We considered the optimal memory-transmission-rate tradeoff of caching systems. Different from the conventional analytical approach usually seen in the information theory literature, we rely on a computer-aided approach in this investigation. The linear programming (LP) outer bound of the entropy space serves as the starting point of this approach, however our effort goes significantly beyond using it to prove information inequalities. We first identify and formalize the symmetry structure in the problem, which enables us to show the existence of optimal symmetric solutions. A symmetry-reduced linear program is then used to identify the boundary of the memory-transmission-rate tradeoff for several simple cases, for which we obtain a set of tight outer bounds. General hypotheses on the optimal tradeoff region are formed from these computed data, which are then analytically proved. This leads to a complete characterization of the optimal tradeoff for systems with only two users, and certain partial characterization for systems with only two files. Next, we show that by carefully analyzing the joint entropy structure of the outer bounds for certain cases, a novel code construction can be reverse-engineered, which eventually leads to a general class of codes. Finally, we show that strong outer bounds can be computed through strategically relaxing the LP. This allows us firstly to deduce generic characteristic of the converse proof, and secondly to compute outer bounds for larger problem cases, despite the seemingly impossible computation scale.","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT.2017.8006556","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

We considered the optimal memory-transmission-rate tradeoff of caching systems. Different from the conventional analytical approach usually seen in the information theory literature, we rely on a computer-aided approach in this investigation. The linear programming (LP) outer bound of the entropy space serves as the starting point of this approach, however our effort goes significantly beyond using it to prove information inequalities. We first identify and formalize the symmetry structure in the problem, which enables us to show the existence of optimal symmetric solutions. A symmetry-reduced linear program is then used to identify the boundary of the memory-transmission-rate tradeoff for several simple cases, for which we obtain a set of tight outer bounds. General hypotheses on the optimal tradeoff region are formed from these computed data, which are then analytically proved. This leads to a complete characterization of the optimal tradeoff for systems with only two users, and certain partial characterization for systems with only two files. Next, we show that by carefully analyzing the joint entropy structure of the outer bounds for certain cases, a novel code construction can be reverse-engineered, which eventually leads to a general class of codes. Finally, we show that strong outer bounds can be computed through strategically relaxing the LP. This allows us firstly to deduce generic characteristic of the converse proof, and secondly to compute outer bounds for larger problem cases, despite the seemingly impossible computation scale.
对缓存基本限制的计算机辅助研究
我们考虑了缓存系统的最佳内存传输速率权衡。与信息论文献中常见的传统分析方法不同,我们在本研究中采用了计算机辅助方法。熵空间的线性规划(LP)外界作为这种方法的起点,然而我们的努力远远超出了用它来证明信息不平等。我们首先识别并形式化了问题中的对称结构,这使我们能够证明最优对称解的存在性。然后用一个对称简化的线性规划来确定几种简单情况下存储-传输速率权衡的边界,得到了一组紧的外边界。从这些计算数据中形成了最优权衡区域的一般假设,并对这些假设进行了解析证明。这将导致对只有两个用户的系统的最佳权衡的完整描述,以及对只有两个文件的系统的某些部分描述。接下来,我们表明,通过仔细分析某些情况下外界的联合熵结构,可以对新的代码结构进行逆向工程,从而最终生成一般类型的代码。最后,我们证明了可以通过策略放松LP来计算强外边界。这使我们首先可以推断出逆证明的一般特征,其次可以计算更大问题情况的外界,尽管计算规模看似不可能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
文献相关原料
公司名称 产品信息 采购帮参考价格
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信