Publications by authors named "T Catarci"

This paper presents ARCA, a software system that enables semantic search and exploration over a book catalog. The main purpose of this work is twofold: to propose a general paradigm for a semantic enrichment workflow and to evaluate a visual approach to information retrieval based on extracted information and existing knowledge graphs. ARCA has been designed and implemented following a user-centered design approach.

View Article and Find Full Text PDF

Background: Persistent migraine with aura and neuroimaging examinations revealing ischaemia in the contralateral cortex may be associated with migrainous infarction. Despite being a neurological symptom that is distinct from migraine with aura, the visual snow phenomenon may also be associated with cerebral ischaemia. Here we describe a patient who reported short-lasting daily symptoms of visual snow that affected his entire visual field before becoming continuous and left-sided following acute occipital brain ischaemia.

View Article and Find Full Text PDF

Objective: The primary aim of this study was to assess the degree of awareness migraine patients had of their condition. The secondary aims were to evaluate the frequency of an incorrect diagnosis of "cervical arthrosis" in patients unaware of having migraine and to compare the clinical features, diagnostic investigation, and treatment strategies between the 2 subgroups of migraineurs, that is, those with and without the incorrect diagnosis of "cervical arthrosis."

Methods: Patients, between 18 and 65 years, were consecutively referred to 5 Headache Centers in 2 Italian regions for a first visit.

View Article and Find Full Text PDF

Vulnerabilities represent one of the main weaknesses of IT systems and the availability of consolidated official data, like CVE (Common Vulnerabilities and Exposures), allows for using them to compute the paths an attacker is likely to follow. However, even if patches are available, business constraints or lack of resources create obstacles to their straightforward application. As a consequence, the security manager of a network needs to deal with a large number of vulnerabilities, making decisions on how to cope with them.

View Article and Find Full Text PDF