default search action
David Geer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j43]David Geer:
Using Psychology to Bolster Cybersecurity. Commun. ACM 66(10): 15-17 (2023)
2010 – 2019
- 2010
- [j42]David Geer:
Is It Really Time for Real-Time Search?. Computer 43(3): 16-19 (2010) - [j41]David Geer:
Are Companies Actually Using Secure Development Life Cycles?. Computer 43(6): 12-16 (2010) - [j40]David Geer:
Whatever Happened to Network-Access-Control Technology? Computer 43(9): 13-16 (2010)
2000 – 2009
- 2009
- [j39]David Geer:
Networks on Processors Improve On-Chip Communications. Computer 42(3): 17-20 (2009) - [j38]David Geer:
The Future of Mobile VoIP in the Enterprise. Computer 42(6): 15-18 (2009) - [j37]David Geer:
The OS Faces a Brave New World. Computer 42(10): 15-17 (2009) - 2008
- [j36]David Geer:
Technology News. Computer 41(10): 16-19 (2008) - [j35]David Geer:
Reducing the Storage Burden via Data Deduplication. Computer 41(12): 15-17 (2008) - 2007
- [j34]David Geer:
For Programmers, Multicore Chips Mean Multiple Challenges. Computer 40(9): 17-19 (2007) - [j33]David Geer:
Improving Data Accessibility with File Area Networks. Computer 40(11): 14-17 (2007) - 2006
- [j32]David Geer:
Security of Critical Control Systems Sparks Concern. Computer 39(1): 20-23 (2006) - [j31]David Geer:
Will Software Developers Ride Ruby on Rails to Success? Computer 39(2): 18-20 (2006) - [j30]David Geer:
Behavior-Based Network Security Goes Mainstream. Computer 39(3): 14-17 (2006) - [j29]David Geer:
Hackers Get to the Root of the Problem. Computer 39(5): 17-19 (2006) - [j28]David Geer:
Silicon Optics Aims to Combine the Best of Both Worlds. Computer 39(6): 16-19 (2006) - [j27]David Geer:
UWB Standardization Effort Ends in Controversy. Computer 39(7): 13-16 (2006) - [j26]David Geer:
Vendors Upgrade Their Physics Processing to Improve Gaming. Computer 39(8): 22-24 (2006) - [j25]David Geer:
In Brief: Grid-Based Modeling Technique Furthers Earthquake Risk Prediction. IEEE Distributed Syst. Online 7(2) (2006) - [j24]David Geer:
Nanotechnology: The Growing Impact of Shrinking Computers. IEEE Pervasive Comput. 5(1): 7-11 (2006) - [j23]David Geer:
Pervasive Medical Devices: Less Invasive, More Productive. IEEE Pervasive Comput. 5(2): 85-88 (2006) - [j22]David Geer:
Software Developer Profession Expanding. IEEE Softw. 23(2): 112-115 (2006) - 2005
- [j21]David Geer:
Malicious Bots Threaten Network Security. Computer 38(1): 18-20 (2005) - [j20]David Geer:
Developments Advance Web Conferencing. Computer 38(2): 14-17 (2005) - [j19]David Geer:
Is It Time for Clockless Chips? Computer 38(3): 18-21 (2005) - [j18]David Geer:
Will Binary XML Speed Network Traffic? Computer 38(4): 16-18 (2005) - [j17]David Geer:
Industry Trends: Chip Makers Turn to Multicore Processors. Computer 38(5): 11-13 (2005) - [j16]David Geer:
Security Technologies Go Phishing. Computer 38(6): 18-21 (2005) - [j15]David Geer:
Eclipse Becomes the Dominant Java IDE. Computer 38(7): 16-18 (2005) - [j14]David Geer:
Making 3D Technology Universal. Computer 38(8): 23-25 (2005) - [j13]David Geer:
Taking the Graphics Processor beyond Graphics. Computer 38(9): 14-16 (2005) - [j12]David Geer:
Statistical Machine Translation Gains Respect. Computer 38(10): 18-21 (2005) - [j11]David Geer:
Building Converged Networks with IMS Technology. Computer 38(11): 14-16 (2005) - [j10]David Geer:
Users Make a Beeline for ZigBee Technology. Computer 38(12): 16-19 (2005) - [j9]David Geer:
In Brief: IPv6 and Distributed Applications. IEEE Distributed Syst. Online 6(12) (2005) - 2004
- [j8]David Geer:
Will New Standards Help Curb Spam? Computer 37(2): 14-16 (2004) - [j7]David Geer:
Just How Secure Are Security Products? Computer 37(6): 14-16 (2004) - [j6]David Geer:
E-Micropayments Sweat the Small Stuff. Computer 37(8): 19-22 (2004) - [j5]David Geer:
Will Gesture-Recognition Technology Point the Way? Computer 37(10): 20-23 (2004) - [j4]David Geer:
Digital Rights Technology Sparks Interoperability Concerns. Computer 37(12): 20-22 (2004) - [j3]David Geer:
Survey: Embedded Linux Ahead of the Pack. IEEE Distributed Syst. Online 5(10) (2004) - 2003
- [j2]David Geer:
Federated Approach Expands Database-Access Technology. Computer 36(5): 18-20 (2003) - [j1]David Geer:
Taking Steps to Secure Web Services. Computer 36(10): 14-16 (2003)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint