— The paper focuses on the problem how a community of distributed agents may autonomously invent and coordinate lexicons and grammars. Although our earlier experiments have shown...
The cryptanalysis of the cryptographic hash function Tiger has, until now, focussed on finding collisions. In this paper we describe a preimage attack on the compression function ...
: We study the parametric controls of self-adjusting systems with numerical models. We investigate the situation where the target dynamics changes slowly and passes through a chaot...