Skip to main content

Showing 1–15 of 15 results for author: Klonowski, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.11778  [pdf, ps, other

    cs.DC

    Preliminary Report: On Information Hiding in Multi-Hop Radio Networks

    Authors: Marek Klonowski, Mateusz Marciniak

    Abstract: In this paper, we consider the problem of an adversary aiming to learn information about the network topology or the executed algorithm from some signals obtained during the algorithm's execution. The problem is defined in a very general form. However, it is mainly motivated by multi-hop ad hoc radio networks. In contrast to previous work concentrated on single-hop radio networks, this model is cr… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

  2. arXiv:2112.01340  [pdf, ps, other

    cs.DS

    Generalized Framework for Group Testing: Queries, Feedbacks and Adversaries

    Authors: Marek Klonowski, Dariusz R. Kowalski, Dominik Pajak

    Abstract: In the Group Testing problem, the objective is to learn a subset K of some much larger domain N, using the shortest-possible sequence of queries Q. A feedback to a query provides some information about the intersection between the query and subset K. Several specific feedbacks have been studied in the literature, often proving different formulas for the estimate of the query complexity of the prob… ▽ More

    Submitted 2 December, 2021; originally announced December 2021.

  3. arXiv:2005.01586  [pdf, other

    cs.DS

    What Do Our Choices Say About Our Preferences?

    Authors: Krzysztof Grining, Marek Klonowski, Małgorzata Sulkowska

    Abstract: Taking online decisions is a part of everyday life. Think of buying a house, parking a car or taking part in an auction. We often take those decisions publicly, which may breach our privacy - a party observing our choices may learn a lot about our preferences. In this paper we investigate the online stop** algorithms from the privacy preserving perspective, using a mathematically rigorous differ… ▽ More

    Submitted 26 July, 2023; v1 submitted 4 May, 2020; originally announced May 2020.

    Comments: 23 pages, 6 figures

  4. arXiv:2003.11446  [pdf, other

    cs.CR

    Probabilistic Counters for Privacy Preserving Data Aggregation

    Authors: Dominik Bojko, Krzysztof Grining, Marek Klonowski

    Abstract: Probabilistic counters are well-known tools often used for space-efficient set cardinality estimation. In this paper, we investigate probabilistic counters from the perspective of preserving privacy. We use the standard, rigid differential privacy notion. The intuition is that the probabilistic counters do not reveal too much information about individuals but provide only general information about… ▽ More

    Submitted 17 July, 2023; v1 submitted 25 March, 2020; originally announced March 2020.

  5. arXiv:1810.11441  [pdf, ps, other

    cs.DC

    Energy Efficient Adversarial Routing in Shared Channels

    Authors: Bogdan S. Chlebus, Elijah Hradovich, Tomasz Jurdzinski, Marek Klonowski, Dariusz R. Kowalski

    Abstract: We investigate routing on networks modeled as multiple access channels, when packets are injected continually. There is an energy cap understood as a bound on the number of stations that can be switched on simultaneously. Each packet is injected into some station and needs to be delivered to its destination station via the channel. A station has to be switched on in order to receive a packet when… ▽ More

    Submitted 25 February, 2019; v1 submitted 26 October, 2018; originally announced October 2018.

  6. arXiv:1808.02216  [pdf, other

    cs.DC

    Contention resolution on a restrained channel

    Authors: Elijah Hradovich, Marek Klonowski, Dariusz R. Kowalski

    Abstract: We examine deterministic broadcasting on multiple-access channels for a scenario when packets are injected continuously by an adversary to the buffers of the devices at rate $ρ$ packages per round. The aim is to maintain system stability, that is, bounded queues. In contrast to previous work we assume that there is a strict limit of available power, defined as the total number of stations allowed… ▽ More

    Submitted 16 May, 2020; v1 submitted 7 August, 2018; originally announced August 2018.

    Comments: 9 figures

  7. arXiv:1711.04149  [pdf, other

    cs.DC

    Broadcast in radio networks: time vs. energy tradeoffs

    Authors: Marek Klonowski, Dominik Pająk

    Abstract: In wireless networks, consisting of battery-powered devices, energy is a costly resource and most of it is spent on transmitting and receiving messages. Broadcast is a problem where a message needs to be transmitted from one node to all other nodes of the network. We study algorithms that can work under limited energy measured as the maximum number of transmissions by a single station. The goal of… ▽ More

    Submitted 13 May, 2018; v1 submitted 11 November, 2017; originally announced November 2017.

  8. arXiv:1710.07380  [pdf, other

    cs.DC

    Fault-tolerant parallel scheduling of arbitrary length jobs on a shared channel

    Authors: Marek Klonowski, Dariusz R. Kowalski, Jarosław Mirek, Prudence W. H. Wong

    Abstract: We study the problem of scheduling jobs on fault-prone machines communicating via a shared channel, also known as multiple-access channel. We have $n$ arbitrary length jobs to be scheduled on $m$ identical machines, $f$ of which are prone to crashes by an adversary. A machine can inform other machines when a job is completed via the channel without collision detection. Performance is measured by t… ▽ More

    Submitted 24 July, 2018; v1 submitted 19 October, 2017; originally announced October 2017.

  9. arXiv:1706.08366  [pdf, other

    cs.DC

    Ordered and Delayed Adversaries and How to Work against Them on a Shared Channel

    Authors: Marek Klonowski, Dariusz R. Kowalski, Jaroslaw Mirek

    Abstract: In this work we define a class of ordered adversaries causing distractions according to some partial order fixed by the adversary before the execution, and study how they affect performance of algorithms. We focus on the Do-All problem of performing t tasks on a shared channel consisting of p crash-prone stations. The channel restricts communication: no message is delivered to the alive stations i… ▽ More

    Submitted 24 July, 2018; v1 submitted 26 June, 2017; originally announced June 2017.

  10. arXiv:1704.05305  [pdf, ps, other

    cs.SI

    How to Cooperate Locally to Improve Global Privacy in Social Networks? On Amplification of Privacy Preserving Data Aggregation

    Authors: Krzysztof Grining, Marek Klonowski, Małgorzata Sulkowska

    Abstract: In many systems privacy of users depends on the number of participants applying collectively some method to protect their security. Indeed, there are numerous already classic results about revealing aggregated data from a set of users. The conclusion is usually as follows: if you have enough friends to "aggregate" the private data, you can safely reveal your private information. Apart from data… ▽ More

    Submitted 26 April, 2017; v1 submitted 18 April, 2017; originally announced April 2017.

    Comments: Submitted to TrustCom2017

  11. arXiv:1612.01061  [pdf, ps, other

    cs.DC

    On spreading rumor in heterogeneous systems

    Authors: Jacek Cichoń, Zbigniew Goł\eobbiewski, Marcin Kardas, Marek Klonowski, Filip Zagórski

    Abstract: In this paper we consider a model of spreading information in heterogeneous systems wherein we have two kinds of objects. Some of them are active and others are passive. Active objects can, if they possess information, share it with an encountered passive object. We focus on a particular case such that active objects communicate independently with randomly chosen passive objects. Such model is mot… ▽ More

    Submitted 3 December, 2016; originally announced December 2016.

  12. arXiv:1611.04211  [pdf, other

    cs.MA cs.DC

    On Location Hiding in Distributed Systems

    Authors: Karol Gotfryd, Marek Klonowski, Dominik Pająk

    Abstract: We consider the following problem - a group of mobile agents perform some task on a terrain modeled as a graph. In a given moment of time an adversary gets an access to the graph and positions of the agents. Shortly before adversary's observation the mobile agents have a chance to relocate themselves in order to hide their initial configuration. We assume that the initial configuration may possibl… ▽ More

    Submitted 13 November, 2016; originally announced November 2016.

    Comments: Submitted to 10th International Conference on Algorithms and Complexity CIAC 2017

  13. arXiv:1605.07956  [pdf, other

    cs.CR

    Towards Extending Noiseless Privacy -- Dependent Data and More Practical Approach

    Authors: Krzysztof Grining, Marek Klonowski

    Abstract: In 2011 Bhaskar et al. pointed out that in many cases one can ensure sufficient level of privacy without adding noise by utilizing adversarial uncertainty. Informally speaking, this observation comes from the fact that if at least a part of the data is randomized from the adversary's point of view, it can be effectively used for hiding other values. So far the approach to that idea in the literatu… ▽ More

    Submitted 22 September, 2020; v1 submitted 25 May, 2016; originally announced May 2016.

    Comments: Accepted to AsiaCCS 2017

  14. arXiv:1602.04138  [pdf, other

    cs.CR

    Practical Fault-Tolerant Data Aggregation

    Authors: Krzysztof Grining, Marek Klonowski, Piotr Syga

    Abstract: During Financial Cryptography 2012 Chan et al. presented a novel privacy-protection fault-tolerant data aggregation protocol. Comparing to previous work, their scheme guaranteed provable privacy of individuals and could work even if some number of users refused to participate. In our paper we demonstrate that despite its merits, their method provides unacceptably low accuracy of aggregated data fo… ▽ More

    Submitted 31 May, 2016; v1 submitted 12 February, 2016; originally announced February 2016.

    Comments: Submitted to ACNS 2016;30 pages

  15. arXiv:1001.3044  [pdf, ps, other

    cs.DS

    Dynamic sharing of a multiple access channel

    Authors: Marcin Bienkowski, Marek Klonowski, Miroslaw Korzeniowski, Dariusz R. Kowalski

    Abstract: In this paper we consider the mutual exclusion problem on a multiple access channel. Mutual exclusion is one of the fundamental problems in distributed computing. In the classic version of this problem, n processes perform a concurrent program which occasionally triggers some of them to use shared resources, such as memory, communication channel, device, etc. The goal is to design a distributed… ▽ More

    Submitted 3 February, 2010; v1 submitted 18 January, 2010; originally announced January 2010.