Image Processing Reference
In-Depth Information
References
1. Abelson, H., Allen, D., Coore, D., Hanson, C., Homsy, G., Thomas, F., Knight, J.,
Nagpal, R., Rauch, E., Sussman, G.J., Weiss, R.: Amorphous computing. Commun.
ACM 43(5), 74-82 (2000)
2. Acerbi, L., Dennunzio, A., Formenti, E.: Conservation of some dynamical properties
for operations on cellular automata. Theoretical Computer Science 410(38-40), 3685-
3693 (2009)
3. Aceti, L., Milovac, T.: Geometries of the sublime. Leonardo Electronic Almanac
(ISEA2011 Istanbul: Uncontainable) 18(5), 329-344 (2011)
4. Adamatzky, A.: Identification of Cellular Automata. Taylor & Francis (1994)
5. Adamatzky, A.: Voronoi-like partition of lattice in cellular automata. Mathematical and
Computer Modelling 23(16), 51-66 (1996)
6. Adamatzky, A.: Computing in nonlinear media and automata collectives. IOP Publish-
ing Ltd., Bristol (2001)
7. Adamatzky, A.: Programming reaction-diffusion computers (2005)
8. Adamatzky, A., Bull, L.: Are complex systems hard to evolve? Complexity 14(6), 15-
20 (2009)
9. Adamatzky, A., Costello, B.D.L., Asai, T.: Reaction-Diffusion Computers. Elsevier Sci-
ence Inc., New York (2005)
10. Adleman, L.M.: Computing with DNA. Scientific American 279(2), 54-61 (1998)
11. Ahuja, M., Loeb, L.: Tessellations in Islamic calligraphy. Leonardo, vol. 28, pp. 41-45.
The MIT Press (1995)
12. Alonso-Sanz, R.: A structurally dynamic cellular automaton with memory in the trian-
gular tessellation. Complex-Systems 17(1), 1-15 (2007)
13. Altuwaijri, M., Bayoumi, M.: A new thinning algorithm for Arabic characters using
self-organizing neural network. In: 1995 IEEE International Symposium on Circuits
and Systems, ISCAS 1995, vol. 3, pp. 1824-1827 (1995)
14. Amanatiadis, A., Andreadis, I., Gasteratos, A.: A log-polar interpolation applied to im-
age scaling. In: IEEE International Workshop on Imaging Systems and Techniques, pp.
1-5. IEEE, Cracovia (2007)
15. Amatriain, X., Kuchera-Morin, J., Hollerer, T., Pope, S.T.: The AlloSphere: Immersive
multimedia for scientific discovery and artistic exploration. IEEE MultiMedia, 64-75
(2009)
16. Amerini, I., Ballan, L., Caldelli, R., Bimbo, A.D., Serra, G.: A SIFT-based forensic
method for copy-move attack detection and transformation recovery. IEEE Transactions
on Information Forensics and Security 6(3), 1099-1110 (2011)
Search WWH ::




Custom Search