default search action
Hal Berghel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j163]Hal Berghel:
Generative Artificial Intelligence, Semantic Entropy, and the Big Sort. Computer 57(1): 130-135 (2024) - [j162]Hal Berghel:
Social Media, Cognitive Dysfunction, and Social Disruption. Computer 57(5): 118-124 (2024) - [j161]Hal Berghel:
Election Integrity in the United States: How Will 2024 Compare to 2020? Computer 57(10): 131-137 (2024) - [j160]John Leslie King, Hal Berghel, Phillip Glen Armour, Robert N. Charette:
Healthy Skepticism. Computer 57(11): 86-91 (2024) - [j159]Hal Berghel:
Bruce Schneier on AI Security (Interview). Computer 57(11): 99-101 (2024) - 2023
- [j158]Hal Berghel:
The Dictator's Dilemma and the "Sovereignty of Cyberspace" Delusion. Computer 56(1): 144-149 (2023) - [j157]Hal Berghel:
911 Swatting, VoIP, and Doxxing. Computer 56(3): 135-139 (2023) - [j156]Hal Berghel:
ChatGPT and AIChat Epistemology. Computer 56(5): 130-137 (2023) - [j155]Hal Berghel:
"Free" Online Services and Gonzo Capitalism. Computer 56(7): 86-92 (2023) - [j154]Hal Berghel:
Fatal Flaws in ChatAI as a Content Generator. Computer 56(9): 78-82 (2023) - [j153]Hal Berghel:
The Thousand Talents Program Prosecutions in Context. Computer 56(11): 95-102 (2023) - 2022
- [j152]Hal Berghel:
The State of the Art in Voting Machine Technology: Just How Reliable Are They? Computer 55(1): 118-126 (2022) - [j151]Hal Berghel:
A Collapsing Academy, Part III: Scientometrics and Metric Mania. Computer 55(3): 117-123 (2022) - [j150]Hal Berghel:
The QAnon Phenomenon: The Storm Has Always Been Among Us. Computer 55(5): 93-100 (2022) - [j149]Hal Berghel:
Prosperity Theology Goes Online: Will This Be a Fifth Great Awakening? Computer 55(7): 104-110 (2022) - [j148]Hal Berghel:
A Collapsing Academy IV: How Did Memory and Gag Laws Gain Admission? Computer 55(9): 107-114 (2022) - [j147]Phillip Glen Armour, Hal Berghel, Robert N. Charette, John Leslie King:
Ukraine Aftershocks. Computer 55(11): 85-93 (2022) - [j146]Hal Berghel:
Social Media and the Banality of (Online) Crowds. Computer 55(11): 100-105 (2022) - 2021
- [j145]Hal Berghel:
A Collapsing Academy, Part II: How Cancel Culture Works on the Academy. Computer 54(10): 138-144 (2021) - [j144]Achintya K. Bhowmik, David A. Fabry, Phillip G. Armour, Hal Berghel, Robert N. Charette, John L. King:
Hear, Now, and in the Future: Transforming Hearing Aids Into Multipurpose Devices. Computer 54(11): 108-120 (2021) - [j143]Hal Berghel:
The Online Disinformation Opera. Computer 54(12): 109-115 (2021) - 2020
- [j142]Hal Berghel:
A Critical Look at the 2019 College Admissions Scandal? Computer 53(1): 72-77 (2020) - [j141]Hal Berghel:
The Sokol Hoax: A 25-Year Retrospective. Computer 53(3): 67-72 (2020) - [j140]Hal Berghel:
New Perspectives on (Anti)Social Media. Computer 53(3): 77-82 (2020) - [j139]Hal Berghel:
The Equifax Hack Revisited and Repurposed. Computer 53(5): 85-90 (2020) - [j138]Hal Berghel, Robert N. Charette, Edward G. Happ, John Leslie King:
It's On: COVID-19, Risk Ecology, and Preparedness Tips. Computer 53(7): 80-87 (2020) - [j137]Hal Berghel:
A Collapsing Academy, Part 1. Computer 53(7): 93-98 (2020)
2010 – 2019
- 2019
- [j136]Hal Berghel:
Vehicle Telematics: The Good, Bad and Ugly. Computer 52(1): 66-70 (2019) - [j135]Hal Berghel:
Codes of Ethics in a Post-Truth World. Computer 52(3): 76-80 (2019) - [j134]Hal Berghel:
Huawei, BIS, and the IEEE: It's Déjà Vu All Over Again. Computer 52(10): 99-104 (2019) - 2018
- [j133]Hal Berghel:
Disinformatics: The Discipline behind Grand Deceptions. Computer 51(1): 89-93 (2018) - [j132]Hal Berghel:
Bruce Schneier on Future Digital Threats. Computer 51(2): 64-67 (2018) - [j131]Hal Berghel:
Trolling Pathologies. Computer 51(3): 66-69 (2018) - [j130]Hal Berghel:
Weaponizing Twitter Litter: Abuse-Forming Networks and Social Media. Computer 51(4): 70-73 (2018) - [j129]Hal Berghel:
Malice Domestic: The Cambridge Analytica Dystopia. Computer 51(5): 84-89 (2018) - [j128]Hal Berghel:
Newton's Great Insight. Computer 51(7): 86-90 (2018) - [j127]Hal Berghel, Daniel Berleant:
The Online Trolling Ecosystem. Computer 51(8): 44-51 (2018) - [j126]Hal Berghel:
Election Integrity 2018: Are We Better Off Than We Were in 2016? [Aftershock]. Computer 51(11): 90-94 (2018) - [j125]Hal Berghel:
The Genesis of Postmodern Disinformatics [Out of Band]. Computer 51(11): 102-105 (2018) - 2017
- [j124]Hal Berghel:
Software Sophistry and Political Sleight of Hand. Computer 50(1): 82-87 (2017) - [j123]Hal Berghel:
Lies, Damn Lies, and Fake News. Computer 50(2): 80-85 (2017) - [j122]Hal Berghel:
On the Problem of (Cyber) Attribution. Computer 50(3): 84-89 (2017) - [j121]Hal Berghel:
Alt-News and Post-Truths in the "Fake News" Era. Computer 50(4): 110-114 (2017) - [j120]Hal Berghel:
A Quick Take on Windows Security Evolution. Computer 50(5): 120-124 (2017) - [j119]Hal Berghel:
Which Is More Dangerous-the Dark Web or the Deep State? Computer 50(7): 86-91 (2017) - [j118]Hal Berghel:
Oh, What a Tangled Web: Russian Hacking, Fake News, and the 2016 US Presidential Election. Computer 50(9): 87-91 (2017) - [j117]Hal Berghel:
Net Neutrality Reloaded. Computer 50(10): 68-72 (2017) - [j116]Hal Berghel:
The New Science Wars. Computer 50(11): 72-76 (2017) - [j115]Hal Berghel:
Equifax and the Latest Round of Identity Theft Roulette. Computer 50(12): 72-76 (2017) - 2016
- [j114]Hal Berghel:
Digital Politics 2016. Computer 49(1): 75-79 (2016) - [j113]Hal Berghel:
Secretocracy. Computer 49(2): 63-67 (2016) - [j112]Hal Berghel:
Net Neutrality vs. Net Neutering. Computer 49(3): 73-77 (2016) - [j111]Hal Berghel:
The Bogus Science Theorem (and the Junk Science Wager). Computer 49(4): 74-78 (2016) - [j110]Hal Berghel:
Attenuated FAQs. Computer 49(5): 73-77 (2016) - [j109]Hal Berghel:
The Dictator's (False) Dilemma. Computer 49(7): 84-87 (2016) - [j108]Hal Berghel:
The Pollyanna Delusion. Computer 49(8): 98-102 (2016) - [j107]Hal Berghel:
Coda in the Key of F2654hD4. Computer 49(9): 104-109 (2016) - [j106]Hal Berghel:
Douglas Jones on Today's Voting Machines. Computer 49(10): 84-89 (2016) - [j105]Hal Berghel:
Chasing Elbridge's Ghost: The Digital Gerrymander. Computer 49(11): 91-95 (2016) - 2015
- [j104]Hal Berghel:
A Paperless Gamble. Computer 48(1): 76-78 (2015) - [j103]Hal Berghel:
Cyber Chutzpah: The Sony Hack and the Celebration of Hyperbole. Computer 48(2): 77-80 (2015) - [j102]Hal Berghel:
Noirware. Computer 48(3): 102-107 (2015) - [j101]Hal Berghel:
Borderline Executive Disorder. Computer 48(4): 82-86 (2015) - [j100]Hal Berghel:
What Makes a Good Column. Computer 48(5): 84-87 (2015) - [j99]Hal Berghel:
A Farewell to Air Gaps, Part 1. Computer 48(6): 64-68 (2015) - [j98]Hal Berghel:
A Farewell to Air Gaps, Part 2. Computer 48(7): 59-63 (2015) - [j97]Hal Berghel:
TSA: Mission Creep Meets Waste. Computer 48(8): 90-94 (2015) - [j96]Hal Berghel:
STEM Crazy. Computer 48(9): 75-80 (2015) - [j95]Hal Berghel:
Legislating Technology (Badly). Computer 48(10): 72-78 (2015) - [j94]Hal Berghel:
The Dystory of Ahmed's Clock. Computer 48(11): 82-85 (2015) - [j93]Hal Berghel:
What Price Gonzo Ethics? Computer 48(12): 88-93 (2015) - 2014
- [j92]Hal Berghel:
Privacy Informatics: A Primer on Defensive Tactics for a Society under Siege. Computer 47(1): 78-82 (2014) - [j91]Hal Berghel:
Moral Hazards, Negative Externalities, and the Surveillance Economy. Computer 47(2): 73-77 (2014) - [j90]Hal Berghel:
STEM, Revisited. Computer 47(3): 70-73 (2014) - [j89]Hal Berghel:
Mr. Snowden's Legacy. Computer 47(4): 66-70 (2014) - [j88]Hal Berghel:
PII, the FTC, Car Dealers, and You. Computer 47(5): 102-106 (2014) - [j87]Hal Berghel:
Leadership Failures in the National Security Complex. Computer 47(6): 64-67 (2014) - [j86]Hal Berghel:
Robert David Steele on OSINT. Computer 47(7): 76-81 (2014) - [j85]Hal Berghel:
The Future of Digital Money Laundering. Computer 47(8): 70-75 (2014) - [j84]Hal Berghel:
Sticky Wikis. Computer 47(9): 90-93 (2014) - [j83]Hal Berghel:
Defending against Big Dada: Defensive Tactics for Weapons of Mass Deception. Computer 47(10): 94-98 (2014) - [j82]Hal Berghel:
Why Clouds Give Me a Case of the Vapors. Computer 47(11): 82-85 (2014) - [j81]Hal Berghel:
Judson Rosebush on Computer Graphics and Animation. Computer 47(12): 95-99 (2014) - 2013
- [j80]Hal Berghel:
RFIDiocy: It's Déjà Vu All over Again. Computer 46(1): 85-88 (2013) - [j79]Hal Berghel:
The SCDOR Hack: Great Security Theater in Five Stages. Computer 46(3): 97-99 (2013) - [j78]Hal Berghel:
Computing Technology and Survivable Journalism. Computer 46(5): 93-97 (2013) - [j77]Hal Berghel:
Through the PRISM Darkly. Computer 46(7): 86-90 (2013) - [j76]Hal Berghel:
Toxic Cookies. Computer 46(9): 104-107 (2013) - [j75]Hal Berghel:
The Intimidation Factor: How a Surveillance State Can Affect What You Read in Professional Publications. Computer 46(12): 91-95 (2013) - 2012
- [j74]Hal Berghel:
Identity Theft and Financial Fraud: Some Strangeness in the Proportions. Computer 45(1): 86-89 (2012) - [j73]Hal Berghel:
WikiLeaks and the Matter of Private Manning. Computer 45(3): 70-73 (2012) - [j72]Hal Berghel:
Breaking the Fourth Wall of Electronic Crime: Blame It on the Thespians. Computer 45(5): 86-88 (2012) - [j71]Hal Berghel:
The OuijAmazon Desktop Metaphor. Computer 45(7): 80-82 (2012) - [j70]Hal Berghel:
The Dumbing Down of SportPhishing. Computer 45(9): 92-94 (2012) - [j69]Hal Berghel:
Stratfor or Stratagainst. Computer 45(11): 82-85 (2012) - 2011
- [j68]Amit Grover, Hal Berghel, Dennis Cobb:
The State of the Art in Identity Theft. Adv. Comput. 83: 1-50 (2011) - [j67]Amit Grover, Hal Berghel:
A Survey of RFID Deployment and Security Issues. J. Inf. Process. Syst. 7(4): 561-580 (2011) - 2010
- [j66]Amit Grover, Paul Braeckel, Kevin Lindgren, Hal Berghel, Dennis Cobb:
Parameters Effecting 2D Barcode Scanning Reliability. Adv. Comput. 80: 209-235 (2010)
2000 – 2009
- 2008
- [j65]Hal Berghel, David Hoelzer, Michael Sthultz:
Data Hiding Tactics for Windows and Unix File Systems. Adv. Comput. 74: 1-17 (2008) - [j64]Hal Berghel:
Faith-based security. Commun. ACM 51(4): 13-17 (2008) - [j63]Hal Berghel:
BRAP forensics. Commun. ACM 51(6): 15-20 (2008) - 2007
- [j62]Hal Berghel, James Carpinter, Ju-Yeon Jo:
Phish Phactors: Offensive and Defensive Strategies. Adv. Comput. 70: 223-268 (2007) - [j61]Hal Berghel:
Hiding data, forensics, and anti-forensics. Commun. ACM 50(4): 15-20 (2007) - [j60]Hal Berghel:
Better-than-nothing security practices. Commun. ACM 50(8): 15-18 (2007) - [j59]Hal Berghel:
Credit Card Forensics. Commun. ACM 50(12): 11-14 (2007) - 2006
- [j58]Michael Sthultz, Jacob Uecker, Hal Berghel:
Wireless Insecurities. Adv. Comput. 67: 226-253 (2006) - [j57]Hal Berghel:
Phishing mongers and posers. Commun. ACM 49(4): 21-25 (2006) - [j56]Hal Berghel, David Hoelzer:
Disk wiping by any other name. Commun. ACM 49(8): 17-21 (2006) - [j55]Hal Berghel:
Fungible credentials and next-generation fraud. Commun. ACM 49(12): 15-19 (2006) - 2005
- [j54]John V. Harrison, Hal Berghel:
A Protocol Layer Survey of Network Security. Adv. Comput. 64: 110-159 (2005) - [j53]Hal Berghel:
The two sides of ROI: return on investment vs. risk of incarceration. Commun. ACM 48(4): 15-20 (2005) - [j52]Hal Berghel, Jacob Uecker:
WiFi attack vectors. Commun. ACM 48(8): 21-28 (2005) - [j51]Hal Berghel, David Hoelzer:
Pernicious ports. Commun. ACM 48(12): 23-30 (2005) - 2004
- [j50]Hal Berghel, Natasa Brajkovska:
Wading into alternate data streams. Commun. ACM 47(4): 21-27 (2004) - [j49]Hal Berghel, David L. Sallach:
A paradigm shift in computing and IT education. Commun. ACM 47(6): 83-88 (2004) - [j48]Hal Berghel:
Wireless infidelity I: war driving. Commun. ACM 47(9): 21-26 (2004) - [j47]Hal Berghel, Jacob Uecker:
Wireless infidelity II: airjacking. Commun. ACM 47(12): 15-20 (2004) - 2003
- [j46]Hal Berghel, Kim Womack:
Anonymizing the net. Commun. ACM 46(4): 15-20 (2003) - [j45]Hal Berghel:
The discipline of Internet forensics. Commun. ACM 46(8): 15-20 (2003) - [j44]Hal Berghel:
Malware month. Commun. ACM 46(12): 15-19 (2003) - 2002
- [j43]Hal Berghel:
Hijacking the web. Commun. ACM 45(4): 23-27 (2002) - [j42]Hal Berghel:
Responsible web caching. Commun. ACM 45(9): 15-20 (2002) - 2001
- [j41]Hal Berghel:
A cyberpublishing manifesto. Commun. ACM 44(3): 17-20 (2001) - [j40]Hal Berghel:
Caustic Cookies. Commun. ACM 44(5): 19-22 (2001) - [j39]Hal Berghel:
The Y2K e-commerce tumble. Commun. ACM 44(8): 15-17 (2001) - [j38]Hal Berghel:
The Code Red Worm. Commun. ACM 44(12): 15-19 (2001) - [j37]Hal Berghel:
Cyberprivacy in the New Millennium. Computer 34(1): 132-134 (2001) - [c16]Hal Berghel:
A decade of applied computing. SAC 2001: 1-5 - 2000
- [j36]Hal Berghel:
Identity Theft, Social Security Numbers, and the Web. Commun. ACM 43(2): 17-21 (2000) - [j35]Hal Berghel:
Predatory Disintermediation. Commun. ACM 43(5): 23-29 (2000) - [j34]Hal Berghel:
Digital Politics 2000. Commun. ACM 43(11): 17-22 (2000) - [j33]Hal Berghel:
A day in the life of... XRDS 7(2): 30-31 (2000)
1990 – 1999
- 1999
- [j32]Hal Berghel, Douglas Blank:
The World Wide Web. Adv. Comput. 48: 179-218 (1999) - [j31]Hal Berghel:
Value-Added Publishing. Commun. ACM 42(1): 19-23 (1999) - [j30]Hal Berghel:
How Xday Figures in the Y2K Countdown. Commun. ACM 42(5): 11-15 (1999) - [j29]Hal Berghel:
The Cost of Having Analog Executives in a Digital World. Commun. ACM 42(11): 11-15 (1999) - [j28]Hal Berghel, Daniel Berleant, Thomas Foy, Marcus McGuire:
Cyberbrowsing: Information Customization on the Web. J. Am. Soc. Inf. Sci. 50(6): 505-511 (1999) - 1998
- [j27]Hal Berghel:
The Year-2000 Problem and the New Riddle of Induction. Commun. ACM 41(3): 13-17 (1998) - [j26]Hal Berghel:
Who Won the Mosaic War? Commun. ACM 41(10): 13-16 (1998) - 1997
- [j25]Hal Berghel:
Cyberspace 2000: Dealing with Information Overload. Commun. ACM 40(2): 19-24 (1997) - [j24]Hal Berghel:
Email - The Good, The Bad, and the Ugly. Commun. ACM 40(4): 11-15 (1997) - [j23]Hal Berghel:
Informal Logic on Both Sides of the CDA Debate. Commun. ACM 40(7): 11-15 (1997) - [j22]Hal Berghel:
Watermarking Cyberspace. Commun. ACM 40(11): 19-24 (1997) - [j21]Hal Berghel:
St. Cloud State University ACM chapter wins 2nd annual Webbie prize. XRDS 4(1): 25 (1997) - [j20]Hal Berghel:
A post mortem for the Communications Decency Act. SIGCAS Comput. Soc. 27(4): 8-11 (1997) - [c15]Hal Berghel, Cathleen A. Norris, Elliot Soloway, Harriet G. Taylor, Joe Turner:
You learned all you need to design educational software design in kindergarten (panel). ITiCSE 1997: 139 - 1996
- [j19]Hal Berghel:
The Client's Side of the World-Wide Web. Commun. ACM 39(1): 30-40 (1996) - [j18]Hal Berghel:
HTML Compliance and the Return of the Test Pattern. Commun. ACM 39(2): 19-22 (1996) - [j17]Hal Berghel:
U.S. Technology Policy in the Information Age. Commun. ACM 39(6): 15-18 (1996) - [j16]Hal Berghel:
Digital Politics. Commun. ACM 39(10): 19-25 (1996) - [j15]Hal Berghel, David Roach:
An Extension of Ukkonen's Enhanced Dynamic Programming ASM Algorithm. ACM Trans. Inf. Syst. 14(1): 94-106 (1996) - 1995
- [j14]Hal Berghel:
Maiden Voyage. Commun. ACM 38(11): 25-27 (1995) - [j13]Hal Berghel:
Using the WWW Test Pattern to check HTML Client Compliance. Computer 28(9): 63-65 (1995) - [c14]Hal Berghel:
CYBER-SURFING: the state-of-the-art in client server browsing and navigation. SAC 1995: 1-4 - 1994
- [j12]Hal Berghel:
New wave prototyping: use and abuse of vacuous prototypes. Interactions 1(2): 49-54 (1994) - [e4]Hal Berghel, Terry Hlengl, Joseph E. Urban:
Proceedings of the 1994 ACM Symposium on Applied Computing, SAC'94, Phoenix, AZ, USA, March 6-8, 1994. ACM 1994, ISBN 0-89791-647-6 [contents] - 1993
- [c13]Gordon Beavers, Hal Berghel:
"Dynamic" Inferencing with Generalized Resolution. SAC 1993: 614-621 - [e3]Ed Deaton, K. M. George, Hal Berghel, George E. Hedrick:
Proceedings of the 1993 ACM/SIGAPP Symposium on Applied Computing: States of the Art and Practice, SAC'93, Indianapolis, IN, USA, February 14-16, 1993. ACM 1993, ISBN 0-89791-567-4 [contents] - 1992
- [c12]G. H. Harris, David Roach, P. D. Smith, Hal Berghel:
Dynamic crossword slot table implementation. SAC 1992: 95-98 - [c11]L. J. Spring, G. H. Harris, John J. H. Forster, Hal Berghel:
A proposed benchmark for testing implementations of crossword puzzle algorithms. SAC 1992: 99-101 - [c10]Hal Berghel, David Roach, George Balogh, Carroll Hyatt:
"Tuning" an ASM metric: a case study in metric ASM optimization. SAC 1992: 131-136 - [c9]David Roach, Hal Berghel:
An alternative to constraint logic programming for managing domain arithmetics in Prolog expert systems. SAC 1992: 328-332 - [e2]Hal Berghel, Ed Deaton, George E. Hedrick, David Roach, Roger L. Wainwright:
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, Kansas City, MO, USA, March 1-3, 1992. ACM 1992, ISBN 0-89791-502-X [contents] - 1990
- [j11]Hal Berghel, Richard Rankin:
A Proposed Standard for Measuring Crossword Compilation Efficiency. Comput. J. 33(2): 181-184 (1990) - [c8]Hal Berghel, David Roach:
Documentation design based upon intuitive feature taxonomy and use logging. SIGDOC 1990: 63-68 - [c7]David Roach, Hal Berghel, John R. Talburt:
An interactive source commenter for Prolog programs. SIGDOC 1990: 141-145 - [c6]David Roach, Hal Berghel:
The Physiology of PROLOG Expert System Inference Engine. SIGSMALL/PC Symposium 1990: 1-5 - [c5]Hal Berghel, Richard Rankin, Farrukh Burney:
An Approach to Tableau Inferencing with "Hardwired" Heuristics. SIGSMALL/PC Symposium 1990: 90-93 - [c4]Richard Rankin, Hal Berghel, T. Xu:
Efficient Generation of Lexically Proper Palindromes. SIGSMALL/PC Symposium 1990: 151-155 - [e1]Hal Berghel, Elizabeth A. Unger, Richard Rankin:
Proceedings of the 1990 ACM SIGSMALL/PC Symposium on Small Systems, March 28-30, 1990. Crystal City, VA, USA. ACM 1990, ISBN 0-89791-347-7 [contents]
1980 – 1989
- 1989
- [j10]Hal Berghel, C. Yi:
Crossword Compiler-Compilation. Comput. J. 32(3): 276-280 (1989) - 1988
- [j9]Hal Berghel, Richard Rankin, Sanjiv K. Bhatia:
MS-DOS Prolog implementations revisited. ACM SIGPLAN Notices 23(1): 127-134 (1988) - [c3]Hal Berghel, Cecily Andreu:
TALISMAN: A Prototype Expert System for Spelling Correction. SIGSMALL/PC 1988: 107-113 - 1987
- [j8]Hal Berghel:
Crossword Compilation with Horn Clauses. Comput. J. 30(2): 183-188 (1987) - [j7]Hal Berghel:
A logical framework for the correction of spelling errors in electronic documents. Inf. Process. Manag. 23(5): 477-494 (1987) - 1986
- [j6]Hal Berghel, Eric Traudt:
Spelling verification in prolog. ACM SIGPLAN Notices 21(1): 19-27 (1986) - [j5]John Weeks, Hal Berghel:
A comparative feature-analysis of microcomputer prolog implementations. ACM SIGPLAN Notices 21(2): 46-61 (1986) - [c2]Hal Berghel, Gregg Stubbendieck, Eric Traudt:
Performance characteristics of microcomputer Prolog implementations. SIGSMALL 1986: 64-71 - 1985
- [j4]Hal Berghel:
Simplified Integration of Prolog with RDBMS. Data Base 16(3): 3-12 (1985) - 1984
- [j3]Gene Dallaire, Fortney H. Stark, Hal Berghel:
Should Congress Provide Special Tax Incentives for Firms Donating Computers to Schools? Commun. ACM 27(3): 185-194 (1984) - [j2]Hal Berghel, David L. Sallach:
Measurements of program similarity in identical task environments. ACM SIGPLAN Notices 19(8): 65-76 (1984) - 1983
- [j1]Hal Berghel, David L. Sallach:
Computers and democracy: a critique of Parslow. SIGCAS Comput. Soc. 13(2): 12-16 (1983) - 1982
- [c1]Hal Berghel:
CMOS new product development for the health care industry: Procedures and pitfalls. SIGSMALL 1982: 33-37
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint