Harsu M, Bakota Tibor, Siket István, Koskimies K, Systa T.
2009. Code Clones: Good, Bad, or Ugly? 11th Symposium on Programming Languages and Software Tools SPLST'09. :31-44.
Page last modified: January 16, 2012
Nagy C.
2009. Extension of {GCC} with a fully manageable reverse engineering front end. Proceedings of the 7th international conference on applied informatics (ICAI 2007). :145-152.
Page last modified: January 16, 2012
Nagy C, Spiros M.
2009. Static security analysis based on input-related software faults. Proceedings of the 13th European Conference on Software Maintenance and Reengineering (CSMR’09). :37-46.
Page last modified: January 16, 2012
Jelasity M, Bilicki V.
2009. Scalable P2P overlays of very small constant degree: an emerging security threat. Lecture notes in computer science. 5873:399-412.
Page last modified: January 16, 2012
Alexin Z.
2009. Az egészségügyi adatok kezelésének jogi problémái.
Page last modified: January 16, 2012
Alexin Z.
2009. Anonymization of Health Care Data in Hungary.
Page last modified: January 16, 2012
Bilicki V, Kasza M, Szűcs V, Molnár G.
2009. Homokháti Small Area Living Lab Benefiting The Agricultural Sector In Hungary. eJOV. 11:83-100.
Page last modified: January 17, 2012
Vidács L.
2009. Software Maintenance Methods for Preprocessed Languages.
Page last modified: January 16, 2012
Vidács L.
2009. Refactoring of {C}/{C++} {P}reprocessor Constructs at the Model Level. Proceedings of ICSOFT 2009, 4th International Conference on Software and Data Technologies. :232-237.
Page last modified: January 16, 2012
Alexin Z.
2009. Etikai kérdések a beavatkozással nem járó humán orvosi kutatásokban. Orvosi Hetilap. 150:1749-1752.
Page last modified: January 16, 2012