Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Miroslaw Kutylowski
2010 – today
- 2013
[j30]Blazej Brzezniak, Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski: Attack against Ibrahim's Distributed Key Generation for RSA. I. J. Network Security 15(4): 313-316 (2013)
[c95]Lucjan Hanzlik, Lukasz Krzywiecki, Miroslaw Kutylowski: Simplified PACE|AA Protocol. ISPEC 2013: 218-232
[e6]Miroslaw Kutylowski, Moti Yung (Eds.): Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7763, Springer 2013, ISBN 978-3-642-38518-6- 2012
[j29]Marek Klonowski, Miroslaw Kutylowski, Jan Zatopianski: Energy efficient alert in single-hop networks of extremely weak devices. Theor. Comput. Sci. 453: 65-74 (2012)
[j28]Jacek Cichon, Zbigniew Golebiewski, Miroslaw Kutylowski: From key predistribution to key redistribution. Theor. Comput. Sci. 453: 75-87 (2012)
[c94]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski, Michal Tabor, Daniel Wachnik: Lightweight Certificates - Towards a Practical Model for PKI. BIS 2012: 296-307
[c93]Przemyslaw Blaskiewicz, Miroslaw Kutylowski, Wojciech Wodo, Kamil Wolny: Extreme Propagation in an Ad-Hoc Radio Network - Revisited. ICCCI (2) 2012: 142-151
[c92]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski: Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees. INTRUST 2012: 5-24
[c91]Lukasz Krzywiecki, Miroslaw Kutylowski: Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques. NSS 2012: 305-319
[c90]Miroslaw Kutylowski, Maciej Gebala: Optimizing Segment Based Document Protection. SOFSEM 2012: 566-575
[c89]Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak, Miroslaw Kutylowski: Restricted Identification without Group Keys. TrustCom 2012: 1194-1199
[i6]Marcin Kik, Maciej Gebala, Miroslaw Kutylowski: One-side Energy costs of the RBO receiver. CoRR abs/1209.4605 (2012)
[i5]Miroslaw Kutylowski, Maciej Gebala: Optimizing Segment Based Document Protection (Corrected Version). IACR Cryptology ePrint Archive 2012: 520 (2012)- 2011
[c88]Miroslaw Kutylowski, Anna Lauks-Dutka: Challenges for Electronic Identity Documents. BIS (Workshops) 2011: 256-257
[c87]Miroslaw Kutylowski, Przemyslaw Blaskiewicz, Lukasz Krzywiecki, Przemyslaw Kubiak, Wieslaw Paluszynski, Michal Tabor: Technical and Legal Meaning of "Sole Control" - Towards Verifiability in Signing Systems. BIS (Workshops) 2011: 270-281
[c86]
[c85]Miroslaw Kutylowski, Lukasz Krzywiecki, Przemyslaw Kubiak, Michal Koza: Restricted Identification Scheme and Diffie-Hellman Linking Problem. INTRUST 2011: 221-238
[c84]Marek Klonowski, Michal Koza, Miroslaw Kutylowski: How to Transmit Messages via WSN in a Hostile Environment. SECRYPT 2011: 387-390
[c83]Lukasz Krzywiecki, Miroslaw Kutylowski: Coalition Resistant Anonymous Broadcast Encryption Scheme Based on PUF. TRUST 2011: 48-62- 2010
[j27]Nikita Borisov, Marek Klonowski, Miroslaw Kutylowski, Anna Lauks-Dutka: Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach. TIIS 4(3): 380-399 (2010)
[c82]Przemyslaw Kubiak, Miroslaw Kutylowski, Jun Shao: How to Construct State Registries-Matching Undeniability with Public Security. ACIIDS (1) 2010: 64-73
[c81]Marek Klonowski, Michal Koza, Miroslaw Kutylowski: Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems. ACISP 2010: 391-402
[c80]Jacek Cichon, Zbigniew Golebiewski, Miroslaw Kutylowski: From Key Predistribution to Key Redistribution. ALGOSENSORS 2010: 92-104
[c79]Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks-Dutka, Michal Tabor: Mediated Signatures - Towards Undeniability of Digital Data in Technical and Legal Framework. BIS (Workshops) 2010: 298-309
[c78]Lukasz Krzywiecki, Miroslaw Kutylowski, Hubert Misztela, Tomasz Struminski: Private Information Retrieval with a Trusted Hardware Unit - Revisited. Inscrypt 2010: 373-386
[c77]Przemyslaw Blaskiewicz, Przemyslaw Kubiak, Miroslaw Kutylowski: Digital Signatures for e-Government - A Long-Term Security Architecture. e-Forensics 2010: 256-270
[c76]Przemyslaw Blaskiewicz, Przemyslaw Kubiak, Miroslaw Kutylowski: Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress. INTRUST 2010: 173-188
[c75]Lukasz Krzywiecki, Miroslaw Kutylowski: Lagrangian E-Voting: Verifiability on Demand and Strong Privacy. TRUST 2010: 109-123
[c74]Miroslaw Kutylowski, Filip Zagórski: Scratch, Click & Vote: E2E Voting over the Internet. Towards Trustworthy Elections 2010: 343-356
[e5]David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida (Eds.): Towards Trustworthy Elections, New Directions in Electronic Voting. Lecture Notes in Computer Science 6000, Springer 2010, ISBN 978-3-642-12979-7
2000 – 2009
- 2009
[j26]Marek Klonowski, Lukasz Krzywiecki, Miroslaw Kutylowski, Anna Lauks: Step-out group signatures. Computing 85(1-2): 137-151 (2009)
[j25]Marek Klonowski, Michal Koza, Miroslaw Kutylowski: Security Challenges for Wireless Sensor Networks. ERCIM News 2009(76) (2009)
[c73]Zbigniew Golebiewski, Michal Koza, Marek Klonowski, Miroslaw Kutylowski: Leader Election for Multi-channel Radio Networks - Dependent versus Independent Trials. ACIIDS 2009: 477-482
[c72]Zbigniew Golebiewski, Marek Klonowski, Michal Koza, Miroslaw Kutylowski: Towards Fair Leader Election in Wireless Networks. ADHOC-NOW 2009: 166-179
[c71]Jacek Cichon, Jaroslaw Grzaslewicz, Miroslaw Kutylowski: Key Levels and Securing Key Predistribution against Node Captures. ALGOSENSORS 2009: 64-75
[c70]Marek Klonowski, Miroslaw Kutylowski, Jan Zatopianski: Energy Efficient Alert in Single-Hop Networks of Extremely Weak Devices. ALGOSENSORS 2009: 139-150
[c69]Nikita Borisov, Marek Klonowski, Miroslaw Kutylowski, Anna Lauks-Dutka: Attacking and Repairing the Improved ModOnions Protocol. ICISC 2009: 258-273
[e4]Miroslaw Kutylowski, Witold Charatonik, Maciej Gebala (Eds.): Fundamentals of Computation Theory, 17th International Symposium, FCT 2009, Wroclaw, Poland, September 2-4, 2009. Proceedings. Lecture Notes in Computer Science 5699, Springer 2009, ISBN 978-3-642-03408-4- 2008
[j24]Lukasz Krzywiecki, Miroslaw Kutylowski, Maciej Nikodem: General anonymous key broadcasting via Lagrangian interpolation. IET Information Security 2(3): 79-84 (2008)
[j23]Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada: Adaptive initialization algorithm for ad hoc radio networks with carrier sensing. Theor. Comput. Sci. 402(1): 16-28 (2008)
[c68]Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski: Distributed Verification of Mixing - Local Forking Proofs Model. ACISP 2008: 128-140
[c67]Marek Klonowski, Miroslaw Kutylowski, Anna Lauks: Repelling Detour Attack Against Onions with Re-encryption. ACNS 2008: 296-308
[c66]Marcin Gomulkiewicz, Miroslaw Kutylowski, Pawel Wlaz: Random Fault Attack against Shrinking Generator. ALGOSENSORS 2008: 87-99
[c65]Zbigniew Golebiewski, Miroslaw Kutylowski, Tomasz Luczak, Filip Zagórski: Self-stabilizing population of mobile agents. IPDPS 2008: 1-8
[c64]Marek Klonowski, Lukasz Krzywiecki, Miroslaw Kutylowski, Anna Lauks: Step-Out Ring Signatures. MFCS 2008: 431-442
[c63]Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada: Power of Discrete Nonuniformity - Optimizing Access to Shared Radio Channel in Ad Hoc Networks. MSN 2008: 9-15
[c62]Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski: Privacy Protection for RFID with Hidden Subset Identifiers. Pervasive 2008: 298-314
[c61]Jacek Cichon, Miroslaw Kutylowski, Bogdan Weglorz: Short Ballot Assumption and Threeballot Voting Protocol. SOFSEM 2008: 585-598
[c60]Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski: Practical Deniable Encryption. SOFSEM 2008: 599-609
[e3]Miroslaw Kutylowski, Jacek Cichon, Przemyslaw Kubiak (Eds.): Algorithmic Aspects of Wireless Sensor Networks, Third International Workshop, ALGOSENSORS 2007, Wroclaw, Poland, July 14, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4837, Springer 2008, ISBN 978-3-540-77870-7
[e2]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan (Eds.): Frontiers of Electronic Voting, 29.07. - 03.08.2007. Dagstuhl Seminar Proceedings 07311, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008
[i4]Miroslaw Kutylowski, Filip Zagórski: Scratch, Click & Vote: E2E voting over the Internet. IACR Cryptology ePrint Archive 2008: 314 (2008)- 2007
[j22]Miroslaw Kutylowski: Tagung "Frontiers of E-Voting", 29. Juli bis 3. August auf Schloss Dagstuhl. Datenschutz und Datensicherheit 31(9): 718 (2007)
[c59]Miroslaw Kutylowski: Algorithmic Challenges for Sensor Networks - Foreword to ALGOSENSORS 2007. ALGOSENSORS 2007: 1-5
[c58]Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk: Forward-Secure Key Evolution in Wireless Sensor Networks. CANS 2007: 102-120
[c57]Przemyslaw Kubiak, Miroslaw Kutylowski, Filip Zagórski: Kleptographic attacks on a cascade of mix servers. ASIACCS 2007: 57-62
[c56]
[c55]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan: 07311 Executive Summary -- Frontiers of Electronic Voting. Frontiers of Electronic Voting 2007
[c54]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan: 07311 Abstracts Collection -- Frontiers of Electronic Voting. Frontiers of Electronic Voting 2007
[c53]Miroslaw Kutylowski, Filip Zagórski: Verifiable Internet Voting Solving Secure Platform Problem. IWSEC 2007: 199-213
[c52]Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski: Privacy Protection in Dynamic Systems Based on RFID Tags. PerCom Workshops 2007: 235-240
[i3]Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk: Forward-secure Key Evolution in Wireless Sensor Networks. IACR Cryptology ePrint Archive 2007: 237 (2007)- 2006
[c51]Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada: Initialization for Ad Hoc Radio Networks with Carrier Sensing and Collision Detection. ADHOC-NOW 2006: 308-320
[c50]Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada: Adaptive Initialization Algorithm for Ad Hoc Radio Networks with Carrier Sensing. ALGOSENSORS 2006: 35-46
[c49]Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski: Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks. CANS 2006: 191-202
[c48]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski: A Revocation Scheme Preserving Privacy. Inscrypt 2006: 130-143
[c47]Marcin Gomulkiewicz, Miroslaw Kutylowski, Pawel Wlaz: Fault Jumping Attacks against Shrinking Generator. Complexity of Boolean Functions 2006
[c46]Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski: Kleptographic Attacks on E-Voting Schemes. ETRICS 2006: 494-508
[c45]Piotr Borzecki, Jedrzej Kabarowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Filip Zagórski: Kleptographic Weaknesses in Benaloh-Tuinstra Protocol. ICSNC 2006: 26
[c44]Jedrzej Kabarowski, Miroslaw Kutylowski, Wojciech Rutkowski: Adversary Immune Size Approximation of Single-Hop Radio Networks. TAMC 2006: 148-158
[c43]Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks: How to Protect a Signature from Being Shown to a Third Party. TrustBus 2006: 192-202
[c42]Marcin Gomulkiewicz, Miroslaw Kutylowski, Pawel Wlaz: Fault Cryptanalysis and the Shrinking Generator. WEA 2006: 61-72- 2005
[j21]Tomasz Jurdzinski, Miroslaw Kutylowski, Jan Zatopianski: Efficient simulation of synchronous systems by multi-speed systems. ITA 39(2): 403-419 (2005)
[c41]Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski: Local View Attack on Anonymous Communication. ESORICS 2005: 475-488
[c40]Ryszard Grzaslewicz, Jaroslaw Kutylowski, Miroslaw Kutylowski, Wojciech Pietkiewicz: Robust Undetectable Interference Watermarks. ICCSA (2) 2005: 517-526
[c39]Marek Klonowski, Miroslaw Kutylowski: Provable Anonymity for Networks of Mixes. Information Hiding 2005: 26-38
[c38]Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski: A Practical Voting Scheme with Receipts. ISC 2005: 490-497
[c37]Marek Klonowski, Miroslaw Kutylowski, Bartlomiej Rózanski: Hiding Data Sources in P2P Networks. IWAP 2005: 225-239
[c36]Jacek Cichon, Lukasz Krzywiecki, Miroslaw Kutylowski, Pawel Wlaz: Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems. MADNES 2005: 96-109
[c35]Marek Klonowski, Miroslaw Kutylowski, Filip Zagórski: Anonymous Communication with On-line and Off-line Onion Encoding. SOFSEM 2005: 229-238
[c34]Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski: Conditional Digital Signatures. TrustBus 2005: 206-215
[c33]Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich Theodor Vierhaus, Pawel Wlaz: Synchronization Fault Cryptanalysis for Breaking A5/1. WEA 2005: 415-427- 2004
[c32]Miroslaw Kutylowski, Wojciech Rutkowski: Secure Initialization in Single-Hop Radio Networks. ESAS 2004: 31-41
[c31]
[c30]Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski: Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps! ISC 2004: 354-366
[c29]Maciej Gebala, Miroslaw Kutylowski, Bartlomiej Rózanski, Marcin Zawada, J. Vossnacker, T. Winter: Optimized UTRAN Topology Planning Including Point-to-Multipoint Equipment. MMB 2004: 87-92
[c28]Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski: Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack. WISA 2004: 400-410- 2003
[j20]Tomasz Jurdzinski, Miroslaw Kutylowski, Jan Zatopianski: Weak communication in single-hop radio networks: adjusting algorithms to industrial standards. Concurrency and Computation: Practice and Experience 15(11-12): 1117-1131 (2003)
[c27]Miroslaw Kutylowski, Wojciech Rutkowski: Adversary Immune Leader Election in ad hoc Radio Networks. ESA 2003: 397-408
[c26]Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski: Rapid Mixing and Security of Chaum's Visual Electronic Voting. ESORICS 2003: 132-145
[c25]Miroslaw Kutylowski, Daniel Letkiewicz: Computing Average Value in Ad Hoc Networks. MFCS 2003: 511-520- 2002
[c24]Tomasz Jurdzinski, Miroslaw Kutylowski, Jan Zatopianski: Energy-Efficient Size Approximation of Radio Networks with No Collision Detection. COCOON 2002: 279-289
[c23]Marcin Gomulkiewicz, Miroslaw Kutylowski: Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense. ESORICS 2002: 90-103
[c22]Tomasz Jurdzinski, Miroslaw Kutylowski, Jan Zatopianski: Weak Communication in Radio Networks. Euro-Par 2002: 965-972
[c21]Tomasz Jurdzinski, Miroslaw Kutylowski, Jan Zatopianski: Efficient algorithms for leader election in radio networks. PODC 2002: 51-57- 2001
[c20]Tomasz Jurdzinski, Miroslaw Kutylowski: Communication Gap for Finite Memory Devices. ICALP 2001: 1052-1064
[c19]Tomasz Jurdzinski, Miroslaw Kutylowski, Jan Zatopianski: Communication Complexity for Asynchronous Systems of Finite Devices. IPDPS 2001: 139- 2000
[j19]Miroslaw Kutylowski, Krzysztof Lorys, Brigitte Oesterdiekhoff, Rolf Wanka: Periodification scheme: constructing sorting networks with constant period. J. ACM 47(5): 944-967 (2000)
[j18]Artur Czumaj, Miroslaw Kutylowski: Delayed path coupling and generating random permutations. Random Struct. Algorithms 17(3-4): 238-259 (2000)
[c18]Friedhelm Meyer auf der Heide, Miroslaw Kutylowski, Prabhakar Ragde: Complexity Theory and Algorithms. Euro-Par 2000: 455
1990 – 1999
- 1999
[c17]Tomasz Jurdzinski, Miroslaw Kutylowski, Krzysztof Lorys: Multi-party Finite Computations. COCOON 1999: 318-329
[c16]
[c15]Artur Czumaj, Przemyslawa Kanarek, Miroslaw Kutylowski, Krzysztof Lorys: Delayed Path Coupling and Generating Random Permutations via Distributed Stochastic Processes. SODA 1999: 271-280
[e1]Miroslaw Kutylowski, Leszek Pacholski, Tomasz Wierzbicki (Eds.): Mathematical Foundations of Computer Science 1999, 24th International Symposium, MFCS'99, Szklarska Poreba, Poland, September 6-10, 1999, Proceedings. Lecture Notes in Computer Science 1672, Springer 1999, ISBN 3-540-66408-4- 1998
[j17]Artur Czumaj, Przemyslawa Kanarek, Miroslaw Kutylowski, Krzysztof Lorys: Fast Generation of Random Permutations Via Networks Simulation. Algorithmica 21(1): 2-20 (1998)
[j16]Miroslaw Kutylowski, Krzysztof Lorys, Brigitte Oesterdiekhoff: Periodic Merging Networks. Theory Comput. Syst. 31(5): 551-578 (1998)
[c14]Pavol Duris, Tomasz Jurdzinski, Miroslaw Kutylowski, Krzysztof Lorys: Power of Cooperation and Multihead Finite Systems. ICALP 1998: 896-907
[c13]Micah Adler, Wolfgang Dittrich, Ben H. H. Juurlink, Miroslaw Kutylowski, Ingo Rieping: Communication-Optimal Parallel Minimum Spanning Tree Algorithms (Extended Abstract). SPAA 1998: 27-36- 1997
[j15]Torben Hagerup, Miroslaw Kutylowski: Fast Integer Merging on the EREW PRAM. Algorithmica 17(1): 55-66 (1997)
[c12]Miroslaw Kutylowski, Rolf Wanka: Playing Tetris on Meshes and Multi-Dimensional SHEARSORT. ISAAC 1997: 32-41- 1996
[j14]Faith E. Fich, Russell Impagliazzo, Bruce M. Kapron, Valerie King, Miroslaw Kutylowski: Limits on the Power of Parallel Random Access Machines with Weak Forms of Write Conflict Resolution. J. Comput. Syst. Sci. 53(1): 104-111 (1996)
[j13]Martin Dietzfelbinger, Miroslaw Kutylowski, Rüdiger Reischuk: Feasible Time-Optimal Algorithms for Boolean Functions on Exclusive-Write Parallel Random-Access Machines. SIAM J. Comput. 25(6): 1196-123 (1996)
[c11]Artur Czumaj, Przemyslawa Kanarek, Miroslaw Kutylowski, Krzysztof Lorys: Fast Generation of Random Permutations via Networks Simulation. ESA 1996: 246-260
[c10]Miroslaw Kutylowski, Krzysztof Lorys: Limitations of the QRQW and EREW PRAM Models. FSTTCS 1996: 310-321
[c9]Miroslaw Kutylowski, Tomasz Wierzbicki: Approximate Compaction and Padded-Sorting on Exclusive Write PRAMs. IPPS 1996: 174-181
[c8]Miroslaw Kutylowski, Krzysztof Lorys, Brigitte Oesterdiekhoff: Periodic Merging Networks. ISAAC 1996: 336-345
[i2]Artur Czumaj, Przemyslawa Kanarek, Miroslaw Kutylowski, Krzysztof Lorys: Fast Generation of Random Permutations via Networks Simulation. Universität Trier, Mathematik/Informatik, Forschungsbericht 96-26 (1996)- 1995
[j12]Faith E. Fich, Miroslaw Kowaluk, Miroslaw Kutylowski, Krzysztof Lorys, Prabhakar Ragde: Retrieval of Scattered Information by EREW, CREW, and CRCW PRAMs. Computational Complexity 5(2): 113-131 (1995)
[i1]Martin Dietzfelbinger, Miroslaw Kutylowski, Rüdiger Reischuk: Feasible Time-Optimal Algorithms for Boolean Functions on Exclusive-Write PRAMs. Electronic Colloquium on Computational Complexity (ECCC) 2(4) (1995)- 1994
[j11]Martin Dietzfelbinger, Miroslaw Kutylowski, Rüdiger Reischuk: Exact Lower Time Bounds for Computing Boolean Functions on CREW PRAMs. J. Comput. Syst. Sci. 48(2): 231-254 (1994)
[j10]Paul Beame, Miroslaw Kutylowski, Marcin Kik: Information Broadcasting by Exclusive-Read Prams. Parallel Processing Letters 4: 159-169 (1994)
[c7]Miroslaw Kutylowski, Krzysztof Lorys, Brigitte Oesterdiekhoff, Rolf Wanka: Fast and Feasible Periodic Sorting Networks of Constant Depth. FOCS 1994: 369-380
[c6]Marcin Kik, Miroslaw Kutylowski, Grzegorz Stachowiak: Periodic Constant Depth Sorting Networks. STACS 1994: 201-212- 1993
[j9]Miroslaw Kutylowski: Stack versus Sensitivity for One-Way Automata. Theor. Comput. Sci. 119(2): 233-245 (1993)
[c5]Faith E. Fich, Russell Impagliazzo, Bruce M. Kapron, Valerie King, Miroslaw Kutylowski: Limits on the Power of Parallel Random Access Machines with Weak Forms of Write Conflict Resolution. STACS 1993: 386-397- 1992
[j8]Miroslaw Kutylowski, Rolf Wanka: Periodic Sorting on Two-Dimensional Meshes. Parallel Processing Letters 2: 213-220 (1992)
[c4]Miroslaw Kutylowski: Complexity of Boolean Functions on PRAMs - Lower Bound Techniques. Data Structures and Efficient Algorithms 1992: 309-329
[c3]Faith E. Fich, Miroslaw Kowaluk, Krzysztof Lorys, Miroslaw Kutylowski, Prabhakar Ragde: Retrieval of scattered information by EREW, CREW and CRCW PRAMs. SWAT 1992: 30-41- 1991
[j7]Miroslaw Kutylowski: Time Complexity of Boolean Functions on CREW PRAMs. SIAM J. Comput. 20(5): 824-833 (1991)
[j6]- 1990
[j5]Miroslaw Kutylowski: Remarks on Sorting and One-Way Multihead Finite Automata. Inf. Process. Lett. 36(4): 215-218 (1990)
[j4]Miroslaw Kutylowski: One-Way Multihead Finite Automata and 2-Bounded Languages. Mathematical Systems Theory 23(2): 107-139 (1990)
[j3]Miroslaw Kutylowski, Maciej Liskiewicz, Krzysztof Lorys: Reversal Complexity Classes for Alternating Turing Machines. SIAM J. Comput. 19(2): 207-221 (1990)
[c2]Martin Dietzfelbinger, Miroslaw Kutylowski, Rüdiger Reischuk: Exact Time Bounds for Computing Boolean Functions on PRAMs Without Simultaneous Writes. SPAA 1990: 125-135
[c1]
1980 – 1989
- 1988
[j2]Miroslaw Kutylowski: Finite Automata, Real Time Processes and Counting Problems in Bounded Arithmetics. J. Symb. Log. 53(1): 243-258 (1988)- 1987
[j1]Miroslaw Kutylowski: A Generalized Grzegorczyk Hierarchy and Low Complexity Classes. Inf. Comput. 72(2): 133-149 (1987)
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:11 CEST by the dblp team



