Marek Klonowski
University of Science and Technology, Sana'a
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Marek Klonowski.
International Colloquium on Structural Information and Communication Complexity | 2016
Philipp Brandes; Marcin Kardas; Marek Klonowski; Dominik Pająk; Roger Wattenhofer
In a single-hop radio network, nodes can communicate with each other by broadcasting to a shared wireless channel. In each time slot, all nodes receive feedback from the channel depending on the number of transmitters. In the Beeping Model, each node learns whether zero or at least one node have transmitted. In such a model, a procedure estimating the size of the network can be used for efficiently solving the problems of leader election or conflict resolution. We introduce a time-efficient uniform algorithm for size estimation of single-hop networks. With probability at least (1-1/f) our solution returns ((1+varepsilon ))-approximation of the network size n within (mathcal {O}left( log log n+log f/varepsilon ^2right) ) time slots. We prove that the algorithm is asymptotically time-optimal for any constant (varepsilon >0).
Distributed Computing | 2018
Marek Klonowski; Dariusz R. Kowalski; Jarosław Mirek
An execution of a distributed algorithm is often seen as a game between the algorithm and a conceptual adversary causing specific distractions to the computation. In this work we define a class of ordered adaptive adversaries, which cause distractions—in particular crashes—online according to some partial order of the participating stations, which is fixed by the adversary before the execution. We distinguish: Linearly-Ordered adversary, restricted by some pre-defined linear order of (potentially) crashing stations; Anti-Chain-Ordered adversary, previously known as the Weakly-Adaptive adversary, which is restricted by some pre-defined set of crash-prone stations (it can be seen as an ordered adversary with the order being an anti-chain, i.e., a collection of incomparable elements, consisting of these stations); k-Thick-Ordered adversary restricted by partial orders of stations with a maximum anti-chain of size k. We initiate a study of how they affect performance of algorithms. For this purpose, we focus on the well-known Do-All problem of performing t tasks by p synchronous crash-prone stations communicating on a shared channel. The channel restricts communication by the fact that no message is delivered to the operational stations if more than one station transmits at the same time. The question addressed in this work is how the ordered adversaries controlling crashes of stations influence work performance, defined as the total number of available processor steps during the whole execution and introduced by Kanellakis and Shvartsman (Distrib Comput 5(4):201–217, 1992) in the context of Write-All algorithms. The first presented algorithm solves the Do-All problem with work
ad hoc networks | 2017
Marek Klonowski; Piotr Syga
Ksii Transactions on Internet and Information Systems | 2010
Nikita Borisov; Marek Klonowski; Mirosław Kutyłowski; Anna Lauks-Dutka
{mathcal {O}}(t+p sqrt{t}log p)
principles of distributed computing | 2018
Marek Klonowski; Dominik Pajak
Pattern Recognition | 2018
Marek Klonowski; Marcin Plata; Piotr Syga
O(t+ptlogp) against the Linearly-Ordered adversary. Surprisingly, the upper bound on performance of this algorithm does not depend on the number of crashes f and is close to the absolute lower bound
International Journal of Information Security | 2018
Krzysztof Grining; Marek Klonowski; Piotr Syga
Computers & Security | 2018
Marek Klonowski; Ania M. Piotrowska
varOmega (t+psqrt{t})
computer and communications security | 2017
Krzysztof Grining; Marek Klonowski
arXiv: Multiagent Systems | 2017
Karol Gotfryd; Marek Klonowski; Dominik Pająk
Ω(t+pt) proved in Chlebus et al. (Distrib Comput 18(6):435–451, 2006). Another algorithm is developed against the Weakly-Adaptive adversary. Work done by this algorithm is