Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exhaustive Evaluation of Radius 2 Toggle Rules for a Variable-Length Cryptographic Cellular Automata-Based Model., , , and . ACRI, volume 6350 of Lecture Notes in Computer Science, page 275-286. Springer, (2010)Secret Key Specification for a Variable-Length Cryptographic Cellular Automata Model., , , and . PPSN (2), volume 6239 of Lecture Notes in Computer Science, page 381-390. Springer, (2010)Comparison of the Effectiveness of Simple Agent Capabilities for an On-line Area Coverage Task., , , and . SSCI, page 2011-2018. IEEE, (2018)A Cellular Automata-Based Cryptographic Model with a Variable-Length Ciphertext., , , and . CSC, page 19-25. CSREA Press, (2010)Accidental encounters: can accidents be adaptive?, and . Adapt. Behav., (2018)Dynamic Structure Discovery and Repair for 3D Cell Assemblages., , , and . ALIFE, page 352-359. MIT Press, (2016)Investigating a cellular automata model that performs three distance diffusion on a robot path planning., , and . ECAL, page 271-278. MIT Press, (2015)Modeling Cell Migration in a Simulated Bioelectrical Signaling Network for Anatomical Regeneration., , and . ALIFE, page 194-201. MIT Press, (2018)A Cellular Automata-Based Path-Planning for a Cooperative and Decentralized Team of Robots., , , , , , and . CEC, page 739-746. IEEE, (2019)Introducing simulated stem cells into a bio-inspired cell-cell communication mechanism for structure regeneration., , and . SSCI, page 1-8. IEEE, (2017)