98%
921
2 minutes
20
The idea behind network caching is to reduce network traffic during peak hours via transmitting frequently-requested content items to end users during off-peak hours. However, due to limited cache sizes and unpredictable access patterns, this might not totally eliminate the need for data transmission during peak hours. Coded caching was introduced to further reduce the peak hour traffic. The idea of coded caching is based on sending coded content which can be decoded in different ways by different users. This allows the server to service multiple requests by transmitting a single content item. Research works regarding coded caching traditionally adopt a simple network topology consisting of a single server, a single hub, a shared link connecting the server to the hub, and private links which connect the users to the hub. Building on the results of Sengupta et al. (IEEE Trans. Inf. Forensics Secur., 2015), we propose and evaluate a yet more complex system model that takes into consideration both throughput and security via combining the mentioned ideas. It is demonstrated that the achievable rates in the proposed model are within a constant multiplicative and additive gap with the minimum secure rates.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8620505 | PMC |
http://dx.doi.org/10.3390/e23111459 | DOI Listing |
Nat Rev Cardiol
September 2025
Department of Medicine (Genetic Medicine and Clinical Pharmacology), Vanderbilt University Medical Center, Nashville, TN, USA.
Cardiovascular diseases are leading global causes of death and disability, often presenting as interrelated phenotypes of atherosclerotic vascular disease, heart failure and arrhythmias. Cardiovascular diseases arise from interactions between environmental factors and predisposing genotypes and include common Mendelian lipid disorders, cardiomyopathies and arrhythmia syndromes. The identification of a pathogenic variant through genetic testing can inform disease diagnosis, risk prediction, treatment and family screening.
View Article and Find Full Text PDFEntropy (Basel)
August 2025
Department of Electronics and Communications Engineering, The American University in Cairo, New Cairo 11835, Egypt.
We consider the problem of privately updating a message out of messages from replicated and non-colluding databases where a user has an version of the message W^θ of length bits that differ from the current version Wθ in at most bits. The user also has a cache containing coded combinations of the messages (with a pre-specified structure), which are unknown to the databases (unknown prefetching). The cache contains linear combinations from all messages in the databases with r=lL being the caching ratio.
View Article and Find Full Text PDFEntropy (Basel)
March 2025
Key Lab of Education Blockchain and Intelligent Technology, Ministry of Education, Guangxi Normal University, Guilin 541004, China.
This paper considers a two-layer hierarchical network, where a server containing files is connected to K1 mirrors and each mirror is connected to K2 users. Each mirror and each user has a cache memory of size M1 and M2 files, respectively. The server can only broadcast to the mirrors, and each mirror can only broadcast to its connected users.
View Article and Find Full Text PDFFEBS J
March 2025
Instituto de Agrobiotecnología del Litoral (IAL, CONICET-UNL), Santa Fe, Argentina.
Neuron
December 2024
Department of Neuroscience, University of Minnesota, Minneapolis, MN, USA. Electronic address:
Behavior in naturalistic scenarios occurs in diverse environments. Adaptive strategies rely on multiple neural circuits and competing decision systems. However, past studies of rodent decision making have largely measured behavior in simple environments.
View Article and Find Full Text PDF