Publications
Export 50 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is J [Clear All Filters]
Learning Phonetic Rules in a Speech Recognition System.. ILP. 1297:37-44.
.
1997. Meta-Brokering Solutions for Expanding Grid Middleware Limitations. Euro-Par 2008 Workshops. :199–210.
.
2009. .
2017. .
2017. Modeling network-level impacts of P2P flows. 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). :590-594.
.
2011. Reference Architecture for Collaborative Working Environments in Rural Areas. Living Labs for Rural Development - Results from the C@R Integrated Project. :53-82.
.
2010. Relating clusterization measures and software quality. CSMR'13. :345–348.
.
2013. Relating Code Coverage, Mutation Score and Test Suite Reducibility to Defect Density. Proceedings of the 2016 IEEE International Conference on Software Testing, Verification and Validation Workshops: 11th International Workshop on Mutation Analysis (MUTATION'16). :174-179.
.
2016. Scalable P2P overlays of very small constant degree: an emerging security threat. Lecture notes in computer science. 5873:399-412.
.
2009. Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.
.
2011. A Segment-Based Statistical Speech Recognition System for Isolated/continuous Number Recognition. Proceedings of the Fifteenth Annual Symposium on Computational Geometry. :201-211.
.
1999. Smartphone-based data collection with stunner, the reality of peer-to-peer connectivity and web real-time communications using crowdsourcing: lessons learnt while cleaning the data. International Journal On Advances in Software. 11(1-2):120-130.
.
2018. Smartphone-based Data Collection with Stunner Using Crowdsourcing: Lessons Learnt while Cleaning the Data. IARIA Conference. Best paper award. Twelfth International Multi-Conference on Computing in the Global Information Technology (ICCGI 2017). :28-35.
.
2017. Software Testing Conferences and Women. Proceedings of the 2018 ACM/IEEE 1st International Workshop on Gender Equality in Software Engineering (GE'18). :17-20.
.
2018. Static Execute After Algorithms as Alternatives for Impact Analysis. Periodica Polytechnica Elec. Eng.. 52:163-176.
.
2008. Static Execute After/Before as a Replacement of Traditional Software Dependencies. Proceedings of the 2008 IEEE International Conference on Software Maintenance (ICSM'08). :137-146.
.
2008. Static Slicing of Binary Executables. Volume of Extended Abstracts of the 3rd Conference of PhD Students in Computer Science (CSCS 2002). :60.
.
2002. Structure of SZOTE-PACS. Magyar Radiológusok Társasága XIX. Kongresszusa.
.
1998. Stunner: A Smart Phone Trace for Developing Decentralized Edge Systems. Lecture Notes in Computer Science. vol 11534(Pereira J., Ricci L. (eds) Distributed Applications and Interoperable Systems. DAIS 2019)
.
2019. A Test Environment for Investigation of Dynamic Load Balancing in Transputer Networks. Transputer and Occam Engineering Series. 36:284-295.
.
1993. Towards an Accurate Prediction of the Question Quality at Stack Overflow Using a Deep-Learning-Based NLP Approach. Proceedings of ICSOFT 2019, 14th International Conference on Software Technologies. :631-639.
.
2019. Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.
.
2009. Uncovering Dependence Clusters and Linchpin Functions. Proceedings of the 31th IEEE International Conference on Software Maintenance and Evolution (ICSME'15). :141-150.
.
2015. Using Dynamic Information in the Interprocedural Static Slicing of Binary Executables. Software Quality Journal. 13:227–245.
.
2005. Using GPU Acceleration in the GL2D Graphics Engine. Proceedings of the 18th IEEE International Symposium on Consumer Electronics (ISCE 2014). :42–43.
.
2014.