Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Chassapis, Constantin
Algosystems S.A.
Kallithea, Greece
   Reader Recommended
   Reviewer Selected
Follow this Reviewer
Date Reviewed  
- 10 of 60 reviews

  Law, technology and policies: a complex negotiation to generate value
Cordella A., Gualdi F.  ICEEG 2019 (Proceedings of the 2019 3rd International Conference on E-commerce, E-Business and E-Government, Lyon, France,  Jun 18-21, 2019) 21-28, 2019. Type: Proceedings

The profoundly worded title refers to issues that are not profoundly analyzed in the paper....

Sep 1 2021  
  Designing for privacy and its legal framework: data protection by design and default for the Internet of Things
Tamò-Larrieux A.,  Springer International Publishing, New York, NY, 2018. 254 pp. Type: Book (978-3-319986-23-4)

Rarely have I seen a book on such a contemporary sociotechnical topic as privacy protection that so successfully combines information and communications technology (ICT) concepts to legal principles, (European) regulation to implementation approac...

Jun 9 2020  
  Advanced persistent security: a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
Winkler I., Gomes A.,  Syngress Publishing, Cambridge, MA, 2016. 260 pp. Type: Book (978-0-128093-16-0)

The idea is simple (you just have to accept it): any cybersecurity defense that you may build to protect your organization will (eventually) fail. Period. The optimal way to proceed beyond that simple fact is to anticipate it by design, and build ...

Jan 12 2018  
  Data science: create teams that ask the right questions and deliver real value
Rose D.,  Apress, New York, NY, 2016. 251 pp. Type: Book (978-1-484222-52-2)

When building a data science team, special care must be dedicated to its composition for organizations to obtain the best possible benefits. A data science team is a special kind of animal in the corporate zoo because it encompasses roles and acti...

Jun 8 2017  
  From computing to computational thinking
Wang P.,  Chapman & Hall/CRC, Boca Raton, FL, 2015. 288 pp. Type: Book (978-1-482217-65-0)

This is a nice book, one that I will keep near me, next to Manfred Schroeder’s Fractals, chaos, power laws [1] and Mark Levi’s The mathematical mechanic [2]....

Jan 3 2017  
  Prediction of who will be the next speaker and when using gaze behavior in multiparty meetings
Ishii R., Otsuka K., Kumano S., Yamato J.  ACM Transactions on Interactive Intelligent Systems 6(1): 1-31, 2016. Type: Article

The authors study an issue that, as far as I know, has not been studied in the past: predicting the next speaker and the timing of the start of his or her utterance in multiparty meetings....

Sep 21 2016  
  Improving software development productivity: effective leadership and quantitative methods in software management
Jensen R.,  Prentice Hall Press, Upper Saddle River, NJ, 2014. 368 pp. Type: Book (978-0-133562-67-5)

Jensen is an expert on estimation methodologies for software development cost and effort, and he does an excellent job in communicating his vast expertise and experience....

May 21 2015  
  Quantum computing and communications - introduction and challenges
Imre S.  Computers and Electrical Engineering 40(1): 134-141, 2014. Type: Article

This paper is a nice introductory tutorial on quantum computing and quantum communications, with few more details on the second topic and special emphasis on the inherent security of quantum communications and the related technological implementat...

Sep 23 2014  
  Consistency and enforcement of access rules in cooperative data sharing environment
Le M., Kant K., Jajodia S.  Computers and Security 413-18, 2014. Type: Article

Modern businesses require online multipart collaboration to efficiently service their clients, and this requirement forces them to allow collaborating businesses to access their data. The immediate consequence is that the collaborating businesses ...

Jul 15 2014  
  Security and privacy preserving in social networks
Chbeir R., Al Bouna B.,  Springer Publishing Company, Incorporated, Vienna, Austria, 2013. 353 pp. Type: Book (978-3-709108-93-2)

By offering a cornucopia of user information to other licit (or sometimes illicit) users, online social networks (OSNs) create the ultimate challenge for preventing privacy invasion and relationship mining, while supporting all the reasons OSNs ca...

Feb 20 2014  
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy