This shows you the differences between two versions of the page.
exploiting_caches_for_spectrum_sharing_in_wireless_device-to-device_networks [2016/09/01 19:15] (current)
|Line 1:||Line 1:|
|+||Wireless device-to-device (D2D) communication is envisioned as an integral part of next-generation communication networks. A feature specific to the D2D paradigm originates from the premise that individual devices have content desired by other devices. While some content may originate at the device (e.g., user-to-user messaging), the majority of D2D bandwidth is is expected to result from redundant content cached at different devices (e.g., popular multimedia files). Determining how to exploit redundancy across device caches is thus the central challenge we discuss.|
|+||In this talk, we look at how redundancy across device caches may be exploited in D2D networks, focusing on two scenarios. In the first scenario, we look at how redundancy in caches of potential sources affects spectrum access policies for D2D networks when receivers can only treat interference as noise. For these simple receivers, we show that a cache-aware version of ITLinQ (an access policy based on information-theoretic optimality conditions for treating interference as noise) can exhibit a marked improvement in comparison to ITLinQ ignoring caching as well as to other state-of-the-art access policies. In the second scenario, we study how caching at receivers introduces opportunities for increased spectral efficiency through blind coded multicast; i.e., we introduce a scheme where a source can exploit a receiver's cache contents even if it does not know the contents.|
|+||David Kao is currently a postdoctoral researcher at the University of Southern California. He received his Ph.D. in Electrical Engineering from Rice University in 2012. He is a recipient of the Edmund McAshan Dupree Fellowship in Electrical Engineering and a Texas Instruments Distinguished Endowed Fellowship. His research interests include information theory and networking theory and their application in wireless networks.|