1997
A Brief History of the Future ICCA.
J. Int. Comput. Games Assoc., 1997
Security when outsourcing: concepts, constructs, compliance.
Proceedings of the Information Security in Research and Business, 1997
1996
Paradigms Fork: All Must Join.
J. Int. Comput. Games Assoc., 1996
J. Int. Comput. Games Assoc., 1996
Konrad Zuse: An Obituary.
J. Int. Comput. Games Assoc., 1996
J. Int. Comput. Games Assoc., 1996
1995
Peter Schreiner and Carsten Bauermeister (eds.): Der Schachcomputerkatalog.
J. Int. Comput. Games Assoc., 1995
Dieter Steinwender and Frederic A. Friedel: Schach am PC.
J. Int. Comput. Games Assoc., 1995
J. Int. Comput. Games Assoc., 1995
J. Int. Comput. Games Assoc., 1995
Bright and Beautiful, Great and Small.
J. Int. Comput. Games Assoc., 1995
J. Int. Comput. Games Assoc., 1995
J. Int. Comput. Games Assoc., 1995
Mikhail Moiseivich Botvinnik: An Obituary.
J. Int. Comput. Games Assoc., 1995
1994
Potential Applications of Opponent-Model Search.
J. Int. Comput. Games Assoc., 1994
J. Int. Comput. Games Assoc., 1994
J. Int. Comput. Games Assoc., 1994
J. Int. Comput. Games Assoc., 1994
J. Int. Comput. Games Assoc., 1994
J. Int. Comput. Games Assoc., 1994
In tuition - hi-fi and high fee?
J. Int. Comput. Games Assoc., 1994
On the validity of the Bell-La Padula model.
Comput. Secur., 1994
1993
J. Int. Comput. Games Assoc., 1993
J. Int. Comput. Games Assoc., 1993
J. Int. Comput. Games Assoc., 1993
J. Int. Comput. Games Assoc., 1993
J. Int. Comput. Games Assoc., 1993
1992
J. Int. Comput. Games Assoc., 1992
J. Int. Comput. Games Assoc., 1992
J. Int. Comput. Games Assoc., 1992
J. Int. Comput. Games Assoc., 1992
The 7th World Computer-Chess Championship Report on the Tournament.
J. Int. Comput. Games Assoc., 1992
J. Int. Comput. Games Assoc., 1992
1991
Chess is in the Eye of the Beholder.
J. Int. Comput. Games Assoc., 1991
To the Test Bed, with Love.
J. Int. Comput. Games Assoc., 1991
J. Int. Comput. Games Assoc., 1991
J. Int. Comput. Games Assoc., 1991
1990
J. Int. Comput. Games Assoc., 1990
J. Int. Comput. Games Assoc., 1990
Dizzy Now - and Still Spinning Up.
J. Int. Comput. Games Assoc., 1990
J. Int. Comput. Games Assoc., 1990
Auditing the change management process.
Comput. Secur., 1990
Sloppy, sloppier, sloppiest.
Comput. Secur., 1990
Friday the 13th, facts and fancies.
Comput. Secur., 1990
Perfect Knowledge Revisited
Artif. Intell., 1990
1989
Verifying and Codifying Strategies in the KNNKP(h) Endgame.
J. Int. Comput. Games Assoc., 1989
J. Int. Comput. Games Assoc., 1989
The Sixty-Four-Square Hegel.
J. Int. Comput. Games Assoc., 1989
J. Int. Comput. Games Assoc., 1989
J. Int. Comput. Games Assoc., 1989
J. Int. Comput. Games Assoc., 1989
J. Int. Comput. Games Assoc., 1989
1988
J. Int. Comput. Games Assoc., 1988
J. Int. Comput. Games Assoc., 1988
Pitting Bits against Brains.
J. Int. Comput. Games Assoc., 1988
A Reply to R. Sattler's Remarks on the KRP(a2)KbBP(a3) Database.
J. Int. Comput. Games Assoc., 1988
Karpov Amends Timman's Analysis.
J. Int. Comput. Games Assoc., 1988
Computer Checks on Human Analyses of the KRKB Endgame.
J. Int. Comput. Games Assoc., 1988
Make the tigers hunt for you.
Comput. Secur., 1988
1987
Corrections and Substantiations to KBNK.
J. Int. Comput. Games Assoc., 1987
J. Int. Comput. Games Assoc., 1987
J. Int. Comput. Games Assoc., 1987
More Truth on KBBK Database Results.
J. Int. Comput. Games Assoc., 1987
J. Int. Comput. Games Assoc., 1987
J. Int. Comput. Games Assoc., 1987
A Six-Men-Endgame Database: KRP(a2)KbBP(a3).
J. Int. Comput. Games Assoc., 1987
The KBBKN Statistics: New Data from Ken Thompson.
J. Int. Comput. Games Assoc., 1987
Complexity Starts at Five.
J. Int. Comput. Games Assoc., 1987
Computer security: The long road ahead.
Comput. Secur., 1987
1986
Times Past and Times Future.
J. Int. Comput. Games Assoc., 1986
J. Int. Comput. Games Assoc., 1986
By the Waters of Cologne.
J. Int. Comput. Games Assoc., 1986
Thompson's New Data-Base Results.
J. Int. Comput. Games Assoc., 1986
Three Generations Meeting.
J. Int. Comput. Games Assoc., 1986
J. Int. Comput. Games Assoc., 1986
J. Int. Comput. Games Assoc., 1986
A Data Base on Data Bases.
J. Int. Comput. Games Assoc., 1986
How to control MVS user supervisor calls.
Comput. Secur., 1986
1985
J. Int. Comput. Games Assoc., 1985
J. Int. Comput. Games Assoc., 1985
The Jungle and the Polder.
J. Int. Comput. Games Assoc., 1985
J. Int. Comput. Games Assoc., 1985
J. Int. Comput. Games Assoc., 1985
J. Int. Comput. Games Assoc., 1985
Elementary Theory Improved, A Conjecture Refuted.
J. Int. Comput. Games Assoc., 1985
The Construction of an Omniscient Endgame Data Base.
J. Int. Comput. Games Assoc., 1985
1984
J. Int. Comput. Games Assoc., 1984
Hither and Thither Moves, and Mates, and Slays ...
J. Int. Comput. Games Assoc., 1984
J. Int. Comput. Games Assoc., 1984
A topology for secure MVS systems.
Comput. Secur., 1984
The programmer's threat: Cases and causes.
Comput. Secur., 1984
1983
J. Int. Comput. Games Assoc., 1983
1982
Christiaan Huygens Computer Chess Day.
J. Int. Comput. Games Assoc., 1982
1977
Concurrent File Access Under Unpredictability.
Inf. Process. Lett., 1977