Format
Sort by

Send to

Choose Destination

Search results

Items: 3

1.

Vulnus: Visual Vulnerability Analysis for Network Security.

Angelini M, Blasilli G, Catarci T, Lenti S, Santucci G.

IEEE Trans Vis Comput Graph. 2018 Aug 21. doi: 10.1109/TVCG.2018.2865028. [Epub ahead of print]

PMID:
30136974
2.

Scaffolding the design of accessible eLearning content: a user-centered approach and cognitive perspective.

Catarci T, De Giovanni L, Gabrielli S, Kimani S, Mirabella V.

Cogn Process. 2008 Aug;9(3):209-16. doi: 10.1007/s10339-008-0213-3. Epub 2008 Apr 18.

PMID:
18421489
3.

Computing: report leaps geographical barriers but stumbles over gender.

Pollack ME, Hambrusch SE, Ellis CS, Grosz BJ, Hodgins J, Bajcsy R, Brodley CE, Aiello LC, Bonacina MP, Clarke LA, Hirschberg J, Veloso MM, Amato N, Sonenberg L, Weyuker E, Pollock L, Irwin MJ, Padgham L, Ryder BG, Catarci T, McCoy KF, Klawe M, Carberry S, Dillon L, McKeown K, Soffa ML.

Nature. 2006 May 4;441(7089):25. No abstract available.

Supplemental Content

Loading ...
Support Center