


default search action
Complex Systems, Volume 19
Volume 19, Number 1, 2010
- Hector Zenil:

Compression-Based Investigation of the Dynamical Properties of Cellular Automata and Other Systems. - Maurice Margenstern:

Turing Machines with Two Letters and Two States. - Martin Hülse:

From Sierpinski Carpets to Directed Graphs. - Dominik Strzalka

, Franciszek Grabowski:
Dynamics of Algorithmic Processing in Computer Systems. - Nirmalya Sundar Maiti

, Soumyabrata Ghosh, Shiladitya Munshi, Parimal Pal Chaudhuri:
Linear Time Algorithm for Identifying the Invertibility of Null-Boundary Three Neighborhood Cellular Automata.
Volume 19, Number 2, 2010
- Alexander G. D. Lamb:

Dense Graphs, Node Sets, and Riders: Toward a Foundation for Particle Physics without Continuum Mathematics. - Paul Budnik:

Emergent Properties of Discretized Wave Equations. - Paul-Jean Letourneau:

Particle Structures in Elementary Cellular Automaton Rule 146. - Machi Zawidzki, Ichiro Fujieda:

The Prototyping of a Shading Device Controlled by a Cellular Automaton. - Yukio-Pegio Gunji:

Inducing Class 4 Behavior on the Basis of Lattice Analysis.
Volume 19, Number 3, 2011
- Arnold Polanski:

Genetic Algorithm Search for Predictive Patterns in Multidimensional Time Series. - James Hay, David Flynn:

Changing the States of Abstract Discrete Systems. - Adrien Friggeri, Jean-Philippe Cointet, Matthieu Latapy:

A Real-World Spreading Experiment in the Blogosphere. - Zhisong Jiang, Dakang Qin:

The Fixed String of Elementary Cellular Automata. - Oleg Mazonka:

Bit Copying: The Ultimate Computational Simplicity. - Abrham Workineh, Abdollah Homaifar:

Robust Bidding in Learning Classifier Systems Using Loan and Bid History.
Volume 19, Number 4, 2011
- David A. Rosenblueth, Carlos Gershenson:

A Model of City Traffic Based on Elementary Cellular Automata. - Fumio Ohi:

Exact Calculation of Lyapunov Exponents and Spreading Rates for Rule 40. - Jameson L. Toole, Scott E. Page:

Predicting Cellular Automata. - Tobias Kretz:

A Round-Robin Tournament of the Iterated Prisoner's Dilemma with Complete Memory-Size-Three Strategies.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














