Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Marek Klonowski is active.

Publication


Featured researches published by Marek Klonowski.


International Colloquium on Structural Information and Communication Complexity | 2016

Approximating the Size of a Radio Network in Beeping Model

Philipp Brandes; Marcin Kardas; Marek Klonowski; Dominik Pająk; Roger Wattenhofer

In a single-hop radio network, nodes can communicate with each other by broadcasting to a shared wireless channel. In each time slot, all nodes receive feedback from the channel depending on the number of transmitters. In the Beeping Model, each node learns whether zero or at least one node have transmitted. In such a model, a procedure estimating the size of the network can be used for efficiently solving the problems of leader election or conflict resolution. We introduce a time-efficient uniform algorithm for size estimation of single-hop networks. With probability at least (1-1/f) our solution returns ((1+varepsilon ))-approximation of the network size n within (mathcal {O}left( log log n+log f/varepsilon ^2right) ) time slots. We prove that the algorithm is asymptotically time-optimal for any constant (varepsilon >0).


Distributed Computing | 2018

Ordered and delayed adversaries and how to work against them on a shared channel

Marek Klonowski; Dariusz R. Kowalski; Jarosław Mirek

An execution of a distributed algorithm is often seen as a game between the algorithm and a conceptual adversary causing specific distractions to the computation. In this work we define a class of ordered adaptive adversaries, which cause distractions—in particular crashes—online according to some partial order of the participating stations, which is fixed by the adversary before the execution. We distinguish: Linearly-Ordered adversary, restricted by some pre-defined linear order of (potentially) crashing stations; Anti-Chain-Ordered adversary, previously known as the Weakly-Adaptive adversary, which is restricted by some pre-defined set of crash-prone stations (it can be seen as an ordered adversary with the order being an anti-chain, i.e., a collection of incomparable elements, consisting of these stations); k-Thick-Ordered adversary restricted by partial orders of stations with a maximum anti-chain of size k. We initiate a study of how they affect performance of algorithms. For this purpose, we focus on the well-known Do-All problem of performing t tasks by p synchronous crash-prone stations communicating on a shared channel. The channel restricts communication by the fact that no message is delivered to the operational stations if more than one station transmits at the same time. The question addressed in this work is how the ordered adversaries controlling crashes of stations influence work performance, defined as the total number of available processor steps during the whole execution and introduced by Kanellakis and Shvartsman (Distrib Comput 5(4):201–217, 1992) in the context of Write-All algorithms. The first presented algorithm solves the Do-All problem with work


ad hoc networks | 2017

Enhancing privacy for ad hoc systems with predeployment key distribution

Marek Klonowski; Piotr Syga


Ksii Transactions on Internet and Information Systems | 2010

Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach

Nikita Borisov; Marek Klonowski; Mirosław Kutyłowski; Anna Lauks-Dutka

{mathcal {O}}(t+p sqrt{t}log p)


principles of distributed computing | 2018

Brief Announcement: Broadcast in Radio Networks, Time vs. Energy Tradeoffs

Marek Klonowski; Dominik Pajak


Pattern Recognition | 2018

User authorization based on hand geometry without special equipment

Marek Klonowski; Marcin Plata; Piotr Syga

O(t+ptlogp) against the Linearly-Ordered adversary. Surprisingly, the upper bound on performance of this algorithm does not depend on the number of crashes f and is close to the absolute lower bound


International Journal of Information Security | 2018

On practical privacy-preserving fault-tolerant data aggregation

Krzysztof Grining; Marek Klonowski; Piotr Syga


Computers & Security | 2018

Light-weight and secure aggregation protocols based on Bloom filters✰

Marek Klonowski; Ania M. Piotrowska

varOmega (t+psqrt{t})


computer and communications security | 2017

Towards Extending Noiseless Privacy: Dependent Data and More Practical Approach

Krzysztof Grining; Marek Klonowski


arXiv: Multiagent Systems | 2017

On Location Hiding in Distributed Systems

Karol Gotfryd; Marek Klonowski; Dominik Pająk

Ω(t+pt) proved in Chlebus et al. (Distrib Comput 18(6):435–451, 2006). Another algorithm is developed against the Weakly-Adaptive adversary. Work done by this algorithm is

Collaboration


Dive into the Marek Klonowski's collaboration.

Top Co-Authors

Avatar

Dominik Pająk

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Piotr Syga

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Krzysztof Grining

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Marcin Kardas

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge