Sciweavers

377 search results - page 62 / 76
» Quantization of cellular automata
Sort
View
ASIACRYPT
2005
Springer
15 years 10 months ago
A Near-Practical Attack Against B Mode of HBB
Stream cipher Hiji-Bij-Bij (HBB) was proposed by Sarkar at Indocrypt’03. This cipher uses cellular automata (CA). The algorithm has two modes: a basic mode (B) and a self-synchro...
Joydip Mitra
ECAL
2005
Springer
15 years 10 months ago
An Architecture for Modelling Emergence in CA-Like Systems
Abstract. We consider models of emergence, adding downward causation to conventional models where causation permeates from low-level elements to high-level behaviour. We describe a...
Fiona Polack, Susan Stepney, Heather R. Turner, Pe...
EVOW
2004
Springer
15 years 10 months ago
The Virtual Ecosystem as Generative Electronic Art
This paper proposes four desirable attributes of processes to be applied in generative electronic art. By example, it then demonstrates that the virtual ecosystem in its entirety i...
Alan Dorin
SIGCSE
2008
ACM
158views Education» more  SIGCSE 2008»
15 years 4 months ago
The game of life: an outreach model for high school students with disabilities
In this hands-on special session, attendees will learn about and use a Game of Life cellular automata framework (Java) to assist with outreach activities. Using the framework, stu...
Richard E. Ladner, Tammy VanDeGrift
IWCMC
2010
ACM
15 years 9 months ago
Performance of CSI-based multi-user MIMO for the LTE downlink
We consider the application of a channel state information (CSI) based multi-user (MU) multiple input multiple output (MIMO) scheme to the downlink of 3GPP Long Term Evolution (LT...
Philipp Frank, Andreas Müller, Joachim Speide...