I. S. Herschberg

Affiliations:
  • University of Delft, The Netherlands


According to our database1, I. S. Herschberg authored at least 95 papers between 1977 and 1997.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

1997
A Brief History of the Future ICCA.
ICCA J., 1997

Security when outsourcing: concepts, constructs, compliance.
Proceedings of the Information Security in Research and Business, 1997

1996
Paradigms Fork: All Must Join.
ICCA J., 1996

Chess or Beyond?
ICCA J., 1996

Konrad Zuse: An Obituary.
ICCA J., 1996

Matchless.
ICCA J., 1996

1995
Peter Schreiner and Carsten Bauermeister (eds.): Der Schachcomputerkatalog.
ICCA J., 1995

Dieter Steinwender and Frederic A. Friedel: Schach am PC.
ICCA J., 1995

Breakage and Seepage.
ICCA J., 1995

Aegonics.
ICCA J., 1995

Bright and Beautiful, Great and Small.
ICCA J., 1995

Mood Indigo.
ICCA J., 1995

Ply the Random.
ICCA J., 1995

Mikhail Moiseivich Botvinnik: An Obituary.
ICCA J., 1995

1994
Potential Applications of Opponent-Model Search.
ICCA J., 1994

The Five Powers.
ICCA J., 1994

A Fine for Speeding.
ICCA J., 1994

Reviews.
ICCA J., 1994

Twinkle Chess.
ICCA J., 1994

Time to Evaluate.
ICCA J., 1994

In tuition - hi-fi and high fee?
ICCA J., 1994

On the validity of the Bell-La Padula model.
Comput. Secur., 1994

1993
Treacherous Terabytes.
ICCA J., 1993

A Muse A-Musing.
ICCA J., 1993

The Village Voice.
ICCA J., 1993

Back to Fifty.
ICCA J., 1993

Secrets of Rook Endings.
ICCA J., 1993

1992
A Winner Takes Thought.
ICCA J., 1992

Equal at Last.
ICCA J., 1992

Every Bit a Champion.
ICCA J., 1992

A Second Helping.
ICCA J., 1992

The 7th World Computer-Chess Championship Report on the Tournament.
ICCA J., 1992

A Database as a Second.
ICCA J., 1992

1991
Chess is in the Eye of the Beholder.
ICCA J., 1991

To the Test Bed, with Love.
ICCA J., 1991

Arrayed for Battle?
ICCA J., 1991

Doubting Castle.
ICCA J., 1991

1990
Force Comes to Mind.
ICCA J., 1990

Our Hostile Friend.
ICCA J., 1990

Dizzy Now - and Still Spinning Up.
ICCA J., 1990

Finessing in Games.
ICCA J., 1990

Auditing the change management process.
Comput. Secur., 1990

Sloppy, sloppier, sloppiest.
Comput. Secur., 1990

Friday the 13th, facts and fancies.
Comput. Secur., 1990

Perfect Knowledge Revisited
Artif. Intell., 1990

1989
Verifying and Codifying Strategies in the KNNKP(h) Endgame.
ICCA J., 1989

Thank You, Dr. Shannon.
ICCA J., 1989

The Sixty-Four-Square Hegel.
ICCA J., 1989

Playing for Matches?
ICCA J., 1989

Broad Brush or Fine Nib?
ICCA J., 1989

Edmontonia, Mostly.
ICCA J., 1989

Rank Discrimination.
ICCA J., 1989

1988
By Any Other Name.
ICCA J., 1988

Fighting the Good FIDE.
ICCA J., 1988

Pitting Bits against Brains.
ICCA J., 1988

A Reply to R. Sattler's Remarks on the KRP(a2)KbBP(a3) Database.
ICCA J., 1988

Karpov Amends Timman's Analysis.
ICCA J., 1988

Computer Checks on Human Analyses of the KRKB Endgame.
ICCA J., 1988

Make the tigers hunt for you.
Comput. Secur., 1988

1987
Corrections and Substantiations to KBNK.
ICCA J., 1987

Brain and Brawn.
ICCA J., 1987

A Watershed?
ICCA J., 1987

More Truth on KBBK Database Results.
ICCA J., 1987

By Crawls and Creeps.
ICCA J., 1987

Count Your Blessings.
ICCA J., 1987

A Six-Men-Endgame Database: KRP(a2)KbBP(a3).
ICCA J., 1987

The KBBKN Statistics: New Data from Ken Thompson.
ICCA J., 1987

Complexity Starts at Five.
ICCA J., 1987

Computer security: The long road ahead.
Comput. Secur., 1987

The hackers' comfort.
Comput. Secur., 1987

1986
Times Past and Times Future.
ICCA J., 1986

Elusive Truths.
ICCA J., 1986

By the Waters of Cologne.
ICCA J., 1986

Thompson's New Data-Base Results.
ICCA J., 1986

Three Generations Meeting.
ICCA J., 1986

Reviews.
ICCA J., 1986

A Note on KBBK.
ICCA J., 1986

A Data Base on Data Bases.
ICCA J., 1986

How to control MVS user supervisor calls.
Comput. Secur., 1986

1985
A Gauge of Endgames.
ICCA J., 1985

The Beckoning Horizon.
ICCA J., 1985

The Jungle and the Polder.
ICCA J., 1985

Botvinnik in Delft.
ICCA J., 1985

Calling All Mates.
ICCA J., 1985

Hope Progressing?
ICCA J., 1985

Elementary Theory Improved, A Conjecture Refuted.
ICCA J., 1985

The Construction of an Omniscient Endgame Data Base.
ICCA J., 1985

1984
Going on while going up?
ICCA J., 1984

Hither and Thither Moves, and Mates, and Slays ...
ICCA J., 1984

A Wager for Paradise.
ICCA J., 1984

A topology for secure MVS systems.
Comput. Secur., 1984

The programmer's threat: Cases and causes.
Comput. Secur., 1984

1983
Modern Times.
ICCA J., 1983

1982
Christiaan Huygens Computer Chess Day.
ICCA J., 1982

1977
Concurrent File Access Under Unpredictability.
Inf. Process. Lett., 1977


  Loading...