Search the dblp DataBase
Hal Berghel :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Hal Berghel Cyberspace 2000: Dealing with Information Overload. [Citation Graph (2, 0)][DBLP ] Commun. ACM, 1997, v:40, n:2, pp:19-24 [Journal ] Hal Berghel The Client's Side of the World-Wide Web. [Citation Graph (1, 0)][DBLP ] Commun. ACM, 1996, v:39, n:1, pp:30-40 [Journal ] Hal Berghel A decade of applied computing. [Citation Graph (0, 0)][DBLP ] SAC, 2001, pp:1-5 [Conf ] Hal Berghel CYBER-SURFING: the state-of-the-art in client server browsing and navigation. [Citation Graph (0, 0)][DBLP ] SAC, 1995, pp:1-4 [Conf ] Gordon Beavers , Hal Berghel "Dynamic" Inferencing with Generalized Resolution. [Citation Graph (0, 0)][DBLP ] SAC, 1993, pp:614-621 [Conf ] Richard Rankin , Hal Berghel , T. Xu Efficient Generation of Lexically Proper Palindromes. [Citation Graph (0, 0)][DBLP ] SIGSMALL/PC Symposium, 1990, pp:151-155 [Conf ] Hal Berghel , C. Andreu TALISMAN: A Prototype Expert System for Spelling Correction. [Citation Graph (0, 0)][DBLP ] SIGSMALL/PC, 1988, pp:107-113 [Conf ] Hal Berghel , Richard Rankin , Farrukh Burney An Approach to Tableau Inferencing with "Hardwired" Heuristics. [Citation Graph (0, 0)][DBLP ] SIGSMALL/PC Symposium, 1990, pp:90-93 [Conf ] David Roach , Hal Berghel The Physiology of PROLOG Expert System Inference Engine. [Citation Graph (0, 0)][DBLP ] SIGSMALL/PC Symposium, 1990, pp:1-5 [Conf ] John V. Harrison , Hal Berghel A Protocol Layer Survey of Network Security. [Citation Graph (0, 0)][DBLP ] Advances in Computers, 2005, v:64, n:, pp:110-159 [Journal ] Michael Sthultz , Jacob Uecker , Hal Berghel Wireless Insecurities. [Citation Graph (0, 0)][DBLP ] Advances in Computers, 2006, v:67, n:, pp:226-253 [Journal ] Hal Berghel , Douglas Blank The World Wide Web. [Citation Graph (0, 0)][DBLP ] Advances in Computers, 1999, v:48, n:, pp:180-219 [Journal ] Hal Berghel Who Won the Mosaic War? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1998, v:41, n:10, pp:13-16 [Journal ] Hal Berghel Identity Theft, Social Security Numbers, and the Web. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2000, v:43, n:2, pp:17-21 [Journal ] Hal Berghel Predatory Disintermediation. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2000, v:43, n:5, pp:23-29 [Journal ] Hal Berghel Digital Politics 2000. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2000, v:43, n:11, pp:17-22 [Journal ] Hal Berghel A cyberpublishing manifesto. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:3, pp:17-20 [Journal ] Hal Berghel Caustic Cookies. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:5, pp:19-22 [Journal ] Hal Berghel The Y2K e-commerce tumble. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:8, pp:15-17 [Journal ] Hal Berghel The Code Red Worm. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:12, pp:15-19 [Journal ] Hal Berghel Hijacking the web. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2002, v:45, n:4, pp:23-27 [Journal ] Hal Berghel Responsible web caching. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2002, v:45, n:9, pp:15-20 [Journal ] Hal Berghel The discipline of Internet forensics. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2003, v:46, n:8, pp:15-20 [Journal ] Hal Berghel Malware month. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2003, v:46, n:12, pp:15-19 [Journal ] Hal Berghel Wireless infidelity I: war driving. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:9, pp:21-26 [Journal ] Hal Berghel The two sides of ROI: return on investment vs. risk of incarceration. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:4, pp:15-20 [Journal ] Hal Berghel Phishing mongers and posers. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:4, pp:21-25 [Journal ] Hal Berghel Maiden Voyage. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1995, v:38, n:11, pp:25-27 [Journal ] Hal Berghel Digital Politics. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:10, pp:19-25 [Journal ] Hal Berghel HTML Compliance and the Return of the Test Pattern. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:2, pp:19-22 [Journal ] Hal Berghel U.S. Technology Policy in the Information Age. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:6, pp:15-18 [Journal ] Hal Berghel Email - The Good, The Bad, and the Ugly. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1997, v:40, n:4, pp:11-15 [Journal ] Hal Berghel Informal Logic on Both Sides of the CDA Debate. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1997, v:40, n:7, pp:11-15 [Journal ] Hal Berghel Watermarking Cyberspace. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1997, v:40, n:11, pp:19-24 [Journal ] Hal Berghel The Year-2000 Problem and the New Riddle of Induction. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1998, v:41, n:3, pp:13-17 [Journal ] Hal Berghel Value-Added Publishing. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:1, pp:19-23 [Journal ] Hal Berghel How Xday Figures in the Y2K Countdown. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:5, pp:11-15 [Journal ] Hal Berghel The Cost of Having Analog Executives in a Digital World. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:11, pp:11-15 [Journal ] Hal Berghel , Natasa Brajkovska Wading into alternate data streams. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:4, pp:21-27 [Journal ] Hal Berghel , David Hoelzer Pernicious ports. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:12, pp:23-30 [Journal ] Hal Berghel , David L. Sallach A paradigm shift in computing and IT education. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:6, pp:83-88 [Journal ] Hal Berghel , Jacob Uecker Wireless infidelity II: airjacking. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:12, pp:15-20 [Journal ] Hal Berghel , Jacob Uecker WiFi attack vectors. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:21-28 [Journal ] Hal Berghel , Kim Womack Anonymizing the net. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2003, v:46, n:4, pp:15-20 [Journal ] Gene Dallaire , Fortney H. Stark , Hal Berghel Should Congress Provide Special Tax Incentives for Firms Donating Computers to Schools? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1984, v:27, n:3, pp:185-194 [Journal ] Hal Berghel , David Hoelzer Disk wiping by any other name. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:8, pp:17-21 [Journal ] Hal Berghel Fungible credentials and next-generation fraud. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:12, pp:15-19 [Journal ] Hal Berghel Hiding data, forensics, and anti-forensics. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2007, v:50, n:4, pp:15-20 [Journal ] Hal Berghel Crossword Compilation with Horn Clauses. [Citation Graph (0, 0)][DBLP ] Comput. J., 1987, v:30, n:2, pp:183-188 [Journal ] Hal Berghel , Richard Rankin A Proposed Standard for Measuring Crossword Compilation Efficiency. [Citation Graph (0, 0)][DBLP ] Comput. J., 1990, v:33, n:2, pp:181-184 [Journal ] Hal Berghel , C. Yi Crossword Compiler-Compilation. [Citation Graph (0, 0)][DBLP ] Comput. J., 1989, v:32, n:3, pp:276-280 [Journal ] Hal Berghel Cyberprivacy in the New Millennium. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2001, v:34, n:1, pp:132-134 [Journal ] Hal Berghel Using the WWW Test Pattern to check HTML Client Compliance. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1995, v:28, n:9, pp:63-65 [Journal ] Hal Berghel Simplified Integration of Prolog with RDBMS. [Citation Graph (0, 0)][DBLP ] DATA BASE, 1985, v:16, n:3, pp:3-12 [Journal ] Hal Berghel New wave prototyping: use and abuse of vacuous prototypes. [Citation Graph (0, 0)][DBLP ] Interactions, 1994, v:1, n:2, pp:49-54 [Journal ] Hal Berghel A logical framework for the correction of spelling errors in electronic documents. [Citation Graph (0, 0)][DBLP ] Inf. Process. Manage., 1987, v:23, n:5, pp:477-494 [Journal ] Hal Berghel , Daniel Berleant , Thomas Foy , Marcus McGuire Cyberbrowsing: Information Customization on the Web. [Citation Graph (0, 0)][DBLP ] JASIS, 1999, v:50, n:6, pp:505-511 [Journal ] Hal Berghel , Richard Rankin , Sanjiv K. Bhatia MS-DOS Prolog implementations revisited. [Citation Graph (0, 0)][DBLP ] SIGPLAN Notices, 1988, v:23, n:1, pp:127-134 [Journal ] Hal Berghel , David Roach An Extension of Ukkonen's Enhanced Dynamic Programming ASM Algorithm. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst., 1996, v:14, n:1, pp:94-106 [Journal ] Hal Berghel Better-than-nothing security practices. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2007, v:50, n:8, pp:15-18 [Journal ] An interactive source commenter for Prolog programs. [Citation Graph (, )][DBLP ] Documentation design based upon intuitive feature taxonomy and use logging. [Citation Graph (, )][DBLP ] You learned all you need to design educational software design in kindergarten (panel). [Citation Graph (, )][DBLP ] Data Hiding Tactics for Windows and Unix File Systems. [Citation Graph (, )][DBLP ] Phish Phactors: Offensive and Defensive Strategies. [Citation Graph (, )][DBLP ] Credit Card Forensics. [Citation Graph (, )][DBLP ] Faith-based security. [Citation Graph (, )][DBLP ] BRAP forensics. [Citation Graph (, )][DBLP ] Search in 0.008secs, Finished in 0.011secs