Shlomo Shamai

Shlomo Shamai
  • Technion – Israel Institute of Technology

About

1,043
Publications
65,058
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
46,361
Citations
Introduction
Current institution
Technion – Israel Institute of Technology

Publications

Publications (1,043)
Article
Full-text available
This article reviews results from the literature illustrating the bottlenecks and tradeoffs of integrated sensing and communication (ISAC) through the lens of information theory, thus offering a distinct perspective compared to recent works that focus on signal processing, wireless communications, or other related overviews. Different models and sc...
Article
Full-text available
Partial information decomposition has recently found applications in biological signal processing and machine learning. Despite its impacts, the decomposition was introduced through an informal and heuristic route, and its exact operational meaning is unclear. In this work, we fill this gap by connecting partial information decomposition to the cap...
Preprint
Full-text available
Partial information decomposition has recently found applications in biological signal processing and machine learning. Despite its impacts, the decomposition was introduced through an informal and heuristic route, and its exact operational meaning is unclear. In this work, we fill this gap by connecting partial information decomposition to the cap...
Preprint
Full-text available
We study the capacity of the power-constrained additive Gaussian channel with an entropy constraint at the input. In particular, we characterize this capacity in the low signal-to-noise ratio regime at small entropy. This follows as a corollary of the following general result on a moment matching problem: We show that for any continuous random vari...
Preprint
Full-text available
Predictive models are often required to produce reliable predictions under statistical conditions that are not matched to the training data. A common type of training-testing mismatch is covariate shift, where the conditional distribution of the target variable given the input features remains fixed, while the marginal distribution of the inputs ch...
Preprint
In this paper, we examine the distribution and convergence properties of the estimation error $W = X - \hat{X}(Y)$, where $\hat{X}(Y)$ is the Bayesian estimator of a random variable $X$ from a noisy observation $Y = X +\sigma Z$ where $\sigma$ is the parameter indicating the strength of noise $Z$. Using the conditional expectation framework (that i...
Article
Perceptive mobile networks (PMNs) implement sensing and communication by reusing existing cellular infrastructure. Thanks to the cooperation among distributed access points, cell-free multiple-input multiple-output (MIMO) systems support the deployment of multistatic radar sensing, while providing high spectral efficiency for data communication ser...
Article
Modern computationally-intensive applications often operate under time constraints, necessitating acceleration methods and distribution of computational workloads across multiple entities. However, the outcome is either achieved within the desired timeline or not, and in the latter case, valuable resources are wasted. In this paper, we introduce so...
Article
Full-text available
We investigate the peak-power limited (PPL) Additive White Gaussian Noise (AWGN) channels in which the signal is band-limited, and its instantaneous power cannot exceed the power P. This model is relevant to many communication systems; however, its capacity is still unknown. We use a new geometry-based approach which evaluates the maximal entropy o...
Preprint
Full-text available
In this paper, we consider a point-to-point integrated sensing and communication (ISAC) system, where a transmitter conveys a message to a receiver over a channel with memory and simultaneously estimates the state of the channel through the backscattered signals from the emitted waveform. Using Massey's concept of directed information for channels...
Preprint
This work investigates a collaborative sensing and data collection system in which multiple unmanned aerial vehicles (UAVs) sense an area of interest and transmit images to a cloud server (CS) for processing. To accelerate the completion of sensing missions, including data transmission, the sensing task is divided into individual private sensing ta...
Preprint
Full-text available
We investigate the Peak-Power Limited (PPL) Additive White Gaussian Noise (AWGN) channels in which the signal is band-limited, and its instantaneous power cannot exceed the power P. This model is relevant to many communication systems; however, its capacity is still unknown. We use a new geometry-based approach which evaluates the maximal entropy o...
Article
We consider the continuous-time ARMA(1,1) Gaussian channel and derive its feedback capacity in closed form. More specifically, the channel is given by $\boldsymbol {y}(t) =\boldsymbol {x}(t) +\boldsymbol {z}(t)$ , where the channel input $\{\boldsymbol {x}(t) \}$ satisfies average power constraint P and the noise $\{\boldsymbol {z}(t)\}$ is a...
Conference Paper
Abstract: We study power-effective communication systems over band-limited Additive White Gaussian Noise channels in which the transmitter’s output is constrained to be symmetric binary (bipolar) or peak-limited. New geometrical analysis is introduced, and the admissible band-limited signals are shown to form a convex set. We improved the previous...
Conference Paper
Abstract—We investigate the special case of a symmetric Gaussian primitive diamond relay channel comprising a correlated Gaussian noise channel, and fronthaul links with limited rate from the relays to the destination. We use a combination of oblivious compress and forward (CF) with distributed Wyner-Ziv compression, and decode and forward (DF) tec...
Article
This work investigates a collaborative sensing and data collection system in which multiple unmanned aerial vehicles (UAVs) sense an area of interest and transmit images to a cloud server (CS) for processing. To accelerate the completion of sensing missions, including data transmission, the sensing task is divided into individual private sensing ta...
Article
Hierarchical federated learning (HFL) is a key technology enabling distributed learning with reduced communication overhead. However, practical HFL systems encounter two major challenges: limited resources and data heterogeneity. In particular, limited resources can result in intolerable system latency, while heterogeneous data across clients can s...
Article
This paper proposes coding schemes and information-theoretic converse results for the transmission of heterogeneous delay-constrained traffic over interference networks with random user activity and random data arrivals. The heterogeneous delay-constrained traffic is composed of delay-tolerant traffic and delay-sensitive traffic where only the form...
Article
We investigate the primitive diamond relay channel model comprising Gaussian channels with an identical frequency response from the user to the relays and with lossless fronthaul links with a limited rate from the relays to the destination. The model is further extended by addressing correlated noise at the relays, which can be present in the uplin...
Article
Our Information Theory community, the IEEE, and the academic world has lost a towering figure in Information Theory in any scale—a researcher who belongs to the selected group of a handful of pioneering scientists, which impacted the field in a profound manner.
Preprint
Full-text available
A point-to-point communication is considered where a roadside unite (RSU) wishes to simultaneously send messages of enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) services to a vehicle. The eMBB message arrives at the beginning of a block and its transmission lasts over the entire block. During each eMBB trans...
Preprint
Full-text available
This paper considers the distributed information bottleneck (D-IB) problem for a primitive Gaussian diamond channel with two relays and MIMO Rayleigh fading. The channel state is an independent and identically distributed (i.i.d.) process known at the relays but unknown to the destination. The relays are oblivious, i.e., they are unaware of the cod...
Preprint
We consider the problem of reliable communication over a discrete memoryless channel (DMC) with the help of a relay, termed the information bottleneck (IB) channel. There is no direct link between the source and the destination, and the information flows in two hops. The first hop is a noisy channel from the source to the relay. The second hop is a...
Preprint
Full-text available
The paper characterizes the fundamental limits of integrated sensing and communication (ISAC) systems with a bi-static radar, where the radar receiver is located close to the transmitter and estimates or detects the state based on the transmitter's channel inputs and the backscattered signals. Two models are considered. In the first model, the memo...
Preprint
Full-text available
We study the state-dependent wiretap channel with non-causal channel state informations at the encoder in an integrated sensing and communications (ISAC) scenario. In this scenario, the transmitter communicates a message and a state sequence to a legitimate receiver while keeping the message and state-information secret from an external eavesdroppe...
Preprint
Full-text available
We consider the continuous-time ARMA(1,1) Gaussian channel and derive its feedback capacity in closed form. More specifically, the channel is given by $\boldsymbol{y}(t) =\boldsymbol{x}(t) +\boldsymbol{z}(t)$, where the channel input $\{\boldsymbol{x}(t) \}$ satisfies average power constraint $P$ and the noise $\{\boldsymbol{z}(t)\}$ is a first-ord...
Preprint
The dynamic scheduling of ultra-reliable and low-latency traffic (URLLC) in the uplink can significantly enhance the efficiency of coexisting services, such as enhanced mobile broadband (eMBB) devices, by only allocating resources when necessary. The main challenge is posed by the uncertainty in the process of URLLC packet generation, which mandate...
Article
The dynamic scheduling of ultra-reliable and low-latency traffic (URLLC) in the uplink can significantly enhance the efficiency of coexisting services, such as enhanced mobile broadband (eMBB) devices, by only allocating resources when necessary. The main challenge is posed by the uncertainty in the process of URLLC packet generation, which mandate...
Article
Full-text available
When used in complex engineered systems, such as communication networks, artificial intelligence (AI) models should be not only as accurate as possible, but also well calibrated. A well-calibrated AI model is one that can reliably quantify the uncertainty of its decisions, assigning high confidence levels to decisions that are likely to be correct,...
Article
This paper is focused on multiuser load modulation arrays (MU-LMAs) which are attractive due to their low system complexity and reduced cost for millimeter wave (mmWave) multi-input multi-output (MIMO) systems. The existing precoding algorithm for downlink MU-LMA relies on a sub-array structured (SAS) transmitter which may suffer from decreased deg...
Preprint
When used in complex engineered systems, such as communication networks, artificial intelligence (AI) models should be not only as accurate as possible, but also well calibrated. A well-calibrated AI model is one that can reliably quantify the uncertainty of its decisions, assigning high confidence levels to decisions that are likely to be correct...
Article
Broadcast/multicast communication systems are typically designed to optimize the outage rate criterion, which neglects the performance of the fraction of clients with the worst channel conditions. Targeting ultra-reliable communication scenarios, this paper takes a complementary approach by introducing the conditional value-at-risk (CVaR) rate as...
Article
Full-text available
Emerging wireless technologies are envisioned to support a variety of applications that require simultaneously maintaining low latency and high reliability. Non-orthogonal multiple access techniques constitute one candidate for grant-free transmission alleviating the signaling requirements for uplink transmissions. In open-loop transmissions over f...
Preprint
AI tools can be useful to address model deficits in the design of communication systems. However, conventional learning-based AI algorithms yield poorly calibrated decisions, unabling to quantify their outputs uncertainty. While Bayesian learning can enhance calibration by capturing epistemic uncertainty caused by limited data availability, formal...
Article
Full-text available
A double-sided variant of the information bottleneck method is considered. Let (X,Y) be a bivariate source characterized by a joint pmf PXY. The problem is to find two independent channels PU|X and PV|Y (setting the Markovian structure U→X→Y→V), that maximize I(U;V) subject to constraints on the relevant mutual information expressions: I(U;X) and I...
Preprint
The information bottleneck problem (IB) of jointly stationary Gaussian sources is considered. A water-filling solution for the IB rate is given in terms of its SNR spectrum and whose rate is attained via frequency domain test-channel realization. A time-domain realization of the IB rate, based on linear prediction, is also proposed, which lends its...
Preprint
Full-text available
Modern computationally-heavy applications are often time-sensitive, demanding distributed strategies to accelerate them. On the other hand, distributed computing suffers from the bottleneck of slow workers in practice. Distributed coded computing is an attractive solution that adds redundancy such that a subset of distributed computations suffices...
Preprint
Full-text available
This paper considers the distributed information bottleneck (D-IB) problem for a primitive Gaussian diamond channel with two relays and Rayleigh fading. Due to the bottleneck constraint, it is impossible for the relays to inform the destination node of the perfect channel state information (CSI) in each realization. To evaluate the bottleneck rate,...
Conference Paper
Full-text available
This paper considers the distributed information bottleneck (D-IB) problem for a primitive Gaussian diamond channel with two relays and Rayleigh fading. Due to the bottleneck constraint, it is impossible for the relays to inform the destination node of the perfect channel state information (CSI) in each realization. To evaluate the bottleneck rate,...
Preprint
Full-text available
Wyner's soft-handoff network is considered where transmitters simultaneously send messages of enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) services. Due to the low-latency requirements, the URLLC messages are transmitted over fewer channel uses compared to the eMBB messages. To improve the reliability of the...
Preprint
We formulate and analyze the compound information bottleneck programming. In this problem, a Markov chain $ \mathsf{X} \rightarrow \mathsf{Y} \rightarrow \mathsf{Z} $ is assumed with fixed marginal distributions $\mathsf{P}_{\mathsf{X}}$ and $\mathsf{P}_{\mathsf{Y}}$, and the mutual information between $ \mathsf{X} $ and $ \mathsf{Z} $ is sought to...
Preprint
A diamond network is considered in which the central processor is connected, via backhaul noiseless links, to multiple conferencing base stations, which communicate with a single user over a multiple access channel. We propose coding techniques along with lower and upper bounds on the capacity. Our achievability scheme uses a common cloud coding st...
Article
We investigate a special case of diamond relay comprising Gaussian channels with an identical frequency response from the user to the relays, and with lossless fronthaul links with limited rate from the relays to the destination. We use the oblivious compress and forward (CF) scheme with with distributed compression, and a decode and forward (DF) s...
Article
Full-text available
Fifth generation mobile communication systems (5G) have to accommodate both Ultra-Reliable Low-Latency Communication (URLLC) and enhanced Mobile Broadband (eMBB) services. While eMBB applications support high data rates, URLLC services aim at guaranteeing low-latencies and high-reliabilities. eMBB and URLLC services are scheduled on the same freque...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Preprint
Full-text available
Fifth generation mobile communication systems (5G) have to accommodate both Ultra-Reliable Low-Latency Communication (URLLC) and enhanced Mobile Broadband (eMBB) services. While, eMBB applications support high data rates, URLLC services aim at guaranteeing low-latencies and high-reliabilities. eMBB and URLLC services are scheduled on the same frequ...
Preprint
Rate-Splitting Multiple Access (RSMA) for multi-user downlink operates by splitting the message for each user equipment (UE) into a private message and a set of common messages, which are simultaneously transmitted by means of superposition coding. The RSMA scheme can enhance throughput and connectivity as compared to conventional multiple access t...
Article
Understanding the fundamental limits of technologies enabling future wireless communication systems is essential for their efficient state-of-the-art design. A prominent technology of major interest in this framework is non-orthogonal multiple access (NOMA). In this paper, we derive an explicit rigorous closed-form analytical expression for the o...
Preprint
Full-text available
A common way of characterizing minimax estimators in point estimation is by moving the problem into the Bayesian estimation domain and finding a least favorable prior distribution. The Bayesian estimator induced by a least favorable prior, under mild conditions, is then known to be minimax. However, finding least favorable distributions can be chal...
Preprint
Full-text available
For data streaming applications, existing solutions are not yet able to close the gap between high data rates and low delay. This work considers the problem of data streaming under mixed delay constraints over a single communication channel with delayed feedback. We propose a novel layered adaptive causal random linear network coding (LAC-RLNC) app...
Article
Full-text available
Non-orthogonal multiple access (NOMA) is a promising technology for future beyond-5G wireless networks, whose fundamental information-theoretic limits are yet to be fully explored. Considering regular sparse code-domain NOMA (with a fixed and finite number of orthogonal resources allocated to any designated user and vice versa), this paper extends...
Preprint
Immersive video, such as virtual reality (VR) and multi-view videos, is growing in popularity. Its wireless streaming is an instance of general multicast, extending conventional unicast and multicast, whose effective design is still open. This paper investigates general rate splitting for general multicast. Specifically, we consider a multi-carrier...
Preprint
Immersive video, such as virtual reality (VR) and multi-view videos, is growing in popularity. Its wireless streaming is an instance of general multicast, extending conventional unicast and multicast, whose effective design is still open. This paper investigates the optimization of general rate splitting with linear beamforming for general multicas...
Article
In this paper, we consider the uplink multiuser load-modulated array (LMA) multiple-input multiple-output (MIMO) communication system, where multiple users transmit the phase modulation on hypersphere (PMH) signals to a base station (BS). To reduce the detection complexity, we propose a low-complexity detection scheme based on a ball-tree (BT) stru...
Article
It has been shown that the SK scheme, which was proposed by Schalkwijk and Kailath, is a self-secure capacity-achieving (SSCA) feedback scheme for the Gaussian wiretap channel, i.e., the SK scheme not only achieves the feedback capacity of the Gaussian channel, but also is secure by itself and achieves the feedback secrecy capacity of the Gaussian...
Article
Immersive video, such as virtual reality (VR) and multi-view videos, is growing in popularity. Its wireless streaming is an instance of general multicast, extending conventional unicast and multicast, whose effective design is still open. This paper investigates general rate splitting for general multicast. Specifically, we consider a multi-carrier...

Network

Cited By