NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 18,617
1.
  • TT[over ¯]-Deformed Conform... TT[over ¯]-Deformed Conformal Field Theories out of Equilibrium
    Medenjak, Marko; Policastro, Giuseppe; Yoshimura, Takato Physical review letters, 2021-Mar-26, 20210326, Volume: 126, Issue: 12
    Journal Article
    Peer reviewed

    We consider the out-of-equilibrium transport in TTover ¯-deformed (1+1)-dimension conformal field theories (CFTs). The theories admit two disparate approaches, integrability and holography, which we ...
Full text

PDF
2.
  • Cellular Automata Can Reduc... Cellular Automata Can Reduce Memory Requirements of Collective-State Computing
    Kleyko, Denis; Frady, Edward Paxon; Sommer, Friedrich T. IEEE transaction on neural networks and learning systems, 06/2022, Volume: 33, Issue: 6
    Journal Article
    Open access

    Various nonclassical approaches of distributed information processing, such as neural networks, reservoir computing (RC), vector symbolic architectures (VSAs), and others, employ the principle of ...
Full text

PDF
3.
Full text

PDF
4.
Full text
5.
  • On the dynamical behaviour ... On the dynamical behaviour of linear higher-order cellular automata and its decidability
    Dennunzio, Alberto; Formenti, Enrico; Manzoni, Luca ... Information sciences, June 2019, 2019-06-00, 2019-06, Volume: 486
    Journal Article
    Peer reviewed
    Open access

    Higher-order cellular automata (HOCA) are a variant of cellular automata (CA) used in many applications (ranging, for instance, from the design of secret sharing schemes to data compression and image ...
Full text

PDF
6.
  • Simulation and evaluation o... Simulation and evaluation of conflict interactions in information systems
    Goncharov, N I; Dushkin, A V; Goncharov, I V ... Journal of physics. Conference series, 04/2019, Volume: 1203, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    The work describes the scenario of conflict interactions in information system and intruder security using the formalism of hybrid automata. Analysis of probability of winning on both sides in the ...
Full text

PDF
7.
  • Novel quantum image encrypt... Novel quantum image encryption using one-dimensional quantum cellular automata
    Yang, Yu-Guang; Tian, Ju; Lei, He ... Information sciences, 06/2016, Volume: 345
    Journal Article
    Peer reviewed

    We investigate the application of quantum cellular automata in image encryption and propose a novel quantum gray-scale image encryption algorithm based on one-dimensional quantum cellular automata. ...
Full text
8.
  • Accuracy Improved Low-Energ... Accuracy Improved Low-Energy Multi-Bit Approximate Adders in QCA
    Perri, S.; Spagnolo, F.; Frustaci, F. ... IEEE transactions on circuits and systems. II, Express briefs, 11/2021, Volume: 68, Issue: 11
    Journal Article
    Peer reviewed

    The conjunction of approximate computing and emerging nanotechnology could lead to very powerful and energy efficient integrated infrastructures in the near future. Research in this field is already ...
Full text
9.
  • Simulation limitations of a... Simulation limitations of affine cellular automata
    Hudcová, Barbora; Krásenský, Jakub Theoretical computer science, 07/2024, Volume: 1003
    Journal Article
    Peer reviewed
    Open access

    Cellular automata are a famous model of computation, yet it is still a challenging task to assess the computational capacity of a given automaton; especially when it comes to showing negative ...
Full text
10.
  • 3D image steganography usin... 3D image steganography using cellular automata transform and depth estimation network
    Liu, Xin; Wu, Qiming; Zuo, Zhuo ... Optics communications, 01/2024, Volume: 550
    Journal Article
    Peer reviewed

    Traditional 3D image steganography is cumbersome and difficult owing to the special structure of 3D image, imposing a practical limit for its applications. Herein, we propose a 3D image steganography ...
Full text
1 2 3 4 5
hits: 18,617

Load filters