Search
Now showing items 1-10 of 19
Closed-loop supply chain model of remanufacturing product with demand marketing of returning product
Publisher: IEEE
Year: 2014
Practical Routing Protocol for Impromptu Mobile Social Networks
Publisher: IEEE
Year: 2014
Analysis of Delegable and Proxy Provable Data Possession for Cloud Storage
Publisher: IEEE
Year: 2014
Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage
Publisher: IEEE
Year: 2014