


default search action
Journal of Cellular Automata, Volume 16
Volume 16, Numbers 1-2, 2021
- Sukanya Mukherjee, Kamalika Bhattacharjee, Sukanta Das:

Reversible Cellular Automata: A Natural Clustering Technique. 1-38 - Swapan Maiti, Dipanwita Roy Chowdhury:

Synthesis of Maximum Length Cellular Automata with Nonlinearity Injections. 39-60 - Supreeti Kamilya, Sukanta Das, Biplab K. Sikdar:

Simulation of Non-uniform Cellular Automata by Classical Cellular Automata and Its Application in Embedded Systems. 61-86 - Janusz Matyja:

Ergodic Properties of Certain Strongly Transitive CA with a Continuum of Two-Periodic Points. 87-125 - Hasan Akin:

Description of Reversibility of 9-Cyclic 1D Finite Linear Cellular Automata with Periodic Boundary Conditions. 127-151 - Tim Otto Roth:

The Charme of the Discrete Error - When Mathematical Socialism Becomes Art. 153-171
Volume 16, Numbers 3-4, 2022
- Sara Dridi, Samira El Yacoubi, Franco Bagnoli:

Kalman Condition and New Algorithm Approach for Regional Controllability of Peripherally-linear Elementary Cellular Automata via Boundary Actions. 173-195 - José Manuel Gómez Soto, Andrew Wuensche:

The Ameyalli-Rule: Logical Universality in a 2D Cellular Automaton. 197-212 - Mohamed Byari, Abdessamed Bernoussi, Mina Amharref, Mustapha Ouardouz:

A 3D Cellular Automata Approach for the Wind Flow Modeling. 213-237 - Alessandro Cotronei:

On Multi-Rule and Probability-Dependant Adaptations of Conway's Game of Life and Their Character. 239-310 - Apostolos Kyritsis, Orestis Liolis, Georgios Ch. Sirakoulis:

Error Detection and Correction Algorithms for the Firing Squad Synchronization Problem. 311-334
Volume 16, Numbers 5-6, 2022
- Tomasz M. Gwizdalla, Luca Manzoni:

Preface. J. Cell. Autom. 16(5-6): 335-336 (2022) - Ambili K. N, Jimmy Jose:

Inapplicability of Differential Fault Attacks Against Cellular Automata Based Lightweight Authenticated Cipher. 337-362 - Ambili K. N, Jimmy Jose:

Reinforcing Lightweight Authenticated Encryption Schemes Against Statistical Ineffective Fault Attack. 363-379 - Mohamed Byari, Abdessamed Bernoussi, Mustapha Ouardouz, Mina Amharref:

Protector Control of 3D Cellular Automata via Space Attributes: Application to Wildland Fire. 381-399 - Théo Plénet, Samira El Yacoubi, Clément Raïevsky, Laurent Lefèvre:

Observability and Reconstructibility of Affine Cellular Automata: Example on Random Number Reconstruction. 401-422 - Alassane Koné, Allyx Fontaine, Samira El Yacoubi, Maud Loireau, Salifou Nouhou Jangorzo:

Assessing the Impact of Anthropogenic Factors on Desertification Through the DESERTICAS Software. 423-442 - Tapadyoti Banerjee, Dipanwita Roy Chowdhury:

EnCash: An Authenticated Encryption Scheme Using Cellular Automata. 443-461 - Anita John, Sai Kallupalle Mineesh Reddy, Jimmy Jose:

Fault Resistant Trivium-like Stream Cipher Using Higher Radii Cellular Automata. 463-490 - Irene Georgiadi, Ioakeim G. Georgoudas, Giuseppe A. Trunfio, Georgios Ch. Sirakoulis:

An Interactive Cellular Automata Based Application to Foster Sustainable Forms of Movement in the Urban Fabric. 491-512

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














