Last week I couldn't use my regular dev. machine (broken graphics card), so all my WordPress-related plans were on hold. To pass the time, I built a simple
H. Saha, D. Bhattacharyya, and P. Banerjee. A Novel Approach for Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automatas, 3 (2):
16(April 2012)
H. Silva, V. Bonato, C. Silva, and R. Santos. Abstract Book of the XXIII IUPAP International Conference on Statistical Physics, Genova, Italy, (9-13 July 2007)
L. Chen, X. Xu, Y. Chen, and P. He. Proceedings of the IEEE/WIC/ACM International
Conference on Intelligent Agent Technology, page 148--154. Washington, DC, USA, IEEE Computer Society, (2004)
H. Juille, and J. Pollack. Genetic Programming 1998: Proceedings of the Third
Annual Conference, page 519--527. University of Wisconsin, Madison, Wisconsin, USA, Morgan Kaufmann, (22-25 July 1998)
A. Stauffer, D. Mange, G. Tempesti, and C. Teuscher. The Third NASA/DoD workshop on Evolvable Hardware, page 185--192. Long Beach, California, IEEE Computer Society, (12-14 July 2001)
{. Wada, Y. Wada, H. Doi, {. Tanaka, and M. Furusawa. Proceedings of IEEE International Conference on
Evolutionary Computation (ICEC-94), World Congress on
Computational Intelligence, page 796--801. Orlando, Florida, USA, IEEE Computer Society Press, New York, (27-29 June 1994)
D. Miller, and E. Fredkin. (2005)cite arxiv:nlin/0501022Comment: 24 pages, 8 figures; accepted for publication in proceedings of ACM Computing Frontiers 2005 (CF'05), special session: 1st Int'l Workshop on Reversible Computing. website: http://www.andrew.cmu.edu/user/danbmil/salt/.