Real-Time Remote Monitoring of Correlated Markovian Sources

Mehrdad Salimnejad, Marios Kountouris, , and Nikolaos Pappas M. Salimnejad and N. Pappas are with the Department of Computer and Information Science Linköping University, Sweden, email: {mehrdad.salimnejad, nikolaos.pappas}@liu.se. M. Kountouris is with the Department of Computer Science and Artificial Intelligence, Andalusian Research Institute in Data Science and Computational Intelligence (DaSCI), University of Granada, Spain, email: [email protected].
The work of M. Salimnejad and N. Pappas has been supported by the Swedish Research Council (VR), ELLIIT, and the European Union (6G-LEADER, 101192080, SOVEREIGN, 101131481, and ROBUST-6G, 101139068). The work of M. Kountouris has been supported by the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (Grant agreement No. 101003431).
Abstract

We investigate real-time tracking of two correlated stochastic processes over a shared wireless channel. The joint evolution of the processes is modeled as a two-dimensional discrete-time Markov chain. Each process is observed by a dedicated sampler and independently reconstructed at a remote monitor according to a task-specific objective. Although both processes originate from a common underlying phenomenon (e.g., distinct features of the same source), each monitor is interested only in its corresponding feature. A reconstruction error is incurred when the true and reconstructed states mismatch at one or both monitors. To address this problem, we propose an error-aware joint sampling and transmission policy, under which each sampler probabilistically generates samples only when the current process state differs from the most recently reconstructed state at its corresponding monitor. We adopt the time-averaged reconstruction error as the primary performance metric and benchmark the proposed policy against state-of-the-art joint sampling and transmission schemes. For each policy, we derive closed-form expressions for the resulting time-averaged reconstruction error. We further formulate and solve an optimization problem that minimizes the time-averaged reconstruction error subject to an average sampling cost constraint. Analytical and numerical results demonstrate that the proposed error-aware policy achieves the minimum time-averaged reconstruction error among the considered schemes while efficiently utilizing the sampling budget. The performance gains are particularly pronounced in regimes with strong inter-process correlation and stringent tracking requirements, where frequent sampling by both samplers is necessary.

I INTRODUCTION

Real-time communication systems are fundamental to time-sensitive applications such as autonomous transportation, swarm robotics, industrial control, and healthcare monitoring [1, 2, 3, 4, 5]. In these systems, sensors or intelligent agents continuously observe dynamic processes and convey status updates to remote monitors over bandwidth-limited and unreliable wireless links. The received updates are then processed to extract relevant and actionable information that enables timely decision-making and control. Because the performance of such applications critically depends on the freshness, relevance, and significance of the delivered information, it is imperative to design resource-efficient mechanisms for data generation, transmission, and utilization. However, stringent latency, energy, and bandwidth constraints often preclude transmitting all observations, necessitating principled policies that decide which updates to generate and when to communicate them. This motivation has led to goal-oriented, semantics-aware communication, a novel paradigm for status update systems that prioritizes delivering the right information at the right time to achieve system objectives [6, 7, 8, 9, 10, 11, 12]. Central to this framework are semantics-aware metrics that quantify the timeliness and utility of information, including Age of Information (AoI) [13], Age of Incorrect Information (AoII) [14], cost of actuation error [15], and Version Age of Information (VAoI) [16]. Prior work has developed sampling and transmission policies that optimize these metrics under diverse constraints, demonstrating substantial gains in the efficiency and effectiveness of real-time monitoring. In multi-source systems, however, the marginal value of an update is inherently conditional on the receiver’s information state, which can already contain partial knowledge about other sources due to statistical correlation. However, most existing results focus on a single information source generating updates independently (e.g., as an independent and identically distributed (i.i.d.) process or a Markov chain), and therefore do not capture multi-source settings with correlated observations. In many practical deployments, such as multi-robot mapping with overlapping fields of view or dense wireless sensor networks, updates from one source can be informative about the states of others, implying that correlation should be explicitly accounted for when designing semantics-aware sampling and scheduling policies.

In this paper, we study a time-slotted communication system in which two samplers independently observe two correlated processes drawn from a common joint information source. After each sampling decision, a sampler transmits its update as a packet to its corresponding remote receiver over a shared and unreliable wireless channel. Each receiver reconstructs the state of its observed process using the packets received successfully. A reconstruction error occurs whenever the true process state differs from the receiver’s reconstructed state. We propose a joint sampling and transmission policy, termed the error-aware policy, under which each sampler probabilistically chooses to sample when its current state differs from the receiver’s reconstructed state in the previous time slot. Our analysis explicitly leverages inter-source correlation to quantify the marginal value of an update in closed form, enabling principled policy design beyond the independent-source setting. To quantify performance, we derive a closed-form expression for the long-term time-averaged reconstruction error under the error-aware policy and benchmark it against representative state-of-the-art joint sampling and transmission strategies. The resulting characterization yields structural insights into the optimal sampling behavior, revealing when correlation and channel unreliability induce threshold-like operating regimes. We then formulate and solve an optimization problem that minimizes the time-averaged reconstruction error subject to a constraint on the time-averaged sampling cost. Finally, we characterize how key system parameters influence the optimal operating point via analytical insights and supporting numerical results.

I-A Related Work

The primary focus of this study is to address real-time remote tracking of a correlated information source while explicitly accounting for the source dynamics relevant to actuation. A substantial body of prior work has investigated real-time remote monitoring and estimation. The works in [17, 18, 19, 20, 21, 22] study scheduling for event-triggered estimation, where a sensor observes the source state and transmits updates only when prescribed events occur, aiming to minimize estimation error subject to communication-rate constraints. Complementary lines of research incorporate the structure and dynamics of the underlying processes in the design of monitoring policies [23, 24, 25, 26, 27, 28, 29, 30, 31, 32]. These works analyze optimal transmission and sampling strategies for processes such as Gauss–Markov models [23, 24], characterize fundamental trade-offs between communication resources and estimation accuracy [25, 26], stochastic processes [27, 28, 29, 30], and finite-state Markov chains [31, 32]. Overall, these studies primarily target minimizing estimation error through sampling and transmission design but do not explicitly account for the informativeness of updates or their downstream impact on actuation and control. The works [33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 12] propose semantics-aware performance metrics that assess the effectiveness of information by leveraging the synergies between data processing, information transmission, and signal reconstruction. However, all the aforementioned works do not study multi-source settings with correlated observations in the design of joint sampling and transmission policies or semantics-aware performance metrics. The monitoring of correlated sources has been investigated in [44, 45, 46, 47, 48, 49]. These works address challenges such as temporal correlations [44], spatial correlations [45], sensor scheduling [46, 47], and the minimization of monitoring error or AoI [48, 49]. In particular, [44, 46, 45, 47] study strategies such as optimizing sensor placement, device scheduling, and transmission policies to reduce estimation error and energy consumption, while [48, 49] propose frameworks for monitoring multiple correlated sources under observation constraints. Despite these advances, existing studies largely focus on timeliness- or error-based objectives (e.g., AoI or estimation/monitoring error) and do not explicitly incorporate the importance or usefulness of information for downstream system performance, particularly in actuation-oriented settings.

I-B Summary of Contributions

Nevertheless, existing approaches do not jointly account for source correlation and actuation-oriented semantics in the design and analysis of sampling and transmission policies. In this paper, we address this gap. Specifically, we consider correlated sources communicating over a shared unreliable channel and develop analytically tractable joint sampling and transmission policies with performance guarantees under an actuation-relevant reconstruction-error metric. We investigate real-time remote monitoring of a correlated information source while explicitly accounting for the source dynamics relevant to actuation. The main contributions of this paper are as follows:

  1. 1.

    We introduce a joint sampling and transmission policy, termed the error-aware policy, in which each sampler probabilistically decides whether to generate a sample based on a comparison between its current process state and the receiver’s reconstructed state from the previous time slot. By skipping redundant samples when no state mismatch is present, the proposed policy is particularly well suited to resource-constrained environments, such as energy-limited wireless networks, where efficient use of sampling and transmission resources is critical.

  2. 2.

    We derive closed-form expressions for the time-averaged reconstruction error achieved by the proposed error-aware policy. For comparison, we also obtain analytical expressions for the time-averaged reconstruction error under the semantics-aware, change-aware, and randomized stationary sampling-and-transmission policies proposed in [15, 34].

  3. 3.

    We formulate and solve a constrained optimization problem to determine the optimal sampling probabilities for both the randomized stationary and error-aware policies, with the objective of minimizing the time-averaged reconstruction error subject to a constraint on the time-averaged sampling cost. The resulting solutions demonstrate that the optimized error-aware policy consistently outperforms the considered baseline schemes in terms of reconstruction accuracy, while efficiently exploiting the available sampling budget.

The remainder of the paper is organized as follows. Section II describes the system model and introduces the considered sampling-and-transmission policies. Section III defines the time-averaged reconstruction error and derives closed-form expressions for it under the considered policies. Section IV formulates the sampling-cost–constrained optimization problem and discusses its solution. Section V presents numerical results that validate the analysis and illustrate the impact of key system parameters. Section VI concludes the paper. Technical proofs are provided in the Appendix.

II System Model

We consider a slotted-time communication system in which two samplers independently observe a joint information source, while two transmitters (Tx1\text{Tx}_{1} and Tx2\text{Tx}_{2}) send their updates, in the form of packets, to two receivers (Rx1\text{Rx}_{1} and Rx2\text{Rx}_{2}) in support of their respective monitoring goals, as illustrated in Fig. 1. The information source is modeled as a two-dimensional discrete-time Markov chain (DTMC) composed of two correlated processes, each observed by one sampler. Each process represents an attribute or feature that contributes to the overall state of the source. The DTMC captures the joint evolution of these attributes, thereby reflecting their temporal statistical dependence.

Let Xm(t)X_{m}(t) denote the state of the mm-th process at time slot tt, taking values in a finite set 𝒳m={Xm,i|i=1,2,,|𝒳m|}\mathcal{X}_{m}=\{X_{m,i}\,|\,i=1,2,\cdots,|\mathcal{X}_{m}|\}. The processes X1(t)X_{1}(t) and X2(t)X_{2}(t) are statistically correlated, with joint distribution Pi,j=[X1(t)=X1,i,X2(t)=X2,j]P_{i,j}=\mathbb{P}\big[X_{1}(t)=X_{1,i},X_{2}(t)=X_{2,j}\big], X1,i𝒳1\forall X_{1,i}\in\mathcal{X}_{1}, X2,j𝒳2\forall X_{2,j}\in\mathcal{X}_{2}. To keep the analysis tractable while preserving the essential insights of this work, we focus on a three-state DTMC, shown in Fig. 1. The system state at time slot tt is represented by the tuple (X1(t),X2(t))\big(X_{1}(t),X_{2}(t)\big), and its evolution is governed by the transition matrix Q=[Pi,j/i,j]3×3Q=[P_{i,j/i^{\prime},j^{\prime}}]_{3\times 3} with the elements defined as Pi,j/i,j=[X1(t+1)=X1,i,X2(t+1)=X2,j|X1(t)=X1,i,X2(t)=X2,j].P_{i,j/i^{\prime},j^{\prime}}=\mathbb{P}\big[X_{1}(t+1)=X_{1,i^{\prime}},X_{2}(t+1)=X_{2,j^{\prime}}\big|X_{1}(t)=X_{1,i},X_{2}(t)=X_{2,j}\big]. Note that in the considered correlated information source model, as depicted in Fig. 1, when the DTMC is in state 0 at time slot tt, only the first process carries information (i.e., X1(t)=0X_{1}(t)=0). In this case, if Rx1\text{Rx}_{1} is synchronized at that slot, then both receivers are synchronized; otherwise, both are in error. Thus, updates from the first process implicitly convey information about the second process. With this consideration, we capture an inherent prioritization among the processes, since when X1(t)=0X_{1}(t)=0, the value of the second process is irrelevant.

Refer to caption
Figure 1: Real-time remote monitoring of a correlated information source over wireless.

At the beginning of each time slot tt, each sampler observes the state of its corresponding process and decides whether to take a sample. The sampling action of the mm-th sampler is denoted by αm(t){0,1}\alpha_{m}(t)\in\{0,1\}, where αm(t)=1\alpha_{m}(t)=1 indicates that a sample is taken and αm(t)=0\alpha_{m}(t)=0 otherwise. If a sample is taken at time slot tt, the resulting update packet is transmitted immediately within the same time slot over wireless channels that share a common frequency band. As a result, when both samplers are active simultaneously, the packets transmitted to Rx1\text{Rx}_{1} and Rx2\text{Rx}_{2} interfere with each other in addition to being affected by channel noise. In this system, each receiver is responsible for tracking one of the attribute processes according to its monitoring objective. Specifically, Rx1\text{Rx}_{1} and Rx2\text{Rx}_{2} monitor the processes sampled by Sampler1\text{Sampler}_{1} and Sampler2\text{Sampler}_{2}, respectively. At the end of time slot tt, the mm-th receiver constructs an estimate of the state of its corresponding process, denoted by X^m(t)𝒳m\hat{X}_{m}(t)\in\mathcal{X}_{m}, based on the most recently received successfully decoded update from its associated sampler. The reconstructed state X^m(t)\hat{X}_{m}(t) is assumed to be decoded successfully with probability psm/mp_{s_{m/m}} when only the mm-th transmitter is active, and with probability psm/nmp_{s_{m/nm}} when both transmitters are simultaneously active, where nm{1,2}n\neq m\in\{1,2\}. We assume that at time slot tt, if the mm-th process is not sampled or if the mm-th Rx fails to decode the transmitted update, the reconstructed state remains unchanged, i.e., X^m(t)=X^m(t1)\hat{X}_{m}(t)=\hat{X}_{m}(t-1). The mm-th receiver is said to be synchronized (sync) at time slot tt if Xm(t)=X^m(t)X_{m}(t)=\hat{X}_{m}(t), and in an erroneous state if Xm(t)X^m(t)X_{m}(t)\neq\hat{X}_{m}(t). Acknowledgment (ACK) and negative acknowledgment (NACK) packets are used to notify the transmitters of the success or failure of each transmission, and these feedback messages are assumed to be delivered instantaneously and without errors111An ACK/NACK feedback channel is required to implement the error-aware and semantics-aware policies.. Therefore, at each time slot tt, the transmitters have perfect knowledge of the reconstructed source states, i.e., X^m(t),m{1,2}\hat{X}_{m}(t),\forall m\in\{1,2\}. In addition, we assume that any sample corresponding to an unsuccessful transmission is discarded (i.e., the system operates over a packet-drop channel).

We next propose a joint sampling and transmission strategy, referred to as the error-aware policy, in which each sampler triggers sampling probabilistically. Under this policy, the mm-th sampler remains idle if the current state of its process matches the reconstructed state from the previous time slot; otherwise, it samples the process with probability qαmq_{\alpha_{m}}.

For comparison, we also consider three existing sampling policies, namely the randomized stationary, change-aware, and semantics-aware policies, introduced in [15] and [34]. A brief description of each policy is provided below.

  1. 1.

    Randomized Stationary (RS): At each time slot, a new sample is generated probabilistically, independent of the receiver’s synchronization state. Specifically, the mm-th sampler takes a sample with probability pαm=[αm(t)=1]p_{\alpha_{m}}=\mathbb{P}[\alpha_{m}(t)=1] and remains idle with probability 1pαm1-p_{\alpha_{m}}.

  2. 2.

    Change-aware (CA): The mm-th sampler takes a new sample at time slot tt if and only if the state of its process differs from its state in the previous slot, i.e., if Xm(t)Xm(t1)X_{m}(t)\neq X_{m}(t-1), regardless of whether the mm-th receiver is synchronized.

  3. 3.

    Error-aware (EA): At time slot tt, if the mm-th receiver is in sync, the mm-th sampler remains idle. Otherwise, it generates a new sample with probability qαm=[αm(t)=1Xm(t)X^m(t1)]q_{\alpha_{m}}=\mathbb{P}[\alpha_{m}(t)=1\mid X_{m}(t)\neq\hat{X}_{m}(t-1)] and stays idle with probability 1qαm1-q_{\alpha_{m}}.

  4. 4.

    Semantics-aware (SA): The mm-th sampler generates a sample at time slot tt whenever the state of its process differs from the reconstructed state at the previous time slot, i.e., when Xm(t)X^m(t1)X_{m}(t)\neq\hat{X}_{m}(t-1).222The semantics-aware policy is a special case of the error-aware policy with qαm=1,m{1,2}q_{\alpha_{m}}=1,\forall m\in\{1,2\}.

III Performance Metric and Analysis

In this section, we analyze the impact of information semantics at the receivers. To this end, we evaluate the system performance using a key metric, namely the time-averaged reconstruction error. This metric quantifies the discrepancy between the source’s original state and its reconstructed state over time, thus capturing the effectiveness of the semantics-aware transmission strategy.

III-A Time-averaged Reconstruction Error

The performance of a real-time tracking system is determined by the actions or effects produced by the endpoint over a period of time. Since these actions rely on the accurate reconstruction of source attribute at both receivers, we introduce the time-averaged reconstruction error as a key performance metric. This error is modeled as a composite function ff that captures the discrepancy errors occurring at the receivers over time. Accordingly, the time-averaged reconstruction error PEP_{E} over the observation interval [1,T][1,T], where TT is a large positive integer, is defined as follows:

PE=limT1Tt=1Tf(E1(t),E2(t)),\displaystyle P_{E}=\underset{T\rightarrow\infty}{\lim}\frac{1}{T}\sum_{t=1}^{T}f\big(E_{1}(t),E_{2}(t)\big), (1)

where Em(t)E_{m}(t) denotes the discrepancy error at the mm-th receiver, for m{1,2}m\in\{1,2\}, at time slot tt, is defined as:

Em(t)=|Xm(t)X^m(t)|.\displaystyle E_{m}(t)=\big|X_{m}(t)-\hat{X}_{m}(t)\big|. (2)

We now assume that the system is in an erroneous state whenever the sum of the discrepancy errors is nonzero. Accordingly, the function f(,)f(\cdot,\cdot) in (1) is defined as follows:

f(E1(t),E2(t))=𝟙(E1(t)+E2(t)0),\displaystyle f\big(E_{1}(t),E_{2}(t)\big)=\mathbbm{1}\big(E_{1}(t)+E_{2}(t)\neq 0\big), (3)

where 𝟙()\mathbbm{1}(\cdot) denotes the indicator function. Substituting (3) in (1), the time-averaged reconstruction error becomes:

PE=limT1Tt=1T𝟙(E1(t)+E2(t)0).\displaystyle P_{E}=\underset{T\rightarrow\infty}{\lim}\frac{1}{T}\sum_{t=1}^{T}\mathbbm{1}\big(E_{1}(t)+E_{2}(t)\neq 0\big). (4)
Lemma 1.

The time-averaged reconstruction error under the RS policy is given by:

PERS\!\!P^{\text{RS}}_{E}

=1pα1ps1/1(F+2pG+pα1ps1/1)(p+2q)[(2pGG+1)pα1ps1/1+2q(pGG+1)(1pα1ps1/1)]\displaystyle\!\!=\!\scalebox{1.0}{$1\!\!-\!\frac{p_{\alpha_{1}}p_{s_{1/1}}\big(F+2pG+p_{\alpha_{1}}p_{s_{1/1}}\big)}{(p+2q)\!\big[\!\big(2pG-G+1\big)p_{\alpha_{1}}p_{s_{1/1}}\!\!+2q\big(pG-G+1\big)\!\big(1-p_{\alpha_{1}}p_{s_{1/1}}\big)\!\big]}$}
2q[p+(1p)pα1pα2ps2/12+(1p)(1pα1)pα2ps2/2](p+2q)[3p+(13p)pα1pα2ps2/12+(13p)(1pα1)pα2ps2/2],\displaystyle\!-\!\scalebox{1.0}{$\frac{2q\big[p+(1-p)p_{\alpha_{1}}p_{\alpha_{2}}p_{s_{2/12}}+(1-p)(1-p_{\alpha_{1}})p_{\alpha_{2}}p_{s_{2/2}}\big]}{(p+2q)\big[3p+(1-3p)p_{\alpha_{1}}p_{\alpha_{2}}p_{s_{2/12}}+(1-3p)(1-p_{\alpha_{1}})p_{\alpha_{2}}p_{s_{2/2}}\big]},$} (5)

where FF and GG in (1) are given by:

F\displaystyle F =pα2ps2/2pα1pα2[ps1/1ps1/12(1ps2/2)ps2/12+ps2/2],\displaystyle\!=\!p_{\alpha_{2}}p_{s_{2/2}}\!\!-\!p_{\alpha_{1}}p_{\alpha_{2}}\!\big[p_{s_{1/1}}\!\!\!-\!p_{s_{1/12}}(1\!\!-\!\!p_{s_{2/2}})\!-\!p_{s_{2/12}}\!\!\!+\!p_{s_{2/2}}\big],
G\displaystyle G =1pα1pα2[p1/12(1ps2/12)+ps2/12ps2/2]\displaystyle\!=\!1-p_{\alpha_{1}}p_{\alpha_{2}}\big[p_{1/12}(1-p_{s_{2/12}})+p_{s_{2/12}}-p_{s_{2/2}}\big]
pα1(1pα2)p1/1pα2ps2/2.\displaystyle-p_{\alpha_{1}}(1-p_{\alpha_{2}})p_{1/1}-p_{\alpha_{2}}p_{s_{2/2}}. (6)

Moreover, the time-averaged reconstruction error for the error-aware and semantics-aware policies is given by (7)–(1) and (1)–(1), respectively. Furthermore, the time-averaged reconstruction error for the change-aware policy can be calculated as:

PEEA\displaystyle\!\!\!\!P^{\text{EA}}_{E} =11Z1[qα1ps1/1(F+2pG+qα1ps1/1)]2pqMqα1ps1/1Z22Z2[qN+qqα1ps2/2(1G)(2q+(12q)qα1ps1/1)],\displaystyle=1\!-\!\frac{1}{Z_{1}}\Big[q_{\alpha_{1}}p_{s_{1/1}}\big(F^{\prime}\!\!+\!2pG^{\prime}\!\!+\!q_{\alpha_{1}}p_{s_{1/1}}\big)\Big]\!\!-\!\!\frac{2pqMq_{\alpha_{1}}p_{s_{1/1}}}{Z_{2}}\!-\!\frac{2}{Z_{2}}\Big[qN\!+\!qq_{\alpha_{1}}p_{s_{2/2}}(1\!-\!G^{\prime})\big(2q\!+\!(1-2q)q_{\alpha_{1}}p_{s_{1/1}}\big)\Big], (7)
F\displaystyle F^{\prime} =qα2ps2/2qα1qα2[ps1/1ps1/12(1ps2/2)ps2/12+ps2/2],\displaystyle=q_{\alpha_{2}}p_{s_{2/2}}-q_{\alpha_{1}}q_{\alpha_{2}}\big[p_{s_{1/1}}-p_{s_{1/12}}(1-p_{s_{2/2}})-p_{s_{2/12}}+p_{s_{2/2}}\big], (8)
G\displaystyle G^{\prime} =1qα1qα2[p1/12(1ps2/12)+ps2/12ps2/2]qα1(1qα2)p1/1qα2ps2/2,\displaystyle=1-q_{\alpha_{1}}q_{\alpha_{2}}\big[p_{1/12}(1-p_{s_{2/12}})+p_{s_{2/12}}-p_{s_{2/2}}\big]-q_{\alpha_{1}}(1-q_{\alpha_{2}})p_{1/1}-q_{\alpha_{2}}p_{s_{2/2}}, (9)
Z1\displaystyle Z_{1} =(p+2q)[(2pGG+1)qα1ps1/1+2q(pGG+1)(1qα1ps1/1)],\displaystyle=(p+2q)\Big[\big(2pG^{\prime}-G^{\prime}+1\big)q_{\alpha_{1}}p_{s_{1/1}}+2q\big(pG^{\prime}-G^{\prime}+1\big)(1-q_{\alpha_{1}}p_{s_{1/1}})\Big], (10)
Z2\displaystyle Z_{2} =(p+2q)[(2pGG+1)qα1ps1/1+2q(pGG+1)(1qα1ps1/1)](3p+(13p)qα2ps2/2),\displaystyle=(p+2q)\Big[\big(2pG^{\prime}-G^{\prime}+1\big)q_{\alpha_{1}}p_{s_{1/1}}+2q\big(pG^{\prime}-G^{\prime}+1\big)(1-q_{\alpha_{1}}p_{s_{1/1}})\Big]\big(3p+(1-3p)q_{\alpha_{2}}p_{s_{2/2}}\big), (11)
M\displaystyle M =3qα2ps2/2(1qα2ps2/2)+qα1qα2ps1/12(1ps2/12)(13qα2ps2/2)+qα1ps1/1(1qα2)(13qα2ps2/2)\displaystyle=3q_{\alpha_{2}}p_{s_{2/2}}(1-q_{\alpha_{2}}p_{s_{2/2}})+q_{\alpha_{1}}q_{\alpha_{2}}p_{s_{1/12}}(1-p_{s_{2/12}})(1-3q_{\alpha_{2}}p_{s_{2/2}})+q_{\alpha_{1}}p_{s_{1/1}}(1-q_{\alpha_{2}})(1-3q_{\alpha_{2}}p_{s_{2/2}})
+qα1qα2(ps2/2ps2/12)(2+3qα2ps2/2),\displaystyle+q_{\alpha_{1}}q_{\alpha_{2}}(p_{s_{2/2}}-p_{s_{2/12}})(-2+3q_{\alpha_{2}}p_{s_{2/2}}), (12)
N\displaystyle N =4pqqα2ps2/2(1qα1ps1/1)(1qα2ps2/2)+2p2G(1qα2ps2/2)(q+(1q)qα1ps1/1)\displaystyle=4pqq_{\alpha_{2}}p_{s_{2/2}}(1-q_{\alpha_{1}}p_{s_{1/1}})(1-q_{\alpha_{2}}p_{s_{2/2}})+2p^{2}G^{\prime}(1-q_{\alpha_{2}}p_{s_{2/2}})\big(q+(1-q)q_{\alpha_{1}}p_{s_{1/1}}\big)
+2pqqα1(1qα1ps1/1)(12qα2ps2/2)[(1qα2)ps1/1qα2(ps1/12(1ps2/12)+ps2/12ps2/2)].\displaystyle+2pqq_{\alpha_{1}}(1-q_{\alpha_{1}}p_{s_{1/1}})(1-2q_{\alpha_{2}}p_{s_{2/2}})\big[(1-q_{\alpha_{2}})p_{s_{1/1}}-q_{\alpha_{2}}\big(p_{s_{1/12}}(1-p_{s_{2/12}})+p_{s_{2/12}}-p_{s_{2/2}}\big)\big]. (13)

 
PESA\displaystyle P^{\text{SA}}_{E} =1L2[6qp3(1ps1/1)(1ps1/12)(1ps2/12)(1ps2/2)+2pqps2/12+2pqps1/12(1ps2/12)(4q+(14q)ps2/2)\displaystyle=\frac{1}{L_{2}}\Big[6qp^{3}(1-p_{s_{1/1}})(1-p_{s_{1/12}})(1-p_{s_{2/12}})(1-p_{s_{2/2}})+2pqp_{s_{2/12}}+2pqp_{s_{1/12}}(1-p_{s_{2/12}})\big(4q+(1-4q)p_{s_{2/2}}\big)
8pqps1/1ps2/2+2pqps1/1ps2/12(13ps2/24q+4qps2/2)+2pqps1/1ps1/12(1ps2/12)(24q(34q)ps2/2)\displaystyle-8pqp_{s_{1/1}}p_{s_{2/2}}+2pqp_{s_{1/1}}p_{s_{2/12}}(1-3p_{s_{2/2}}\!-\!4q\!+\!4qp_{s_{2/2}})\!+\!2pqp_{s_{1/1}}p_{s_{1/12}}(1-p_{s_{2/12}})\big(2-4q-(3-4q)p_{s_{2/2}}\big)
+8pqps1/1+6pqps1/1214pqps1/1ps2/126pqps1/12ps2/12+14pqps1/1ps1/12ps2/12+2pqps2/28pqps1/12ps2/2\displaystyle+8pqp_{s_{1/1}}\!+\!6pqp_{s_{1/12}}\!-14pqp_{s_{1/1}}p_{s_{2/12}}-6pqp_{s_{1/12}}p_{s_{2/12}}+14pqp_{s_{1/1}}p_{s_{1/12}}p_{s_{2/12}}+2pqp_{s_{2/2}}-8pqp_{s_{1/12}}p_{s_{2/2}}
8pqps2/12ps2/2+16pqps1/1ps2/12ps2/2+8pqps1/12ps2/12ps2/2+8pq2(1ps1/1)(1ps1/12)(1ps2/12)(1ps2/2)\displaystyle-8pqp_{s_{2/12}}p_{s_{2/2}}+16pqp_{s_{1/1}}p_{s_{2/12}}p_{s_{2/2}}+8pqp_{s_{1/12}}p_{s_{2/12}}p_{s_{2/2}}+8pq^{2}(1-p_{s_{1/1}})(1-p_{s_{1/12}})(1-p_{s_{2/12}})(1-p_{s_{2/2}})
+6pqps2/1214pqps1/1ps1/12+16pqps1/1ps1/12ps2/2(1ps2/12)],\displaystyle+6pqp_{s_{2/12}}-14pqp_{s_{1/1}}p_{s_{1/12}}+16pqp_{s_{1/1}}p_{s_{1/12}}p_{s_{2/2}}(1-p_{s_{2/12}})\Big], (14)
L2\displaystyle L_{2} =[2p(1ps1/12)(1ps2/12)(q+(1q)ps1/1)+(ps1/12(1ps2/12)+ps2/12)(2q+(12q)ps1/1)]\displaystyle=\Big[2p(1-p_{s_{1/12}})(1-p_{s_{2/12}})\big(q+(1-q)p_{s_{1/1}}\big)\!+\!\big(p_{s_{1/12}}(1-p_{s_{2/12}})\!+\!p_{s_{2/12}}\big)\big(2q+(1-2q)p_{s_{1/1}}\big)\Big]
×(p+2q)(3p3pps2/2+ps2/2).\displaystyle\times(p+2q)\big(3p-3pp_{s_{2/2}}+p_{s_{2/2}}\big). (15)

 
PECA\displaystyle P^{\text{CA}}_{E} =12pps1/1Y12q(1+ps2/12)(p+2q)(3ps2/2),\displaystyle\!\!=1-\frac{2pp_{s_{1/1}}}{Y_{1}}-\frac{2q(1+p_{s_{2/12}})}{(p+2q)(3-p_{s_{2/2}})}, (16)

where Y1Y_{1} in (16) is given by:

Y1\displaystyle Y_{1}\! =[1+ps1/12+(1ps1/12)(ps2/12+(1ps2/12)ps1/1)]\displaystyle=\!\Big[1+p_{s_{1/12}}\!+\!(1-p_{s_{1/12}})\big(p_{s_{2/12}}\!+\!(1-p_{s_{2/12}})p_{s_{1/1}}\big)\Big]
×(p+2q).\displaystyle\times(p+2q). (17)
Proof:

See Appendix -A. ∎

IV Problem Formulation

In this section, we formulate and analyze a constrained optimization problem whose objective is to determine the optimal sampling probabilities for the RS and error-aware policies. The aim is to minimize the time-averaged reconstruction error while ensuring that the time-averaged sampling cost remains below a prescribed threshold.

IV-A Minimizing the time-averaged reconstruction error

This optimization problem seeks the optimal sampling probabilities pα1p_{\alpha_{1}} and pα2p_{\alpha_{2}} for the RS policy, and qα1q_{\alpha_{1}} and qα2q_{\alpha_{2}} for the error-aware policy, which minimize the time-averaged reconstruction error. We assume that each sampling attempt incurs a cost δ\delta, and that the resulting time-averaged sampling cost must remain below a prescribed threshold δmax\delta_{\text{max}}. Focusing first on the RS sampling policy, we formulate the optimization problem as follows:

minimizepα1,pα2PERS(pα1,pα2)\displaystyle\underset{p_{\alpha_{1}},p_{\alpha_{2}}}{\text{minimize}}\hskip 2.84544ptP^{\text{RS}}_{E}\big(p_{\alpha_{1}},p_{\alpha_{2}}\big) (18a)
subject tolimT1T𝔼[t=1Tδ({α1(t)=1}+𝟙{α2(t)=1})]δmax.\displaystyle\text{subject to}\!\!\lim_{T\to\infty}\!\frac{1}{T}\mathbb{E}\!\Bigg[\!\sum_{t=1}^{T}\!\delta\!\Big(\!\!\{\alpha_{1}(t)\!=\!1\}\!+\!\mathbbm{1}\!\{\alpha_{2}(t)\!=\!1\}\!\Big)\!\Bigg]\!\!\leqslant\!\!\delta_{\text{max}}. (18b)
Lemma 2.

The time-averaged sampling cost under the RS policy is given by:

limT1T𝔼[t=1Tδ(𝟙{α1(t)=1}\displaystyle\lim_{T\to\infty}\frac{1}{T}\mathbb{E}\Bigg[\sum_{t=1}^{T}\delta\Big(\mathbbm{1}\{\alpha_{1}(t)=1\} +𝟙{α2(t)=1})]\displaystyle\!+\!\mathbbm{1}\{\alpha_{2}(t)=1\}\Big)\Bigg]
=δ((p+2q)pα1+2qpα2)p+2q.\displaystyle\!=\!\frac{\delta\big((p+2q)p_{\alpha_{1}}\!+\!2qp_{\alpha_{2}}\big)}{p+2q}. (19)
Proof:

See Appendix -B. ∎

Using Lemma 2, the optimization problem can be simplified as:

minimizepα1,pα2PERS(pα1,pα2)\displaystyle\underset{p_{\alpha_{1}},p_{\alpha_{2}}}{\text{minimize}}\hskip 8.5359ptP^{\text{RS}}_{E}\big(p_{\alpha_{1}},p_{\alpha_{2}}\big) (20a)
subject to(p+2q)pα1+2qpα2p+2qη,\displaystyle\text{subject to}\hskip 5.69046pt\frac{(p+2q)p_{\alpha_{1}}+2qp_{\alpha_{2}}}{p+2q}\leqslant\eta, (20b)

where η=δmax/δ1\eta=\delta_{\text{max}}/\delta\leqslant 1. Since ps1/1>ps1/12p_{s_{1/1}}>p_{s_{1/12}} and ps2/2>ps2/12p_{s_{2/2}}>p_{s_{2/12}}, it follows that the objective function in (20a) is a decreasing function of pα2p_{\alpha_{2}}, when pα1p_{\alpha_{1}} is held fixed, i.e., PERSpα2<0\frac{\partial P^{\text{RS}}_{E}}{\partial p_{\alpha_{2}}}<0. In other words, for any fixed pα1p_{\alpha_{1}}, the objective function attains its minimum value when pα2p_{\alpha_{2}} is maximized. Using the constraint in (20b), the maximum feasible value of pα2p_{\alpha_{2}} is therefore:

pα2=(p+2q)(ηpα1)2q.\displaystyle p_{\alpha_{2}}=\frac{(p+2q)(\eta-p_{\alpha_{1}})}{2q}. (21)

Using (21) and the feasibility condition 0pα210\leqslant p_{\alpha_{2}}\leqslant 1, the optimization problem can be rewritten as:

minimizepα1PERS(pα1)\displaystyle\underset{p_{\alpha_{1}}}{\text{minimize}}\hskip 8.5359ptP^{\text{RS}}_{E}\big(p_{\alpha_{1}}\big) (22a)
subject tomax{0,η2qp+2q}pα1η.\displaystyle\text{subject to}\hskip 5.69046pt\max\bigg\{0,\eta-\frac{2q}{p+2q}\bigg\}\leqslant p_{\alpha_{1}}\leqslant\eta. (22b)

To determine the value of pα1p_{\alpha_{1}} that minimizes the objective function in (22a), we first compute the critical points of this function within the feasible interval [max{0,η2qp+2q},η]\left[\max\left\{0,\eta-\frac{2q}{p+2q}\right\},\eta\right]. The optimal sampling probability pα1p^{*}_{\alpha_{1}} is given by the critical point at which the objective function attains its minimum over this interval. Once pα1p_{\alpha_{1}}^{*} is obtained, the corresponding optimal sampling probability pα2p_{\alpha_{2}}^{*} is computed as:

pα2=min{1,(p+2q)(ηpα1)2q}.\displaystyle p^{*}_{\alpha_{2}}=\min\bigg\{1,\frac{(p+2q)(\eta-p^{*}_{\alpha_{1}})}{2q}\bigg\}. (23)
Remark 1.

When pα1=pα2=pαp_{\alpha_{1}}=p_{\alpha_{2}}=p_{\alpha}, the optimization problem in (20) reduces to the following single-variable formulation:

minimizepαPERS(pα)\displaystyle\underset{p_{\alpha}}{\text{minimize}}\hskip 8.5359ptP^{\text{RS}}_{E}\big(p_{\alpha}\big) (24a)
subject topα(p+2q)ηp+4q.\displaystyle\text{subject to}\hskip 5.69046ptp_{\alpha}\leqslant\frac{(p+2q)\eta}{p+4q}. (24b)

Since the objective function in (24a) is strictly decreasing in pαp_{\alpha}, its minimum is achieved by choosing the largest feasible sampling probability. From the constraint in (24b), the maximum allowable value of pαp_{\alpha} is (p+2q)ηp+4q\frac{(p+2q)\eta}{p+4q}. Therefore, the optimal sampling probability is pα=(p+2q)ηp+4qp^{*}_{\alpha}=\frac{(p+2q)\eta}{p+4q}.

Now, using (7), the corresponding optimization problem for the error-aware policy can be formulated as follows:

minimizeqα1,qα2PEEA(qα1,qα2)\displaystyle\underset{q_{\alpha_{1}},q_{\alpha_{2}}}{\text{minimize}}\hskip 2.84544ptP^{\text{EA}}_{E}\big(q_{\alpha_{1}},q_{\alpha_{2}}\big) (25a)
subject tolimT1T𝔼[t=1Tδ(𝟙{α1(t)=1}+𝟙{α2(t)=1})]δmax.\displaystyle\text{subject to}\!\!\lim_{T\to\infty}\!\frac{1}{T}\mathbb{E}\!\Bigg[\!\sum_{t=1}^{T}\!\delta\!\Big(\!\mathbbm{1}\!\{\alpha_{1}(t)\!=\!1\}\!+\!\mathbbm{1}\!\{\alpha_{2}(t)\!=\!1\}\!\Big)\!\Bigg]\!\!\leqslant\!\!\delta_{\text{max}}. (25b)
Lemma 3.

The time-averaged sampling cost under the error-aware policy is given by:

limT1T𝔼[t=1Tδ(𝟙{α1(t)=1}+𝟙{α2(t)=1})]\displaystyle{\lim_{T\to\infty}\frac{1}{T}}\mathbb{E}\Bigg[\displaystyle{\sum_{t=1}^{T}}\delta\Big(\mathbbm{1}\{\alpha_{1}(t)=1\}+\mathbbm{1}\{\alpha_{2}(t)=1\}\Big)\Bigg]

=2pqδZ2[3Gp2qα1(1qα2ps2/2)+qα1qα22ps2/2(2ps1/1+ps2/2)\displaystyle\!\!=\scalebox{0.9}{$\displaystyle{\frac{2pq\delta}{Z_{2}}}\Big[3G^{\prime}p^{2}q_{\alpha_{1}}(1-q_{\alpha_{2}}p_{s_{2/2}})+q_{\alpha_{1}}q^{2}_{\alpha_{2}}p_{s_{2/2}}(2p_{s_{1/1}}+p_{s_{2/2}})$}
+2qα12qα2(1qα2)ps1/12+(qα1qα2)2ps1/1(2ps1/12(1ps2/12)+ps2/12)\displaystyle\!\!+\!\scalebox{0.9}{$2q^{2}_{\alpha_{1}}q_{\alpha_{2}}(1\!\!-\!\!q_{\alpha_{2}})p_{s_{1/1}}^{2}\!\!\!+\!\!(q_{\alpha_{1}}q_{\alpha_{2}})^{2}p_{s_{1/1}}\!\big(2p_{s_{1/12}}(1\!-\!p_{s_{2/12}})\!+\!p_{s_{2/12}}\big)$}
+(qα1qα2)2ps2/2(ps1/12(1ps2/12)+ps2/12ps2/2)\displaystyle\!\!+\scalebox{0.9}{$(q_{\alpha_{1}}q_{\alpha_{2}})^{2}p_{s_{2/2}}\big(p_{s_{1/12}}(1-p_{s_{2/12}})+p_{s_{2/12}}-p_{s_{2/2}}\big)$}
+2qα12qα2(1qα2)ps1/1ps2/2+4qqα2(1G)(1qα1ps1/1)\displaystyle\!\!+\scalebox{0.9}{$2q^{2}_{\alpha_{1}}q_{\alpha_{2}}(1-q_{\alpha_{2}})p_{s_{1/1}}p_{s_{2/2}}+4qq_{\alpha_{2}}(1-G^{\prime})(1-q_{\alpha_{1}}p_{s_{1/1}})$}
+4pqqα2(1qα2ps2/2)+4pqα1qα2(ps1/1+ps2/2)(1qα2ps2/2)\displaystyle\!\!+\scalebox{0.9}{$4pqq_{\alpha_{2}}(1-q_{\alpha_{2}}p_{s_{2/2}})+4pq_{\alpha_{1}}q_{\alpha_{2}}(p_{s_{1/1}}+p_{s_{2/2}})(1-q_{\alpha_{2}}p_{s_{2/2}})$}
4pqα1qα22(ps1/12(1ps2/12)+ps2/12ps2/2)8pqqα1qα2ps1/1\displaystyle\!\!-\scalebox{0.9}{$4pq_{\alpha_{1}}q^{2}_{\alpha_{2}}\big(p_{s_{1/12}}(1-p_{s_{2/12}})+p_{s_{2/12}}-p_{s_{2/2}}\big)-8pqq_{\alpha_{1}}q_{\alpha_{2}}p_{s_{1/1}}$}
pqα12qα2(ps1/12(1ps2/12)+ps2/12ps2/2)(3+4qα2ps2/2)\displaystyle\!\!-\scalebox{0.9}{$pq_{\alpha_{1}}^{2}q_{\alpha_{2}}(p_{s_{1/12}}(1-p_{s_{2/12}})+p_{s_{2/12}}-p_{s_{2/2}})(-3+4q_{\alpha_{2}}p_{s_{2/2}})$}
+4pqqα1qα22ps1/1(1+ps2/2)4p(1q)qα12qα2(1qα2)ps1/12\displaystyle\!\!+\scalebox{0.9}{$4pqq_{\alpha_{1}}q^{2}_{\alpha_{2}}p_{s_{1/1}}(1+p_{s_{2/2}})-4p(1-q)q_{\alpha_{1}}^{2}q_{\alpha_{2}}(1-q_{\alpha_{2}})p_{s_{1/1}}^{2}$}
3pqα12qα2ps1/17pqα12qα2ps1/1ps2/2p(qα1qα2)2ps1/1ps2/12\displaystyle\!\!-\!\scalebox{0.9}{$3pq_{\alpha_{1}}^{2}q_{\alpha_{2}}p_{s_{1/1}}\!\!\!-\!\!7pq_{\alpha_{1}}^{2}q_{\alpha_{2}}p_{s_{1/1}}p_{s_{2/2}}\!\!-\!\!p(q_{\alpha_{1}}q_{\alpha_{2}})^{2}p_{s_{1/1}}p_{s_{2/12}}$}
p(qα1qα2)2ps1/1(5ps2/2+4ps1/12(1ps2/12)(1q)4qps2/12)\displaystyle\!\!-\!\scalebox{0.9}{$p(q_{\alpha_{1}}q_{\alpha_{2}})^{2}p_{s_{1/1}}\big(-5p_{s_{2/2}}\!+\!4p_{s_{1/12}}(1\!-\!p_{s_{2/12}})(1\!-\!q)\!-\!4qp_{s_{2/12}}\big)$}
+6pqα12ps1/14pq(qα1qα2)2ps1/1ps2/2],\displaystyle\!\!+\scalebox{0.9}{$6pq_{\alpha_{1}}^{2}p_{s_{1/1}}-4pq(q_{\alpha_{1}}q_{\alpha_{2}})^{2}p_{s_{1/1}}p_{s_{2/2}}\Big]$}, (26)

where GG^{\prime} and Z2Z_{2} were given in (9) and (11).

Proof:

See Appendix -B. ∎

This optimization problem is non-convex in the variables qα1q_{\alpha_{1}} and qα2q_{\alpha_{2}}, and, as indicated by (3), the optimization parameters are interdependent. Consequently, obtaining a closed-form solution is cumbersome, if not infeasible, and we therefore solve (25) numerically.

V Numerical Results

In this section, we numerically evaluate our analytical results and examine the performance of the proposed sampling policies in terms of the time-averaged reconstruction error under various system parameter settings.

Refer to caption
(a) ps1/1=0.2,ps1/12=0.1,p_{s_{1/1}}\!=\!0.2,p_{s_{1/12}}\!=\!0.1, ps2/2=0.2,ps2/12=0.1.p_{s_{2/2}}\!=\!0.2,p_{s_{2/12}}\!=\!0.1.
Refer to caption
(b) ps1/1=0.8,ps1/12=0.1,p_{s_{1/1}}\!=\!0.8,p_{s_{1/12}}\!=\!0.1, ps2/2=0.2,ps2/12=0.1.p_{s_{2/2}}\!=\!0.2,p_{s_{2/12}}\!=\!0.1.
Refer to caption
(c) ps1/1=0.2,ps1/12=0.1,p_{s_{1/1}}\!=\!0.2,p_{s_{1/12}}\!=\!0.1, ps2/2=0.8,ps2/12=0.1.p_{s_{2/2}}\!=\!0.8,p_{s_{2/12}}\!=\!0.1.
Refer to caption
(d) ps1/1=0.8,ps1/12=0.1,p_{s_{1/1}}\!=\!0.8,p_{s_{1/12}}\!=\!0.1, ps2/2=0.8,ps2/12=0.1.p_{s_{2/2}}\!=\!0.8,p_{s_{2/12}}\!=\!0.1.
Figure 2: Minimum time-averaged reconstruction error as a function of pp for η=0.8\eta=0.8, q=0.1q=0.1 and the success probabilities. For system parameters that violate the cost constraint, the change-aware and semantics-aware policies do not admit feasible solutions; therefore, these cases are excluded from the figures.
Refer to caption
(a) ps1/1=0.2,ps1/12=0.1,p_{s_{1/1}}\!=\!0.2,p_{s_{1/12}}\!=\!0.1, ps2/2=0.2,ps2/12=0.1.p_{s_{2/2}}\!=\!0.2,p_{s_{2/12}}\!=\!0.1.
Refer to caption
(b) ps1/1=0.8,ps1/12=0.1,p_{s_{1/1}}\!=\!0.8,p_{s_{1/12}}\!=\!0.1, ps2/2=0.2,ps2/12=0.1.p_{s_{2/2}}\!=\!0.2,p_{s_{2/12}}\!=\!0.1.
Refer to caption
(c) ps1/1=0.2,ps1/12=0.1,p_{s_{1/1}}\!=\!0.2,p_{s_{1/12}}\!=\!0.1, ps2/2=0.8,ps2/12=0.1.p_{s_{2/2}}\!=\!0.8,p_{s_{2/12}}\!=\!0.1.
Refer to caption
(d) ps1/1=0.8,ps1/12=0.1,p_{s_{1/1}}\!=\!0.8,p_{s_{1/12}}\!=\!0.1, ps2/2=0.8,ps2/12=0.1.p_{s_{2/2}}\!=\!0.8,p_{s_{2/12}}\!=\!0.1.
Figure 3: Minimum time-averaged reconstruction error as a function of pp for η=0.8\eta=0.8, q=0.1q=0.1 and the success probabilities. For system parameters that violate the cost constraint, the change-aware and semantics-aware policies do not admit feasible solutions; therefore, these cases are excluded from the figures.

Figs. 2 and 3 illustrate the minimum time-averaged reconstruction error under a sampling cost constraint as a function of pp, for η=0.8\eta=0.8, q=0.4q=0.4 and success probabilities. The results show that the optimal error-aware policy consistently outperforms the other policies across different levels of statistical correlation between X1X_{1} and X2X_{2}, regardless of whether the success probabilities are low or high. For each fixed value of qq, increasing pp raises the marginal probability [X1=0]\mathbb{P}[X_{1}=0] while decreasing the joint probabilities [X1=1,X2=0]\mathbb{P}[X_{1}=1,X_{2}=0] and [X1=1,X2=1]\mathbb{P}[X_{1}=1,X_{2}=1]. In this regime, X2X_{2} becomes more conditionally dependent on X1X_{1}, allowing the receiver to decode X2X_{2} more reliably using information from X1X_{1}. Consequently, the sampling probabilities pα1p_{\alpha_{1}} (for the RS policy) and qα1q_{\alpha_{1}} (for the error-aware policy) increase. Conversely, when qq rises, the joint probabilities [X1=1,X2=0]\mathbb{P}[X_{1}=1,X_{2}=0] and [X1=1,X2=1]\mathbb{P}[X_{1}=1,X_{2}=1] increase, making X1X_{1} more conditionally dependent on X2X_{2}. In this case, the sampling probabilities pα2p_{\alpha_{2}} and qα2q_{\alpha_{2}} also increase relative to scenarios with smaller qq. These results confirm that the statistical correlation between X1X_{1} and X2X_{2} directly shapes the optimal sampling decisions in both policies. The error-aware policy triggers sampling probabilistically only when at least one receiver is in an erroneous state, requiring fewer sampling actions than the change-aware and semantics-aware policies. However, the latter two may exceed the sampling cost constraint, particularly when pp and qq are high, conditions that indicate strong correlation between the two processes. In such cases, since information about each process can be inferred from the other with reduced uncertainty, achieving the minimum time-averaged reconstruction error requires more frequent sampling, which may violate the time-averaged cost budget. This property highlights the error-aware policy’s suitability for resource-constrained environments such as energy-limited wireless networks. Moreover, the optimal error-aware policy avoids unnecessary sampling and achieves a higher sampling probability than the optimal RS policy, while maintaining a similar or lower time-averaged sampling cost, as shown in Figs. 4 and 5. Additionally, for certain values of qq, pp, ps1/1p_{s_{1/1}}, ps1/12p_{s_{1/12}}, ps2/2p_{s_{2/2}}, and ps2/12p_{s_{2/12}} that violate the cost constraint, no feasible solution exists for the change-aware and semantics-aware policies, and these cases are therefore excluded from Figs.  2 and 3. In contrast, the RS and error-aware policies are capable of adjusting the sampling probabilities to satisfy the constraint and minimize the time-averaged reconstruction error.

Figs. 4 and 5 show the time-averaged sampling cost as a function of pp, for η=0.8\eta=0.8, and selected values of qq and the success probabilities. In these figures, the time-averaged sampling costs for the error-aware and RS policies are computed using the optimal values of pα1p_{\alpha_{1}}, pα2p_{\alpha_{2}}, qα1q_{\alpha_{1}}, and qα2q_{\alpha_{2}}, which minimize the corresponding time-averaged reconstruction error. The results show that when both pp and qq are high, indicating strong correlation between X1X_{1} and X2X_{2}, the semantics-aware and change-aware policies result in higher time-averaged sampling costs compared to the other policies. Under these conditions, the sampling cost constraint can be violated, leading to constrained optimization problems with no feasible solutions, as shown in Figs. 5(a)5(b)5(c)5(d). In contrast, under the same values of pp and qq, the optimal error-aware and RS policies adjust their sampling probabilities to ensure that the time-averaged sampling cost remains within the imposed constraint η\eta. Figs. 6 and 7 show the minimum time-averaged reconstruction error as a function of η\eta, for different levels of statistical correlation between X1X_{1} and X2X_{2} and various success probabilities. The results show that the optimal error-aware policy consistently outperforms the other policies, particularly when the time-averaged sampling cost threshold η\eta is small and the correlation between X1X_{1} and X2X_{2} is strong. Under strong correlation, the semantics-aware and change-aware policies tend to generate more samples to minimize the time-averaged reconstruction error; however, for small η\eta, this often leads to violations of the sampling cost constraint, resulting in infeasible solutions. In contrast, the optimal error-aware policy utilizes the sampling budget more efficiently by avoiding redundant samples and triggering sampling only when the system is in an erroneous state. This enables a higher effective sampling rate than the optimal RS policy without exceeding the cost constraint. As a result, the error-aware policy achieves a superior trade-off between reconstruction accuracy and resource utilization, making it particularly suitable for resource-constrained environments such as wireless or energy-limited networks.

Refer to caption
(a) ps1/1=0.2,ps1/12=0.1,p_{s_{1/1}}\!=\!0.2,p_{s_{1/12}}\!=\!0.1, ps2/2=0.2,ps2/12=0.1.p_{s_{2/2}}\!=\!0.2,p_{s_{2/12}}\!=\!0.1.
Refer to caption
(b) ps1/1=0.8,ps1/12=0.1,p_{s_{1/1}}\!=\!0.8,p_{s_{1/12}}\!=\!0.1, ps2/2=0.2,ps2/12=0.1.p_{s_{2/2}}\!=\!0.2,p_{s_{2/12}}\!=\!0.1.
Refer to caption
(c) ps1/1=0.2,ps1/12=0.1,p_{s_{1/1}}\!=\!0.2,p_{s_{1/12}}\!=\!0.1, ps2/2=0.8,ps2/12=0.1.p_{s_{2/2}}\!=\!0.8,p_{s_{2/12}}\!=\!0.1.
Refer to caption
(d) ps1/1=0.8,ps1/12=0.1,p_{s_{1/1}}\!=\!0.8,p_{s_{1/12}}\!=\!0.1, ps2/2=0.8,ps2/12=0.1.p_{s_{2/2}}\!=\!0.8,p_{s_{2/12}}\!=\!0.1.
Figure 4: Time-averaged sampling cost as a function of pp, for η=0.8\eta=0.8, q=0.1q=0.1 and the success probabilities.
Refer to caption
(a) ps1/1=0.2,ps1/12=0.1,p_{s_{1/1}}\!=\!0.2,p_{s_{1/12}}\!=\!0.1, ps2/2=0.2,ps2/12=0.1.p_{s_{2/2}}\!=\!0.2,p_{s_{2/12}}\!=\!0.1.

.Refer to caption

(b) ps1/1=0.4,ps1/12=0.1,p_{s_{1/1}}\!=\!0.4,p_{s_{1/12}}\!=\!0.1, ps2/2=0.2,ps2/12=0.1.p_{s_{2/2}}\!=\!0.2,p_{s_{2/12}}\!=\!0.1.
Refer to caption
(c) ps1/1=0.2,ps1/12=0.1,p_{s_{1/1}}\!=\!0.2,p_{s_{1/12}}\!=\!0.1, ps2/2=0.8,ps2/12=0.1.p_{s_{2/2}}\!=\!0.8,p_{s_{2/12}}\!=\!0.1.
Refer to caption
(d) ps1/1=0.8,ps1/12=0.1,p_{s_{1/1}}\!=\!0.8,p_{s_{1/12}}\!=\!0.1, ps2/2=0.8,ps2/12=0.1.p_{s_{2/2}}\!=\!0.8,p_{s_{2/12}}\!=\!0.1.
Figure 5: Time-averaged sampling cost as a function of pp, for η=0.8\eta=0.8, q=0.4q=0.4 and the success probabilities.
Refer to caption
(a) ps1/1=0.2,p_{s_{1/1}}\!=\!0.2, ps1/12=0.1,ps2/2=0.2,ps2/12=0.1.p_{s_{1/12}}\!=\!0.1,p_{s_{2/2}}\!=\!0.2,p_{s_{2/12}}\!=\!0.1.
Refer to caption
(b) ps1/1=0.8,p_{s_{1/1}}\!=\!0.8, ps1/12=0.1,ps2/2=0.2,ps2/12=0.1.p_{s_{1/12}}\!=\!0.1,p_{s_{2/2}}\!=\!0.2,p_{s_{2/12}}\!=\!0.1.
Refer to caption
(c) ps1/1=0.2,p_{s_{1/1}}\!=\!0.2, ps1/12=0.1,ps2/2=0.8,ps2/12=0.1.p_{s_{1/12}}\!=\!0.1,p_{s_{2/2}}\!=\!0.8,p_{s_{2/12}}\!=\!0.1.
Refer to caption
(d) ps1/1=0.8,p_{s_{1/1}}\!=\!0.8, ps1/12=0.1,ps2/2=0.8,ps2/12=0.1.p_{s_{1/12}}\!=\!0.1,p_{s_{2/2}}\!=\!0.8,p_{s_{2/12}}\!=\!0.1.
Figure 6: Minimum time-averaged reconstruction error as a function of η\eta for p=0.2p=0.2, q=0.1q=0.1, and success probabilities. For system parameters that violate the cost constraint, the change-aware and semantics-aware policies do not admit feasible solutions; therefore, these cases are excluded from the figures.
Refer to caption
(a) ps1/1=0.2,p_{s_{1/1}}\!=\!0.2, ps1/12=0.1,ps2/2=0.2,ps2/12=0.1.p_{s_{1/12}}\!=\!0.1,p_{s_{2/2}}\!=\!0.2,p_{s_{2/12}}\!=\!0.1.
Refer to caption
(b) ps1/1=0.8,p_{s_{1/1}}\!=\!0.8, ps1/12=0.1,ps2/2=0.2,ps2/12=0.1.p_{s_{1/12}}\!=\!0.1,p_{s_{2/2}}\!=\!0.2,p_{s_{2/12}}\!=\!0.1.
Refer to caption
(c) ps1/1=0.2,p_{s_{1/1}}\!=\!0.2, ps1/12=0.1,ps2/2=0.8,ps2/12=0.1.p_{s_{1/12}}\!=\!0.1,p_{s_{2/2}}\!=\!0.8,p_{s_{2/12}}\!=\!0.1.
Refer to caption
(d) ps1/1=0.8,p_{s_{1/1}}\!=\!0.8, ps1/12=0.1,ps2/2=0.8,ps2/12=0.1.p_{s_{1/12}}\!=\!0.1,p_{s_{2/2}}\!=\!0.8,p_{s_{2/12}}\!=\!0.1.
Figure 7: Minimum time-averaged reconstruction error as a function of η\eta for selected values of p=q=0.4p=q=0.4, and success probabilities. For system parameters that violate the cost constraint, the change-aware and semantics-aware policies do not admit feasible solutions; therefore, these cases are excluded from the figures.

VI Conclusion

We studied the time-averaged reconstruction error in a time-slotted communication system in which two samplers independently observe two correlated processes generated by a common information source and transmit updates over a shared channel. For a broad class of joint sampling and transmission policies, including randomized stationary, error-aware, change-aware, and semantics-aware schemes, we derived closed-form expressions for the stationary distribution and the time-average of the real-time reconstruction error. Building on these analytical characterizations, we formulated and solved a cost-constrained optimization problem to identify the sampling probabilities that minimize the time-averaged reconstruction error for the randomized stationary and error-aware policies. The resulting analysis and numerical evaluations demonstrate that the optimized error-aware policy consistently achieves the lowest reconstruction error while efficiently utilizing the available sampling budget. The performance gains are particularly significant in regimes characterized by strong inter-process correlation and stringent tracking requirements, where accurate real-time monitoring necessitates frequent sampling by both samplers.

-A Proof of Lemma 1

To obtain πi,j,m,n\pi_{i,j,m,n}, we consider a four-dimensional DTMC that describes the joint state of X1(t)X_{1}(t) and X2(t)X_{2}(t) along with their corresponding error states E1(t)E_{1}(t) and E2(t)E_{2}(t). In other words, the system state at time tt is represented as (X1(t),X2(t),E1(t),E2(t))\big(X_{1}(t),X_{2}(t),E_{1}(t),E_{2}(t)\big). The one-step transition probabilities Pi,j,m,n/i,j,m,n=[X1(t+1)=i,X2(t+1)=j,E1(t+1)=m,E2(t+1)=n|X1(t)=i,X2(t)=j,E1(t)=m,E2(t)=n]P_{i,j,m,n/i^{\prime},j^{\prime},m^{\prime},n^{\prime}}=\mathbb{P}\big[X_{1}(t+1)=i^{\prime},X_{2}(t+1)=j^{\prime},E_{1}(t+1)=m^{\prime},E_{2}(t+1)=n^{\prime}\big|X_{1}(t)=i,X_{2}(t)=j,E_{1}(t)=m,E_{2}(t)=n\big] when X1(t)=0X_{1}(t)=0, E1(t)=0E_{1}(t)=0, and E2(t)=0E_{2}(t)=0 under the RS policy are given by:

P0,0,0/0,0,0{P}_{0,0,0/0,0,0}

=12q,P0,0,0/0,1,1=0,\displaystyle\!=\!\scalebox{0.93}{$1-2q,{P}_{0,0,0/0,1,1}=0$},

P0,0,0/1,0,0,0{P}_{0,0,0/1,0,0,0}

=q(1pα1)pα2ps2/2+qpα1pα2ps2/12,\displaystyle\!=\!\scalebox{0.93}{$q(1-p_{\alpha_{1}})p_{\alpha_{2}}p_{s_{2/2}}+qp_{\alpha_{1}}p_{\alpha_{2}}p_{s_{2/12}}$},

P0,0,0/1,0,0,1P_{0,0,0/1,0,0,1}

=qpα1(1pα2)ps1/1+qpα1pα2ps1/12(1ps2/12),\displaystyle\!=\!\scalebox{0.93}{$qp_{\alpha_{1}}(1\!-\!p_{\alpha_{2}})p_{s_{1/1}}\!+\!qp_{\alpha_{1}}p_{\alpha_{2}}p_{s_{1/12}}(1\!-\!p_{s_{2/12}})$},

P0,0,0/1,0,1,1P_{0,0,0/1,0,1,1}

=q(1pα1)(1pα2ps2/2)+qpα1(1pα2)(1ps1/1)\displaystyle\!=\!\scalebox{0.93}{$q(1\!-\!p_{\alpha_{1}})(1\!-\!p_{\alpha_{2}}p_{s_{2/2}})\!+\!qp_{\alpha_{1}}(1\!-\!p_{\alpha_{2}})(1\!-\!p_{s_{1/1}})$}
+qpα1pα2(1ps1/12)(1ps2/12),\displaystyle\!+\!\scalebox{0.93}{$qp_{\alpha_{1}}p_{\alpha_{2}}(1-p_{s_{1/12}})(1-p_{s_{2/12}})$},

P0,0,0/1,1,0,0P_{0,0,0/1,1,0,0}

=P0,0,0/1,0,0,0,P0,0,0/1,1,0,1=P0,0,0/1,0,0,1,\displaystyle\!=\!\scalebox{0.93}{$P_{0,0,0/1,0,0,0}$},\scalebox{0.93}{$P_{0,0,0/1,1,0,1}=P_{0,0,0/1,0,0,1}$},

P0,0,0/1,1,1,1P_{0,0,0/1,1,1,1}

=P0,0,0/1,0,1,1.\displaystyle\!=\!\scalebox{0.93}{$P_{0,0,0/1,0,1,1}$}. (27)

Similarly, the remaining transition probabilities can be obtained for all possible combinations of X1(t)X_{1}(t), X2(t)X_{2}(t), E1(t)E_{1}(t), and E2(t)E_{2}(t). Using these transition probabilities, we can then derive the steady-state probabilities πi,j,m,nRS\pi^{\text{RS}}_{i,j,m,n} for all i,j,m,n{0,1}i,j,m,n\in\{0,1\} as follows:

π0,0,0RS\pi^{\text{RS}}_{0,0,0}

=pα1ps1/1(F+2pG+pα1ps1/1)(p+2q)[(2pGG+1)pα1ps1/1+2q(pGG+1)(1pα1ps1/1)],\displaystyle\!\!=\!\!\scalebox{1.0}{$\frac{p_{\alpha_{1}}p_{s_{1/1}}\big(F+2pG+p_{\alpha_{1}}p_{s_{1/1}}\big)}{(p+2q)\big[\big(2pG\!-\!G\!+\!1\big)p_{\alpha_{1}}p_{s_{1/1}}\!+\!2q\big(pG\!-\!G\!+\!1\big)\big(1\!-\!p_{\alpha_{1}}p_{s_{1/1}}\big)\!\big]}$},

π0,1,1RS\pi^{\text{RS}}_{0,1,1}

=2pq(1pα1ps1/1)(F+pG+pα1ps1/1)(p+2q)[(2pGG+1)pα1ps1/1+2q(pGG+1)(1pα1ps1/1)],\displaystyle\!\!=\!\!\scalebox{1.0}{$\frac{2pq\big(1-p_{\alpha_{1}}p_{s_{1/1}}\big)\big(F+pG+p_{\alpha_{1}}p_{s_{1/1}}\big)}{(p+2q)\big[\!\big(2pG\!-\!G\!+\!1\big)p_{\alpha_{1}}p_{s_{1/1}}\!+\!2q\big(pG\!-\!G\!+\!1\big)\big(1\!-\!p_{\alpha_{1}}p_{s_{1/1}}\big)\!\big]}$},

π1,0,0,0RS\pi^{\text{RS}}_{1,0,0,0}

=q[p+(1p)pα1pα2ps2/12+(1p)(1pα1)pα2ps2/2](p+2q)[3p+(13p)pα1pα2ps2/12+(13p)(1pα1)pα2ps2/2],\displaystyle\!\!=\!\!\scalebox{1.0}{$\frac{q\big[p+(1-p)p_{\alpha_{1}}p_{\alpha_{2}}p_{s_{2/12}}+(1-p)(1-p_{\alpha_{1}})p_{\alpha_{2}}p_{s_{2/2}}\big]}{(p+2q)\big[3p\!+\!(1\!-\!3p)p_{\alpha_{1}}p_{\alpha_{2}}p_{s_{2/12}}\!+\!(1-3p)(1\!-\!p_{\alpha_{1}})p_{\alpha_{2}}p_{s_{2/2}}\big]}$},

π1,0,0,1RS\pi^{\text{RS}}_{1,0,0,1}

=pq(Kpα13+Ipα12+Dpα1+A)B(p+2q)[(2pGG+1)pα1ps1/1+2q(pGG+1)(1pα1ps1/1)],\displaystyle\!\!=\!\!\scalebox{1.0}{$\frac{pq\big(-Kp^{3}_{\alpha_{1}}+Ip^{2}_{\alpha_{1}}+Dp_{\alpha_{1}}+A\big)}{B(p+2q)\big[\!\big(2pG\!-\!G\!+\!1\big)p_{\alpha_{1}}p_{s_{1/1}}\!\!+\!2q\big(pG\!-\!G\!+\!1\big)\big(1\!-\!p_{\alpha_{1}}p_{s_{1/1}}\big)\!\big]}$},

π1,0,1,1RS\pi^{\text{RS}}_{1,0,1,1}

=pqGpα1ps1/1(p+2q)[(2pGG+1)pα1ps1/1+2q(pGG+1)(1pα1ps1/1)],\displaystyle\!\!=\!\!\scalebox{1.0}{$\frac{pqGp_{\alpha_{1}}p_{s_{1/1}}}{(p+2q)\big[\!\big(2pG\!-\!G\!+\!1\big)p_{\alpha_{1}}p_{s_{1/1}}\!+\!2q\big(pG\!-\!G\!+\!1\big)\big(1-p_{\alpha_{1}}p_{s_{1/1}}\big)\big]}$},
π1,1,0,0RS\displaystyle\pi^{\text{RS}}_{1,1,0,0} =π1,0,0,0RS,π1,1,0,1RS=π1,0,0,1RS,π1,1,1,1RS=π1,0,1,1RS,\displaystyle\!=\!\pi^{\text{RS}}_{1,0,0,0},\pi^{\text{RS}}_{1,1,0,1}=\pi^{\text{RS}}_{1,0,0,1},\pi^{\text{RS}}_{1,1,1,1}=\pi^{\text{RS}}_{1,0,1,1}, (28)

where AA, BB, DD, II, FF, GG, HH, KK, MM, and NN are given by:

AA

=4pqGH+4qpα2ps2/2(1pα2ps2/2),\displaystyle\!\!=\scalebox{0.95}{$4pqGH+4qp_{\alpha_{2}}p_{s_{2/2}}(1-p_{\alpha_{2}}p_{s_{2/2}})$}, (29)

BB

=3p+(13p)pα1pα2ps2/12+(13p)(1pα1)pα2ps2/2,\displaystyle\!\!=\!\scalebox{0.95}{$3p\!+\!(1\!-\!3p)p_{\alpha_{1}}p_{\alpha_{2}}p_{s_{2/12}}\!\!+\!\!(1\!-\!3p)(1\!-\!p_{\alpha_{1}})p_{\alpha_{2}}p_{s_{2/2}}$}, (30)

DD

=pα2p.s1/1ps2/2+4qps1/14qpα2ps1/12(1ps2/12)\displaystyle\!\!=\!\scalebox{0.95}{$p_{\alpha_{2}}p_{.s_{1/1}}p_{s_{2/2}}\!\!+\!4qp_{s_{1/1}}\!\!-\!4qp_{\alpha_{2}}p_{s_{1/12}}(1\!-\!p_{s_{2/12}})$}
4qpα2ps2/12+8qpα2ps1/1ps2/2+p(14q)ps1/1GH\displaystyle\!\!\!-\!\scalebox{0.95}{$4qp_{\alpha_{2}}p_{s_{2/12}}\!\!\!+\!8qp_{\alpha_{2}}p_{s_{1/1}}p_{s_{2/2}}\!\!\!+\!p(1\!-\!4q)p_{s_{1/1}}\!GH$}
pα22ps2/2(ps1/1ps2/24qps1/1+4qps1/124qps1/12ps2/12\displaystyle\!\!\!-\scalebox{0.95}{$p_{\alpha_{2}}^{2}p_{s_{2/2}}\big(p_{s_{1/1}}p_{s_{2/2}}\!-\!4qp_{s_{1/1}}\!+\!4qp_{s_{1/12}}\!-\!4qp_{s_{1/12}}p_{s_{2/12}}$}
+8qps2/124q(2+ps1/1)ps2/2+4qpα2(ps2/2ps1/1)),\displaystyle\!\!\!+\scalebox{0.95}{$8qp_{s_{2/12}}-4q(2+p_{s_{1/1}})p_{s_{2/2}}+4qp_{\alpha_{2}}(p_{s_{2/2}}-p_{s_{1/1}})\big)$}, (31)

II

=4qpα22(ps2/2ps2/12)(ps1/12(1ps2/12)+ps2/12ps2/2)\displaystyle\!\!=\scalebox{0.95}{$4qp_{\alpha_{2}}^{2}(p_{s_{2/2}}\!-\!p_{s_{2/12}})\big(p_{s_{1/12}}(1\!-\!p_{s_{2/12}})\!+\!p_{s_{2/12}}\!-\!p_{s_{2/2}}\big)$}
+(1pα2)ps1/12(24qpα2ps2/2(14q))\displaystyle\!\!+\scalebox{0.95}{$(1-p_{\alpha_{2}})p_{s_{1/1}}^{2}\big(2-4q-p_{\alpha_{2}}p_{s_{2/2}}(1-4q)\big)$}
pα2ps1/1(ps2/2ps2/12)(12pα2ps2/24q(2pα22pα2ps2/2))\displaystyle\!\!\!-\scalebox{0.95}{$p_{\alpha_{2}}p_{s_{1/1}}\!(p_{s_{2/2}}\!\!\!-\!p_{s_{2/12}})\big(1\!\!-\!2p_{\alpha_{2}}p_{s_{2/2}}\!\!-\!\!4q(2\!\!-\!\!p_{\alpha_{2}}\!\!-\!\!2p_{\alpha_{2}}p_{s_{2/2}})\big)$}
pα2ps1/1ps1/12(1ps2/12)(24qpα2ps2/2(14q)),\displaystyle\!\!\!-\scalebox{0.95}{$p_{\alpha_{2}}p_{s_{1/1}}p_{s_{1/12}}(1-p_{s_{2/12}})\big(2-4q-p_{\alpha_{2}}p_{s_{2/2}}(1-4q)\big)$}, (32)

FF

=pα2ps2/2pα1pα2[ps1/1ps1/12(1ps2/2)ps2/12+ps2/2],\displaystyle\!\!=\scalebox{0.95}{$p_{\alpha_{2}}p_{s_{2/2}}\!\!-\!p_{\alpha_{1}}p_{\alpha_{2}}\!\big[p_{s_{1/1}}\!\!\!-\!p_{s_{1/12}}(1\!\!-\!\!p_{s_{2/2}})\!-\!p_{s_{2/12}}\!\!+\!p_{s_{2/2}}\big]$}, (33)

GG

=1pα1pα2[p1/12(1ps2/12)+ps2/12ps2/2]pα2ps2/2\displaystyle\!\!=\scalebox{0.95}{$1-p_{\alpha_{1}}p_{\alpha_{2}}\big[p_{1/12}(1-p_{s_{2/12}})+p_{s_{2/12}}-p_{s_{2/2}}\big]-p_{\alpha_{2}}p_{s_{2/2}}$}
pα1(1pα2)p1/1,\displaystyle\!\!-\scalebox{0.95}{$p_{\alpha_{1}}(1-p_{\alpha_{2}})p_{1/1}$}, (34)

HH

=1+pα1pα2(ps2/2ps2/12)pα2ps2/2,\displaystyle\!\!=\!\!\scalebox{0.95}{$1+p_{\alpha_{1}}p_{\alpha_{2}}(p_{s_{2/2}}-p_{s_{2/12}})-p_{\alpha_{2}}p_{s_{2/2}}$}, (35)

KK

=pα2ps1/1(ps2/2ps2/12)[(1pα2)ps1/1+pα2ps1/12(1ps2/12)\displaystyle\!\!=\!\!\scalebox{0.95}{$-p_{\alpha_{2}}p_{s_{1/1}}\!(p_{s_{2/2}}\!\!-\!\!p_{s_{2/12}})\big[(1\!-\!p_{\alpha_{2}})p_{s_{1/1}}\!\!\!+\!p_{\alpha_{2}}p_{s_{1/12}}(1\!\!-\!\!p_{s_{2/12}})$}
+pα2ps2/12pα2ps2/2](14q).\displaystyle+\scalebox{0.95}{$p_{\alpha_{2}}p_{s_{2/12}}-p_{\alpha_{2}}p_{s_{2/2}}\big](1-4q)$}. (36)

Now, the time-averaged reconstruction error for the RS policy is given by:

PERS=π0,1,1RS+π1,0,0,1RS+π1,0,1,1RS+π1,1,0,1RS+π1,1,1,1RS.\displaystyle\scalebox{0.98}{$P^{\text{RS}}_{E}$}=\scalebox{0.98}{$\pi^{\text{RS}}_{0,1,1}+\pi^{\text{RS}}_{1,0,0,1}+\pi^{\text{RS}}_{1,0,1,1}+\pi^{\text{RS}}_{1,1,0,1}+\pi^{\text{RS}}_{1,1,1,1}$}. (37)

Using (-A), (37) can be calculated as follows:

PERSP^{\text{RS}}_{E}

=1pα1ps1/1(F+2pG+pα1ps1/1)(p+2q)[(2pGG+1)pα1ps1/1+2q(pGG+1)(1pα1ps1/1)]\displaystyle\!=\!\scalebox{1.0}{$1\!-\!\frac{p_{\alpha_{1}}p_{s_{1/1}}\big(F+2pG+p_{\alpha_{1}}p_{s_{1/1}}\big)}{(p+2q)\big[\big(2pG-G+1\big)p_{\alpha_{1}}p_{s_{1/1}}+2q\big(pG-G+1\big)\big(1-p_{\alpha_{1}}p_{s_{1/1}}\!\big)\!\big]}$}
2q[p+(1p)pα1pα2ps2/12+(1p)(1pα1)pα2ps2/2](p+2q)[3p+(13p)pα1pα2ps2/12+(13p)(1pα1)pα2ps2/2],\displaystyle-\scalebox{1.0}{$\frac{2q\big[p+(1-p)p_{\alpha_{1}}p_{\alpha_{2}}p_{s_{2/12}}+(1-p)(1-p_{\alpha_{1}})p_{\alpha_{2}}p_{s_{2/2}}\big]}{(p+2q)\big[3p+(1-3p)p_{\alpha_{1}}p_{\alpha_{2}}p_{s_{2/12}}+(1-3p)(1-p_{\alpha_{1}})p_{\alpha_{2}}p_{s_{2/2}}\big]}$}, (38)

where FF and GG are as defined in (33) and (34). Similarly, under the error-aware policy, the steady-state probabilities πi,j,m,nEA\pi^{\text{EA}}_{i,j,m,n} for all i,j,m,n{0,1}i,j,m,n\in\{0,1\} are given by (-A) and (-A). Using (-A), the time-averaged reconstruction error under the error-aware policy is given by:

π0,0,0EA\displaystyle\pi^{\text{EA}}_{0,0,0} =1Z1[qα1ps1/1(F+2pG+qα1ps1/1)],π0,1,1EA=1Z1[2pq(1qα1ps1/1)(F+pG+qα1ps1/1)],\displaystyle=\frac{1}{Z_{1}}\Big[q_{\alpha_{1}}p_{s_{1/1}}\big(F^{\prime}+2pG^{\prime}+q_{\alpha_{1}}p_{s_{1/1}}\big)\Big],\pi^{\text{EA}}_{0,1,1}=\frac{1}{Z_{1}}\Big[2pq\big(1-q_{\alpha_{1}}p_{s_{1/1}}\big)\big(F^{\prime}+pG^{\prime}+q_{\alpha_{1}}p_{s_{1/1}}\big)\Big],
π1,0,0,0EA\displaystyle\pi^{\text{EA}}_{1,0,0,0} =1Z2[qN+qqα1ps2/2(1G)(2q+(12q)qα1ps1/1)+pqMqα1ps1/1],\displaystyle=\frac{1}{Z_{2}}\Big[qN+qq_{\alpha_{1}}p_{s_{2/2}}(1-G^{\prime})\big(2q+(1-2q)q_{\alpha_{1}}p_{s_{1/1}}\big)+pqMq_{\alpha_{1}}p_{s_{1/1}}\Big],
π1,0,0,1EA\displaystyle\pi^{\text{EA}}_{1,0,0,1} =pqZ2[(pG+J)qα1ps1/1+4qW(1(1p)G)],π1,0,1,1EA=pqGqα1ps1/1Z1,\displaystyle=\frac{pq}{Z_{2}}\Big[(pG^{\prime}+J)q_{\alpha_{1}}p_{s_{1/1}}+4qW(1-(1-p)G^{\prime})\Big],\pi^{\text{EA}}_{1,0,1,1}=\frac{pqG^{\prime}q_{\alpha_{1}}p_{s_{1/1}}}{Z_{1}},
π1,1,0,0EA\displaystyle\pi^{\text{EA}}_{1,1,0,0} =π1,0,0,0EA,π1,1,0,1EA=π1,0,0,1EA,π1,1,1,1EA=π1,0,1,1EA,\displaystyle=\pi^{\text{EA}}_{1,0,0,0},\quad\pi^{\text{EA}}_{1,1,0,1}=\pi^{\text{EA}}_{1,0,0,1},\quad\pi^{\text{EA}}_{1,1,1,1}=\pi^{\text{EA}}_{1,0,1,1}, (39)
F\displaystyle F^{\prime} =qα2ps2/2qα1qα2[ps1/1ps1/12(1ps2/2)ps2/12+ps2/2],\displaystyle=q_{\alpha_{2}}p_{s_{2/2}}-q_{\alpha_{1}}q_{\alpha_{2}}\big[p_{s_{1/1}}-p_{s_{1/12}}(1-p_{s_{2/2}})-p_{s_{2/12}}+p_{s_{2/2}}\big],
G\displaystyle G^{\prime} =1qα1qα2[p1/12(1ps2/12)+ps2/12ps2/2]qα1(1qα2)p1/1qα2ps2/2,\displaystyle=1-q_{\alpha_{1}}q_{\alpha_{2}}\big[p_{1/12}(1-p_{s_{2/12}})+p_{s_{2/12}}-p_{s_{2/2}}\big]-q_{\alpha_{1}}(1-q_{\alpha_{2}})p_{1/1}-q_{\alpha_{2}}p_{s_{2/2}},
Z1\displaystyle Z_{1} =(p+2q)[(2pGG+1)qα1ps1/1+2q(pGG+1)(1qα1ps1/1)],\displaystyle=(p+2q)\Big[(2pG^{\prime}-G^{\prime}+1)q_{\alpha_{1}}p_{s_{1/1}}+2q(pG^{\prime}-G^{\prime}+1)(1-q_{\alpha_{1}}p_{s_{1/1}})\Big],
Z2\displaystyle Z_{2} =(p+2q)[(2pGG+1)qα1ps1/1+2q(pGG+1)(1qα1ps1/1)](3p+(13p)qα2ps2/2),\displaystyle=(p+2q)\Big[(2pG^{\prime}-G^{\prime}+1)q_{\alpha_{1}}p_{s_{1/1}}+2q(pG^{\prime}-G^{\prime}+1)(1-q_{\alpha_{1}}p_{s_{1/1}})\Big]\big(3p+(1-3p)q_{\alpha_{2}}p_{s_{2/2}}\big),
M\displaystyle M =3qα2ps2/2(1qα2ps2/2)+qα1qα2ps1/12(1ps2/12)(13qα2ps2/2)+qα1ps1/1(1qα2)(13qα2ps2/2)\displaystyle=3q_{\alpha_{2}}p_{s_{2/2}}(1-q_{\alpha_{2}}p_{s_{2/2}})+q_{\alpha_{1}}q_{\alpha_{2}}p_{s_{1/12}}(1-p_{s_{2/12}})(1-3q_{\alpha_{2}}p_{s_{2/2}})+q_{\alpha_{1}}p_{s_{1/1}}(1-q_{\alpha_{2}})(1-3q_{\alpha_{2}}p_{s_{2/2}})
+qα1qα2(ps2/2ps2/12)(2+3qα2ps2/2),\displaystyle+q_{\alpha_{1}}q_{\alpha_{2}}(p_{s_{2/2}}-p_{s_{2/12}})(-2+3q_{\alpha_{2}}p_{s_{2/2}}),
N\displaystyle N =4pqqα2ps2/2(1qα1ps1/1)(1qα2ps2/2)+2p2G(1qα2ps2/2)(q+(1q)qα1ps1/1)\displaystyle=4pqq_{\alpha_{2}}p_{s_{2/2}}(1-q_{\alpha_{1}}p_{s_{1/1}})(1-q_{\alpha_{2}}p_{s_{2/2}})+2p^{2}G^{\prime}(1-q_{\alpha_{2}}p_{s_{2/2}})(q+(1-q)q_{\alpha_{1}}p_{s_{1/1}})
+2pqqα1(1qα1ps1/1)(12qα2ps2/2)[(1qα2)ps1/1qα2(ps1/12(1ps2/12)+ps2/12ps2/2)],\displaystyle+2pqq_{\alpha_{1}}(1-q_{\alpha_{1}}p_{s_{1/1}})(1-2q_{\alpha_{2}}p_{s_{2/2}})\big[(1-q_{\alpha_{2}})p_{s_{1/1}}-q_{\alpha_{2}}(p_{s_{1/12}}(1-p_{s_{2/12}})+p_{s_{2/12}}-p_{s_{2/2}})\big],
J\displaystyle J =2qα1(1qα2)ps1/1+qα1qα2(2ps1/12(1ps2/12)+ps2/12)+qα2ps2/2(1pG)qα1qα2ps2/2(1+ps1/1qα2ps1/1)\displaystyle=2q_{\alpha_{1}}(1\!-\!q_{\alpha_{2}})p_{s_{1/1}}\!+\!q_{\alpha_{1}}q_{\alpha_{2}}(2p_{s_{1/12}}(1\!-\!p_{s_{2/12}})\!+\!p_{s_{2/12}})\!+\!q_{\alpha_{2}}p_{s_{2/2}}(1\!-\!pG^{\prime})\!-\!q_{\alpha_{1}}q_{\alpha_{2}}p_{s_{2/2}}(1\!+\!p_{s_{1/1}}\!-\!q_{\alpha_{2}}p_{s_{1/1}})
qα1qα22ps2/2(ps1/12+ps2/12ps1/12ps2/12)qα22ps2/22(1qα1),\displaystyle-q_{\alpha_{1}}q_{\alpha_{2}}^{2}p_{s_{2/2}}(p_{s_{1/12}}+p_{s_{2/12}}-p_{s_{1/12}}p_{s_{2/12}})-q_{\alpha_{2}}^{2}p^{2}_{s_{2/2}}(1-q_{\alpha_{1}}),
W\displaystyle W =(1qα1ps1/1)(1qα2ps2/2).\displaystyle=(1-q_{\alpha_{1}}p_{s_{1/1}})(1-q_{\alpha_{2}}p_{s_{2/2}}). (40)

 

PEEAP^{\text{EA}}_{E}

=π0,1,1EA+π1,0,0,1EA+π1,0,1,1EA+π1,1,0,1EA+π1,1,1,1EA\displaystyle\!=\scalebox{0.98}{$\pi^{\text{EA}}_{0,1,1}+\pi^{\text{EA}}_{1,0,0,1}+\pi^{\text{EA}}_{1,0,1,1}+\pi^{\text{EA}}_{1,1,0,1}+\pi^{\text{EA}}_{1,1,1,1}$}
=11Z1[qα1ps1/1(F+2pG+qα1ps1/1)]2pqMqα1ps1/1Z2\displaystyle=\scalebox{0.98}{$1\!-\!\frac{1}{Z_{1}}\big[q_{\alpha_{1}}p_{s_{1/1}}\big(F^{\prime}\!\!+\!\!2pG^{\prime}\!\!+\!\!q_{\alpha_{1}}p_{s_{1/1}}\big)\big]\!\!-\!\!\frac{2pqMq_{\alpha_{1}}p_{s_{1/1}}}{Z_{2}}$}
2Z2[qN+qqα1ps2/2(1G)(2q+(12q)qα1ps1/1)].\displaystyle\!\!-\!\!\scalebox{0.98}{$\frac{2}{Z_{2}}\big[qN+qq_{\alpha_{1}}p_{s_{2/2}}(1-G^{\prime})\big(2q+(1-\!2q)q_{\alpha_{1}}p_{s_{1/1}}\big)\big]$}. (41)

Furthermore, under the semantics-aware policy, the steady-state probabilities πi,j,m,nSA\pi^{\text{SA}}_{i,j,m,n} for all i,j,m,n{0,1}i,j,m,n\in\{0,1\} can be written as follows:

π0,0,0SA\pi^{\text{SA}}_{0,0,0}

=pps1/1L1[ps2/12+(1ps2/12)(2p+(12p)ps1/12)],\displaystyle\!\!=\!\!\scalebox{0.88}{$\frac{pp_{s_{1/1}}}{L_{1}}\!\Big[p_{s_{2/12}}+(1-p_{s_{2/12}})\big(2p+(1-2p)p_{s_{1/12}}\big)\!\Big]$}, (42)

π0,1,1SA\pi^{\text{SA}}_{0,1,1}

=2pqL1(1ps1/1)[ps2/12+(1ps2/12)(2p+(12p)ps1/12)],\displaystyle\!\!=\!\scalebox{0.88}{$\frac{2pq}{L_{1}}\big(1\!-\!p_{s_{1/1}}\big)\Big[p_{s_{2/12}}\!+\!(1\!-\!p_{s_{2/12}})\big(2p\!+\!(1\!-\!2p)p_{s_{1/12}}\big)\!\Big]$}, (43)

π1,0,0,0SA\pi^{\text{SA}}_{1,0,0,0}

=1L2[2qp2(1ps1/12)(1ps2/12)(1ps2/2)(q+(1q)ps1/1)\displaystyle\!\!=\!\scalebox{0.88}{$\frac{1}{L_{2}}\!\Big[2qp^{2}(1\!-\!p_{s_{1/12}})(1\!-\!p_{s_{2/12}})(1\!-\!p_{s_{2/2}})\big(q\!+\!(1\!-\!q)p_{s_{1/1}}\big)$}
+q(ps1/12(1ps2/12)+ps2/12)(2q+(12q)ps1/1)ps2/2\displaystyle\!\!+\scalebox{0.88}{$q\big(p_{s_{1/12}}(1-p_{s_{2/12}})+p_{s_{2/12}}\big)\big(2q+(1-2q)p_{s_{1/1}}\big)p_{s_{2/2}}$}
+2pq2ps2/2+2pq2(12ps2/2)(ps2/12+ps1/12(1ps2/12))\displaystyle\!\!+\scalebox{0.88}{$2pq^{2}p_{s_{2/2}}\!+\!2pq^{2}(1-2p_{s_{2/2}})\big(p_{s_{2/12}}\!+\!p_{s_{1/12}}(1-p_{s_{2/12}})\big)$}
+pqps1/1(ps2/22qps2/2+(23ps2/22q+4qps2/2)ps2/12)\displaystyle\!\!+\scalebox{0.88}{$pqp_{s_{1/1}}\!\big(p_{s_{2/2}}\!-\!2qp_{s_{2/2}}\!+\!(2\!-\!3p_{s_{2/2}}\!-\!2q\!+\!4qp_{s_{2/2}})p_{s_{2/12}}\big)$}
+pqps1/1ps1/12(1ps2/12)(12q(34q)ps2/2)],\displaystyle\!\!+\scalebox{0.88}{$pqp_{s_{1/1}}p_{s_{1/12}}(1-p_{s_{2/12}})\big(1-2q-(3-4q)p_{s_{2/2}}\big)\Big]$}, (44)

π1,0,0,1SA\pi^{\text{SA}}_{1,0,0,1}

=1L2[4pq2(ps2/12+(1ps2/12)ps1/12)(1ps2/2)\displaystyle\!\!=\!\scalebox{0.88}{$\frac{1}{L_{2}}\Big[4pq^{2}\big(p_{s_{2/12}}+(1-p_{s_{2/12}})p_{s_{1/12}}\big)(1-p_{s_{2/2}})$}
+qp2(1ps1/12)(1ps2/12)(1ps2/2)(4q+(14q)ps1/1)\displaystyle\!\!+\scalebox{0.88}{$qp^{2}(1\!-\!p_{s_{1/12}})(1\!-\!p_{s_{2/12}})(1\!-\!p_{s_{2/2}})\big(4q\!+\!(1\!-\!4q)p_{s_{1/1}}\big)$}
+pqps1/1ps1/12(1ps2/12)(24q(14q)ps2/2)\displaystyle\!\!+\scalebox{0.88}{$pqp_{s_{1/1}}p_{s_{1/12}}(1-p_{s_{2/12}})\big(2-4q-(1-4q)p_{s_{2/2}}\big)$}
+pqps1/1ps2/12(1ps2/2)(14q)],\displaystyle\!\!+\scalebox{0.88}{$pqp_{s_{1/1}}p_{s_{2/12}}(1-p_{s_{2/2}})(1-4q)\Big]$}, (45)

π1,0,1,1SA\pi^{\text{SA}}_{1,0,1,1}

=1L1[pqps1/1(1ps1/12)(1ps2/12)],\displaystyle\!\!=\!\scalebox{0.88}{$\frac{1}{L_{1}}\Big[pqp_{s_{1/1}}(1-p_{s_{1/12}})(1-p_{s_{2/12}})\Big]$}, (46)
π1,1,0,0SA\displaystyle\pi^{\text{SA}}_{1,1,0,0} =π1,0,0,0SA,π1,1,0,1SA=π1,0,0,1SA,π1,1,1,1SA=π1,0,1,1SA,\displaystyle\!\!=\!\pi^{\text{SA}}_{1,0,0,0},\pi^{\text{SA}}_{1,1,0,1}=\pi^{\text{SA}}_{1,0,0,1},\pi^{\text{SA}}_{1,1,1,1}=\pi^{\text{SA}}_{1,0,1,1}, (47)

where L1L_{1} and L2L_{2} in (42)–(47) are given by:

L1L_{1}

=(p+2q)[2p(1ps1/12)(1ps2/12)(q+(1q)ps1/1)\displaystyle=\scalebox{0.9}{$(p+2q)\Big[2p(1-p_{s_{1/12}})(1-p_{s_{2/12}})\big(q+(1-q)p_{s_{1/1}}\big)$}
+(ps1/12(1ps2/12)+ps2/12)(2q+(12q)ps1/1)],\displaystyle+\scalebox{0.9}{$\big(p_{s_{1/12}}(1-p_{s_{2/12}})+p_{s_{2/12}}\big)\big(2q+(1-2q)p_{s_{1/1}}\big)\Big]$},

L2L_{2}

=(3p3pps2/2+ps2/2)L1.\displaystyle=\scalebox{0.9}{$\big(3p-3pp_{s_{2/2}}+p_{s_{2/2}}\big)L_{1}$}. (48)

Using (42)–(47), the time-averaged reconstruction error for the semantics-aware policy is given by (-A).

PESA\displaystyle P^{\text{SA}}_{E} =1L2[6qp3(1ps1/1)(1ps1/12)(1ps2/12)(1ps2/2)+2pqps2/12+2pqps1/12(1ps2/12)(4q+(14q)ps2/2)\displaystyle=\frac{1}{L_{2}}\Big[6qp^{3}(1-p_{s_{1/1}})(1-p_{s_{1/12}})(1-p_{s_{2/12}})(1-p_{s_{2/2}})+2pqp_{s_{2/12}}+2pqp_{s_{1/12}}(1-p_{s_{2/12}})\big(4q+(1-4q)p_{s_{2/2}}\big)
8pqps1/1ps2/2+2pqps1/1ps2/12(13ps2/24q+4qps2/2)+2pqps1/1ps1/12(1ps2/12)(24q(34q)ps2/2)\displaystyle-8pqp_{s_{1/1}}p_{s_{2/2}}+2pqp_{s_{1/1}}p_{s_{2/12}}(1-3p_{s_{2/2}}\!-\!4q\!+\!4qp_{s_{2/2}})\!+\!2pqp_{s_{1/1}}p_{s_{1/12}}(1-p_{s_{2/12}})\big(2-4q-(3-4q)p_{s_{2/2}}\big)
+8pqps1/1+6pqps1/1214pqps1/1ps2/126pqps1/12ps2/12+14pqps1/1ps1/12ps2/12+2pqps2/28pqps1/12ps2/2\displaystyle+8pqp_{s_{1/1}}\!+\!6pqp_{s_{1/12}}\!-14pqp_{s_{1/1}}p_{s_{2/12}}-6pqp_{s_{1/12}}p_{s_{2/12}}+14pqp_{s_{1/1}}p_{s_{1/12}}p_{s_{2/12}}+2pqp_{s_{2/2}}-8pqp_{s_{1/12}}p_{s_{2/2}}
8pqps2/12ps2/2+16pqps1/1ps2/12ps2/2+8pqps1/12ps2/12ps2/2+8pq2(1ps1/1)(1ps1/12)(1ps2/12)(1ps2/2)\displaystyle-8pqp_{s_{2/12}}p_{s_{2/2}}+16pqp_{s_{1/1}}p_{s_{2/12}}p_{s_{2/2}}+8pqp_{s_{1/12}}p_{s_{2/12}}p_{s_{2/2}}+8pq^{2}(1-p_{s_{1/1}})(1-p_{s_{1/12}})(1-p_{s_{2/12}})(1-p_{s_{2/2}})
+6pqps2/1214pqps1/1ps1/12+16pqps1/1ps1/12ps2/2(1ps2/12)],\displaystyle+6pqp_{s_{2/12}}-14pqp_{s_{1/1}}p_{s_{1/12}}+16pqp_{s_{1/1}}p_{s_{1/12}}p_{s_{2/2}}(1-p_{s_{2/12}})\Big], (49)
L2\displaystyle L_{2} =[2p(1ps1/12)(1ps2/12)(q+(1q)ps1/1)+(ps1/12(1ps2/12)+ps2/12)(2q+(12q)ps1/1)]\displaystyle=\Big[2p(1-p_{s_{1/12}})(1-p_{s_{2/12}})\big(q+(1-q)p_{s_{1/1}}\big)\!+\!\big(p_{s_{1/12}}(1-p_{s_{2/12}})\!+\!p_{s_{2/12}}\big)\big(2q+(1-2q)p_{s_{1/1}}\big)\Big]
×(p+2q)(3p3pps2/2+ps2/2).\displaystyle\times(p+2q)\big(3p-3pp_{s_{2/2}}+p_{s_{2/2}}\big). (50)

 

Similarly, for the change-aware policy, πi,j,m,nCA\pi^{\text{CA}}_{i,j,m,n} for all i,j,m,n{0,1}i,j,m,n\in\{0,1\} can be calculated as:

π0,0,0CA\pi^{\text{CA}}_{0,0,0}

=2pps1/1Y1,π0,1,1CA=p(1ps1/1)(1+ps1/12(1ps2/12)+ps2/12)Y1,\displaystyle\!=\!\scalebox{0.95}{$\frac{2pp_{s_{1/1}}}{Y_{1}},\pi^{\text{CA}}_{0,1,1}\!=\!\frac{p(1-p_{s_{1/1}})\big(1+p_{s_{1/12}}(1-p_{s_{2/12}})+p_{s_{2/12}}\big)}{Y_{1}}$}, (51)

π1,0,0,0CA\pi^{\text{CA}}_{1,0,0,0}

=q(1+ps2/12)(p+2q)(3ps2/2),π1,0,1,1CA=qps1/1(1ps1/12)(1ps2/12)Y1,\displaystyle=\scalebox{0.95}{$\frac{q(1+p_{s_{2/12}})}{(p+2q)(3-p_{s_{2/2}})},\pi^{\text{CA}}_{1,0,1,1}=\frac{qp_{s_{1/1}}(1-p_{s_{1/12}})(1-p_{s_{2/12}})}{Y_{1}}$}, (52)

π1,0,0,1CA\pi^{\text{CA}}_{1,0,0,1}

=qY2[(1+ps1/12(1ps2/12)+ps2/12)(2ps2/2ps2/12)\displaystyle\!=\!\scalebox{0.95}{$\frac{q}{Y_{2}}\Big[\big(1\!+\!p_{s_{1/12}}(1\!-\!p_{s_{2/12}})\!+\!p_{s_{2/12}}\big)(2\!-\!p_{s_{2/2}}\!-\!p_{s_{2/12}})$}
ps1/1(1ps1/12)(1ps2/122)],\displaystyle\!-\scalebox{0.95}{$p_{s_{1/1}}(1-p_{s_{1/12}})(1-p^{2}_{s_{2/12}})\Big]$}, (53)
π1,1,0,0CA\displaystyle\pi^{\text{CA}}_{1,1,0,0} =π1,0,0,0CA,π1,1,0,1CA=π1,0,0,1CA,π1,1,1,1CA=π1,0,1,1CA,\displaystyle=\pi^{\text{CA}}_{1,0,0,0},\pi^{\text{CA}}_{1,1,0,1}=\pi^{\text{CA}}_{1,0,0,1},\pi^{\text{CA}}_{1,1,1,1}=\pi^{\text{CA}}_{1,0,1,1}, (54)

where Y1Y_{1} and Y2Y_{2} in (51)–(54) are given by:

Y1Y_{1}

=(p+2q)[1+ps1/12+(1ps1/12)(ps2/12+(1ps2/12)ps1/1)],\displaystyle\!=\!\scalebox{0.93}{$(p+2q)\Big[1\!+\!p_{s_{1/12}}\!+\!(1\!-\!p_{s_{1/12}})\big(p_{s_{2/12}}\!+\!(1\!-\!p_{s_{2/12}})p_{s_{1/1}}\big)\Big]$},

Y2Y_{2}

=(3ps2/2)Y1.\displaystyle\!=\!\scalebox{0.93}{$(3-p_{s_{2/2}})Y_{1}$}. (55)

Using (51)–(54), the time-averaged reconstruction error for the change-aware policy can be written as follows:

PECA\displaystyle P^{\text{CA}}_{E} =π0,1,1CA+π1,0,0,1CA+π1,0,1,1CA+π1,1,0,1CA+π1,1,1,1CA\displaystyle\!=\!\pi^{\text{CA}}_{0,1,1}+\pi^{\text{CA}}_{1,0,0,1}+\pi^{\text{CA}}_{1,0,1,1}+\pi^{\text{CA}}_{1,1,0,1}+\pi^{\text{CA}}_{1,1,1,1}
=12pps1/1Y12q(1+ps2/12)(p+2q)(3ps2/2),\displaystyle\!=\!1-\frac{2pp_{s_{1/1}}}{Y_{1}}-\frac{2q(1+p_{s_{2/12}})}{(p+2q)(3-p_{s_{2/2}})}, (56)

where Y1Y_{1} in (-A) is derived in (-A).

-B Proof of Lemmas 2, and 3

The time-averaged sampling cost in (18b) for the RS policy is given by:

limT1T𝔼[t=1Tδ(𝟙{α1(t)=1}+𝟙{α2(t)=1})]\displaystyle{\lim_{T\to\infty}\frac{1}{T}}\mathbb{E}\Bigg[\displaystyle{\sum_{t=1}^{T}}\delta\Big(\mathbbm{1}\{\alpha_{1}(t)=1\}+\mathbbm{1}\{\alpha_{2}(t)=1\}\Big)\Bigg]

=δ[α1(t)=1,X1(t)=0]\displaystyle=\!\scalebox{0.9}{$\delta\mathbb{P}\Big[\alpha_{1}(t)\!=\!1,X_{1}(t)=0\Big]$}
+δ[α1(t)=1,α2(t)=0,X1(t)=1,X2(t)=0]\displaystyle+\scalebox{0.9}{$\delta\mathbb{P}\Big[\alpha_{1}(t)\!=\!1,\alpha_{2}(t)\!=\!0,X_{1}(t)=1,X_{2}(t)=0\Big]$}
+δ[α1(t)=0,α2(t)=1,X1(t)=1,X2(t)=0]\displaystyle+\scalebox{0.9}{$\delta\mathbb{P}\Big[\alpha_{1}(t)\!=\!0,\alpha_{2}(t)\!=\!1,X_{1}(t)=1,X_{2}(t)=0\Big]$}
+2δ[α1(t)=1,α2(t)=1,X1(t)=1,X2(t)=0]\displaystyle+\scalebox{0.9}{$2\delta\mathbb{P}\Big[\alpha_{1}(t)\!=\!1,\alpha_{2}(t)\!=\!1,X_{1}(t)=1,X_{2}(t)=0\Big]$}
+δ[α1(t)=1,α2(t)=0,X1(t)=1,X2(t)=1]\displaystyle+\scalebox{0.9}{$\delta\mathbb{P}\Big[\alpha_{1}(t)\!=\!1,\alpha_{2}(t)\!=\!0,X_{1}(t)=1,X_{2}(t)=1\Big]$}
+δ[α1(t)=0,α2(t)=1,X1(t)=1,X2(t)=1]\displaystyle+\scalebox{0.9}{$\delta\mathbb{P}\Big[\alpha_{1}(t)\!=\!0,\alpha_{2}(t)\!=\!1,X_{1}(t)=1,X_{2}(t)=1\Big]$}
+2δ[α1(t)=1,α2(t)=1,X1(t)=1,X2(t)=1],\displaystyle+\scalebox{0.9}{$2\delta\mathbb{P}\Big[\alpha_{1}(t)\!=\!1,\alpha_{2}(t)\!=\!1,X_{1}(t)=1,X_{2}(t)=1\Big]$}, (57)

where using the total probability theorem, (-B) can be written as:

limT1T𝔼[t=1Tδ(𝟙{α1(t)=1}+𝟙{α2(t)=1})]\displaystyle{\lim_{T\to\infty}\frac{1}{T}}\mathbb{E}\Bigg[\displaystyle{\sum_{t=1}^{T}}\delta\Big(\mathbbm{1}\{\alpha_{1}(t)=1\}+\mathbbm{1}\{\alpha_{2}(t)=1\}\Big)\Bigg]

=δ[α1(t)=1|X1(t)=0][X1(t)=0]\displaystyle=\!\scalebox{0.85}{$\delta\mathbb{P}\Big[\alpha_{1}\!(t)\!=\!1\Big|X_{1}\!(t)\!=\!0\Big]\mathbb{P}\big[X_{1}\!(t)=0\big]$}
+δ[α1(t)=1,α2(t)=0|X1(t)=1,X2(t)=0][X1(t)=1,X2(t)=0]\displaystyle\!+\!\scalebox{0.85}{$\delta\mathbb{P}\Big[\alpha_{1}\!(t)\!=\!1,\alpha_{2}(t)\!=\!0\Big|X_{1}(t)\!=\!1,X_{2}(t)\!=\!0\Big]\mathbb{P}\big[X_{1}\!(t)\!=\!1,X_{2}(t)\!=\!0\big]$}
+δ[α1(t)=0,α2(t)=1|X1(t)=1,X2(t)=0][X1(t)=1,X2(t)=0]\displaystyle\!+\!\scalebox{0.85}{$\delta\mathbb{P}\Big[\alpha_{1}\!(t)\!=\!0,\alpha_{2}(t)\!=\!1\Big|X_{1}(t)\!=\!1,X_{2}(t)\!=\!0\Big]\mathbb{P}\big[X_{1}(t)\!=\!1,X_{2}(t)\!=\!0\big]$}
+2δ[α1(t)=1,α2(t)=1|X1(t)=1,X2(t)=0][X1(t)=1,X2(t)=0]\displaystyle\!+\!\scalebox{0.85}{$2\delta\mathbb{P}\Big[\alpha_{1}(t)\!=\!1,\alpha_{2}(t)\!=\!1\Big|X_{1}\!(t)\!=\!1,X_{2}(t)\!=\!0\Big]\mathbb{P}\big[X_{1}\!(t)\!=\!1,X_{2}(t)\!=\!0\big]$}
+δ[α1(t)=1,α2(t)=0|X1(t)=1,X2(t)=1][X1(t)=1,X2(t)=1]\displaystyle\!+\!\scalebox{0.85}{$\delta\mathbb{P}\Big[\alpha_{1}\!(t)\!=\!1,\alpha_{2}(t)\!=\!0\Big|X_{1}\!(t)\!=\!1,X_{2}(t)\!=\!1\Big]\mathbb{P}\big[X_{1}\!(t)\!=\!1,X_{2}(t)\!=\!1\big]$}
+δ[α1(t)=0,α2(t)=1|X1(t)=1,X2(t)=1][X1(t)=1,X2(t)=1]\displaystyle\!+\!\scalebox{0.85}{$\delta\mathbb{P}\Big[\alpha_{1}\!(t)\!=\!0,\alpha_{2}(t)\!=\!1\Big|X_{1}(t)\!=\!1,X_{2}(t)\!=\!1\Big]\mathbb{P}\big[X_{1}\!(t)\!=\!1,X_{2}(t)\!=\!1\big]$}
+2δ[α1(t)=1,α2(t)=1|X1(t)=1,X2(t)=1][X1(t)=1,X2(t)=1]\displaystyle\!+\!\!\scalebox{0.85}{$2\delta\mathbb{P}\Big[\alpha_{1}(t)\!=\!1,\alpha_{2}(t)\!=\!1\Big|X_{1}(t)\!=\!1,X_{2}(t)\!=\!1\Big]\mathbb{P}\big[X_{1}(t)\!=\!1,X_{2}(t)\!=\!1\big]$}
=δpα1[X1(t)=0]+δ[pα1+pα2][X1(t)=1,X2(t)=0]\displaystyle=\scalebox{0.85}{$\delta p_{\alpha_{1}}\mathbb{P}\big[X_{1}(t)\!=\!0\big]\!\!+\!\!\delta\big[p_{\alpha_{1}}\!+\!p_{\alpha_{2}}\big]\mathbb{P}\big[X_{1}(t)\!=\!1,\!X_{2}(t)\!=\!0\big]$}
+δ[pα1+pα2]Pr[X1(t)=1,X2(t)=1].\displaystyle+\scalebox{0.85}{$\delta\big[p_{\alpha_{1}}+p_{\alpha_{2}}\big]\mathrm{Pr}\big[X_{1}(t)=1,X_{2}(t)=1\big]$}. (58)

Using the correlated information source shown in Fig. 1, the probabilities [X1(t)=0]\mathbb{P}\big[X_{1}(t)=0\big], [X1(t)=1,X2(t)=0]\mathbb{P}\big[X_{1}(t)=1,X_{2}(t)=0\big], and [X1(t)=1,X2(t)=1]\mathbb{P}\big[X_{1}(t)=1,X_{2}(t)=1\big] can be expressed as:

[X1(t)=0]=pp+2q,\displaystyle\!\!\!\!\!\scalebox{0.98}{$\mathbb{P}\big[X_{1}(t)\!=\!0\big]$}\!=\scalebox{1.0}{$\frac{p}{p+2q}$},
[X1(t)=1,X2(t)=0]=[X1(t)=1,X2(t)=1]=qp+2q.\displaystyle\!\!\!\!\!\scalebox{0.98}{$\mathbb{P}\big[X_{1}(t)\!=\!1,X_{2}(t)\!=\!0\big]\!=\!\mathbb{P}\big[X_{1}(t)\!=\!1,X_{2}(t)\!=\!1\big]$}\!=\!\scalebox{1.0}{$\frac{q}{p+2q}$}. (59)

Now, using (-B), (-B) can be simplified as follows:

limT1T𝔼[t=1Tδ(𝟙{α1(t)=1}+𝟙{α2(t)=1})]\displaystyle\lim_{T\to\infty}\frac{1}{T}\mathbb{E}\Bigg[\sum_{t=1}^{T}\delta\Big(\mathbbm{1}\{\alpha_{1}(t)=1\}+\mathbbm{1}\{\alpha_{2}(t)=1\}\Big)\Bigg]
=δ((p+2q)pα1+2qpα2)p+2q.\displaystyle=\frac{\delta\big((p+2q)p_{\alpha_{1}}+2qp_{\alpha_{2}}\big)}{p+2q}. (60)

Using (-A) and (-A), for the error-aware policy, the time-averaged sampling cost in (18b) can be written as follows:

limT1T𝔼[t=1Tδ(𝟙{α1(t)=1}+𝟙{α2(t)=1})]\displaystyle{\lim_{T\to\infty}\frac{1}{T}}\mathbb{E}\Bigg[\displaystyle{\sum_{t=1}^{T}}\delta\Big(\mathbbm{1}\{\alpha_{1}(t)=1\}+\mathbbm{1}\{\alpha_{2}(t)=1\}\Big)\Bigg]

=2pqδZ2[3Gp2qα1(1qα2ps2/2)+qα1qα22ps2/2(2ps1/1+ps2/2)\displaystyle=\scalebox{0.85}{$\displaystyle{\frac{2pq\delta}{Z_{2}}}\Big[3G^{\prime}p^{2}q_{\alpha_{1}}(1-q_{\alpha_{2}}p_{s_{2/2}})+q_{\alpha_{1}}q^{2}_{\alpha_{2}}p_{s_{2/2}}(2p_{s_{1/1}}+p_{s_{2/2}})$}
+2qα12qα2(1qα2)ps1/12+(qα1qα2)2ps1/1(2ps1/12(1ps2/12)+ps2/12)\displaystyle\!\!+\!\scalebox{0.85}{$2q^{2}_{\alpha_{1}}q_{\alpha_{2}}(1\!\!-\!\!q_{\alpha_{2}})p_{s_{1/1}}^{2}\!\!\!+\!\!(q_{\alpha_{1}}q_{\alpha_{2}})^{2}p_{s_{1/1}}\!\big(2p_{s_{1/12}}(1\!-\!p_{s_{2/12}})\!+\!p_{s_{2/12}}\big)$}
+(qα1qα2)2ps2/2(ps1/12(1ps2/12)+ps2/12ps2/2)\displaystyle\!\!+\scalebox{0.85}{$(q_{\alpha_{1}}q_{\alpha_{2}})^{2}p_{s_{2/2}}\big(p_{s_{1/12}}(1-p_{s_{2/12}})+p_{s_{2/12}}-p_{s_{2/2}}\big)$}
+2qα12qα2(1qα2)ps1/1ps2/2+4qqα2(1G)(1qα1ps1/1)\displaystyle\!\!+\scalebox{0.85}{$2q^{2}_{\alpha_{1}}q_{\alpha_{2}}(1-q_{\alpha_{2}})p_{s_{1/1}}p_{s_{2/2}}+4qq_{\alpha_{2}}(1-G^{\prime})(1-q_{\alpha_{1}}p_{s_{1/1}})$}
+4pqqα2(1qα2ps2/2)+4pqα1qα2(ps1/1+ps2/2)(1qα2ps2/2)\displaystyle\!\!+\scalebox{0.85}{$4pqq_{\alpha_{2}}(1-q_{\alpha_{2}}p_{s_{2/2}})+4pq_{\alpha_{1}}q_{\alpha_{2}}(p_{s_{1/1}}+p_{s_{2/2}})(1-q_{\alpha_{2}}p_{s_{2/2}})$}
4pqα1qα22(ps1/12(1ps2/12)+ps2/12ps2/2)8pqqα1qα2ps1/1\displaystyle\!\!-\scalebox{0.85}{$4pq_{\alpha_{1}}q^{2}_{\alpha_{2}}\big(p_{s_{1/12}}(1-p_{s_{2/12}})+p_{s_{2/12}}-p_{s_{2/2}}\big)-8pqq_{\alpha_{1}}q_{\alpha_{2}}p_{s_{1/1}}$}
pqα12qα2(ps1/12(1ps2/12)+ps2/12ps2/2)(3+4qα2ps2/2)\displaystyle\!\!-\scalebox{0.85}{$pq_{\alpha_{1}}^{2}q_{\alpha_{2}}(p_{s_{1/12}}(1-p_{s_{2/12}})+p_{s_{2/12}}-p_{s_{2/2}})(-3+4q_{\alpha_{2}}p_{s_{2/2}})$}
+4pqqα1qα22ps1/1(1+ps2/2)4p(1q)qα12qα2(1qα2)ps1/12\displaystyle\!\!+\scalebox{0.85}{$4pqq_{\alpha_{1}}q^{2}_{\alpha_{2}}p_{s_{1/1}}(1+p_{s_{2/2}})-4p(1-q)q_{\alpha_{1}}^{2}q_{\alpha_{2}}(1-q_{\alpha_{2}})p_{s_{1/1}}^{2}$}
+6pqα12ps1/13pqα12qα2ps1/17pqα12qα2ps1/1ps2/2p(qα1qα2)2ps1/1ps2/12\displaystyle\!\!+\!\scalebox{0.83}{$6pq_{\alpha_{1}}^{2}p_{s_{1/1}}\!\!\!-\!\!3pq_{\alpha_{1}}^{2}q_{\alpha_{2}}p_{s_{1/1}}\!\!\!-\!\!7pq_{\alpha_{1}}^{2}q_{\alpha_{2}}p_{s_{1/1}}p_{s_{2/2}}\!\!-\!\!p(q_{\alpha_{1}}q_{\alpha_{2}})^{2}p_{s_{1/1}}p_{s_{2/12}}$}
p(qα1qα2)2ps1/1(5ps2/2+4ps1/12(1ps2/12)(1q)4qps2/12)\displaystyle\!\!-\!\scalebox{0.85}{$p(q_{\alpha_{1}}q_{\alpha_{2}})^{2}p_{s_{1/1}}\big(-5p_{s_{2/2}}\!+\!4p_{s_{1/12}}(1\!-\!p_{s_{2/12}})(1\!-\!q)\!-\!4qp_{s_{2/12}}\big)$}
4pq(qα1qα2)2ps1/1ps2/2],\displaystyle\!\!-\scalebox{0.85}{$4pq(q_{\alpha_{1}}q_{\alpha_{2}})^{2}p_{s_{1/1}}p_{s_{2/2}}\Big]$}, (61)

where Z2Z_{2} and GG^{\prime} are given in (-A). Similarly, for the semantics-aware policy, the time-averaged sampling cost in (18b) can be written as follows:

limT1T𝔼[t=1Tδ(𝟙{α1(t)=1}+𝟙{α2(t)=1})]\displaystyle{\lim_{T\to\infty}\frac{1}{T}}\mathbb{E}\Bigg[\displaystyle{\sum_{t=1}^{T}}\delta\Big(\mathbbm{1}\{\alpha_{1}(t)=1\}+\mathbbm{1}\{\alpha_{2}(t)=1\}\Big)\Bigg]

=2pqδL[3p2(1ps1/12)(1ps2/12)(1ps2/2)+4pps1/1ps1/12ps2/12\displaystyle\!\!\!\!=\scalebox{0.87}{$\displaystyle{\frac{2pq\delta}{L}}\Big[3p^{2}(1-p_{s_{1/12}})(1-p_{s_{2/12}})(1-p_{s_{2/2}})+4pp_{s_{1/1}}p_{s_{1/12}}p_{s_{2/12}}$}
+(ps2/12+(1ps2/12)ps1/12)(ps2/2+4q)+ps1/1(ps2/12+2ps2/2)\displaystyle+\scalebox{0.87}{$\big(p_{s_{2/12}}+(1-p_{s_{2/12}})p_{s_{1/12}}\big)(p_{s_{2/2}}+4q)+p_{s_{1/1}}(p_{s_{2/12}}+2p_{s_{2/2}})$}
+ps1/1(4qps2/12+2ps1/12(12q)(1ps2/12))+3pps2/12+pps2/2\displaystyle+\scalebox{0.87}{$p_{s_{1/1}}\big(\!-4qp_{s_{2/12}}\!+\!2p_{s_{1/12}}(1-2q)(1-p_{s_{2/12}})\big)\!+\!3pp_{s_{2/12}}\!+\!pp_{s_{2/2}}$}
+4pq4pps2/12(q+ps2/2)+pps1/12(1ps2/12)(34ps2/24q)\displaystyle+\scalebox{0.87}{$4pq-4pp_{s_{2/12}}(q+p_{s_{2/2}})+pp_{s_{1/12}}(1-p_{s_{2/12}})(3-4p_{s_{2/2}}-4q)$}
+pps1/1(7ps2/126ps2/24q(1ps2/12)4ps1/12)\displaystyle+\scalebox{0.87}{$pp_{s_{1/1}}\big(7-p_{s_{2/12}}-6p_{s_{2/2}}-4q(1-p_{s_{2/12}})-4p_{s_{1/12}}\big)$}
+4pqps1/1ps1/12(1ps2/12)],\displaystyle+\scalebox{0.87}{$4pqp_{s_{1/1}}p_{s_{1/12}}(1-p_{s_{2/12}})\Big]$}, (62)

where L=[2p(1ps1/12)(1ps2/12)(q+(1q)ps1/1)+(ps1/12(1ps2/12)+ps2/12)(2q+(12q)ps1/1)](3p3pps2/2+ps2/2)(p+2q)L=\Big[2p(1-p_{s_{1/12}})(1-p_{s_{2/12}})\big(q+(1-q)p_{s_{1/1}}\big)+\big(p_{s_{1/12}}(1-p_{s_{2/12}})+p_{s_{2/12}}\big)\big(2q+(1-2q)p_{s_{1/1}}\big)\Big]\big(3p-3pp_{s_{2/2}}+p_{s_{2/2}}\big)(p+2q). Furthermore, for the change-aware policy, we can write the time-averaged sampling cost as follows:

limT1T𝔼[t=1Tδ(𝟙{α1(t)=1}+𝟙{α2(t)=1})]\displaystyle{\lim_{T\to\infty}\frac{1}{T}}\mathbb{E}\Bigg[\displaystyle{\sum_{t=1}^{T}}\delta\Big(\mathbbm{1}\{\alpha_{1}(t)=1\}+\mathbbm{1}\{\alpha_{2}(t)=1\}\Big)\Bigg]

=δ[X1(t)=0|X1(t1)=1,X2(t1)=0][X1(t1)=1,X2(t1)=0]\displaystyle\!\!\!\!\!=\scalebox{0.87}{$\delta\mathbb{P}\big[X_{1}(t)\!\!=\!\!0\big|X_{1}(t\!-\!1)\!\!=\!\!1,\!X_{2}(t\!-\!1)\!\!=\!\!0\big]\mathbb{P}\big[X_{1}(t\!-\!1)\!\!=\!\!1,\!X_{2}(t\!-\!1)\!\!=\!\!0\big]$}
+δ[X1(t)=0|X1(t1)=1,X2(t1)=1][X1(t1)=1,X2(t1)=1]\displaystyle\!\!\!\!\!+\scalebox{0.87}{$\delta\mathbb{P}\big[X_{1}(t)\!\!=\!\!0\big|X_{1}(t\!-\!1)\!\!=\!\!1,\!X_{2}(t\!-\!1)\!\!=\!\!1\big]\mathbb{P}\big[X_{1}(t\!-\!1)\!\!=\!\!1,\!X_{2}(t\!-\!1)\!\!=\!\!1\big]$}
+2δ[X1(t)=1,X2(t)=0|X1(t1)=0][X1(t1)=0]\displaystyle\!\!\!\!\!+\scalebox{0.87}{$2\delta\mathbb{P}\big[X_{1}(t)\!\!=\!\!1,X_{2}(t)=0\big|X_{1}(t\!-\!1)\!\!=\!\!0\big]\mathbb{P}\big[X_{1}(t\!-\!1)\!\!=\!\!0\big]$}
+δ[X1(t)=1,X2(t)=0|X1(t1)=1,X2(t1)=1][X1(t1)=1,X2(t1)=1]\displaystyle\!\!\!\!\!+\!\!\scalebox{0.87}{$\delta\mathbb{P}\!\big[\!X_{1}\!(t)\!\!=\!\!1,\!X_{2}(t)\!\!=\!\!0\big|\!X_{1}\!(t\!\!-\!\!1)\!\!=\!\!1,\!X_{2}(t\!\!-\!\!1)\!\!=\!\!1\!\big]\!\mathbb{P}\big[\!X_{1}\!(t\!\!-\!\!1)\!\!=\!\!1,\!X_{2}(t\!\!-\!\!1)\!\!=\!\!1\big]$}
+2δ[X1(t)=1,X2(t)=1|X1(t1)=0][X1(t1)=0]\displaystyle\!\!\!\!\!+\scalebox{0.87}{$2\delta\mathbb{P}\big[X_{1}(t)\!\!=\!\!1,X_{2}(t)=1\big|X_{1}(t\!-\!1)\!\!=\!\!0\big]\mathbb{P}\big[X_{1}(t\!-\!1)\!\!=\!\!0\big]$}
+δ[X1(t)=1,X2(t)=1|X1(t1)=1,X2(t1)=0][X1(t1)=1,X2(t1)=0]\displaystyle\!\!\!\!\!+\!\!\scalebox{0.87}{$\delta\mathbb{P}\!\big[\!X_{1}\!(t)\!\!=\!\!1,\!X_{2}(t)\!\!=\!\!1\big|\!X_{1}\!(t\!\!-\!\!1)\!\!=\!\!1,\!X_{2}(t\!\!-\!\!1)\!\!=\!\!0\!\big]\!\mathbb{P}\big[\!X_{1}\!(t\!\!-\!\!1)\!\!=\!\!1,\!X_{2}(t\!\!-\!\!1)\!\!=\!\!0\!\big]$}
=2pδ[X1(t)=1,X2(t)=0]+2pδ[X1(t)=1,X2(t)=1]\displaystyle\!\!\!\!\!=\scalebox{0.87}{$2p\delta\mathbb{P}\big[X_{1}(t)=1,X_{2}(t)=0\big]+2p\delta\mathbb{P}\big[X_{1}(t)=1,X_{2}(t)=1\big]$}
+4qδ[X1(t)=0].\displaystyle\!\!\!\!+\scalebox{0.87}{$4q\delta\mathbb{P}\big[X_{1}(t)=0\big]$}. (63)

Using (-B), (64) can be simplified as:

limT1T𝔼[t=1Tδ(𝟙{α1(t)=1}+𝟙{α2(t)=1})]=8pqδp+2q.\displaystyle\!\!\!\!\!\scalebox{0.9}{$\displaystyle{\lim_{T\to\infty}\frac{1}{T}}\mathbb{E}\Bigg[\displaystyle{\sum_{t=1}^{T}}\delta\Big(\mathbbm{1}\{\alpha_{1}(t)\!=\!1\}\!+\!\mathbbm{1}\{\alpha_{2}(t)\!=\!1\}\Big)\Bigg]\!=\!\displaystyle{\frac{8pq\delta}{p+2q}}$}. (64)

References

  • [1] R. Hult, G. R. Campos, E. Steinmetz, L. Hammarstrand, P. Falcone, and H. Wymeersch, “Coordination of cooperative autonomous vehicles: Toward safer and more efficient road transportation,” IEEE Signal Process. Mag., vol. 33, no. 6, pp. 74–84, Nov. 2016.
  • [2] P. Park, S. Coleri Ergen, C. Fischione, C. Lu, and K. H. Johansson, “Wireless network design for control systems: A survey,” IEEE Commun. Surv. Tutor., vol. 20, no. 2, pp. 978–1013, Apr. 2018.
  • [3] N. Pappas, M. A. Abd-Elmagid, B. Zhou, W. Saad, and H. S. Dhillon, Age of Information: Foundations and Applications. Cambridge University Press, 2023.
  • [4] T. Shreedhar, S. K. Kaul, and R. D. Yates, “An age control transport protocol for delivering fresh updates in the Internet-of-Things,” in IEEE 20th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2019, pp. 1–7.
  • [5] S. Vitturi, F. Tramarin, and L. Seno, “Industrial wireless networks: The significance of timeliness in communication systems,” IEEE Ind. Electron. Mag., vol. 7, no. 2, pp. 40–51, June 2013.
  • [6] M. Kountouris and N. Pappas, “Semantics-empowered communication for networked intelligent systems,” IEEE Communications Magazine, vol. 59, no. 6, pp. 96–102, 2021.
  • [7] M. Kalfa, M. Gok, A. Atalik, B. Tegin, T. M. Duman, and O. Arikan, “Towards goal-oriented semantic signal processing: Applications and future challenges,” Digital Signal Processing, vol. 119, p. 103134, 2021.
  • [8] P. Popovski, O. Simeone, F. Boccardi, D. Gündüz, and O. Sahin, “Semantic-effectiveness filtering and control for post-5G wireless connectivity,” Journal of the Indian Institute of Science, vol. 100, no. 2, pp. 435–443, 2020.
  • [9] P. Popovski, F. Chiariotti, K. Huang, A. E. Kalør, M. Kountouris, N. Pappas, and B. Soret, “A perspective on time toward wireless 6G,” Proceedings of the IEEE, vol. 110, no. 8, pp. 1116–1146, 2022.
  • [10] D. Gündüz, Z. Qin, I. E. Aguerri, H. S. Dhillon, Z. Yang, A. Yener, K. K. Wong, and C.-B. Chae, “Beyond transmitting bits: Context, semantics, and task-oriented communications,” IEEE Journal on Selected Areas in Communications, vol. 41, no. 1, pp. 5–41, 2022.
  • [11] Z. Utkovski, A. Munari, G. Caire, J. Dommel, P.-H. Lin, M. Franke, A. C. Drummond, and S. Stańczak, “Semantic communication for edge intelligence: Theoretical foundations and implications on protocols,” IEEE Internet Things Mag., vol. 6, no. 4, pp. 48–53, Dec. 2023.
  • [12] J. Luo, E. Delfani, M. Salimnejad, and N. Pappas, “From Information Freshness to Semantics of Information and Goal-oriented Communications,” arXiv: 2512.12758, 2025.
  • [13] S. Kaul, R. Yates, and M. Gruteser, “Real-time status: How often should one update?” in Proceedings IEEE INFOCOM, 2012, pp. 2731–2735.
  • [14] A. Maatouk, S. Kriouile, M. Assaad, and A. Ephremides, “The age of incorrect information: A new performance metric for status updates,” IEEE/ACM Transactions on Networking, vol. 28, no. 5, pp. 2215–2228, 2020.
  • [15] N. Pappas and M. Kountouris, “Goal-oriented communication for real-time tracking in autonomous systems,” in IEEE International Conference on Autonomous Systems (ICAS), 2021, pp. 1–5.
  • [16] R. D. Yates, “The age of gossip in networks,” in IEEE International Symposium on Information Theory (ISIT), 2021, pp. 2984–2989.
  • [17] Y. Xu and J. P. Hespanha, “Optimal communication logics in networked control systems,” in 43rd IEEE Conference on Decision and Control (CDC), vol. 4, 2004, pp. 3527–3532.
  • [18] L. Shi, P. Cheng, and J. Chen, “Sensor data scheduling for optimal state estimation with communication energy constraint,” Automatica, vol. 47, no. 8, pp. 1693–1698, 2011.
  • [19] L. Shi, K. H. Johansson, and L. Qiu, “Time and event-based sensor scheduling for networks with limited communication resources,” IFAC Proceedings Volumes, vol. 44, no. 1, pp. 13 263–13 268, 2011.
  • [20] J. Wu, Y. Yuan, H. Zhang, and L. Shi, “How can online schedules improve communication and estimation tradeoff?” IEEE Transactions on Signal Processing, vol. 61, no. 7, pp. 1625–1631, 2013.
  • [21] L. Li, M. Lemmon, and X. Wang, “Event-triggered state estimation in vector linear processes,” in Proceedings of the 2010 American control conference, 2010, pp. 2138–2143.
  • [22] V. W. Håkansson, N. K. Venkategowda, and S. Werner, “Optimal transmission threshold and channel allocation strategies for heterogeneous sensor data,” in 55th Asilomar Conference on Signals, Systems, and Computers, 2021, pp. 757–761.
  • [23] L. Shi and H. Zhang, “Scheduling two Gauss–Markov systems: An optimal solution for remote state estimation under bandwidth constraint,” IEEE Transactions on Signal Processing, vol. 60, no. 4, pp. 2038–2042, 2012.
  • [24] S. Wu, X. Ren, S. Dey, and L. Shi, “Optimal scheduling of multiple sensors over shared channels with packet transmission constraint,” Automatica, vol. 96, pp. 22–31, 2018.
  • [25] J. Chakravorty and A. Mahajan, “Distortion-transmission trade-off in real-time transmission of Gauss-Markov sources,” in IEEE International Symposium on Information Theory (ISIT), 2015, pp. 1387–1391.
  • [26] ——, “Fundamental limits of remote estimation of autoregressive Markov processes under communication constraints,” in Information Theory and Applications Workshop (ITA), 2016, pp. 1–16.
  • [27] Y. Sun, Y. Polyanskiy, and E. Uysal, “Sampling of the Wiener process for remote estimation over a channel with random delay,” IEEE Transactions on Information Theory, vol. 66, no. 2, pp. 1118–1135, 2019.
  • [28] T. Z. Ornee and Y. Sun, “Sampling and remote estimation for the Ornstein-Uhlenbeck process through queues: Age of information and beyond,” IEEE/ACM Transactions on Networking, vol. 29, no. 5, pp. 1962–1975, 2021.
  • [29] N. Guo and V. Kostina, “Optimal causal rate-constrained sampling for a class of continuous Markov processes,” IEEE Transactions on Information Theory, vol. 67, no. 12, pp. 7876–7890, 2021.
  • [30] H. Hui, S. Hu, and W. Chen, “Real time monitoring of Brownian motions,” IEEE Transactions on Communications, vol. 70, no. 9, pp. 5867–5881, 2022.
  • [31] J. Chakravorty and A. Mahajan, “Remote estimation over a packet-drop channel with Markovian state,” IEEE Transactions on Automatic Control, vol. 65, no. 5, pp. 2016–2031, 2019.
  • [32] W. Chen, J. Wang, D. Shi, and L. Shi, “Event-Based State Estimation of Hidden Markov Models Through a Gilbert–Elliott Channel,” IEEE Transactions on Automatic Control, vol. 62, no. 7, pp. 3626–3633, 2017.
  • [33] M. Salimnejad, M. Kountouris, and N. Pappas, “State-aware real-time tracking and remote reconstruction of a Markov source,” Journal of Communications and Networks, vol. 25, no. 5, pp. 657–669, 2023.
  • [34] ——, “Real-time reconstruction of Markov sources and remote actuation over wireless channels,” IEEE Transactions on Communications, vol. 72, no. 5, pp. 2701–2715, 2024.
  • [35] G. Cocco, A. Munari, and G. Liva, “Remote monitoring of two-state Markov sources via random access channels: an information freshness vs. state estimation entropy perspective,” IEEE Journal on Selected Areas in Information Theory, vol. 4, pp. 651–666, 2023.
  • [36] E. D. Santi, T. Soleymani, and D. Gündüz, “Remote Estimation of Markov Processes over Costly Channels: On Implicit Information Benefits,” in IEEE Global Communications Conference, 2024, pp. 1353–1358.
  • [37] J. Luo and N. Pappas, “Semantic-aware remote estimation of multiple markov sources under constraints,” IEEE Transactions on Communications, 2025.
  • [38] P. Talli, E. D. Santi, F. Chiariotti, T. Soleymani, F. Mason, A. Zanella, and D. Gündüz, “Pragmatic communication for remote control of finite-state markov processes,” IEEE Journal on Selected Areas in Communications, 2025.
  • [39] M. Salimnejad, M. Kountouris, A. Ephremides, and N. Pappas, “Age of Information Versions: a Semantic View of Markov Source Monitoring,” IEEE Transactions on Communications, pp. 1–1, 2025.
  • [40] E. Delfani and N. Pappas, “Semantics-aware status updates with energy harvesting devices: Query version age of information,” in 22nd International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 2024, pp. 177–184.
  • [41] J. Luo and N. Pappas, “On the Cost of Consecutive Estimation Error: Significance-Aware Non-linear Aging,” IEEE Transactions on Information Theory, pp. 1–1, 2025.
  • [42] A. Li, S. Wu, S. Sun, and J. Cao, “Goal-Oriented Tensor: Beyond Age of Information Toward Semantics-Empowered Goal-Oriented Communications,” IEEE Transactions on Communications, vol. 72, no. 12, pp. 7689–7704, 2024.
  • [43] S. S. Vilni, A. Zakeri, M. Moltafet, and M. Codreanu, “Goal-oriented Real-time Tracking in a Status Update System Under Imperfect Feedback,” in 58th Asilomar Conference on Signals, Systems, and Computers, 2024, pp. 391–395.
  • [44] S. Poojary, S. Bhambay, and P. Parag, “Real-time status updates for correlated source,” in IEEE Information Theory Workshop (ITW), 2017, pp. 274–278.
  • [45] Z. Jiang and S. Zhou, “Status from a random field: How densely should one update?” in IEEE International Symposium on Information Theory (ISIT), 2019, pp. 1037–1041.
  • [46] B. Zhou and W. Saad, “On the age of information in Internet of Things systems with correlated devices,” in IEEE Global Communications Conference, 2020, pp. 1–6.
  • [47] A. E. Kalør and P. Popovski, “Minimizing the age of information from sensors with common observations,” IEEE Wireless Communications Letters, vol. 8, no. 5, pp. 1390–1393, 2019.
  • [48] V. Tripathi and E. Modiano, “Optimizing age of information with correlated sources,” in Proceedings of the Twenty-Third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, 2022, pp. 41–50.
  • [49] R. V. Ramakanth, V. Tripathi, and E. Modiano, “Monitoring correlated sources: AoI-based scheduling is nearly optimal,” IEEE Transactions on Mobile Computing, 2024.