According to our database1, Jerzy Konorski authored at least 50 papers between 1986 and 2020.
Legend:Book In proceedings Article PhD thesis Other
A reactive algorithm for deducing nodal forwarding behavior in a multihop ad-hoc wireless network in the presence of errors.
Nodal cooperation equilibrium analysis in multihop wireless ad hoc networks with a reputation system.
Proceedings of the 29th International Telecommunication Networks and Applications Conference, 2019
Proceedings of the Ad Hoc Networks - 11th EAI International Conference, 2019
Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network.
Wirel. Commun. Mob. Comput., 2018
IEEE Wirel. Commun. Lett., 2018
Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 10th International Workshop on Resilient Networks Design and Modeling, 2018
A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks.
Proceedings of the IEEE Global Communications Conference, 2018
IEEE Commun. Lett., 2017
Nodal Cooperation Equilibrium Analysis in Multi-hop Wireless Ad Hoc Networks with a Reputation System.
Proceedings of the Computer Network Security, 2017
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Trust Dynamics Analysis of CTR Scheme Subversion under Virtual Anonymity and Trust-Unaware Partner Selection.
Proceedings of the 18th International Workshop on Trust in Agent Societies co-located with the 15th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2016), 2016
Proceedings of the 8th IFIP Wireless and Mobile Networking Conference, 2015
IEEE Trans. Wirel. Commun., 2014
Proceedings of the International Conference on Information Networking 2014, 2014
Theory and implementation of a virtualisation level Future Internet defence in depth architecture.
Int. J. Trust. Manag. Comput. Commun., 2013
EDCA remapping in ad hoc IEEE 802.11 WLANs: An incentive compatible discouragement scheme.
Proceedings of the IFIP Wireless Days Conference 2012, Ireland, November 21-23, 2012, 2012
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
DRinK: a defense strategy of cooperative wireless terminals in a wireless multihoming environment.
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011
Proceedings of the 2011 International Conference on Information Networking, 2011
Proceedings of IEEE International Conference on Communications, 2011
Router selfishness in community wireless mesh networks: Cross-layer benefits and harms.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
Data-Centric Dempster-Shafer Theory-Based Selfishness Thwarting via Trust Evaluation in MANETs and WSNs.
Proceedings of the NTMS 2009, 2009
Proceedings of the Wireless and Mobile Networking - Second IFIP WG 6.8 Joint Conference, 2009
Proceedings of the 12th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2009
J. Discrete Algorithms, 2007
An Incentive-Based Forwarding Protocol for Mobile Ad Hoc Networks with Anonymous Packets.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2007
Capacity-Fairness Performance of an Ad Hoc IEEE 802.11 WLAN with Noncooperative Stations.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007
IEEE/ACM Trans. Netw., 2006
J. Networks, 2006
Proceedings of the 9th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2006
An Idea Bag Strategy to Discourage Selfish Behavior Under Random Token MAC Protocols for Wireless LANs.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006
Proceedings of the Distributed Computing and Internet Technology, 2006
Proceedings of the 13th International Symposium on Modeling, 2005
Proceedings of the Distributed Computing, 2005
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 4th International Conference, 2005
Proceedings of the NETWORKING 2004, 2004
CSMA/CA Performance under Backoff Attacks: A Game-Theoretic Context.
Proceedings of the MMB & PGTS 2004, 2004
Proceedings of the NETWORKING 2002, 2002
Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting.
Proceedings of the Protocols for Multimedia Systems, 6th International Conference, 2001
Proceedings of the NETWORKING 2000, 2000
Packet Scheduling in Wireless LANs - A Framework for a Noncooperative Paradigm.
Proceedings of the Personal Wireless Communications, 2000
Performance of the Cooperative Random Token Protocol for High-Speed Radio LANs.
Proceedings of the High Speed Networks and Their Performance, 1993
Store-and-Forward Deadlock Prevention in Packet Networks: A Circulating Token Approach and Performance Considerations.
Proceedings of the IEEE International Conference on Communications: Integrating the World Through Communications, 1986