Systems Modelling and Performance Evaluation and Security Group (SMaPESG) conducts research on models of computer systems and novel methods of modelling. In the scope of interests of the Group there are mainly models of computer networks. We are engaged in simulation and analytical modelling, both queuing models and other methods. Our experience embraces using of well-established modelling packages, like NS, OmNET++ or PRISM as well as creation of advanced proprietary software working in parallel environments.
Security, Modelling and Performance Evaluation Group
Associated Random Neural Networks for Collective Classification of Nodes in Botnet Attacks. arXiv. (1.86 MB) .
Submitted.
Dimensioning the renewable energy system of a Green Cellular Base Station Site. EAI/Springer Innovations in Communication and Computing . .
In Press.
Decentralized Online Federated G-Network Learning for Lightweight Intrusion Detection. Modeling, Analysis, and Simulation On Computer and Telecommunication Systems (MASCOTS). (1.06 MB) .
2024.
Online Self-Supervised Deep Learning for Intrusion Detection Systems. IEEE Transactions on Information Forensics and Security. 19 (6.97 MB) .
2024.
Modelling the Energy Performance of Off-Grid Sustainable Green Cellular Base Stations. 31st International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2023). (463.53 KB) .
2024.
A Markov model for a Self-Powered Green IoT Device with State-Dependent Energy Consumption. Proceeding of the 2023 4th International Conference on Communications, Information, Electronic and Energy Systems (CIEES). .
2024.
Energy performance of Internet of Things (IoT) networks for pipeline monitoring. The 20th International Wireless Communications & Mobile Computing Conference. .
2024.
Energy Performance of Off-Grid Green Cellular Base Stations. Performance Evaluation. .
2024.
Markov Models for Dimensioning and Provisioning of Battery Energy Storage Systems (BESS) for Off-Grid Green Mobile Network Base Station Sites. Proceedings of the st 1 International Conference on Mathematical and Statistical Sciences(ICMSS-1). (272.73 KB) .
2024.
Dropping or Marking: a Review and Evaluation of Existing Fluid-Flow Approximation Models. Bulletin of the Polish Academy of Sciences Technical Sciences. 72(early accass) (2.91 MB) .
2024.
SDK4ED: a platform for building energy efficient, dependable, and maintainable embedded software. Automated Software Engineering. .
2024.
System-wide vulnerability of multi-component software. Computers & Industrial Engineering. 196 .
2024.
DISFIDA: Distributed Self-Supervised Federated Intrusion Detection Algorithm with Online Learning for Health Internet of Things and Internet of Vehicles . Internet of Things. 28 (2.17 MB) .
2024.
System Wide Vulnerability and Trust in Multi-Component Communication System Software. IEEE Network. (3.98 MB) .
2024.
Deep Learning Intrusion Detection and Mitigation of DoS Attacks. 32nd International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS24). (2.84 MB) .
2024.
Extracting coarse-grained classifiers from large Convolutional Neural Networks. Engineering Applications of Artificial Intelligence. 138 .
2024.
Evaluating Convolutional Neural Networks via measuring similarity of their first-layer filters and Gabor filters. 32nd International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems. .
2024.
Similarity-driven adversarial testing of neural networks. Knowledge-Based Systems. 305 .
2024.
Energy performance of self-powered Green IoT nodes. Frontiers in Energy Research. .
2024.
Impact of energy leakage on the energy performance of green IoT nodes. 32nd International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2024). .
2024.
Is ChatGPT Trustworthy Enough? A Review IEEE Consumer Electronics Magazine . (177.25 KB) .
2024.
On an Adaptive-Quasi-Deterministic Transmission Policy Queueing Model. 32nd IEEE MASCOTS'24 Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, October 21-23, 2024, Krakow Poland. (216.64 KB) .
2024.
Kirin: Hitting the Internet with Distributed BGP Announcements. ACM Asia Conference on Computer and Communications Security (AsiaCCS 2024). (1.8 MB) .
2024.
Software Vulnerabilities in TensorFlow-Based Deep Learning Applications. Computers & Security. 124 .
2023.
Modelling energy changes in the energy harvesting battery of an IoT device. 30th International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2022) pp. 81-88. (1.35 MB) .
2023.
Real-Time Cyberattack Detection with Offline and Online Learning. IEEE International Symposium on Local and Metropolitan Area Networks. (1.09 MB) .
2023.
Measurement Based Evaluation and Mitigation of Flood Attacks on a LAN Test-Bed. The 48th IEEE Conference on Local Computer Networks. (861.42 KB) .
2023.
Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission Policy. The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2023). (1.4 MB) .
2023.
Global Entropy Pooling Layer for Convolutional Neural Networks. Neurocomputing. 555 .
2023.
IoT Network Cybersecurity Assessment with the Associated Random Neural Network. IEEE Access. (966.17 KB) .
2023.
Electricity Consumption by ICT: Facts, trends, and measurements. ACM Ubiquity. 2023(August) (3.4 MB) .
2023.
Recycling of Generic ImageNet-trained Models for Smart-city Applications. The 10th IEEE International Conference on Data Science and Advanced Analytics (DSAA). .
2023.
HierAct: a Hierarchical Model for Human Activity Recognition in Game-Like Educational Applications. 2023 IEEE International Conference on Big Data. .
2023.
Robust category recognition based on deep templates for educational mobile applications. 2023 IEEE International Conference on Big Data. .
2023.
NetSat: Network Saturation Adversarial Attack. IEEE International Conference on Big Data (IEEE BigData 2023). .
2023.
Visual examination of relations between known classes for deep neural network classifiers.. 2023 IEEE International Conference on Big Data. .
2023.
Helping hands: Measuring the impact of a large threat intelligence sharing community. USENIX Security Symposium (USENIX Security '22 Summer). .
2022.
SDK4ED: One-click platform for Energy-aware, Maintainable and Dependable Applications. 25th Design, Automation and Test in Europe Conference. .
2022.
Cost-Effective Filtering of Unreliable Proximity Detection Results Based on BLE RSSI and IMU Readings Using Smartphones. Scientific Reports. 12(1) .
2022.
Adaptive Hurst-Sensitive Active Queue Management. Entropy. 24(3) .
2022.
NAM: What Does a Neural Network See? International Joint Conference on Neural Networks (IJCNN 2022), IEEE WCCI 2022. .
2022.
Approximation Models for the Evaluation of TCP/AQM Networks. Bulletin of the Polish Academy of Sciences, Technical Sciences (BPASTS). 70(4) .
2022.
Mitigating the Massive Access Problem in the Internet of Things. EuroCybersec. .
2022.
Botnet Attack Detection with Incremental Online Learning. EuroCybersec 2021. .
2022.
The IoTAC Software Security-by-Design Platform: Concept, Challenges, and Preliminary Overview. 18th International Conference on the Design of Reliable Communication Networks (DRCN). (1.33 MB) .
2022.
Improving Massive Access to IoT Gateways. Performance Evaluation. .
2022.
Finding the best hardware configuration for 2D SLAM in indoor environments via simulation based on Google Cartographer. Scientific Reports. 12 .
2022.
G-Networks Can Detect Different Types of Cyberattacks. 2022 Mascots: 30th International Symposium on the Modelling, Analysis and Simulation of Computer and Telecommunication Systems. (1.51 MB) .
2022.
Building a real-time testing platform for unmanned ground vehicles with UDP Bridge. Sensors. 22(21) .
2022.
IoT Traffic Shaping and the Massive Access Problem. ICC 2022, IEEE International Conference on Communications, 16–20 May 2022, Seoul, South Korea. .
2022.
Searching and Rescuing Victims in Emergency: A Comprehensive Survey. CECNet 2021. .
2022.
Security in Computer and Information Sciences: Second International Symposium. EuroCybersec 2021. .
2022.
Real-time testing of vision-based systems for AGVs with ArUco markers. IEEE International Conference on Big Data. .
2022.
Energy, QoS and Security Aware Edge Services. International ISCIS Security Workshop. .
2022.
Optimizing Energy Usage for an Electric Drone. EuroCybersec 2021. 1596 (434.37 KB) .
2022.
Modelling energy changes in the energy harvesting battery of an IoT device. 30th International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2022). (1.35 MB) .
2022.
Energy, QoS and Security Aware Edge Services. EuroCybersec 2021. (3.06 MB) .
2022.
NOBEL PRIZE 50 YEARS AGO. EPN. 52(5) (334.02 KB) .
2022.
A Dynamic Model for Identifying Enemy Collective Behaviour. 11th ICCRTS Coalition Command and Control in the Networked Era. (879.53 KB) .
2022.
Security in Computer and Information Sciences. Second International Symposium, EuroCybersec 2021. .
2022.
Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices. IEEE Access. 10 (1.74 MB) .
2022.
Optimizing Energy Usage for an Electric Drone. EuroCybersec 2021: Security in Computer and Information Sciences. 1596:61–75. (434.37 KB) .
2022.
The IoT Gateway with Active Queue Management. International Journal of Applied Mathematics and Computer Science (AMCS). 31(1) .
2021.
Combined diffusion approximation - simulation model of AQM’s transient behaviour. Computer Communications. 166 (3.58 MB) .
2021.
The Random Neural Network as a Bonding Model for Software Vulnerability Prediction. Modelling, Analysis, and Simulation of Computer and Telecommunication Systems. 12527:102-116. (690.95 KB) .
2021.
Random Neural Network for Lightweight Attack Detection in the IoT. MASCOTS 2020: Modelling, Analysis, and Simulation of Computer and Telecommunication Systems. 12527:79-91. (336.06 KB) .
2021.
Efficient Feature Selection for Static Analysis Vulnerability Prediction. Sensors. 21 (4)(Special Issue: Security and Privacy in Software Based Critical Contexts) (1.37 MB) .
2021.
Time-Dependent Performance of a Multi-Hop Software Defined Network. Applied Sciences. 11(2469) (1.25 MB) .
2021.
Investigating the Interaction between Energy Consumption, Quality of Service, Reliability, Security, and Maintainability of Computer Systems and Networks. SN Computer Science . 2(1) (981.91 KB) .
2021.
Minimizing Energy and Computation in Long-Running Software. Applied Sciences. 11(3) (853.84 KB) .
2021.
Réflexions sur la diffusion des connaissances a travers les grands colloques internationaux, les revues scientifiques, et la communication libre et rapide entre chercheurs et innovateurs dans un contexte de reduction de l'empreinte climatique. 1024, Bulletin de la Société Informatique de France. 17(1) (706.87 KB) .
2021.
Randomization of Data Generation Times Improves Performance of Predictive IoT Networks. 7th IEEE World Forum on the Internet of Things. (968.83 KB) .
2021.
Renforcer la place des universités européennes dans le concert mondial. Revue des Electriciens et Electroniciens. 2 (2.09 MB) .
2021.
Cooperative Wireless Edges with Composite Resource Allocation in Hierarchical Networks. 2020 IEEE International Conference on E-health Networking, Application & Services (HEALTHCOM). (343.95 KB) .
2021.
Smart SDN Management of Fog Services to Optimize QoS and Energy. Sensors. 21(9) (2.41 MB) .
2021.
LIDAR Point Cloud generation for SLAM algorithm evaluation. Sensors. 21 (10)(Special Issue: Advance in Sensors and Sensing Systems for Driving and Transportation: Part B) .
2021.
Fact or Fake? Tackling Science Disinformation ALLEA General Assembly Paper. :paper5. (2.37 MB) .
2021.
Diffusion model of a non-integer order PIγ controller with TCP/UDP streams. Entropy. 23 .
2021.
On Sharing Knowledge And Fostering “Open Science”. Ubiquity (ACM Journal). 2021(5) (581.63 KB) .
2021.
A hierarchical model for quantifying software security based on static analysis alerts and software metrics. Software Quality Journal. 29(2) (3.32 MB) .
2021.
Reinforcement Learning and Energy-Aware Routing. ACM 4th FlexNets'21 Workshop, ACM SIGCOMM 2021. .
2021.
Internet address structure analysis, and applications thereof. (966.12 KB) .
2021.
Supervised learning of Neural Networks for Active Queue Management in the Internet. Sensors. 21(15)(Special Issue "Mathematical Modelling and Analysis in Sensors Networks") .
2021.
MIRAI Botnet Attack Detection with Auto-Associative Dense Random Neural Network. 2021 IEEE Global Communications Conference. (857.52 KB) .
2021.
Diffusion Analysis Improves Scalability of IoTNetworks to Mitigate the Massive Access Problem. 2021 Mascots: 29th International Symposium on the Modelling, Analysis and Simulation of Computer and Telecommunication Systems. (1.99 MB) .
2021.
Diffusion Model of Preemptive-Resume Priority Systems and Its Application to Performance Evaluation of SDN Switches.. Sensors. 21(5042) (1.32 MB) .
2021.
Performance Analysis of Packet Aggregation Mechanisms and Their Applications in Access (e.g., IoT, 4G/5G), Core, and Data Centre Networks. Sensors. 21(3898) (1.75 MB) .
2021.
Performance Evaluation of the Packet Aggregation Mechanism of an N-GREEN Metro Network Node. Modelling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS) Workshop 2020. (1.1 MB) .
2021.
NOBEL PRIZE 50 YEARS AGO. Europhysics News . 52(5) (334.02 KB) .
2021.
Computer Science Protecting Human Society Against Epidemics. ANTICOVID 2021. 616:125. .
2021.
Fluid-Flow Approximation in the Analysis of Vast Energy-Aware Networks. Mathematics. 9(3279) (2.34 MB) .
2021.
Diffusion Approximation Model of TCP NewReno Congestion Control Mechanism. SN Computer Science. (1:43) .
2020.
AQM mechanism with neuron tuning parameters. 12th Asian Conference on Intelligent Information and Database Systems, Phuket, Thailand. .
2020.
Optimal fog services placement in SDN IoT network using Random Neural Networks and Cognitive Network Map. The 19th International Conference on Artificial Intelligence and Soft Computing. (623.07 KB) .
2020.
IoT Network Attack Detection and Mitigation. The 9th Mediterranean Conference on Embedded Computing (MECO'2020). (644.89 KB) .
2020.
Performance of a Security Control Scheme for a Health Data Exchange System. IEEE International Black Sea Conference on Communications and Networking. (342.61 KB) .
2020.
IoT Network Risk Assessment and Mitigation: The SerIoT Approach. Security Risk Management for the Internet of Things: Technologies and Techniques for IoT Security, Privacy and Data Protection. :88–104. (998 KB) .
2020.
Self-Aware Networks that Optimize Security, QoS and Energy. Proceedings of the IEEE. 108(7) (5.07 MB) .
2020.
Smart SDN Management of Fog Services. Global IoT Summit (GIOTS) 2020. (256.06 KB) .
2020.
Introduction to the Special Issue on the French-Polish Collaboration in Mathematical Models of Computer Systems, Networks and Bioinformatics. SN Computer Science. 1(1):44:1-44:10. (804.77 KB) .
2020.
Sharing Energy for Optimal Edge Performance. SOFSEM 2020: Theory and Practice of Computer Science. (342.1 KB) .
2020.
Transient Behaviour of a Network Router. 43th International Conference on Telecommunications and Signal Processing. (712.6 KB) .
2020.
Man-Machine Interactions 6 - 6th International Conference on Man-Machine Interactions, ICMMI 2019, Cracow, Poland, October 2-3, 2019. Advances in Intelligent Systems and Computing. 1061 .
2020.
The self-similar markovian sources. Applied Sciences. 10(11) .
2020.
Autopolicy: Automated Traffic Policing for Improved IoT Network Security. Sensors. 20 .
2020.
Incentive mechanism for collective coordination in an urban intelligent transportation system using G-networks. IEEE MASCOTS 2020. (1.32 MB) .
2020.
Optimum checkpoints for time and energy. IEEE MASCOTS 2020. (557.59 KB) .
2020.
The Random Neural Network with Deep Learning Clusters in Smart Search. Neurocomputing. 396 (2.52 MB) .
2020.
Time Dependent Diffusion Model for Security Driven Software Defined Networks. Second International Workshop on Stochastic Modeling and Applied Research of Technology (SMARTY 2020). 2792:38-56. (2.06 MB) .
2020.
Deep Learning Clusters in the Cognitive Packet Network. Neurocomputing. 396 (4.6 MB) .
2020.
Auction-Based Data Transaction in Mobile Networks: Data Allocation Design and Performance Analysis. IEEE Transactions on Mobile Computing. 19(5) (432.73 KB) .
2020.
Performance Evaluation of the Packet Aggregation Mechanism of an N-GREEN Metro Network Node. Modelling, Analysis, and Simulation of Computer and Telecommunication Systems, 28th International Symposium, MASCOTS 2020, Nice, France, November 17–19, 2020, Revised Selected Papers. 12527 .
2020.
Software Defined Network Dynamics via Diffusions. 28th International Symposium on Modelling, Analysis, and Simulation of Computer and Telecommunication Systems, MASCOTS 2020, revised delected papers. 12527 (447.84 KB) .
2020.
Time Dependent Diffusion Model for Security Driven Software Defined Networks. The Second International Workshop on Stochastic Modeling and Applied Research of Technology (SMARTY 2020). 2792:pp.38-56. (2.29 MB) .
2020.
The AQM Dropping Packet Probability Function Based on Non-integer Order PI^αD^β Controller. Lecture Notes in Electrical Engineering. 496:36-48. .
2019.
Performance Optimization With Energy Packets. IEEE Systems Journal. .
2019.
Accurate, Energy-efficient Classification With Spiking Random Neural Network. Probability in the Engineering and Informational Sciences. .
2019.
A Queueing Model and Performance Analysis of UPnP/HTTP client server interactions in Networked Control Systems. Computer Networks 2019. :366-386. .
2019.
Optimum checkpoints for programs with loops. Simulation Modelling Practice and Theory. 97 .
2019.
DNS Observatory: The Big Picture of the DNS. ACM Internet Measurement Conference 2019. .
2019.
DNS Observatory: The Big Picture of the DNS. ACM Internet Measurement Conference 2019. .
2019.
Cognitive Packet Networks for the Secure Internet of Things. Global IoT Summit (GIoTS). .
2019.
Cognitive Routing for Improvement of IoT Security. 2019 IEEE International Conference on Fog Computing ICFC. .
2019.
AQM Mechanism with the Dropping Packet Function Based on the Answer of Several PIα Controllers. Communications in Computer and Information Science . 1039 .
2019.
Diffusion Approximation Models for Cloud Computations with Task Migrations. 2019 IEEE International Conference on Fog Computing (ICFC). .
2019.
The European cross-border health data exchange roadmap: Case study in the Italian setting. J. Biomed. Informatics. 94 .
2019.
A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade. ACM Comput. Surv.. 51:105:1–105:38. .
2019.
Product-Form Solution for Cascade Networks With Intermittent Energy. IEEE Systems Journal. 13:918–927. (638.93 KB) .
2019.
Peer Prediction-Based Trustworthiness Evaluation and Trustworthy Service Rating in Social Networks. IEEE Trans. Information Forensics and Security. 14:1582–1594. (9.62 MB) .
2019.
Double Auction Mechanism Design for Video Caching in Heterogeneous Ultra-Dense Networks. IEEE Trans. Wireless Communications. 18:1669–1683. .
2019.
From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes. 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2019, Limassol, Cyprus, September 11-13, 2019. .
2019.
Optimum Interval for Application-level Checkpoints. 6th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2019 / 5th IEEE International Conference on Edge Computing and Scalable Cloud, EdgeCom 2019, Paris, France, June 21-23, 2019. .
2019.
Energy Consumption and Quality of Service in Computer Systems and Networks. 23rd IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications DS-RT 2019, Cosenza, Italy, October 7-9, 2019. .
2019.
Secure Cross-Border Exchange of Health Related Data: The KONFIDO Approach. 15th European Dependable Computing Conference, EDCC 2019, Naples, Italy, September 17-20, 2019. .
2019.
Improve cybersecurity of C-ITS Road Side Infrastructure Installations: the SerIoT - Secure and Safe IoT approach. 2019 IEEE International Conference on Connected Vehicles and Expo, ICCVE 2019, Graz, Austria, November 4-8, 2019. .
2019.
Secure Cross-Border Exchange of Health Related Data: The KONFIDO Approach. Internet and Distributed Computing Systems - 12th International Conference, IDCS 2019, Naples, Italy, October 10-12, 2019, Proceedings. .
2019.
Accurate and Energy-Efficient Classification with Spiking Random Neural Network: Corrected and Expanded Version. CoRR. abs/1906.08864 .
2019.
Emergency Management Systems and Algorithms: a Comprehensive Survey. CoRR. abs/1907.04136 .
2019.
Multichannel Diffusion Approximation Models for the Evaluation of Multichannel Communication Networks. Distributed Computer and Communication Networks - 22nd International Conference, DCCN 2019, Moscow, Russia, September 23-27, 2019, Revised Selected Papers. .
2019.
A Survey of Algorithms and Systems for Evacuating People in Confined Spaces. Electronics — Open Access Journal. vol. 8 (2.91 MB) .
2019.
The Random Neural Network in a neurocomputing application for Web search. Neurocomputing. 280:123-134. .
2018.
Adaptive Dispatching of Tasks in the Cloud. IEEE Transactions on Cloud Computing . 6(1):33-45. .
2018.
An OpenNCP-based Solution for Secure eHealth Data Exchange. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS. 116:65-85. .
2018.
Product-Form Solution for Cascade Networks With Intermittent Energy. IEEE Systems Journal. PP(99):1-10. .
2018.
Energy life-time of wireless nodes with network attacks and mitigation. 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018; Kansas City; United States. .
2018.
Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments. The 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops. .
2018.
Research and innovation action for the security of the internet of things: The SerIoT project. Communications in Computer and Information Science. 821:101-118. .
2018.
Deep learning with dense random neural networks for detecting attacks against IoT-connected home environments. 1st International Symposia on Computer and Information Sciences, ISCIS 2018. .
2018.
KONFIDO: An OpenNCP-Based Secure eHealth Data Exchange System. 1st International Symposia on Computer and Information Sciences, ISCIS 2018. .
2018.
Static Analysis-Based Approaches for Secure Software Development. 1st International Symposia on Computer and Information Sciences, ISCIS 2018. .
2018.
Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists. ACM Internet Measurement Conference 2018. .
2018.
European Cybersecurity Research and the SerIoT Project. Communications in Computer and Information Science . 935:166-173. .
2018.
Does surgical site infection after Caesarean section in Polish hospitals reflect high-quality patient care or poor postdischarge surveillance? Results from a 3-year multicenter study. American Journal of Infection Control. 46(1):20-25. .
2018.
GPU Accelerated Non-integer Order PI^αD^β Controller Used as AQM Mechanism. Communications in Computer and Information Science. 860:286-299. .
2018.
The Influence of the Traffic Self-similarity on the Choice of the Non-integer Order PI^α Controller Parameters. Communications in Computer and Information Science. 935:76-83. .
2018.
Security for Internet of Things: The SerIoT Project. 2018 International Symposium on Networks, Computers and Communications (ISNCC). .
2018.
Models of traffic control in large Internet topologies, invited talk. The 8th International Conference on Electronics, Communications and Networks (CECNet 2018) Bangkok, Thailand, November 16-19th, 2018. .
2018.
Queueing Models for Performance Evaluation of Computer Networks - Transient State Analysis, invited talk . 2018 International Conference on Sensor Networks and Signal Processing (SNSP 2018). .
2018.
Queueing models of traffic control and performance evaluation in large Internet topologies, key-note talk. XIII International Scientific and Technical Conference, Computer Science and Information Technologies. .
2018.
Metoda sterowania natężeniem ruchu w Internecie, referat zaproszony. XXI Krajowa Konferencja Automatyzacji Procesów Dyskretnych. .
2018.
Performance of a buffer between electronic and all-optical networks, diffusion approximation model. 32nd International Symposium on Computer and Information Sciences In Conjunction with the IFIP World Congress 2018. .
2018.
A Queueing Model of the Edge Node in IP over All-Optical Networks. Computer Networks 2018. .
2018.
IoT European Security and Privacy Projects: Integration, Architectures and Interoperability. Next Generation Internet of Things. Distributed Intelligence at the Edge and Human Machine-to-Machine Cooperation. .
2018.
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange. BMC Med. Inf. & Decision Making. 18:85:1–85:16. .
2018.
Distributed Data Privacy Preservation in IoT Applications. IEEE Wirel. Commun.. 25:68–76. .
2018.
GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control. Security in Computer and Information Sciences - First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers. .
2018.
Machine Learning to Predict Toxicity of Compounds. Artificial Neural Networks and Machine Learning - ICANN 2018 - 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part I. .
2018.
Energy Life-Time of Wireless Nodes with Network Attacks and Mitigation. 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018, Kansas City, MO, USA, May 20-24, 2018. .
2018.
A Reinforcement Learning Approach to Adaptive Forwarding in Named Data Networking. Computer and Information Sciences - 32nd International Symposium, ISCIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 20-21, 2018, Proceedings. .
2018.
Networked Data Transaction in Mobile Networks: A Prediction-based Approach Using Auction. 14th International Wireless Communications & Mobile Computing Conference, IWCMC 2018, Limassol, Cyprus, June 25-29, 2018. .
2018.
Cognitive Data Allocation for Auction-based Data Transaction in Mobile Networks. 14th International Wireless Communications & Mobile Computing Conference, IWCMC 2018, Limassol, Cyprus, June 25-29, 2018. .
2018.
Security in Computer and Information Sciences - First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers. Communications in Computer and Information Science. 821 .
2018.
Computer and Information Sciences - 32nd International Symposium, ISCIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 20-21, 2018, Proceedings. Communications in Computer and Information Science. 935 .
2018.
A Queueing Model of the Edge Node in IP over All-Optical Networks. 25th International Conference on Computer Networks. .
2018.
Performance of a buffer between electronic and all-optical networks, diffusion approximation model. 32nd International Symposium on Computer and Information Sciences In Conjunction with the IFIP World Congress 2018. (250.54 KB) .
2018.
Contract Design for Traffic Offloading and Resource Allocation in Heterogeneous Ultra-Dense Networks. IEEE Journal on Selected Areas in Communications. 35:2457-2467. .
2017.
Single-cell based random neural network for deep learning. 2017 International Joint Conference on Neural Networks (IJCNN 2017), Anchorage, United States, May 14-19 2017.. 2017:86-93. .
2017.
Multi-layer neural networks for quality of service oriented server-state classification in cloud servers. 2017 International Joint Conference on Neural Networks (IJCNN 2017), Anchorage, United States, May 14-19 2017.. 2017:1623-1627. .
2017.
Special Issue on Green Pervasive and Ubiquitous Systems. IEEE Systems Journal. 11(2):806-812. .
2017.
Wireless sensor with data and Energy Packets. 2017 IEEE International Conference on Communications Workshops (ICC Workshops 2017). .
2017.
Research of Heterogeneous Queueing System SM|M(n)|∞. Communications in Computer and Information Science 16th International Conference, ITMM 2017. .
2017.
G-networks with Adders. Future Internet. 9(3):1-7. .
2017.
Intelligent search with deep learning clusters. Intelligent Systems Conference (IntelliSys) 2017. .
2017.
Deep Learning with Dense Random Neural Networks. International Conference on Man–Machine Interactions. .
2017.
The Deep Learning Random Neural Network with a Management Cluster. 9th KES International Conference on Intelligent Decision Technologies (KES-IDT 2017). .
2017.
Data Transaction Modeling in Mobile Networks: Contract Mechanism and Performance Analysis. IEEE Global Telecommunications Conference. .
2017.
Self-similarity Traffic and AQM Mechanism Based on Non-integer Order Pi^αD^β Controller. Communications in Computer and Information Science. 718:336-350. .
2017.
Hidden Markov Models in Long Range Dependence Traffic Modelling. Communications in Computer and Information Science. 700:75-86. .
2017.
A Queueing Model of an Insurance Database Interactive System, Comparison of Modelling Methods. 5th International Conference on Man - Machine Interactions, ICMMI 2017. .
2017.
Performance Modelling of Transmissions in Very Large Network Topologies. Distributed Computer and Communication Networks 20th International Conference, DCCN 2017. .
2017.
A Study of IP Router Queues with the Use of Markov Models. Communications in Computer Information Science. 608:294-305. .
2016.
Waterfall Traffic Classification: A Quick Approach to Optimizing Cascade Classifiers. Wireless Personal Communications. :1–16. .
2016.
Entropy/IP: Uncovering Structure in IPv6 Addresses. ACM Internet Measurement Conference 2016. .
2016.
Modelling Dynamics of TCP Flows in Very Large Network Topologies. Information Sciences and Systems 2015: 30th International Symposium on Computer and Information Sciences (ISCIS 2015). :251–259. .
2016.
Modelling and Analysing Mixed Reality Applications. Man–Machine Interactions 4: 4th International Conference on Man–Machine Interactions, ICMMI 2015 Kocierz Pass, Poland, October 6–9, 2015. :3–17. .
2016.
The Impact of the Degree of Self-Similarity on the NLREDwM Mechanism with Drop from Front Strategy. Communications in Computer Information Science. 608:192–203. .
2016.
Delays in IP Routers, a Markov Model. Communications in Computer Information Science. 659:185–192. .
2016.
The Fluid Flow Approximation of the TCP Vegas and Reno Congestion Control Mechanism. Communications in Computer Information Science. 659:193–200. .
2016.
Device-associated pneumonia of very low birth weight infants in Polish Neonatal Intensive Care Units. Advances in Medical Sciences. 61:90-95. .
2016.
Global Queue Pruning Method for Efficient Broadcast in Multihop Wireless Networks. Computer and Information Sciences: 31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings. :214–224. .
2016.
Computer and Information Sciences ISCIS 2016. Communications in computer Information Science. 659:500. .
2016.
Energy Packet Networks With Energy Harvesting. IEEE ACCESS. 4:1321-1331. .
2016.
Big Data for Autonomic Intercontinental Overlays. IEEE Journal on Selected Areas in Communications. 34(3):575-583. .
2016.
Real-Time Traffic over the Cognitive Packet Network. 23rd International Conference on Computer Networks (CN). 608:3-21. .
2016.
Towards a cognitive routing engine for software defined networks. IEEE International Conference on Communications (ICC). :1-6. .
2016.
Detection and mitigation of signaling storms in mobile networks. International Conference on Computing, Networking and Communications (ICNC). :1-5. .
2016.
An Intelligent Internet Search Assistant Based on the Random Neural Network. 12th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations (AIAI). 475:141-153. .
2016.
A Diffusion Model for Energy Harvesting Sensor Nodes. 24th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS). :154-158. .
2016.
Optimizing Secure SDN-Enabled Inter-Data Centre Overlay Networks through Cognitive Routing. 2016 IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS). :283-288. .
2016.
Deep learning with random neural networks. International Joint Conference on Neural Networks (IJCNN). :1633-1638. .
2016.
Adaptive workload distribution for local and remote Clouds. IEEE International Conference on Systems, Man, and Cybernetics (SMC). :3984-3988. .
2016.
Agreement in Spins and Social Networks. ACM SIGMETRICS Performance Evaluation Review. 44(2):15-17. .
2016.
Modeling and Analysis of RRC-Based Signalling Storms in 3G Networks. IEEE Transactions on Emerging Topics in Computing. 4(1):113-127. .
2016.
Information Sciences and Systems 2015 30th International Symposium on Computer and Information Sciences (ISCIS 2015). Lecture Notes in Electrical Engineering. 363:457. .
2016.
The use of a non-integer order PI controller with an active queue management mechanism. International Journal of Applied Mathematics and Computer Science. 26(4):777-789. .
2016.
LTE or WiFi? Client-Side Internet link selection for smartphones. Computer Networks. :43–53. .
2015.
Estimating the intensity of long-range dependence in real and synthetic traffic traces.. Computer Networks. :11–22. .
2015.
An analysis of the extracted parts of Opte Internet topology.. Computer Networks. :371–381. .
2015.
Waterfall traffic identification: optimizing classification cascades. Computer Networks. :1–10. .
2015.
Demo: Wireless Link Selection on Smartphone: Throughput vs Battery Drain. MobiCom '15 Proceedings of the 21st Annual International Conference on Mobile Computing and Networking. :190–192. .
2015.
A model of boot-up storm dynamics. Computer and Information Sciences III. :371–379. .
2014.
Visualization of heterogenic images of 3D scene. Man-Machine Interacions 3. :291–297. .
2014.
Implementation of registration algorithms for multiple views. Man-Machine Interacions 3. :315–323. .
2014.
DNS-Class: Immediate classification of IP flows using DNS. International Journal of Network Management. .
2014.
Waterfall: Rapid identification of IP flows using cascade classification. Communications in Computer and Information Science. .
2014.
Source Model of TCP Traffic in LTE Networks. Information Sciences and Systems 2014. .
2014.
Flluid flow approximation of time-limited TCP/UDP/XCP streams.. Bulletin of the Polish Academy of Sciences Technical Sciences. 62:217–225. .
2014.
A few investigations of long-range dependence in network traffic. Information Science and Systems 2014. :137–144. .
2014.
A red modified weighted moving average for soft real-time application. Int. J. Appl. Math. Comput. Sci.. 24:697–707. .
2014.
JavaScript Frameworks and Ajax Applications. Computer Networks. :57–68. .
2014.
Modeling Packet Traffic with the Use of Superpositions of Two-State MMPPs. Computer Networks. :24–36. .
2014.
Late-onset bloodstream infections of Very-Low-Birth-Weight infants: data from the Polish Neonatology Surveillance Network in 2009-2011. BMC Infectious Deseases. 14:339–346. .
2014.
Traffic Engineering: Erlang and Engset Models Revisited with Diffusion Approximation. Information Sciences and Systems 2014. :249–256. .
2014.
A Numerical Comparison of Diffusion and Fluid-Flow Approximations Used in Modelling Transient States of TCP/IP Networks.. Computer Networks. :213–222. .
2014.
Modelling Transient States in Queueing Models of Computer Networks: A Few Practical Issues. Distributed Computer and Communication Networks. :58–72. .
2014.
Fluid Flow Analysis of RED Algorithm with Modified Weighted Moving Average. Modern Probabilistic Methods for analysis of Telecommunication Networks. :50–58. .
2013.
Comparison of CHOKe and gCHOKe active queues managemant algirithms with the use of fluid flow approximation.. Computer Networks. :363–371. .
2013.
Analytical and numerical means to model transient states in computer networks. Computer Networks. :426–435. .
2013.
On different ways to classify Internet traffic: a short review of selected publications. Theoretical and Applied Informatics. 25:119–136. .
2013.
Modelling transient states in queueing models of computer networks: a few practical issues. Proceedings of the International Conference Distributed Computer and Communication networks: Control, Computation, Communications. :27–28. .
2013.
Queueing models: transient state analysis applied to performance evaluation of computer networks.. Abstracts 9th International ISAAC Congress. :5–6. .
2013.
Modelling and controlling dynamics of Internet flows.. Proc. Intellectual systems of decision-making and problems of computational intelligence. .
2013.
Transient queueing models applied to performance evaluation of computer networks.. Proc. Third International Conference of Gwalior Academy of Mathematical Sciences (GAMS) on Mathematical, Computational and Integrative Sciences. .
2013.
Epidemiologia zakażeń noworodków z bardzo małą masą urodzeniową. Developmental Period Medicine Medycyna Wieku Rozwojowego. XVII:224–231. .
2013.
Analysis of CHOKe-Family Active Queue Management. Theoretical and Applied Informatics. 25:49–66. .
2013.
GCU-Accelerated fluid flow approximation of the Active Queues Management algorithms. Theoretical and Applied Informatics. 25:93–104. .
2013.
Performance Evaluation of a Multiuser Interactive Networking System: A Comparison of Modelling Methods. Computer and Information Sciences II. :215–222. .
2012.
Tracedump: A Novel Single Application IP Packet Sniffer. Theoretical and Applied Informatics. 24 .
2012.
Early-onset Infections of Very-low-birth-weight Infants in Polish Neonatal Intensive Care Units. The Pediatric Infectious Disease Journal. 31:691–695. .
2012.
A HMM network traffic model. :17–20. .
2012.
Computer Networks. Communications in Computer and Information Science. 291 .
2012.
Computer Networks. Communications in Computer and Information Science. 291 .
2012.
Badanie skalowalności modeli sieci komputerowych wykorzystujących aproksymację dyfuzyjną wraz ze zwiększeniem rozmiaru modelowanej sieci. Studoa Informatica. 33:63–78. .
2012.
Modelowanie dynamiki przesyłów TCP/IP z uwzględnieniem mechanizmu RED. Studia Informatica. 33:49–62. .
2012.
Duration of boot-up storm period. 17th Polish teletraffic symposium. :145–150. .
2012.
The choice of optimal 3-rd order polynomial packet dropping function for NLRED in the presence of self-similar traffic. Bulletin of the Polish Academy of Sciences Technical Sciences. 60 .
2012.
Eigengestures for natural human computer interface. Man-Machine Interactions 2. :49–56. .
2011.
Smart Spaces and Next Generation Wired/Wireless Networking. Lecture Notes in Computer Science. 6869 .
2011.
Man-Machine Interaction 2. Advances in Intelligent and Soft Computing. 103 .
2011.
Numerical Model of Tcp in 802.16 Networks Using Fluid Flow Approximation. First International Conference on Networking and Future Internet 2011 (ICNFI 2011). .
2011.
Simulation, Markov Chain and Diffusion Approximation Models – a Case Study. “Computer Science & Information Technologies” (CSIT’2011). .
2011.
Porównanie metod analizy efektywności na przykładzie serwera aplikacji w sieci lokalnej. Studia Informatica. 32:7–20. .
2011.
Internet - Technical developments and Applications 2. Advances in Intelligent and Soft Computing. 118 .
2011.
The Impact of the Modified Weighted Moving Average on the Performance of the RED Mechanism. Computer Networks. :37–44. .
2011.
Internet Traffic Source Vased on Hidden Markov Model. Smart spaces and Next Generation Wired/Wireless Networking. :395–404. .
2011.
Modelling transient TCP flows with the use of fluid flow approximation - a numerical study. Computer Science & Information Technologies. :181–184. .
2011.
Modelling TCP Connection in WIMAX Network Using Fluid Flow Approximation.. Applications and the Internet. :502–507. .
2011.
QoS management for multimedia traffic in synchronous slotted-ring OPS networks. Proc. of HET-NETs 2010 Conference. :143–152. .
2010.
Progressive 3D meshes transmission: traffic generating and simulation evaluation. Theoretical and Applied Informatics. 22:247–259. .
2010.
A diffusion approximation model for wireless networks based on IEEE 802.11 standard, Computer Communication Journal. Computer Communication Journal. 33:S86–S92. .
2010.
Modeling the IEEE 802.11 Networks MAC Layer Using Diffusion Approximation. Proceeding of HET-NETs 2010. :429–442. .
2010.
Performance evaluation of multiuser interactive networking system. Proceedings of 6th International Conference HET-NETs 2010. :223–231. .
2010.
Simulation models of fair scheduling for the TCP and UDP streams. HET-NETs 2010. .
2010.
A contribution to the fair scheduling for the TCP and UDP streams. Communications in Computer and Information Science 79. .
2010.
A choice of optimal packet dropping function for active queue management. Communications in Computer and Information Science 79. .
2010.
Examination of robust stability of computer networks. Performance Modelling and Evaluation of Heterogeneous Networks. :75–87. .
2010.
Active Queue Management with non-linear packets dropping function. Performance Modelling and Evaluation of Heterogeneous Networks Proceedings of 6th Working International Conference. :133–142. .
2010.
Modeling of Internet 3D Traffic Using Hidden Markov Models. Advances in Intelligent and Soft Computing. 64 .
2009.
Simulation models of fair scheduling for the TCP and UDP streams. Theoretical and Applied Informatics. .
2009.
Un modele d’approximation de diffusion pour la distribution du temps d’acheminement des paquets dans les réseaux de senseurs. Colloque francophone sur l’ingénierie des protocoles. .
2008.
Estimation of packet transfer time at sensor networks, diffusion approximation approach. Proceedings from HET-NETs. .
2008.
TCP performance for a wireless traffic, a diffusion approxiation model. Proceedings from Workshop on Wireless and mobility in Future Generation Internet. .
2008.
Implementation of modified AQM mechanisms in IP routers. Journal of Communications Software and Systems. 4 .
2008.
Sieci Komputerowe. .
2008.
Some aspects of QoS in wireless LAN. Studia Informatica. .
2008.
The impact of self-similarity on traffic shaping in wireless LAN. Lecture Notes in Computer Science, Springer Berlin. .
2008.
Parallel simulation of networks with packet loss. 14th Polish Teletraffic Symposium. .
2007.
Level Crossing Ordering of Markov Chains: Proving Convergence and Bounding End to End Delays in an All Optical Network. ACM Proceedings from Valuetools 2007. .
2007.
Simulation Analysis of Deflection Routing in Hypercube. Proceedings from Polish Teletraffic Symposium. .
2007.
Fluid-flow Approximation Model of TCP-NCR in wired-wireless networks. Proceedings from Polish Teletraffic Symposium. .
2007.
Analiza wydajności protokołu TCP-NCR w sieciach bezprzewodowych. Materiały Konferencji Sieci Komputerowe. .
2007.
Stability and Dynamics of TCP-NCR(DCR) Protocol. Lecture Notes in Computer Systems 4396 - Wireless Systems and Mobility in Next Generation Internet. :241–254. .
2007.
Sieci komputerowe. .
2007.
The Drop-From-Front Strategy in AQM. Lecture Notes in Computer Science, Springer Berlin. 4712:61–72. .
2007.
Sieci Komputerowe Aplikacje i zastosowania. 2 .
2007.
Packet Loss Analysis in Optical Packet-Switched Networks with Limited Deflection Routing. Photonic Network Communications. .
2006.
A model of TCP flows dynamics. Theoretical and Applied Informatics. 18:279–292. .
2006.
Some contributions to the modelling the dynamics of (TCP,UDP)/RED flows over reliable and unreliable connections. Proceedings from HET-NETs 2006. .
2006.
Nowe Technologie Sieci Komputerowych. 1 .
2006.
Dynamics of TCP/IP flows in presence of various AQM algorithms, a fluid flow approximation model. Third EuroNGI Workshop on New Trends in Modelling, Quantitative methods and Measurements. .
2006.
TCP/IP dynamics in wireless environment, a fluid-flow model. Third Workshop on Wireless and Mobility. .
2006.
Nowe Technologie Sieci Komputerowych. 1 .
2006.
Nowe Technologie Sieci Komputerowych. .
2006.
OPUS Software for Performance Evaluation of Optical Packet-Switched Networks. XII Konferencja Sieci Komputerowe. .
2005.
Wysokowydajne sieci komputerowe. .
2005.
Internet 2005. .
2005.
A diffusion approximation model of an electronic-optical node. LNCS, Formal Techniques for Computer Systems and Bisiness Proesses. :187–199. .
2005.
A novel diffusion process with jumps to study an electronic-optical edge router. Archiwum Informatyki Teoretycznej I Stosowanej. 17:87–100. .
2005.
The influence of traffic self-similarity on QoS Mechanisms. Proceedings of SAINT 2005 Workshops, 31 January – 4 February 2005, Trento, Italy. :300–303. .
2005.
Preliminary results of packet loss analysis in optical packet-switched networks with limited deflection routing. Proc. of SAINT 2005 Workshops, 31 January - 4 February 2005, Trento, Italy. :296–299. .
2005.
Forming optical packets, a diffusion approximation model. Proc. of 12th Polish Teletraffic Symposium PSRT2005, Poznan, 20-21 September 2005.. .
2005.
Forming optical packets, a diffusion approximation and simulation models. Proc. Second EuoNGI Workshop on New Methods in Modelling, Quantitative Methods and Measurements, Aveiro, Porugal, November 24-25, 2005. .
2005.
Diffusion Approximation as a modelling tool in congestion control and performance evaluation, tutorial. Proc. of HET-NETs '04, Performance Modelling and Evaluation of Heterogenous Networks. .
2004.
Markovian models for long-range dependent traffic, new results. Proc. of First Workshop on New Trends in Modelling Quantitave Methods and Measurements, in Modelling Quantitave Methods and Measurements, Zakopane, 27-29 June 2004. :213–228. .
2004.
The use of vectorized and parallelized solutions to Markovian models in performance evaluation of communication networks: a case of leaky buckets with tokens. Archiwum Informatyki Teoretycznej i Stosowanej. 16:153–170. .
2004.
Self-similarity of network traffic and the performances of QoS mechanisms. Archiwum Informatyki Teoretycznej i Stosowanej. 16:337–349. .
2004.
Diffusion approximation: modelling transient flows of multiclass queueing networks. Proc. of International Network Optimization Conference, INOC'03, Oct. 27-29, 2003 Evry, France. .
2003.
Optical packet filling. Proc. 10th Polish Teletraffic Symposium, Kraków 18-19 Sept. 2003. :419–429. .
2003.
Analityczne modele kolejkowe w ocenie efektywności pracy systemów i sieci kolejkowych. Pro Dialog. 16:90–111. .
2003.
Kwantowe systemy informatyki. .
2003.
Wpływ samopodobnej natury ruchu na zachowanie mechanizmu cieknącego wiadra. Studia Informatica. 24:199–212. .
2003.
Model formowania pakietów w węźle brzegowym sieci optycznej. Studia Informatica. 24:51–61. .
2003.
A Mixed Deflection and Convergence Routing Algorithm: Design and Performance. Proc. of Euro-Par 2002, 27-30 August 2002, Padeborn University, Padeborn, Germany. .
2002.
Internet and real-time performance: a web server model. Proc. of 9th Conf. on Real-Time Systems, Ustroń, 16-19 September 2002. .
2002.
Performance of a mixed deflection and convergence routing algorithm. Proc. of 2nd Polish-German Teletraffic Symposium PGTS, Gdansk, 22-25 September 2002. .
2002.
A diffusion approximation model of Web servers. Proc. of WITASI02, 1st IFIP Workshop on Internet Technologies, Applications and Societal Impact, Wrocław, October 10-11, 2002. .
2002.
Badanie dynamiki algorytmu RED. Studia Informatica. 23:223–234. .
2002.
Wpływ samopodobnej natury ruchu na długości kolejek w przełącznikach sieciowych. Studia Informatica. 23:201–212. .
2002.
Blind shaping strategy of self-similar traffic: Markovian model. Archiwum Informatyki Teoretycznej i Stosowanej. 14:13–25. .
2002.
Performance evaluation of multistage interconnection networks with blocking - discrete and continuous time Markov model. Archiwum Informatyki Teoretycznej i Stosowanej. 14 .
2002.
Symulacyjne Badanie routingu w sieciach optycznych. Studia informatica. 2A:45–58. .
2002.
Samopodobny charakter natężenia ruchu w sieciach komputerowych. Studia Informatica. 22 .
2001.
A tool for network traffic generation and transmission delay measurement. Proceedings of 8th Polish Teletraffic Symposium. .
2001.
Markovian models for long-range dependent traffic. Archiwum Informatyki Teoretycznej i Stosowanej. 13:297–308. .
2001.
Diffusion approximation and markovian models of RED control mechanism. Archiwum Informatyki Teoretycznej i Stosowanej. 13:343–354. .
2001.
Modelling New Congestion Control Mechanisms TCP/IP Internet Protocols. Proc. of International Conference on Control AUTOMATICS 2001, Odessa, Ukraine, 10-15 September 2001.. .
2001.
Diffusion Model of RED Control Mechanism. Proc. of International Conference on Networking ICN01, July 9-13, 2001, CREF, Universite de Haute Alsace, Colmar, France. .
2001.
Markovian Model of RED Mechanism. Proc. of CCGrid 2001, IEEE International Symposium on Cluster Computing, 15-18 May 2001, Brisbane, Australia. .
2001.
Historia zmian
Systems Modelling and Performance Evaluation and Security Group (SMaPESG) conducts research on models of computer systems and novel methods of modelling. In the scope of interests of the Group there are mainly models of computer networks. We are engaged in simulation and analytical modelling, both queuing models and other methods. Our experience embraces using of well-established modelling packages, like NS, OmNET++ or PRISM as well as creation of advanced proprietary software working in parallel environments.