Skip to main content

Showing 1–22 of 22 results for author: Tse, D N

.
  1. arXiv:1906.04356  [pdf, other

    cs.LG cs.DS cs.IT stat.ML

    Ultra Fast Medoid Identification via Correlated Sequential Halving

    Authors: Tavor Z. Baharav, David N. Tse

    Abstract: The medoid of a set of n points is the point in the set that minimizes the sum of distances to other points. It can be determined exactly in O(n^2) time by computing the distances between all pairs of points. Previous works show that one can significantly reduce the number of distance computations needed by adaptively querying distances. The resulting randomized algorithm is obtained by a direct c… ▽ More

    Submitted 4 November, 2019; v1 submitted 10 June, 2019; originally announced June 2019.

    Comments: NeurIPS 2019

  2. arXiv:1805.08321  [pdf, other

    cs.LG cs.DS cs.IT stat.CO stat.ML

    Bandit-Based Monte Carlo Optimization for Nearest Neighbors

    Authors: Vivek Bagaria, Tavor Z. Baharav, Govinda M. Kamath, David N. Tse

    Abstract: The celebrated Monte Carlo method estimates an expensive-to-compute quantity by random sampling. Bandit-based Monte Carlo optimization is a general technique for computing the minimum of many such expensive-to-compute quantities by adaptive random sampling. The technique converts an optimization problem into a statistical estimation problem which is then solved via multi-armed bandits. We apply th… ▽ More

    Submitted 28 April, 2021; v1 submitted 21 May, 2018; originally announced May 2018.

    Comments: Accepted to the IEEE Journal on Selected Areas in Information Theory (JSAIT) - Special Issue on Sequential, Active, and Reinforcement Learning

  3. arXiv:1705.04732  [pdf, other

    cs.IT

    Fundamental Limits of DNA Storage Systems

    Authors: Reinhard Heckel, Ilan Shomorony, Kannan Ramchandran, David N. C. Tse

    Abstract: Due to its longevity and enormous information density, DNA is an attractive medium for archival storage. In this work, we study the fundamental limits and tradeoffs of DNA-based storage systems under a simple model, motivated by current technological constraints on DNA synthesis and sequencing. Our model captures two key distinctive aspects of DNA storage systems: (1) the data is written onto many… ▽ More

    Submitted 12 May, 2017; originally announced May 2017.

    Comments: To appear in Proc. of IEEE International Symposium on Information Theory (ISIT). Slightly extended version containing the proofs

  4. arXiv:1605.01941  [pdf, other

    cs.IT q-bio.GN

    Partial DNA Assembly: A Rate-Distortion Perspective

    Authors: Ilan Shomorony, Govinda M. Kamath, Fei Xia, Thomas A. Courtade, David N. Tse

    Abstract: Earlier formulations of the DNA assembly problem were all in the context of perfect assembly; i.e., given a set of reads from a long genome sequence, is it possible to perfectly reconstruct the original sequence? In practice, however, it is very often the case that the read data is not sufficiently rich to permit unambiguous reconstruction of the original sequence. While a natural generalization o… ▽ More

    Submitted 6 May, 2016; originally announced May 2016.

    Comments: To be published at ISIT-2016. 11 pages, 10 figures

  5. arXiv:1105.6326  [pdf, other

    cs.IT

    Two Unicast Information Flows over Linear Deterministic Networks

    Authors: I-Hsiang Wang, Sudeep U. Kamath, David N. C. Tse

    Abstract: We investigate the two unicast flow problem over layered linear deterministic networks with arbitrary number of nodes. When the minimum cut value between each source-destination pair is constrained to be 1, it is obvious that the triangular rate region {(R_1,R_2):R_1,R_2> 0, R_1+R_2< 1} can be achieved, and that one cannot achieve beyond the square rate region {(R_1,R_2):R_1,R_2> 0, R_1< 1,R_2< 1}… ▽ More

    Submitted 31 May, 2011; originally announced May 2011.

    Comments: Extended version of the conference paper to be presented at ISIT 2011

  6. arXiv:1007.1756  [pdf, ps, other

    cs.IT cs.GT

    Shannon Meets Nash on the Interference Channel

    Authors: Randall A. Berry, David N. C. Tse

    Abstract: The interference channel is the simplest communication scenario where multiple autonomous users compete for shared resources. We combine game theory and information theory to define a notion of a Nash equilibrium region of the interference channel. The notion is game theoretic: it captures the selfish behavior of each user as they compete. The notion is also information theoretic: it allows each u… ▽ More

    Submitted 13 July, 2010; v1 submitted 10 July, 2010; originally announced July 2010.

    Comments: 41 pages, 10 figures, submitted to IEEE Transactions on Information Theory, May 2010. Added Figure 6

  7. arXiv:1005.0404  [pdf, ps, other

    cs.IT

    Approximate Capacity of Gaussian Interference-Relay Networks with Weak Cross Links

    Authors: Soheil Mohajer, Suhas N. Diggavi, Christina Fragouli, David N. C. Tse

    Abstract: In this paper we study a Gaussian relay-interference network, in which relay (helper) nodes are to facilitate competing information flows over a wireless network. We focus on a two-stage relay-interference network where there are weak cross-links, causing the networks to behave like a chain of Z Gaussian channels. For these Gaussian ZZ and ZS networks, we establish an approximate characterization… ▽ More

    Submitted 3 May, 2010; originally announced May 2010.

    Comments: 66 pages, 19 figures, submitted to IEEE Trans. on Information Theory

  8. arXiv:1004.5421  [pdf, other

    cs.IT

    Interference Mitigation through Limited Transmitter Cooperation

    Authors: I-Hsiang Wang, David N. C. Tse

    Abstract: Interference limits performance in wireless networks, and cooperation among receivers or transmitters can help mitigate interference by forming distributed MIMO systems. Earlier work shows how limited receiver cooperation helps mitigate interference. The scenario with transmitter cooperation, however, is more difficult to tackle. In this paper we study the two-user Gaussian interference channel wi… ▽ More

    Submitted 29 April, 2010; originally announced April 2010.

    Comments: Submitted to Special Issue of the IEEE Transactions on Information Theory on Interference Networks.

  9. Random Access: An Information-Theoretic Perspective

    Authors: Paolo Minero, Massimo Franceschetti, David N. C. Tse

    Abstract: This paper considers a random access system where each sender can be in two modes of operation, active or not active, and where the set of active users is available to a common receiver only. Active transmitters encode data into independent streams of information, a subset of which are decoded by the receiver, depending on the value of the collective interference. The main contribution is to pre… ▽ More

    Submitted 16 December, 2009; originally announced December 2009.

    Comments: 48 pages, 9 figures. Submitted to IEEE Transactions on Information Theory. Preliminary version presented at IEEE Information Theory Workshop, Taormina, Sicily, October 2009

  10. arXiv:0911.2053  [pdf, other

    cs.IT

    Interference Mitigation Through Limited Receiver Cooperation

    Authors: I-Hsiang Wang, David N. C. Tse

    Abstract: Interference is a major issue limiting the performance in wireless networks. Cooperation among receivers can help mitigate interference by forming distributed MIMO systems. The rate at which receivers cooperate, however, is limited in most scenarios. How much interference can one bit of receiver cooperation mitigate? In this paper, we study the two-user Gaussian interference channel with confere… ▽ More

    Submitted 11 November, 2009; originally announced November 2009.

    Comments: Submitted to IEEE Transactions on Information Theory. 69 pages, 14 figures

  11. arXiv:0908.1948  [pdf, other

    cs.IT

    Interference Mitigation Through Limited Receiver Cooperation: Symmetric Case

    Authors: I-Hsiang Wang, David N. C. Tse

    Abstract: Interference is a major issue that limits the performance in wireless networks, and cooperation among receivers can help mitigate interference by forming distributed MIMO systems. The rate at which receivers cooperate, however, is limited in most scenarios. How much interference can one bit of receiver cooperation mitigate? In this paper, we study the two-user Gaussian interference channel with… ▽ More

    Submitted 20 August, 2009; v1 submitted 13 August, 2009; originally announced August 2009.

    Comments: To appear in IEEE Information Theory Workshop, Taormina, October 2009. Final version

  12. arXiv:0812.1597  [pdf, ps, other

    cs.IT

    Transmission Techniques for Relay-Interference Networks

    Authors: Soheil Mohajer, Suhas N. Diggavi, Christina Fragouli, David N. C. Tse

    Abstract: In this paper we study the relay-interference wireless network, in which relay (helper) nodes are to facilitate competing information flows over a wireless network. We examine this in the context of a deterministic wireless interaction model, which eliminates the channel noise and focuses on the signal interactions. Using this model, we show that almost all the known schemes such as interference… ▽ More

    Submitted 8 December, 2008; originally announced December 2008.

    Comments: 8 pages, 8 figures, presented at 46. Allerton Conf. On Comm., Control, and Computing 2008

  13. arXiv:0810.2133  [pdf, ps, other

    cs.IT

    Diversity-Multiplexing Tradeoff of the Half-Duplex Relay Channel

    Authors: Sameer Pawar, Amir Salman Avestimehr, David N. C. Tse

    Abstract: We show that the diversity-multiplexing tradeoff of a half-duplex single-relay channel with identically distributed Rayleigh fading channel gains meets the 2 by 1 MISO bound. We generalize the result to the case when there are N non-interfering relays and show that the diversity-multiplexing tradeoff is equal to the N + 1 by 1 MISO bound.

    Submitted 12 October, 2008; originally announced October 2008.

    Comments: 8 pages, 6 figures, appeared in the 46th annual Allerton conference, September 2008

  14. arXiv:0809.3035  [pdf, ps, other

    cs.IT

    Interference Alignment for Line-of-Sight Channels

    Authors: Leonard Grokop, David N. C. Tse, Roy D. Yates

    Abstract: The fully connected K-user interference channel is studied in a multipath environment with bandwidth W. We show that when each link consists of D physical paths, the total spectral efficiency can grow {\it linearly} with K. This result holds not merely in the limit of large transmit power P, but for any fixed P, and is therefore a stronger characterization than degrees of freedom. It is achieved… ▽ More

    Submitted 17 September, 2008; originally announced September 2008.

  15. arXiv:0809.2840  [pdf, ps, other

    cs.IT

    Spectrum Sharing between Wireless Networks

    Authors: Leonard Grokop, David N. C. Tse

    Abstract: We consider the problem of two wireless networks operating on the same (presumably unlicensed) frequency band. Pairs within a given network cooperate to schedule transmissions, but between networks there is competition for spectrum. To make the problem tractable, we assume transmissions are scheduled according to a random access protocol where each network chooses an access probability for its u… ▽ More

    Submitted 16 September, 2008; originally announced September 2008.

  16. arXiv:0809.2835  [pdf, ps, other

    cs.IT

    Fundamental Constraints on Multicast Capacity Regions

    Authors: Leonard Grokop, David N. C. Tse

    Abstract: Much of the existing work on the broadcast channel focuses only on the sending of private messages. In this work we examine the scenario where the sender also wishes to transmit common messages to subsets of receivers. For an L user broadcast channel there are 2L - 1 subsets of receivers and correspondingly 2L - 1 independent messages. The set of achievable rates for this channel is a 2L - 1 dim… ▽ More

    Submitted 16 September, 2008; originally announced September 2008.

    MSC Class: 94A15

  17. arXiv:0808.3145  [pdf, ps, other

    cs.IT

    Approximate capacity of the two-way relay channel: A deterministic approach

    Authors: Amir Salman Avestimehr, Aydin Sezgin, David N. C. Tse

    Abstract: We study the capacity of the full-duplex bidirectional (or two-way) relay channel with two nodes and one relay. The channels in the forward direction are assumed to be different (in general) than the channels in the backward direction, i.e. channel reciprocity is not assumed. We use the recently proposed deterministic approach to capture the essence of the problem and to determine a good transmi… ▽ More

    Submitted 22 August, 2008; originally announced August 2008.

    Comments: 7 pages, 8 figures, will be presented at 46. Allerton Conf. On Comm., Control, and Computing 2008

  18. Approximate Capacity of Gaussian Relay Networks

    Authors: Amir Salman Avestimehr, Suhas N. Diggavi, David N C. Tse

    Abstract: We present an achievable rate for general Gaussian relay networks. We show that the achievable rate is within a constant number of bits from the information-theoretic cut-set upper bound on the capacity of these networks. This constant depends on the topology of the network, but not the values of the channel gains. Therefore, we uniformly characterize the capacity of Gaussian relay networks with… ▽ More

    Submitted 5 June, 2008; v1 submitted 24 February, 2008; originally announced February 2008.

    Comments: This paper is submited to 2008 IEEE International Symposium on Information Theory (ISIT 2008) -In the revised format the approximation gap (κ) is sharpened

  19. arXiv:0710.3781  [pdf, ps, other

    cs.IT cs.DM math.PR

    Wireless Network Information Flow

    Authors: A. S. Avestimehr, S. N. Diggavi, D. N. C. Tse

    Abstract: We present an achievable rate for general deterministic relay networks, with broadcasting at the transmitters and interference at the receivers. In particular we show that if the optimizing distribution for the information-theoretic cut-set bound is a product distribution, then we have a complete characterization of the achievable rates for such networks. For linear deterministic finite-field mo… ▽ More

    Submitted 24 October, 2007; v1 submitted 19 October, 2007; originally announced October 2007.

    Comments: - Corrected Typos

  20. arXiv:0710.3777  [pdf, ps, other

    cs.IT cs.DM math.PR

    A Deterministic Approach to Wireless Relay Networks

    Authors: A. S. Avestimehr, S. N. Diggavi, D. N. C. Tse

    Abstract: We present a deterministic channel model which captures several key features of multiuser wireless communication. We consider a model for a wireless network with nodes connected by such deterministic channels, and present an exact characterization of the end-to-end capacity when there is a single source and a single destination and an arbitrary number of relay nodes. This result is a natural gen… ▽ More

    Submitted 19 October, 2007; originally announced October 2007.

  21. arXiv:cs/0602050  [pdf, ps, other

    cs.IT

    Outage Capacity of the Fading Relay Channel in the Low SNR Regime

    Authors: Salman Avestimehr, David N. C. Tse

    Abstract: In slow fading scenarios, cooperation between nodes can increase the amount of diversity for communication. We study the performance limit in such scenarios by analyzing the outage capacity of slow fading relay channels. Our focus is on the low SNR and low outage probability regime, where the adverse impact of fading is greatest but so are the potential gains from cooperation. We showed that whi… ▽ More

    Submitted 13 February, 2006; originally announced February 2006.

  22. arXiv:cs/0509068  [pdf, ps, other

    cs.IT

    Channel Uncertainty in Ultra Wideband Communication Systems

    Authors: Dana Porrat, David N. C. Tse, Serban Nacu

    Abstract: Wide band systems operating over multipath channels may spread their power over bandwidth if they use duty cycle. Channel uncertainty limits the achievable data rates of power constrained wide band systems; Duty cycle transmission reduces the channel uncertainty because the receiver has to estimate the channel only when transmission takes place. The optimal choice of the fraction of time used fo… ▽ More

    Submitted 22 September, 2005; originally announced September 2005.