The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hal Berghel: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hal Berghel
    Cyberspace 2000: Dealing with Information Overload. [Citation Graph (2, 0)][DBLP]
    Commun. ACM, 1997, v:40, n:2, pp:19-24 [Journal]
  2. Hal Berghel
    The Client's Side of the World-Wide Web. [Citation Graph (1, 0)][DBLP]
    Commun. ACM, 1996, v:39, n:1, pp:30-40 [Journal]
  3. Hal Berghel
    A decade of applied computing. [Citation Graph (0, 0)][DBLP]
    SAC, 2001, pp:1-5 [Conf]
  4. Hal Berghel
    CYBER-SURFING: the state-of-the-art in client server browsing and navigation. [Citation Graph (0, 0)][DBLP]
    SAC, 1995, pp:1-4 [Conf]
  5. Gordon Beavers, Hal Berghel
    "Dynamic" Inferencing with Generalized Resolution. [Citation Graph (0, 0)][DBLP]
    SAC, 1993, pp:614-621 [Conf]
  6. Richard Rankin, Hal Berghel, T. Xu
    Efficient Generation of Lexically Proper Palindromes. [Citation Graph (0, 0)][DBLP]
    SIGSMALL/PC Symposium, 1990, pp:151-155 [Conf]
  7. Hal Berghel, C. Andreu
    TALISMAN: A Prototype Expert System for Spelling Correction. [Citation Graph (0, 0)][DBLP]
    SIGSMALL/PC, 1988, pp:107-113 [Conf]
  8. Hal Berghel, Richard Rankin, Farrukh Burney
    An Approach to Tableau Inferencing with "Hardwired" Heuristics. [Citation Graph (0, 0)][DBLP]
    SIGSMALL/PC Symposium, 1990, pp:90-93 [Conf]
  9. David Roach, Hal Berghel
    The Physiology of PROLOG Expert System Inference Engine. [Citation Graph (0, 0)][DBLP]
    SIGSMALL/PC Symposium, 1990, pp:1-5 [Conf]
  10. John V. Harrison, Hal Berghel
    A Protocol Layer Survey of Network Security. [Citation Graph (0, 0)][DBLP]
    Advances in Computers, 2005, v:64, n:, pp:110-159 [Journal]
  11. Michael Sthultz, Jacob Uecker, Hal Berghel
    Wireless Insecurities. [Citation Graph (0, 0)][DBLP]
    Advances in Computers, 2006, v:67, n:, pp:226-253 [Journal]
  12. Hal Berghel, Douglas Blank
    The World Wide Web. [Citation Graph (0, 0)][DBLP]
    Advances in Computers, 1999, v:48, n:, pp:180-219 [Journal]
  13. Hal Berghel
    Who Won the Mosaic War? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1998, v:41, n:10, pp:13-16 [Journal]
  14. Hal Berghel
    Identity Theft, Social Security Numbers, and the Web. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:2, pp:17-21 [Journal]
  15. Hal Berghel
    Predatory Disintermediation. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:5, pp:23-29 [Journal]
  16. Hal Berghel
    Digital Politics 2000. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:11, pp:17-22 [Journal]
  17. Hal Berghel
    A cyberpublishing manifesto. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:3, pp:17-20 [Journal]
  18. Hal Berghel
    Caustic Cookies. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:5, pp:19-22 [Journal]
  19. Hal Berghel
    The Y2K e-commerce tumble. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:8, pp:15-17 [Journal]
  20. Hal Berghel
    The Code Red Worm. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:12, pp:15-19 [Journal]
  21. Hal Berghel
    Hijacking the web. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2002, v:45, n:4, pp:23-27 [Journal]
  22. Hal Berghel
    Responsible web caching. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2002, v:45, n:9, pp:15-20 [Journal]
  23. Hal Berghel
    The discipline of Internet forensics. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:15-20 [Journal]
  24. Hal Berghel
    Malware month. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:12, pp:15-19 [Journal]
  25. Hal Berghel
    Wireless infidelity I: war driving. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:9, pp:21-26 [Journal]
  26. Hal Berghel
    The two sides of ROI: return on investment vs. risk of incarceration. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:4, pp:15-20 [Journal]
  27. Hal Berghel
    Phishing mongers and posers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:4, pp:21-25 [Journal]
  28. Hal Berghel
    Maiden Voyage. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1995, v:38, n:11, pp:25-27 [Journal]
  29. Hal Berghel
    Digital Politics. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1996, v:39, n:10, pp:19-25 [Journal]
  30. Hal Berghel
    HTML Compliance and the Return of the Test Pattern. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1996, v:39, n:2, pp:19-22 [Journal]
  31. Hal Berghel
    U.S. Technology Policy in the Information Age. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1996, v:39, n:6, pp:15-18 [Journal]
  32. Hal Berghel
    Email - The Good, The Bad, and the Ugly. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1997, v:40, n:4, pp:11-15 [Journal]
  33. Hal Berghel
    Informal Logic on Both Sides of the CDA Debate. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1997, v:40, n:7, pp:11-15 [Journal]
  34. Hal Berghel
    Watermarking Cyberspace. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1997, v:40, n:11, pp:19-24 [Journal]
  35. Hal Berghel
    The Year-2000 Problem and the New Riddle of Induction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1998, v:41, n:3, pp:13-17 [Journal]
  36. Hal Berghel
    Value-Added Publishing. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:1, pp:19-23 [Journal]
  37. Hal Berghel
    How Xday Figures in the Y2K Countdown. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:5, pp:11-15 [Journal]
  38. Hal Berghel
    The Cost of Having Analog Executives in a Digital World. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:11, pp:11-15 [Journal]
  39. Hal Berghel, Natasa Brajkovska
    Wading into alternate data streams. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:4, pp:21-27 [Journal]
  40. Hal Berghel, David Hoelzer
    Pernicious ports. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:12, pp:23-30 [Journal]
  41. Hal Berghel, David L. Sallach
    A paradigm shift in computing and IT education. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:6, pp:83-88 [Journal]
  42. Hal Berghel, Jacob Uecker
    Wireless infidelity II: airjacking. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:12, pp:15-20 [Journal]
  43. Hal Berghel, Jacob Uecker
    WiFi attack vectors. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:21-28 [Journal]
  44. Hal Berghel, Kim Womack
    Anonymizing the net. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:4, pp:15-20 [Journal]
  45. Gene Dallaire, Fortney H. Stark, Hal Berghel
    Should Congress Provide Special Tax Incentives for Firms Donating Computers to Schools? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1984, v:27, n:3, pp:185-194 [Journal]
  46. Hal Berghel, David Hoelzer
    Disk wiping by any other name. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:8, pp:17-21 [Journal]
  47. Hal Berghel
    Fungible credentials and next-generation fraud. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:12, pp:15-19 [Journal]
  48. Hal Berghel
    Hiding data, forensics, and anti-forensics. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:4, pp:15-20 [Journal]
  49. Hal Berghel
    Crossword Compilation with Horn Clauses. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1987, v:30, n:2, pp:183-188 [Journal]
  50. Hal Berghel, Richard Rankin
    A Proposed Standard for Measuring Crossword Compilation Efficiency. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1990, v:33, n:2, pp:181-184 [Journal]
  51. Hal Berghel, C. Yi
    Crossword Compiler-Compilation. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1989, v:32, n:3, pp:276-280 [Journal]
  52. Hal Berghel
    Cyberprivacy in the New Millennium. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:1, pp:132-134 [Journal]
  53. Hal Berghel
    Using the WWW Test Pattern to check HTML Client Compliance. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1995, v:28, n:9, pp:63-65 [Journal]
  54. Hal Berghel
    Simplified Integration of Prolog with RDBMS. [Citation Graph (0, 0)][DBLP]
    DATA BASE, 1985, v:16, n:3, pp:3-12 [Journal]
  55. Hal Berghel
    New wave prototyping: use and abuse of vacuous prototypes. [Citation Graph (0, 0)][DBLP]
    Interactions, 1994, v:1, n:2, pp:49-54 [Journal]
  56. Hal Berghel
    A logical framework for the correction of spelling errors in electronic documents. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Manage., 1987, v:23, n:5, pp:477-494 [Journal]
  57. Hal Berghel, Daniel Berleant, Thomas Foy, Marcus McGuire
    Cyberbrowsing: Information Customization on the Web. [Citation Graph (0, 0)][DBLP]
    JASIS, 1999, v:50, n:6, pp:505-511 [Journal]
  58. Hal Berghel, Richard Rankin, Sanjiv K. Bhatia
    MS-DOS Prolog implementations revisited. [Citation Graph (0, 0)][DBLP]
    SIGPLAN Notices, 1988, v:23, n:1, pp:127-134 [Journal]
  59. Hal Berghel, David Roach
    An Extension of Ukkonen's Enhanced Dynamic Programming ASM Algorithm. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst., 1996, v:14, n:1, pp:94-106 [Journal]
  60. Hal Berghel
    Better-than-nothing security practices. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:15-18 [Journal]

  61. An interactive source commenter for Prolog programs. [Citation Graph (, )][DBLP]


  62. Documentation design based upon intuitive feature taxonomy and use logging. [Citation Graph (, )][DBLP]


  63. You learned all you need to design educational software design in kindergarten (panel). [Citation Graph (, )][DBLP]


  64. Data Hiding Tactics for Windows and Unix File Systems. [Citation Graph (, )][DBLP]


  65. Phish Phactors: Offensive and Defensive Strategies. [Citation Graph (, )][DBLP]


  66. Credit Card Forensics. [Citation Graph (, )][DBLP]


  67. Faith-based security. [Citation Graph (, )][DBLP]


  68. BRAP forensics. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.458secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002