Last week I couldn't use my regular dev. machine (broken graphics card), so all my WordPress-related plans were on hold. To pass the time, I built a simple
H. Saha, D. Bhattacharyya, und P. Banerjee. A Novel Approach for Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automatas, 3 (2):
16(April 2012)
D. Miller, und E. Fredkin. (2005)cite arxiv:nlin/0501022Comment: 24 pages, 8 figures; accepted for publication in proceedings of ACM Computing Frontiers 2005 (CF'05), special session: 1st Int'l Workshop on Reversible Computing. website: http://www.andrew.cmu.edu/user/danbmil/salt/.
L. Chen, X. Xu, Y. Chen, und P. He. Proceedings of the IEEE/WIC/ACM International
Conference on Intelligent Agent Technology, Seite 148--154. Washington, DC, USA, IEEE Computer Society, (2004)
{. Wada, Y. Wada, H. Doi, {. Tanaka, und M. Furusawa. Proceedings of IEEE International Conference on
Evolutionary Computation (ICEC-94), World Congress on
Computational Intelligence, Seite 796--801. Orlando, Florida, USA, IEEE Computer Society Press, New York, (27-29 June 1994)
A. Stauffer, D. Mange, G. Tempesti, und C. Teuscher. The Third NASA/DoD workshop on Evolvable Hardware, Seite 185--192. Long Beach, California, IEEE Computer Society, (12-14 July 2001)