I. S. Herschberg

Affiliations:
  • University of Delft, The Netherlands


According to our database1, I. S. Herschberg authored at least 95 papers between 1977 and 1997.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

1997
A Brief History of the Future ICCA.
J. Int. Comput. Games Assoc., 1997

Security when outsourcing: concepts, constructs, compliance.
Proceedings of the Information Security in Research and Business, 1997

1996
Paradigms Fork: All Must Join.
J. Int. Comput. Games Assoc., 1996

Chess or Beyond?
J. Int. Comput. Games Assoc., 1996

Konrad Zuse: An Obituary.
J. Int. Comput. Games Assoc., 1996

Matchless.
J. Int. Comput. Games Assoc., 1996

1995
Peter Schreiner and Carsten Bauermeister (eds.): Der Schachcomputerkatalog.
J. Int. Comput. Games Assoc., 1995

Dieter Steinwender and Frederic A. Friedel: Schach am PC.
J. Int. Comput. Games Assoc., 1995

Breakage and Seepage.
J. Int. Comput. Games Assoc., 1995

Aegonics.
J. Int. Comput. Games Assoc., 1995

Bright and Beautiful, Great and Small.
J. Int. Comput. Games Assoc., 1995

Mood Indigo.
J. Int. Comput. Games Assoc., 1995

Ply the Random.
J. Int. Comput. Games Assoc., 1995

Mikhail Moiseivich Botvinnik: An Obituary.
J. Int. Comput. Games Assoc., 1995

1994
Potential Applications of Opponent-Model Search.
J. Int. Comput. Games Assoc., 1994

The Five Powers.
J. Int. Comput. Games Assoc., 1994

A Fine for Speeding.
J. Int. Comput. Games Assoc., 1994

Reviews.
J. Int. Comput. Games Assoc., 1994

Twinkle Chess.
J. Int. Comput. Games Assoc., 1994

Time to Evaluate.
J. Int. Comput. Games Assoc., 1994

In tuition - hi-fi and high fee?
J. Int. Comput. Games Assoc., 1994

On the validity of the Bell-La Padula model.
Comput. Secur., 1994

1993
Treacherous Terabytes.
J. Int. Comput. Games Assoc., 1993

A Muse A-Musing.
J. Int. Comput. Games Assoc., 1993

The Village Voice.
J. Int. Comput. Games Assoc., 1993

Back to Fifty.
J. Int. Comput. Games Assoc., 1993

Secrets of Rook Endings.
J. Int. Comput. Games Assoc., 1993

1992
A Winner Takes Thought.
J. Int. Comput. Games Assoc., 1992

Equal at Last.
J. Int. Comput. Games Assoc., 1992

Every Bit a Champion.
J. Int. Comput. Games Assoc., 1992

A Second Helping.
J. Int. Comput. Games Assoc., 1992

The 7th World Computer-Chess Championship Report on the Tournament.
J. Int. Comput. Games Assoc., 1992

A Database as a Second.
J. Int. Comput. Games Assoc., 1992

1991
Chess is in the Eye of the Beholder.
J. Int. Comput. Games Assoc., 1991

To the Test Bed, with Love.
J. Int. Comput. Games Assoc., 1991

Arrayed for Battle?
J. Int. Comput. Games Assoc., 1991

Doubting Castle.
J. Int. Comput. Games Assoc., 1991

1990
Force Comes to Mind.
J. Int. Comput. Games Assoc., 1990

Our Hostile Friend.
J. Int. Comput. Games Assoc., 1990

Dizzy Now - and Still Spinning Up.
J. Int. Comput. Games Assoc., 1990

Finessing in Games.
J. Int. Comput. Games Assoc., 1990

Auditing the change management process.
Comput. Secur., 1990

Sloppy, sloppier, sloppiest.
Comput. Secur., 1990

Friday the 13th, facts and fancies.
Comput. Secur., 1990

Perfect Knowledge Revisited
Artif. Intell., 1990

1989
Verifying and Codifying Strategies in the KNNKP(h) Endgame.
J. Int. Comput. Games Assoc., 1989

Thank You, Dr. Shannon.
J. Int. Comput. Games Assoc., 1989

The Sixty-Four-Square Hegel.
J. Int. Comput. Games Assoc., 1989

Playing for Matches?
J. Int. Comput. Games Assoc., 1989

Broad Brush or Fine Nib?
J. Int. Comput. Games Assoc., 1989

Edmontonia, Mostly.
J. Int. Comput. Games Assoc., 1989

Rank Discrimination.
J. Int. Comput. Games Assoc., 1989

1988
By Any Other Name.
J. Int. Comput. Games Assoc., 1988

Fighting the Good FIDE.
J. Int. Comput. Games Assoc., 1988

Pitting Bits against Brains.
J. Int. Comput. Games Assoc., 1988

A Reply to R. Sattler's Remarks on the KRP(a2)KbBP(a3) Database.
J. Int. Comput. Games Assoc., 1988

Karpov Amends Timman's Analysis.
J. Int. Comput. Games Assoc., 1988

Computer Checks on Human Analyses of the KRKB Endgame.
J. Int. Comput. Games Assoc., 1988

Make the tigers hunt for you.
Comput. Secur., 1988

1987
Corrections and Substantiations to KBNK.
J. Int. Comput. Games Assoc., 1987

Brain and Brawn.
J. Int. Comput. Games Assoc., 1987

A Watershed?
J. Int. Comput. Games Assoc., 1987

More Truth on KBBK Database Results.
J. Int. Comput. Games Assoc., 1987

By Crawls and Creeps.
J. Int. Comput. Games Assoc., 1987

Count Your Blessings.
J. Int. Comput. Games Assoc., 1987

A Six-Men-Endgame Database: KRP(a2)KbBP(a3).
J. Int. Comput. Games Assoc., 1987

The KBBKN Statistics: New Data from Ken Thompson.
J. Int. Comput. Games Assoc., 1987

Complexity Starts at Five.
J. Int. Comput. Games Assoc., 1987

Computer security: The long road ahead.
Comput. Secur., 1987

The hackers' comfort.
Comput. Secur., 1987

1986
Times Past and Times Future.
J. Int. Comput. Games Assoc., 1986

Elusive Truths.
J. Int. Comput. Games Assoc., 1986

By the Waters of Cologne.
J. Int. Comput. Games Assoc., 1986

Thompson's New Data-Base Results.
J. Int. Comput. Games Assoc., 1986

Three Generations Meeting.
J. Int. Comput. Games Assoc., 1986

Reviews.
J. Int. Comput. Games Assoc., 1986

A Note on KBBK.
J. Int. Comput. Games Assoc., 1986

A Data Base on Data Bases.
J. Int. Comput. Games Assoc., 1986

How to control MVS user supervisor calls.
Comput. Secur., 1986

1985
A Gauge of Endgames.
J. Int. Comput. Games Assoc., 1985

The Beckoning Horizon.
J. Int. Comput. Games Assoc., 1985

The Jungle and the Polder.
J. Int. Comput. Games Assoc., 1985

Botvinnik in Delft.
J. Int. Comput. Games Assoc., 1985

Calling All Mates.
J. Int. Comput. Games Assoc., 1985

Hope Progressing?
J. Int. Comput. Games Assoc., 1985

Elementary Theory Improved, A Conjecture Refuted.
J. Int. Comput. Games Assoc., 1985

The Construction of an Omniscient Endgame Data Base.
J. Int. Comput. Games Assoc., 1985

1984
Going on while going up?
J. Int. Comput. Games Assoc., 1984

Hither and Thither Moves, and Mates, and Slays ...
J. Int. Comput. Games Assoc., 1984

A Wager for Paradise.
J. Int. Comput. Games Assoc., 1984

A topology for secure MVS systems.
Comput. Secur., 1984

The programmer's threat: Cases and causes.
Comput. Secur., 1984

1983
Modern Times.
J. Int. Comput. Games Assoc., 1983

1982
Christiaan Huygens Computer Chess Day.
J. Int. Comput. Games Assoc., 1982

1977
Concurrent File Access Under Unpredictability.
Inf. Process. Lett., 1977


  Loading...