Shlomo Shamai

Shlomo Shamai
Technion - Israel Institute of Technology | technion · Faculty of Electrical Engineering

About

984
Publications
61,624
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
43,735
Citations
Introduction

Publications

Publications (984)
Article
We consider the continuous-time ARMA(1,1) Gaussian channel and derive its feedback capacity in closed form. More specifically, the channel is given by y ( t ) = x ( t ) + z ( t ), where the channel input { x ( t )} satisfies average power constraint P and the noise { z ( t )} is a first-order autoregressive moving average (ARMA(1,1...
Preprint
Full-text available
A point-to-point communication is considered where a roadside unite (RSU) wishes to simultaneously send messages of enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) services to a vehicle. The eMBB message arrives at the beginning of a block and its transmission lasts over the entire block. During each eMBB trans...
Preprint
Full-text available
This paper considers the distributed information bottleneck (D-IB) problem for a primitive Gaussian diamond channel with two relays and MIMO Rayleigh fading. The channel state is an independent and identically distributed (i.i.d.) process known at the relays but unknown to the destination. The relays are oblivious, i.e., they are unaware of the cod...
Preprint
We consider the problem of reliable communication over a discrete memoryless channel (DMC) with the help of a relay, termed the information bottleneck (IB) channel. There is no direct link between the source and the destination, and the information flows in two hops. The first hop is a noisy channel from the source to the relay. The second hop is a...
Preprint
Full-text available
The paper characterizes the fundamental limits of integrated sensing and communication (ISAC) systems with a bi-static radar, where the radar receiver is located close to the transmitter and estimates or detects the state based on the transmitter's channel inputs and the backscattered signals. Two models are considered. In the first model, the memo...
Preprint
Full-text available
We study the state-dependent wiretap channel with non-causal channel state informations at the encoder in an integrated sensing and communications (ISAC) scenario. In this scenario, the transmitter communicates a message and a state sequence to a legitimate receiver while keeping the message and state-information secret from an external eavesdroppe...
Preprint
Full-text available
We derive an explicit feedback capacity formula for the OU-Colored AWGN channel. Among many others, this result shows that at least in some cases, the continuous-time Schalkwijk-Kailath coding scheme achieves the feedback capacity for such a channel, and feedback may not increase the capacity of a continuous-time ACGN channel even if the noise proc...
Preprint
The dynamic scheduling of ultra-reliable and low-latency traffic (URLLC) in the uplink can significantly enhance the efficiency of coexisting services, such as enhanced mobile broadband (eMBB) devices, by only allocating resources when necessary. The main challenge is posed by the uncertainty in the process of URLLC packet generation, which mandate...
Article
The dynamic scheduling of ultra-reliable and low-latency traffic (URLLC) in the uplink can significantly enhance the efficiency of coexisting services, such as enhanced mobile broadband (eMBB) devices, by only allocating resources when necessary. The main challenge is posed by the uncertainty in the process of URLLC packet generation, which mandate...
Article
Full-text available
When used in complex engineered systems, such as communication networks, artificial intelligence (AI) models should be not only as accurate as possible, but also well calibrated. A well-calibrated AI model is one that can reliably quantify the uncertainty of its decisions, assigning high confidence levels to decisions that are likely to be correct,...
Article
This paper is focused on multiuser load modulation arrays (MU-LMAs) which are attractive due to their low system complexity and reduced cost for millimeter wave (mmWave) multi-input multi-output (MIMO) systems. The existing precoding algorithm for downlink MU-LMA relies on a sub-array structured (SAS) transmitter which may suffer from decreased deg...
Preprint
When used in complex engineered systems, such as communication networks, artificial intelligence (AI) models should be not only as accurate as possible, but also well calibrated. A well-calibrated AI model is one that can reliably quantify the uncertainty of its decisions, assigning high confidence levels to decisions that are likely to be correct...
Article
Broadcast/multicast communication systems are typically designed to optimize the outage rate criterion, which neglects the performance of the fraction of clients with the worst channel conditions. Targeting ultra-reliable communication scenarios, this paper takes a complementary approach by introducing the conditional value-at-risk (CVaR) rate as...
Article
Full-text available
Emerging wireless technologies are envisioned to support a variety of applications that require simultaneously maintaining low latency and high reliability. Non-orthogonal multiple access techniques constitute one candidate for grant-free transmission alleviating the signaling requirements for uplink transmissions. In open-loop transmissions over f...
Preprint
AI tools can be useful to address model deficits in the design of communication systems. However, conventional learning-based AI algorithms yield poorly calibrated decisions, unabling to quantify their outputs uncertainty. While Bayesian learning can enhance calibration by capturing epistemic uncertainty caused by limited data availability, formal...
Article
Full-text available
A double-sided variant of the information bottleneck method is considered. Let (X,Y) be a bivariate source characterized by a joint pmf PXY. The problem is to find two independent channels PU|X and PV|Y (setting the Markovian structure U→X→Y→V), that maximize I(U;V) subject to constraints on the relevant mutual information expressions: I(U;X) and I...
Preprint
The information bottleneck problem (IB) of jointly stationary Gaussian sources is considered. A water-filling solution for the IB rate is given in terms of its SNR spectrum and whose rate is attained via frequency domain test-channel realization. A time-domain realization of the IB rate, based on linear prediction, is also proposed, which lends its...
Preprint
Full-text available
Modern computationally-heavy applications are often time-sensitive, demanding distributed strategies to accelerate them. On the other hand, distributed computing suffers from the bottleneck of slow workers in practice. Distributed coded computing is an attractive solution that adds redundancy such that a subset of distributed computations suffices...
Preprint
Full-text available
This paper considers the distributed information bottleneck (D-IB) problem for a primitive Gaussian diamond channel with two relays and Rayleigh fading. Due to the bottleneck constraint, it is impossible for the relays to inform the destination node of the perfect channel state information (CSI) in each realization. To evaluate the bottleneck rate,...
Conference Paper
Full-text available
This paper considers the distributed information bottleneck (D-IB) problem for a primitive Gaussian diamond channel with two relays and Rayleigh fading. Due to the bottleneck constraint, it is impossible for the relays to inform the destination node of the perfect channel state information (CSI) in each realization. To evaluate the bottleneck rate,...
Preprint
Full-text available
Wyner's soft-handoff network is considered where transmitters simultaneously send messages of enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) services. Due to the low-latency requirements, the URLLC messages are transmitted over fewer channel uses compared to the eMBB messages. To improve the reliability of the...
Preprint
We formulate and analyze the compound information bottleneck programming. In this problem, a Markov chain $ \mathsf{X} \rightarrow \mathsf{Y} \rightarrow \mathsf{Z} $ is assumed with fixed marginal distributions $\mathsf{P}_{\mathsf{X}}$ and $\mathsf{P}_{\mathsf{Y}}$, and the mutual information between $ \mathsf{X} $ and $ \mathsf{Z} $ is sought to...
Preprint
A diamond network is considered in which the central processor is connected, via backhaul noiseless links, to multiple conferencing base stations, which communicate with a single user over a multiple access channel. We propose coding techniques along with lower and upper bounds on the capacity. Our achievability scheme uses a common cloud coding st...
Article
We investigate a special case of diamond relay comprising Gaussian channels with an identical frequency response from the user to the relays, and with lossless fronthaul links with limited rate from the relays to the destination. We use the oblivious compress and forward (CF) scheme with with distributed compression, and a decode and forward (DF) s...
Article
Full-text available
Fifth generation mobile communication systems (5G) have to accommodate both Ultra-Reliable Low-Latency Communication (URLLC) and enhanced Mobile Broadband (eMBB) services. While eMBB applications support high data rates, URLLC services aim at guaranteeing low-latencies and high-reliabilities. eMBB and URLLC services are scheduled on the same freque...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Article
Experience a guided tour of the key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable reference. Written by experts in the field, the text encompasses principled theoretical guidelines for the design and performance analysis of network architectures, coding and modulation schemes, and...
Preprint
Full-text available
Fifth generation mobile communication systems (5G) have to accommodate both Ultra-Reliable Low-Latency Communication (URLLC) and enhanced Mobile Broadband (eMBB) services. While, eMBB applications support high data rates, URLLC services aim at guaranteeing low-latencies and high-reliabilities. eMBB and URLLC services are scheduled on the same frequ...
Preprint
Rate-Splitting Multiple Access (RSMA) for multi-user downlink operates by splitting the message for each user equipment (UE) into a private message and a set of common messages, which are simultaneously transmitted by means of superposition coding. The RSMA scheme can enhance throughput and connectivity as compared to conventional multiple access t...
Article
Understanding the fundamental limits of technologies enabling future wireless communication systems is essential for their efficient state-of-the-art design. A prominent technology of major interest in this framework is non-orthogonal multiple access (NOMA). In this paper, we derive an explicit rigorous closed-form analytical expression for the o...
Preprint
Full-text available
A common way of characterizing minimax estimators in point estimation is by moving the problem into the Bayesian estimation domain and finding a least favorable prior distribution. The Bayesian estimator induced by a least favorable prior, under mild conditions, is then known to be minimax. However, finding least favorable distributions can be chal...
Preprint
Full-text available
For data streaming applications, existing solutions are not yet able to close the gap between high data rates and low delay. This work considers the problem of data streaming under mixed delay constraints over a single communication channel with delayed feedback. We propose a novel layered adaptive causal random linear network coding (LAC-RLNC) app...
Article
Full-text available
Non-orthogonal multiple access (NOMA) is a promising technology for future beyond-5G wireless networks, whose fundamental information-theoretic limits are yet to be fully explored. Considering regular sparse code-domain NOMA (with a fixed and finite number of orthogonal resources allocated to any designated user and vice versa), this paper extends...
Preprint
Immersive video, such as virtual reality (VR) and multi-view videos, is growing in popularity. Its wireless streaming is an instance of general multicast, extending conventional unicast and multicast, whose effective design is still open. This paper investigates general rate splitting for general multicast. Specifically, we consider a multi-carrier...
Preprint
Immersive video, such as virtual reality (VR) and multi-view videos, is growing in popularity. Its wireless streaming is an instance of general multicast, extending conventional unicast and multicast, whose effective design is still open. This paper investigates the optimization of general rate splitting with linear beamforming for general multicas...
Article
In this paper, we consider the uplink multiuser load-modulated array (LMA) multiple-input multiple-output (MIMO) communication system, where multiple users transmit the phase modulation on hypersphere (PMH) signals to a base station (BS). To reduce the detection complexity, we propose a low-complexity detection scheme based on a ball-tree (BT) stru...
Article
It has been shown that the SK scheme, which was proposed by Schalkwijk and Kailath, is a self-secure capacity-achieving (SSCA) feedback scheme for the Gaussian wiretap channel, i.e., the SK scheme not only achieves the feedback capacity of the Gaussian channel, but also is secure by itself and achieves the feedback secrecy capacity of the Gaussian...
Article
Immersive video, such as virtual reality (VR) and multi-view videos, is growing in popularity. Its wireless streaming is an instance of general multicast, extending conventional unicast and multicast, whose effective design is still open. This paper investigates general rate splitting for general multicast. Specifically, we consider a multi-carrier...
Article
Consider a channel Y = X + N where X is an n-dimensional random vector, and N is a multivariate Gaussian vector with a full-rank covariance matrix K <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">N</sub> . The object under consideration in this paper is the conditional mean of X given Y = y, that is y...
Article
Two of the main principles underlying the life cycle of an artificial intelligence (AI) module in communication networks are adaptation and monitoring . Adaptation refers to the need to adjust the operation of an AI module depending on the current conditions; while monitoring requires measures of the reliability of an AI module's decisions. Cla...
Preprint
Broadcast/multicast communication systems are typically designed to optimize the outage rate criterion, which neglects the performance of the fraction of clients with the worst channel conditions. Targeting ultra-reliable communication scenarios, this paper takes a complementary approach by introducing the conditional value-at-risk (CVaR) rate as t...
Article
We present a condition for 1/2 degree of freedom for each user in constant $K$ -user single-antenna interference channels. This condition is sufficient for all and necessary for almost all channel matrices. Moreover, it applies to all channel topologies, i.e., to fully-connected channels as well as channels that have individual links absent, refl...
Article
For a continuous-time additive white Gaussian noise (AWGN) channel with possible feedback, it has been shown that as sampling gets infinitesimally fine, the mutual information of the associative discrete-time channels converges to that of the original continuous-time channel. We give in this paper more quantitative strengthenings of this result, wh...
Conference Paper
We consider the capacity of a band-limited additive white Gaussian noise channel, with bipolar inputs, a framework motivated by power-efficient faster than Nyquist signaling. We improve the available Ozarow-Wyner-Ziv (OWZ) lower bound on capacity by introducing a new communication scheme, exhibiting two advantages over the OWZ approach based on pea...
Conference Paper
We investigate the special case of diamond relay comprising a Gaussian channel with identical frequency response between the user and the relays and fronthaul links with limited rate from the relays to the destination. We use the oblivious compress and forward (CF) with distributed compression and decode and forward (DF) where each relay decodes th...
Preprint
We study two dual settings of information processing. Let $ \mathsf{Y} \rightarrow \mathsf{X} \rightarrow \mathsf{W} $ be a Markov chain with fixed joint probability mass function $ \mathsf{P}_{\mathsf{X}\mathsf{Y}} $ and a mutual information constraint on the pair $ (\mathsf{W},\mathsf{X}) $. For the first problem, known as Information Bottleneck,...
Article
Full-text available
We study communication systems over band-limited Additive White Gaussian Noise (AWGN) channels in which the transmitter’s output is constrained to be symmetric binary (bipolar). We improve the available Ozarow-Wyner-Ziv (OWZ) lower bound on capacity which is based on peak-power constrained pulse-amplitude modulation, by introducing new schemes (ach...
Article
Full-text available
This paper analyzes the multiplexing gains (MG) for simultaneous transmission of delay-sensitive and delay-tolerant data over interference networks. In the considered model, only delay-tolerant data can profit from coordinated multipoint (CoMP) transmission or reception techniques, because delay-sensitive data has to be transmitted without further...
Article
Full-text available
This work considers a Poisson noise channel with an amplitude constraint. It is well-known that the capacity-achieving input distribution for this channel is discrete with finitely many points. We sharpen this result by introducing upper and lower bounds on the number of mass points. Concretely, an upper bound of order $\mathsf {A}\log ^{2}(\maths...
Preprint
Meta-learning, or learning to learn, offers a principled framework for few-shot learning. It leverages data from multiple related learning tasks to infer an inductive bias that enables fast adaptation on a new task. The application of meta-learning was recently proposed for learning how to demodulate from few pilots. The idea is to use pilots recei...
Article
A communication link aided by a reconfigurable intelligent surface (RIS) is studied in which the transmitter can control the state of the RIS via a finite-rate control link. Channel state information (CSI) is acquired at the receiver based on pilot-assisted channel estimation, and it may or may not be shared with the transmitter. Considering quasi-...
Article
We consider the use of the well-known dual capacity bounding technique for deriving upper bounds on the capacity of indecomposable finite-state channels (FSCs) with finite input and output alphabets. In this technique, capacity upper bounds are obtained by choosing suitable test distributions on the sequence of channel outputs. We propose test dist...
Conference Paper
We consider the use of the well-known dual capacity bounding technique for deriving upper bounds on the capacity of indecomposable finite-state channels (FSCs) with finite input and output alphabets. In this technique, capacity upper bounds are obtained by choosing suitable test distributions on the sequence of channel outputs. We propose test dist...
Preprint
Full-text available
This paper analyses the multiplexing gain (MG) achievable over Wyner's symmetric network with random user activity and random arrival of mixed-delay traffic. The mixed-delay traffic is composed of delay-tolerant traffic and delay-sensitive traffic where only the former can benefit from transmitter and receiver cooperation since the latter is subjec...
Preprint
Full-text available
We study communication systems over band-limited Additive White Gaussian Noise (AWGN) channels in which the transmitter output is constrained to be symmetric binary (bi-polar). In this work we improve the original Ozarov-Wyner-Ziv (OWZ) lower bound on capacity by introducing a new achievability scheme with two advantages over the studied OWZ scheme...
Preprint
Full-text available
This work considers a Poisson noise channel with an amplitude constraint. It is well-known that the capacity-achieving input distribution for this channel is discrete with finitely many points. We sharpen this result by introducing upper and lower bounds on the number of mass points. In particular, the upper bound of order $\mathsf{A} \log^2(\maths...

Network

Cited By