Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Generic Limit Set of Cellular Automata., and . J. Cell. Autom., 14 (5-6): 435-477 (2019)Dill maps in the Weyl-like space associated to the Levenshtein distance., and . CoRR, (2023)Applied public-key steganography., , and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 38-49. SPIE, (2002)Besicovitch Pseudodistances with Respect to Non-Følner Sequences., and . Complex Syst., 30 (2): 133-158 (2021)Cellular automata and substitutions in topological spaces defined via edit distances., and . Nat. Comput., 22 (3): 509-526 (September 2023)Undecidable Word Problem in Subshift Automorphism Groups., , , and . CSR, volume 11532 of Lecture Notes in Computer Science, page 180-190. Springer, (2019)Hardness of monadic second-order formulae over succinct graphs., , , and . CoRR, (2023)Éditorial - Numerical methods in electromagnetism.. Ann. des Télécommunications, 53 (3-4): 84 (1998)Creating the Sydney York Morphological and Acoustic Recordings of Ears Database., , , , , , , and . IEEE Trans. Multim., 16 (1): 37-46 (2014)Surjective cellular automata far from the Garden of Eden., , and . Discret. Math. Theor. Comput. Sci., 15 (3): 41-60 (2013)