default search action
George Lawton
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j71]Martin Andreoni
, Willian Tessaro Lunardi
, George Lawton
, Shreekant S. Thakkar:
Enhancing Autonomous System Security and Resilience With Generative AI: A Comprehensive Survey. IEEE Access 12: 109470-109493 (2024)
2010 – 2019
- 2013
- [j70]George Lawton:
In the News. IEEE Intell. Syst. 28(1): 6-11 (2013) - [j69]George Lawton:
In the News. IEEE Intell. Syst. 28(2): 6-11 (2013) - 2012
- [j68]George Lawton:
Cloud Streaming Brings Video to Mobile Devices. Computer 45(2): 14-16 (2012) - [j67]George Lawton:
In the News. IEEE Intell. Syst. 27(3): 4-9 (2012) - [j66]George Lawton:
In The News. IEEE Intell. Syst. 27(4): 4-9 (2012) - [j65]George Lawton:
In the News. IEEE Intell. Syst. 27(5): 5-9 (2012) - [j64]George Lawton:
In the News. IEEE Intell. Syst. 27(6): 3-7 (2012) - 2011
- [j63]George Lawton:
3D Displays without Glasses: Coming to a Screen near You. Computer 44(1): 17-19 (2011) - [j62]George Lawton:
4G: Engineering versus Marketing. Computer 44(3): 14-16 (2011) - [j61]George Lawton:
In the News. IEEE Intell. Syst. 26(3): 5-9 (2011) - 2010
- [j60]George Lawton:
Fighting Intrusions into Wireless Networks. Computer 43(5): 12-15 (2010) - [j59]George Lawton:
News Briefs. IEEE Secur. Priv. 8(5): 10-11 (2010) - [j58]George Lawton:
News Briefs. IEEE Secur. Priv. 8(6): 7-8 (2010)
2000 – 2009
- 2009
- [j57]George Lawton:
Users Take a Close Look at Visual Analytics. Computer 42(2): 19-22 (2009) - [j56]George Lawton:
WDM-PONs Hold Promise for the Long Haul. Computer 42(3): 13-16 (2009) - [j55]George Lawton:
The Changing Face of Open Source. Computer 42(5): 14-17 (2009) - [j54]George Lawton:
On the Trail of the Conficker Worm. Computer 42(6): 19-22 (2009) - [j53]George Lawton:
Routing Faces Dramatic Changes. Computer 42(9): 15-17 (2009) - 2008
- [j52]George Lawton:
These Are Not Your Father's Widgets. Computer 40(7): 10-13 (2008) - [j51]George Lawton:
US Cell Phone Industry Faces an Open Future. Computer 41(2): 15-18 (2008) - [j50]George Lawton:
Moving the OS to the Web. Computer 41(3): 16-19 (2008) - [j49]George Lawton:
Is It Finally Time to Worry about Mobile Malware? Computer 41(5): 12-14 (2008) - [j48]George Lawton:
Developing Software Online With Platform-as-a-Service Technology. Computer 41(6): 13-15 (2008) - [j47]George Lawton:
New Ways to Build Rich Internet Applications. Computer 41(8): 10-12 (2008) - [j46]George Lawton:
New Technology Prevents Data Leakage. Computer 41(9): 14-17 (2008) - [j45]George Lawton:
Wireless HD Video Heats Up. Computer 41(12): 18-20 (2008) - 2007
- [j44]George Lawton:
Powering Down the Computing Infrastructure. Computer 40(2): 16-19 (2007) - [j43]George Lawton:
The Next Big Thing in Chipmaking. Computer 40(4): 18-20 (2007) - [j42]George Lawton:
Stronger Domain Name System Thwarts Root-Server Attacks. Computer 40(5): 14-17 (2007) - [j41]Linda Dailey Paulson, George Lawton:
News Briefs. Computer 40(6): 15-18 (2007) - [j40]George Lawton:
Web 2.0 Creates Security Challenges. Computer 40(10): 13-16 (2007) - 2006
- [j39]George Lawton:
Improved Flash Memory Grows in Popularity. Computer 39(1): 16-18 (2006) - [j38]George Lawton:
Making Virtual Reality More Accessible. Computer 39(6): 12-15 (2006) - [j37]George Lawton:
Making Business Intelligence More Useful. Computer 39(9): 14-16 (2006) - [j36]George Lawton:
Working Today on Tomorrow's Storage Technology. Computer 39(12): 19-22 (2006) - 2005
- [j35]George Lawton:
Telecom Carriers Actively Pursue Passive Optical Networks. Computer 38(2): 19-21 (2005) - [j34]George Lawton:
What Lies Ahead for Cellular Technology? Computer 38(6): 14-17 (2005) - [j33]George Lawton:
LAMP Lights Enterprise Development Efforts. Computer 38(9): 18-20 (2005) - [j32]George Lawton:
E-Mail Authentication Is Here, but Has It Arrived Yet? Computer 38(11): 17-19 (2005) - 2004
- [j31]George Lawton:
Is Peer-to-Peer Secure Enough for Corporate Use? Computer 37(1): 22-25 (2004) - [j30]George Lawton:
Will Network Processor Units Live Up to Their Promise? Computer 37(4): 13-15 (2004) - [j29]George Lawton:
Is MIMO the Future of Wireless Communications? Computer 37(7): 20-22 (2004) - [j28]George Lawton:
Machine-to-Machine Technology Gears Up for Growth. Computer 37(9): 12-15 (2004) - [j27]George Lawton:
The Lowdown on High-Rise Chips. Computer 37(10): 24-27 (2004) - 2003
- [j26]George Lawton:
Instant Messaging Puts on a Business Suit. Computer 36(3): 14-16 (2003) - 2002
- [j25]George Lawton:
Open Source Security: Opportunity or Oxymoron? Computer 35(3): 18-21 (2002) - [j24]George Lawton:
Moving Java into Mobile Phones. Computer 35(6): 17-20 (2002) - [j23]George Lawton:
Invasive Software: Who's Inside Your Computer? Computer 35(7): 15-18 (2002) - [j22]George Lawton:
Virus Wars: Fewer Attacks, New Threats. Computer 35(12): 22-24 (2002) - 2001
- [j21]George Lawton:
Knowledge Management: Ready for Prime Time? Computer 34(2): 12-14 (2001) - [j20]George Lawton:
New Technologies Place Video in Your Hand. Computer 34(4): 14-17 (2001) - [j19]George Lawton:
New I/O Technologies Seek to End Bottlenecks. Computer 34(6): 16-18 (2001) - [j18]George Lawton:
Internet Appliances Struggle for Acceptance. Computer 34(7): 12-15 (2001) - [j17]George Lawton:
Is IPv6 Finally Gaining Ground? Computer 34(8): 11-15 (2001) - [j16]George Lawton:
Is Technology Meeting the Privacy Challenge?. Computer 34(9): 16-18 (2001) - [j15]George Lawton:
Browsing the Mobil Internet. Computer 34(12): 18-21 (2001) - 2000
- [j14]George Lawton:
Intellectual-Property Protection Opens Path for E-commerce. Computer 33(2): 14-17 (2000) - [j13]George Lawton:
Distributed Net Applications Create Virtual Supercomputers. Computer 33(6): 16-20 (2000) - [j12]George Lawton:
Video Streams into the Mainstream. Computer 33(7): 12-17 (2000) - [j11]George Lawton:
The Wild World of 3D Graphics Chips. Computer 33(9): 12-16 (2000)
1990 – 1999
- 1999
- [j10]George Lawton:
Vendors Battle over Mobile-OS Market. Computer 32(2): 13-15 (1999) - [j9]George Lawton:
New Technologies Take the Network Home. Computer 32(3): 11-14 (1999) - [j8]George Lawton:
Storage Technology Takes Center Sstage. Computer 32(11): 10-12 (1999) - 1998
- [j7]George Lawton:
Paving the Information Superhighway's Last Mile. Computer 31(4): 10-14 (1998) - [j6]George Lawton:
The Internet's Challenge to Privacy. Computer 31(6): 16-18 (1998) - [j5]George Lawton:
Multicasting: Will It Transform the Internet? Computer 31(7): 13-15 (1998) - [j4]George Lawton:
Biometrics: A New Era in Security. Computer 31(8): 16-18 (1998) - 1997
- [j3]George Lawton:
Extranets: Next Step for the Internet. Computer 30(5): 17 (1997) - [j2]George Lawton:
Dawn of the Internet Appliance. Computer 30(10): 16-18 (1997) - [j1]George Lawton:
In Search of Real-Time Internet Service. Computer 30(11): 14-16 (1997)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint