
Shlomo Shamai- Technion – Israel Institute of Technology
Shlomo Shamai
- Technion – Israel Institute of Technology
About
1,043
Publications
65,058
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
46,361
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (1,043)
This article reviews results from the literature illustrating the bottlenecks and tradeoffs of integrated sensing and communication (ISAC) through the lens of information theory, thus offering a distinct perspective compared to recent works that focus on signal processing, wireless communications, or other related overviews. Different models and sc...
Partial information decomposition has recently found applications in biological signal processing and machine learning. Despite its impacts, the decomposition was introduced through an informal and heuristic route, and its exact operational meaning is unclear. In this work, we fill this gap by connecting partial information decomposition to the cap...
Partial information decomposition has recently found applications in biological signal processing and machine learning. Despite its impacts, the decomposition was introduced through an informal and heuristic route, and its exact operational meaning is unclear. In this work, we fill this gap by connecting partial information decomposition to the cap...
We study the capacity of the power-constrained additive Gaussian channel with an entropy constraint at the input. In particular, we characterize this capacity in the low signal-to-noise ratio regime at small entropy. This follows as a corollary of the following general result on a moment matching problem: We show that for any continuous random vari...
Predictive models are often required to produce reliable predictions under statistical conditions that are not matched to the training data. A common type of training-testing mismatch is covariate shift, where the conditional distribution of the target variable given the input features remains fixed, while the marginal distribution of the inputs ch...
In this paper, we examine the distribution and convergence properties of the estimation error $W = X - \hat{X}(Y)$, where $\hat{X}(Y)$ is the Bayesian estimator of a random variable $X$ from a noisy observation $Y = X +\sigma Z$ where $\sigma$ is the parameter indicating the strength of noise $Z$. Using the conditional expectation framework (that i...
Perceptive mobile networks (PMNs) implement sensing and communication by reusing existing cellular infrastructure. Thanks to the cooperation among distributed access points, cell-free multiple-input multiple-output (MIMO) systems support the deployment of multistatic radar sensing, while providing high spectral efficiency for data communication ser...
Modern computationally-intensive applications often operate under time constraints, necessitating acceleration methods and distribution of computational workloads across multiple entities. However, the outcome is either achieved within the desired timeline or not, and in the latter case, valuable resources are wasted. In this paper, we introduce so...
We investigate the peak-power limited (PPL) Additive White Gaussian Noise (AWGN) channels in which the signal is band-limited, and its instantaneous power cannot exceed the power P. This model is relevant to many communication systems; however, its capacity is still unknown. We use a new geometry-based approach which evaluates the maximal entropy o...
In this paper, we consider a point-to-point integrated sensing and communication (ISAC) system, where a transmitter conveys a message to a receiver over a channel with memory and simultaneously estimates the state of the channel through the backscattered signals from the emitted waveform. Using Massey's concept of directed information for channels...
This work investigates a collaborative sensing and data collection system in which multiple unmanned aerial vehicles (UAVs) sense an area of interest and transmit images to a cloud server (CS) for processing. To accelerate the completion of sensing missions, including data transmission, the sensing task is divided into individual private sensing ta...
We investigate the Peak-Power Limited (PPL) Additive White Gaussian Noise (AWGN) channels in which the signal is band-limited, and its instantaneous power cannot exceed the power P. This model is relevant to many communication systems; however, its capacity is still unknown. We use a new geometry-based approach which evaluates the maximal entropy o...
We consider the continuous-time ARMA(1,1) Gaussian channel and derive its feedback capacity in closed form. More specifically, the channel is given by
$\boldsymbol {y}(t) =\boldsymbol {x}(t) +\boldsymbol {z}(t)$
, where the channel input
$\{\boldsymbol {x}(t) \}$
satisfies average power constraint P and the noise
$\{\boldsymbol {z}(t)\}$
is a...
Abstract: We study power-effective communication systems over band-limited Additive White Gaussian Noise channels in which the transmitter’s output is constrained to be symmetric binary (bipolar) or peak-limited. New geometrical analysis is introduced, and the admissible band-limited signals are shown to form a convex set. We improved the previous...
Abstract—We investigate the special case of a symmetric Gaussian primitive diamond relay channel comprising a correlated Gaussian noise channel, and fronthaul links with limited rate from the relays to the destination. We use a combination of oblivious compress and forward (CF) with distributed Wyner-Ziv
compression, and decode and forward (DF) tec...
This work investigates a collaborative sensing and data collection system in which multiple unmanned aerial vehicles (UAVs) sense an area of interest and transmit images to a cloud server (CS) for processing. To accelerate the completion of sensing missions, including data transmission, the sensing task is divided into individual private sensing ta...
Hierarchical federated learning (HFL) is a key technology enabling distributed learning with reduced communication overhead. However, practical HFL systems encounter two major challenges: limited resources and data heterogeneity. In particular, limited resources can result in intolerable system latency, while heterogeneous data across clients can s...
This paper proposes coding schemes and information-theoretic converse results for the transmission of heterogeneous delay-constrained traffic over interference networks with random user activity and random data arrivals. The heterogeneous delay-constrained traffic is composed of delay-tolerant traffic and delay-sensitive traffic where only the form...
We investigate the primitive diamond relay channel model comprising Gaussian channels with an identical frequency response from the user to the relays and with lossless fronthaul links with a limited rate from the relays to the destination. The model is further extended by addressing correlated noise at the relays, which can be present in the uplin...
Our Information Theory community, the IEEE, and the academic world has lost a towering figure in Information Theory in any scale—a researcher who belongs to the selected group of a handful of pioneering scientists, which impacted the field in a profound manner.
A point-to-point communication is considered where a roadside unite (RSU) wishes to simultaneously send messages of enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) services to a vehicle. The eMBB message arrives at the beginning of a block and its transmission lasts over the entire block. During each eMBB trans...
This paper considers the distributed information bottleneck (D-IB) problem for a primitive Gaussian diamond channel with two relays and MIMO Rayleigh fading. The channel state is an independent and identically distributed (i.i.d.) process known at the relays but unknown to the destination. The relays are oblivious, i.e., they are unaware of the cod...
We consider the problem of reliable communication over a discrete memoryless channel (DMC) with the help of a relay, termed the information bottleneck (IB) channel. There is no direct link between the source and the destination, and the information flows in two hops. The first hop is a noisy channel from the source to the relay. The second hop is a...
The paper characterizes the fundamental limits of integrated sensing and communication (ISAC) systems with a bi-static radar, where the radar receiver is located close to the transmitter and estimates or detects the state based on the transmitter's channel inputs and the backscattered signals. Two models are considered. In the first model, the memo...
We study the state-dependent wiretap channel with non-causal channel state informations at the encoder in an integrated sensing and communications (ISAC) scenario. In this scenario, the transmitter communicates a message and a state sequence to a legitimate receiver while keeping the message and state-information secret from an external eavesdroppe...
We consider the continuous-time ARMA(1,1) Gaussian channel and derive its feedback capacity in closed form. More specifically, the channel is given by $\boldsymbol{y}(t) =\boldsymbol{x}(t) +\boldsymbol{z}(t)$, where the channel input $\{\boldsymbol{x}(t) \}$ satisfies average power constraint $P$ and the noise $\{\boldsymbol{z}(t)\}$ is a first-ord...
The dynamic scheduling of ultra-reliable and low-latency traffic (URLLC) in the uplink can significantly enhance the efficiency of coexisting services, such as enhanced mobile broadband (eMBB) devices, by only allocating resources when necessary. The main challenge is posed by the uncertainty in the process of URLLC packet generation, which mandate...
The dynamic scheduling of ultra-reliable and low-latency traffic (URLLC) in the uplink can significantly enhance the efficiency of coexisting services, such as enhanced mobile broadband (eMBB) devices, by only allocating resources when necessary. The main challenge is posed by the uncertainty in the process of URLLC packet generation, which mandate...
When used in complex engineered systems, such as communication networks, artificial intelligence (AI) models should be not only as accurate as possible, but also well calibrated. A well-calibrated AI model is one that can reliably quantify the uncertainty of its decisions, assigning high confidence levels to decisions that are likely to be correct,...
This paper is focused on multiuser load modulation arrays (MU-LMAs) which are attractive due to their low system complexity and reduced cost for millimeter wave (mmWave) multi-input multi-output (MIMO) systems. The existing precoding algorithm for downlink MU-LMA relies on a sub-array structured (SAS) transmitter which may suffer from decreased deg...
When used in complex engineered systems, such as communication networks, artificial intelligence (AI) models should be not only as accurate as possible, but also well calibrated. A well-calibrated AI model is one that can reliably quantify the uncertainty of its decisions, assigning high confidence levels to decisions that are likely to be correct...
Broadcast/multicast communication systems are typically designed to optimize the outage rate criterion, which neglects the performance of the fraction of clients with the worst channel conditions. Targeting ultra-reliable communication scenarios, this paper takes a complementary approach by introducing the
conditional value-at-risk
(CVaR) rate as...
Emerging wireless technologies are envisioned to support a variety of applications that require simultaneously maintaining low latency and high reliability. Non-orthogonal multiple access techniques constitute one candidate for grant-free transmission alleviating the signaling requirements for uplink transmissions. In open-loop transmissions over f...
AI tools can be useful to address model deficits in the design of communication systems. However, conventional learning-based AI algorithms yield poorly calibrated decisions, unabling to quantify their outputs uncertainty. While Bayesian learning can enhance calibration by capturing epistemic uncertainty caused by limited data availability, formal...
A double-sided variant of the information bottleneck method is considered. Let (X,Y) be a bivariate source characterized by a joint pmf PXY. The problem is to find two independent channels PU|X and PV|Y (setting the Markovian structure U→X→Y→V), that maximize I(U;V) subject to constraints on the relevant mutual information expressions: I(U;X) and I...
The information bottleneck problem (IB) of jointly stationary Gaussian sources is considered. A water-filling solution for the IB rate is given in terms of its SNR spectrum and whose rate is attained via frequency domain test-channel realization. A time-domain realization of the IB rate, based on linear prediction, is also proposed, which lends its...
Modern computationally-heavy applications are often time-sensitive, demanding distributed strategies to accelerate them. On the other hand, distributed computing suffers from the bottleneck of slow workers in practice. Distributed coded computing is an attractive solution that adds redundancy such that a subset of distributed computations suffices...
This paper considers the distributed information bottleneck (D-IB) problem for a primitive Gaussian diamond channel with two relays and Rayleigh fading. Due to the bottleneck constraint, it is impossible for the relays to inform the destination node of the perfect channel state information (CSI) in each realization. To evaluate the bottleneck rate,...
This paper considers the distributed information bottleneck (D-IB) problem for a primitive Gaussian diamond channel with two relays and Rayleigh fading. Due to the bottleneck constraint, it is impossible for the relays to inform the destination node of the perfect channel state information (CSI) in each realization. To evaluate the bottleneck rate,...
Wyner's soft-handoff network is considered where transmitters simultaneously send messages of enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) services. Due to the low-latency requirements, the URLLC messages are transmitted over fewer channel uses compared to the eMBB messages. To improve the reliability of the...
We formulate and analyze the compound information bottleneck programming. In this problem, a Markov chain $ \mathsf{X} \rightarrow \mathsf{Y} \rightarrow \mathsf{Z} $ is assumed with fixed marginal distributions $\mathsf{P}_{\mathsf{X}}$ and $\mathsf{P}_{\mathsf{Y}}$, and the mutual information between $ \mathsf{X} $ and $ \mathsf{Z} $ is sought to...
A diamond network is considered in which the central processor is connected, via backhaul noiseless links, to multiple conferencing base stations, which communicate with a single user over a multiple access channel. We propose coding techniques along with lower and upper bounds on the capacity. Our achievability scheme uses a common cloud coding st...
We investigate a special case of diamond relay comprising Gaussian channels with an identical frequency response from the user to the relays, and with lossless fronthaul links with limited rate from the relays to the destination. We use the oblivious compress and forward (CF) scheme with with distributed compression, and a decode and forward (DF) s...
Fifth generation mobile communication systems (5G) have to accommodate both Ultra-Reliable Low-Latency Communication (URLLC) and enhanced Mobile Broadband (eMBB) services. While eMBB applications support high data rates, URLLC services aim at guaranteeing low-latencies and high-reliabilities. eMBB and URLLC services are scheduled on the same freque...
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Fifth generation mobile communication systems (5G) have to accommodate both Ultra-Reliable Low-Latency Communication (URLLC) and enhanced Mobile Broadband (eMBB) services. While, eMBB applications support high data rates, URLLC services aim at guaranteeing low-latencies and high-reliabilities. eMBB and URLLC services are scheduled on the same frequ...
Rate-Splitting Multiple Access (RSMA) for multi-user downlink operates by splitting the message for each user equipment (UE) into a private message and a set of common messages, which are simultaneously transmitted by means of superposition coding. The RSMA scheme can enhance throughput and connectivity as compared to conventional multiple access t...
Understanding the fundamental limits of technologies enabling future wireless communication systems is essential for their efficient state-of-the-art design. A prominent technology of major interest in this framework is non-orthogonal multiple access (NOMA). In this paper, we derive an explicit rigorous
closed-form
analytical expression for the o...
A common way of characterizing minimax estimators in point estimation is by moving the problem into the Bayesian estimation domain and finding a least favorable prior distribution. The Bayesian estimator induced by a least favorable prior, under mild conditions, is then known to be minimax. However, finding least favorable distributions can be chal...
For data streaming applications, existing solutions are not yet able to close the gap between high data rates and low delay. This work considers the problem of data streaming under mixed delay constraints over a single communication channel with delayed feedback. We propose a novel layered adaptive causal random linear network coding (LAC-RLNC) app...
Non-orthogonal multiple access (NOMA) is a promising technology for future beyond-5G wireless networks, whose fundamental information-theoretic limits are yet to be fully explored. Considering regular sparse code-domain NOMA (with a fixed and finite number of orthogonal resources allocated to any designated user and vice versa), this paper extends...
Immersive video, such as virtual reality (VR) and multi-view videos, is growing in popularity. Its wireless streaming is an instance of general multicast, extending conventional unicast and multicast, whose effective design is still open. This paper investigates general rate splitting for general multicast. Specifically, we consider a multi-carrier...
Immersive video, such as virtual reality (VR) and multi-view videos, is growing in popularity. Its wireless streaming is an instance of general multicast, extending conventional unicast and multicast, whose effective design is still open. This paper investigates the optimization of general rate splitting with linear beamforming for general multicas...
In this paper, we consider the uplink multiuser load-modulated array (LMA) multiple-input multiple-output (MIMO) communication system, where multiple users transmit the phase modulation on hypersphere (PMH) signals to a base station (BS). To reduce the detection complexity, we propose a low-complexity detection scheme based on a ball-tree (BT) stru...
It has been shown that the SK scheme, which was proposed by Schalkwijk and Kailath, is a self-secure capacity-achieving (SSCA) feedback scheme for the Gaussian wiretap channel, i.e., the SK scheme not only achieves the feedback capacity of the Gaussian channel, but also is secure by itself and achieves the feedback secrecy capacity of the Gaussian...
Immersive video, such as virtual reality (VR) and multi-view videos, is growing in popularity. Its wireless streaming is an instance of general multicast, extending conventional unicast and multicast, whose effective design is still open. This paper investigates general rate splitting for general multicast. Specifically, we consider a multi-carrier...