<--- Back to Details
First PageDocument Content
Cellular automata / Computer science / Norman Margolus / Cellular automaton / Reversible computing / Billiard ball computer / Programmable matter / Computation / Tommaso Toffoli / Models of computation / Theoretical computer science / Applied mathematics
Date: 2005-01-16 13:06:03
Cellular automata
Computer science
Norman Margolus
Cellular automaton
Reversible computing
Billiard ball computer
Programmable matter
Computation
Tommaso Toffoli
Models of computation
Theoretical computer science
Applied mathematics

A Bridge of Bits Norman Margolus Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, MAJuly 1992

Add to Reading List

Source URL: people.csail.mit.edu

Download Document from Source Website

File Size: 112,36 KB

Share Document on Facebook

Similar Documents

MultiVAC: A High-Throughput Flexible Public Blockchain Based on Trusted Sharding Computation  MultiVAC Foundation June, 2018, version 0.1 Abstract: MultiVAC is a next-generation high-performance public blockch

MultiVAC: A High-Throughput Flexible Public Blockchain Based on Trusted Sharding Computation MultiVAC Foundation June, 2018, version 0.1 Abstract: MultiVAC is a next-generation high-performance public blockch

DocID: 1xVSb - View Document

MATHEMATICS OF COMPUTATION Volume 00, Number 0, Pages 000–000 SXXBETTER POLYNOMIALS FOR GNFS SHI BAI, CYRIL BOUVIER, ALEXANDER KRUPPA, AND PAUL ZIMMERMANN

MATHEMATICS OF COMPUTATION Volume 00, Number 0, Pages 000–000 SXXBETTER POLYNOMIALS FOR GNFS SHI BAI, CYRIL BOUVIER, ALEXANDER KRUPPA, AND PAUL ZIMMERMANN

DocID: 1xVRE - View Document

Taking proof-based verified computation a few steps closer to practicality1 Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, and Michael Walfish The University of Texas at Austin Abstract. W

Taking proof-based verified computation a few steps closer to practicality1 Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, and Michael Walfish The University of Texas at Austin Abstract. W

DocID: 1xVQw - View Document

Circuits Resilient to Additive Attacks with Applications to Secure Computation Daniel Genkin Yuval Ishai

Circuits Resilient to Additive Attacks with Applications to Secure Computation Daniel Genkin Yuval Ishai

DocID: 1xVN3 - View Document

MATHEMATICS OF COMPUTATION Volume 00, Number 0, Pages 000–000 SXXAN L(1/3) ALGORITHM FOR IDEAL CLASS GROUP AND REGULATOR COMPUTATION IN CERTAIN NUMBER FIELDS

MATHEMATICS OF COMPUTATION Volume 00, Number 0, Pages 000–000 SXXAN L(1/3) ALGORITHM FOR IDEAL CLASS GROUP AND REGULATOR COMPUTATION IN CERTAIN NUMBER FIELDS

DocID: 1xVGU - View Document