Independent Directed Acyclic Graphs for Resilient Multipath Routing.bak
Selfish Overlay Network Creation and Maintenance
Monitoring Service Systems From a Language-Action Perspective
A Comparative Study of Software Model Checkers as Unit Testing Tools
Scalable Coding of Encrypted Images.bak
Privacy- And Integrity-Preserving Range Queries in Sensor Networks.bak
Handwritten Chinese Text Recognition by Integrating Multiple Contexts.bak
A Novel Data Embedding Method Using Adaptive Pixel Pair Matching.bak
Outsourced Similarity Search on Metric Data Assets.bak
Secure Client-Side ST-DM Watermark Embedding
an efficient adaptive deadlock-free routing algorithm for torus networks
The Three-Tier Security Scheme in Wireless Sensor Networks With Mobile Sinks.bak
Improving Various Reversible Data Hiding Schemes via Optimal Codes for Binary Covers.bak
Online Modeling of Proactive Moderation System for Auction Fraud Detection.bak
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption.bak
SPAF Stateless FSA-Based Packet Filters
Semantics-Based Automated Service Discovery.bak
Fundamental Limits of Information Dissemination
Going Back and Forth Efficient Multideployment and Multisnapshotting on Clouds
Is Cloned Code Older Than Non-Cloned Code