Skip to main content

Showing 1–50 of 232 results for author: Shamai, S

  1. arXiv:2403.19200  [pdf, other

    cs.IT eess.SP

    Cell-Free MIMO Perceptive Mobile Networks: Cloud vs. Edge Processing

    Authors: Seongah Jeong, Jinkyu Kang, Osvaldo Simeone, Shlomo Shamai

    Abstract: Perceptive mobile networks implement sensing and communication by reusing existing cellular infrastructure. Cell-free multiple-input multiple-output, thanks to the cooperation among distributed access points, supports the deployment of multistatic radar sensing, while providing high spectral efficiency for data communication services. To this end, the distributed access points communicate over fro… ▽ More

    Submitted 28 March, 2024; originally announced March 2024.

    Comments: 30 pages, 11 figures

  2. arXiv:2402.07229  [pdf, other

    cs.IT cs.AI

    Successive Refinement in Large-Scale Computation: Advancing Model Inference Applications

    Authors: Homa Esfahanizadeh, Alejandro Cohen, Shlomo Shamai, Muriel Medard

    Abstract: Modern computationally-intensive applications often operate under time constraints, necessitating acceleration methods and distribution of computational workloads across multiple entities. However, the outcome is either achieved within the desired timeline or not, and in the latter case, valuable resources are wasted. In this paper, we introduce solutions for layered-resolution computation. These… ▽ More

    Submitted 11 February, 2024; originally announced February 2024.

    Comments: 13 pages, partially appeared in proceedings of IEEE Cloudnet 2022, submitted and under review for IEEE Transactions on Signal Processing

  3. arXiv:2402.04942  [pdf, ps, other

    cs.IT

    Achieving Gaussian Vector Broadcast Channel Capacity with Scalar Lattices

    Authors: M. Yusuf Şener, Gerhard Kramer, Shlomo Shamai, Ronald Böhnke, Wen Xu

    Abstract: A coding scheme with scalar lattices is applied to K-receiver, Gaussian, vector broadcast channels with K independent messages, one for each receiver. The method decomposes each receiver channel into parallel scalar channels with known interference and applies dirty paper coding with a modulo interval, amplitude shift keying (ASK), and probabilistic shaping to each scalar channel. The achievable r… ▽ More

    Submitted 24 April, 2024; v1 submitted 7 February, 2024; originally announced February 2024.

  4. arXiv:2401.15752  [pdf, other

    cs.IT

    Integrated Sensing and Communication in the Finite Blocklength Regime

    Authors: Homa Nikbakht, Michèle Wigger, Shlomo Shamai, H. Vincent Poor

    Abstract: A point-to-point integrated sensing and communication (ISAC) system is considered where a transmitter conveys a message to a receiver over a discrete memoryless channel (DMC) and simultaneously estimates the state of the channel through the backscattered signals of the emitted waveform. We derive achievability and converse bounds on the rate-distortion-error tradeoff in the finite blocklength re… ▽ More

    Submitted 28 January, 2024; originally announced January 2024.

  5. arXiv:2401.14710  [pdf, ps, other

    cs.IT

    Lower Bounds on Mutual Information for Linear Codes Transmitted over Binary Input Channels, and for Information Combining

    Authors: Uri Erez, Or Ordentlich, Shlomo Shamai

    Abstract: It has been known for a long time that the mutual information between the input sequence and output of a binary symmetric channel (BSC) is upper bounded by the mutual information between the same input sequence and the output of a binary erasure channel (BEC) with the same capacity. Recently, Samorodintsky discovered that one may also lower bound the BSC mutual information in terms of the mutual i… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

  6. arXiv:2401.11974  [pdf, other

    cs.LG stat.ML

    Cross-Validation Conformal Risk Control

    Authors: Kfir M. Cohen, Sangwoo Park, Osvaldo Simeone, Shlomo Shamai

    Abstract: Conformal risk control (CRC) is a recently proposed technique that applies post-hoc to a conventional point predictor to provide calibration guarantees. Generalizing conformal prediction (CP), with CRC, calibration is ensured for a set predictor that is extracted from the point predictor to control a risk function such as the probability of miscoverage or the false negative rate. The original CRC… ▽ More

    Submitted 1 May, 2024; v1 submitted 22 January, 2024; originally announced January 2024.

    Comments: accepted for presentation at 2024 IEEE International Symposium on Information Theory (ISIT 2024)

  7. arXiv:2401.05045  [pdf, ps, other

    cs.IT

    Improved Bounds on the Number of Support Points of the Capacity-Achieving Input for Amplitude Constrained Poisson Channels

    Authors: Luca Barletta, Alex Dytso, Shlomo Shamai

    Abstract: This work considers a discrete-time Poisson noise channel with an input amplitude constraint $\mathsf{A}$ and a dark current parameter $λ$. It is known that the capacity-achieving distribution for this channel is discrete with finitely many points. Recently, for $λ=0$, a lower bound of order $\sqrt{\mathsf{A}}$ and an upper bound of order $\mathsf{A} \log^2(\mathsf{A})$ have been demonstrated on t… ▽ More

    Submitted 10 January, 2024; originally announced January 2024.

    Comments: 7 pages, 1 figure, extended version of a paper submitted to IEEE ISIT 2024

  8. arXiv:2311.04537  [pdf, other

    eess.SP cs.IT cs.LG

    Deep Learning Assisted Multiuser MIMO Load Modulated Systems for Enhanced Downlink mmWave Communications

    Authors: Ercong Yu, Jinle Zhu, Qiang Li, Zilong Liu, Hongyang Chen, Shlomo Shamai, H. Vincent Poor

    Abstract: This paper is focused on multiuser load modulation arrays (MU-LMAs) which are attractive due to their low system complexity and reduced cost for millimeter wave (mmWave) multi-input multi-output (MIMO) systems. The existing precoding algorithm for downlink MU-LMA relies on a sub-array structured (SAS) transmitter which may suffer from decreased degrees of freedom and complex system configuration.… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

    Comments: 14 pages, Journal, accepted by IEEE TWC

  9. arXiv:2310.04911  [pdf, ps, other

    cs.IT

    Interference Networks with Random User Activity and Heterogeneous Delay Constraints

    Authors: Homa Nikbakht, Michèle Wigger, Shlomo Shamai, Jean-Marie Gorce, H. Vincent Poor

    Abstract: To answer the call for a new theoretical framework to simultaneously accommodate random user activity and heterogeneous delay traffic in Internet of Things (IoT) systems, in this paper we propose coding schemes and information-theoretic converse results for the transmission of heterogeneous delay traffic over interference networks with random user activity and random data arrivals. The heterogeneo… ▽ More

    Submitted 7 October, 2023; originally announced October 2023.

  10. arXiv:2305.07769  [pdf, ps, other

    cs.IT

    Joint Coding of eMBB and URLLC in Vehicle-to-Everything (V2X) Communications

    Authors: Homa Nikbakht, Eric Ruzomberka, Michèle Wigger, Shlomo Shamai, H. Vincent Poor

    Abstract: A point-to-point communication is considered where a roadside unite (RSU) wishes to simultaneously send messages of enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) services to a vehicle. The eMBB message arrives at the beginning of a block and its transmission lasts over the entire block. During each eMBB transmission block, random arrivals of URLLC messages a… ▽ More

    Submitted 12 May, 2023; originally announced May 2023.

  11. arXiv:2305.04559  [pdf, other

    cs.IT

    Distributed Information Bottleneck for a Primitive Gaussian Diamond MIMO Channel

    Authors: Yi Song, Hao Xu, Kai-Kit Wong, Giuseppe Caire, Shlomo Shamai

    Abstract: This paper considers the distributed information bottleneck (D-IB) problem for a primitive Gaussian diamond channel with two relays and MIMO Rayleigh fading. The channel state is an independent and identically distributed (i.i.d.) process known at the relays but unknown to the destination. The relays are oblivious, i.e., they are unaware of the codebook and treat the transmitted signal as a random… ▽ More

    Submitted 8 May, 2023; originally announced May 2023.

    Comments: arXiv admin note: text overlap with arXiv:2206.14453

  12. arXiv:2305.00930  [pdf, ps, other

    cs.IT

    On Mismatched Oblivious Relaying

    Authors: Michael Dikshtein, Nir Weinberger, Shlomo Shamai

    Abstract: We consider the problem of reliable communication over a discrete memoryless channel (DMC) with the help of a relay, termed the information bottleneck (IB) channel. There is no direct link between the source and the destination, and the information flows in two hops. The first hop is a noisy channel from the source to the relay. The second hop is a noiseless but limited-capacity backhaul link from… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

    Comments: Accepted to ISIT2023

  13. arXiv:2303.06637  [pdf, other

    cs.IT

    Integrated Communication and Receiver Sensing with Security Constraints on Message and State

    Authors: Mehrasa Ahmadipour, Michèle Wigger, Shlomo Shamai

    Abstract: We study the state-dependent wiretap channel with non-causal channel state informations at the encoder in an integrated sensing and communications (ISAC) scenario. In this scenario, the transmitter communicates a message and a state sequence to a legitimate receiver while keeping the message and state-information secret from an external eavesdropper. This paper presents a new achievability result… ▽ More

    Submitted 12 March, 2023; originally announced March 2023.

  14. arXiv:2303.06636  [pdf, other

    cs.IT

    Strong Converses for Memoryless Bi-Static ISAC

    Authors: Mehrasa Ahmadipour, Michele Wigger, Shlomo Shamai

    Abstract: The paper characterizes the fundamental limits of integrated sensing and communication (ISAC) systems with a bi-static radar, where the radar receiver is located close to the transmitter and estimates or detects the state based on the transmitter's channel inputs and the backscattered signals. Two models are considered. In the first model, the memoryless state sequence is distributed according to… ▽ More

    Submitted 12 March, 2023; originally announced March 2023.

  15. arXiv:2302.13073  [pdf, other

    cs.IT

    Feedback Capacity of the Continuous-Time ARMA(1,1) Gaussian Channel

    Authors: Jun Su, Guangyue Han, Shlomo Shamai

    Abstract: We consider the continuous-time ARMA(1,1) Gaussian channel and derive its feedback capacity in closed form. More specifically, the channel is given by $\boldsymbol{y}(t) =\boldsymbol{x}(t) +\boldsymbol{z}(t)$, where the channel input $\{\boldsymbol{x}(t) \}$ satisfies average power constraint $P$ and the noise $\{\boldsymbol{z}(t)\}$ is a first-order {\em autoregressive moving average} (ARMA(1,1))… ▽ More

    Submitted 10 April, 2024; v1 submitted 25 February, 2023; originally announced February 2023.

  16. arXiv:2302.07675  [pdf, other

    eess.SP cs.LG cs.NI

    Guaranteed Dynamic Scheduling of Ultra-Reliable Low-Latency Traffic via Conformal Prediction

    Authors: Kfir M. Cohen, Sangwoo Park, Osvaldo Simeone, Petar Popovski, Shlomo Shamai

    Abstract: The dynamic scheduling of ultra-reliable and low-latency traffic (URLLC) in the uplink can significantly enhance the efficiency of coexisting services, such as enhanced mobile broadband (eMBB) devices, by only allocating resources when necessary. The main challenge is posed by the uncertainty in the process of URLLC packet generation, which mandates the use of predictors for URLLC traffic in the c… ▽ More

    Submitted 3 April, 2023; v1 submitted 15 February, 2023; originally announced February 2023.

    Comments: To appear in IEEE Signal Processing Letters

    Journal ref: IEEE Signal Processing Letters, vol. 30, pp. 473-477, April 2023

  17. arXiv:2212.07775  [pdf, other

    cs.LG eess.SP

    Calibrating AI Models for Wireless Communications via Conformal Prediction

    Authors: Kfir M. Cohen, Sangwoo Park, Osvaldo Simeone, Shlomo Shamai

    Abstract: When used in complex engineered systems, such as communication networks, artificial intelligence (AI) models should be not only as accurate as possible, but also well calibrated. A well-calibrated AI model is one that can reliably quantify the uncertainty of its decisions, assigning high confidence levels to decisions that are likely to be correct and low confidence levels to decisions that are li… ▽ More

    Submitted 15 December, 2022; originally announced December 2022.

    Comments: Submitted for a journal review

  18. Calibrating AI Models for Few-Shot Demodulation via Conformal Prediction

    Authors: Kfir M. Cohen, Sangwoo Park, Osvaldo Simeone, Shlomo Shamai

    Abstract: AI tools can be useful to address model deficits in the design of communication systems. However, conventional learning-based AI algorithms yield poorly calibrated decisions, unabling to quantify their outputs uncertainty. While Bayesian learning can enhance calibration by capturing epistemic uncertainty caused by limited data availability, formal calibration guarantees only hold under strong assu… ▽ More

    Submitted 10 October, 2022; originally announced October 2022.

    Comments: Submitted for a conference publication

    Journal ref: IEEE Transactions on Machine Learning in Communications and Networking, vol. 1, pp. 296-312, September 2023

  19. arXiv:2208.10136  [pdf, ps, other

    cs.IT

    On Information Bottleneck for Gaussian Processes

    Authors: Michael Dikshtein, Nir Weinberger, Shlomo Shamai

    Abstract: The information bottleneck problem (IB) of jointly stationary Gaussian sources is considered. A water-filling solution for the IB rate is given in terms of its SNR spectrum and whose rate is attained via frequency domain test-channel realization. A time-domain realization of the IB rate, based on linear prediction, is also proposed, which lends itself to an efficient implementation of the correspo… ▽ More

    Submitted 22 August, 2022; originally announced August 2022.

    Comments: Complementary proofs for the ITW2022 conference paper

  20. arXiv:2208.01437  [pdf, other

    cs.DC cs.IT

    Distributed Computations with Layered Resolution

    Authors: Homa Esfahanizadeh, Alejandro Cohen, Muriel Médard, Shlomo Shamai

    Abstract: Modern computationally-heavy applications are often time-sensitive, demanding distributed strategies to accelerate them. On the other hand, distributed computing suffers from the bottleneck of slow workers in practice. Distributed coded computing is an attractive solution that adds redundancy such that a subset of distributed computations suffices to obtain the final result. However, the final res… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

  21. arXiv:2206.14453  [pdf, other

    cs.IT

    Distributed Information Bottleneck for a Primitive Gaussian Diamond Channel with Rayleigh Fading

    Authors: Hao Xu, Kai-Kit Wong, Giuseppe Caire, Shlomo Shamai

    Abstract: This paper considers the distributed information bottleneck (D-IB) problem for a primitive Gaussian diamond channel with two relays and Rayleigh fading. Due to the bottleneck constraint, it is impossible for the relays to inform the destination node of the perfect channel state information (CSI) in each realization. To evaluate the bottleneck rate, we provide an upper bound by assuming that the de… ▽ More

    Submitted 29 June, 2022; originally announced June 2022.

    Comments: 6 pages, 3 figures, this paper has been accetped by the 2022 IEEE International Symposium on Information Theory (ISIT)

  22. arXiv:2206.11395  [pdf, ps, other

    cs.IT

    Joint Coding of URLLC and eMBB in Wyner's Soft-Handoff Network in the Finite Blocklength Regime

    Authors: Homa Nikbakht, Michèle Wigger, Shlomo Shamai, Jean-Marie Gorce, H. Vincent Poor

    Abstract: Wyner's soft-handoff network is considered where transmitters simultaneously send messages of enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) services. Due to the low-latency requirements, the URLLC messages are transmitted over fewer channel uses compared to the eMBB messages. To improve the reliability of the URLLC transmissions, we propose a coding scheme w… ▽ More

    Submitted 22 June, 2022; originally announced June 2022.

  23. arXiv:2205.04567  [pdf, ps, other

    cs.IT

    The Compound Information Bottleneck Outlook

    Authors: Michael Dikshtein, Nir Weinberger, Shlomo Shamai

    Abstract: We formulate and analyze the compound information bottleneck programming. In this problem, a Markov chain $ \mathsf{X} \rightarrow \mathsf{Y} \rightarrow \mathsf{Z} $ is assumed with fixed marginal distributions $\mathsf{P}_{\mathsf{X}}$ and $\mathsf{P}_{\mathsf{Y}}$, and the mutual information between $ \mathsf{X} $ and $ \mathsf{Z} $ is sought to be maximized over the choice of conditional proba… ▽ More

    Submitted 9 May, 2022; originally announced May 2022.

    Comments: This work has been submitted to the IEEE for possible publication

  24. arXiv:2205.01748  [pdf, ps, other

    cs.IT

    Bounds on the Capacity of the Multiple Access Diamond Channel with Cooperating Base-Stations

    Authors: Michael Dikshtein, Shirin Saeedi Bidokhti, Shlomo Shamai

    Abstract: A diamond network is considered in which the central processor is connected, via backhaul noiseless links, to multiple conferencing base stations, which communicate with a single user over a multiple access channel. We propose coding techniques along with lower and upper bounds on the capacity. Our achievability scheme uses a common cloud coding strategy based on the technique proposed by Wand, Wi… ▽ More

    Submitted 3 May, 2022; originally announced May 2022.

    Comments: Complementary proofs for the ISIT2022 conference paper

  25. An Information-Theoretic View of Mixed-Delay Traffic in 5G and 6G

    Authors: Homa Nikbakht, Michèle Wigger, Malcolm Egan, Shlomo Shamai, Jean-Marie Gorce, H. Vincent Poor

    Abstract: Fifth generation mobile communication systems (5G) have to accommodate both Ultra-Reliable Low-Latency Communication (URLLC) and enhanced Mobile Broadband (eMBB) services. While, eMBB applications support high data rates, URLLC services aim at guaranteeing low-latencies and high-reliabilities. eMBB and URLLC services are scheduled on the same frequency band, where the different latency requirement… ▽ More

    Submitted 22 March, 2022; originally announced March 2022.

  26. arXiv:2203.03690  [pdf, ps, other

    eess.SP cs.IT

    Robust Design of Rate-Splitting Multiple Access With Imperfect CSI for Cell-Free MIMO Systems

    Authors: Daesung Yu, Seok-Hwan Park, Osvaldo Simeone, Shlomo Shamai

    Abstract: Rate-Splitting Multiple Access (RSMA) for multi-user downlink operates by splitting the message for each user equipment (UE) into a private message and a set of common messages, which are simultaneously transmitted by means of superposition coding. The RSMA scheme can enhance throughput and connectivity as compared to conventional multiple access techniques by optimizing the rate-splitting ratios… ▽ More

    Submitted 7 March, 2022; originally announced March 2022.

    Comments: To be presented at IEEE ICC 2022 6th Workshop on Rate-Splitting Multiple Access for 6G

  27. arXiv:2202.11598  [pdf, ps, other

    stat.ML cs.LG math.ST stat.ME

    A Dimensionality Reduction Method for Finding Least Favorable Priors with a Focus on Bregman Divergence

    Authors: Alex Dytso, Mario Goldenbaum, H. Vincent Poor, Shlomo Shamai

    Abstract: A common way of characterizing minimax estimators in point estimation is by moving the problem into the Bayesian estimation domain and finding a least favorable prior distribution. The Bayesian estimator induced by a least favorable prior, under mild conditions, is then known to be minimax. However, finding least favorable distributions can be challenging due to inherent optimization over the spac… ▽ More

    Submitted 23 February, 2022; originally announced February 2022.

    Comments: To appear in the proceedings of 25th International Conference on Artificial Intelligence and Statistics (AISTATS) 2022

  28. arXiv:2202.03018  [pdf, other

    cs.IT

    Broadcast Approach Meets Network Coding for Data Streaming

    Authors: Alejandro Cohen, Muriel Médard, Shlomo Shamai

    Abstract: For data streaming applications, existing solutions are not yet able to close the gap between high data rates and low delay. This work considers the problem of data streaming under mixed delay constraints over a single communication channel with delayed feedback. We propose a novel layered adaptive causal random linear network coding (LAC-RLNC) approach with forward error correction. LAC-RLNC is a… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

  29. arXiv:2201.07795  [pdf, ps, other

    cs.IT

    Rate Splitting for General Multicast

    Authors: Lingzhi Zhao, Ying Cui, Sheng Yang, Shlomo Shamai, Yunbo Han, Yunfei Zhang

    Abstract: Immersive video, such as virtual reality (VR) and multi-view videos, is growing in popularity. Its wireless streaming is an instance of general multicast, extending conventional unicast and multicast, whose effective design is still open. This paper investigates the optimization of general rate splitting with linear beamforming for general multicast. Specifically, we consider a multi-carrier singl… ▽ More

    Submitted 18 January, 2022; originally announced January 2022.

    Comments: 6 pages, 7 figures, to appear in IEEE ICC 2022. arXiv admin note: substantial text overlap with arXiv:2201.07386

  30. arXiv:2201.07386  [pdf, ps, other

    cs.IT

    An Optimization Framework for General Rate Splitting for General Multicast

    Authors: Lingzhi Zhao, Ying Cui, Sheng Yang, Shlomo Shamai

    Abstract: Immersive video, such as virtual reality (VR) and multi-view videos, is growing in popularity. Its wireless streaming is an instance of general multicast, extending conventional unicast and multicast, whose effective design is still open. This paper investigates general rate splitting for general multicast. Specifically, we consider a multi-carrier single-cell wireless network where a multi-antenn… ▽ More

    Submitted 16 June, 2022; v1 submitted 18 January, 2022; originally announced January 2022.

    Comments: 30 pages, 9 figures, submitted to Trans. Wireless Commun, and under minor revision

  31. arXiv:2112.02007  [pdf, ps, other

    cs.IT eess.SP

    Learning to Broadcast for Ultra-Reliable Communication with Differential Quality of Service via the Conditional Value at Risk

    Authors: Roy Karasik, Osvaldo Simeone, Hyeryung Jang, Shlomo Shamai

    Abstract: Broadcast/multicast communication systems are typically designed to optimize the outage rate criterion, which neglects the performance of the fraction of clients with the worst channel conditions. Targeting ultra-reliable communication scenarios, this paper takes a complementary approach by introducing the conditional value-at-risk (CVaR) rate as the expected rate of a worst-case fraction of clien… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

    Comments: 31 pages, 8 figures, submitted for possible journal publication

  32. arXiv:2110.00985  [pdf, ps, other

    cs.IT

    A Class of Nonbinary Symmetric Information Bottleneck Problems

    Authors: Michael Dikshtein, Shlomo Shamai

    Abstract: We study two dual settings of information processing. Let $ \mathsf{Y} \rightarrow \mathsf{X} \rightarrow \mathsf{W} $ be a Markov chain with fixed joint probability mass function $ \mathsf{P}_{\mathsf{X}\mathsf{Y}} $ and a mutual information constraint on the pair $ (\mathsf{W},\mathsf{X}) $. For the first problem, known as Information Bottleneck, we aim to maximize the mutual information between… ▽ More

    Submitted 3 October, 2021; originally announced October 2021.

    Comments: 7 pages, 4 figures, Submitted to the 2022 International Zurich Seminar on Information and Communication

  33. Bayesian Active Meta-Learning for Few Pilot Demodulation and Equalization

    Authors: Kfir M. Cohen, Sangwoo Park, Osvaldo Simeone, Shlomo Shamai

    Abstract: Two of the main principles underlying the life cycle of an artificial intelligence (AI) module in communication networks are adaptation and monitoring. Adaptation refers to the need to adjust the operation of an AI module depending on the current conditions; while monitoring requires measures of the reliability of an AI module's decisions. Classical frequentist learning methods for the design of A… ▽ More

    Submitted 5 December, 2022; v1 submitted 2 August, 2021; originally announced August 2021.

    Comments: To appear in IEEE Transactions on Signal Processing

    Journal ref: IEEE Transactions on Signal Processing, vol. 70, pp. 5366-5380, 2022

  34. arXiv:2106.01286  [pdf, ps, other

    cs.IT

    Cooperative Encoding and Decoding of Mixed Delay Traffic under Random-User Activity

    Authors: Homa Nikbakht, Michèle Wigger, Shlomo Shamai, Jean-Marie Gorce

    Abstract: This paper analyses the multiplexing gain (MG) achievable over Wyner's symmetric network with random user activity and random arrival of mixed-delay traffic. The mixed-delay traffic is composed of delay-tolerant traffic and delay-sensitive traffic where only the former can benefit from transmitter and receiver cooperation since the latter is subject to stringent decoding delays. The total number o… ▽ More

    Submitted 2 June, 2021; originally announced June 2021.

  35. On information rates over a binary input channel

    Authors: Michael Peleg, Tomer Michaeli, Shlomo Shamai

    Abstract: We study communication systems over band-limited Additive White Gaussian Noise (AWGN) channels in which the transmitter output is constrained to be symmetric binary (bi-polar). In this work we improve the original Ozarov-Wyner-Ziv (OWZ) lower bound on capacity by introducing new achievability schemes with two advantages over the studied OWZ scheme which is based on peak-power constrained pulse-amp… ▽ More

    Submitted 6 October, 2021; v1 submitted 13 May, 2021; originally announced May 2021.

    Comments: in IEEE Open Journal of the Communications Society, 2021

  36. arXiv:2104.14431  [pdf, ps, other

    cs.IT

    Properties of the Support of the Capacity-Achieving Distribution of the Amplitude-Constrained Poisson Noise Channel

    Authors: Alex Dytso, Luca Barletta, Shlomo Shamai

    Abstract: This work considers a Poisson noise channel with an amplitude constraint. It is well-known that the capacity-achieving input distribution for this channel is discrete with finitely many points. We sharpen this result by introducing upper and lower bounds on the number of mass points. Concretely, an upper bound of order $\mathsf{A} \log^2(\mathsf{A})$ and a lower bound of order $\sqrt{\mathsf{A}}$… ▽ More

    Submitted 29 July, 2021; v1 submitted 29 April, 2021; originally announced April 2021.

    Comments: Submitted to IEEE Transactions on Information Theory

  37. arXiv:2104.01883  [pdf, ps, other

    cs.IT math.ST stat.ML

    A General Derivative Identity for the Conditional Mean Estimator in Gaussian Noise and Some Applications

    Authors: Alex Dytso, H. Vincent Poor, Shlomo Shamai

    Abstract: Consider a channel ${\bf Y}={\bf X}+ {\bf N}$ where ${\bf X}$ is an $n$-dimensional random vector, and ${\bf N}$ is a Gaussian vector with a covariance matrix ${\bf \mathsf{K}}_{\bf N}$. The object under consideration in this paper is the conditional mean of ${\bf X}$ given ${\bf Y}={\bf y}$, that is ${\bf y} \to E[{\bf X}|{\bf Y}={\bf y}]$. Several identities in the literature connect… ▽ More

    Submitted 5 April, 2021; originally announced April 2021.

  38. arXiv:2103.16188  [pdf, ps, other

    eess.SP cs.IT

    Collaborative Cloud and Edge Mobile Computing in C-RAN Systems with Minimal End-to-End Latency

    Authors: Seok-Hwan Park, Seongah Jeong, Jinyeop Na, Osvaldo Simeone, Shlomo Shamai

    Abstract: Mobile cloud and edge computing protocols make it possible to offer computationally heavy applications to mobile devices via computational offloading from devices to nearby edge servers or more powerful, but remote, cloud servers. Previous work assumed that computational tasks can be fractionally offloaded at both cloud processor (CP) and at a local edge node (EN) within a conventional Distributed… ▽ More

    Submitted 30 March, 2021; originally announced March 2021.

    Comments: accepted for publication on IEEE Transactions on Signal and Information Processing over Networks

  39. arXiv:2102.10675  [pdf, other

    cs.IT

    Information Bottleneck for a Rayleigh Fading MIMO Channel with an Oblivious Relay

    Authors: Hao Xu, Tianyu Yang, Giuseppe Caire, Shlomo Shamai

    Abstract: This paper considers the information bottleneck (IB) problem of a Rayleigh fading multiple-input multiple-out (MIMO) channel with an oblivious relay. The relay is constrained to operate without knowledge of the codebooks, i.e., it performs oblivious processing. Moreover, due to the bottleneck constraint, it is impossible for the relay to inform the destination node of the perfect channel state inf… ▽ More

    Submitted 7 May, 2021; v1 submitted 21 February, 2021; originally announced February 2021.

    Comments: 52 pages, 16 figures, submitted for publication. arXiv admin note: substantial text overlap with arXiv:2101.09790

  40. arXiv:2101.09790  [pdf, other

    cs.IT

    Information Bottleneck for an Oblivious Relay with Channel State Information: the Vector Case

    Authors: Hao Xu, Tianyu Yang, Giuseppe Caire, Shlomo Shamai

    Abstract: This paper considers the information bottleneck (IB) problem of a Rayleigh fading multiple-input multiple-out (MIMO) channel. Due to the bottleneck constraint, it is impossible for the oblivious relay to inform the destination node of the perfect channel state information (CSI) in each channel realization. To evaluate the bottleneck rate, we provide an upper bound by assuming that the destination… ▽ More

    Submitted 7 May, 2021; v1 submitted 24 January, 2021; originally announced January 2021.

    Comments: 12 pages, 3 figures, this paper has been accepted by ISIT 2021

  41. arXiv:2101.09564  [pdf, other

    cs.IT

    The Filtered Gaussian Primitive Diamond Channel

    Authors: Asif Katz, Michael Peleg, Shlomo Shamai

    Abstract: We investigate the special case of diamond relay comprising a Gaussian channel with identical frequency response from the user to the relays and fronthaul links with limited rate from the relays to the destination. We use the oblivious compress and forward (CF) with distributed compression and decode and forward (DF) where each relay decodes the whole message and sends half of its bits to the dest… ▽ More

    Submitted 28 September, 2021; v1 submitted 23 January, 2021; originally announced January 2021.

  42. arXiv:2101.07556  [pdf, ps, other

    cs.IT eess.SP

    Single-RF Multi-User Communication Through Reconfigurable Intelligent Surfaces: An Information-Theoretic Analysis

    Authors: Roy Karasik, Osvaldo Simeone, Marco Di Renzo, Shlomo Shamai

    Abstract: Reconfigurable intelligent surfaces (RISs) are typically used in multi-user systems to mitigate interference among active transmitters. In contrast, this paper studies a setting with a conventional active encoder as well as a passive encoder that modulates the reflection pattern of the RIS. The RIS hence serves the dual purpose of improving the rate of the active encoder and of enabling communicat… ▽ More

    Submitted 19 January, 2021; originally announced January 2021.

    Comments: Submitted for possible conference publication. arXiv admin note: text overlap with arXiv:2012.00407

  43. The Broadcast Approach in Communication Networks

    Authors: Ali Tajer, Avi Steiner, Shlomo Shamai

    Abstract: This paper reviews the theoretical and practical principles of the broadcast approach to communication over state-dependent channels and networks in which the transmitters have access to only the probabilistic description of the time-varying states while remaining oblivious to their instantaneous realizations. When the temporal variations are frequent enough, an effective long-term strategy is ada… ▽ More

    Submitted 18 January, 2021; originally announced January 2021.

    Comments: 149 pages, 37 figures

  44. arXiv:2012.07615  [pdf, ps, other

    cs.IT

    Coordinated Multi Point Transmission and Reception for Mixed-Delay Traffic

    Authors: Homa Nikbkaht, Michele Wigger, Shlomo Shamai

    Abstract: This paper analyzes the multiplexing gains (MG) for simultaneous transmission of delay-sensitive and delay-tolerant data over interference networks. In the considered model, only delay-tolerant data can profit from coordinated multipoint (CoMP) transmission or reception techniques, because delay-sensitive data has to be transmitted without further delay. Transmission of delay-tolerant data is also… ▽ More

    Submitted 14 December, 2020; originally announced December 2020.

    Comments: 41 pages, submitted to Transactions on Communications

  45. arXiv:2012.00407  [pdf, ps, other

    cs.IT eess.SP

    Adaptive Coding and Channel Shaping Through Reconfigurable Intelligent Surfaces: An Information-Theoretic Analysis

    Authors: Roy Karasik, Osvaldo Simeone, Marco Di Renzo, Shlomo Shamai

    Abstract: A communication link aided by a reconfigurable intelligent surface (RIS) is studied in which the transmitter can control the state of the RIS via a finite-rate control link. Channel state information (CSI) is acquired at the receiver based on pilot-assisted channel estimation, and it may or may not be shared with the transmitter. Considering quasi-static fading channels with imperfect CSI, capacit… ▽ More

    Submitted 1 December, 2020; originally announced December 2020.

    Comments: submitted

  46. arXiv:2007.14555  [pdf, other

    cs.IT

    Self-Secure Capacity-Achieving Feedback Schemes of Gaussian Multiple-Access Wiretap Channels with Degraded Message Sets

    Authors: Bin Dai, Chong Li, Yingbin Liang, Zheng Ma, Shlomo Shamai

    Abstract: The Schalkwijk-Kailath (SK) scheme, which achieves the capacity of the point-to-point white Gaussian channel with feedback, is secure by itself and also achieves the secrecy capacity of the Gaussian wiretap channel with feedback, i.e., the SK scheme is a self-secure capacity-achieving (SSCA) feedback scheme for the Gaussian wiretap channel. For the multi-user wiretap channels, recently, it has bee… ▽ More

    Submitted 18 November, 2021; v1 submitted 28 July, 2020; originally announced July 2020.

  47. arXiv:2006.02310  [pdf, ps, other

    cs.IT

    Canonical Conditions for K/2 Degrees of Freedom

    Authors: Recep Gül, David Stotz, Syed Ali Jafar, Helmut Bölcskei, Shlomo Shamai

    Abstract: We present a necessary and sufficient condition for $1/2$ degree of freedom for each user in constant $K$-user single-antenna interference channels. This condition applies to all channel topologies, i.e., to fully-connected channels as well as channels that have individual links absent, reflected by corresponding zeros in the channel matrix. Moreover, it captures the essence of interference alignm… ▽ More

    Submitted 3 June, 2020; originally announced June 2020.

  48. arXiv:2004.14464  [pdf, other

    cs.IT

    Broadcast Approach for the Information Bottleneck Channel

    Authors: Avi Steiner, Shlomo Shamai

    Abstract: This work considers a layered coding approach for efficient transmission of data over a wireless block fading channel without transmitter channel state information (CSI), which is connected to a limited capacity reliable link, known as the bottleneck channel. Two main approaches are considered, the first is an oblivious approach, where the sampled noisy observations are compressed and transmitted… ▽ More

    Submitted 29 April, 2020; originally announced April 2020.

  49. arXiv:2004.09168  [pdf, ps, other

    eess.SP cs.IT

    Optimizing Over-the-Air Computation in IRS-Aided C-RAN Systems

    Authors: Daesung Yu, Seok-Hwan Park, Osvaldo Simeone, Shlomo Shamai

    Abstract: Over-the-air computation (AirComp) is an efficient solution to enable federated learning on wireless channels. AirComp assumes that the wireless channels from different devices can be controlled, e.g., via transmitter-side phase compensation, in order to ensure coherent on-air combining. Intelligent reflecting surfaces (IRSs) can provide an alternative, or additional, means of controlling channel… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

    Comments: to appear in Proc. IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) 2020

  50. arXiv:2004.04330  [pdf, other

    cs.IT

    The Secrecy Capacity of Cost-Constrained Wiretap Channels

    Authors: Sreejith Sreekumar, Alexander Bunin, Ziv Goldfeld, Haim H. Permuter, Shlomo Shamai

    Abstract: In many information-theoretic channel coding problems, adding an input cost constraint to the operational setup amounts to restricting the optimization domain in the capacity formula. This paper shows that, in contrast to common belief, such a simple modification does not hold for the cost-constrained (CC) wiretap channel (WTC). The secrecy-capacity of the discrete memoryless (DM) WTC without cost… ▽ More

    Submitted 26 December, 2020; v1 submitted 8 April, 2020; originally announced April 2020.