Mariusz Nowostawski

Mariusz Nowostawski
Norwegian University of Science and Technology | NTNU · Department of Computer and Information Science

PhD

About

116
Publications
25,859
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,329
Citations
Introduction
Mariusz Nowostawski currently works at the Department of Computer and Information Science, Norwegian University of Science and Technology (NTNU). Mariusz does research in Artificial Intelligence, Software Engineering and Computer and Society. Also in Blockchain and Decentralised systems, Cryptocurrencies and advanced mobile and cloud computing technologies.
Additional affiliations
August 2013 - December 2015
Norwegian University of Science and Technology
Position
  • Professor (Associate)
September 1998 - July 2013
University of Otago
Position
  • Lecturer

Publications

Publications (116)
Book
Full-text available
- Offers comprehensive knowledge about the transformations through Blockchain technology in all major sections of society. - Serves as a knowledge-sharing platform of ideas focusing on future directions of models, architectures, frameworks, policies related to Blockchain. - Focuses on how Blockchain technology can work in an integrated manner wit...
Article
Technology is evolving at a rapid rate. From security specialists to average citizens, this poses a problem: individuals’ technological skill sets are quickly made obsolete. This makes the knowledge and understanding of cyber-security in a technologically evolving world difficult. Global IT infrastructure and individuals’ privacy are constantly und...
Chapter
Full-text available
Human institutions and administrative units, technological processes, technical constructions, and living organisms can all be modelled as dynamical, discrete and finite complex networks. This is an important practical approach in modelling complex dynamical systems. Original Kauffman’s hypothesis life on the edge of chaos imposes considerable limi...
Article
Full-text available
The blockchain is revolutionizing the current IT industry by increasing its integration with other prominent technologies like Artificial Intelligence, Internet of Things, Big Data and Cloud Computing to name a few. It works as a distributed network with no central authority, where the data is continuously added in the form of blocks. The blocks ar...
Article
Full-text available
Blockchain technology plays a significant role in the industrial development. Many industries can potentially benefit from the innovations blockchain decentralization technology and privacy protocols offer with regard to securing, data access, auditing and managing transactions within digital platforms. Blockchain is based on distributed and secure...
Preprint
Full-text available
The Lightning Network (LN) is a prominent payment channel network aimed at addressing Bitcoin's scalability issues. Due to the privacy of channel balances, senders cannot reliably choose sufficiently liquid payment paths and resort to a trial-and-error approach, trying multiple paths until one succeeds. This leaks private information and decreases...
Conference Paper
Full-text available
Background:The increasing use of various online services requires an efficient digital identity management (DIM) approach. Unfortunately, the original Internet protocols were not designed with built-in identity man-agement, which creates challenges related to privacy, security, and usability. There is an increasing societal concern regarding the ma...
Article
Full-text available
Background: Clinical decision support (CDS) is a tool that helps clinicians in decision making by generating clinical alerts to supplement their previous knowledge and experience. However, CDS generates a high volume of irrelevant alerts, resulting in alert fatigue among clinicians. Alert fatigue is the mental state of alerts consuming too much tim...
Article
Full-text available
Unstructured: The COVID-19 pandemic has caused global disturbance by affecting more than forty-two million people (as of the end of October 2020). Since there is no medication or vaccine available, the only way to combat it is to prevent it from spreading as much as possible. Digital contact tracing is an effective technique that can be utilized f...
Preprint
Full-text available
UNSTRUCTURED The COVID-19 pandemic has caused substantial global disturbance by affecting more than 42 million people (as of the end of October 2020). Since there is no medication or vaccine available, the only way to combat it is to minimize transmission. Digital contact tracing is an effective technique that can be utilized for this purpose, as i...
Preprint
Full-text available
BACKGROUND Clinical decision support (CDS) is a tool that helps clinicians in decision making by generating clinical alerts to supplement their previous knowledge and experience. However, CDS generates a high volume of irrelevant alerts, resulting in alert fatigue among clinicians. Alert fatigue is the mental state of alerts consuming too much time...
Preprint
Full-text available
As Lightning network payments are neither broadcasted nor publicly stored. Thus LN has been seen not only as scalability but also as privacy solution for Bitcoin. The protocol guarantees that only the latest channel state can be confirmed on channel closure. LN nodes gossip about channels available for routing and their total capacities. To issue a...
Chapter
Full-text available
Digital identity systems have been around for almost as long as computers and have evolved with the increased usage of online services. Digital identities have traditionally been used as a way of authenticating to the computer systems at work, or a personal online service, such as an email. Today, our physical existence has a digital counterpart th...
Chapter
Online Social Networks (OSNs) are very popular and widely adopted by the vast majority of Internet users across the globe. Recent scandals on the abuse of users’ personal information via these platforms have raised serious concerns about the trustworthiness of OSN service providers. The unprecedented collection of personal data by OSN service provi...
Preprint
Full-text available
Making a payment in a privacy-aware payment channel network is achieved by trying several payment paths until one succeeds. With a large network, such as the Lightning Network, a completion of a single payment can take up to several minutes. We introduce a network imbalance measure and formulate the optimization problem of improving the balance of...
Article
Full-text available
Payment channels and off-chain transactions are used to address blockchain scalability. Those mechanisms rely on the blockchain proper, as the resolution mechanism. They allow for high transaction throughput due to the pure peer-to-peer nature of the transaction exchange that happens directly between the peers, without the involvement of the blockc...
Article
Full-text available
In traditional socio-technical system design, we typically discuss three core layers: the social, the technical, and the socio-technical layer. The social layer represents human aspects, the technology represents the advancements in software and technology development, and the socio-technical layer captures the interplay between the social systems...
Chapter
Full-text available
Traditional blockchain systems, such as Bitcoin, focus on transactions in which entire amount is transferred from one owner to the other, in a single, atomic operation. This model has been re-used in the context of payment networks such as Lightning network. In this work, we propose and investigate new payment model, called split payments, in which...
Article
Full-text available
It is a non‐trivial task for research‐centric courses in the software engineering curriculum to compete and engage students on the same level as the practical, software development courses. Practical software development courses and projects are inherently motivating to students, as they provide necessary elements such as agency, relatedness, and t...
Article
Full-text available
On the basis of a shared emphasis on time as well as space, this paper argues for introducing elements of comic art into cartography, specifically the mapped comic, with an illustrated strip literally plotted and placed in a 3D time geographic virtual world. This approach is situated within current initiatives regarding the relationship between car...
Article
Full-text available
The benefits of integrating game development in software engineering education are multifold. It keeps the students interested, engaged and motivated during the courses and can potentially open a range of employment opportunities for students who would like to pursue a career in the game industry. The present study reports the design and delivery o...
Conference Paper
Full-text available
The limited size of a block in the Bitcoin blockchain produces a scaling bottleneck. The transaction scalability problem can be addressed by performing smaller transactions off-chain and periodically reporting the results to the Bitcoin blockchain. One such solution is the Lightning Network. Bitcoin is employed by lawful users and criminals. This r...
Article
Full-text available
The world is on the brink of an important socio-technical revolution involving freedom advocates, FinTech, as well as dark markets customers and drug dealers. The criminals, as well as the academics, are an important part of the revolution. Or more precisely, an evolution, as it may take a while for us to fully understand the implications of the te...
Conference Paper
To understand the operation of the informal social sphere in human or artificial societies, we need to be able to identify their existing behavioural conventions (institutions). This includes the contextualisation of seemingly objective facts with subjective assessments, especially when attempting to capture their meaning in the context of the anal...
Article
Full-text available
Agent-based Modelling appears as a promising analytical tool when it comes to a lasting question: in how far did different institutions affect the social and economic outcomes of societies? Taking an incremental step to address this question, we present a refined approach that combines existing institution representations (the structure) with a nor...
Article
Full-text available
Finding suitable routing paths for video streaming remains a challenging issue for multi-hop wireless networks, and previous studies rely on heuristics such as minimal hops or load-balancing. In this paper, we present an analytical approach that takes cross-layer factors into account and propose a new routing metric based on optimizing a queueing m...
Chapter
Full-text available
Modeling collective social action is challenging not only because of the opacity of the underlying social processes, but even more because of the insufficient information detail concerning the activities under investigation. Such information gaps are customarily filled using the modeler’s intuition or randomization techniques. A promising alternati...
Article
Similarities in physiological and psychological symptoms of Parkinson’s disease and Essential Tremor make accurate diagnosis of these conditions difficult. We have developed a smartphone-based application that uses discrete wavelet transforms and support vector machines to discriminate between Parkinson’s and Essential postural tremors with over 96...
Conference Paper
Full-text available
We have developed a refined institutional scheme derived from Crawford and Ostrom’s Grammar of Institutions (also referred to as ADICO) that has been adapted for the detailed representation of conventions, norms, and rules. In this work we apply this schema to model the emergence of norms. While previous work in the area of normative agent systems...
Conference Paper
Full-text available
We analyse two well-established historic trader scenarios from the area of comparative economics known as the Maghribi Traders Coalition and the contemporary Genoese traders, which contrast the otherwise comparable individualistic Genoese and collectivistic North-African trader societies by the institutions they used to sustain cooperative behaviou...
Conference Paper
Full-text available
In this work we further the investigation into the function- ing of the Maghribi Traders Coalition – a historically significant traders collective that operated along the North African coast between the 10th and 13th centuries. They acted as a closed group whose interactions were governed by informal institutions (i.e. norms). Historical accounts p...
Conference Paper
Time dependent energy tariffs are a matter of concern to managers in organisations, who need to rethink how to allocate resources to business processes so that they take into account energy costs. However, due to the time-dependent costs, the resource optimisation problem needs to be redesigned. In this paper we formalise the energy-aware resource...
Article
Full-text available
This work introduces a multiagent model for informal communication about cheating merchants among investing Genoese traders in the 12th century. The model builds on previous, game theory focused work of Avner Greif and extends it by enabling communication between Genoese traders. A trust-based cooperation model is tested across different network to...
Conference Paper
Full-text available
We have developed a refined institutional scheme derived from Craw- ford and Ostrom’s Grammar of Institutions (also referred to as ADICO) that has been adapted for the detailed representation of conventions, norms, and rules. In this work we apply this schema to model the emergence of norms. While previous work in this area of normative agent syste...
Conference Paper
Full-text available
We propose a refined institutional scheme derived from Crawford and Ostrom’s Grammar of Institutions (GoI) that has been refined to provide a more comprehensive representation of conventions, norms, and rules, which extends to describing institutions in more detail but also allowing the expression of fuzzy aspects (e.g. the uncertainty about a sanc...
Chapter
Full-text available
Smart-phones and other mobile devices are becoming increasingly ubiquitous. Complex sensory and computing features of these devices provide excellent opportunities for advanced, context- and location-aware applications. In this chapter, we discuss the concept of spatiotemporal annotations of real objects in the urban environment. We stress technolo...
Conference Paper
Full-text available
In situations where cellular networks are either unavailable or in outage, a temporary multi-hop wireless network (MWN) can be instantiated and services such as video streaming can be valuable for various purposes. The interference and limitation of bandwidth however challenge the streaming quality in MWNs. To ensure the quality of service (QoS), i...
Article
Full-text available
Background: We have developed manual methods to gather data on the point prevalence of observed smoking in road vehicles. To enable the widespread international collection of such data, we aimed to develop a smartphone application (app) for this work. Methods: We developed specifications for an app that described the: (1) variables that could be...
Article
In this position article we argue the need for integrative approach to evolutionary modelling and point out some of the limitations of the traditional selection/mutation-based models. We argue a shift towards fine-grained detailed and integrated evolutionary modelling. Selection/mutation-based models are limited and do not provide a sufficient dept...
Conference Paper
Full-text available
Finding suitable multi-hop routing paths for video streaming remains a challenging issue for 802.11 based multihop wireless networks. In this paper, we present an analytical approach that takes cross-layer factors into account and propose a new routing metric based on optimizing a queueing model that considers local data transmission rates, interfe...
Conference Paper
Full-text available
The notion of μ-agents to develop complex software applications has been under active research interest for some time. Through improved organisational modelling μ-agents provide stronger support for decomposition and abstraction in decentralized applications. With the advent of the mobile application platform Android – which exhibits strong analogi...
Article
Full-text available
Mobile augmented reality (AR) using location-based visu-alisation is becoming popular with mobile devices. This is due to the increase of features shipped with mobile devices. There are a number of AR browsers and other mobile AR applications available for mobile device platforms. During the past two years the emergence of the mobile tablet into th...
Chapter
Full-text available
We extend the original Gecow’s computational theory of life and introduce a formal specification language that provides structural and operational semantics for further experimentation on complex evolving systems. The formalisation is based on Milner’s process calculus called π-calculus in conjunction with the notion of reactive systems and formal...
Article
Full-text available
The Opal architecture for software development is described that supports the use of agent-oriented concepts at multiple levels of abstraction. At the lowest level are micro-agents, streamlined agents that can be used for conventional, system-level programming tasks. More sophisticated agents may be constructed by assembling combinations of micro-a...
Conference Paper
Full-text available
The Android platform has popularized and caused a widespread adoption of its application development approach based on loosely coupled application components. This loose coupling allows for a flexible composition of applications but also enables invocations and reuse of individual components from third-party applications. One problem with the origi...
Conference Paper
Full-text available
The comparatively recent move towards smartphones, and along with this new operating systems, such as Android, opens up new opportunities and offers potential to build new mobile agent-based applications. Android gives applications access to a wide-ranging set of sensors and different communication channels – realizing the notion of nomadic computi...
Technical Report
Full-text available
In this article we review contemporary multi-agent system architectures and implementations. We particularly focus on asynchronous message passing mechanisms. Our motivation is to explore two main areas in the context of multi-agent systems: the concept of micro-agents and the asynchronous message passing architectures. In the article we take a clo...
Conference Paper
Full-text available
Open-ended systems and unknown dynamical environments present challenges to the traditional machine learning systems, and in many cases traditional methods are not applicable. Lifelong reinforcement learning is a special case of dynamic (process-oriented) reinforcement learning. Multi-task learning is a methodology that exploits similarities and pa...
Conference Paper
This article presents the concepts behind the Evolvable Virtual Machine architecture (EVM). We focus on the main features, its biological inspirations and the main characteristics of the implementation. EVM has been designed from ground up with the automated program generation in mind and utilises a modern stack-based virtual machine design. It use...
Chapter
Societies are made of different kinds of agents, some cooperative and uncooperative. Uncooperative agents tend to reduce the overall performance of the society, due to exploitation practices. In the real world, it is not possible to decimate all the uncooperative agents; thus the objective of this research is to design and implement mechanisms that...
Conference Paper
Full-text available
Parallel computing has been in the spotlight with the advent of multi-core computers. The popular multithreading model does not scale very well when there are hundreds or thousands of cores, since it can only help exploit coarse-grained parallelism. There exist a lot of fine-grained parallelism to be exploited in I/O tasks and memory accesses durin...
Thesis
The Evolvable Virtual Machine abstract architecture (EVMA) is a computational architecture for dynamic hierarchically organised virtual machines. The concrete EVM instantiation (EVMI) builds on traditional stack-based models of computation and extends them by notions of hierarchy and reflection on the virtual machine level. The EVM Uni- verse is co...