Jakub Lemiesz
Wrocław University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jakub Lemiesz.
wireless communications and networking conference | 2012
Jacek Cichoń; Jakub Lemiesz; Wojciech Szpankowski; Marcin Zawada
Efficient cardinality estimation is a common requirement for many wireless sensor network (WSN) applications. The task must be accomplished at extremely low overhead due to severe sensor resource limitation. This poses an interesting challenge for large-scale WSNs. In this paper we present a two-phase probabilistic algorithm based on order statistics and Bernoulli scheme, which effectively estimates the cardinality of WSNs. We thoroughly examine properties of estimators used in each phase as well as the precision of the whole procedure. The algorithm discussed in this paper is a modification of a recently published idea - the modification enables us to obtain a provable precision.
ad-hoc, mobile and wireless networks | 2011
Jacek Cichoń; Jakub Lemiesz; Marcin Zawada
In this article we address the problem of estimating a size of wireless sensor networks (WSNs). We restrict our attention to sensors with very limited storage capabilities. The problem arises when sensors have to quickly obtain approximate size of the network to use algorithms which require such information. Another application area is the problem of counting the number of different objects (e.g. people in public bus transportation) and use of such information to optimize the routes and frequency of buses. In this paper we present two-phase probabilistic algorithm based on order statistics and balls-bins model which effectively solves the presented problem.
ad hoc mobile and wireless networks | 2012
Jacek Cichoń; Jakub Lemiesz; Marcin Zawada
In this paper we discuss the message complexity of some variants of the Extrema Propagation techniques in wireless networks. We show that the average message complexity, counted as the number of messages sent by each given node, is
conference on decision and control | 2012
Jacek Cichoń; Jakub Lemiesz; Marcin Zawada
\mathrm{O}\left(\log n\right)
ad hoc mobile and wireless networks | 2010
Jacek Cichoń; Rafał Kapelko; Jakub Lemiesz; Marcin Zawada
, where n denotes the size of the network. We indicate the connection between our problem and the well known and deeply studied problem of the number of records in a random permutation. We generalize this problem onto an arbitrary simple and locally finite graphs, prove some basic theorems and find message complexity for some classical graphs such us lines, circles, grids and trees.
international symposium on information theory | 2017
Zbigniew Golcbiewski; Marcin Kardas; Jakub Lemiesz; Krzysztof Majcher
In this paper we discuss a two-phase algorithm for estimating the size of a wireless network consisting of weak devices, such as Wireless Sensor Networks (WSN). The main idea is based on employing randomly generated identifiers. In the first phase of the algorithm we use the properties of order statistics and calculate an approximate estimator of the number of nodes. In the second phase we use this estimator and a series of Bernoulli independent trials in order to get a more precise estimator. We discuss the precision of the algorithm and we show that using a little more than 100 bytes of memory ensures 20% precision for networks consisting of up to 109 nodes. We also prove some lower bounds for memory requirements. We compare our algorithm with HyperLogLog and Extrema Propagation algorithms. Finally, we show that the communication complexity of our algorithm is of order O(log n) where n is the network size.
International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage | 2016
Przemysław Błaśkiewicz; Mirosław Kutyłowski; Jakub Lemiesz; Małgorzata Sulkowska
We consider the problem of efficient alarm protocol for ad-hoc radio networks consisting of devices that try to gain access for transmission through a shared radio communication channel. The problem arise in tasks that sensors have to quickly inform the target user about an alert situation such as presence of fire, dangerous radiation, seismic vibrations, and more. In this paper, we present a protocol which uses O(log n) time slots and show that Ω(log n/ log log n) is a lower bound for used time slots.
analytic algorithmics and combinatorics | 2015
Marcin Kardas; Mirosław Kutyłowski; Jakub Lemiesz
Recently, the need for efficient representations of data conveyed by graphical structures has emerged in many different contexts. While compressing such data one must consider two types of information. The first type is the information carried by the labels embedded in the structure. The second type is the information conveyed by the structure itself. In this extended abstract we address the latter type, namely we study the information carried by the structure of Uniform Random Intersection Graphs (URIGs). Random Intersection Graphs emerge in many scenarios, e.g., they correspond to the topology of many social networks and secure wireless networks, and they are induced in the clusterization process. We analyze algebraic properties of an automorphism group of the underlying structure of URIGs and derive a precise asymptotic formula for their structural entropy for various values of model parameters.
arXiv: Networking and Internet Architecture | 2016
Przemyslaw Blaskiewicz; Jacek Cichoń; Jakub Lemiesz; Mirosław Kutyłowski; Marcin Zawada
We study the problem of hiding communication: while it is easy to encrypt a message sent from Alice to Bob, it is hard to hide that such a communication takes place. Communiaction hiding is one of the fundamental privacy challenges, especially in case of an adversary having a complete view of the traffic and controlling a large number of nodes.
arXiv: Networking and Internet Architecture | 2016
Przemyslaw Blaskiewicz; Jacek Cichoń; Jakub Lemiesz; Mirosław Kutyłowski; Marcin Zawada; Krystyna Napierala; Michal Panek; Stanislaw Strzyz