@incollection{, AD4D98D04C66709FDFFE6E86259D6625 , author={{Amit JugmandarKunchalas} and {Dr. Amar ChangdeoGadekar} and {MAE, Alandi, Pune University, India.}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1281518 } @book{b0, , title={{Android Source Code 2}} , note={Device Requirements} } @book{b1, , title={{Designing System-Level Defenses against Cell phone Malware}} , author={{ LXie } and { XZhang } and { AChaugule } and { TJaeger } and { SZhu }} , note={Reliable Distributed Systems, 2009. SRDS '09. 28th IEEE} } @incollection{b2, , title={{Twenty-six Moves Suffice for Rubik's Cube}} , author={{ DKunkle } and { GCooperman }} , booktitle={{Proceedings of the International Symposium on Symbolic and Algebraic Computation (ISSAC '07)}} the International Symposium on Symbolic and Algebraic Computation (ISSAC '07) , publisher={ACM Press} } @incollection{b3, , title={{The Complexity of Puzzles: NP-Completeness Results for Rubrics cube and Minesweeper}} , author={{ BMcphail }} , booktitle={{Thesis for BA, Division of Mathematics and Natural Sciences}} Reed College , year={2003} } @book{b4, , title={{Saving portable computer battery power through remote process execution}} , author={{ ARudenko } and { PReiher } and { GJPopek } and { GHKuenning }} , publisher={MCCR} } @incollection{b5, , title={{Detecting Energy-Greedy Anomalies and Mobile Malware Variants}} , author={{ HKim }} , booktitle={{International Conference on Mobile Systems, Applications, and Services (MobiSys)}} , year={2008} } @book{b6, , title={{SCanDroid: Automated Security Certification of Android Applications}} , author={{ APFuchs }} , year={2010} } @book{b7, , title={{Group Theory and the Rubik's Cube. Texas State Honors Math Camp}} } @book{b8, , title={{Adventures of Group Theory: Rubik's Cube, Merlin's Machine, and Other Mathematical Toy}} }