|
Search the dblp DataBase
George Lawton:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- George Lawton
Intellectual-Property Protection Opens Path for E-commerce. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2000, v:33, n:2, pp:14-17 [Journal]
- George Lawton
Distributed Net Applications Create Virtual Supercomputers. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2000, v:33, n:6, pp:16-20 [Journal]
- George Lawton
Video Streams into the Mainstream. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2000, v:33, n:7, pp:12-17 [Journal]
- George Lawton
Knowledge Management: Ready for Prime Time? [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:2, pp:12-14 [Journal]
- George Lawton
New Technologies Place Video in Your Hand. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:4, pp:14-17 [Journal]
- George Lawton
New I/O Technologies Seek to End Bottlenecks. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:6, pp:16-18 [Journal]
- George Lawton
Internet Appliances Struggle for Acceptance. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:7, pp:12-15 [Journal]
- George Lawton
Is IPv6 Finally Gaining Ground? [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:8, pp:11-15 [Journal]
- George Lawton
Is Technology Meeting the Privacy Challenge?. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:9, pp:16-18 [Journal]
- George Lawton
Browsing the Mobil Internet. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:12, pp:18-21 [Journal]
- George Lawton
Open Source Security: Opportunity or Oxymoron? [Citation Graph (0, 0)][DBLP] IEEE Computer, 2002, v:35, n:3, pp:18-21 [Journal]
- George Lawton
Moving Java into Mobile Phones. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2002, v:35, n:6, pp:17-20 [Journal]
- George Lawton
Invasive Software: Who's Inside Your Computer? [Citation Graph (0, 0)][DBLP] IEEE Computer, 2002, v:35, n:7, pp:15-18 [Journal]
- George Lawton
Virus Wars: Fewer Attacks, New Threats. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2002, v:35, n:12, pp:22-24 [Journal]
- George Lawton
Instant Messaging Puts on a Business Suit. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2003, v:36, n:3, pp:14-16 [Journal]
- George Lawton
Is Peer-to-Peer Secure Enough for Corporate Use? [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:1, pp:22-25 [Journal]
- George Lawton
Will Network Processor Units Live Up to Their Promise? [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:13-15 [Journal]
- George Lawton
Is MIMO the Future of Wireless Communications? [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:7, pp:20-22 [Journal]
- George Lawton
Machine-to-Machine Technology Gears Up for Growth. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:9, pp:12-15 [Journal]
- George Lawton
The Lowdown on High-Rise Chips. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:10, pp:24-27 [Journal]
- George Lawton
Telecom Carriers Actively Pursue Passive Optical Networks. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2005, v:38, n:2, pp:19-21 [Journal]
- George Lawton
What Lies Ahead for Cellular Technology? [Citation Graph (0, 0)][DBLP] IEEE Computer, 2005, v:38, n:6, pp:14-17 [Journal]
- George Lawton
LAMP Lights Enterprise Development Efforts. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2005, v:38, n:9, pp:18-20 [Journal]
- George Lawton
E-Mail Authentication Is Here, but Has It Arrived Yet? [Citation Graph (0, 0)][DBLP] IEEE Computer, 2005, v:38, n:11, pp:17-19 [Journal]
- George Lawton
Improved Flash Memory Grows in Popularity. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:1, pp:16-18 [Journal]
- George Lawton
Making Virtual Reality More Accessible. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:6, pp:12-15 [Journal]
- George Lawton
Making Business Intelligence More Useful. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:9, pp:14-16 [Journal]
- George Lawton
Extranets: Next Step for the Internet. [Citation Graph (0, 0)][DBLP] IEEE Computer, 1997, v:30, n:5, pp:17- [Journal]
- George Lawton
Dawn of the Internet Appliance. [Citation Graph (0, 0)][DBLP] IEEE Computer, 1997, v:30, n:10, pp:16-18 [Journal]
- George Lawton
In Search of Real-Time Internet Service. [Citation Graph (0, 0)][DBLP] IEEE Computer, 1997, v:30, n:11, pp:14-16 [Journal]
- George Lawton
The Wild World of 3D Graphics Chips. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2000, v:33, n:9, pp:12-16 [Journal]
- George Lawton
Paving the Information Superhighway's Last Mile. [Citation Graph (0, 0)][DBLP] IEEE Computer, 1998, v:31, n:4, pp:10-14 [Journal]
- George Lawton
The Internet's Challenge to Privacy. [Citation Graph (0, 0)][DBLP] IEEE Computer, 1998, v:31, n:6, pp:16-18 [Journal]
- George Lawton
Multicasting: Will It Transform the Internet? [Citation Graph (0, 0)][DBLP] IEEE Computer, 1998, v:31, n:7, pp:13-15 [Journal]
- George Lawton
Biometrics: A New Era in Security. [Citation Graph (0, 0)][DBLP] IEEE Computer, 1998, v:31, n:8, pp:16-18 [Journal]
- George Lawton
Vendors Battle over Mobile-OS Market. [Citation Graph (0, 0)][DBLP] IEEE Computer, 1999, v:32, n:2, pp:13-15 [Journal]
- George Lawton
New Technologies Take the Network Home. [Citation Graph (0, 0)][DBLP] IEEE Computer, 1999, v:32, n:3, pp:11-14 [Journal]
- George Lawton
Storage Technology Takes Center Sstage. [Citation Graph (0, 0)][DBLP] IEEE Computer, 1999, v:32, n:11, pp:10-12 [Journal]
Stronger Domain Name System Thwarts Root-Server Attacks. [Citation Graph (, )][DBLP]
Working Today on Tomorrow's Storage Technology. [Citation Graph (, )][DBLP]
Web 2.0 Creates Security Challenges. [Citation Graph (, )][DBLP]
News Briefs. [Citation Graph (, )][DBLP]
Powering Down the Computing Infrastructure. [Citation Graph (, )][DBLP]
The Next Big Thing in Chipmaking. [Citation Graph (, )][DBLP]
These Are Not Your Father's Widgets. [Citation Graph (, )][DBLP]
Moving the OS to the Web. [Citation Graph (, )][DBLP]
US Cell Phone Industry Faces an Open Future. [Citation Graph (, )][DBLP]
Developing Software Online With Platform-as-a-Service Technology. [Citation Graph (, )][DBLP]
New Technology Prevents Data Leakage. [Citation Graph (, )][DBLP]
New Ways to Build Rich Internet Applications. [Citation Graph (, )][DBLP]
Is It Finally Time to Worry about Mobile Malware? [Citation Graph (, )][DBLP]
Wireless HD Video Heats Up. [Citation Graph (, )][DBLP]
WDM-PONs Hold Promise for the Long Haul. [Citation Graph (, )][DBLP]
Users Take a Close Look at Visual Analytics. [Citation Graph (, )][DBLP]
On the Trail of the Conficker Worm. [Citation Graph (, )][DBLP]
Routing Faces Dramatic Changes. [Citation Graph (, )][DBLP]
The Changing Face of Open Source. [Citation Graph (, )][DBLP]
Fighting Intrusions into Wireless Networks. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.007secs
|