Skip to content


Computer Science

Maria Virvou

Section Editor: Maria Virvou

Maria Virvou serves as a Professor and Head of the Department of Informatics, University of Piraeus, Greece.

She is a world expert in the area of Computer Education, Human-Computer Interaction and Knowledge-Based Software Engineering. She also served as the Director of the “Software Engineering” research lab. This Software Engineering lab has achieved honorary distinctions and has been one of the main contributors to establishing the University of Piraeus as a top Organization for Computer Education.

Professor Virvou has authored and/or edited  many books in Computer Science and over 300 research papers which have been published in high quality international journals, books and conference proceedings.

Page 4 of 12
  1. Content type: Research

    With the support of cloud computing techniques, social coding platforms have changed the style of software development. Github is now the most popular social coding platform and project hosting service. Softwa...

    Authors: Yan Hu, Jun Zhang, Xiaomei Bai, Shuo Yu and Zhuo Yang

    Citation: SpringerPlus 2016 5:1268

    Published on:

  2. Content type: Research

    The majority of methods for recognizing human actions are based on single-view video or multi-camera data. In this paper, we propose a novel multi-surface video analysis strategy. The video can be expressed as...

    Authors: Hong-Bo Zhang, Qing Lei, Bi-Neng Zhong, Ji-Xiang Du, Jialin Peng, Tsung-Chih Hsiao and Duan-Sheng Chen

    Citation: SpringerPlus 2016 5:1226

    Published on:

  3. Content type: Research

    In crowd behavior studies, a model of crowd behavior needs to be trained using the information extracted from video sequences. Most of the previous methods are based on low-level visual features because there ...

    Authors: Hamidreza Rabiee, Javad Haddadnia and Hossein Mousavi

    Citation: SpringerPlus 2016 5:1179

    Published on:

    The Erratum to this article has been published in SpringerPlus 2016 5:2114

  4. Content type: Research

    The exponential increase in the health-related online reviews has played a pivotal role in the development of sentiment analysis systems for extracting and analyzing user-generated health reviews about a drug ...

    Authors: Muhammad Zubair Asghar, Shakeel Ahmad, Maria Qasim, Syeda Rabail Zahra and Fazal Masud Kundi

    Citation: SpringerPlus 2016 5:1139

    Published on:

  5. Content type: Research

    Parallel computation has been widely applied in a variety of large-scale scientific and engineering applications. Many studies indicate that exploiting both task and data parallelisms, i.e. mixed-parallel work...

    Authors: Kuo-Chan Huang, Wei-Ya Wu, Feng-Jian Wang, Hsiao-Ching Liu and Chun-Hao Hung

    Citation: SpringerPlus 2016 5:1138

    Published on:

  6. Content type: Research

    No-reference image quality assessment aims to predict the visual quality of distorted images without examining the original image as a reference. Most no-reference image quality metrics which have been already...

    Authors: Hongjun Li, Wei Hu and Zi-neng Xu

    Citation: SpringerPlus 2016 5:1097

    Published on:

  7. Content type: Research

    This paper proposes a new watermarking algorithm based on the shuffled singular value decomposition and the visual cryptography for copyright protection of digital images. It generates the ownership and ident...

    Authors: B. Pushpa Devi, Kh. Manglem Singh and Sudipta Roy

    Citation: SpringerPlus 2016 5:1091

    Published on:

  8. Content type: Research

    Various peak models have been introduced to detect and analyze peaks in the time domain analysis of electroencephalogram (EEG) signals. In general, peak model in the time domain analysis consists of a set of s...

    Authors: Asrul Adam, Zuwairie Ibrahim, Norrima Mokhtar, Mohd Ibrahim Shapiai, Paul Cumming and Marizan Mubin

    Citation: SpringerPlus 2016 5:1036

    Published on:

  9. Content type: Research

    A firewall is the most essential component of network perimeter security. Due to human error and the involvement of multiple administrators in configuring firewall rules, there exist common anomalies in firewa...

    Authors: Ravi Kiran Varma Penmatsa, Valli Kumari Vatsavayi and Srinivas Kumar Samayamantula

    Citation: SpringerPlus 2016 5:1032

    Published on:

  10. Content type: Research

    Covering approximation spaces are a generalization of equivalence-based rough set theories. In this paper, we will consider twelve types of covering based approximation operators by combining four types of cov...

    Authors: Samira Safari and Mohammad Reza Hooshmandasl

    Citation: SpringerPlus 2016 5:1003

    Published on:

Page 4 of 12