Feng-Wen Sun - Academia.edu (original) (raw)
Papers by Feng-Wen Sun
Aaecc, 1993
Binary block codes for correcting asymmetric errors are called binary AsEC block codes. With the ... more Binary block codes for correcting asymmetric errors are called binary AsEC block codes. With the properties of perfect codes for the binary symmetric channel in mind, natural definitions of perfect, weakly perfect and uniformly weakly perfect binary AsEC block codes are given and their properties are studied. It is shown that a perfect asymmetric-error-correcting code is trivial or is equal
Proceedings of 1994 IEEE International Symposium on Information Theory, 1994
New multilevel constructions of the Leech lattice and the Golay code are presented. They are deri... more New multilevel constructions of the Leech lattice and the Golay code are presented. They are derived from Turyn's constructions and the `holy construction' with the octacode as the glue code. Further, we show that the `holy construction' of the Leech lattice with the octacode as the glue code is essentially different from the permuted Turyn construction, although both constructions rely on the octacode. Based on these structures, more efficient bounded-distance decoding algorithms of the Golay code and the Leech lattice are presented
GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270), 2001
Watermarking is a process that embeds one signal into another signal to provide a hidden identity... more Watermarking is a process that embeds one signal into another signal to provide a hidden identity. It is widely used in multimedia signal processing for copyright protection purpose. Motivated by the observation that in some applications it is highly desirable for the physical layer itself to have some user identifying features instead of obtaining such information from the media access
Communications and Cryptography, 1994
Global Telecommunications Conference, . GLOBECOM . IEEE, 2000
This paper addresses the channel estimation problem for slow frequency-selective fading channels ... more This paper addresses the channel estimation problem for slow frequency-selective fading channels using training sequences and the maximum likelihood (ML) approach. In the literature people usually assume a symbol period spaced delay-tapped-line model and additive white Gaussian noise (AWGN). Due to the pre-filtering in the receiver front end, if the sampling rate is larger than one sample per symbol or
IEEE International Conference on Communications, 2000
Abstract-This paper concerns the Cramer-Rao lower bound (CRB) for the data-aided (DA) , the DA pa... more Abstract-This paper concerns the Cramer-Rao lower bound (CRB) for the data-aided (DA) , the DA parameter esti- mation, the CRB typically varies with the training sequence. This indicates that different training se- quences offer fundamental different performance. In this manuscript, we derive a closed-form formula of the CRB for timing and phase recovery with respect to any particular training sequence.
11th IEEE International Symposium on Personal Indoor and Mobile Radio Communications. PIMRC 2000. Proceedings (Cat. No.00TH8525), 2000
... The amount of transmitted information per person continues to in-crease exponentially as newa... more ... The amount of transmitted information per person continues to in-crease exponentially as newapplications are developed. ... available to potential service providers in the era of 31d Generation wireless, and to highlight the key technologies that may enable M er advancements ...
2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754), 2004
Tremendous progress has been made on channel coding techniques during the last decade, starting f... more Tremendous progress has been made on channel coding techniques during the last decade, starting from the invention of turbo codes and the rediscovery of the low-density parity check (LDPC) codes. These codes essentially closed the gap between the Shannon capacity limit and practical implementation. Commercial adoption of these new coding techniques, however, depends heavily on the introduction of the technology
IEEE Transactions on Information Theory, 2003
Many issues in signal processing involve the inverses of Toeplitz matrices. One widely used techn... more Many issues in signal processing involve the inverses of Toeplitz matrices. One widely used technique is to replace Toeplitz matrices with their associated circulant matrices, based on the well-known fact that Toeplitz matrices asymptotically converge to their associated circulant matrices in the weak sense. This often leads to considerable simplification. However, it is well known that such a weak convergence
The International Series in Engineering and Computer Science, 2002
Page 1. Chapter 2 Third Generation Wireless Communication Technologies LIN-NAN LEE, FENG-WEN SUN,... more Page 1. Chapter 2 Third Generation Wireless Communication Technologies LIN-NAN LEE, FENG-WEN SUN, KHALID KARIMULLAH, MUSTAFA EROZ, AND ROGER HAMMONS Hughes Network System, 11717 Exploration Lane Germantown MD USA ...
Ninth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (Cat. No.98TH8361), 1998
... Lin-Nan Lee, Khalid Karimullah, Feng-Wen Sun, Mustafa Eroz ... [ 21 Lin-Nan Lee, Khalid Karim... more ... Lin-Nan Lee, Khalid Karimullah, Feng-Wen Sun, Mustafa Eroz ... [ 21 Lin-Nan Lee, Khalid Karimullah, Feng-Wen Sun and Kamran Etemad, " Backward Compatible Third Generation System - HNS Proposal", TIA contribution TR45.5.4 /97.07.16.10 ...
Emerging Location Aware Broadband Wireless Ad Hoc Networks, 2005
Tremendous progress has been made on channel coding techniques during the last decade, starting f... more Tremendous progress has been made on channel coding techniques during the last decade, starting from the invention of turbo codes and the rediscovery of the low-density parity check (LDPC) codes. These codes essentially closed the gap between the Shannon capacity limit and practical implementation. Commercial adoption of these new coding techniques, however, depends heavily on the introduction of the technology
International Journal of Satellite Communications and Networking, 2004
INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING Int. J. Satell. Commun. Network.... more INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING Int. J. Satell. Commun. Network. 2004; 22:319339 (DOI: 10.1002/sat.793) ... Frame synchronization and pilot structure for second ... Feng-Wen Sunz, Yimin Jiangn,y and Lin-Nan Lee}
International Journal of Satellite Communications and Networking, 2004
INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING Int. J. Satell. Commun. Network.... more INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING Int. J. Satell. Commun. Network. 2004; 22:269279 (DOI: 10.1002/sat.787) ... DVB-S2 low density parity check codes with near Shannon ... Mustafa Erozn,y, Feng-Wen Sun and Lin-Nan Lee
IEEE Transactions on Vehicular Technology, 2000
IEEE Transactions on Information Theory, 1995
IEEE Transactions on Information Theory, 1998
IEEE Transactions on Information Theory, 2003
IEEE Transactions on Information Theory, 2004
Aaecc, 1993
Binary block codes for correcting asymmetric errors are called binary AsEC block codes. With the ... more Binary block codes for correcting asymmetric errors are called binary AsEC block codes. With the properties of perfect codes for the binary symmetric channel in mind, natural definitions of perfect, weakly perfect and uniformly weakly perfect binary AsEC block codes are given and their properties are studied. It is shown that a perfect asymmetric-error-correcting code is trivial or is equal
Proceedings of 1994 IEEE International Symposium on Information Theory, 1994
New multilevel constructions of the Leech lattice and the Golay code are presented. They are deri... more New multilevel constructions of the Leech lattice and the Golay code are presented. They are derived from Turyn's constructions and the `holy construction' with the octacode as the glue code. Further, we show that the `holy construction' of the Leech lattice with the octacode as the glue code is essentially different from the permuted Turyn construction, although both constructions rely on the octacode. Based on these structures, more efficient bounded-distance decoding algorithms of the Golay code and the Leech lattice are presented
GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270), 2001
Watermarking is a process that embeds one signal into another signal to provide a hidden identity... more Watermarking is a process that embeds one signal into another signal to provide a hidden identity. It is widely used in multimedia signal processing for copyright protection purpose. Motivated by the observation that in some applications it is highly desirable for the physical layer itself to have some user identifying features instead of obtaining such information from the media access
Communications and Cryptography, 1994
Global Telecommunications Conference, . GLOBECOM . IEEE, 2000
This paper addresses the channel estimation problem for slow frequency-selective fading channels ... more This paper addresses the channel estimation problem for slow frequency-selective fading channels using training sequences and the maximum likelihood (ML) approach. In the literature people usually assume a symbol period spaced delay-tapped-line model and additive white Gaussian noise (AWGN). Due to the pre-filtering in the receiver front end, if the sampling rate is larger than one sample per symbol or
IEEE International Conference on Communications, 2000
Abstract-This paper concerns the Cramer-Rao lower bound (CRB) for the data-aided (DA) , the DA pa... more Abstract-This paper concerns the Cramer-Rao lower bound (CRB) for the data-aided (DA) , the DA parameter esti- mation, the CRB typically varies with the training sequence. This indicates that different training se- quences offer fundamental different performance. In this manuscript, we derive a closed-form formula of the CRB for timing and phase recovery with respect to any particular training sequence.
11th IEEE International Symposium on Personal Indoor and Mobile Radio Communications. PIMRC 2000. Proceedings (Cat. No.00TH8525), 2000
... The amount of transmitted information per person continues to in-crease exponentially as newa... more ... The amount of transmitted information per person continues to in-crease exponentially as newapplications are developed. ... available to potential service providers in the era of 31d Generation wireless, and to highlight the key technologies that may enable M er advancements ...
2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754), 2004
Tremendous progress has been made on channel coding techniques during the last decade, starting f... more Tremendous progress has been made on channel coding techniques during the last decade, starting from the invention of turbo codes and the rediscovery of the low-density parity check (LDPC) codes. These codes essentially closed the gap between the Shannon capacity limit and practical implementation. Commercial adoption of these new coding techniques, however, depends heavily on the introduction of the technology
IEEE Transactions on Information Theory, 2003
Many issues in signal processing involve the inverses of Toeplitz matrices. One widely used techn... more Many issues in signal processing involve the inverses of Toeplitz matrices. One widely used technique is to replace Toeplitz matrices with their associated circulant matrices, based on the well-known fact that Toeplitz matrices asymptotically converge to their associated circulant matrices in the weak sense. This often leads to considerable simplification. However, it is well known that such a weak convergence
The International Series in Engineering and Computer Science, 2002
Page 1. Chapter 2 Third Generation Wireless Communication Technologies LIN-NAN LEE, FENG-WEN SUN,... more Page 1. Chapter 2 Third Generation Wireless Communication Technologies LIN-NAN LEE, FENG-WEN SUN, KHALID KARIMULLAH, MUSTAFA EROZ, AND ROGER HAMMONS Hughes Network System, 11717 Exploration Lane Germantown MD USA ...
Ninth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (Cat. No.98TH8361), 1998
... Lin-Nan Lee, Khalid Karimullah, Feng-Wen Sun, Mustafa Eroz ... [ 21 Lin-Nan Lee, Khalid Karim... more ... Lin-Nan Lee, Khalid Karimullah, Feng-Wen Sun, Mustafa Eroz ... [ 21 Lin-Nan Lee, Khalid Karimullah, Feng-Wen Sun and Kamran Etemad, " Backward Compatible Third Generation System - HNS Proposal", TIA contribution TR45.5.4 /97.07.16.10 ...
Emerging Location Aware Broadband Wireless Ad Hoc Networks, 2005
Tremendous progress has been made on channel coding techniques during the last decade, starting f... more Tremendous progress has been made on channel coding techniques during the last decade, starting from the invention of turbo codes and the rediscovery of the low-density parity check (LDPC) codes. These codes essentially closed the gap between the Shannon capacity limit and practical implementation. Commercial adoption of these new coding techniques, however, depends heavily on the introduction of the technology
International Journal of Satellite Communications and Networking, 2004
INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING Int. J. Satell. Commun. Network.... more INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING Int. J. Satell. Commun. Network. 2004; 22:319339 (DOI: 10.1002/sat.793) ... Frame synchronization and pilot structure for second ... Feng-Wen Sunz, Yimin Jiangn,y and Lin-Nan Lee}
International Journal of Satellite Communications and Networking, 2004
INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING Int. J. Satell. Commun. Network.... more INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING Int. J. Satell. Commun. Network. 2004; 22:269279 (DOI: 10.1002/sat.787) ... DVB-S2 low density parity check codes with near Shannon ... Mustafa Erozn,y, Feng-Wen Sun and Lin-Nan Lee
IEEE Transactions on Vehicular Technology, 2000
IEEE Transactions on Information Theory, 1995
IEEE Transactions on Information Theory, 1998
IEEE Transactions on Information Theory, 2003
IEEE Transactions on Information Theory, 2004