Refactorings are transformations that change the structure of a program, while preserving the behavior. The topic has attracted a lot of attention recently, since it is a promising...
Abstract. While code obfuscation attempts to hide certain characteristics of a program independently of an application, white-box cryptography (WBC) specifically focuses on softwa...
Abstract--In the majority of studies on CSMA wireless networks, a contention graph is used to model the carrier sensing relationships among links. This is a 0-1 model in which two ...
The paper elaborates on the theoretical foundation of Information System understood as a field of design science. Revisiting Hevner’s et al. seminal paper [44], we elaborate on ...
-International Information Systems, often of critical importance for the operations of the multinational enterprise, are poorly researches and there is a dearth of theoretical fram...