researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Complexity
Home
Index
Info
Volume
Volume
9
, Issue
6
3
--
0
Peter Schuster
,
Alfred W. Hübler
.
Good-bye and thank you to our complexity-at-large editors
13
--
14
Harold J. Morowitz
.
Mona Lisa and the second law of thermodynamics: The arts and sciences
15
--
24
Yaneer Bar-Yam
.
A mathematical theory of strong emergence using multiscale variety
25
--
32
Amir Ayali
,
E. Fuchs
,
Y. Zilberstein
,
A. Robinson
,
Orit Shefi
,
Eyal Hulata
,
Itay Baruchi
,
Eshel Ben-Jacob
.
Contextual regularity and complexity of neuronal activity: From stand-alone cultures to task-performing animals
33
--
42
Eduardo Mizraji
.
The emergence of dynamical complexity: An exploration using elementary cellular automata
43
--
51
Klaus Jaffe
.
Sex promotes gamete selection: A quantitative comparative study of features favoring the evolution of sex
52
--
56
Andreas Koch
,
Mich Tvede
.
A model of sex-based social stability
Volume
9
, Issue
5
3
--
7
John L. Casti
.
Fractalmania
8
--
16
John H. Miller
,
Scott E. Page
.
The standing ovation problem
17
--
24
Matthew A. Cronin
.
A model of knowledge activation and insight in problem solving
25
--
30
Margo Bergman
.
Examining risk attitudes
31
--
40
John H. Miller
,
Scott Moser
.
Communication and coordination
41
--
50
Nobuyuki Hanaki
.
Action learning versus strategy learning
51
--
61
Troy Tassier
.
A model of fads, fashions, and group formation
62
--
70
Elizabeth Maggie Penn
.
Institutions and sorting in a model of metropolitan fragmentation
71
--
78
Jim Engle-Warnick
.
The advantage of complexity in two 2×2 games
Volume
9
, Issue
4
10
--
11
Wentian Li
,
Ivo Grosse
.
Comments on linguistic features in eukaryotic genomes
12
--
0
Panagiotis A. Tsonis
,
Anastasios A. Tsonis
.
Reply to Li and Grosse s comments on linguistic features in eukaryotic genomes
13
--
14
Peter Schuster
.
The disaster of central control
15
--
16
Barry G. Condron
,
John Chen
.
Mapping structure and connectivity
17
--
23
Qingfu Zhang
.
On the convergence of a factorized distribution algorithm with truncation selection
24
--
30
Andreas Krause
.
Predicting crashes in a model of evolving networks
31
--
36
M. F. Laguna
,
Guillermo Abramson
,
Damián H. Zanette
.
Minorities in a model for opinion formation
37
--
45
Yaneer Bar-Yam
.
Multiscale variety in complex systems
46
--
0
Stephanie Bryant
,
Feiyi Wang
.
Stephanie Bryant and Feiyi Wang, Aspects of adaptive reconfiguration in a scalable intrusion tolerant system, ::::Complexity:::: (2004) 9(2)74-83
Volume
9
, Issue
3
3
--
9
.
Complexity at large
10
--
13
John L. Casti
.
A demon of efficiency
14
--
21
Eric J. Chaisson
.
Complexity: An energetics agenda
22
--
28
Beáta Oborny
.
External and internal control in plant development
29
--
31
.
Emergence from the cosmos to culture
32
--
40
Richard R. Brooks
,
Christopher Griffin
,
T. Alan Payne
.
A cellular automata model can quickly approximate UDP and TCP network traffic
41
--
46
Marcelino Quito Jr.
,
Christopher Monterola
,
Caesar Saloma
.
Memory and ::::a priori:::: best strategy in complex adaptive systems
Volume
9
, Issue
2
3
--
10
.
Complexity at large
11
--
12
Harold J. Morowitz
.
How many genes does an organism need?
13
--
14
Robert A. Ghanea-Hercock
.
Resilient and adaptive defense of computing networks
15
--
18
Todd Hughes
,
Oleg Sheyner
.
Attack scenario graphs for computer network threat analysis and prediction
19
--
33
Stephen Bush
.
Genetically induced communication network fault tolerance
34
--
40
Matthew M. Williamson
.
Resilient infrastructure for network security
41
--
48
Derek Armstrong
,
Sam Carter
,
Gregory Frazier
,
Tiffany Frazier
.
Autonomic defense: Thwarting automated attacks via real-time feedback control
49
--
53
Fabrice Saffre
,
Robert A. Ghanea-Hercock
.
Beyond anarchy: Self-organized topology for peer-to-peer networks
54
--
73
Sanjay Goel
,
Stephen Bush
.
Kolmogorov complexity estimates for detection of viruses in biologically inspired security systems: A comparison with traditional approaches
74
--
83
Stephanie Bryant
,
Feiyi Wang
.
Aspects of adaptive reconfiguration in a scalable intrusion tolerant system
Volume
9
, Issue
1
11
--
12
Harold J. Morowitz
.
Computers and biology
13
--
22
Jürgen Klüver
.
The evolution of social geometry
23
--
27
Raghuram Iyengar
,
Rajeev Kohli
.
Why Parrondo s paradox is irrelevant for utility theory, stock buying, and the emergence of life
28
--
30
.
Man of principle
31
--
37
Robert M. Leve
.
Informational acquisition and cognitive models
38
--
55
Eleonora Bilotta
,
Antonio Lafusa
,
Pietro Pantano
.
Life-like self-reproducers
56
--
60
David Smyth
,
Alfred W. Hübler
.
A conductivity-dependent phase transition from closed-loop to open-loop dendritic networks