Lewis, Ted G.
267  Ergebnisse:
Personensuche X
?
1

Critical Infrastructure Protection in Homeland Security: De..:

Lewis, Ted G
Lewis, Ted G. Critical infrastructure protection in homeland security: defending a networked nation, 2019..  , 2019
 
?
2

The Profession of IT Learning Machine Learning:

Lewis, Ted G ; Denning, Peter J
Lewis, Ted G., Peter J. Denning, "The Profession of IT Learning Machine Learning." Communications of the ACM 61.12 (2018): 24-27..  , 2018
 
?
3

Bitcoins Maybe; Blockchains Likely:

Denning, Peter J ; Lewis, Ted G
Denning, Peter J., and Ted G. Lewis. "Bitcoins Maybe; Blockchains Likely." American Scientist 105, no. 6 (2017): 335-339..  , 2017
 
?
4

Computers That Can Run Backwards:

Denning, Peter J ; Lewis, Ted G
Denning, Peter J., and Ted G. Lewis. "Computers That Can Run Backwards." American Scientist 105.5 (2017): 270..  , 2017
 
?
5

Exponential Laws of Computing Growth:

Denning, Peter J ; Lewis, Ted G
Denning, Peter J., and Ted G. Lewis. "Exponential laws of computing growth." Communications of the ACM 60.1 (2016): 54-65..  , 2017
 
?
 
?
8

How to Quantify Deterrence and Reduce Critical Infrastructu..:

Taquechel, Eric F ; Lewis, Ted G
Homeland Security Affairs (August 2012), v.8, article 12.  , 2012
 
?
11

Guest Editoral: Network Science:

Lewis, Ted G ; Pickl, Stefan ; Peek, Ben.
https://hdl.handle.net/10945/41231.  , 2010
 
?
12

Cause-and-Effect or Fooled by Randomness?:

Lewis, Ted G
Homeland Security Affairs (January 2010), v.6 no.1.  , 2010
 
?
13

Network Science: Theory and Practice:

Lewis, Ted G
https://hdl.handle.net/10945/40363.  , 2009
 
?
14

Potholes and detours in the road to critical infrastructure..:

Lewis, Ted G ; Darken, Rudy
Homeland Security Affairs, v.1, no.2, 2005, article no. 1.  , 2005
 
?
15

Where is software headed? A virtual roundtable:

Lewis, Ted G ; Power, Dave ; Meyer, Bertrand...
Published in Computer (Volume: 28 , Issue: 8 ).  , 1995
 
1-15