Results 41 to 50 of about 893,053 (74)

Orbits of the Bernoulli measure in single-transition asynchronous cellular automata [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2011
We study iterations of the Bernoulli measure under nearest-neighbour asynchronous binary cellular automata (CA) with a single transition. For these CA, we show that a coarse-level description of the orbit of the Bernoulli measure can be obtained, that is,
Henryk Fukś, Andrew Skelton
doaj   +1 more source

A Note on the Transience of Critical Branching Random Walks on the Line [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2008
Gantert and Müller (2006) proved that a critical branching random walk (BRW) on the integer lattice is transient by analyzing this problem within the more general framework of branching Markov chains and making use of Lyapunov functions. The main purpose
Gerold Alsmeyer, Matthias Meiners
doaj   +1 more source

The structure of communication problems in cellular automata [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2011
Studying cellular automata with methods from communication complexity appears to be a promising approach. In the past, interesting connections between communication complexity and intrinsic universality in cellular automata were shown.
Raimundo Briceño   +1 more
doaj   +1 more source

Spectral theory of dynamical systems [PDF]

open access: yesarXiv, 2020
This is a survey on spectral theory of dynamical systems.
arxiv  

A functional limit law for the profile of plane-oriented recursive trees. [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2008
We give a functional limit law for the normalized profile of random plane-oriented recursive trees. The proof uses martingale convergence theorems in discrete and continuous-time. This complements results of Hwang (2007).
Henning Sulzbach
doaj   +1 more source

NOCAS : A Nonlinear Cellular Automata Based Stream Cipher [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2011
LFSR and NFSR are the basic building blocks in almost all the state of the art stream ciphers like Trivium and Grain-128. However, a number of attacks are mounted on these type of ciphers.
Sandip Karmakar, Dipanwita Roy Chowdhury
doaj   +1 more source

Conservation Laws and Invariant Measures in Surjective Cellular Automata [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2011
We discuss a close link between two seemingly different topics studied in the cellular automata literature: additive conservation laws and invariant probability measures.
Jarkko Kari, Siamak Taati
doaj   +1 more source

Projective subdynamics and universal shifts [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2011
We study the projective subdynamics of two-dimensional shifts of finite type, which is the set of one-dimensional configurations that appear as columns in them.
Pierre Guillon
doaj   +1 more source

Selfsimilarity, Simulation and Spacetime Symmetries [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2011
We study intrinsic simulations between cellular automata and introduce a new necessary condition for a CA to simulate another one. Although expressed for general CA, this condition is targeted towards surjective CA and especially linear ones.
Vincent Nesme, Guillaume Theyssier
doaj   +1 more source

General self-similarity: an overview [PDF]

open access: yesIn Real and Complex Singularities (Proceedings of the Australian-Japanese Workshop, Sydney, 2005), World Scientific, 2007, 2004
Informal seminar notes explaining the ideas in math.DS/0411344 and math.DS/0411345.
arxiv  

Home - About - Disclaimer - Privacy