Ivan Klimek

Ivan Klimek
Technical University of Kosice - Technicka univerzita v Kosiciach · Department of Computers and Informatics

About

7
Publications
4,202
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
60
Citations
Citations since 2016
1 Research Item
55 Citations
201620172018201920202021202202468101214
201620172018201920202021202202468101214
201620172018201920202021202202468101214
201620172018201920202021202202468101214

Publications

Publications (7)
Article
Full-text available
This paper proposes a novel paradigm for network congestion control. Instead of perpetual conflict as in TCP, a proof-of-concept first-ever protocol enabling inter-flow communication without infrastructure support thru a side channel constructed on generic FIFO queue behaviour is presented. This enables independent flows passing thru the same bottl...
Conference Paper
This paper presents first theoretical model of IDPS which combines application tracing and user decisions for building user profiles. This novel idea is based on fact that we have seen nearly all kind of malware since Intrusion Detection System was widely deployed. Our solution presents “deny any” policy as default action. Thus all behavior that we...
Conference Paper
We present a probabilistic graphical framework for mobile device positioning. We study the performance of a positioning algorithm, which implements the message-passing paradigm, in an indoor environment where a mobile device measures fingerprints of received signals. The key innovation in our approach is a stochastic parametric model for the finger...
Conference Paper
Full-text available
The concept of Reverse Engineering is used in many fields of IT every day, to name just a few: legacy compatibility, binary code patching, malware analysis, network protocols analysis, debugging or even rapid prototyping. Despite its broad use, reverse engineering is not actively taught as a part of computer science courses. This paper tries to pro...
Article
Full-text available
Peer-to-Peer (P2P) currently represents the single largest portion of Internet's traffic. It is well known that the redundancy rate in P2P networks is very high; in fact redundancy is the main concept behind P2P. Th is paper will show how much traffic P2P generates and how much of it is redundant. The popularity distribution in P2P networks will be...
Article
This paper describes the addition of trackerless torrent caching to our existing P2P proxy cache. Trackerless torrents represent the next evolutionary step of the BitTorrent protocol; they eliminate the need for centralized trackers which in fact are the weak point of the whole technology. Further, it will be shown that our approach enables total u...

Network

Cited By

Projects

Project (1)