Skip to main content

Showing 1–10 of 10 results for author: Zewail, A A

.
  1. arXiv:1903.08142  [pdf, ps, other

    cs.IT

    Device-to-Device Coded Caching with Distinct Cache Sizes

    Authors: Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener

    Abstract: This paper considers a cache-aided device-to-device (D2D) system where the users are equipped with cache memories of different size. During low traffic hours, a server places content in the users' cache memories, knowing that the files requested by the users during peak traffic hours will have to be delivered by D2D transmissions only. The worst-case D2D delivery load is minimized by jointly desig… ▽ More

    Submitted 19 March, 2019; originally announced March 2019.

    Comments: 30 pages, 5 figures, submitted to IEEE Transactions of Communications, Mar. 2019

  2. arXiv:1811.04067  [pdf, ps, other

    cs.IT

    Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes

    Authors: Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener

    Abstract: In this work, we study coded placement in caching systems where the users have unequal cache sizes and demonstrate its performance advantage. In particular, we propose a caching scheme with coded placement for three-user systems that outperforms the best caching scheme with uncoded placement. In our proposed scheme, users cache both uncoded and coded pieces of the files, and the coded pieces at th… ▽ More

    Submitted 9 November, 2018; originally announced November 2018.

    Comments: Appeared in Asilomar Conference on Signals, Systems, and Computers, October 2018

  3. arXiv:1810.08187  [pdf, ps, other

    cs.IT

    Coded Caching for Heterogeneous Systems: An Optimization Perspective

    Authors: Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener

    Abstract: In cache-aided networks, the server populates the cache memories at the users during low-traffic periods, in order to reduce the delivery load during peak-traffic hours. In turn, there exists a fundamental trade-off between the delivery load on the server and the cache sizes at the users. In this paper, we study this trade-off in a multicast network where the server is connected to users with uneq… ▽ More

    Submitted 13 March, 2019; v1 submitted 18 October, 2018; originally announced October 2018.

    Comments: 32 pages, 7 figures, under review in IEEE Transactions on Communications, Mar. 2019

  4. arXiv:1809.06844  [pdf, ps, other

    cs.IT

    Device-to-Device Secure Coded Caching

    Authors: Ahmed A. Zewail, Aylin Yener

    Abstract: This paper studies device to device (D2D) coded-caching with information theoretic security guarantees. A broadcast network consisting of a server, which has a library of files, and end users equipped with cache memories, is considered. Information theoretic security guarantees for confidentiality are imposed upon the files. The server populates the end user caches, after which D2D communications… ▽ More

    Submitted 2 May, 2019; v1 submitted 18 September, 2018; originally announced September 2018.

    Comments: 12 pages, 5 Figures, under review

  5. arXiv:1802.10073  [pdf, ps, other

    cs.IT

    On Coded Caching with Heterogeneous Distortion Requirements

    Authors: Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener

    Abstract: This paper considers heterogeneous coded caching where the users have unequal distortion requirements. The server is connected to the users via an error-free multicast link and designs the users' cache sizes subject to a total memory budget. In particular, in the placement phase, the server jointly designs the users' cache sizes and the cache contents. To serve the users' requests, in the delivery… ▽ More

    Submitted 27 February, 2018; originally announced February 2018.

    Comments: To appear in proceedings of ITA 2018 (8 pages, 4 figures)

  6. arXiv:1712.04930  [pdf, other

    cs.IT

    Combination Networks with or without Secrecy Constraints: The Impact of Caching Relays

    Authors: Ahmed A. Zewail, Aylin Yener

    Abstract: This paper considers a two-hop network architecture known as a combination network, where a layer of relay nodes connects a server to a set of end users. In particular, a new model is investigated where the intermediate relays employ caches in addition to the end users. First, a new centralized coded caching scheme is developed that utilizes maximum distance separable (MDS) coding, jointly optimiz… ▽ More

    Submitted 13 December, 2017; originally announced December 2017.

    Comments: 30 pages, 5 figures, submitted for publication

  7. Using Network Coding to Achieve the Capacity of Deterministic Relay Networks with Relay Messages

    Authors: Ahmed A. Zewail, Yahya Mohasseb, Mohammed Nafie, Hesham El Gamal

    Abstract: In this paper, we derive the capacity of the deterministic relay networks with relay messages. We consider a network which consists of five nodes, four of which can only communicate via the fifth one. However, the fifth node is not merely a relay as it may exchange private messages with the other network nodes. First, we develop an upper bound on the capacity region based on the notion of a single… ▽ More

    Submitted 26 April, 2014; v1 submitted 18 April, 2014; originally announced April 2014.

    Comments: 12 pages, 5 figures, submitted to IEEE JSAC Network coding

  8. arXiv:1308.1761  [pdf, other

    cs.IT

    The Deterministic Capacity of Relay Networks with Relay Private Messages

    Authors: Ahmed A. Zewail, Y. Mohasseb, M. Nafie, H. EL Gamal

    Abstract: We study the capacity region of a deterministic 4-node network, where 3 nodes can only communicate via the fourth one. However, the fourth node is not merely a relay since it can exchange private messages with all other nodes. This situation resembles the case where a base station relays messages between users and delivers messages between the backbone system and the users. We assume an asymmetric… ▽ More

    Submitted 8 August, 2013; originally announced August 2013.

    Comments: 3 figures, accepted at ITW 2013

  9. arXiv:1307.0685  [pdf, other

    cs.IT

    Achievable Degrees of Freedom Region of the MIMO Relay Networks using the Detour Schemes

    Authors: Ahmed A. Zewail, M. Nafie, Y. Mohasseb, H. EL Gamal

    Abstract: In this paper, we study the degrees of freedom (DoF) of the MIMO relay networks. We start with a general Y channel, where each user has $M_i$ antennas and aims to exchange messages with the other two users via a relay equipped with $N$ antennas. Then, we extend our work to a general 4-user MIMO relay network. Unlike most previous work which focused on the total DoF of the network, our aim here is… ▽ More

    Submitted 28 February, 2014; v1 submitted 2 July, 2013; originally announced July 2013.

    Comments: 6 pages, 2 figure, to appear in ICC 2014

  10. arXiv:1304.4464  [pdf, ps, other

    cs.IT

    The Deterministic Multicast Capacity of 4-Node Relay Networks

    Authors: Ahmed A. Zewail, M. Nafie, Y. Mohasseb, H. El Gamal

    Abstract: In this paper, we completely characterize the deterministic capacity region of a four-node relay network with no direct links between the nodes, where each node communicates with the three other nodes via a relay. Towards this end, we develop an upper bound on the deterministic capacity region, based on the notion of a one-sided genie. To establish achievability, we use the detour schemes that ach… ▽ More

    Submitted 16 April, 2013; originally announced April 2013.

    Comments: 5 pages, 2 figures, accepted at ISIT'13