Search Results - "Klonowski, Marek"

Refine Results
  1. 1

    Energy-optimal algorithms for computing aggregative functions in random networks by Klonowski, Marek, Sulkowska, Małgorzata

    “…We investigate a family of algorithms minimizing energetic effort in random networks computing aggregative functions. In contrast to previously considered…”
    Get full text
    Journal Article
  2. 2

    Provable Unlinkability Against Traffic Analysis with Low Message Overhead by Berman, Ron, Fiat, Amos, Gomułkiewicz, Marcin, Klonowski, Marek, Kutyłowski, Mirosław, Levinboim, Tomer, Ta-Shma, Amnon

    Published in Journal of cryptology (01-07-2015)
    “…Rackoff and Simon proved that a variant of Chaum’s protocol for anonymous communication, later developed as the Onion Routing Protocol, is unlinkable against a…”
    Get full text
    Journal Article
  3. 3

    On the Dynamics of Systems of Urns by Klonowski, Marek, Cichoń, Jacek, Kapelko, Rafał

    “…In this paper we present an analysis of some generalization of the classic urn and balls model. In our model each urn has a fixed capacity and initially is…”
    Get full text
    Journal Article
  4. 4

    Extremely compact video representation for efficient near-duplicates detection by Fojcik, Katarzyna, Syga, Piotr, Klonowski, Marek

    Published in Pattern recognition (01-02-2025)
    “…With the influx of online video uploads, a robust method for detecting video copies under various distortions is essential for copyright protection and search…”
    Get full text
    Journal Article
  5. 5

    Restrained medium access control on adversarial shared channels by Hradovich, Elijah, Klonowski, Marek, Kowalski, Dariusz R.

    Published in Journal of computer and system sciences (01-12-2023)
    “…We study the fundamental problem of utilization of the channel shared by stations competing to transmit packets on the channel. In their turn, packets are…”
    Get full text
    Journal Article
  6. 6

    User authorization based on hand geometry without special equipment by Klonowski, Marek, Plata, Marcin, Syga, Piotr

    Published in Pattern recognition (01-01-2018)
    “…•We present a biometric identification protocol based on hand geometry that does not require any special devices (we use standard office scanners).•Our method…”
    Get full text
    Journal Article
  7. 7

    Enhancing privacy for ad hoc systems with predeployment key distribution by Klonowski, Marek, Syga, Piotr

    Published in Ad hoc networks (01-05-2017)
    “…Achieving security in distributed systems of constrained devices (like Wireless Sensor Networks) requires methods that can be performed while very limited…”
    Get full text
    Journal Article
  8. 8

    Generalized framework for Group Testing: Queries, feedbacks and adversaries by Klonowski, Marek, Kowalski, Dariusz R., Pająk, Dominik

    Published in Theoretical computer science (05-06-2022)
    “…In the Group Testing problem, the objective is to learn a subset K of some much larger domain N, using the shortest-possible sequence of queries Q. A feedback…”
    Get full text
    Journal Article
  9. 9

    New View on Adversarial Queueing on MAC by Hradovich, Elijah, Klonowski, Marek, Kowalski, Dariusz R.

    Published in IEEE communications letters (01-04-2021)
    “…This work proposes an average-case performance measurement as a meaningful and non-trivial way of evaluating and comparing queueing protocols on a…”
    Get full text
    Journal Article
  10. 10

    How to obfuscate execution of protocols in an ad hoc radio network? by Kardas, Marcin, Klonowski, Marek, Syga, Piotr

    Published in Ad hoc networks (01-03-2019)
    “…We consider an ad hoc radio network in which nodes perform some distributed algorithms. We provide a framework, that at the cost of increasing time complexity,…”
    Get full text
    Journal Article
  11. 11

    On practical privacy-preserving fault-tolerant data aggregation by Grining, Krzysztof, Klonowski, Marek, Syga, Piotr

    “…In this paper, we propose a fault-tolerant privacy-preserving data aggregation protocol which utilizes limited local communication between nodes. As a starting…”
    Get full text
    Journal Article
  12. 12

    Stronger trust and privacy in social networks via local cooperation1 by Grining, Krzysztof, Klonowski, Marek, Sulkowska, Malgorzata

    Published in Journal of complex networks (09-10-2020)
    “…In our article, we present several protocols that allow to efficiently construct large groups of users based only on local relations of trust. What is more,…”
    Get full text
    Journal Article
  13. 13

    Light-weight and secure aggregation protocols based on Bloom filters by Klonowski, Marek, Piotrowska, Ania M.

    Published in Computers & security (01-01-2018)
    “…In this paper we present a light-weight data aggregation protocol based on probabilistic data structure used for representing a subset of elements called Bloom…”
    Get full text
    Journal Article
  14. 14

    Energy-Efficient Leader Election Protocols for Single-Hop Radio Networks by Kardas, Marcin, Klonowski, Marek, Pajak, Dominik

    “…In this paper we investigate leader election protocols for single-hop radio networks from the perspective of energetic complexity. We discuss different models…”
    Get full text
    Conference Proceeding
  15. 15

    Ordered and delayed adversaries and how to work against them on a shared channel by Klonowski, Marek, Kowalski, Dariusz R., Mirek, Jarosław

    Published in Distributed computing (01-10-2019)
    “…An execution of a distributed algorithm is often seen as a game between the algorithm and a conceptual adversary causing specific distractions to the…”
    Get full text
    Journal Article
  16. 16

    Contention resolution on a restrained channel by Hradovich, Elijah, Klonowski, Marek, Kowalski, Dariusz. R.

    “…We examine deterministic contention resolution on a multiple-access channel when packets are injected continuously by an adversary to the buffers of n…”
    Get full text
    Conference Proceeding
  17. 17

    Exact and Efficient Protective Jamming in SINR-based Wireless Networks by Bojko, Dominik, Klonowski, Marek, Kowalski, Dariusz R., Marciniak, Mateusz

    “…A majority of research in communication in wireless networks is devoted to maximizing information flow, improving connectivity, or making the system robust…”
    Get full text
    Conference Proceeding
  18. 18

    Distributed Alarming in the On-Duty and Off-Duty Models by Bienkowski, Marcin, Gasieniec, Leszek, Klonowski, Marek, Korzeniowski, Miroslaw, Mans, Bernard, Schmid, Stefan, Wattenhofer, Roger

    Published in IEEE/ACM transactions on networking (01-02-2016)
    “…Decentralized monitoring and alarming systems can be an attractive alternative to centralized architectures. Distributed sensor nodes (e.g., in the smart…”
    Get full text
    Journal Article
  19. 19

    Preliminary Report: On Information Hiding in Multi-Hop Radio Networks by Klonowski, Marek, Marciniak, Mateusz

    Published 20-11-2023
    “…In this paper, we consider the problem of an adversary aiming to learn information about the network topology or the executed algorithm from some signals…”
    Get full text
    Journal Article
  20. 20

    Randomized mutual exclusion on a multiple access channel by Bienkowski, Marcin, Klonowski, Marek, Korzeniowski, Miroslaw, Kowalski, Dariusz R.

    Published in Distributed computing (01-10-2016)
    “…In this paper we consider the mutual exclusion problem on a multiple access channel. Mutual exclusion is one of the fundamental problems in distributed…”
    Get full text
    Journal Article