Andrzej Wilczyński

Andrzej Wilczyński
  • Master of Computer Science
  • Research & Teaching Assistant at Cracow University of Technology

About

10
Publications
4,663
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
221
Citations
Current institution
Cracow University of Technology
Current position
  • Research & Teaching Assistant

Publications

Publications (10)
Chapter
Full-text available
Blockchain can be successfully utilised in diverse areas, including the financial sector and the Information and Communication Technology environments, such as computational clouds (CC). While cloud computing optimises the use of resources, it does not (yet) provide an effective solution for the secure hosting scheduling and execution of large comp...
Article
Although a lot of work has been done in the domain, tasks scheduling and resource allocation in cloud computing remain the challenging problems for both industry and academia. Security in scheduling in highly distributed computing environments is one of the most important criteria in the era of personalization of the cloud services. Blockchain beca...
Article
Full-text available
Data integration and fast effective data processing are the primary challenges in today’s high-performance computing systems used for Big Data processing and analysis in practical scenarios. Blockchain (BC) is a hot, modern technology that ensures high security of data processes stored in highly distributed networks and ICT infrastructures. BC enab...
Article
Full-text available
The main research challenge in the ICT support of the financial markets is the development of a next generation financial technology for a secure use of electronic currencies and a secure network technology for system user communication, as well as data processing and storage without the involvement of third parties. To deal with the security aspec...
Chapter
In this chapter, the k-anonymity algorithm is used for anonymization of sensitive data sending via network and analyzed by experts. Anonymization is a technique used to generalize sensitive data to block the possibility of assigning them to specific individuals or entities. In our proposed model, we have developed a layer that enables virtualizatio...
Article
Full-text available
In this paper, the Stackelberg game models are used for supporting the decisions on task scheduling and resource utilization in computational clouds. Stackelberg games are asymmetric games, where a specific group of players' acts first as leaders, and the rest of the players follow the lead-ers' decisions and make their decisions based on the leade...
Article
Full-text available
Stackelberg games are non-symmetric games where one player or specified group of players have the privilege position and make decision before the other players. Such games are used in telecommunication and computational systems for supporting administrative decisions. Recently Stackleberg games became useful also in the systems where security issue...
Conference Paper
Full-text available
Over the years evacuation simulation has become increasingly important in the research on the wide class of problems related to the public security in emergency situations. In this paper we develop simulation platform fully integrated with the cloud systemwith using the MapReduce programing model and Hadoop framework.The environment illustrating ev...
Conference Paper
Full-text available
The problem of efficient use of computer resources is the actual challenge for many years. Huge progress in the hardware development has left behind the development of software techniques. One of the most popular solutions for this problem is the idea of virtualization, which a natural continuation is cloud computing. Cloud computing is an innovati...

Network

Cited By