Recognition: 2 theorem links
· Lean TheoremFoundations of Future Communication Systems: Innovations in Communication - A Report
Pith reviewed 2026-05-10 18:38 UTC · model grok-4.3
The pith
This report compiles all abstracts from the FFCS conference to document current research on foundations of future communication systems.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The report establishes that the collected works reflect a broad move beyond classical Shannon theory toward post-Shannon paradigms, quantum information science, and physically grounded models, with contributions examining identification-based communication, entanglement-assisted networks, semantic and goal-oriented communication, coding for molecular systems, secure authentication, and information-theoretic limits of novel physical-layer architectures.
What carries the argument
The systematic compilation and thematic organization of every invited talk, contributed presentation, and poster abstract into an overview of research frontiers.
Load-bearing premise
The selected abstracts faithfully represent the full scope of the conference without omission or selection bias.
What would settle it
An independent complete list of all FFCS presentations that reveals multiple omitted talks or posters would show the compilation is incomplete.
Figures
read the original abstract
The Foundations of Future Communication Systems (FFCS) conference brought together leading researchers from information theory, quantum communication, molecular communication, semantic communication, and secure network design to explore the fundamental principles shaping next-generation communication systems. The event serves as a platform for interdisciplinary exchange, bridging classical Shannon theory, post-Shannon paradigms, quantum information science, and emerging physically grounded communication models. This report compiles the abstracts of all invited talks, contributed presentations, and poster contributions presented at FFCS. The collected works reflect the breadth of contemporary research directions, including identification-based communication, entanglement-assisted networks, semantic and goal-oriented communication, coding for molecular and nanoscale systems, secure authentication mechanisms, and information-theoretic limits of novel physical-layer architectures. A central theme of the conference was the re-examination of foundational limits under realistic physical, architectural, and security constraints. Many contributions move beyond traditional rate-centric perspectives and instead investigate reliability, identification, semantics, resource efficiency, and trust in complex and heterogeneous networks. The inclusion of poster abstracts further highlights emerging ideas, early-stage research results, and innovative cross-disciplinary approaches that contribute to shaping future communication paradigms. By documenting the intellectual landscape presented at FFCS, this report aims to provide a structured overview of current research frontiers and to stimulate continued collaboration across theoretical and experimental domains.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript is a conference report on the Foundations of Future Communication Systems (FFCS) event. It compiles the abstracts of all invited talks, contributed presentations, and poster contributions, covering research in information theory, quantum communication, molecular communication, semantic communication, and secure network design. Key themes include identification-based communication, entanglement-assisted networks, semantic and goal-oriented communication, coding for molecular and nanoscale systems, secure authentication, and information-theoretic limits of novel physical-layer architectures under realistic constraints.
Significance. If the compilation is complete and accurate, the report serves as a useful archival record documenting the breadth of current work on post-Shannon paradigms and physically grounded communication models. It highlights the shift toward reliability, semantics, resource efficiency, and trust in heterogeneous networks. However, as it contains no original derivations, theorems, empirical results, or interpretive synthesis, its contribution is limited to documentation and does not advance the theoretical or experimental state of the art.
Simulated Author's Rebuttal
We thank the referee for their review of our manuscript, which is intended as an archival conference report compiling abstracts from the FFCS event. We address the key points in the report below.
read point-by-point responses
-
Referee: The manuscript compiles abstracts of invited talks, presentations, and posters but contains no original derivations, theorems, empirical results, or interpretive synthesis.
Authors: We agree that the manuscript is a compilation of abstracts rather than a vehicle for new theoretical results. Its explicit purpose, as stated in the abstract, is to document the intellectual landscape of the conference, including emerging directions in identification-based communication, semantic communication, quantum networks, and molecular systems. Such reports provide a structured archival record that is otherwise unavailable in a single source. revision: no
-
Referee: Its contribution is limited to documentation and does not advance the theoretical or experimental state of the art; recommendation is to reject.
Authors: While we acknowledge the absence of new theorems, the report captures the breadth of post-Shannon paradigms and physically grounded models presented at FFCS. Conference reports of this type serve the community by preserving the full set of contributions (including posters) for future reference, especially in rapidly evolving interdisciplinary areas. We believe this fulfills a legitimate archival function distinct from original research articles. revision: no
Circularity Check
No circularity: factual conference report with no derivations or predictions
full rationale
The document is explicitly a conference report whose sole claim is compilation of abstracts from invited talks, presentations, and posters at FFCS. No original theorems, equations, predictions, fitted parameters, or interpretive syntheses are advanced. The text functions purely as an archival listing with no load-bearing assumptions or derivation chain that could reduce to its inputs by construction. No self-citations, ansatzes, or uniqueness claims appear in any scientific argument.
Axiom & Free-Parameter Ledger
Lean theorems connected to this paper
-
IndisputableMonolith/Foundation/RealityFromDistinction.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
This report compiles the abstracts of all invited talks, contributed presentations, and poster contributions presented at FFCS.
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
identification-based communication, entanglement-assisted networks, semantic and goal-oriented communication
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
Abdel-Rahman, A., Becker, A.T., Biediger, D., Cheung, K.C., Fekete, S.P., Gershenfeld, N.A., Hugo, S., Jenett, B., Keldenich, P., Niehs, E., Rieck, C., Schmidt, A., Scheffer, C., Yannuzzi, M.: Space ants: Constructing and recon- figuring large-scale structures with finite automata. In: Cabello, S., Chen, D.Z. (eds.) Symposium on Computational Geometry (So...
- [2]
-
[3]
IEEE Trans
Ahlswede, R., Han, T.S.: On source coding with side information via a multiple- access channel and related problems in multi-user information theory. IEEE Trans. Inform. Theory29(3), 396–412 (May 1983)
1983
-
[4]
Ahlswede, R., Cai, N.: Arbitrarily varying multiple-access channels. I. Ericson’s symmetrizability is adequate, Gubner’s conjecture is true. IEEE Transactions on Information Theory45(2), 742–749 (1999)
1999
-
[5]
Ahlswede, R., Csiszár, I.: Common randomness in information theory and cryp- tography. ii. cr capacity. IEEE Transactions on Information Theory44(1), 225– 240 (1998).https://doi.org/10.1109/18.651037
-
[6]
Amiri, Z., Dehdashti, S., El-Safty, K.H., Litvin, I., Munar-Vallespir, P., Nötzel, J., Sekavčnik, S.: Quantum advantages for data transmis- sion in future networks: An overview. Computer Networks254, 110727 (2024).https://doi.org/https://doi.org/10.1016/j.comnet.2024.110727, https://www.sciencedirect.com/science/article/pii/S1389128624005590
-
[7]
Theoretical Computer Science895, 151–177 (2021).https://doi.org/10.1016/j.tcs.2021.09.041
Auletta, V., Ferraioli, D., Rai, A., Scarpa, G., Winter, A.: Belief-invariant and quantum equilibria in games of incomplete information. Theoretical Computer Science895, 151–177 (2021).https://doi.org/10.1016/j.tcs.2021.09.041
-
[9]
IEEE Wireless Commun
Bahingayi, E.E., Lin, S., Uysal, M., Di Renzo, M., Tran, L.N.: A refined alter- nating optimization for sum rate maximization in SIM-aided multiuser MISO systems. IEEE Wireless Commun. Lett.15, 1250–1254 (2026)
2026
-
[10]
IEEE Wireless Commun
Bahingayi, E.E., Stefan Perović, N., Tran, L.N.: Scaling achievable rates in SIM- Aided MIMO systems with metasurface layers: A hybrid optimization framework. IEEE Wireless Commun. Lett.14(9), 2773–2777 (2025)
2025
-
[11]
In: 2025 IEEE International Symposium on Information Theory (ISIT)
Baldelli, A., Baldi, M., Chiaraluce, F., Santini, P.: Bf-max: an efficient bit flip- ping decoder with predictable decoding failure rate. In: 2025 IEEE International Symposium on Information Theory (ISIT). pp. 1–6. IEEE (2025)
2025
-
[12]
Entropy24(5), 639 (2022).https://doi.org/10
Barker, T.S., Pierobon, M., Thomas, P.J.: Subjective information and survival in a simulated biological system. Entropy24(5), 639 (2022).https://doi.org/10. 3390/e24050639
2022
-
[13]
IEEE Journal on Selected Areas in Communications31(9), 1921–1930 (2013).https://doi.org/10.1109/JSAC
Bash, B.A., Goeckel, D., Towsley, D.: Limits of reliable communication with low probability of detection on AWGN channels. IEEE Journal on Selected Areas in Communications31(9), 1921–1930 (2013).https://doi.org/10.1109/JSAC. 2013.130923
-
[14]
Beck, E.: Advancing Semantic and Digital Communications through Machine Learning, Dissertations from the Department of Communications Engineering, 86 C. Deppe, E. Jorswieck, P-H. Lin, V. Gholamian, M. A. Mross University of Bremen, vol. 15. Shaker Verlag, Düren (Dec 2025).https://doi. org/10.26092/elib/4791
-
[15]
Zenodo (Feb 2026).https://doi.org/10.5281/zenodo.8006567,https: //github.com/ant-uni-bremen/SINFONY
Beck, E.: Semantic Information Transmission and Recovery (SINFONY) Software v2.0.2. Zenodo (Feb 2026).https://doi.org/10.5281/zenodo.8006567,https: //github.com/ant-uni-bremen/SINFONY
-
[16]
Sensors23(14), 6347 (Jul 2023).https://doi.org/10.3390/ s23146347
Beck, E., Bockelmann, C., Dekorsy, A.: Semantic Information Recovery in Wire- less Networks. Sensors23(14), 6347 (Jul 2023).https://doi.org/10.3390/ s23146347
2023
-
[17]
Beck, E., Bockelmann, C., Dekorsy, A.: Model-free Reinforcement Learning of Se- mantic Communication by Stochastic Policy Gradient. In: 1st IEEE International Conference on Machine Learning for Communication and Networking (ICMLCN 2024). pp. 367–373. Stockholm, Sweden (May 2024).https://doi.org/10.1109/ ICMLCN59089.2024.10625190
-
[18]
Beck, E., Lin, H.Y., Rückert, P., Bao, Y., von Helversen, B., Fehrler, S., Tra- cht, K., Dekorsy, A.: Integrating Semantic Communication and Human Decision- Making into an End-to-End Sensing-Decision Framework. IEEE Open Journal of the Communications Society7, 748–768 (Jan 2026).https://doi.org/10.1109/ OJCOMS.2026.3652845
-
[19]
Natural Computing18(1), 181–201 (2019).https://doi.org/10.1007/S11047-017-9666-6,https://doi
Becker, A.T., Demaine, E.D., Fekete, S.P., Lonsford, J., Morris-Wright, R.: Par- ticle computation: complexity, algorithms, and logic. Natural Computing18(1), 181–201 (2019).https://doi.org/10.1007/S11047-017-9666-6,https://doi. org/10.1007/s11047-017-9666-6
-
[20]
In: International Conference on Robotics and Automation, ICRA
Becker, A.T., Demaine, E.D., Fekete, S.P., McLurkin, J.: Particle computa- tion: Designing worlds to control robot swarms with only global signals. In: International Conference on Robotics and Automation, ICRA. pp. 6751–6756 (2014).https://doi.org/10.1109/ICRA.2014.6907856,https://doi.org/10. 1109/ICRA.2014.6907856
-
[21]
In: Symposium on Computational Geometry (SoCG)
Becker, A.T., Demaine, E.D., Fekete, S.P., Shad, H.M., Morris-Wright, R.: Tilt: The video - designing worlds to control robot swarms with only global sig- nals. In: Symposium on Computational Geometry (SoCG). pp. 16–18 (2015). https://doi.org/10.4230/LIPICS.SOCG.2015.16,https://doi.org/10.4230/ LIPIcs.SOCG.2015.16
-
[22]
Becker, A.T., Fekete, S.P., Huang, L., Keldenich, P., Kleist, L., Krupke, D., Rieck, C., Schmidt, A.: Targeted drug delivery: Algorithmic methods for collecting a swarm of particles with uniform, external forces. In: In- ternational Conference on Robotics and Automation (ICRA). pp. 2508– 2514 (2020).https://doi.org/10.1109/ICRA40945.2020.9196551,https:// ...
-
[23]
In: Symposium on Computational Ge- ometry (SoCG)
Becker, A.T., Fekete, S.P., Keldenich, P., Konitzny, M., Lin, L., Scheffer, C.: Coordinated motion planning: The video. In: Symposium on Computational Ge- ometry (SoCG). pp. 74:1–74:6 (2018).https://doi.org/10.4230/LIPICS.SOCG. 2018.74,https://doi.org/10.4230/LIPIcs.SoCG.2018.74
-
[24]
Becker, A.T., Fekete, S.P., Keldenich, P., Krupke, D., Rieck, C., Scheffer, C., Schmidt, A.: Tilt assembly: Algorithms for micro-factories that build objects with uniform external forces. Algorithmica82(2), 165–187 (2020).https://doi.org/ 10.1007/S00453-018-0483-9,https://doi.org/10.1007/s00453-018-0483-9
-
[25]
3329211 Foundations of Future Communication Systems 87
Besser, K.L., Schaefer, R.F., Poor, H.V.: Reliability and latency analysis for wire- lesscommunicationsystemswithasecret-keybudget.IEEETransactionsonCom- munications72(2), 1033–1044 (2 2024).https://doi.org/10.1109/TCOMM.2023. 3329211 Foundations of Future Communication Systems 87
-
[26]
Besser, K.L., Schaefer, R.F., Poor, H.V.: Building resilience in wireless communi- cation systems with a secret-key budget. IEEE Transactions on Communications 73(11), 12473–12486 (11 2025).https://doi.org/10.1109/TCOMM.2025.3577649
-
[27]
IEEE Transactions on Information Theory70(7), 4655–4666 (Jul 2024)
Bhattacharya, S., Narayan, P.: Shared information for a markov chain on a tree. IEEE Transactions on Information Theory70(7), 4655–4666 (Jul 2024)
2024
-
[28]
In: Proc
Boche, H., Pohl, V., Poor, H.V.: On the convexification of non-linear optimization problems under performance guarantees. In: Proc. 64th IEEE Conf. on Decision and Control (CDC). Rio de Janeiro, Brazil (Dec 2025)
2025
-
[29]
Boche, H., Cai, M., Deppe, C., Nötzel, J.: Classical-quantum arbitrarily varying wiretap channel: Secret message transmission under jamming attacks. Journal of Mathematical Physics58(10), 102203 (10 2017).https://doi.org/10.1063/1. 5005947,https://doi.org/10.1063/1.5005947
work page doi:10.1063/1 2017
- [30]
-
[31]
In: IEEE Information Theory Workshop (ITW) (2023)
Bouette, C., Luzzi, L., Wang, L.: Covert communication over two types of additive noise channels. In: IEEE Information Theory Workshop (ITW) (2023)
2023
-
[32]
IEEE Transactions on Information Theory (2025)
Bouette, C., Luzzi, L., Wang, L.: Covert communication over additive-noise chan- nels. IEEE Transactions on Information Theory (2025)
2025
-
[33]
In: Symposium on Computational Geometry (SoCG)
Bourgeois, J., Fekete, S.P., Kosfeld, R., Kramer, P., Piranda, B., Rieck, C., Schef- fer, C.: Space ants: Episode II - coordinating connected catoms. In: Symposium on Computational Geometry (SoCG). pp. 65:1–65:6 (2022).https://doi.org/10. 4230/LIPICS.SOCG.2022.65,https://doi.org/10.4230/LIPIcs.SoCG.2022.65
-
[34]
In: IEEE Global Communications Conference (GLOBECOM)
Brand, L., Wang, Y., Magarini, M., Schober, R., Lotter, S.: Semantic informa- tion in molecular communication: Chemotaxis beyond shannon. In: IEEE Global Communications Conference (GLOBECOM). IEEE (2024)
2024
-
[35]
In: 57th Asilomar Conference on Signals, Systems, and Computers
Brune, J.J., Frey, M., Klement, F., Bjelaković, I., Katzenbeisser, S., Stańczak, S.: Private and secure over-the-air multi-party communication. In: 57th Asilomar Conference on Signals, Systems, and Computers. pp. 1697–1701 (2023).https: //doi.org/10.1109/IEEECONF59524.2023.10477045
-
[36]
submitted (2026)
Bruno, R., Rescigno, A., Vaccaro, U.: Robust shift-invariant superimposed codes. submitted (2026)
2026
-
[37]
IEEE Transactions on Information Theory52(2), 489–509 (2006)
Candès, E.J., Romberg, J., Tao, T.: Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Transactions on Information Theory52(2), 489–509 (2006)
2006
-
[38]
npj Quantum Information10, 7 (2024)
Chaturvedi, A., Viola, G., Pawłowski, M.: Extending loophole-free nonlocal cor- relations to arbitrarily large distances. npj Quantum Information10, 7 (2024). https://doi.org/10.1038/s41534-023-00799-1
-
[39]
In: Deppe, C., Winter, A., Yeung, R.W., Boche, H., Althöfer, I., Stoye, J., Tamm, U., Ezzine, R
Chen, Y., Hayashi, M.: Adaptive coding for two-way wiretap channel under strong secrecy. In: Deppe, C., Winter, A., Yeung, R.W., Boche, H., Althöfer, I., Stoye, J., Tamm, U., Ezzine, R. (eds.) Information Theory and Related Fields: Festschrift in Memory of Ning Cai. pp. 243–273. Springer Nature Switzerland, Cham (2025)
2025
-
[40]
In: ICC 2025-IEEE Interna- tional Conference on Communications
Chen, Y., Boche, H., Oechtering, T.J., Skoglund, M.: Integrated sensing and com- munication with distributed rate-limited helpers. In: ICC 2025-IEEE Interna- tional Conference on Communications. pp. 3723–3728. IEEE (2025)
2025
-
[41]
IEEE Transactions on Information Theory70(5), 3499–3511 (2024)
Cheng, H.C., Gao, L.: Error exponent and strong converse for quantum soft cov- ering. IEEE Transactions on Information Theory70(5), 3499–3511 (2024)
2024
-
[42]
Wiley, Hoboken, NJ, USA, 2 edn
Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley, Hoboken, NJ, USA, 2 edn. (2006)
2006
-
[43]
Csiszár, I., Narayan, P.: Secrecy capacities for multiple terminals. IEEE Trans. Inf. Theory50, 3047–3061 (2004).https://doi.org/10.1109/TIT.2004.838380 88 C. Deppe, E. Jorswieck, P-H. Lin, V. Gholamian, M. A. Mross
-
[44]
IEEE Transac- tions on Information Theory50(12), 3047–3061 (Dec 2004)
Csiszár, I., Narayan, P.: Secrecy capacities for multiple terminals. IEEE Transac- tions on Information Theory50(12), 3047–3061 (Dec 2004)
2004
-
[45]
IEEE Transactions on Information Theory54(6), 2437–2452 (Jun 2008), special Issue on Information Theoretic Security
Csiszár, I., Narayan, P.: Secrecy capacities for multiterminal channel models. IEEE Transactions on Information Theory54(6), 2437–2452 (Jun 2008), special Issue on Information Theoretic Security
2008
-
[46]
IEEE Transactions on Information Theory59(1), 17–31 (Jan 2013)
Csiszár, I., Narayan, P.: Secrecy generation for multiaccess channel models. IEEE Transactions on Information Theory59(1), 17–31 (Jan 2013)
2013
-
[47]
IEEE Transactions on Information Theory41(1), 26–34 (1995)
Csiszár, I.: Generalized cutoff rates and Rényi’s information measures. IEEE Transactions on Information Theory41(1), 26–34 (1995)
1995
-
[48]
Cambridge Mathematical Library, Cambridge University Press (2011)
Csiszár, I., Körner, J.: Information theory: Coding theorems for discrete mem- oryless systems. Cambridge Mathematical Library, Cambridge University Press (2011)
2011
-
[49]
Dalai, M., Fiore, S.D., Rescigno, A.A., Vaccaro, U.: An efficient algorithm for group testing with runlength constraints. Discret. Appl. Math.360, 181– 187 (2025).https://doi.org/10.1016/J.DAM.2024.09.001,https://doi.org/ 10.1016/j.dam.2024.09.001
-
[50]
Physical Review X11(4), 041016 (2021).https://doi.org/10.1103/PhysRevX.11.041016,https://doi.org/10
Das, S., Bäuml, S., Winczewski, M., Horodecki, K.: Universal limitations on quantum key distribution over a network. Physical Review X11(4), 041016 (2021).https://doi.org/10.1103/PhysRevX.11.041016,https://doi.org/10. 1103/PhysRevX.11.041016
-
[51]
arXiv:2409.05619 (2024), arXiv preprint
Dasgupta, A., Warsi, N.A., Hayashi, M.: Universal tester for multiple indepen- dence testing and classical-quantum arbitrarily varying multiple access channel. arXiv:2409.05619 (2024), arXiv preprint
-
[52]
Debus, L.Y., Wilhelm, M.J., Wolff, H., Wille, L.C.P., Rese, T., Lommel, M., Kirchner, J., Dressler, F.: Blood makes a difference: Experimental evaluation of molecular communication in different fluids. IEEE Transactions on Molecular, Biological andMulti-Scale Communications11(4), 493–499(2025).https://doi. org/10.1109/TMBMC.2025.3602650
-
[53]
Demaine, E.D., Fekete, S.P., Keldenich, P., Meijer, H., Scheffer, C.: Coordi- nated motion planning: Reconfiguring a swarm of labeled robots with bounded stretch. SIAM J. Comput.48(6), 1727–1762 (2019).https://doi.org/10.1137/ 18M1194341,https://doi.org/10.1137/18M1194341
-
[54]
In: Symposium on Computational Geometry (SoCG)
Demaine, E.D., Fekete, S.P., Keldenich, P., Scheffer, C., Meijer, H.: Coordinated motion planning: Reconfiguring a swarm of labeled robots with bounded stretch. In: Symposium on Computational Geometry (SoCG). pp. 29:1–29:15 (2018). https://doi.org/10.4230/LIPICS.SOCG.2018.29,https://doi.org/10.4230/ LIPIcs.SoCG.2018.29
-
[55]
IEEE Transactions on Information Theory 52(4), 1289–1306 (2006)
Donoho, D.L.: Compressed sensing. IEEE Transactions on Information Theory 52(4), 1289–1306 (2006)
2006
-
[56]
Eckrich, C., Zoubir, A.M., Jamali, V.: Fronthaul-constrained distributed radar sensing. In: 2024 IEEE Globecom Workshops (GC Wkshps). pp. 1–6 (2024). https://doi.org/10.1109/GCWkshp64532.2024.11100768
-
[57]
In: ICML ES-FoMo III: 3rd Workshop on Efficient Systems for Foundation Models (2025)
Egger, M., Bakshi, M., Bitar, R.: Byzantine-resilient zero-order optimization for scalable federated fine-tuning of large language models. In: ICML ES-FoMo III: 3rd Workshop on Efficient Systems for Foundation Models (2025)
2025
-
[58]
In: 2025 IEEE Information Theory Workshop (ITW)
Egger, M., Bitar, R.: Private aggregation for byzantine-resilient heterogeneous federated learning. In: 2025 IEEE Information Theory Workshop (ITW). pp. 1–6. IEEE (2025)
2025
- [59]
-
[60]
Fekete, S., Tessars, C., Schmidt, C., Wegener, A., Fischer, S., Hellbrueck, H.: Method and apparatus for determining a driving strategy (2014), uS Patent 8,666,629
2014
-
[61]
In: Interna- tional Workshop on Combinatorial Algorithms
Fekete, S.P.: Coordinating swarms of objects at extreme dimensions. In: Interna- tional Workshop on Combinatorial Algorithms. pp. 3–13. Springer (2020)
2020
-
[62]
Fekete, S.P., Gmyr, R., Hugo, S., Keldenich, P., Scheffer, C., Schmidt, A.: Cadbots: Algorithmic aspects of manipulating programmable matter with fi- nite automata. Algorithmica83(1), 387–412 (2021).https://doi.org/10.1007/ S00453-020-00761-Z,https://doi.org/10.1007/s00453-020-00761-z
-
[63]
In: Proceedings of the Symposium on Computational Geometry (SoCG) (2026), to appear
Fekete, S.P., Hoffmann, M., Loi, C.M., Perk, M.: Tracking a set of moving ob- jects with minimal power. In: Proceedings of the Symposium on Computational Geometry (SoCG) (2026), to appear
2026
-
[64]
Fekete, S.P., Keldenich, P., Kosfeld, R., Rieck, C., Scheffer, C.: Connected co- ordinated motion planning with bounded stretch. Auton. Agents Multi Agent Syst.37(2), 43(2023).https://doi.org/10.1007/S10458-023-09626-5,https: //doi.org/10.1007/s10458-023-09626-5
-
[65]
Fisher, R.A.: On the mathematical foundations of theoretical statistics. Philo- sophical Transactions of the Royal Society of London. Series A222, 309–368 (1922).https://doi.org/10.1098/rsta.1922.0009
-
[66]
(eds.): 6G-life: Unveiling the Future of Technological Sovereignty, Sustainability, and Trustworthiness
Fitzek, F.H.P., Boche, H., Kellerer, W., Seeling, P. (eds.): 6G-life: Unveiling the Future of Technological Sovereignty, Sustainability, and Trustworthiness. Aca- demic Press, 1 edn. (Feb 2026), eBook ISBN: 9780443274114
2026
-
[67]
IEEE Transactions on Information Theory41(5), 1379–1396 (1995).https://doi.org/10.1109/18.412683
Fossorier, M., Lin, S.: Soft-decision decoding of linear block codes based on or- dered statistics. IEEE Transactions on Information Theory41(5), 1379–1396 (1995).https://doi.org/10.1109/18.412683
-
[68]
IEEE Transactions on Communications (2026),https://arxiv.org/abs/2601
Fotock, R.K., Zappone, A., Imoize, A.L., Di Renzo, M.: Energy efficiency max- imization of MIMO systems through reconfigurable holographic beamforming. IEEE Transactions on Communications (2026),https://arxiv.org/abs/2601. 00780, submitted
2026
-
[69]
IEEE Wireless Communica- tions Letters (2025)
Freitas, M.M.M., Buzzi, S., Interdonato, G.: Eliminating phase misalignments in cell-free massive mimo via differential transmission. IEEE Wireless Communica- tions Letters (2025)
2025
-
[70]
Frey, M., Bjelaković, I., Nötzel, J., Stańczak, S.: Semantic security with infinite- dimensional quantum eavesdropping channel. IEEE Transactions on Information Theory71(4), 2662–2697 (2025).https://doi.org/10.1109/TIT.2025.3531250
- [71]
-
[72]
New York: Wiley (1968)
Gallager, R.G.: Information Theory and Reliable Communication. New York: Wiley (1968)
1968
-
[73]
In: 2026 IEEE Wireless Communications and Networking Conference (WCNC)
Gholipour, J., Schaefer, R.F., Fettweis, G.P.: Semantic communication: From philosophical conceptions towards a mathematical framework. In: 2026 IEEE Wireless Communications and Networking Conference (WCNC). Kuala Lumpur, Malaysia (Apr 2026)
2026
- [74]
-
[75]
In: 2025 IEEE International Conference on Communications Workshops (ICC Work- shops)
Giovannetti, C., Decarli, N., Zanella, A., Dardari, D.: Asymptotic behavior of localization and sensing in the near field of extremely large aperture arrays. In: 2025 IEEE International Conference on Communications Workshops (ICC Work- shops). pp. 330–335. IEEE (2025) 90 C. Deppe, E. Jorswieck, P-H. Lin, V. Gholamian, M. A. Mross
2025
-
[76]
Guha, S.: Structured optical receivers to attain superadditive capacity and the holevo limit. Phys. Rev. Lett.106, 240502 (Jun 2011).https://doi. org/10.1103/PhysRevLett.106.240502,https://link.aps.org/doi/10.1103/ PhysRevLett.106.240502
-
[77]
Gündüz, D., Qin, Z., Aguerri, I.E., Dhillon, H.S., Yang, Z., Yener, A., Wong, K.K., Chae, C.B.: Beyond transmitting bits: Context, semantics, and task-oriented com- munications. IEEE Journal on Selected Areas in Communications41(1), 5–41 (2023).https://doi.org/10.1109/JSAC.2022.3223408
-
[78]
Halimi Razlighi, A., Bockelmann, C., Dekorsy, A.: Semantic communication for cooperative multi-task processing over wireless networks. IEEE Wireless Com- munications Letters13(10), 2867–2871 (Oct 2024).https://doi.org/10.1109/ LWC.2024.3451139
-
[79]
Context-aware set dueling for dynamic policy arbitration,
Halimi Razlighi, A., Bockelmann, C., Dekorsy, A.: Semantic communication for cooperativemulti-taskingoverrate-limitedwirelesschannelswithimplicitoptimal prior. IEEE Open Journal of the Communications Society6, 8523–8538 (Oct 2025).https://doi.org/10.1109/OJCOMS.2025.3617156
-
[80]
In: ICC 2025 - IEEE International Conference on Communications
Halimi Razlighi, A., Tillmann, M.H.V., Beck, E., Bockelmann, C., Dekorsy, A.: Cooperative and collaborative multi-task semantic communication for distributed sources. In: ICC 2025 - IEEE International Conference on Communications. pp. 3966–3971 (Jun 2025).https://doi.org/10.1109/ICC52391.2025.11161271
-
[81]
IEEE Trans
Han, T.S., Kobayashi, K.: A dichotomy of functionsF(X, Y)of correlated sources (X, Y)from the viewpoint of the achievable rate region. IEEE Trans. Inform. Theory33(1), 69–76 (January 1987)
1987
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.