Tse Lab

Publications

Books & Monographs

  • D. Tse and P. Viswanath, Fundamentals of Wireless Communication, Cambridge University Press, 2005.
  • A. Ozgur, O. Leveque, D. Tse, Operating Regimes of Large Wireless Networks, Foundations and Trends in Networking, NOW, Volume 5, Issue 1, 2012.
  • AS Avestimehr, SN, C Tian, DNC Tse, An Approximation Approach to Network Information Theory, Foundations and Trends in Communications and Information Theory, Vol. 12 (1-2), pp. 1-183, 2015.

Patents

Papers

Preprints

  • “NOMAD2 provides ultra-efficient, scalable, and unsupervised discovery on raw sequencing reads”, Marek Kokot, Roozbeh Dehghannasiri, Tavor Z. Baharav, Julia Salzman, Sebastian Deorowicz, bioRxiv 10.1101/ 2023.03.17.533189v1
  • “An interpretable, finite sample valid alternative to Pearson’s X2 for scientific discovery”, Tavor Z. Baharav, David Tse, Julia Salzman, bioRxiv 10.1101/ 2023.03.16.533008v1
  • “A statistical, reference-free algorithm subsumes myriad problems in genome science and enables novel discovery”, Kaitlin Chaung, Tavor Z. Baharav, Ivan Zheludev, Julia Salzman, 2022, bioRxiv 10.1101/ 2022.06.24.497555v2 (minor revision at Cell)
  • “Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake Security”, Ertem Nusret Tas, David Tse, Fisher Yu, Sreeram Kannan, 2022, IACR ePrint 2022/ 076
  • “Accountable Safety for Rollups”, Ertem Nusret Tas, John Adler, Mustafa Al-Bassam, Ismail Khoffi, David Tse, Nima Vaziri, 2022, arXiv 2211.01743
  • “Snap-and-Chat Protocols: System Aspects”, Joachim Neu, Ertem Nusret Tas, David Tse, arXiv 2010.10447
  • “Systematic characterization of genome editing in primary T cells reveals proximal genomic insertions and enables machine learning prediction of CRISPR-Cas9 DNA repair outcomes”, Ryan T. Leenay, Amirali Aghazadeh, Joseph Hiatt, David Tse, Judd F. Hultquist, Nevan Krogan, Zhenqin Wu, Alexander Marson, Andrew P. May, James Zou, 2018, bioRxiv 404947v1
  • “crispr2vec: Machine Learning Model Predicts Off-Target Cuts of CRISPR systems”, Tara Basu Trivedi, Ron Boger, Govinda M Kamath, Georgios Evangelopoulos, Jamie Cate, Jennifer Doudna, Jack Hidary. bioRxiv 10.1101/ 2020.10.28.359885v1

Most Recent Publications

2024
  • “Content Censorship in the InterPlanetary File System”, Srivatsan Sridhar, Onur Ascigil, Navin Keizer, François Genon, Sébastien Pierre, Yiannis Psaras, Etienne Rivière, Michał Król, NDSS, 2024, arXiv 2307.12212
  • “Optimal Flexible Consensus and its Application to Ethereum”, Joachim Neu, Srivatsan Sridhar, Lei Yang, David Tse, IEEE Security and Privacy, 2024, arXiv 2308.05096
  • “Goldfish: No More Attacks on Proof-of-Stake Ethereum”, Francesco D’Amato, Joachim Neu, Ertem Nusret Tas, David Tse, Financial Cryptography, 2024, IACR ePrint 2022/ 1171
  • “Light Clients for Lazy Blockchains”, Ertem Nusret Tas, Dionysis Zindros, Lei Yang, David Tse, Financial Cryptography, 2024, IACR ePrint 2022/ 384
  • “Short Paper: Accountable Safety Implies Finality”, Joachim Neu, Ertem Nusret Tas, David Tse, Financial Cryptography, 2024, IACR ePrint 2023/ 1301
  • “On-Chain Timestamps Are Accurate”, Apostolos Tzinas, Srivatsan Sridhar, Dionysis Zindros, Financial Cryptography, 2024, IACR ePrint 2023/ 1648
  • “Security–Throughput Tradeoff of Nakamoto Consensus under Bandwidth Constraints”, Lucianna Kiffer, Joachim Neu, Srivatsan Sridhar, Aviv Zohar, David Tse, IACR ePrint 2023/ 381
2023
  • “Adaptive Data Depth via Multi-Armed Bandits”, Tavor Z. Baharav, Tze Leung Lai, JMLR, 2023, arXiv 2211.03985
  • “Cryptoeconomic Security for Data Availability Committees”, Ertem Nusret Tas, Dan Boneh, Financial Cryptography, 2023, arXiv 2208.02999
  • “Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities”, Ertem Nusret Tas, David Tse, Fangyu Gai, Sreeram Kannan, Mohammad Ali Maddah-Ali, Fisher Yu, IEEE Security and Privacy, 2023, IACR ePrint 2022/ 932
  • “The Principal–Agent Problem in Liquid Staking”, Apostolos Tzinas, Dionysis Zindros, 7th Workshop on Trusted Smart Contracts, 2023, IACR ePrint 2023/ 605
  • “Cassiopeia: Practical On-Chain Witness Encryption”, Schwinn Saereesitthipitak, Dionysis Zindros, 7th Workshop on Trusted Smart Contracts, 2023, IACR ePrint 2023/ 635
  • “Vector Commitments with Efficient Updates”, Ertem Nusret Tas, Dan Boneh, AFT 2023, arXiv 2307.04085
  • “Proofs of Proof-of-Stake with Sublinear Complexity”, Shresth Agrawal, Joachim Neu, Ertem Nusret Tas, Dionysis Zindros, AFT 2023, arXiv 2209.08673
2022
  • “Hours of Horus: Keyless Cryptocurrency Wallets”, Dionysis Zindros, 6th Workshop on Trusted Smart Contracts, 2022, IACR ePrint 2021/ 715
  • “Beyond the Best: Distribution Functional Estimation in Infinite-Armed Bandits”, Yifei Wang, Tavor Baharav, Yanjun Han, Jiantao Jiao, David Tse, Conference on Neural Information Processing Systems (NeurIPS), 2022, arXiv 2010.10447, Paper, Slide, Poster
  • “Approximate Function Evaluation via Multi-Armed Bandits”, Tavor Z. Baharav, Gary Cheng, Mert Pilanci, David Tse, International Conference on Artificial Intelligence and Statistics (AISTATS), 2022, arXiv 2203.10124
  • “Two More Attacks on Proof-of-Stake GHOST/Ethereum”, Joachim Neu, Ertem Nusret Tas, David Tse, ACM Workshop on Developments in Consensus (ConsensusDay’22), 2022, IACR ePrint 2022/ 289
  • “Proof-of-stake longest chain protocols: Security vs predictability”, Vivek Bagaria, Amir Dembo, Sreeram Kannan, Sewoong Oh, David Tse, Pramod Viswanath, Xuechao Wang, Ofer Zeitouni, ACM Workshop on Developments in Consensus (ConsensusDay’22), 2022, arXiv 1910.02218
  • “Longest Chain Consensus Under Bandwidth Constraint”, Joachim Neu, Srivatsan Sridhar, Lei Yang, David Tse, Mohammad Alizadeh, ACM AFT, 2022, IACR ePrint 2021/ 1545
  • “Information Dispersal with Provable Retrievability for Rollups”, Kamilla Nazirkhanova, Joachim Neu, David Tse, ACM AFT, 2022, IACR ePrint 2021/ 1544
  • “Three Attacks on Proof-of-Stake Ethereum”, Caspar Schwarz-Schilling, Joachim Neu, Barnabé Monnot, Aditya Asgaonkar, Ertem Nusret Tas, David Tse, Financial Cryptography, 2022, arXiv 2110.10086
  • “The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets”, Joachim Neu, Ertem Nusret Tas, David Tse, Financial Cryptography, 2022, arXiv 2105.06075
  • “DispersedLedger: High-Throughput Byzantine Consensus on Variable Bandwidth Networks”, Lei Yang, Seo Jin Park, Mohammad Alizadeh, Sreeram Kannan, David Tse, USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2022, arXiv 2110.04371
  • Ranvir Rana, Sreeram Kannan, David Tse, and Pramod Viswanath. 2022. Free2Shard: Adversary-resistant Distributed Resource Allocation for Blockchains. Proc. ACM Meas. Anal. Comput. Syst. 6, 1, Article 11 (March 2022),
2021
  • “Enabling Efficiency-Precision Trade-offs for Label Trees in Extreme Classification”. Tavor Z. Baharav, Daniel L. Jiang, Kedarnath Kolluri, Sujay Sanghavi, and Inderjit S. Dhillon. ACM International Conference on Information and Knowledge Management (CIKM), 2021.
  • “PoSAT: Proof-of-Work Dynamic Availability and Unpredictability, without the Work”, Soubhik Deb, Sreeram Kannan, David Tse, Financial Cryptography, 2021, arXiv 2010.08154
  • “Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma”, Joachim Neu, Ertem Nusret Tas, David Tse, IEEE Symposium on Security and Privacy, 2021, arXiv 2009.04987, Source code: Ebb-and-Flow, Source code: Gasper attack, ETHresear.ch post: Gasper attack, Decentralized Thoughts blog post, Talk at LA Blockchain Summit, Talk at IBM Research Workshop on the Informational Lens
  • “One for All and All for One: Distributed Learning of Fair Allocations with Multi-player Bandits”, Ilai Bistritz, Tavor Baharav, Amir Leshem, Nicholas Bambos, IEEE Journal on Selected Areas in Information Theory, 2021
  • “Bandit-Based Monte Carlo Optimization for Nearest Neighbors”, Vivek Bagaria, Tavor Baharav, Govinda Kamath, David Tse, IEEE Journal on Selected Areas in Information Theory, 2021
2020
  • “Proof-of-Stake Longest Chain Protocols Revisited”, Xuechao Wang, Govinda Kamath, Vivek Bagaria, Sreeram Kannan, Sewoong Oh, David Tse, Pramod Viswanath, Stanford Blockchain Conference 2020, arXiv 1910.02218
  • “Prism: Scaling Bitcoin by 10,000x”, Lei Yang, Vivek Bagaria, Gerui Wang, Mohammad Alizadeh, David Tse, Giulia Fanti, Pramod Viswanath, Stanford Blockchain Conference 2020, arXiv 1909.11261, Source code
  • “A Fourier-based Approach to Generalization and Optimization in Deep Learning”, Farzan Farnia, Jesse Zhang, David Tse. IEEE Journal on Selected Areas in Information Theory, 2020. IEEExplore
  • “Everything is a Race and Nakamoto Always Wins”, Amir Dembo, Sreeram Kannan, Ertem Nusret Tas, David Tse, Pramod Viswanath, Xuechao Wang, Ofer Zeitouni, ACM CCS, 2020, arXiv 2005.10484
  • “Adaptive Learning of Rank-One Models for Efficient Pairwise Sequence Alignment”, Govinda M. Kamath, Tavor Z. Baharav, Ilan Shomorony. Advances in Neural Information Processing Systems (NeurIPS), 2020. arXiv 2011.04832
  • “Understanding GANs in the LQG Setting: Formulation, Generalization and Stability”, Soheil Feizi, Farzan Farnia, Tony Ginart, David Tse, IEEE Journal on Selected Areas in Information Theory, 2020, arXiv 1710.10793
  • “Prism Removes Consensus Bottleneck for Smart Contracts”, Gerui Wang, Shuo Wang, Vivek Bagaria, David Tse, Pramod Viswanath, Crypto Valley Conference, 2020, arXiv 2004.08776, Source code, Video
  • “My Fair Bandit: Distributed Learning of Max-Min Fairness with Multi-player Bandits”, Ilai Bistritz, Tavor Z. Baharav, Amir Leshem, Nicholas Bambos, ICML, 2020, arXiv 2002.09808
  • “Boomerang: Redundancy Improves Latency and Throughput in Payment Networks”, Vivek Bagaria, Joachim Neu, David Tse, Financial Crypto (FC’20), 2020, arXiv 1910.01834
  • “Spectral Jaccard Similarity: A new approach to estimating pairwise sequence alignments”, Tavor Z. Baharav, Govinda M Kamath, David Tse, Ilan Shomorony, RECOMB, 2020, Patterns, 2020, bioRxiv 800581v1
  • “Determining sequencing depth in a single-cell RNA-seq experiment”, M. J. Zhang, V. Ntranos, D. Tse, Nature Communications, 2020, bioRxiv 389296v2
  • Hilal Asi, Karan Chadha, Gary Cheng, and John C. Duchi. “Minibatch Stochastic Approximate Proximal Point Methods.” Spotlight presentation at NeurIPS (2020). Download
  • B. Zhu, J. Jiao and D. Tse, “Deconstructing Generative Adversarial Networks,” in IEEE Transactions on Information Theory, vol. 66, no. 11, pp. 7155-7179, Nov. 2020
2019
  • “Ultra Fast Medoid Identification via Correlated Sequential Halving”, Tavor Z. Baharav, David N. Tse, NeurIPS, 2019, arXiv 1906.04356
  • “Deconstructing the Blockchain to Approach Physical Limits”, Vivek Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, Pramod Viswanath, ACM CCS 2019, arXiv 1810.08092, Slides, YouTube
  • “Large dataset enables prediction of repair after CRISPR–Cas9 editing in primary T cells”, Ryan T. Leenay et al., 2019, Nature Biotechnology
  • “Adaptive Monte Carlo Multiple Testing via Multi-Armed Bandits”, Martin J. Zhang, James Zou, David Tse, 2019, arXiv 1902.00197, ICML 2019
  • “AdaFDR: a Fast, Powerful and Covariate-Adaptive Approach to Multiple Hypothesis Testing”, Martin J. Zhang, Fei Xia, James Zou, 2018, bioRxiv 496372v1, Best paper award in RECOMB 2019
  • “Longitudinal multi-omics of host–microbe dynamics in prediabetes”, Wenyu Zhou et al., 2019, Nature 2019
2018
  • “Exploring patterns enriched in a dataset with contrastive principal component analysis”, Abubakar Abid, Martin J. Zhang, Vivek K. Bagaria, James Zou, 2018, Nature Communications
  • “Somatic Mutations Render Human Exome and Pathogen DNA more Similar”, Ehsan Ebrahimzadeh, Maggie Engler, David Tse, Razvan Cristescu, Aslan Tchamkerten. PLOS ONE, 2019, bioRxiv 322016
  • Jesse M Zhang, Jue Fan, H Christina Fan, David Rosenfeld, N Tse David, “An interpretable framework for clustering single-cell RNA-Seq datasets” , BMC bioinformatics, Vol. 19, Issue. 93, pp. 93, Dec. 2018.
  • Changho Suh, Jaewoong Cho, David Tse, “Two-way interference channel capacity: How to have the cake and eat it too”, IEEE Transactions on Information Theory, Vol 64, Issue, 6, pp. 4259- 4281, June 2018.
  • Sudeep Kamath, Venkatachalam Anantharam, David Tse, Chih-Chun Wang, “The two-unicast problem”, IEEE Transactions on Information Theory, Vol. 64, Issue 5, pp. 3865-3882, May 2018.
  • Antonio A Ginart, Joseph Hui, Kaiyuan Zhu, Ibrahim Numanagić, Thomas A Courtade, S Cenk Sahinalp, N Tse David, “Optimal compressed representation of high throughput sequence data via light assembly”, Nature communications, Vol. 9, Issue. 1, pp. 566. Feb. 2018.
  • Farzan Farnia, Jesse M Zhang, David Tse, “Generalizable Adversarial Training via Spectral Normalization”, arXiv 1811.07457. International Conference on Learning Representations, 2019
  • Jesse M. Zhang, Govinda M. Kamath, David N. Tse, “Valid post-clustering differential analysis for single-cell RNA-Seq”, RECOMB 2019, Cell Systems 2019, bioRxiv 463265v2.
  • Bagaria, Vivek, Govinda Kamath, Vasilis Ntranos, Martin Zhang, and David Tse. “Medoids in Almost-Linear Time via Multi-Armed Bandits.” In International Conference on Artificial Intelligence and Statistics, pp. 500-509. April 2018.
  • Soheil Feizi, Hamid Javadi, Jesse Zhang, David Tse, “Porcupine Neural Networks: Approximating Neural Network Landscapes”, Advances in Neural Information Processing Systems, pp. 4836-4846, 2018.
  • Farzan Farnia, David Tse, “A Convex Duality Framework for GANs”, Advances in Neural Information Processing Systems, pp. 5254-5263, 2018. Link

Published (2014–2017)

Refereed Journal Publications
  • I. Shomorony, G.M. Kamath, F. Xia, T. Courtade and D. Tse, HINGE: Long-Read Assembly Achieves Optimal Repeat Resolution, Genome Research, Vol 27(5), May 2017.
  • A Bhaskar, A Javanmard, TA Courtade, D Tse, Novel probabilistic models of spatial genetic ancestry with applications to stratification correction in genome-wide association studies, Bioinformatics, btw720, 2016.
  • I Shomorony, T Courtade, D Tse. Fundamental Limits of Genome Assembly under an Adversarial Error Model, IEEE Transactions on Molecular, Biological and Multi-Scale Communications, Vol 2(2), 2016.
  • Ntranos V, Kamath GM, Zhang JM, Pachter L, Tse, D. Fast and accurate single-cell RNA-Seq analysis by clustering of transcript-compatibility counts. Genome biology. 2016 May 26;17(1):1.
  • I. Shomorony, S. H. Kim, T. A. Courtade and D. Tse, Information-optimal genome assembly via sparse read-overlap graphs, Bioinformatics. 2016 Sep 1;32(17):i494-i502.
  • KK Lam, K LaButti, A Khalak, D Tse, FinisherSC: a repeat-aware tool for upgrading de novo assembly using long reads, Bioinformatics vol. 31 (19), pp. 3207-3209
  • Chen K, Li B, Shen H, Jin J, Tse D. Reduce the Complexity of List Decoding of Polar Codes by Tree-Pruning. IEEE Communications Letters. 2016 Feb;20(2):204-7.
  • B. Zhang, R. Rajagopal, D. Tse, Network Risk Limiting Dispatch: Optimal Control and Price of Uncertainty, IEEE Transactions on Automatic Control, vol 59(9), pp. 2442-2457, September,2014.
  • G. Bresler, D. Cartwright, D. Tse, Feasibility of Interference Alignment for the MIMO Interference Channel, IEEE Transactions on Information Theory, Vol. 60(9), pp. 5573- 5587, September 2014.
  • K.K. Lam, A. Khalak and D. Tse, Near-optimal Assembly for Shotgun Sequencing with Noisy Reads, BMC Bio- informatics, 2014.
  • B. Zhang, A. Lam, A. Dominguez-Garcia, D. Tse, An Optimal and Distributed Method for Voltage Regulation in Power Distribution Systems,IEEE Transactions on Power Systems, vol 29, p.1-13, 2014.
  • Kosut, O.; Tong, L.; D. Tse, “Polytope Codes Against Adversaries in Networks,” Information Theory, IEEE Transactions on , vol.60, no.6, pp.3308,3344, June 2014
  • Lavaei, J.; D. Tse; B. Zhang, “Geometry of Power Flows and Optimization in Distribution Networks,” Power Systems, IEEE Transactions on , vol.29, no.2, pp.572,583, March 2014
Invited Publications
  • D. Tse, “The Spirit of Information Theory”, Information Theory Society Newsletter, Sept 2017, pp. 3-17. (This is an invited paper for the Shannon lecture I gave at the 2017 International Symposium on Information Theory.)
Refereed Conference Publications
  • S. Feizi and D. Tse, “Maximally Correlated Principal Component Analysis”, Under Review at Journal of Machine Learning Research (JMLR). Presented at Information Theory and Applications (ITA) Workshop, San Diego, 2017. Available on arXiv:1702.05471.
  • S. Feizi, H. Javadi and D. Tse, “Tensor Biclustering”, Neural Information Processing Systems, 2017.
  • F. Xia, M. Zhang, J. Zou and D. Tse, “NeuralFDR: Learning Discovery Thresholds from Hypothesis Features”, Neural Information Processing Systems, 2017.
  • S Mao, S Mohajer, K Ramachandran, D Tse, S Kannan, “abSNP: RNA-Seq SNP Calling in Repetitive Regions via Abundance Estimation”, LIPIcs-Leibniz International Proceedings in Informatics 88.
  • Soheil Feizi, Hamid Javadi, Zhang Jesse, David Tse, “Porcupine Neural Networks: (Almost) All Local Optima are Global”, Allerton conference, 2017.
  • Vivek Kumar Bagaria, David Tse, Yihong Wu, Jiaming Xu, “Order Detection Under Pairwise Measurements”, Allerton Conference, 2017.
  • Ilan Shomorony, David Tse, Nisheeth Kumar Vishnoi, “Is Genome Assembly Really NP-Hard?”, Allerton Conference, 2017.
  • Ilan Shomorony, R. Heckel, D. Tse, K. Ramchandran, “Fundamental Limits of DNA Storage”, ISIT 2017.
  • Jaewoong Cho, Changho Suh, David Tse, “Two-Way Interference Channel Capacity: How to Have the Cake and Eat it Too”, ISIT 2017.
  • F. Farnia, David Tse, A minimax approach to supervised learning, Neural Information Processing Systems, 2016, Barcelona.
  • Chen Y, Kamath G, Suh C, Tse D., Community Recovery in Graphs with Locality., International Conference on Machine Learning, New York, 2016.
  • I. Shomorony, G.M. Kamath, F. Xia, T. Courtade and D. Tse, Partial DNA Assembly: A Rate-distortion perspective, International Symposium on Information Theory, 2016.
  • Suh C, Tse D, Cho J. To feedback or not to feedback. Information Theory (ISIT), 2016 IEEE International Symposium on 2016 Jul (pp. 290-294). IEEE.
  • B. Li, D. Tse, K. Chen and H. Shen, Capacity-Achieving Rateless Polar Codes, International Symposium on Information Theory, 2016.
  • Chen Y, Kamath G, Suh C, Tse D., Community Recovery in Graphs with Locality., International Conference on Machine Learning, New York, 2016.
  • M. Razaviyayn, F. Farnia, D. Tse , “Discrete Renyi Classifers”, Advances in Neural Information Processing Systems, 2015. pp. 3258-3266.
  • GM Kamath, E Sasoglu, D Tse, “Optimal haplotype assembly from high-throughput mate-pair reads”, Information Theory (ISIT), 2015 IEEE International Symposium on, pp. 914- 918.
  • F Farnia, M Razaviyayn, S Kannan, D Tse, “Minimum HGR correlation principle: From marginals to joint distribution”, Information Theory (ISIT), 2015 IEEE International Symposium on, pp. 1377-1381.
  • ASY Poon, D Tse, Does superdirectivity increase the degrees of freedom in wireless channels? Information Theory (ISIT), 2015 IEEE International Symposium on, pp. 1232- 1236.
  • I Shomorony, T Courtade, D Tse, Do read errors matter for genome assembly? Information Theory (ISIT), 2015 IEEE International Symposium on, pp. 919-923
  • I Shomorony, T Courtade, D Tse,Efficient Construction of Sparse String Graphs, Probabilistic Modeling in Genomics, Cold Spring Harbor, 2015.
  • A Javanmard, A Bhaskar, T Courtade, D Tse, Ancestry localization from genotype data under general probabilistic models of spatial evolution and a correction for population stratification in genome-wide association studies, Probabilistic Modeling in Genomics, Cold Spring Harbor, 2015.
  • M Rezaviyayn, J. Guo, E. Tseng, D Tse, CONVEX: De Novo Transcriptome Error Correction via Convexification, Genome Informatics, Cold Spring Harbor, 2015.
  • Sasoglu, Eren; Tse, David, DNA assembly from paired reads as 2-D jigsaw puzzles, Information Theory (ISIT), 2014 IEEE International Symposium on , vol., no., pp.1286,1290, June 29 2014-July 4 2014.
  • Kamath, Sudeep; Tse, David N.C.; Wang, Chih-Chun, Two-unicast is hard,Information Theory (ISIT), 2014 IEEE International Symposium on , vol., no., pp.2147,2151, June 29 2014-July 4 2014.
  • Low-latency polar codes via hybrid decoding Bin Li ; Hui Shen ; Tse, D. ; Wen Tong Turbo Codes and Iterative Information Processing (ISTC), 2014 8th International Symposium on Publication Year: 2014 , Page(s): 223 - 227.

Published (before 2014)

Refereed Journal Publications
  • Motahari, A.S.; Bresler, G.; D. Tse, “Information Theory of DNA Shotgun Sequencing,” Information Theory, IEEE Transactions on , vol.59, no.10, pp.6273,6289, Oct. 2013.
  • Nagpal, V.; Wang, I.H.; Jorgovanovic, M.; D. Tse; Nikolic, B., “Coding and system design for quantize-map-and-forward relaying,” Selected Areas in Communications, IEEE Journal on , vol.31, no.8, pp.1423,1435, Aug. 2013
  • G. Bresler, M. Bresler, D. Tse, “Optimal assembly for high throughput shotgun sequencing”, BMC Bioinformatics 2013, 14(Suppl 5).
  • B. Zhang; Tse, D., “Geometry of injection regions of power networks,” Power Systems, IEEE Transactions on , vol.28, no.2, pp.788,797, May 2013
  • V. Chandar, A. Tchamkerten, D. Tse, “Asynchronous Capacity per Unit Cost,” IEEE Transactions on Information Theory , vol.59, no.3, pp.1213-1226, March 2013
  • A. Ozgur, O. Leveque, D. Tse, “Spatial Degrees of Freedom of Large Distributed MIMO Systems and Wireless Ad Hoc Networks,” IEEE Journal on Selected Areas in Communications, vol.31, no.2, pp.202-214, February 2013
  • D. Tse and R.D. Yates, “Fading Broadcast Channels With State Information at the Receivers,” IEEE Transactions on Information Theory , vol.58, no.6, pp.3453-3471, June 2012
  • Bin Li, Hui Shen, D. Tse, “An Adaptive Successive Cancellation List Decoder for Polar Codes with Cyclic Redundancy Check,” IEEE Communications Letters, vol.16, no.12, pp.2044-2047, December 2012
  • M.A. Maddah-Ali and D. Tse, “Completely Stale Transmitter Channel State Information is Still Very Useful,” IEEE Transactions on Information Theory , vol.58, no.7, pp.4418-4431, July 2012
  • P. Minero, M. Franceschetti, D. Tse: “Random Access: An Information-Theoretic Perspective”,* IEEE Transactions on Information Theory* 58(2): 909-930 (2012)
  • D. Shah, D. Tse, John Tsitsiklis, “Hardness of low delay network scheduling”, IEEE Transactions on Information Theory, Vol. 57, No. 12, December 2011, pp. 7810-7818.
  • A.S.Y. Poon and D. Tse, “Degree-of-Freedom Gain From Using Polarimetric Antenna Elements,” IEEE Transactions on Information Theory , vol.57, no.9, pp.5695-5709, Sept. 2011
  • L. Grokop, D. Tse, Roy D. Yates,” Interference Alignment for Line-of-Sight Channels”,IEEE Transactions on Information Theory 57(9), 2011, pp. 5820-5839.
  • Francois Bacelli, Abbas El Gamal, D. Tse, “Interference Networks with Point-to-point Codes”, IEEE Transactions on Information Theory, vol. 57(5), May 2011.
  • Soheil Mohajer, Suhas N. Diggavi, Christina Fragouli, D. Tse, “Approximate Capacity of Gaussian Interference-Relay Networks with Weak Cross Links”, IEEE Transactions on Information Theory, vol. 57(5), May 2011.
  • I-Hsiang Wang, D. Tse, “Interference Mitigation Through Limited Receiver Cooperation”, IEEE Transactions on Information Theory, vol. 57(5), May 2011. * I-Hsiang Wang, D. Tse, “Interference Mitigation through Limited Transmitter Cooperation”, IEEE Transactions on Information Theory, vol. 57(5), May 2011. * Changho Suh, Minnie Ho, D.Tse, “Downlink Interference Alignment”, IEEE Transactions on Communications, vol. 59, no. 9, Sept. 2011.
  • S. Avestimehr, S. Diggavi and D. Tse, “Wireless network information flow: a deterministic approach” ,IEEE Transactions on Information Theory, vol. 57(4), April, 2011.
  • Randall A. Berry, D. Tse, “Shannon Meets Nash on the Interference Channel”, IEEE Transactions on Information Theory, vol. 57(5), May 2011.
  • Changho Suh, D. Tse, “Feedback Capacity of the Gaussian Interference Channel to within 2 Bits”, IEEE Transactions on Information Theory, vol. 57(5), May 2011. (Conference version of this paper won the Best Student Paper Award.)
  • G. Bresler, A. Parekh and D. Tse, “Approximate Capacity of Many-to-One and One-to-Many Interference Channels”, IEEE Transactions on Information Theory, vol. 56(9), Sept. 2010, pp. 4566-4592.
  • L. Grokop, D. Tse, “Spectrum Sharing Between Wireless Networks”, IEEE/ACM Transactions on Networking , 18(5), 2010, pp. 1401-1412.
  • A. Ozgur, R. Johari, D. Tse and O. Leveque, “Information Theoretic Operating Regimes for Large Wireless Networks”, IEEE Transactions on Information Theory, vol. 56(1), Jan. 2010, pp. 427-437.
  • L. Grokop and D. Tse, “Diversity-Multiplexing Tradeoff of ISI Channels”, IEEE Transactions on Information Theory, VOL. 55(1), Jan. 2009, pp. 109-135.
  • S. Jing, D. Tse, J. Soriaga, J. Hou, J. Smee, and R. Padovani, “ Multicell Downlink Capacity with Coordinated Processing,” Journal on Wireless Communications and Networking, 2008.
  • R. Etkin, D. Tse and H. Wang, “Gaussian Interference Channel Capacity to Within One Bit”, IEEE Transactions on Information Theory, vol 54(12), Dec. 2008, pp. 5534 - 5562.
  • Ye Xia and D. Tse, “On the Large Deviations of Resequencing Queue Size: 2-M/M/1 Case” . IEEE Transactions on Information Theory, vol. 54, no. 9, September 2008. Page 4107-4118.
  • G. Bresler and D. Tse, “The Two-User Gaussian Interference Channel: A Deterministic View”, vol 19, European Transactions in Telecommunications, pp. 333-354, April 2008.
  • A. Ozgur, O. Leveque and D. Tse, “Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks”, IEEE Transactions on Information Theory, vol 53, no. 10, pp. 3549 - 3572, October 2007.
  • J. Tsao, D. Porrat and D. Tse, “Prediction and Modeling for the Time-Evolving Ultra-Wideband Channel” IEEE Journal of Selected Topics in Signal Processing, Volume 1, Issue 3, pp. 340-356, Oct. 2007.
  • R. Wilson, D. Tse and R. Scholtz,“Channel Identification: Secret Sharing using Reciprocity in UWB Channels”, IEEE Transactions on Information Forensics and Security, pp. 364-375, September 2007.
  • A. S. Avestimehr and D. Tse, “Outage capacity of the fading relay channel in the low-SNR regime,” IEEE Trans. Information Theory, vol. 53, no. 4, pp. 1401-1415, April 2007.
  • R. Etkin, A. Parekh, and D. Tse, “Spectrum sharing for unlicensed bands,” IEEE J. Selected Areas in Communications, vol. 25, no. 3, pp. 517-528, April 2007.
  • L. Zheng, D. Tse, and M. Medard, “Channel coherence in the low-SNR regime,” IEEE Trans. Information Theory, vol. 53, no. 3, pp. 976-997, March 2007.
  • M. Franceschetti, O. Dousse, D. Tse, and P. Thiran, “Closing the gap in the capacity of wireless networks via percolation theory,” IEEE Trans. Information Theory, vol. 53, no. 3, pp. 1009-1018, March 2007.
  • D. Porrat, D. Tse, and S. Nacu, “Channel uncertainty in ultra-wideband communication systems,” IEEE Trans. Information Theory, vol. 53, no. 1, pp. 194-208, Jan. 2007.
  • Y. Xia and D. Tse, “Inference of link delay in communication networks,” IEEE J. Selected Areas in Communications, vol. 24, no. 12, pp. 2235-2248, Dec. 2006.
  • M. Chen and D. Tse, “An upper bound on the convergence rate of uplink power control in DS-CDMA systems,” IEEE Communications Letters, vol. 10, no. 4, pp. 231-233, April 2006.
  • A. Poon, D. Tse and R. Brodersen, “Impact of Scattering on the Capacity, Diversity and Propagation Range of Multiple Antenna Channels”, IEEE Transactions on Information Theory, vol. 52(2), March 2006.
  • R. Etkin and D. Tse, “ Degrees of Freedom in Underspread MIMO Fading Channels”, IEEE Transactions on Information Theory, vol 52(3) March 2006.
  • S. Diggavi, M. Grossglauser and D. Tse, “ Even One-Dimensional Mobility Increases Adhoc Wireless Capacity” , IEEE Transactions on Information Theory, vol 51(11), Nov. 2005.
  • A. Poon, R. Brodersen and D. Tse, “Degrees of Freedom in Multiple Antenna Channels: A Signal Space Approach”, IEEE Transactions on Information Theory, vol.51, no.2, February 2005, pp. 523-536.
  • N. Laneman, D. Tse and G. Wornell, “ Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior”, IEEE Transactions on Information Theory, vol.50, no. 11, November 2004.
  • D. Tse, P. Viswanath and L. Zheng “Diversity-Multiplexing Tradeoff in Multiple Access Channels”, IEEE Transactions on Information Theory, vol.50, no.9, Sept. 2004, pp.1859-74.
  • A. Poon, D. Tse and R. Brodersen, “An Adaptive Multi-antenna Transceiver for Slowly Flat Fading Channels”, IEEE Transactions on Communications, vol.51, no.11, Nov. 2003, pp.1820-7.
  • M. Grossglauser and D. Tse, “A Time-Scale Decomposition Approach to Measurement-Based Admission Control”, IEEE/ACM Transactions on Networking, vol.11, no.4, Aug. 2003, pp.550-63.
  • P. Viswanath and D. Tse, “ Sum Capacity of the Multiple Antenna Gaussian Broadcast Channel and Uplink-Downlink Duality” , IEEE Transactions on Information Theory, vol 49(8), August, 2003, pp. 1912-1921.
  • L. Zheng and D. Tse, “Diversity and Multiplexing: A Fundamental Tradeoff in Multiple Antenna Channels” IEEE Transactions on Information Theory, vol. 49(5), May 2003.
  • M. Grossglauser and D. Tse, “Mobility Increases the Capacity of Adhoc Wireless Networks”, IEEE/ACM Transactions on Networking, August 2002.
  • P. Viswanath, D. Tse and R. Laroia, “Opportunistic Beamforming using Dumb Antennas”, IEEE Transactions on Information Theory, vol. 48(6), June, 2002.
  • C. Chuah, D. Tse, J. Kahn and R. Valenzuela, “Capacity Scaling in MIMO Wireless Systems under Correlated Fading”,IEEE Transactions on Information Theory, vol. 48(3), March 2002, pp. 637-650.
  • L. Zheng and D. Tse, “Communicating on the Grassmann Manifold: A Geometric Approach to Noncoherent Multi-antenna Channels”, IEEE Transactions on Information Theory , vol. 48(2), February 2002, pp. 359-383.
  • D. Starobinski , Tse D. Probabilistic methods for Web caching. Performance Evaluation, vol.46, no.2-3, Oct. 2001, pp.125-37.
  • S. Hanly and D. Tse, “Resource Pooling and Effective Bandwidths in CDMA Systems with Multiuser Receivers and Spatial Diversity”, IEEE Transactions on Information Theory , vol. 47(4), May 2001, pp. 1328-1351.
  • J. Zhang, E. Chong and D. Tse, “Output MAI Distributions of Linear MMSE Multiuser Receivers in CDMA Systems”, IEEE Transactions on Information Theory, vol. 47(3), March 2001, pp. 1128-1144.
  • P. Viswanath, D. Tse and V. Anantharam, “Asymptotically Optimal Waterfilling in Vector Multiple Access Channels”, IEEE Transactions on Information Theory, vol. 47(1), January 2001, pp. 241-267.
  • D. Tse and S. Verdu, “Optimum Asymptotic Multiuser Efficiency for Randomly Spread CDMA” , IEEE Transactions on Information Theory, vol. 46(7), November 2000, pp. 2718-2722.
  • J.S. Evans and D. Tse, “Large System Performance of Linear Multiuser Receivers in Multipath Fading Channels”, IEEE Transactions on Information Theory, vol. 46(6), Sept 2000, pp. 2059-2078.
  • Kiran and D. Tse, “Effective Bandwidths and Effective Interference for Linear Multiuser Receivers in Asynchronous CDMA Systems”, IEEE Transactions on Information Theory, vol 46(4), July 2000, pp. 1426-1447.
  • E. Telatar and D. Tse, “Capacity and Mutual Information of Wideband Multipath Fading Channels”, IEEE Transactions on Information Theory, vol 46(4), July 2000, pp. 1384-1400.
  • D. Tse and O. Zeitouni, “Linear Multiuser Receivers in Random Environments”, IEEE Transactions on Information Theory , vol 46(1), Jan. , 2000, pp. 171-188.
  • S. Hanly and D. Tse, “Power Control and Capacity of Spread-Spectrum Wireless Networks”, Automatica, vol.35, (no.12), Dec. 1999. p.1987-2012.
  • M. Grossglauser and D. Tse, “A Framework for Robust Measurement-Based Admission Control”, IEEE/ACM Transactions on Networking, v. 7, No. 3, June 1999, pp. 293-309.
  • P. Viswanath, V. Anantharam and D. Tse, “Optimal Sequences, Power Control and Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers”, IEEE Transactions on Information Theory, v. 45(6), Sept., 1999, pp. 1968-1983.
  • D. Tse and S. Hanly, “Linear Multiuser Receivers: Effective Interference, Effective Bandwidth and User Capacity”, IEEE Transactions on Information Theory, v.45, No. 2, Mar. 1999, pp. 641-657.
  • D. Tse and S. Hanly, “Multi-Access Fading Channels: Part I: Polymatroid Structure, Optimal Resource Allocation and Throughput Capacities”, IEEE Transactions on Information Theory, v. 44, No. 7, Nov., 1998, pp. 2796-2815.
  • S. Hanly and D. Tse,“Multi-Access Fading Channels: Part II: Delay-Limited Capacities”, IEEE Transactions on Information Theory,v. 44, No. 7, Nov., 1998, pp. 2816-2831.
  • M. Grossglauser, S. Keshav and D. Tse, “RCBR: A Simple and Efficient Service for Multiple Time-Scale Traffic “, IEEE/ACM Transactions on Networking, December 1997, pp. 741-755.
  • A. Elwalid, G. Freundlich, P. Gerhardt, H. Hagirahim, K.G. Ramakrishnan and D. Tse, “An Overview of the Multimedia Communications Exchange (MMCX) and its Performance Characterization”, Bell Laboratories Technical Journal, vol. 2, no. 2, 1997, pp. 15-30.
  • D. Tse, R.G. Gallager and J.N. Tsitsiklis, “Statistical Multiplexing of Multiple Time-scale Markov Streams”, IEEE Journal on Selected Areas in Communications, special issue on Advances in the Fundamentals of Networking, vol. 13, no. 6., Aug. 1995, pp. 1028-1039.
  • M.A. Dahleh, E.D. Sontag, D. Tse, J.N. Tsitsiklis, “Worst-Case Identification of Nonlinear Fading Memory Systems”, Automatica, vol.31, no. 3, Mar. 1995, pp. 503-508.
  • S.R. Kulkarni and D. Tse, “A Paradigm for Class Identification Problems”, IEEE Transactions on Information Theory, vol.40, no.1, May 1994, pp. 696-705.
  • D. Tse, M.A. Dahleh, J.N. Tsitsiklis, “Optimal Asymptotic Identification Under Bounded Disturbances”, IEEE Transactions on Automatic Control, vol.38, no.8, Aug. 1993, pp. 1176-90.
  • D. Tse and G.R. Heppler, “Shape Determination for Large Flexible Satellites via Stereo Vision”, AIAA Journal of Spacecraft and Rockets, vol. 29, no. 1, Jan-Feb. 1992.
Invited Publications
  • D. Tse, “It’s Easier to Approximate”, Information Theory Society Newsletter, March 2010, pp. 6-11. (This is an invited paper for the plenary talk I gave at the 2009 International Symposium on Information Theory.)
Refereed Conference Publications
  • Motahari, A.; Ramchandran, K.; Tse, D.; Nan Ma, “Optimal DNA shotgun sequencing: Noisy reads are as good as noiseless reads,” Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on , vol., no., pp.1640,1644, 7-12 July 2013
  • Jorgovanovic, M.; Weiner, M.; Tse, D.; Nikolic, B.; Wang, I.-H.; Nagpal, V., “Relay scheduling and interference cancellation for quantize-map-and-forward cooperative relaying,” Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on , vol., no., pp.1959,1963, 7-12 July 2013
  • Zhang, B.; Rajagopal, R.; Tse, D., “Risk Limiting Dispatch in congested networks,” Decision and Control (CDC), 2013 IEEE 52nd Annual Conference on , vol., no., pp.7568,7575, 10-13 Dec. 2013
  • Mohajer, S.; Motahari, A.; Tse, D., “Reference-based DNA shotgun sequencing: Information theoretic limits,” Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on , vol., no., pp.1635,1639, 7-12 July 2013
  • Kamath, S.; Tse, D., “On the Generalized Network Sharing bound and edge-cut bounds for network coding,” Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on , vol., no., pp.2735,2739, 7-12 July 2013
  • B. Zhang; Dominguez-Garcia, A.D.; Tse, D., “A local control approach to voltage regulation in distribution networks,” North American Power Symposium (NAPS), 2013 , vol., no., pp.1,6, 22-24 Sept. 2013
  • A. Lam, B. Zhang, D.Tse, “Distributed Algorithms for Optimal Power Flow”, IEEE Conference on Decision and Control, Dec. 2012.
  • J. Lavaei, D. Tse, B. Zhang, “Geometry of Power Flows in Tree Networks”, Power and Energy Society general meeting, July 2012
  • N. Ma, K. Ramchandran, D. Tse, “ A Compression Algorithm Using Mis-aligned Side-information”, IEEE International Symposium on Information Theory, July 2012.
  • C. Suh, I. Wang, D. Tse, “Two-Way Interference Channels”, IEEE International Symposium on Information Theory, July 2012.
  • A. Motahari, G. Bresler, D. Tse, “Information Theory of DNA Sequencing: Part I: A Basic Model”, IEEE International Symposium on Information Theory, July 2012.
  • G. Bresler, D. Cartwright, D. Tse, “Settling the feasibility of interference alignment for the MIMO interference channel: the symmetric square case”, ITW, Brazil, 2011.
  • Y. Kanoria, A. Montanari, D. Tse and B. Zhang, “Distributed Storage for Intermittent Energy Sources: Control Design and Performance Limits”, Allerton conference, 2011.
  • B. Zhang and D. Tse, “Geometry of Feasible Injection Region of Power Networks”, Allerton Conference, 2011.
  • I. Wang, S. Kamath, D. Tse, “Two Unicast Information Flows over Linear Deterministic Networks”, ISIT 2011.
  • N. Ma, K. Ramchandran, D. Tse, “Efficient File Synchronization: a Distributed Source Coding Approach”, IEEE International Symposium on Information Theory (ISIT), 2011.
  • F. Baccelli, A. El Gamal, D. Tse, “Interference Networks with Point-to-Point Codes”, IEEE International Symposium on Information Theory (ISIT), 2011.
  • Mohammad Ali Maddah-Ali, D.Tse, “Interference Neutralization in Distributed Lossy Source Coding”, IEEE International Symposium on Information Theory, June, 2010.
  • Venkat Chandar, Aslan Tchamkerten, D.Tse, “Asynchronous Capacity per Unit Cost”, IEEE International Symposium on Information Theory, June, 2010.
  • Oliver Kosut, Lang Tong, D.Tse, “Polytope Codes Against Adversaries in Networks”, IEEE International Symposium on Information Theory, June, 2010.
  • I-Hsiang Wang, D.Tse, “Interference Mitigation Through Limited Transmitter Cooperation”, IEEE International Symposium on Information Theory, June, 2010.
  • Urs Niesen, Piyush Gupta, D.Tse, “ On the Optimality of Multi-Hop Communication in Large Wireless Networks”, IEEE International Symposium on Information Theory, June, 2010.
  • I-Hsiang Wang; Tse, D., “Interference mitigation through limited receiver cooperation: Symmetric case”, IEEE Information Theory Workshop 2009, pp. 579-583.
  • Minero, P.; Tse, D.; Franceschetti, M.; “A broadcast approach to random access”, IEEE Information Theory Workshop 2009, pp. 615-619.
  • ** Bresler, G.** and Tse, D., “3 User interference channel: Degrees of freedom as a function of channel diversity”, 47th Annual Allerton Conference on Communication, Control, and Computing, 2009, pp. 265 - 271.
  • Kosut, O.; Lang Tong; Tse, D, “Nonlinear network coding is necessary to combat general Byzantine attacks”, 47th Annual Allerton Conference on Communication, Control, and Computing, 2009, pp. 593-599.
  • Mohajer, S.; Diggavi, S.N.; Fragouli, C.; Tse, D., “Capacity of deterministic Z-chain relay-interference network”, IEEE Information Theory Workshop on Networking and Information Theory, 2009, pp. 331 - 335.
  • Berry, R.A.; Tse, D., “Information theory meets game theory on the interference channel”, IEEE Information Theory Workshop on Networking and Information Theory, 2009, pp. 140-144.
  • Changho Suh; Tse, D.,“Symmetric feedback capacity of the Gaussian interference channel to within one bit” IEEE International Symposium on Information Theory, 2009, pp. 1609 - 1613. (This paper won the Best Student Paper Award of the conference.)
  • Maddah-Ali, M.A. and Tse, D., “Approximating the rate-distortion region of the distributed source coding for three jointly Gaussian tree-structured sources”, IEEE International Symposium on Information Theory, 2009, pp. 1468-1472.
  • Mohajer, S., Tse, D. and Diggavi, S.N., “Approximate capacity of a class of Gaussian relay-interference networks”, IEEE International Symposium on Information Theory, 2009, pp.31-35.
  • Nagpal, V.; Pawar, S.; Tse, D.; Nikolic, B., “Cooperative multiplexing in the multiple antenna half duplex relay channel”, IEEE International Symposium on Information Theory, 2009, pp. 1438 - 1442.
  • A. Ozgur and D. Tse , “Achieving linear scaling with interference alignment”, IEEE International Symposium on Information Theory, 2009, pp. 1754-58.
  • Mohajer, S.; Diggavi, S.N.; Fragouli, C.; Tse, D., “Transmission techniques for relay-interference networks”, 46th Annual Allerton Conference on Communication, Control, and Computing, 2008, pp. 467 - 474.
  • Changho Suh; Tse, D., “Interference Alignment for Cellular Networks”, 46th Annual Allerton Conference on Communication, Control, and Computing, 2008, pp. 1037-1044.
  • I-Hsiang Wang; Tse, D., “Gaussian interference channels with multiple receive antennas: Capacity and generalized degrees of freedom”, 46th Annual Allerton Conference on Communication, Control, and Computing, 2008, pp. 715-722.
  • Avestimehr, A.S.; Sezgin, A.; Tse, D., “Approximate capacity of the two-way relay channel: A deterministic approach”, 46th Annual Allerton Conference on Communication, Control, and Computing, 2008, pp.1582-89.
  • Pawar, S.; Avestimehr, A.S.; Tse, D., “Diversity-multiplexing tradeoff of the half-duplex relay channel”, 46th Annual Allerton Conference on Communication, Control, and Computing, 2008, pp. 27-33.
  • Ayfer Ozgur, Ramesh Johari, D.Tse, Olivier Leveque, “Information Theoretic Operating Regimes of Large Wireless Networks”, IEEE International Symposium on Information Theory, Toronto, Canada, July 2008
  • R. Berry and D.Tse, “Information Theoretic Games on Interference Channels”, IEEE International Symposium on Information Theory, Toronto, Canada, July 2008
  • A.S. Avestimehr, S. Diggavi and D. Tse, “Approximate Capacity of Gaussian Relay Channels”, IEEE International Symposium on Information Theory, Toronto, Canada, July 2008
  • R.D. Yates, D. Tse and Z. Li, , “Secrecy Capacity of Interference Channels”, IEEE International Symposium on Information Theory, Toronto, Canada, July 2008
  • A. Poon and D.Tse, “Polarization Degrees of Freedom”, IEEE International Symposium on Information Theory, Toronto, Canada, July 2008
  • Avestimehr, S.; Diggavi, S.N.; Tse, D.,“Information flow over compound wireless relay networks”, IEEE International Zurich Seminar onCommunications, 2008, pp. 92-92.
  • L. Grokop and D. Tse, “ Spectrum Sharing Between Wireless Networks”, IEEE Infocom Conference, Phoenix, April 2008.
  • V. Prabhakran, S. Diggavi and D. Tse, “Broadcasting with Common Messages: A Deterministic Approach”, Allerton Conference, Sept. 2007.
  • L. Grokop, D. Tse, “Fundamental Constraints of Multicast Capacity Regions”, Allerton Conference, Sept. 2007.
  • A. S. Avestimehr, S. Diggavi and D. Tse, “A Deterministic Model for Wireless Relay Networks and its Applications”, Information Theory Workshop, Bergen, Norway, July 2007.
  • S. Jing, D. Tse, J. Soriaga, J. Hou, J. Smee, R. Padovani, “Downlink Macro-Diversity in Cellular Networks”, IEEE International Symposium on Information Theory, June 2007.
  • V. Prabhakran, D. Tse and K. Ramchandran, “Channel coding with strictly-causal colored side-information at transmitter”, IEEE International Symposium on Information Theory, June 2007.
  • A. Ozgur, O. Leveque and D. Tse, “Exact Capacity Scaling of Extended Wireless Networks”, IEEE International Symposium on Information Theory, June 2007.
  • R. Etkin, D. Tse and H. Wang, “Gaussian Interference Channel Capacity to Within One Bit: the General Case”, IEEE International Symposium on Information Theory, June 2007.
  • P. Minero and D. Tse, “A Broadcast Approach to Multiple Access with Random States”, IEEE International Symposium on Information Theory, June 2007.
  • E. Telatar and D. Tse, “Bounds on the capacity region of a class of interference channels”, IEEE International Symposium on Information Theory, June 2007.
  • Yang, J.; Brodersen, R. W.; Tse, D., “Addressing the Dynamic Range Problem in Cognitive Radios” ICC ‘07 IEEE International Conference on Communications, 24-28 June 2007 Page(s):5183 - 5188.
  • Ozgur, A.; Leveque, O.; Tse, D., “Hierarchical Cooperation Achieves Linear Capacity Scaling in Ad Hoc Networks”, INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE May 2007 Page(s):382 - 390
  • R. Etkin, D. Tse, Hua Wang, “Gaussian Interference Channel Capacity to Within One Bit: the Symmetric Case”, Information Theory Workshop, Chengdu. IEEE, 22-26 Oct. 2006 Page(s):601 - 605
  • Montanari, A.; Tse, D., Non-Coherent LDPC Decoding on Graphs, Information Theory Workshop, Oct. 2006 Page(s):122 - 126
  • R. Etkin, Parekh, A.; Tse, D.;“Spectrum sharing for unlicensed bands”, New Frontiers in Dynamic Spectrum Access Networks, DySPAN, 8-11 Nov. 2005 Page(s):251 - 258.
  • Avestimehr, A.S.; Tse, D., Outage-optimal relaying in the low SNR regime, Information Theory, 2005. ISIT 2005. Proceedings. International Symposium on, 4-9 Sept. 2005 Page(s):941 - 945
  • S. N. Diggavi and D. Tse, “Fundamental limits of diversity-embedded codes over fading channels,” in Proc. 2005 IEEE Intl. Symp. on Information Theory (ISIT), Piscataway, NJ: IEEE Press, 2005, pp. 510-514.
  • Lizhong Zheng; Tse, D.; Medard, M.; On the costs of channel state information, Information Theory Workshop, 2004. IEEE 24-29 Oct. 2004 Page(s):423 - 427
  • V. Prabhakran, K. Ramchandran and D. Tse, “On the Role of Interaction between Sensors in the CEO Problem”, Proc. Allerton Conference, Oct 2004.
  • L. Grokop, D. Tse, “Diversity-Multiplexing tradeoff in ISI channels”, IEEE International Symposium on Information Theory, June 2004, p. 97.
  • V. Prabhakran, D. Tse and K. Ramchandran, “Rate Region of the Quadratic Gaussian CEO Problem”, IEEE International Symposium on Information Theory, June 2004, p. 119.
  • L. Zheng, D. Tse and M. Medard “Channel Coherence in the Low SNR Regime”, IEEE International Symposium on Information Theory, June 2004, p. 416.
  • M. Franceschetti, O. Dousse, D. Tse, P. Thiran, “Closing the gap in the capacity of random wireless networks”, IEEE International Symposium on Information Theory, June 2004, p. 438.
  • A.S.Y. Poon, R.W. Brodersen and D. Tse, “A spatial channel model for multiple-antenna systems”, IEEE Antennas and Propagation Society Symposium, Volume: 4 , June 20-25, 2004 Pages:3665 - 3668.
  • A.S.Y. Poon, R.W. Brodersen and D. Tse, “The signal dimensions in multiple-antenna channels”, IEEE Global Telecommunications Conference (GLOBECOM),Volume: 3 , 1-5 Dec. 2003 Pages:1247 - 1251.
  • D. Tse and P. Viswanath, “On the capacity region of the vector gaussian broadcast channel”, IEEE International Symposium on Information Theory, 29 June-4 July 2003, Pages:342 - 342
  • D. Tse, P. Viswanath and L. Zheng, “Diversity-multiplexing tradeoff for multiaccess channels”, IEEE International Symposium on Information Theory, 29 June-4 July 2003
  • R. Etkin and D. Tse, “Degrees of freedom in underspread mimo fading channels”,IEEE International Symposium on Information Theory, 29 June-4 July 2003 Pages:323 - 323
  • Xia Ye and D. Tse, “Analysis on packet resequencing for reliable network protocols”. IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies vol.2, 2003, pp.990-1000.
  • A.S.Y. Poon, D. Tse and R.W. Brodersen, “Multiple-antenna channels from a combined physical and networking perspective”, IEEE Thirty-Sixth Conference on Signals, Systems and Computers, Part vol.2, 2002, pp.1528-32.
  • P. Viswanath, D. Tse and R. Laroia, “Opportunistic beamforming using dumb antennas”, IEEE International Symposium on Information Theory. IEEE. 2002, pp.449.
  • D. Tse and P. Viswanath, “Uplink-Downlink Duality and Effective Bandwidths”, IEEE International Symposium on Information Theory, 2002.
  • P. Viswanath and D. Tse, “Sum Capacity of the Multiple Antenna Broadcast Channel”, IEEE International Symposium on Information Theory, 2002.
  • L. Zheng and D. Tse, “Optimal Diversity-multiplexing tradeoff and Error Exponents”, IEEE International Symposium on Information Theory 2002.
  • S. Diggavi, M. Grossglauser and D. Tse, “Even One-Dimensional Mobility Increases Ad-hoc capacity”, IEEE International Symposium on Information Theory 2002.
  • L. Zheng and D. Tse, “Optimal Diversity-Multiplexing Tradeoff in Multi-Antenna Channels”, Allerton Conference, Oct 2001.
  • N. Laneman, D. Tse and G. Wornell, “An Efficient Protocol for Realizing Cooperative Diversity in Wireless Networks”, ISIT 2001.
  • L. Zheng and D. Tse, “The Noncoherent Block Fading Channel: A Degree of Freedom View”, ISIT 2001.
  • M. Grossglauser and D. Tse, “Mobility Increases the Capacity of Wireless Adhoc Networks” , Infocom 2001. (This work won the Best Paper Award at the conference.)
  • L. Zhang and D. Tse, “Communicating on the Grassman Manifold: A Geometric Approach to Multi-antenna Fading Channels”, International Symposium on Information Theory, Sorrento, Italy, June 2000.
  • P. Viswanath, D. Tse and V. Anantharam, “Asymptotically Optimal Waterfilling in Multiple Antenna Multiple Access Channels”, International Symposium on Information Theory, Sorrento, Italy, June 2000.
  • S.V. Hanly and D. Tse, “A Resource Pooling Result for a CDMA Antenna Array”, International Symposium on Information Theory, Sorrento, Italy, June 2000.
  • J. Zhang, E. Chong and D. Tse, “Distributions of the Output MAI of Linear MMSE Multiuser Receivers in CDMA Systems”, International Symposium on Information Theory, Sorrento, Italy, June 2000.
  • L. Zheng and D. Tse, “Packing Spheres into the Grassman Manifold: A Geometric Approach to Multi-antenna Fading Channels”, Proc. of Allerton Conference, Monticello, IL, Sept 1999.
  • D. Tse, “Multiuser Receivers, Random Matrices and Free Probability”, Proc. of Allerton Conference, Monticello, IL, Sept 1999.
  • P. Ho, D. Tse and J. Walrand, “Stability of Multilane Input-Buffered Switches with Markov Modulated Arrival Processes”, Proc. of Allerton Conference, Monticello, IL, Sept 1999.
  • S. Hanly and D. Tse, “Resource pooling and effective bandwidths for a CDMA link with spatial diversity” Proc. of Allerton Conference, Monticello, IL, Sept 1999.
  • N. Zhang, A. Poon, R. Brodersen, D. Tse and S. Verd\‘{u}, “Trade-offs of Performance and Single-Chip Implementation of Indoor Wireless Multi-access receivers, “ Proc. of WCNC, New Orleans, Sept. 1999.
  • J. Evans and D. Tse, “Linear Multiuser Receivers for Multipath Fading Channels”, Proc. of Information Theory Workshop, Kruger National Park, South Africa, June 1999.
  • D. Tse and O. Zeitouni, “Performance of Linear Multiuser Receivers in Random Environments”, Proc. of Communication Theory Mini-Conference, ICC, Vancouver, Canada, June 1999.
  • M. Grossglauser and D. Tse, “A Time-Scale Decomposition Approach to Measurement-Based Admission Control”, Proceedings of Infocom, New York City, March 1999.
  • D. Tse and S. Verd\‘{u}, “Optimum Multiuser Asymptotic Efficiency of CDMA with Random Spreading,” Proc. 1999 IEEE Information Theory Workshop on Detection, Estimation, Classification and Imaging, p. 28, Feb. 24-26, 1999, Santa Fe, NM.
  • C. Chuah, D. Tse and J.M. Kahn, “Capacity of Multi-Antenna Array Systems in Indoor Wireless Environment”, Proc. of IEEE Globecom, Sydney, Australia, November 8-12, 1998.
  • S. Hanly and D. Tse, “Multi-access Fading Channels: Delay-Limited Capacity”, Proceedings of IEEE International Symposium on Information Theory, Boston, August 1998, p. 397.
  • E. Telatar and D. Tse, “Capacity and Mutual Information of Broadband Multipath Fading Channels”, Proc. of IEEE International Symposium on Information Theory, Boston, August 1998, p. 395.
  • P. Viswanath, V. Anantharam and D. Tse, “Capacity of a Power-Controlled CDMA System with Linear Receivers”, Proc. of IEEE International Symposium on Information Theory, Boston, August 1998, p. 121
  • S. Hanly and D. Tse, “Min-Max Power Allocation for Successive Decoding”, Proc. of IEEE Information Theory Workshop, Killarney, Ireland, June 1998, pp. 56-57.
  • P. Viswanath, V. Anantharam and D. Tse, “ Optimal Sequence, Power Control and Capacity of Synchronous CDMA Systems with Linear Multiuser Receivers”, Proc. of IEEE Information Theory Workshop, Killarney, Ireland, June 1998, pp. 134-135.
  • Kiran and D. Tse, “Effective Bandwidths and Effective Interference for Linear Multiuser Receivers in Asynchronous Channels”, Proc. of IEEE Information Theory Workshop, Killarney, Ireland, June 1998, p. 141-142.
  • D. Tse and S. Hanly, “Effective Bandwidths in Wireless Networks with Multiuser Receivers”, Proc. of INFOCOM Conference, 1998. (This work received the Best Paper Award of the conference.)
  • M. Grossglauser and D. Tse, “ Measurement-based Call Admission Control: A Heavy Traffic Framework”, Proc. of IEEE Conference on Decision and Control, San Diego, December 1997, pp. 1792-1797.
  • D. Tse and S. Hanly, “Multiuser Demodulation: Effective Interference, Effective Bandwidths and Capacity”, Proc. of Allerton Conference, 1997.
  • M. Grossglauser and D. Tse, “A Framework for Robust Measurement-based Admission Control”, Proc. of ACM SIGCOMM, Cannes, France, 1997.
  • D. Tse, “Optimal Power Allocation over Parallel Broadcast Channels”, Proc. of International Symposium for Information Theory, Ulm, Germany, 1997, p. 27.
  • D. Tse and M. Grossglauser, “Measurement-Based Call Admission Control: Analysis and Simulations”, Proceedings of IEEE Infocom 1997, Kobe, Japan.
  • D. Tse, “Asymptotic Optimality of a Measurement-Based Admission Control Scheme”, Proceedings of the 34th Allerton Conference, Monticello, IL, Oct. 1996.
  • D. Tse and S. Hanly, “Capacity Region of the Multi-Access Fading Channel under Dymanic Resource Allocation and Polymatroid Optimization”, Proceedings of 1996 IEEE Information Theory Workshop, Haifa, Israel, June 1996, p. 37.
  • S. V. Hanly and D.N. Tse, “Multi-Access Fading Channels: Shannon and Delay-Limited Capacities”, Proc. of the 33rd Allerton Conference, Monticello, IL, Oct., 1995.
  • M. Grossglauser, S. Keshav and D. Tse, “RCBR: A Simple and Efficient Service for Multiple Time-Scale Traffic”, Proc. of ACM Sigcomm’95, Boston MA, Aug. 1995, pp. 219-230.
  • D. Tse, R.G. Gallager and J.N. Tsitsiklis, “Variable-rate Loss Compression Under Delay Constraints,” presented at the IEEE Information Theory Workshop on Information Theory, Multi-acess and Queueing, St. Louis, Missouri, April 1995.
  • M. Grossglauser, S. Keshav and D. Tse, “ The case against variable bit-rate services”, Proceedings of 5th Workshop on Network and Operating System Support for Digital Audio and Video, Durham, H.H., April, 1995, pp. 307-310.
  • D. Tse, R.G. Gallager and J.N. Tsitsiklis, “Statistical Multiplexing of Multiple Time-scale Sources”, Proceedings of the 3rd INFORMS Telecommunications Conference, Boca Raton, Florida, March 1995, p. 21.
  • D. Tse, R.G. Gallager, J.N. Tsitsiklis, “Variable-Rate Lossy Compression of Markov Sources Under Buffer Constraints”, Proceedings of IEEE Int. Symposium of Information Theory, Trondheim, Norway, 1994.
  • D. Tse, R.G. Gallager, J.N. Tsitsiklis, “Optimal Buffer Control for Variable-Rate Lossy Compression”, Proceedings of the 31st Allerton Conference, Sept. 1993.
  • D. Tse, M.A. Dahleh, J.N. Tsitsiklis, “Worst-Case Asymptotic Identification of Stable and Unstable Systems”, Proceedings of the 1992 American Automatic Control Conference.
  • S.R. Kulkarni and D. Tse, “A Paradigm for Class Identification Problems”, Proceedings of the Princeton Conference on Information Sciences and Systems, pp. 442-447, March, 1992.
  • D. Tse, M.A. Dahleh, J.N. Tsitsiklis, “Optimal Asymptotic Identification Under Bounded Disturbances”, Proceedings of the 1991 Conference on Decision and Control Systems, Brighton, U.K., pp. 623-628, Dec. 1991.
  • A.K.C. Wong, D. Tse, G.R. Heppler, K. Reub, “Robotic Vision Technology for Space Station and Satellite Applications” Proceedings of the 42nd Congress of the International Astronautical Federation, Oct. 7-11, 1991, Montreal, Canada.
  • D. Tse, M.A. Dahleh, J.N. Tsitsiklis, “Robust and Optimal Identification in the $\ell_1$ Norm”, Proceedings of the 1991 American Control Conference, Boston, pp. 1786-1787, June, 1991.
  • D. Tse, M.A. Dahleh, J.N. Tsitsiklis, “Optimal Asymptotic Worst-case Identification with applications on $\ell_1$ and the gap metrics”, in Recent Advances in Mathematical theory of Systems, Control, Networks and Signal Processing, vol.I, eds. H. Kimura, S. Kodama, pp. 325-330, 1991.
  • D. Tse, M.A. Dahleh, J.N. Tsitsiklis, “Worst-Case Identification For Robust Control”, in Control of Uncertain Dynamic Systems, eds. S.P. Bhattacharya, L.H.Keel, pp. 311-328, March, 1991.
Invited Conference Publications
  • R. Rajagopal, D. Tse and B. Zhang, “Risk-Limited Dispatch- Part I: Formulation and Price of Uncertainty”, Allerton Conference, Oct. 2012.
  • R. Rajagopal, D. Tse and B. Zhang, “Risk-Limited Dispatch- Part 2: Effect of Congestion”, Allerton Conference, Oct. 2012.
  • D. Tse, “How Not to Leave Money on the Table: Interference, Feedback and Side-Information”, The 2nd Annual International Technion Computer Engineering (TCE) Conference, June 2012.
  • D. Tse, “Geometry of Power Flows and its Application to the Voltage Regulation Problem”, CNLS annual conference on Optimization and Control of Smart Grids, May 2012.
  • D. Tse, “To Feedback or Not to Feedback”, Communication Theory Workshop, May 2012.
  • D. Tse, “Information Theory of DNA Sequencing”, Conference on Information Systems and Science, March 2012.
  • D. Tse, “Information Theory: From Wireless Communication to DNA Sequencing”, National Academy of Engineering Gilbreth Lecture, February 2012.
  • G. Bresler, D. Cartwright, D. Tse, “Geometry of the 3-user MIMO interference channel”, Allerton Conference, 2011.
  • Mohammad Ali Maddah-Ali, D. Tse, “Completely Stale Transmitter Channel State Information is Still Very Useful”, Allerton Conference, Sept. 2010.
  • Ozgur, A., Leveque, O. and Tse, D., “Linear capacity scaling in wireless networks: Beyond physical limits?” Information Theory and Applications Workshop (ITA), Jan. 2010 , pp. 1-10
  • Mohajer, S.; Diggavi, S.N.; Fragouli, C.; Tse, D., “Transmission techniques for relay-interference networks”, 46th Annual Allerton Conference on Communication, Control, and Computing, 2008, pp. 467 - 474.
  • Tse, D.; Yates, R.; Zang Li, “Fading broadcast channels with state information at the receivers” 46th Annual Allerton Conference on Communication, Control, and Computing, 2008, pp. 221-227.
  • Avestimehr, S.; Diggavi, S.N.; Tse, D.,“Information flow over compound wireless relay networks”, IEEE International Zurich Seminar onCommunications, 2008, pp. 92-92.
  • A. S. Avestimehr, S. Diggavi and D. Tse, “Wireless Network Information Flow”, Allerton Conference, Sept. 2007.
  • A. S. Avestimehr, S. Diggavi and D. Tse, “A Deterministic Approach to Relay Networks”, Allerton Conference, Sept. 2007.
  • D. Tse, “A Deterministic Model for Wireless Channels and its Applications”, Information Theory Workshop, Lake Tahoe, Sept 2007.
  • A. S. Avestimehr, S. Diggavi and D. Tse, “A Deterministic Model for Wireless Relay Networks and its Applications”, Information Theory Workshop, Bergen, Norway, July 2007.
  • S. Diggavi and D. Tse, “On the Successive Refinement of Diversity”, Proc. Allerton Conference, Oct. 2004.
  • S. Raj, E. Telatar and D. Tse, “Job Scheduling and Multiple Access”, DIMACS Workshop on Information Theory, 2003.
  • D. Porrat and D. Tse, “Bandwidth Scaling in Ultra Wideband Communications,” Allerton Conference on Communication, Control, and Computing, October 2003.
  • D.Tse, “Diversity and freedom: a fundamental tradeoff in wireless systems”, 4th IEEE Workshop on Signal Processing Advances in Wireless Communications - SPAWC 2003. (plenary talk)
  • D. Tse and P. Viswanath, “On the capacity of the multiple antenna broadcast channel”, Multiantenna Channels: Capacity, Coding and Signal Processing. DIMACS Workshop. American Math. Soc. 2003, pp.87-105.
  • , D. Tse, “Mobilize”, Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Sophia-Antipolis, France, March 2003. (plenary talk)
  • D. Tse, P. Viswanath and L. Zheng, “Multiple Antennas: A Network View” DIMACS Workshop on Signal Processing for Wireless Communications, Oct. 2002.
  • L. Zheng and D. Tse, ìThe Diversity-Multiplexing Tradeoff for Non-coherent Multiple Antenna Channelsî, Proc. Allerton Conference, 2002
  • D. Tse, “ Multiuser Diversity Through Proportional Fair Scheduling”, Communication Theory Workshop, May 2001.
  • P. Viswanath, D. Tse and R. Laroia, “Opportunistic Beamforming Using Dumb Antennas”, Communication Theory Workshop, May 2001.
  • D. Tse, “Multiuser Receivers, Random Matrices and Free Probability”, Proc. of Allerton Conference, Monticello, IL, Sept 1999.