Jacek Cichon

Orcid: 0000-0002-7742-3031

According to our database1, Jacek Cichon authored at least 49 papers between 1984 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
On distributed data aggregation and the precision of approximate histograms.
J. Parallel Distributed Comput., 2023

Sliding Window Sampling over Data Stream - a Solution Based on Devil's Staircases.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

2022
Taking snapshots from a stream.
CoRR, 2022

2021
Fair Mutual Authentication.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

2020
Revised Reliable Transmission with Minimal Delay in Wireless Sensor Networks.
Proceedings of the ICNCC 2020: The 9th International Conference on Networks, 2020

2019
Revised Gateway Selection for LoRa Radio Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2019

2018
Average Counting via Approximate Histograms.
ACM Trans. Sens. Networks, 2018

2017
Fault tolerant protocol for data collecting in wireless sensor networks.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

On Symmetries of Non-Plane Trees in a Non-Uniform Model.
Proceedings of the Fourteenth Workshop on Analytic Algorithmics and Combinatorics, 2017

Braid Chain Radio Communication.
Proceedings of the Algorithms for Sensor Systems, 2017

2016
On Leader Green Election.
CoRR, 2016

On spreading rumor in heterogeneous systems.
CoRR, 2016

A Jamming-Resilient MAC-layer Device Identification for Internet of Things.
CoRR, 2016

One- and Multi-Pass Long-Hop Routing for Wireless Network.
CoRR, 2016

λ-persistant CSMA: a radio-channel access protocol.
CoRR, 2016

Protecting Electronic Signatures in Case of Key Leakage.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

2015
On the Dynamics of Systems of Urns.
Discret. Math. Theor. Comput. Sci., 2015

2013
On Flooding in the Presence of Random Faults.
Fundam. Informaticae, 2013

On Delta-Method of Moments and Probabilistic Sums.
Proceedings of the 10th Meeting on Analytic Algorithmics and Combinatorics, 2013

2012
From key predistribution to key redistribution.
Theor. Comput. Sci., 2012

Two-phase cardinality estimation protocols for sensor networks with provable precision.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

On size estimation protocols for Sensor Networks.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

On Message Complexity of Extrema Propagation Techniques.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 11th International Conference, 2012

2011
Brief Announcement: A Note on Replication of Documents.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011

Approximate Counters for Flash Memory.
Proceedings of the 17th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2011

On Cardinality Estimation Protocols for Wireless Sensor Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 10th International Conference, 2011

2010
Hamel-isomorphic images of the unit ball.
Math. Log. Q., 2010

Uniformity of Improved Versions of Chord.
Proceedings of the Information Computing and Applications - First International Conference, 2010

On Alarm Protocol in Wireless Sensor Networks.
Proceedings of the Ad-Hoc, Mobile and Wireless Networks, 9th International Conference, 2010

2009
Node Evaluation in the Chord P2P Systems.
Proceedings of the Fourth International Conference on Dependability of Computer Systems, 2009

Minimal Büchi Automata for Certain Classes of LTL Formulas.
Proceedings of the Fourth International Conference on Dependability of Computer Systems, 2009

On Optimal One-dimensional Routing Strategies in Sensor Networks.
Proceedings of the Selected Papers on Broadband Communication, 2009

Key Levels and Securing Key Predistribution against Node Captures.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2009

2008
Adaptive initialization algorithm for ad hoc radio networks with carrier sensing.
Theor. Comput. Sci., 2008

Short Ballot Assumption and Threeballot Voting Protocol.
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008

Privacy Protection for RFID with Hidden Subset Identifiers.
Proceedings of the Pervasive Computing, 2008

How to Improve the Reliability of Chord?.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008

Power of Discrete Nonuniformity - Optimizing Access to Shared Radio Channel in Ad Hoc Networks.
Proceedings of the MSN 2008, 2008

Distributed Verification of Mixing - Local Forking Proofs Model.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Privacy Protection in Dynamic Systems Based on RFID Tags.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Anonymity and k-Choice Identities.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Random Subsets of the Interval and P2P Protocols.
Proceedings of the Approximation, 2007

2006
Initialization for Ad Hoc Radio Networks with Carrier Sensing and Collision Detection.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006

2005
Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

2000
Dualization of The Van Douwen Diagram.
J. Symb. Log., 2000

1993
Combinatorial Properties of the Ideal P<sub>2</sub>.
J. Symb. Log., 1993

1991
Decomposing Baire Functions.
J. Symb. Log., 1991

1986
On Ideals of Subsets of the Plane and on Cohen Reals.
J. Symb. Log., 1986

1984
On the Compactness of Some Boolean Algebras.
J. Symb. Log., 1984


  Loading...