Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Kouadri, Ghita
UCL
London, United Kingdom
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

Ghita Kouadri Mostefaoui is currently a researcher at the computing laboratory at Oxford University. Her research interests include software engineering, context-aware computing, context-based security, security in general, and e-health.

Before joining Oxford University, she worked as a postdoctoral fellow at the University of Montreal, Canada, and as a research and teaching assistant at the University of Fribourg (Switzerland).

She received her engineering diploma in electronics (with first class honors) from the University of Blida, Algeria in 1996 under the supervision of Yazid Cherfa. In 1999, she earned an MS degree (pre-doctoral school) in computer science from Ecole Polytechnique Fédérale de Lausanne (Switzerland), where she worked in the virtual reality lab led by Daniel Thalmann. Ghita received her PhD in computer science from both the University of Fribourg and Université Pierre et Marie Curie (Paris 6) in 2004.

Ghita has published many papers on security, context, software engineering, and pervasive computing. She also serves as a technical reviewer for several conferences and journals including Symposium on Applied Computing (SAC), IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS), Journal of Science of Computer Programming, IEEE Transactions on Systems, Man and Cybernetics, and ACM SIGecom Exchanges.

Ghita is member of the Institute of Electrical and Electronics Engineers (IEEE), the Association for Computing Machinery (ACM), and the Swiss Informaticians Society (SIS).

Even though Ghita has visited many countries and lived on three different continents, she is very attached to her home country, Algeria. Aside from computer science and electronics, Ghita has a passion for Arabic literature, Islamic art, and music.

 
 
Options:
Date Reviewed  
 
1
- 10 of 10 reviews

   
  Mathematical logic through Python
Gonczarowski Y., Nisan N., Cambridge University Press, Cambridge, UK, 2022. 284 pp.  Type: Book (1108949479), Reviews: (1 of 2)

Mathematical logic through Python, by Gonczarowski and Nisan, provides a Python implementation of logical concepts and mathematical proofs. It aims at covering major topics for a typical undergraduate course in mathematical logic....

Apr 11 2023  
   Mathematical foundations of data science using R (2nd ed.)
Emmert-Streib F., Moutari S., Dehmer M., DE GRUYTER, Berlin, Germany, 2022. 408 pp.  Type: Book (3110795884)

Data science aims to extract relevant information from a large dataset for the purpose of decision making. Data science algorithms rely on several mathematical topics. Computationally, these algorithms can be implemented using several programming ...

Feb 14 2023  
   Clean craftsmanship: disciplines, standards, and ethics
Martin R., Pearson, Columbus, OH, 2021. 416 pp.  Type: Book (978-0-136915-71-3), Reviews: (2 of 2)

At first, computer programming was reserved for highly skilled people. Over the decades, programming languages have become more and more user friendly, making them accessible to more people. Nowadays, several countries around the world are general...

Sep 21 2022  
   Rewiring education: how technology can unlock every student’s potential
Couch J., Towne J., Benbella Books, Dallas, TX, 2018. 272 pp.  Type: Book (978-1-977363-35-0)

Back in 2001, Marc Prensky stated:...

May 6 2021  
   Teaching computing: a practitioner’s perspective
Walker H., CRC Press, Inc., Boca Raton, FL, 2018. 514 pp.  Type: Book (978-1-138034-43-3)

Computing is a very popular option among undergraduates and graduates because it relates to many other disciplines, including finance, graphic design, game development, and biology, among others. The teaching of computing requires up-t...

Dec 20 2018  
   Data and Goliath: the hidden battles to capture your data and control your world
Schneier B., W. W. Norton & Co., Inc., New York, NY, 2015. 320 pp.  Type: Book (978-0-393244-81-6), Reviews: (3 of 4)

On a daily basis, we produce a huge amount of data by using laptops, mobile phones, or any other computer-based systems. The book’s scary title is no exaggeration. It covers the most interesting case studies on the use of our...

Jun 17 2015  
   Clean code: a handbook of agile software craftsmanship
Martin R., Prentice Hall PTR, Upper Saddle River, NJ, 2009. 464 pp.  Type: Book (9780132350884), Reviews: (2 of 2)

If you have been involved in developing on top of legacy code, you have probably felt the pain of working with poorly designed code and a lack of documentation. This situation is simply a source of frustration and a definite cause of e...

May 7 2009  
   Software security: building security in
McGraw G., Addison-Wesley Professional, Boston, MA, 2006. 448 pp.  Type: Book (9780321356703), Reviews: (2 of 4)

Security has become a hot topic in both academia and industry. This interest has been encouraged by the high reliance on distributed infrastructures for sharing and accessing data and computing resources. This distribution calls for st...

Jun 29 2006  
   Security engineering with patterns: origins, theoretical models, and new applications
Schumacher M., Springer-Verlag New York, Inc., Secaucus, NJ, 2003. 208 pp.  Type: Book (9783540407317), Reviews: (2 of 2)

Security is an important aspect of emerging open systems, such as those in e-commerce and similar applications. Security is, however, often added after the system is already built, and, therefore, many problems may arise from the lack ...

Nov 12 2004  
   The art and science of computer security
Bishop M., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002. 1120 pp.  Type: Book (9780201440997), Reviews: (2 of 2)

Even if the goal of computer security is easy to understand--to protect computer assets--the field itself is a complex topic including many concepts and techniques. The literature on computer security is very rich, bu...

Dec 16 2003  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy