PreprintPDF Available
Preprints and early-stage research may not have been peer reviewed yet.

Abstract and Figures

We study a multiuser system in which an information source provides status updates to two monitors with heterogeneous goals. Semantic filtering is first performed to select the most useful realizations for each monitor. Packets are then encoded and sent so that each monitor can timely fulfill its goal. In this regard, some realizations are important for both monitors, while every other realization is informative for only one monitor. We determine the optimal real codeword lengths assigned to the selected packet arrivals in the sense of maximizing a weighted sum of semantics-aware utility functions for the monitors. Our analytical and numerical results provide the optimal design parameters for different arrival rates and highlight the improvement in timely status update delivery using semantic filtering and source coding.
Content may be subject to copyright.
Semantic Source Coding for Two Users with HeterogeneousSemantic Source Coding for Two Users with Heterogeneous
GoalsGoals
This paper was downloaded from TechRxiv (https://www.techrxiv.org).
LICENSE
CC BY-NC-SA 4.0
SUBMISSION DATE / POSTED DATE
25-05-2022 / 25-05-2022
CITATION
Agheli, Pouya; pappas, nikolaos; Kountouris, Marios (2022): Semantic Source Coding for Two Users with
Heterogeneous Goals. TechRxiv. Preprint. https://doi.org/10.36227/techrxiv.19869334.v1
DOI
10.36227/techrxiv.19869334.v1
Semantic Source Coding for Two Users
with Heterogeneous Goals
Pouya Agheli, Nikolaos Pappas, and Marios Kountouris
Communication Systems Department, EURECOM, Sophia Antipolis, France
Dept. of Science and Technology, Link ¨
oping University, Norrk¨
oping Campus, Sweden
Email: pouya.agheli@eurecom.fr, nikolaos.pappas@liu.se, marios.kountouris@eurecom.fr
Abstract—We study a multiuser system in which an information
source provides status updates to two monitors with heterogeneous
goals. Semantic filtering is first performed to select the most useful
realizations for each monitor. Packets are then encoded and sent
so that each monitor can timely fulfill its goal. In this regard, some
realizations are important for both monitors, while every other
realization is informative for only one monitor. We determine the
optimal real codeword lengths assigned to the selected packet
arrivals in the sense of maximizing a weighted sum of semantics-
aware utility functions for the monitors. Our analytical and
numerical results provide the optimal design parameters for
different arrival rates and highlight the improvement in timely
status update delivery using semantic filtering and source coding.
I. INT RO DUC TIO N
Goal-oriented semantic communication is recently consid-
ered as a promising and timely research avenue towards
realizing the long-standing vision of Shannon and Weaver
[1] and incorporating the significance and the importance of
information into the existing theoretic edifice. Despite various
past endeavors [2]–[6], which remained at a conceptual level,
leading to hardly any or no practically relevant application, the
quest for such theory has recently gained new impetus [7]–[9],
fueled by the emergence of networked intelligent systems and
autonomous networks. This communication paradigm has the
potential to render various network processes more efficient and
effective, providing a parsimonious usage of communication
and computation resources. Key to this is the definition of a
concise yet insightful metric of the importance or the usefulness
of information. Age of information (AoI) [10], [11], which
measures information freshness in networks, and value of
information (VoI) [12], [13], which quantifies the information
utility or gain in decision making, can be viewed as simple,
quantitative surrogates for information semantics.
In this paper, we investigate a multiuser system in which
two monitors (users) receive status updates from a transmitter
observing an information source. The updates may correspond
to observations or measurements of a random phenomenon and
are generated from a known discrete distribution with finite
support. Semantic filtering is first performed as a means to se-
lect only the most important or valuable realizations according
to each monitor’s goal. Status updates are then encoded and
sent to the monitor(s) over packet erasure channels (PECs).
To harness packet transmission failures, an automatic repeat
request (ARQ) protocol is applied. Our objective is to design a
timely source coding scheme for two users with heterogeneous
goals. Specifically, we consider that only a fraction of the
“least” (“most”) frequent source realizations is important for
the first (second) monitor. This setting model for instance
the case in which one user is interested in regular/standard
information for monitoring purposes or typical actuation (nor-
mal mode), whereas the other monitor tracks the outliers that
could potentially represent some kind of threat to the system
or a possibly dangerous situation (alarm mode). The notion
of semantics (importance) is captured here through a metric
of timeliness, which is a nonlinear function of AoI, for the
received updates at both monitors
This work falls within the realm of source coding problem
for status update systems in which the goal is to minimize the
average age of information, such as in [14]–[17]. In [18], we
proposed a semantics-aware encoding scheme for a single user
in an error-free point-to-point status update link. Our paper
extends prior work into multiuser systems with heterogeneous
goals, which could also be competing or diverging for certain
realizations. Specifically, we derive the optimal real codeword
lengths that maximize a weighted sum of the semantics-aware
utility functions for two heterogeneous monitors. Our analytical
and numerical results characterize the promising performance
gains by properly designing semantic filtering and source
coding for timely status update delivery.
II. SY S TE M MO DE L
We consider a multiuser network in which a transmitter
observes a physical phenomenon/event and sends status updates
(samples) to two monitors (named 1 and 2, c.f. Fig. 1).
Samples from the information source/process are generated
in the form of packets carrying different realizations from
a finite set X={xi|i In},In={1,2, ..., n}, each
having a probability of occurrence ˜pi=PX(xi)where PX(·)
is a known probability mass function (pmf). The observation
sequence is independent and identically distributed (i.i.d.) and
packets arrivals are Poisson distributed with rate λ. Only the
most important status updates are transmitted, hence a semantic
filter admits the kmost important arrivals and discards the rest,
i.e., nk, done via a flow controller. The difference between
the two monitors (receivers) lies in their significance/value
assessment policies, i.e., one observation can be essential for
one monitor while not relevant for the other. However, some
observations are important or valuable for both monitors. The
importance (semantics) of each arrival is assumed to be related
to its probability of occurrence. Specifically, we consider that
monitor 1 is only interested in the set of the k1least frequent
arrivals (Ik1), whereas the set of the k2most frequent ones
(Ik2) is highly important for monitor 2. Thus, the index
set of the admitted packets, i.e., Ik In, is defined as
Ik=Ik1 Ik2. In this regard, some arrivals are important
for both monitors with some non-zero probability. A source
encoder assigns codewords of length ito the admitted status
packets xi,i Ik, using prefix-free coding, based on the
truncated distribution calculated as follows pi= ˜pi/qk,i Ik
(and zero otherwise), where qk=Pi∈Ik˜pi.
Assuming no buffer is employed at the transmitter, an admit-
ted status arrival is blocked when the channel is busy. Besides,
it is assumed that each packet is delivered to both monitors
at the same time. Transmission occurs over a noisy network
which we model by two identical packet erasure channels
with erasure probability δ.1A simple ARQ protocol is used
for fixing potential transmission errors. In the event of failure
at either monitor, the transmitter, upon receipt of negative
feedback, retransmits the same packet to both monitors. The
propagation and decoding delays are considered negligible for
both transmission and feedback processes.
After successfully transferring each packet to its destination,
i.e., monitor 1, 2, or both, the transmitter waits for a new
admitted arrival. We define tr,j1the time instant that the
j-th packet is received at both monitors concurrently but is
valuable for monitor 1 (r= 1) and/or monitor 2 (r= 2).
The update interval between the j-th successive and valuable
arrival and the next one at the same monitor is then modeled
as a random variable (r.v.) Yr,j =tr,j tr,j1. This interval
consists of the service time Sr,j and the waiting time Wr,j
such that Yr,j =Wr,j +Sr,j.Wr,j is the time between the
transmitted j-th packet and its previously delivered packet
at the same monitor, thus the waiting time is written as
Wr,j =PMr,j
m=1 Zr,m, where Mr,j is an r.v. of the number
of admitted arrivals that are generated before finding the
channel idle for the j-th packet. Zr,mis the time between two
admitted arrivals and is exponentially distributed with mean
γr=1
λqkr, since the admitted arrivals for each monitor are
generated under a Poisson process with rate λqkr. Let us define
qkr=Pi∈Ikr˜piqk. The transmission time is proportional
to the codeword length and the number of ARQ repetitions.
Thereby, the service time of realization xi,i Ikr, which
is counted important for monitor 1 and/or 2 during the j-th
arrival becomes Sr,j =jitime units, where jand iare
independent. Here, jshows the total number of transmissions
for the j-th packet and is geometrically distributed with success
probability 1ǫ0, and first and second moments π1=1
1ǫ0
and π2=1+ǫ0
(1ǫ0)2, respectively.
1Our analysis can easily be extended to the case of different erasure
probabilities.
Source Semantic
filter
Packet
encoder
Transmitter
Monitors
Feedback
Monitor 1
Monitor 2
PECs
Fig. 1. Semantics-aware transmission over a multiuser network.
III. PROB LEM FO RMU LATIO N
In this section, we formulate the problem of optimal semantic
source coding for randomly arriving status updates.
The importance of received packets at the monitor(s) is mea-
sured using a special case of the semantics of information (SoI)
[8], [19]. Specifically, we consider timeliness as a contextual
attribute under the form of a non-increasing utility function
f:R+
0Rof information freshness, i.e., S(t) = f(∆(t)).
∆(t) = tu(t)is the instantaneous AoI at the receiver, defined
as the difference between the current time instant and the
timestamp u(t)of the most recently arrived update. Thereafter,
r(t)with indices r= 1 and r= 2 is the AoI of monitor 1 and
2, respectively. The SoI at each monitor decreases according to
f(.)until a valuable arrival for that monitor is observed. Then,
the SoI rises to the value of the new update at that time. Hence,
monitors could potentially attain different SoIs over similar
monitoring time spans. The average SoI for an observation
interval (0, T ), assuming a stationary ergodic process, is given
by ¯
Sr= lim
T→∞
1
TZT
0
f(∆r(t))dt.
A. Semantics-Aware Source Coding
Our objective is to optimally assign codeword lengths i,
i Ik, for semantics-aware encoding as a means to maximize
the weighted sum of the monitors’ average SoI, i.e., ¯
S1and
¯
S2. For the convenience of analytical derivation and to ensure
positiveness, maximizing the average SoI can be turned into
minimizing the average penalty of lateness defined as
Lr(∆r) = lim
T→∞
1
TZT
0
g(∆r(t))dt(1)
where g:R+
0Ris a non-decreasing function [11]. For
feasibility, codeword lengths should be positive integers, i.e.,
iZ+, and for constructing uniquely decodable codes, the
Kraft-McMillan inequality [20] has to be satisfied. Thus, the
optimization problem is formulated as
P1:min
{i}∈Z+w1L1(∆1) + w2L2(∆2)
s.t. X
i∈Ik
2i1,(2)
where w1, w20are weight parameters. To solve P1, we
relax the integer constraint for ito allow for non-negative real-
valued codeword lengths.2To explicitly find Lr(∆r), hence
2After computing real-valued i,i Ik, its corresponding integer value
can be obtained by using the rounded-off operation, as i.
exp(ρ∆(t))
exp(ρ∆(t))
t
t
0
0
t1,2
t2,2
t1,n
t2,n
t1,j1
t2,j1
t1,j
t2,j
S1,j S1,j+1
W1,j
S2,j S2,j+1
W2,j
Q1,j
Q2,j
Q1,
Q2,
T
T
Valuable for
Valuable for
Valuable for
monitor 2
monitor 1
both monitors
Fig. 2. Sample evolution for the EDT case over time for ρ= 0.2.
solve (2), we need to define the penalty function. In this paper,
we propose three different forms of g(.)as follows.
g(∆r(t)) =
exp(ρr(t)) EDT case
ln(ρr(t)) LDT case
ρ(∆r(t))κPDT case
(3)
where ρ0and κZ+are constant coefficients. The above
cases correspond to exponentially (E-), logarithmically (L-),
and polynomially decreasing timeliness (PDT), respectively.
The average penalty of lateness is computed for all cases
using (1) and (3). We divide the positive area below the curve
of g(∆r(t)) over the interval (0, T )into polygons of Qr,j,
j= 1,2, ..., Nr(T), and Qr,, as in Fig. 2 for the EDT case.
Herein, Nr(T) N(T)is the number of admitted packets for
monitor 1 (r= 1) or monitor 2 (r= 2) by time T, where
N(T)is the number of all admitted packets. Thus, we have
Lr(∆r) = lim
T→∞
1
TNr(T)
X
j=1
Qr,j +Qr,=ηrE[Qr](4)
where ηr= lim
T→∞
Nr(T)1
Tis the steady-state time average
arrival rate. From (2)–(4), after merging η1with w1and η2
with w2as all being positive constants, we have
P2:min
{i}∈R+w1E[Q1] + w2E[Q2] := JSoI
s.t. X
i∈Ik
2i1.(5)
IV. SEM A NT I C MULT IU S ER CO DEW ORD DE SI G N
In what follows, we find the optimal semantics-aware real
codeword lengths by solving P2for the particular cases in (3).
A. EDT Case
Using second-order Taylor expansion for the exponential
function, the area Qr,j for j2yields
Qr,j =Ztr,j+Sr,j+1
tr,j1
eρ(ttr,j1)dtZtr,j +Sr,j+1
tr,j
eρ(ttr,j)dt
ρ
2Y2
r,j +ρSr,j+1Yr,j +Yr,j .(6)
Therefore, E[Qr]is derived as
E[Qr]ρ
2E[Y2
r] + ρE[Sr]E[Yr] + E[Yr]
=ρ
2π2E[L2]r+ρπ2
1(E[L]r)2
+ (1+2ργr)π1E[L]r+ργ2
r+γr,(7)
using E[Yr] = π1E[L]r+γrand E[Y2
r] = π2E[L2]r+
2γrπ1E[L]r+ 2γ2
rwith γr= (λqkr)1[17]. We also have
E[Sr] = π1E[L]rand E[S2
r] = π2E[L2]rwhere E[L]r=
Pi∈Ikrpiiand E[L2]r=Pi∈Ikrpi2
iindicate the first and
second moments of the codeword lengths, respectively.
Applying (7), the objective function for the optimization
problem P2becomes
JSoI =ρ
2π2w1E[L2]1+w2E[L2]2
+ρπ2
1w1(E[L]1)2+w2(E[L]2)2
+w1(1+2ργ1)π1E[L]1+w1ργ2
1+w1γ1
+w2(1+2ργ2)π1E[L]2+w2ργ2
2+w2γ2.(8)
Proposition 1. The codeword length i,i Ik, that mini-
mizes (8) in P2for the EDT case is given by
i=ln2αpi
µ(ln(2))2W0
µ(ln(2))2
αpi
2β
α (9)
where µ0is the Lagrange multiplier, α=ρπ2(1+2),
β=2µρ ln(2)π2
1(1χ1+2χ2) + αθπ1
α+ 2ρπ2
1(1χ1+2χ2),(10)
θ=1(1+2ργ1) + 2(1+2ργ2), and W0(.)is the principal
branch of Lambert Wfunction. Moreover, 1:=w11and
2:=w22, with 1, 2 {0,1}being indicator parameters,
initialized as follows: (1= 1, 2= 0),(1=2= 1), and
(1= 0, 2= 1) if realization xibelongs to set A=Ik1B,
B=Ik1 Ik2, and C=Ik2 B, respectively.
Before proceeding with the proof, we remark that the values
of χ1and χ2are calculated using Algorithm 1. First, we as-
sume uniformly distributed pi,i Ik, and assign χ(0)
1=k1/k
and χ(0)
2=k2/k. Then, we find iand compute new χ1and χ2.
Based on them, the new values for iare found. This process
continues until the convergence criterion εis satisfied. The
algorithm converges to the final values of χ1,χ2,β, and iwith
the rate of O((NnNm)1)in which Nnand Nmdenote the
maximum numbers of inner and outer iterations, respectively.
Proof: By (8), we define the Lagrange function for P2as
L(i;µ) = ρ
2π2w1X
i∈Ik1
pi2
i+w2X
i∈Ik2
pi2
i
+ρπ2
1w1X
i∈Ik1
pii
2+w2X
i∈Ik2
pii
2
+w1(1+2ργ1)π1X
i∈Ik1
pii+w2(1+2ργ2)π1X
i∈Ik2
pii
+w1ργ2
1+w2ργ2
2+w1γ1+w2γ2+µX
i∈Ik
2i1
(11)
where µ0is the Lagrange multiplier. Then, we write the
Karush-Kuhn-Tucker (KKT) conditions for i Ik, as follows:
L(i;µ)
∂ℓi
=ρπ2(1+2)pii+ 2ρπ2
11X
i∈Ik1
pii
+2X
i∈Ik2
pii
pi+1(1+2ργ1)π1pi
+2(1+2ργ2)π1piµln(2)2i= 0 (12)
where 1:=w11and 2:=w22with 1, 2 {0,1}
being indicator parameters. Let us split set Ikinto three disjoint
sets of A,Ik1 B,B,Ik1 Ik2, and C,Ik2 B.
Thus, we have (1=w1, 2= 0),(1=w1, 2=w2), or
(1= 0, 2=w2)if xibelongs to A,B, or C, respectively.
The complementary slackness condition is
µX
i∈Ik
2i1
= 0.(13)
There exist two conditions, one of which meets (13): (i) µ= 0,
Pi∈Ik2i<1; or (ii) µ6= 0,Pi∈Ik2i= 1. Under
(i), the right hand side of (12), in which all terms are non-
negative, equals to zero, resulting in i= 0,i Ik. Since
negative codeword lengths are not meaningful, by contradic-
tion, condition (ii) must satisfy (13). Summing (12) over all
codeword indices, it is hard to find a closed-form expression
based on E[L],E[L]1and E[L]2. To this end, we introduce
two parameters χ1and χ2, which captures the nonlinear
relationship with k1and k2, respectively. Specifically, we define
χ1=E[L]1
E[L]and χ2=E[L]2
E[L], with 0χ11and 0χ21.
Now, for given χ1and χ2, one can derive E[L],E[L]1, and
E[L]2. After some calculations, we reach
µ(ln(2))2
αpi
2iexpµ(ln(2))2
αpi
2i
=µ(ln(2))2
αpi
2β
α(14)
where α=ρπ2(1+2), and βis given in (10). The form
of (14) is equal to xexp(x) = yfor which the solution is
x=Wm(y), where m= 0 for y0.
In order to find the optimal codeword lengths, we start from
a value of µthat satisfies Pi∈Ik2i= 1. Then, its value is
updated by the use of E[L],E[L]1, and E[L]2.
B. LDT Case
In this case, the area Qr,j for j2yields
Qr,j =Ztr,j+Sr,j+1
tr,j1
ln(ρ(ttr,j1))dt
Ztr,j+Sr,j +1
tr,j
ln(ρ(ttr,j))dt
ρY 2
r,j + 2ρSr,j+1Yr,j 2Yr,j ,(15)
Algorithm 1: Solution for deriving χ1and χ2
Input: Fixed parameters Ik,Ik1,Ik2, and pi,i Ik.
Stopping accuracy ε. Initial parameters µ(0),
χ(0)
1,χ(0)
2,β(0), and (0)
i,i.
Output: Final-form parameters χ1=χ(n)
1,χ2=χ(n)
2,
β=β(n),i=(n)
i,i, and µ=µ(m).
1Iteration m:
2Iteration n:
3Update β(n)and (n)
iusing (10) and (9), respectively.
4Compute E[L] = Pi∈Ikpi(n)
i,E[L]1=Pi∈Ik1pi(n)
i,
and E[L]2=Pi∈Ik2pi(n)
i.
5Update χ(n)
1and χ(n)
2based on 4.
6if Criterion
χ(n)
1χ(n1)
1
>ε or
χ(n)
2χ(n1)
2
>ε
then set n=n+1, and goto 2.
7Compute β(n)from (10), and derive (n)
ifrom (9).
8if Pi∈Ikpi(n)
i=1 then stop the process, and goto 11.
9else if Pi∈Ikpi(n)
i<1then decrease µ(m), set
m=m+1, and goto 1.
10 else increase µ(m), set m=m+1, and goto 1.
11 Save χ(n)
1,χ(n)
2,β(n),(n)
i,i, and µ(m).
which results in
E[Qr]ρπ2E[L2]r+ 2ρπ2
1(E[L]r)2
+ 2(2ργr1)π1E[L]r+ 2ργ2
r2γr.(16)
Consequently, we obtain the following objective function.
JSoI =ρπ2w1E[L2]1+w2E[L2]2
+ 2ρπ2
1w1(E[L]1)2+w2(E[L]2)2
+ 2w1(2ργ11)π1E[L]1+ 2w1ργ2
12w1γ1
+ 2w2(2ργ21)π1E[L]2+ 2w2ργ2
22w2γ2.(17)
Putting (17) into P2and following the same procedure as (11)–
(14), we obtain the optimal codeword length i,i Ik, as
i=ln2αpi
µ(ln(2))2W0
µ(ln(2))2
αpi
2β
α (18)
where µ0,α= 2ρπ2(1+2),
β=4µρln(2)π2
1(1χ1+2χ2) + 2αθπ1
α+ 4ρπ2
1(1χ1+2χ2),(19)
and θ=1(2ργ11) + 2(2ργ21). For i A and i C,
we initialize 2= 0 and 1= 0, respectively. Otherwise, 1=
2= 1. The values of χ1and χ2are found using Algorithm 1
and replacing the parameters of i, such as βwith β.
C. PDT Case
Setting κ= 1 for exposition convenience, we obtain
Qr,j ρ
2Y2
r,j +ρSr,j+1Yr,j ,(20)
for which the expected value is derived as
E[Qr]ρ
2π2E[L2]r+ρπ2
1(E[L]r)2
+ 2ργrπ1E[L]r+ργ2
r.(21)
Similar to IV-A and IV-B, we get JSoI and solve P2. The
solution for optimal i,i Ik, is
i=ln2αpi
µ′′(ln(2))2W0
µ′′(ln(2))2
αpi
2β′′
α (22)
where µ′′ 0, and if θ′′ = 21ργ1+ 22ργ2, we have
β′′ =2µ′′ρln(2)π2
1(1χ1+2χ2) + αθ′′π1
α+ 2ρπ2
1(1χ1+2χ2).(23)
We set 2= 0 and 1= 0 for i A and i C, respectively, or
otherwise 1=2= 1. The values of χ1and χ2are obtained
from Algorithm 1 by substituting the parameters of i.
D. Asymptotic Expansions
Using W0(y)
yξ= exp(ξW0(y)), for ye, and W0(y) =
ln(y)ln(ln(y)) + (1) for large y, we can write i
c/piln(c/pi), for pic
e1, with c:=µ(ln(2))2
α2β
α. This
expression, which is monotonically decreasing, corroborates
that the higher the probability of occurrence of a realization, the
shorter the assigned codeword length, and vice versa. pi0
yields i1.
Furthermore, consider a uniform pmf for the realizations, i.e.,
pi= 1/n,i. In that case, we have codewords of equal size,
i.e., 1=2=... =n, with inln(n). Moreover, n1
results in i=max,i Ik, where max is an upper bound
to which the size of a codeword length converges, and max
remains almost fixed for the large enough n. As the number of
realizations increases, the assigned codeword lengths become
longer at the expense of longer service time.
V. NUM ERI CA L RE SU LTS
In this section, we provide numerical results for the opti-
mal number of selected status updates (packets) in different
scenarios, highlighting the advantages of semantic filtering
and source coding. We use Zipf(n, s) distribution with pmf
PX(x) = 1/xs
Pn
j=1 1/js,n=|X| = 100, and s= 0.4. The
parameter sallows us to vary from a uniform distribution
(s= 0) to a “peaky distribution”. The packet error rate
ǫ0is initialized according to its upper bound Φδ
δ(1δ)
[21], where δand Φ(.)denote the erasure probability and
the cumulative distribution function of the standard normal
Gaussian distribution, respectively. Unless otherwise stated, we
set ρ= 0.2,δ= 0.5,w1=w2= 1, and T= 10 [sec].
Fig. 3 depicts the value of JSoI versus the number of
selected (important) realizations for the EDT case. We observe
that increasing the arrival rate reduces JSoI, as well as the
optimal k1and k2values. In addition, the transmitter filters a
considerably higher number of frequent arrivals than infrequent
ones. However, no filtering (k1, k2n) results in performance
degradation due to spending time for sending insignificant
Fig. 3. The interplay between JSoI and the number of selected realizations
k1and k2for the EDT case with n= 100 and w1=w2= 1.
TABLE I
OPT IM AL N UM BE R O F S EL EC TE D PACK ET S F OR n= 100.
EDT case LDT case PDT case
Arrival rate k1k2k1k2k1k2
λ= 0.1 100 94 100 91 100 89
λ= 0.5 100 45 100 42 100 41
λ= 1 45 14 46 13 46 12
λ= 2 45 10 46 8 46 8
Fig. 4. The interplay between JSoI and the number of selected realizations
k1and k2for the EDT case with n= 100,λ= 1, and δ= 0.5.
realizations. Likewise, the derived optimal values of k1and
k2for the LDT and PDT cases with different arrivals rates
are listed in Table I. We see that the exponential penalty
results in the lowest and highest values for optimal k1and
k2, respectively, compared to the other forms.
Fig. 4 shows the effects of weight parameters in the objective
function JSoI and the number of selected realizations for the
TABLE II
OPT IM AL N UM BE R O F S EL EC TE D PACK ET S F OR n= 100 AND λ= 1 .
Weight parameters (w1, w2)
(1,1) (10,1) (1,10)
Erasure probability k1k2k1k2k1k2
δ= 0.25 47 17 100 60 33 34
δ= 0.5 45 14 50 5 33 33
Fig. 5. The objective function JSoI versus arrival rate λfor the EDT case
with n= 100 and w1=w2= 1.
EDT case, with λ= 1, and δ= 0.5. Varying each weight
parameter alters the optimal values of k1and k2, hence JSoI.
Notably, giving ten times more weight to the arrivals of monitor
2 compared to those of monitor 1 equalizes the optimal k1
and k2. The transmitter equally filters around 33% of frequent
and infrequent arrivals. The obtained information from Fig. 4
and from its extension for δ= 0.25 is given in Table II. We
observe that higher erasure probability results in fewer selected
packets since the transmitter spends more time to retransmit the
unsuccessful packets. The same conclusions hold for the LDT
and PDT cases.
Fig. 5 presents the objective function JSoI versus the arrival
rate λfor different numbers of selected packets and the EDT
case. Increasing the arrival rate decreases JSoI, which in
turn diminishes and saturates at higher rates. Furthermore,
increasing both or one of k1or k2means that the arrival
rate required to decrease the objective function diminishes. For
instance, the minimum values of arrival rates (hence, JSoI) for
k1=k2=n/4,k1=k2=n/2, and k1=k2=nare around
11(14),17(11),20(2), respectively. Thus, for large k1and k2,
the objective function takes high values for any arrival rates.
According to the analytical expressions derived for the EDT
case, we find the global optimal values of λ10.27,17.63,
and 19.12 sequentially for k1=k2=n/4,k1=k2=n/2,
and k1=k2=n. Likewise, Fig. 5 can be plotted for the LDT
and PDT cases, resulting in similar interpretations.
VI. CONCLUSION
We studied the timely source coding problem in a two-user
status update system, where observations of an information
source are filtered and sent to two monitors depending on their
importance for achieving each user’s goal. Optimizing the code-
word length according to semantics-aware utility functions,
the amount of status updates communicated is significantly
reduced. Our analytical and numerical results show that there
is an optimal value of realizations to send, which depends
on the source distribution, the arrival rate, and the weight
of each monitor to maximize the value of the communicated
information through the network.
REF ER E NC E S
[1] C. E. Shannon and W. Weaver, The mathematical theory of communica-
tion. University of Illinois Press, Urbana, 1949.
[2] Y. Bar-Hillel and R. Carnap, “Semantic information,” British Journal for
the Philosophy of Science, vol. 4, no. 14, 1953.
[3] F. I. Dretske, Knowledge and the flow of information, 1st ed. MIT Press
Cambridge, Mass., 1981.
[4] B. Juba and M. Sudan, “Universal semantic communication I,” in Proc.
of the 40th Annual ACM Symposium on Theory of Computing, ser. STOC
’08, New York, NY, USA, 2008, p. 123–132.
[5] J. Bao et al., “Towards a theory of semantic communication,” in IEEE
Network Science Workshop, 2011.
[6] B. G¨
uler, A. Yener, and A. Swami, “The semantic communication game,”
IEEE Transactions on Cognitive Communications and Networking, vol. 4,
no. 4, pp. 787–802, 2018.
[7] P. Popovski, O. Simeone, F. Boccardi, D. G¨
und¨
uz, and O. Sahin,
“Semantic-effectiveness filtering and control for post-5G wireless con-
nectivity, Journal of the Indian Institute of Science, vol. 100, no. 2, pp.
435–443, 2020.
[8] M. Kountouris and N. Pappas, “Semantics-empowered communication
for networked intelligent systems,” IEEE Communications Magazine,
vol. 59, no. 6, pp. 96–102, 2021.
[9] Z. Qin, X. Tao, J. Lu, and G. Y. Li, “Semantic communications: Principles
and challenges,” arXiv preprint arXiv: 2201.01389v2, 2022.
[10] A. Kosta, N. Pappas, and V. Angelakis, “Age of information: A new
concept, metric, and tool,” Foundations and Trends in Networking,
vol. 12, no. 3, 2017.
[11] R. D. Yates, Y. Sun, D. R. Brown, S. K. Kaul, E. Modiano, and S. Ulukus,
“Age of information: An introduction and survey, IEEE Journal on Sel.
Areas in Commun., vol. 39, no. 5, pp. 1183–1210, 2021.
[12] R. L. Stratonovich, “On the value of information,” Izv. USSR Acad. Sci.
Tech. Cybern., no. 5, 1965.
[13] R. A. Howard, “Information value theory, IEEE Trans. on Systems
Science and Cybernetics, vol. 2, no. 1, 1966.
[14] P. Mayekar, P. Parag, and H. Tyagi, “Optimal source codes for timely
updates,” IEEE Trans. on Inform. Theory, vol. 66, no. 6, pp. 3714–3731,
2020.
[15] J. Zhong and R. D. Yates, “Timeliness in lossless block coding,” in Data
Compression Conference, 2016, pp. 339–348.
[16] J. Zhong, R. D. Yates, and E. Soljanin, “Timely lossless source coding
for randomly arriving symbols, in IEEE Inform. Theory Workshop, 2018.
[17] M. Bastopcu, B. Buyukates, and S. Ulukus, “Optimal selective encoding
for timely updates,” in Annual Conference on Information Sciences and
Systems, 2020, pp. 1–6.
[18] P. Agheli, N. Pappas, and M. Kountouris, “Semantics-aware source
coding in status update systems,” in IEEE International Conference on
Communications Workshops (ICC Workshops), 2022.
[19] N. Pappas and M. Kountouris, “Goal-oriented communication for real-
time tracking in autonomous systems,” in IEEE International Conference
on Autonomous Systems (ICAS), 2021, pp. 1–5.
[20] T. M. Cover, Elements of Information Theory. J. Wiley & Sons, 1999.
[21] Y. Polyanskiy, H. V. Poor, and S. Verd´
u, “Channel coding rate in the finite
blocklength regime,” IEEE Trans. on Inform. Theory, vol. 56, no. 5, pp.
2307–2359, 2010.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Wireless connectivity has traditionally been regarded as an opaque data pipe carrying messages, whose context-dependent meaning and effectiveness have been ignored. Nevertheless, in emerging cyber-physical and autonomous networked systems, acquiring, processing, and sending excessive amounts of distributed real-time data, which ends up being stale or useless to the end user, will cause communication bottlenecks, increased latency, and safety issues. We envision a communication paradigm shift, which makes the semantics of information (i.e., the significance and usefulness of messages) the foundation of the communication process. This entails a goal-orient-ed unification of information generation, transmission, and reconstruction, by taking into account process dynamics, signal sparsity, data correlation, and semantic information attributes. We apply this structurally new, synergetic approach to a communication scenario where the destination is tasked with real-time source reconstruction for the purpose of remote actuation. Capitalizing on semantics-empowered sampling and communication policies, we show significant reduction in both reconstruction error and cost of actuation error, as well as in the number of uninformative samples generated.
Article
Full-text available
A transmitter observing a sequence of independent and identically distributed random variables seeks to keep a receiver updated about its latest observations. The receiver need not be apprised about each symbol seen by the transmitter, but needs to output a symbol at each time instant t . If at time t the receiver outputs the symbol seen by the transmitter at time U(t)tU(t)\leq t , the age of information at the receiver at time t is tU(t)t-U(t) . We study the design of lossless source codes that enable transmission with minimum average age at the receiver. We show that the asymptotic minimum average age can be attained up to a constant gap by the Shannon codes for a tilted version of the original pmf generating the symbols, which can be computed easily by solving an optimization problem. Furthermore, we exhibit an example with alphabet X\mathcal {X} where Shannon codes for the original pmf incur an asymptotic average age of a factor O(logX)O(\sqrt {\log | \mathcal {X}|}) more than that achieved by our codes. Underlying our prescription for optimal codes is a new variational formula for integer moments of random variables, which may be of independent interest. Also, we discuss possible extensions of our formulation to randomized schemes and to the erasure channel, and include a treatment of the related problem of source coding for minimum average queuing delay.
Article
We summarize recent contributions in the broad area of age of information (AoI). In particular, we describe the current state of the art in the design and optimization of low-latency cyberphysical systems and applications in which sources send time-stamped status updates to interested recipients. These applications desire status updates at the recipients to be as timely as possible; however, this is typically constrained by limited system resources. We describe AoI timeliness metrics and present general methods of AoI evaluation analysis that are applicable to a wide variety of sources and systems. Starting from elementary single-server queues, we apply these AoI methods to a range of increasingly complex systems, including energy harvesting sensors transmitting over noisy channels, parallel server systems, queueing networks, and various single-hop and multi-hop wireless networks. We also explore how update age is related to MMSE methods of sampling, estimation and control of stochastic processes. The paper concludes with a review of efforts to employ age optimization in cyberphysical applications.
Article
The traditional role of a communication engineer is to address the technical problem of transporting bits reliably over a noisy channel. With the emergence of 5G, and the availability of a variety of competing and coexisting wireless systems, wireless connectivity is becoming a commodity. This article argues that communication engineers in the post-5G era should extend the scope of their activity in terms of design objectives and constraints beyond connectivity to encompass the semantics of the transferred bits within the given applications and use cases. To provide a platform for semantic-aware connectivity solutions, this paper introduces the concept of a semantic-effectiveness (SE) plane as a core part of future communication architectures. The SE plane augments the protocol stack by providing standardized interfaces that enable information filtering and direct control of functionalities at all layers of the protocol stack. The advantages of the SE plane are described in the perspective of recent developments in 5G, and illustrated through a number of example applications. The introduction of a SE plane may help replacing the current “next-G paradigm” in wireless evolution with a framework based on continuous improvements and extensions of the systems and standards.
Article
This paper proposes a communication framework where meanings of transmitted codewords over a noisy channel are explicitly taken into account. Furthermore, such communication takes place in the presence of an external entity, i.e., an agent, that can influence the receiver. The agent may be adversarial or helpful, and its true nature is unknown to the communicating parties. Actions taken by the agent are governed by its nature to aim to improve/deteriorate the communication performance. We characterize the optimal transmission policies to minimize the end-to-end average semantic error, that we define as the expected error between meanings of intended and recovered messages, under the uncertainty of agent’s true intentions. To do so, we first formulate the communication problem as a Bayesian game, and investigate the conditions under which a Bayesian Nash equilibrium exists. Next, we consider a dynamic communication scenario in which parties take actions sequentially, forming beliefs about the other party. By formulating this setting as a sequential game, we investigate the structure of the belief system and strategy profiles at equilibrium. Our results indicate that word semantics are instrumental in assessing communication performance when messages carry meanings, and optimal communication strategies are strongly influenced by the communicating parties’ beliefs.
Article
Age of information (AoI) was introduced in the early 2010s as a notion to characterize the freshness of the knowledge a system has about a process observed remotely. AoI was shown to be a fundamentally novel metric of timeliness, significantly different, to existing ones such as delay and latency. The importance of such a tool is paramount, especially in contexts other than transport of information, since communication takes place also to control, or to compute, or to infer, and not just to reproduce messages of a source. This volume comes to present and discuss the first body of works on AoI and discuss future directions that could yield more challenging and interesting research.