c% This file was created with JabRef 2.3.1.
% Encoding: ANSI_X3.4-1968
+
+@article{MCErlang07,
+ author = {Fredlund, Lars-\AAke and Svensson, Hans},
+ title = {McErlang: a model checker for a distributed functional programming language},
+ journal = {SIGPLAN Not.},
+ volume = {42},
+ issue = {9},
+ year = {2007},
+ issn = {0362-1340},
+ pages = {125--136},
+ numpages = {12},
+ publisher = {ACM},
+}
+@inproceedings{Bogor03,
+ author = {Robby and
+ Matthew B. Dwyer and
+ John Hatcliff},
+ title = {Bogor: an extensible and highly-modular software model checking
+ framework},
+ booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
+ of Software Engineering 2003},
+ publisher = {ACM},
+ year = {2003},
+ pages = {267-276},
+}
+
@INPROCEEDINGS{nusmv02,
author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
crossref = {DBLP:conf/cav/2002}
}
+@unpublished{Cha06,
+author = {Nishanth Chandrasekaran},
+title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
+year = 2006,
+}
+
+@InProceedings{GO01,
+ Author = "Gastin, P. and Oddoux, D.",
+ Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
+ BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
+ Publisher = "Springer",
+ Series = lncs,
+ Number = 2102,
+ Year = 2001,
+ Pages = "53--65"
+}
+
@INPROCEEDINGS{CGK05,
author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
title = {A uniform deductive approach for parameterized protocol safety},
pages={704-718},
keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
doi={10.1109/TCSVT.2009.2017411},
-ISSN={1051-8215},}
+ISSN={1051-8215}}
@ARTICLE{PM06,
author={Palomar, D.P. and Mung Chiang},
pages={1439-1451},
keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
doi={10.1109/JSAC.2006.879350},
-ISSN={0733-8716},}
+ISSN={0733-8716}}
+
+@article{HFD14,
+year={2014},
+journal={EURASIP Journal on Information Security},
+eid={1},
+volume={2014},
+number={1},
+doi={10.1186/1687-417X-2014-1},
+title={Universal distortion function for steganography in an arbitrary domain},
+url={http://dx.doi.org/10.1186/1687-417X-2014-1},
+publisher={Springer International Publishing},
+author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
+language={English}
+}
+
+@inproceedings{conf/wifs/HolubF12,
+ added-at = {2013-01-23T00:00:00.000+0100},
+ author = {Holub, Vojtech and Fridrich, Jessica J.},
+ biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
+ booktitle = {WIFS},
+ crossref = {conf/wifs/2012},
+ ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
+ interhash = {cbef658a6868216eef585dd759ae0668},
+ intrahash = {a685b4b8b521ac99734fb52c064ca994},
+ isbn = {978-1-4673-2285-0},
+ keywords = {dblp},
+ pages = {234-239},
+ publisher = {IEEE},
+ timestamp = {2013-01-23T00:00:00.000+0100},
+ title = {Designing steganographic distortion using directional filters.},
+ url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
+ year = 2012
+}
+
+
@article{FillerJF11,