Personensuche
X
?
1
Critical Infrastructure Protection in Homeland Security: De..:
Lewis, Ted G
Lewis, Ted G. Critical infrastructure protection in homeland security: defending a networked nation, 2019.. , 2019
Lewis, Ted G. Critical infrastructure protection in homeland security: defending a networked nation, 2019.. , 2019
?
2
The Profession of IT Learning Machine Learning:
Lewis, Ted G ; Denning, Peter J
Lewis, Ted G., Peter J. Denning, "The Profession of IT Learning Machine Learning." Communications of the ACM 61.12 (2018): 24-27.. , 2018
Lewis, Ted G., Peter J. Denning, "The Profession of IT Learning Machine Learning." Communications of the ACM 61.12 (2018): 24-27.. , 2018
?
3
Bitcoins Maybe; Blockchains Likely:
Denning, Peter J ; Lewis, Ted G
Denning, Peter J., and Ted G. Lewis. "Bitcoins Maybe; Blockchains Likely." American Scientist 105, no. 6 (2017): 335-339.. , 2017
Denning, Peter J., and Ted G. Lewis. "Bitcoins Maybe; Blockchains Likely." American Scientist 105, no. 6 (2017): 335-339.. , 2017
?
4
Computers That Can Run Backwards:
Denning, Peter J ; Lewis, Ted G
Denning, Peter J., and Ted G. Lewis. "Computers That Can Run Backwards." American Scientist 105.5 (2017): 270.. , 2017
Denning, Peter J., and Ted G. Lewis. "Computers That Can Run Backwards." American Scientist 105.5 (2017): 270.. , 2017
?
5
Exponential Laws of Computing Growth:
Denning, Peter J ; Lewis, Ted G
Denning, Peter J., and Ted G. Lewis. "Exponential laws of computing growth." Communications of the ACM 60.1 (2016): 54-65.. , 2017
Denning, Peter J., and Ted G. Lewis. "Exponential laws of computing growth." Communications of the ACM 60.1 (2016): 54-65.. , 2017
?
10
Critical Infrastructure as Complex Emergent Systems:
Lewis, Ted G ; Center for Homeland Defense and Security ; Mechanical Engineering Department
https://hdl.handle.net/10945/45469. , 2011
https://hdl.handle.net/10945/45469. , 2011
?
15
Where is software headed? A virtual roundtable:
Lewis, Ted G ; Power, Dave ; Meyer, Bertrand...
Published in Computer (Volume: 28 , Issue: 8 ). , 1995
Published in Computer (Volume: 28 , Issue: 8 ). , 1995