Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Agnieszka Prusiewicz is active.

Publication


Featured researches published by Agnieszka Prusiewicz.


New Generation Computing | 2012

Service Composition in Knowledge-based SOA Systems

Paweł Świa̧tek; Paweł Stelmach; Agnieszka Prusiewicz; Krzysztof Juszczyszyn

In this paper, we present the solution of the problem of Service Composition in Knowledge-based SOA (Service Oriented Architecture) Systems. SOA based systems are built of services - atomic or complex ones. Each service may have a different functional and non-functional description. The methods how to retrieve atomic service and compose complex services according to the user’s needs are discussed here.


international conference on computational collective intelligence | 2011

Smart work workbench; integrated tool for IT services planning, management, execution and evaluation

Mariusz Fraś; Adam Grzech; Krzysztof Juszczyszyn; Grzegorz Kołaczek; Jan Kwiatkowski; Agnieszka Prusiewicz; Janusz Sobecki; Paweł Świątek; Adam Wasilewski

Smart Service Workbench (SSW) is an integrated tool devoted to support business processes in distributed IT environment based on Service Oriented Architecture (SOA) paradigm. The tools scope of functionalities is divided into modules that cover the whole process starting from the arrival of service request and ending with a return results of request. The latter is assumed to be a service composed of well-defined components available in predefined and staging repository. The tools modules are responsible for requirements analysis, services choice or service composition, communication and computational resources allocation in distributed environment as well as for resources utilization monitoring to services quality and security evaluation purposes.


doctoral conference on computing, electrical and industrial systems | 2011

The Proposal of Service Oriented Data Mining System for Solving Real-Life Classification and Regression Problems

Agnieszka Prusiewicz; Maciej Zięba

In this work we propose an innovative approach to data mining problem. We propose very flexible data mining system based on service-oriented architecture. Developing applications according to SOA paradigm emerges from the rapid development of the new technology direct known as sustainability science. Each of data mining functionalities is delivered by the execution of the proper Web service. The Web services, described by input and output parameters and the semantic description of its functionalities, are accessible for all applications that are integrated via Enterprise Service Bus.


networked digital technologies | 2010

Services Recommendation in Systems Based on Service Oriented Architecture by Applying Modified ROCK Algorithm

Agnieszka Prusiewicz; Maciej Zięba

In this work the proposal for services recommendation in online educational systems based on service oriented architecture is introduced. The problem of recommending services responsible for creating student groups are taken into account and as the criterion of the grouping the student learning potential is considered. As a method of grouping modified ROCK algorithm is used during service execution.


Archive | 2012

Services Merging, Splitting and Execution in Systems Based on Service Oriented Architecture Paradigm

A. Grzech; Agnieszka Prusiewicz; Maciej Zięba

The aim of the paper is to discuss some selected issues related to services merging, partitioning and execution in systems based on service oriented paradigm. The main feature of such systems is that the required services may be efficiently and flexibly composed of available atomic (elementary) services providing certain and well-defined functionalities. It is rather obvious that the flexibility of such a services delivering system may be limited by the amount and cost of communication necessary to support increasing atomic services granularity. It is assumed that the cost of complex service delivery is composed of exchanged data flows processing and communication costs and the services quality depends on delays introduced by available resources for data flows characterizing services requests followed by specified requirements.


Archive | 2011

Social Network Approach to Anomaly Detection in Network Systems

Grzegorz Kołaczek; Agnieszka Prusiewicz

The problem of the network security is taken up since eighties (Denning et al., 1987) and is developed up today (Beltilch et al., 2004, Bera, 2010, Dasgupta, 1999, Basile, 2007, Wilson, 1999). A major problem of automatic intrusion detection is that, it is difficult to make a difference between normal and abnormal user behaviour. Intrusion detection system should not only recognise the previously known patterns of attacks, but also react in case of appearance of the new events that violate the network security policy. The distributed nature of the task of the network security monitoring requires applying of the distributed tools for network security maintaining. The most important postulate addressed to the intrusion detection systems is that, such systems should automatically react in case of detecting the security policy breach to prevent the attack execution or to reduce the potential loss in the network systems. Intrusion detection systems should be equipped with the components responsible for the permanent observation of the states of monitored nodes and components that integrate the results of these observations and diagnose the security level of the system (Kolaczek et al., 2005, Nguyen et al., 2006). A comprehensive survey of anomaly detection systems is presented in (Patcha & Park, 2007) and a comparison of different approaches to intrusion detection systems is given in (Bejtlich, 2004). One of the first agent systems for network security monitoring has been proposed in works (Balasubramaniyet et al., 1998, Spafford & Zamboni, 2000). In work (Kolaczek et al., 2005) a framework of an original proposal of the intrusion detection system based on the multi-agent approach was presented. In particular, the architecture of such a system and the task of agents were specified. Proposed ideas were further developed and in work (Nguyen et al., 2006) the problem of anomalies detection on the basis of the nodes traffic analysis was discussed. The proposal of the method for Denial of Service Attack detection was given in (Prusiewicz, 2008a). In this work we propose a novel framework of a multi-agent system for anomaly detection. The originality of our solution consists of applying the social network approach to Man in the Middle Attack (MITM) detection in a network system. Our proposal is based on the social networks discovery and their characteristics measurement to detect anomalies in network traffic. We assume that network communication between nodes constitutes social network of users and their applications, so the appropriate methods of social network formal analysis can be applied. The other important assumption is that values of these social


asian conference on intelligent information and database systems | 2012

Anomaly detection system based on service oriented architecture

Grzegorz Kołaczek; Agnieszka Prusiewicz

The problem of the network security has been taken up since eighties and has been developed up to present day. A major problem of an automatic intrusion detection is that, it is difficult to make a difference between a normal and an abnormal user behaviour. We propose the framework of a distributed anomaly detection system based on Service Oriented Architecture (SOA). The main idea of SOA is to treat applications, systems and processes as encapsulated components, which are called services. These services are represented by input and output parameters and the semantic description of their functionalities. We assume that all the functionalities of our system are delivered by the Web services.


asian conference on intelligent information and database systems | 2011

Educational services recommendation using social network approach

Krzysztof Juszczyszyn; Agnieszka Prusiewicz

In this work we propose a framework for courses recommendation. We use a social network approach to discover relations between users and discover social networks reflecting the patterns according to which the services are used. The topological analysis of this network allows us to detect dense groups of users which tend to use educational. The method for educational services and the results of some experiments are given.


agent and multi agent systems technologies and applications | 2008

A multi-agent system for computer network security monitoring

Agnieszka Prusiewicz


International Journal of Intelligent Information and Database Systems | 2011

On some method for limited services selection

Agnieszka Prusiewicz; Maciej Zięba

Collaboration


Dive into the Agnieszka Prusiewicz's collaboration.

Top Co-Authors

Avatar

Krzysztof Juszczyszyn

Wrocław University of Technology

View shared research outputs
Top Co-Authors

Avatar

Maciej Zięba

Wrocław University of Technology

View shared research outputs
Top Co-Authors

Avatar

Grzegorz Kołaczek

Wrocław University of Technology

View shared research outputs
Top Co-Authors

Avatar

A. Grzech

Wrocław University of Technology

View shared research outputs
Top Co-Authors

Avatar

Adam Grzech

Wrocław University of Technology

View shared research outputs
Top Co-Authors

Avatar

Adam Wasilewski

Wrocław University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jan Kwiatkowski

Wrocław University of Technology

View shared research outputs
Top Co-Authors

Avatar

Janusz Sobecki

Wrocław University of Technology

View shared research outputs
Top Co-Authors

Avatar

Lesllaw Sieniawski

Wrocław University of Technology

View shared research outputs
Top Co-Authors

Avatar

Mariusz Fraś

Wrocław University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge