The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

George Lawton: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. George Lawton
    Intellectual-Property Protection Opens Path for E-commerce. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2000, v:33, n:2, pp:14-17 [Journal]
  2. George Lawton
    Distributed Net Applications Create Virtual Supercomputers. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2000, v:33, n:6, pp:16-20 [Journal]
  3. George Lawton
    Video Streams into the Mainstream. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2000, v:33, n:7, pp:12-17 [Journal]
  4. George Lawton
    Knowledge Management: Ready for Prime Time? [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:2, pp:12-14 [Journal]
  5. George Lawton
    New Technologies Place Video in Your Hand. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:4, pp:14-17 [Journal]
  6. George Lawton
    New I/O Technologies Seek to End Bottlenecks. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:6, pp:16-18 [Journal]
  7. George Lawton
    Internet Appliances Struggle for Acceptance. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:7, pp:12-15 [Journal]
  8. George Lawton
    Is IPv6 Finally Gaining Ground? [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:8, pp:11-15 [Journal]
  9. George Lawton
    Is Technology Meeting the Privacy Challenge?. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:9, pp:16-18 [Journal]
  10. George Lawton
    Browsing the Mobil Internet. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:12, pp:18-21 [Journal]
  11. George Lawton
    Open Source Security: Opportunity or Oxymoron? [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2002, v:35, n:3, pp:18-21 [Journal]
  12. George Lawton
    Moving Java into Mobile Phones. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2002, v:35, n:6, pp:17-20 [Journal]
  13. George Lawton
    Invasive Software: Who's Inside Your Computer? [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2002, v:35, n:7, pp:15-18 [Journal]
  14. George Lawton
    Virus Wars: Fewer Attacks, New Threats. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2002, v:35, n:12, pp:22-24 [Journal]
  15. George Lawton
    Instant Messaging Puts on a Business Suit. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2003, v:36, n:3, pp:14-16 [Journal]
  16. George Lawton
    Is Peer-to-Peer Secure Enough for Corporate Use? [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:1, pp:22-25 [Journal]
  17. George Lawton
    Will Network Processor Units Live Up to Their Promise? [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:13-15 [Journal]
  18. George Lawton
    Is MIMO the Future of Wireless Communications? [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:7, pp:20-22 [Journal]
  19. George Lawton
    Machine-to-Machine Technology Gears Up for Growth. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:9, pp:12-15 [Journal]
  20. George Lawton
    The Lowdown on High-Rise Chips. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:10, pp:24-27 [Journal]
  21. George Lawton
    Telecom Carriers Actively Pursue Passive Optical Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2005, v:38, n:2, pp:19-21 [Journal]
  22. George Lawton
    What Lies Ahead for Cellular Technology? [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2005, v:38, n:6, pp:14-17 [Journal]
  23. George Lawton
    LAMP Lights Enterprise Development Efforts. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2005, v:38, n:9, pp:18-20 [Journal]
  24. George Lawton
    E-Mail Authentication Is Here, but Has It Arrived Yet? [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2005, v:38, n:11, pp:17-19 [Journal]
  25. George Lawton
    Improved Flash Memory Grows in Popularity. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2006, v:39, n:1, pp:16-18 [Journal]
  26. George Lawton
    Making Virtual Reality More Accessible. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2006, v:39, n:6, pp:12-15 [Journal]
  27. George Lawton
    Making Business Intelligence More Useful. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2006, v:39, n:9, pp:14-16 [Journal]
  28. George Lawton
    Extranets: Next Step for the Internet. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1997, v:30, n:5, pp:17- [Journal]
  29. George Lawton
    Dawn of the Internet Appliance. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1997, v:30, n:10, pp:16-18 [Journal]
  30. George Lawton
    In Search of Real-Time Internet Service. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1997, v:30, n:11, pp:14-16 [Journal]
  31. George Lawton
    The Wild World of 3D Graphics Chips. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2000, v:33, n:9, pp:12-16 [Journal]
  32. George Lawton
    Paving the Information Superhighway's Last Mile. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1998, v:31, n:4, pp:10-14 [Journal]
  33. George Lawton
    The Internet's Challenge to Privacy. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1998, v:31, n:6, pp:16-18 [Journal]
  34. George Lawton
    Multicasting: Will It Transform the Internet? [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1998, v:31, n:7, pp:13-15 [Journal]
  35. George Lawton
    Biometrics: A New Era in Security. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1998, v:31, n:8, pp:16-18 [Journal]
  36. George Lawton
    Vendors Battle over Mobile-OS Market. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1999, v:32, n:2, pp:13-15 [Journal]
  37. George Lawton
    New Technologies Take the Network Home. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1999, v:32, n:3, pp:11-14 [Journal]
  38. George Lawton
    Storage Technology Takes Center Sstage. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1999, v:32, n:11, pp:10-12 [Journal]

  39. Stronger Domain Name System Thwarts Root-Server Attacks. [Citation Graph (, )][DBLP]


  40. Working Today on Tomorrow's Storage Technology. [Citation Graph (, )][DBLP]


  41. Web 2.0 Creates Security Challenges. [Citation Graph (, )][DBLP]


  42. News Briefs. [Citation Graph (, )][DBLP]


  43. Powering Down the Computing Infrastructure. [Citation Graph (, )][DBLP]


  44. The Next Big Thing in Chipmaking. [Citation Graph (, )][DBLP]


  45. These Are Not Your Father's Widgets. [Citation Graph (, )][DBLP]


  46. Moving the OS to the Web. [Citation Graph (, )][DBLP]


  47. US Cell Phone Industry Faces an Open Future. [Citation Graph (, )][DBLP]


  48. Developing Software Online With Platform-as-a-Service Technology. [Citation Graph (, )][DBLP]


  49. New Technology Prevents Data Leakage. [Citation Graph (, )][DBLP]


  50. New Ways to Build Rich Internet Applications. [Citation Graph (, )][DBLP]


  51. Is It Finally Time to Worry about Mobile Malware? [Citation Graph (, )][DBLP]


  52. Wireless HD Video Heats Up. [Citation Graph (, )][DBLP]


  53. WDM-PONs Hold Promise for the Long Haul. [Citation Graph (, )][DBLP]


  54. Users Take a Close Look at Visual Analytics. [Citation Graph (, )][DBLP]


  55. On the Trail of the Conficker Worm. [Citation Graph (, )][DBLP]


  56. Routing Faces Dramatic Changes. [Citation Graph (, )][DBLP]


  57. The Changing Face of Open Source. [Citation Graph (, )][DBLP]


  58. Fighting Intrusions into Wireless Networks. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.010secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002