default search action
I. S. Herschberg
Person information
- affiliation: University of Delft, The Netherlands
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
1990 – 1999
- 1997
- [j95]I. S. Herschberg:
A Brief History of the Future ICCA. J. Int. Comput. Games Assoc. 20(2): 134-138 (1997) - [c1]Edo Roos Lindgreen, H. R. D. Janus, A. Shahim, G. Hulst, I. S. Herschberg:
Security when outsourcing: concepts, constructs, compliance. SEC 1997: 308-318 - 1996
- [j94]Bob Herschberg, H. Jaap van den Herik:
Matchless. J. Int. Comput. Games Assoc. 19(1): 1-2 (1996) - [j93]Bob Herschberg, H. Jaap van den Herik:
Konrad Zuse: An Obituary. J. Int. Comput. Games Assoc. 19(1): 34-35 (1996) - [j92]Bob Herschberg, H. Jaap van den Herik:
Chess or Beyond? J. Int. Comput. Games Assoc. 19(2): 73-74 (1996) - [j91]Bob Herschberg, H. Jaap van den Herik:
Paradigms Fork: All Must Join. J. Int. Comput. Games Assoc. 19(3): 145-146 (1996) - 1995
- [j90]Bob Herschberg, H. Jaap van den Herik:
Ply the Random. J. Int. Comput. Games Assoc. 18(1): 1-2 (1995) - [j89]Bob Herschberg, H. Jaap van den Herik:
Mood Indigo. J. Int. Comput. Games Assoc. 18(2): 69-70 (1995) - [j88]H. Jaap van den Herik, I. S. Herschberg:
Mikhail Moiseivich Botvinnik: An Obituary. J. Int. Comput. Games Assoc. 18(2): 90-91 (1995) - [j87]Bob Herschberg, H. Jaap van den Herik:
Bright and Beautiful, Great and Small. J. Int. Comput. Games Assoc. 18(3): 133-134 (1995) - [j86]Bob Herschberg, H. Jaap van den Herik:
Aegonics. J. Int. Comput. Games Assoc. 18(3): 175-177 (1995) - [j85]Bob Herschberg, H. Jaap van den Herik:
Breakage and Seepage. J. Int. Comput. Games Assoc. 18(4): 189-190 (1995) - [j84]Bob Herschberg, H. Jaap van den Herik:
Dieter Steinwender and Frederic A. Friedel: Schach am PC. J. Int. Comput. Games Assoc. 18(4): 230 (1995) - [j83]Bob Herschberg, H. Jaap van den Herik:
Peter Schreiner and Carsten Bauermeister (eds.): Der Schachcomputerkatalog. J. Int. Comput. Games Assoc. 18(4): 231 (1995) - 1994
- [j82]Edo Roos Lindgreen, I. S. Herschberg:
On the validity of the Bell-La Padula model. Comput. Secur. 13(4): 317-333 (1994) - [j81]Bob Herschberg, H. Jaap van den Herik:
Time to Evaluate. J. Int. Comput. Games Assoc. 17(1): 1-2 (1994) - [j80]Hiroyuki Iida, Jos W. H. M. Uiterwijk, H. Jaap van den Herik, I. S. Herschberg:
Potential Applications of Opponent-Model Search. J. Int. Comput. Games Assoc. 17(1): 10-14 (1994) - [j79]Bob Herschberg, H. Jaap van den Herik:
Twinkle Chess. J. Int. Comput. Games Assoc. 17(2): 49-50 (1994) - [j78]I. S. Herschberg, H. Jaap van den Herik:
Reviews. J. Int. Comput. Games Assoc. 17(2): 81-82 (1994) - [j77]Bob Herschberg, H. Jaap van den Herik:
A Fine for Speeding. J. Int. Comput. Games Assoc. 17(3): 113-114 (1994) - [j76]Bob Herschberg, H. Jaap van den Herik:
The Five Powers. J. Int. Comput. Games Assoc. 17(4): 181-182 (1994) - [j75]H. Jaap van den Herik, I. S. Herschberg:
In tuition - hi-fi and high fee? J. Int. Comput. Games Assoc. 17(4): 246-247 (1994) - 1993
- [j74]Bob Herschberg, H. Jaap van den Herik:
Back to Fifty. J. Int. Comput. Games Assoc. 16(1): 1-2 (1993) - [j73]Bob Herschberg, H. Jaap van den Herik:
The Village Voice. J. Int. Comput. Games Assoc. 16(2): 69-70 (1993) - [j72]H. Jaap van den Herik, I. S. Herschberg:
Secrets of Rook Endings. J. Int. Comput. Games Assoc. 16(2): 94-95 (1993) - [j71]Bob Herschberg, H. Jaap van den Herik:
A Muse A-Musing. J. Int. Comput. Games Assoc. 16(3): 121-122 (1993) - [j70]Bob Herschberg, H. Jaap van den Herik:
Treacherous Terabytes. J. Int. Comput. Games Assoc. 16(4): 189-190 (1993) - [j69]Hiroyuki Iida, Jos W. H. M. Uiterwijk, H. Jaap van den Herik, I. S. Herschberg:
Potential Applications of Opponent-Model Search. J. Int. Comput. Games Assoc. 16(4): 201-208 (1993) - 1992
- [j68]Bob Herschberg, H. Jaap van den Herik:
A Second Helping. J. Int. Comput. Games Assoc. 15(1): 1-2 (1992) - [j67]Dennis M. Breuker, L. Victor Allis, H. Jaap van den Herik, I. S. Herschberg:
A Database as a Second. J. Int. Comput. Games Assoc. 15(1): 28-39 (1992) - [j66]Bob Herschberg, H. Jaap van den Herik:
Every Bit a Champion. J. Int. Comput. Games Assoc. 15(2): 54 (1992) - [j65]Bob Herschberg, H. Jaap van den Herik:
Equal at Last. J. Int. Comput. Games Assoc. 15(3): 109-110 (1992) - [j64]Bob Herschberg, H. Jaap van den Herik:
A Winner Takes Thought. J. Int. Comput. Games Assoc. 15(4): 177-178 (1992) - [j63]H. Jaap van den Herik, Bob Herschberg:
The 7th World Computer-Chess Championship Report on the Tournament. J. Int. Comput. Games Assoc. 15(4): 208-209 (1992) - 1991
- [j62]Bob Herschberg, H. Jaap van den Herik:
Doubting Castle. J. Int. Comput. Games Assoc. 14(1): 1-2 (1991) - [j61]Bob Herschberg, H. Jaap van den Herik:
Arrayed for Battle? J. Int. Comput. Games Assoc. 14(2): 45-46 (1991) - [j60]Bob Herschberg, H. Jaap van den Herik:
To the Test Bed, with Love. J. Int. Comput. Games Assoc. 14(3): 113-114 (1991) - [j59]Bob Herschberg, H. Jaap van den Herik:
Chess is in the Eye of the Beholder. J. Int. Comput. Games Assoc. 14(4): 181-182 (1991) - 1990
- [j58]Simon T. Dekker, H. Jaap van den Herik, I. S. Herschberg:
Perfect Knowledge Revisited. Artif. Intell. 43(1): 111-123 (1990) - [j57]I. S. Herschberg, Ronald Paans:
Friday the 13th, facts and fancies. Comput. Secur. 9(2): 125-130 (1990) - [j56]Ronald Paans, I. S. Herschberg:
Auditing the change management process. Comput. Secur. 9(2): 161-174 (1990) - [j55]I. S. Herschberg, Ronald Paans:
Sloppy, sloppier, sloppiest. Comput. Secur. 9(3): 223-228 (1990) - [j54]Bob Herschberg, H. Jaap van den Herik:
Dizzy Now - and Still Spinning Up. J. Int. Comput. Games Assoc. 13(1): 1-2 (1990) - [j53]Bob Herschberg, H. Jaap van den Herik:
Our Hostile Friend. J. Int. Comput. Games Assoc. 13(3): 121-122 (1990) - [j52]Bob Herschberg, H. Jaap van den Herik:
Force Comes to Mind. J. Int. Comput. Games Assoc. 13(4): 173-174 (1990) - [j51]M. V. Donskoy, H. Jaap van den Herik, I. S. Herschberg:
Finessing in Games. J. Int. Comput. Games Assoc. 13(4): 203-204 (1990)
1980 – 1989
- 1989
- [j50]Bob Herschberg, H. Jaap van den Herik:
Rank Discrimination. J. Int. Comput. Games Assoc. 12(1): 1-2 (1989) - [j49]Bob Herschberg, H. Jaap van den Herik:
Edmontonia, Mostly. J. Int. Comput. Games Assoc. 12(2): 53-54 (1989) - [j48]Bob Herschberg, H. Jaap van den Herik:
Broad Brush or Fine Nib? J. Int. Comput. Games Assoc. 12(3): 125-126 (1989) - [j47]Bob Herschberg, H. Jaap van den Herik:
Playing for Matches? J. Int. Comput. Games Assoc. 12(3): 126 (1989) - [j46]I. S. Herschberg, H. Jaap van den Herik, P. N. A. Schoo:
Verifying and Codifying Strategies in the KNNKP(h) Endgame. J. Int. Comput. Games Assoc. 12(3): 144-154 (1989) - [j45]Bob Herschberg, H. Jaap van den Herik:
The Sixty-Four-Square Hegel. J. Int. Comput. Games Assoc. 12(4): 198 (1989) - [j44]I. S. Herschberg, H. Jaap van den Herik:
Thank You, Dr. Shannon. J. Int. Comput. Games Assoc. 12(4): 227-229 (1989) - 1988
- [j43]I. S. Herschberg:
Make the tigers hunt for you. Comput. Secur. 7(2): 197-203 (1988) - [j42]Bob Herschberg, H. Jaap van den Herik:
Pitting Bits against Brains. J. Int. Comput. Games Assoc. 11(1): 1-2 (1988) - [j41]H. Jaap van den Herik, I. S. Herschberg:
Computer Checks on Human Analyses of the KRKB Endgame. J. Int. Comput. Games Assoc. 11(1): 26-31 (1988) - [j40]H. Jaap van den Herik, I. S. Herschberg, N. Nakad:
Karpov Amends Timman's Analysis. J. Int. Comput. Games Assoc. 11(1): 32-33 (1988) - [j39]Bob Herschberg, H. Jaap van den Herik:
Fighting the Good FIDE. J. Int. Comput. Games Assoc. 11(2-3): 54 (1988) - [j38]H. Jaap van den Herik, I. S. Herschberg, N. Nakad:
A Reply to R. Sattler's Remarks on the KRP(a2)KbBP(a3) Database. J. Int. Comput. Games Assoc. 11(2-3): 88-91 (1988) - [j37]Bob Herschberg, H. Jaap van den Herik:
By Any Other Name. J. Int. Comput. Games Assoc. 11(4): 133-134 (1988) - 1987
- [j36]I. S. Herschberg:
The hackers' comfort. Comput. Secur. 6(2): 133-138 (1987) - [j35]Ronald Paans, I. S. Herschberg:
Computer security: The long road ahead. Comput. Secur. 6(5): 403-416 (1987) - [j34]Bob Herschberg, H. Jaap van den Herik:
Count Your Blessings. J. Int. Comput. Games Assoc. 10(1): 1-2 (1987) - [j33]H. Jaap van den Herik, I. S. Herschberg:
The KBBKN Statistics: New Data from Ken Thompson. J. Int. Comput. Games Assoc. 10(1): 39-40 (1987) - [j32]Bob Herschberg, H. Jaap van den Herik:
By Crawls and Creeps. J. Int. Comput. Games Assoc. 10(2): 57-58 (1987) - [j31]I. S. Herschberg, H. Jaap van den Herik:
More Truth on KBBK Database Results. J. Int. Comput. Games Assoc. 10(2): 91-93 (1987) - [j30]Bob Herschberg, H. Jaap van den Herik:
A Watershed? J. Int. Comput. Games Assoc. 10(3): 109-110 (1987) - [j29]Simon T. Dekker, H. Jaap van den Herik, I. S. Herschberg:
Complexity Starts at Five. J. Int. Comput. Games Assoc. 10(3): 125-138 (1987) - [j28]Hans Zellner, H. Jaap van den Herik, I. S. Herschberg:
Corrections and Substantiations to KBNK. J. Int. Comput. Games Assoc. 10(3): 139 (1987) - [j27]I. S. Herschberg, H. Jaap van den Herik:
Brain and Brawn. J. Int. Comput. Games Assoc. 10(4): 161-162 (1987) - [j26]H. Jaap van den Herik, I. S. Herschberg, N. Nakad:
A Six-Men-Endgame Database: KRP(a2)KbBP(a3). J. Int. Comput. Games Assoc. 10(4): 163-180 (1987) - 1986
- [j25]Ronald Paans, I. S. Herschberg:
How to control MVS user supervisor calls. Comput. Secur. 5(1): 46-54 (1986) - [j24]I. S. Herschberg, H. Jaap van den Herik:
Three Generations Meeting. J. Int. Comput. Games Assoc. 9(1): 1-2 (1986) - [j23]H. Jaap van den Herik, I. S. Herschberg:
A Data Base on Data Bases. J. Int. Comput. Games Assoc. 9(1): 29-34 (1986) - [j22]I. S. Herschberg, H. Jaap van den Herik:
Thompson's New Data-Base Results. J. Int. Comput. Games Assoc. 9(1): 45-49 (1986) - [j21]Bob Herschberg, H. Jaap van den Herik:
By the Waters of Cologne. J. Int. Comput. Games Assoc. 9(2): 65-66 (1986) - [j20]Bob Herschberg, H. Jaap van den Herik:
Elusive Truths. J. Int. Comput. Games Assoc. 9(3): 129-130 (1986) - [j19]I. S. Herschberg:
Reviews. J. Int. Comput. Games Assoc. 9(3): 155 (1986) - [j18]Bob Herschberg, H. Jaap van den Herik:
Times Past and Times Future. J. Int. Comput. Games Assoc. 9(4): 173-174 (1986) - [j17]H. Jaap van den Herik, I. S. Herschberg:
A Note on KBBK. J. Int. Comput. Games Assoc. 9(4): 199 (1986) - 1985
- [j16]Bob Herschberg, H. Jaap van den Herik:
Hope Progressing? J. Int. Comput. Games Assoc. 8(1): 1-2 (1985) - [j15]Bob Herschberg, H. Jaap van den Herik:
Calling All Mates. J. Int. Comput. Games Assoc. 8(2): 45-46 (1985) - [j14]H. Jaap van den Herik, I. S. Herschberg:
The Construction of an Omniscient Endgame Data Base. J. Int. Comput. Games Assoc. 8(2): 66-87 (1985) - [j13]I. S. Herschberg, H. Jaap van den Herik:
Botvinnik in Delft. J. Int. Comput. Games Assoc. 8(2): 105-106 (1985) - [j12]Bob Herschberg, H. Jaap van den Herik:
The Jungle and the Polder. J. Int. Comput. Games Assoc. 8(3): 125-126 (1985) - [j11]H. Jaap van den Herik, I. S. Herschberg:
Elementary Theory Improved, A Conjecture Refuted. J. Int. Comput. Games Assoc. 8(3): 141-149 (1985) - [j10]Bob Herschberg, H. Jaap van den Herik:
The Beckoning Horizon. J. Int. Comput. Games Assoc. 8(4): 205-206 (1985) - [j9]I. S. Herschberg, H. Jaap van den Herik:
A Gauge of Endgames. J. Int. Comput. Games Assoc. 8(4): 225-229 (1985) - 1984
- [j8]I. S. Herschberg, Ronald Paans:
The programmer's threat: Cases and causes. Comput. Secur. 3(4): 263-272 (1984) - [j7]Ronald Paans, I. S. Herschberg:
A topology for secure MVS systems. Comput. Secur. 3(4): 278-285 (1984) - [j6]Bob Herschberg, H. Jaap van den Herik:
Hither and Thither Moves, and Mates, and Slays ... J. Int. Comput. Games Assoc. 7(2): 61-62 (1984) - [j5]Kersti Börjars, Bob Herschberg:
A Wager for Paradise. J. Int. Comput. Games Assoc. 7(3): 131-132 (1984) - [j4]Bob Herschberg, H. Jaap van den Herik:
Going on while going up? J. Int. Comput. Games Assoc. 7(4): 179-180 (1984) - 1983
- [j3]Bob Herschberg, H. Jaap van den Herik:
Modern Times. J. Int. Comput. Games Assoc. 6(4): 1-3 (1983) - 1982
- [j2]H. Jaap van den Herik, I. S. Herschberg:
Christiaan Huygens Computer Chess Day. J. Int. Comput. Games Assoc. 5(1): 30-33 (1982)
1970 – 1979
- 1977
- [j1]I. S. Herschberg, J. C. A. Boekhorst:
Concurrent File Access Under Unpredictability. Inf. Process. Lett. 6(6): 203-208 (1977)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint