Sfoglia per Autore
Decontamination of Chordal Rings and Tori
2006-01-01 P., Flocchini; M., Huang; Luccio, Flaminia
Feedback Vertex Sets in Mesh-based Networks.
2007-01-01 Luccio, Flaminia; JOP F., Sibeyn
A New Actor-Based Structure for Distributed Systems
2007-01-01 A., Dattolo; Luccio, Flaminia
Decontaminating chordal rings and tori using mobile agents.
2007-01-01 P., Flocchini; M. J., Huang; Luccio, Flaminia
Intruder Capture in Sierpinski Graphs.
2007-01-01 Luccio, Flaminia
ACM-IFIP IEEIII - Informatics Education Europe
2008-01-01 Cortesi, Agostino; Luccio, Flaminia
Decontamination of Hypercubes by Mobile Agents
2008-01-01 P., Flocchini; M. J., Huang; Luccio, Flaminia
Formalizing a model to represent and visualize concept spaces in e-learning environments
2008-01-01 A., Dattolo; Luccio, Flaminia
Visualizing Personalized Views in Virtual Museum Tours
2008-01-01 A., Dattolo; Luccio, Flaminia
Type-based Analysis of Financial APIs
2009-01-01 M., Centenaro; Focardi, Riccardo; Luccio, Flaminia; G., Steel
Type-based Analysis of Financial APIs (extended abstract)
2009-01-01 M., Centenaro; Focardi, Riccardo; Luccio, Flaminia; G., Steel
Improving PIN Processing API Security
2009-01-01 Focardi, Riccardo; Luccio, Flaminia; Steel, G.
A New Concept Map Model for E-learning Environments
2009-01-01 A., Dattolo; Luccio, Flaminia
Blunting Differential Attacks on PIN Processing APIs
2009-01-01 Focardi, Riccardo; Luccio, Flaminia; Steel, G.
A formal description of ZigZag-structures
2009-01-01 Dattolo, Antonina; Luccio, Flaminia
A State of Art Survey on ZigZag Structures
2009-01-01 A., Dattolo; Luccio, Flaminia
A Formal Model for Supporting the Adaptive Access to Virtual Museums
2009-01-01 A., Dattolo; Luccio, Flaminia
Contiguous search problem in Sierpinski graphs
2009-01-01 Luccio, Flaminia
Type-Based Analysis of PIN Processing APIs
2009-01-01 M., Centenaro; Focardi, Riccardo; Luccio, Flaminia; G., Steel
Cracking Bank PINs by Playing Mastermind
2010-01-01 Focardi, Riccardo; Luccio, Flaminia
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile