Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Solanas, Agusti
Rovira i Virgili University
Tarragona, Spain
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

Agusti Solanas is head of the Smart Technologies Research Group and a professor in the Department of Computer Engineering and Mathematics at the Rovira i Virgili University (URV). He has master’s degrees in computer engineering and telematics, and received his PhD in telematics engineering, in 2007, from the Technical University of Catalonia.

Previous work includes visiting researcher positions at the Roma Tre University and the University of Padua. He has also participated in many European-, Spanish-, and Catalan-funded research projects. He currently serves as principal investigator (PI) for the Spanish Project CONDOR and Science Communication Manager for Goodbrother COST Action 19121.

Agusti’s fields of interest are smart and cognitive health, cognitive environments, data privacy, cyberethics, ubiquitous computing, and artificial intelligence (AI).

He has authored over 150 publications, delivered invited talks worldwide, and held various positions at conferences and journals. He is a Senior Member of the Institute of Electrical and Electronics Engineers (IEEE).

Agusti has been a reviewer for Computing Reviews since 2008.

 
 
Options:
Date Reviewed  
 
1
- 10 of 19 reviews

   
   Programming Bitcoin: learn how to program Bitcoin from scratch
Song J., O’Reilly Media, Inc., Sebastopol, CA, 2019. 322 pp.  Type: Book (978-1-492031-49-9)

“I hear and I forget. I see and I remember. I do and I understand.” This saying, probably wrongly attributed to Confucius, might be an interpreted translation of a similar saying by 3rd century BCE philosopher Xun K...

Oct 22 2019  
   Handbook of mobile data privacy
Gkoulalas-Divanis A., Bettini C., Springer International Publishing, New York, NY, 2018. 403 pp.  Type: Book (978-3-319981-60-4)

Location, location, location! If you are at risk of being targeted by an intelligent guided missile and you want to survive, I can only suggest you turn off your cellphone. But OK, let’s be realistic: if you’re worr...

Jul 22 2019  
   Codes, ciphers and spies: tales of military intelligence in World War I
Dooley J., Copernicus, New York, NY, 2016. 280 pp.  Type: Book (978-3-319294-14-8)

The invention of asymmetric key cryptography by Diffie and Hellman in 1976 [1] is generally accepted as the milestone that defines the boundary between classic and modern cryptography. Before 1976, cryptography was more of an art than ...

Oct 27 2016  
   Privacy-invading technologies and privacy by design: safeguarding privacy, liberty and security in the 21st century
Klitou D., T.M.C. Asser Press, The Hague, The Netherlands, 2014. 338 pp.  Type: Book (978-9-462650-25-1)

One of the most relevant shortcomings associated with the wide use of some technologies is the dubious protection of privacy. In Klitou’s book, the reader will find an interesting, well-written study on the privacy problems r...

Jun 24 2015  
   Pervasive health: state-of-the-art and beyond
Holzinger A., Ziefle M., Röcker C., Springer Publishing Company, Incorporated, London, UK, 2014. 365 pp.  Type: Book (978-1-447164-12-8)

Depending on your place of residence, you might have a different conception of the meaning, objectives, and raison d’être of healthcare services. There are many dichotomies that might be applied to classify healthcar...

Feb 10 2015  
   Privacy for location-based services
Ghinita G., Morgan&Claypool Publishers, San Rafael, CA, 2013. 86 pp.  Type: Book (978-1-627051-49-1)

Following the wide adoption of mobile phones equipped with global positioning systems (GPS), location-based services (LBS), such as finding the closest pharmacy or the cheapest gas station within a range, have become commonplace. In a ...

Jan 21 2014  
   Introduction to the senses: from biology to computer science
Bossomaier T., Cambridge University Press, New York, NY, 2012. 358 pp.  Type: Book (978-0-521812-66-5), Reviews: (2 of 2)

We are so used to our senses that we do not actually think about how we use them and how complex the processes are that serve them. They mostly remain hidden within our brains. Senses and their nuances have captured the attention of sc...

Jul 24 2013  
   iPhone and iOS forensics: investigation, analysis and mobile security for Apple iPhone, iPad and iOS devices
Hoog A., Strzempka K., Syngress Publishing, Waltham, MA, 2011. 336 pp.  Type: Book (978-1-597496-59-9)

This well-written book focuses on the study of information acquisition from the iPhone and other iOS-based devices such as the iPad. It provides many details and examples that should significantly help readers follow the explanations.<...

Dec 21 2011  
   iPhone cool projects
Bennett G., Ante W., Ash M., Jackson B., Mix N., Peterson S., Rosenfeld M., Apress, Berkeley, CA, 2009. 240 pp.  Type: Book (9781430223573)

Information and communication technologies (ICTs) are the building blocks of today’s information society. Mobile telephony is one of the most important ICTs. Cell phones are everywhere, and their capabilities are quickly incr...

May 5 2010  
   UbiMeds: a mobile application to improve accessibility and support medication adherence
Silva J., Mouttham A., El Saddik A.  MSIADU 2009 (Proceedings of the 1st ACM SIGMM International Workshop on Media Studies and Implementations That Help Improving Access to Disabled Users, Beijing, China, Oct 23, 2009) 71-78, 2009.  Type: Proceedings

According to the World Health Organization, “adherence is the extent to which a person’s behavior [in] taking medication ... corresponds with agreed recommendations from a health care provider.” Patients m...

Feb 1 2010  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy