Kid Chaos

Known as: Kid Vicious 
Kid Chaos (also known as Kid Vicious) is a side-scrolling platform video game that Magnetic Fields developed, and Ocean Software published, for the… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
This paper is concerned with a problem that arises within ethical frameworks that imply that it is wrong for humans to consume… (More)
Is this relevant?
2010
2010
We propose a new semantics for the inclusive converging gateway (also known as Or-join). The new semantics coincides with the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
Guttmann and Vöge introduced a model of f -friendly walkers and argued that a generating function for the number of n-walker… (More)
  • figure 1
  • figure 2
Is this relevant?
2006
2006
Dear KV, I'm on a small team that is building a custom, embedded, consumer device that is due out by Christmas. Of course the… (More)
Is this relevant?
2004
2004
Abstract. We show how a formula concerning “vicious walkers” (which basically are nonintersecting lattice paths) on the cylinder… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2003
2003
We consider the diffusion scaling limit of the vicious walkers, which is a model of nonintersecting random walks. We show a… (More)
  • figure 1
  • figure 2
Is this relevant?
2003
2003
HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they… (More)
  • figure 1
Is this relevant?
2002
2002
In an earlier paper [4] the problem of vicious random walkers on a d-dimensional directed lattice was considered. \Vicious… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2000
2000
We derive new results for the number of star and watermelon configurations of vicious walkers in the presence of an impenetrable… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
1998
1998
Attacks on servers that provide anonymity generally fall into two categories: attempts to expose anonymous users and attempts to… (More)
  • figure 1
Is this relevant?