Elements of information theory
Elements of information theory
Communication complexity
On data structures and asymmetric communication complexity
Journal of Computer and System Sciences
Protocols for asymmetric communication channels
Journal of Computer and System Sciences
Improved bounds for asymmetric communication protocols
Information Processing Letters
Infranet: Circumventing Web Censorship and Surveillance
Proceedings of the 11th USENIX Security Symposium
DCC '03 Proceedings of the Conference on Data Compression
Compression with Side Information Using Turbo Codes
DCC '02 Proceedings of the Data Compression Conference
Slepian-Wolf Coding of Multiple M-ary Sources Using LDPC Codes
DCC '04 Proceedings of the Conference on Data Compression
Design of Slepian-Wolf Codes by Channel Code Partitioning
DCC '04 Proceedings of the Conference on Data Compression
On Some New Approaches to Practical Slepian-Wolf Compression Inspired by Channel Coding
DCC '04 Proceedings of the Conference on Data Compression
DCC '04 Proceedings of the Conference on Data Compression
An Optimal Randomised Cell Probe Lower Bound for Approximate Nearest Neighbour Searching
FOCS '04 Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science
Call for papers: special issue on distributed source coding
Signal Processing - Special section: New trends and findings in antenna array processing for radar
Collecting correlated information from a sensor network
SODA '05 Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms
Tight lower bounds for selection in randomly ordered streams
Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms
Dynamic asymmetric communication
Information Processing Letters
On the complexity of searching in trees and partially ordered structures
Theoretical Computer Science
Dynamic asymmetric communication
SIROCCO'06 Proceedings of the 13th international conference on Structural Information and Communication Complexity
Fault recovery in wireless networks: the geometric recolouring approach
SEA'10 Proceedings of the 9th international conference on Experimental Algorithms
Hi-index | 0.00 |
We prove nearly tight lower bounds on the number of rounds of communication required by efficient protocols over asymmetric channels between a server (with high sending capacity) and one or more clients (with low sending capacity). This scenario captures the common asymmetric communication bandwidth between broadband Internet providers and home users, as well as sensor networks where sensors (clients) have limited capacity because of the high power requirements for long-range transmissions. An efficient protocol in this setting communicates n bits from each of the k clients to the server, where the clients' bits are sampled from a joint distribution D that is known to the server but not the clients, with the clients sending only O(H(D) + k) bits total, where H(D) is the entropy of distribution D. In the single-client case, there are efficient protocols using O(1) rounds in expectation and O(lg n) rounds in the worst case. We prove that this is essentially best possible: with probability 1/2O(t lg t), any efficient protocol can be forced to use t rounds. In the multi-client case, there are efficient protocols using O(lg k) rounds in expectation. We prove that this is essentially best possible: with probability Ω(1), any efficient protocol can be forced to use Ω(lg k/ lg lg k) rounds. Along the way, we develop new techniques of independent interest for proving lower bounds in communication complexity.