Huijuan Wang

Learn More
Digital system designs are the product of valuable effort and know-how. Their embodiments, from software and HDL program down to device-level netlist and mask data, represent carefully guarded intellectual property (IP). Hence, design methodologies based on IP reuse require new mechanisms to protect the rights of IP producers and owners. This paper(More)
Digital system designs are the product of valuable effort and know-how. Their embodiments, from software and hardware description language program down to device-level netlist and mask data, represent carefully guarded intellectual property (IP). Hence, design methodologies based on IP reuse require new mechanisms to protect the rights of IP producers and(More)
When transport in networks follows the shortest paths, the union of all shortest path trees G union or logical sum SPT can be regarded as the "transport overlay network." Overlay networks such as peer-to-peer networks or virtual private networks can be considered as a subgraph of G union or logical sum SPT. The traffic through the network is examined by the(More)
1. To analyze the polymorphic activities of CYP2C8 and evaluate their impact on drug inhibitory potential, three CYP2C8 allelic variants (CYP2C8.2, CYP2C8.3, and CYP2C8.4), two non-synonymous single nucleotide polymorphic variants (R139K and K399R, carried by CYP2C8.3), and wild-type CYP2C8 (CYP2C8.1) were heterologously expressed in yeast, and their(More)
Increasingly popular reuse-based design paradigms create a pressing need for authorship enforcement techniques that protect the intellectual property rights of designers. We develop the first intellectual property protection protocols for embedding design <italic>watermarks</italic> at the physical design level. We demonstrate that these protocols are(More)
The decrease of the spectral radius, an important characterizer of network dynamics, by removing links is investigated. The minimization of the spectral radius by removing m links is shown to be an NP-complete problem, which suggests considering heuristic strategies. Several greedy strategies are compared, and several bounds on the decrease of the spectral(More)
We describe new, efficient algorithms for layout modification and phase assignment for dark field alternating-type phase shifting masks in the single exposure regime. We make the following contributions. First, we suggest new two-coloring and compaction approach that simultaneously optimizes layout and phase assignment which is based on planar embedding of(More)
The union of all shortest path trees <i>G</i><inf>Uspt</inf> is the maximally observable part of a network when traffic follows shortest paths. Overlay networks such as peer to peer networks or virtual private networks can be regarded as a subgraph of <i>G</i><inf>Uspt</inf>. We investigate properties of <i>G</i><inf>Uspt</inf> in different underlying(More)
On 26 May 2015, an imported Middle East respiratory syndrome coronavirus (MERS-CoV) was identified in Guangdong Province, China, and found to be closely related to the MERS-CoV strain prevalent in South Korea. The full genome of the ChinaGD01 strain was sequenced and analyzed to investigate the epidemiology and evolution of MERS-CoV circulating in South(More)