![]() |
| 1993 | ||
|---|---|---|
| 9 | Ján Dragonec, Jozef Vyskoc: Computer Crime in Slovakia. Security and Control of Information Technology in Society 1993: 203-205 | |
| 1992 | ||
| 8 | Jin-yi Cai, Lane A. Hemachandra, Jozef Vyskoc: Promise Problems and Guarded Access to Unambiguous Computation. Complexity Theory: Current Research 1992: 101-146 | |
| 7 | Jin-yi Cai, Lane A. Hemachandra, Jozef Vyskoc: Promise Problems and Access to Unambiguous Computation. MFCS 1992: 162-171 | |
| 1990 | ||
| 6 | Jozef Vyskoc: Making Bubblesort Recursive. Inf. Process. Lett. 36(4): 219-220 (1990) | |
| 5 | Jozef Vyskoc: Corrigendum: An O(n^lgk . 2^n/2) Time and O(k . 2^n/2) Space Algorithm for Certain NP-Complete Problems. Theor. Comput. Sci. 70(2): 273-274 (1990) | |
| 1987 | ||
| 4 | Jozef Vyskoc: An O(n^lg k . 2^n/2) Time and O(k . 2^n/k) Space Algorithm for Certain NP-Complete Problems. Theor. Comput. Sci. 51: 221-227 (1987) | |
| 1985 | ||
| 3 | Jozef Vyskoc: Pigeon-hole principle and Booleanmatrix multipication. Bulletin of the EATCS 26: 67-68 (1985) | |
| 1984 | ||
| 2 | Jozef Vyskoc: A Note on Boolean Matrix Multiplication. Inf. Process. Lett. 19(5): 249-251 (1984) | |
| 1983 | ||
| 1 | Jozef Vyskoc: A Note on the Power of Integer Division. Inf. Process. Lett. 17(2): 71-72 (1983) | |
| 1 | Jin-yi Cai | [7] [8] |
| 2 | Ján Dragonec | [9] |
| 3 | Lane A. Hemaspaandra (Lane A. Hemachandra) | [7] [8] |