Agnieszka Prusiewicz
Wrocław University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Agnieszka Prusiewicz.
New Generation Computing | 2012
Paweł Świa̧tek; Paweł Stelmach; Agnieszka Prusiewicz; Krzysztof Juszczyszyn
In this paper, we present the solution of the problem of Service Composition in Knowledge-based SOA (Service Oriented Architecture) Systems. SOA based systems are built of services - atomic or complex ones. Each service may have a different functional and non-functional description. The methods how to retrieve atomic service and compose complex services according to the user’s needs are discussed here.
international conference on computational collective intelligence | 2011
Mariusz Fraś; Adam Grzech; Krzysztof Juszczyszyn; Grzegorz Kołaczek; Jan Kwiatkowski; Agnieszka Prusiewicz; Janusz Sobecki; Paweł Świątek; Adam Wasilewski
Smart Service Workbench (SSW) is an integrated tool devoted to support business processes in distributed IT environment based on Service Oriented Architecture (SOA) paradigm. The tools scope of functionalities is divided into modules that cover the whole process starting from the arrival of service request and ending with a return results of request. The latter is assumed to be a service composed of well-defined components available in predefined and staging repository. The tools modules are responsible for requirements analysis, services choice or service composition, communication and computational resources allocation in distributed environment as well as for resources utilization monitoring to services quality and security evaluation purposes.
doctoral conference on computing, electrical and industrial systems | 2011
Agnieszka Prusiewicz; Maciej Zięba
In this work we propose an innovative approach to data mining problem. We propose very flexible data mining system based on service-oriented architecture. Developing applications according to SOA paradigm emerges from the rapid development of the new technology direct known as sustainability science. Each of data mining functionalities is delivered by the execution of the proper Web service. The Web services, described by input and output parameters and the semantic description of its functionalities, are accessible for all applications that are integrated via Enterprise Service Bus.
networked digital technologies | 2010
Agnieszka Prusiewicz; Maciej Zięba
In this work the proposal for services recommendation in online educational systems based on service oriented architecture is introduced. The problem of recommending services responsible for creating student groups are taken into account and as the criterion of the grouping the student learning potential is considered. As a method of grouping modified ROCK algorithm is used during service execution.
Archive | 2012
A. Grzech; Agnieszka Prusiewicz; Maciej Zięba
The aim of the paper is to discuss some selected issues related to services merging, partitioning and execution in systems based on service oriented paradigm. The main feature of such systems is that the required services may be efficiently and flexibly composed of available atomic (elementary) services providing certain and well-defined functionalities. It is rather obvious that the flexibility of such a services delivering system may be limited by the amount and cost of communication necessary to support increasing atomic services granularity. It is assumed that the cost of complex service delivery is composed of exchanged data flows processing and communication costs and the services quality depends on delays introduced by available resources for data flows characterizing services requests followed by specified requirements.
Archive | 2011
Grzegorz Kołaczek; Agnieszka Prusiewicz
The problem of the network security is taken up since eighties (Denning et al., 1987) and is developed up today (Beltilch et al., 2004, Bera, 2010, Dasgupta, 1999, Basile, 2007, Wilson, 1999). A major problem of automatic intrusion detection is that, it is difficult to make a difference between normal and abnormal user behaviour. Intrusion detection system should not only recognise the previously known patterns of attacks, but also react in case of appearance of the new events that violate the network security policy. The distributed nature of the task of the network security monitoring requires applying of the distributed tools for network security maintaining. The most important postulate addressed to the intrusion detection systems is that, such systems should automatically react in case of detecting the security policy breach to prevent the attack execution or to reduce the potential loss in the network systems. Intrusion detection systems should be equipped with the components responsible for the permanent observation of the states of monitored nodes and components that integrate the results of these observations and diagnose the security level of the system (Kolaczek et al., 2005, Nguyen et al., 2006). A comprehensive survey of anomaly detection systems is presented in (Patcha & Park, 2007) and a comparison of different approaches to intrusion detection systems is given in (Bejtlich, 2004). One of the first agent systems for network security monitoring has been proposed in works (Balasubramaniyet et al., 1998, Spafford & Zamboni, 2000). In work (Kolaczek et al., 2005) a framework of an original proposal of the intrusion detection system based on the multi-agent approach was presented. In particular, the architecture of such a system and the task of agents were specified. Proposed ideas were further developed and in work (Nguyen et al., 2006) the problem of anomalies detection on the basis of the nodes traffic analysis was discussed. The proposal of the method for Denial of Service Attack detection was given in (Prusiewicz, 2008a). In this work we propose a novel framework of a multi-agent system for anomaly detection. The originality of our solution consists of applying the social network approach to Man in the Middle Attack (MITM) detection in a network system. Our proposal is based on the social networks discovery and their characteristics measurement to detect anomalies in network traffic. We assume that network communication between nodes constitutes social network of users and their applications, so the appropriate methods of social network formal analysis can be applied. The other important assumption is that values of these social
asian conference on intelligent information and database systems | 2012
Grzegorz Kołaczek; Agnieszka Prusiewicz
The problem of the network security has been taken up since eighties and has been developed up to present day. A major problem of an automatic intrusion detection is that, it is difficult to make a difference between a normal and an abnormal user behaviour. We propose the framework of a distributed anomaly detection system based on Service Oriented Architecture (SOA). The main idea of SOA is to treat applications, systems and processes as encapsulated components, which are called services. These services are represented by input and output parameters and the semantic description of their functionalities. We assume that all the functionalities of our system are delivered by the Web services.
asian conference on intelligent information and database systems | 2011
Krzysztof Juszczyszyn; Agnieszka Prusiewicz
In this work we propose a framework for courses recommendation. We use a social network approach to discover relations between users and discover social networks reflecting the patterns according to which the services are used. The topological analysis of this network allows us to detect dense groups of users which tend to use educational. The method for educational services and the results of some experiments are given.
agent and multi agent systems technologies and applications | 2008
Agnieszka Prusiewicz
International Journal of Intelligent Information and Database Systems | 2011
Agnieszka Prusiewicz; Maciej Zięba