Feng-Wen Sun - Academia.edu (original) (raw)

Papers by Feng-Wen Sun

Research paper thumbnail of Some Features of Binary Block Codes for Correcting Asymmetric Errors

Aaecc, 1993

Binary block codes for correcting asymmetric errors are called binary AsEC block codes. With the ... more Binary block codes for correcting asymmetric errors are called binary AsEC block codes. With the properties of perfect codes for the binary symmetric channel in mind, natural definitions of perfect, weakly perfect and uniformly weakly perfect binary AsEC block codes are given and their properties are studied. It is shown that a perfect asymmetric-error-correcting code is trivial or is equal

Research paper thumbnail of The Leech lattice and the Golay code: bounded-distance decoding and multilevel constructions

Research paper thumbnail of More efficient bounded-distance decoding of the Golay code and the Leech lattice

Proceedings of 1994 IEEE International Symposium on Information Theory, 1994

New multilevel constructions of the Leech lattice and the Golay code are presented. They are deri... more New multilevel constructions of the Leech lattice and the Golay code are presented. They are derived from Turyn's constructions and the `holy construction' with the octacode as the glue code. Further, we show that the `holy construction' of the Leech lattice with the octacode as the glue code is essentially different from the permuted Turyn construction, although both constructions rely on the octacode. Based on these structures, more efficient bounded-distance decoding algorithms of the Golay code and the Leech lattice are presented

Research paper thumbnail of Watermarking" for convolutionally/turbo coded systems and its applications

GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270), 2001

Watermarking is a process that embeds one signal into another signal to provide a hidden identity... more Watermarking is a process that embeds one signal into another signal to provide a hidden identity. It is widely used in multimedia signal processing for copyright protection purpose. Motivated by the observation that in some applications it is highly desirable for the physical layer itself to have some user identifying features instead of obtaining such information from the media access

Research paper thumbnail of Fast Bounded-Distance Decoding of the Nordstrom-Robinson Code

Communications and Cryptography, 1994

Research paper thumbnail of Maximum likelihood slow frequency-selective fading channel estimation using the frequency domain approach

Global Telecommunications Conference, . GLOBECOM . IEEE, 2000

This paper addresses the channel estimation problem for slow frequency-selective fading channels ... more This paper addresses the channel estimation problem for slow frequency-selective fading channels using training sequences and the maximum likelihood (ML) approach. In the literature people usually assume a symbol period spaced delay-tapped-line model and additive white Gaussian noise (AWGN). Due to the pre-filtering in the receiver front end, if the sampling rate is larger than one sample per symbol or

Research paper thumbnail of On the True Cramer-Rao Lower Bound for the DA Joint Estimation of Carrier Phase and Timing Offsets

IEEE International Conference on Communications, 2000

Abstract-This paper concerns the Cramer-Rao lower bound (CRB) for the data-aided (DA) , the DA pa... more Abstract-This paper concerns the Cramer-Rao lower bound (CRB) for the data-aided (DA) , the DA parameter esti- mation, the CRB typically varies with the training sequence. This indicates that different training se- quences offer fundamental different performance. In this manuscript, we derive a closed-form formula of the CRB for timing and phase recovery with respect to any particular training sequence.

Research paper thumbnail of Wireless communications technology and network architecture for the new millennium

11th IEEE International Symposium on Personal Indoor and Mobile Radio Communications. PIMRC 2000. Proceedings (Cat. No.00TH8525), 2000

... The amount of transmitted information per person continues to in-crease exponentially as newa... more ... The amount of transmitted information per person continues to in-crease exponentially as newapplications are developed. ... available to potential service providers in the era of 31d Generation wireless, and to highlight the key technologies that may enable M er advancements ...

Research paper thumbnail of Impact of near Shannon-limit codes on wireless communications technology

2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754), 2004

Tremendous progress has been made on channel coding techniques during the last decade, starting f... more Tremendous progress has been made on channel coding techniques during the last decade, starting from the invention of turbo codes and the rediscovery of the low-density parity check (LDPC) codes. These codes essentially closed the gap between the Shannon capacity limit and practical implementation. Commercial adoption of these new coding techniques, however, depends heavily on the introduction of the technology

Research paper thumbnail of On the convergence of the inverses of Toeplitz matrices and its applications

IEEE Transactions on Information Theory, 2003

Many issues in signal processing involve the inverses of Toeplitz matrices. One widely used techn... more Many issues in signal processing involve the inverses of Toeplitz matrices. One widely used technique is to replace Toeplitz matrices with their associated circulant matrices, based on the well-known fact that Toeplitz matrices asymptotically converge to their associated circulant matrices in the weak sense. This often leads to considerable simplification. However, it is well known that such a weak convergence

Research paper thumbnail of Third Generation Wireless Communication Technologies

The International Series in Engineering and Computer Science, 2002

Page 1. Chapter 2 Third Generation Wireless Communication Technologies LIN-NAN LEE, FENG-WEN SUN,... more Page 1. Chapter 2 Third Generation Wireless Communication Technologies LIN-NAN LEE, FENG-WEN SUN, KHALID KARIMULLAH, MUSTAFA EROZ, AND ROGER HAMMONS Hughes Network System, 11717 Exploration Lane Germantown MD USA ...

Research paper thumbnail of Third generation wireless technologies-expectations and realities

Ninth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (Cat. No.98TH8361), 1998

... Lin-Nan Lee, Khalid Karimullah, Feng-Wen Sun, Mustafa Eroz ... [ 21 Lin-Nan Lee, Khalid Karim... more ... Lin-Nan Lee, Khalid Karimullah, Feng-Wen Sun, Mustafa Eroz ... [ 21 Lin-Nan Lee, Khalid Karimullah, Feng-Wen Sun and Kamran Etemad, " Backward Compatible Third Generation System - HNS Proposal", TIA contribution TR45.5.4 /97.07.16.10 ...

Research paper thumbnail of Applying Near Shannon-limit Codes to Wireless Communications

Emerging Location Aware Broadband Wireless Ad Hoc Networks, 2005

Tremendous progress has been made on channel coding techniques during the last decade, starting f... more Tremendous progress has been made on channel coding techniques during the last decade, starting from the invention of turbo codes and the rediscovery of the low-density parity check (LDPC) codes. These codes essentially closed the gap between the Shannon capacity limit and practical implementation. Commercial adoption of these new coding techniques, however, depends heavily on the introduction of the technology

Research paper thumbnail of Frame synchronization and pilot structure for second generation DVB via satellites

International Journal of Satellite Communications and Networking, 2004

INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING Int. J. Satell. Commun. Network.... more INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING Int. J. Satell. Commun. Network. 2004; 22:319–339 (DOI: 10.1002/sat.793) ... Frame synchronization and pilot structure for second ... Feng-Wen Sunz, Yimin Jiangn,y and Lin-Nan Lee}

Research paper thumbnail of DVB-S2 low density parity check codes with near Shannon limit performance

International Journal of Satellite Communications and Networking, 2004

INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING Int. J. Satell. Commun. Network.... more INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING Int. J. Satell. Commun. Network. 2004; 22:269–279 (DOI: 10.1002/sat.787) ... DVB-S2 low density parity check codes with near Shannon ... Mustafa Erozn,y, Feng-Wen Sun and Lin-Nan Lee

Research paper thumbnail of Application and standardization of turbo codes in third-generation high-speed wireless data services

IEEE Transactions on Vehicular Technology, 2000

Research paper thumbnail of The Leech lattice, the octacode, and decoding algorithms

IEEE Transactions on Information Theory, 1995

Research paper thumbnail of Multiple-phase codes for detection without carrier phase reference

IEEE Transactions on Information Theory, 1998

Research paper thumbnail of On the convergence of the inverses of Toeplitz matrices and its applications

IEEE Transactions on Information Theory, 2003

Research paper thumbnail of User Capacity for Synchronous Multirate CDMA Systems With Linear MMSE Receivers

IEEE Transactions on Information Theory, 2004

Research paper thumbnail of Some Features of Binary Block Codes for Correcting Asymmetric Errors

Aaecc, 1993

Binary block codes for correcting asymmetric errors are called binary AsEC block codes. With the ... more Binary block codes for correcting asymmetric errors are called binary AsEC block codes. With the properties of perfect codes for the binary symmetric channel in mind, natural definitions of perfect, weakly perfect and uniformly weakly perfect binary AsEC block codes are given and their properties are studied. It is shown that a perfect asymmetric-error-correcting code is trivial or is equal

Research paper thumbnail of The Leech lattice and the Golay code: bounded-distance decoding and multilevel constructions

Research paper thumbnail of More efficient bounded-distance decoding of the Golay code and the Leech lattice

Proceedings of 1994 IEEE International Symposium on Information Theory, 1994

New multilevel constructions of the Leech lattice and the Golay code are presented. They are deri... more New multilevel constructions of the Leech lattice and the Golay code are presented. They are derived from Turyn's constructions and the `holy construction' with the octacode as the glue code. Further, we show that the `holy construction' of the Leech lattice with the octacode as the glue code is essentially different from the permuted Turyn construction, although both constructions rely on the octacode. Based on these structures, more efficient bounded-distance decoding algorithms of the Golay code and the Leech lattice are presented

Research paper thumbnail of Watermarking" for convolutionally/turbo coded systems and its applications

GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270), 2001

Watermarking is a process that embeds one signal into another signal to provide a hidden identity... more Watermarking is a process that embeds one signal into another signal to provide a hidden identity. It is widely used in multimedia signal processing for copyright protection purpose. Motivated by the observation that in some applications it is highly desirable for the physical layer itself to have some user identifying features instead of obtaining such information from the media access

Research paper thumbnail of Fast Bounded-Distance Decoding of the Nordstrom-Robinson Code

Communications and Cryptography, 1994

Research paper thumbnail of Maximum likelihood slow frequency-selective fading channel estimation using the frequency domain approach

Global Telecommunications Conference, . GLOBECOM . IEEE, 2000

This paper addresses the channel estimation problem for slow frequency-selective fading channels ... more This paper addresses the channel estimation problem for slow frequency-selective fading channels using training sequences and the maximum likelihood (ML) approach. In the literature people usually assume a symbol period spaced delay-tapped-line model and additive white Gaussian noise (AWGN). Due to the pre-filtering in the receiver front end, if the sampling rate is larger than one sample per symbol or

Research paper thumbnail of On the True Cramer-Rao Lower Bound for the DA Joint Estimation of Carrier Phase and Timing Offsets

IEEE International Conference on Communications, 2000

Abstract-This paper concerns the Cramer-Rao lower bound (CRB) for the data-aided (DA) , the DA pa... more Abstract-This paper concerns the Cramer-Rao lower bound (CRB) for the data-aided (DA) , the DA parameter esti- mation, the CRB typically varies with the training sequence. This indicates that different training se- quences offer fundamental different performance. In this manuscript, we derive a closed-form formula of the CRB for timing and phase recovery with respect to any particular training sequence.

Research paper thumbnail of Wireless communications technology and network architecture for the new millennium

11th IEEE International Symposium on Personal Indoor and Mobile Radio Communications. PIMRC 2000. Proceedings (Cat. No.00TH8525), 2000

... The amount of transmitted information per person continues to in-crease exponentially as newa... more ... The amount of transmitted information per person continues to in-crease exponentially as newapplications are developed. ... available to potential service providers in the era of 31d Generation wireless, and to highlight the key technologies that may enable M er advancements ...

Research paper thumbnail of Impact of near Shannon-limit codes on wireless communications technology

2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754), 2004

Tremendous progress has been made on channel coding techniques during the last decade, starting f... more Tremendous progress has been made on channel coding techniques during the last decade, starting from the invention of turbo codes and the rediscovery of the low-density parity check (LDPC) codes. These codes essentially closed the gap between the Shannon capacity limit and practical implementation. Commercial adoption of these new coding techniques, however, depends heavily on the introduction of the technology

Research paper thumbnail of On the convergence of the inverses of Toeplitz matrices and its applications

IEEE Transactions on Information Theory, 2003

Many issues in signal processing involve the inverses of Toeplitz matrices. One widely used techn... more Many issues in signal processing involve the inverses of Toeplitz matrices. One widely used technique is to replace Toeplitz matrices with their associated circulant matrices, based on the well-known fact that Toeplitz matrices asymptotically converge to their associated circulant matrices in the weak sense. This often leads to considerable simplification. However, it is well known that such a weak convergence

Research paper thumbnail of Third Generation Wireless Communication Technologies

The International Series in Engineering and Computer Science, 2002

Page 1. Chapter 2 Third Generation Wireless Communication Technologies LIN-NAN LEE, FENG-WEN SUN,... more Page 1. Chapter 2 Third Generation Wireless Communication Technologies LIN-NAN LEE, FENG-WEN SUN, KHALID KARIMULLAH, MUSTAFA EROZ, AND ROGER HAMMONS Hughes Network System, 11717 Exploration Lane Germantown MD USA ...

Research paper thumbnail of Third generation wireless technologies-expectations and realities

Ninth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (Cat. No.98TH8361), 1998

... Lin-Nan Lee, Khalid Karimullah, Feng-Wen Sun, Mustafa Eroz ... [ 21 Lin-Nan Lee, Khalid Karim... more ... Lin-Nan Lee, Khalid Karimullah, Feng-Wen Sun, Mustafa Eroz ... [ 21 Lin-Nan Lee, Khalid Karimullah, Feng-Wen Sun and Kamran Etemad, " Backward Compatible Third Generation System - HNS Proposal", TIA contribution TR45.5.4 /97.07.16.10 ...

Research paper thumbnail of Applying Near Shannon-limit Codes to Wireless Communications

Emerging Location Aware Broadband Wireless Ad Hoc Networks, 2005

Tremendous progress has been made on channel coding techniques during the last decade, starting f... more Tremendous progress has been made on channel coding techniques during the last decade, starting from the invention of turbo codes and the rediscovery of the low-density parity check (LDPC) codes. These codes essentially closed the gap between the Shannon capacity limit and practical implementation. Commercial adoption of these new coding techniques, however, depends heavily on the introduction of the technology

Research paper thumbnail of Frame synchronization and pilot structure for second generation DVB via satellites

International Journal of Satellite Communications and Networking, 2004

INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING Int. J. Satell. Commun. Network.... more INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING Int. J. Satell. Commun. Network. 2004; 22:319–339 (DOI: 10.1002/sat.793) ... Frame synchronization and pilot structure for second ... Feng-Wen Sunz, Yimin Jiangn,y and Lin-Nan Lee}

Research paper thumbnail of DVB-S2 low density parity check codes with near Shannon limit performance

International Journal of Satellite Communications and Networking, 2004

INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING Int. J. Satell. Commun. Network.... more INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING Int. J. Satell. Commun. Network. 2004; 22:269–279 (DOI: 10.1002/sat.787) ... DVB-S2 low density parity check codes with near Shannon ... Mustafa Erozn,y, Feng-Wen Sun and Lin-Nan Lee

Research paper thumbnail of Application and standardization of turbo codes in third-generation high-speed wireless data services

IEEE Transactions on Vehicular Technology, 2000

Research paper thumbnail of The Leech lattice, the octacode, and decoding algorithms

IEEE Transactions on Information Theory, 1995

Research paper thumbnail of Multiple-phase codes for detection without carrier phase reference

IEEE Transactions on Information Theory, 1998

Research paper thumbnail of On the convergence of the inverses of Toeplitz matrices and its applications

IEEE Transactions on Information Theory, 2003

Research paper thumbnail of User Capacity for Synchronous Multirate CDMA Systems With Linear MMSE Receivers

IEEE Transactions on Information Theory, 2004