@conference {Horvath:ICSME:2020:IFL, title = {Experiments with Interactive Fault Localization Using Simulated and Real Users}, booktitle = {Proceedings of the 36th IEEE International Conference on Software Maintenance and Evolution (ICSME{\textquoteright}20)}, year = {2020}, month = {sep}, author = {Horv{\'a}th, Ferenc and Besz{\'e}des, {\'A}rp{\'a}dd and Vancsics, B{\'e}la and Balogh, Gerg{\H o} and Vid{\'a}cs, L{\'a}szl{\'o} and Gyim{\'o}thy, Tibor} } @conference {Csuvik:ICCSA:2019:CodeTrace, title = {Evaluation of Textual Similarity Techniques in Code Level Traceability}, booktitle = {Proceedings of the 19th International Conference on Computational Science and Its Applications (ICCSA 2019)}, series = {Lecture Notes in Computer Science (LNCS)}, year = {2019}, month = {jul}, pages = {529-543}, publisher = {Springer, Cham}, organization = {Springer, Cham}, address = {Saint Petersburg, Russia}, isbn = {978-3-030-24304-3}, doi = {10.1007/978-3-030-24305-0_40}, author = {Csuvik, Viktor and Kicsi, Andr{\'a}s and L{\'a}szl{\'o} Vid{\'a}cs} } @conference {Kicsi2019339, title = {Exploration and mining of source code level traceability links on stack overflow}, booktitle = {ICSOFT 2019 - Proceedings of the 14th International Conference on Software Technologies}, year = {2019}, note = {cited By 0}, pages = {339-346}, doi = {10.5220/0007981003390346}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85073121404\&doi=10.5220\%2f0007981003390346\&partnerID=40\&md5=fd54b2b91561386ab41876bcd1b8c67b}, author = {Kicsi, A. and R{\'a}k{\'o}czi, M. and Vid{\'a}cs, L.} } @conference {Kicsi:ICSOFT:2019:SO-trace, title = {Exploration and Mining of Source Code Level Traceability Links on Stack Overflow}, booktitle = {Proceedings of ICSOFT 2019, 14th International Conference on Software Technologies}, year = {2019}, month = {July}, pages = {339-346}, keywords = {select:deep}, doi = {10.5220/0007981003390346}, author = {Kicsi, Andr{\'a}s and R{\'a}k{\'o}czi, M{\'a}rk and L{\'a}szl{\'o} Vid{\'a}cs} } @inbook {16550, title = {Efficient simulation of IoT cloud use cases}, booktitle = {Autonomous Control for a Reliable Internet of Services}, volume = {Lecture Notes in Computer Science 10768}, year = {2018}, pages = {313-336}, publisher = {Springer}, organization = {Springer}, address = {Cham}, keywords = {select:iot}, doi = {https://doi.org/10.1007/978-3-319-90415-3_12}, author = {Andr{\'a}s Markus and Andre Marques and G{\'a}bor Kecskem{\'e}ti and Attlia Kert{\'e}sz} } @article {HKF17, title = {Empirical Evaluation of Software Maintainability Based on a Manually Validated Refactoring Dataset}, journal = {Information and Software Technology}, volume = {95}, year = {2018}, note = {Accepted, to appear.}, month = {nov}, chapter = {313}, abstract = {Context: Refactoring is a technique for improving the internal structure of software systems. It has a solid theoretical background while being used in development practice also. However, we lack empirical research results on the real effect of code refactoring and its application. Objective: This paper presents a manually validated subset of a previously published dataset containing the refactorings extracted by the RefFinder tool, code metrics, and maintainability of 7 open-source systems. We found that RefFinder had around 27\% overall average precision on the subject systems, thus our manually validated subset has substantial added value. Using the dataset, we studied several aspects of the refactored and non-refactored source code elements (classes and methods), like the differences in their maintainability and source code metrics. Method: We divided the source code elements into a group containing the refactored elements and a group with non-refactored elements. We analyzed the elements{\textquoteright} characteristics in these groups using correlation analysis, Mann-Whitney U test and effect size measures. Results: Source code elements subjected to refactorings had significantly lower maintainability than elements not affected by refactorings. Moreover, refactored elements had significantly higher size related metrics, complexity, and coupling. Also these metrics changed more significantly in the refactored elements. The results are mostly in line with our previous findings on the not validated dataset, with the difference that clone metrics had no strong connection with refactoring. Conclusions: Compared to the preliminary analysis using a not validated dataset, the manually validated dataset led to more significant results, which suggests that developers find targets for refactorings based on some internal quality properties of the source code, like their size, complexity or coupling, but not clone related metrics as reported in our previous studies. They do not just use these properties for identifying targets, but also control them with refactorings.}, keywords = {Code refactoring, Empirical study, Manually validated empirical dataset, Software maintainability, Source code metrics}, issn = {0950-5849}, doi = {10.1016/j.infsof.2017.11.012}, url = {http://www.sciencedirect.com/science/article/pii/S0950584916303561}, author = {P Heged{\H u}s and K{\'a}d{\'a}r, Istv{\'a}n and Rudolf Ferenc and Tibor Gyim{\'o}thy} } @conference {Kicsi:RAISE:2018:IR-Traceability, title = {Exploring the Benefits of Utilizing Conceptual Information in Test-to-Code Traceability}, booktitle = {Proceedings of the IEEE/ACM 6th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering (RAISE 2018 @ ICSE)}, series = {RAISE 2018}, year = {2018}, month = {may}, publisher = {ACM}, organization = {ACM}, address = {New York, NY, USA}, keywords = {select:deep}, isbn = {978-1-4503-5723-4}, doi = {10.1145/3194104.3194106}, author = {Kicsi, Andr{\'a}s and T{\'o}th, L{\'a}szl{\'o} and L{\'a}szl{\'o} Vid{\'a}cs} } @article {SAN17, title = {Empirical Study on Refactoring Large-scale Industrial Systems and Its Effects on Maintainability}, journal = {Journal of Systems and Software}, volume = {129}, number = {C}, year = {2017}, month = {jul}, pages = {107{\textendash}126}, abstract = {We examine hundreds of manual refactoring commits from large-scale industrial systems.We study the effects of these commits on source code using a maintainability model.Developers preferred to fix concrete coding issues rather than fix code smells.A single refactoring had only a small impact (sometimes even negative effect).Whole refactoring process has significant beneficial effect on the maintainability. Software evolves continuously, it gets modified, enhanced, and new requirements always arise. If we do not spend time occasionally on improving our source code, its maintainability will inevitably decrease. The literature tells us that we can improve the maintainability of a software system by regularly refactoring it. But does refactoring really increase software maintainability? Can it happen that refactoring decreases the maintainability? Empirical studies show contradicting answers to these questions and there have been only a few studies which were performed in a large-scale, industrial context. In our paper, we assess these questions in an in vivo context, where we analyzed the source code and measured the maintainability of 6 large-scale, proprietary software systems in their manual refactoring phase. We analyzed 2.5 million lines of code and studied the effects on maintainability of 315 refactoring commits which fixed 1273 coding issues. We found that single refactorings only make a very little difference (sometimes even decrease maintainability), but a whole refactoring period, in general, can significantly increase maintainability, which can result not only in the local, but also in the global improvement of the code.}, keywords = {Antipatterns, coding issues, ISO/IEC 25010, maintainability, refactoring, select:quality, software quality}, issn = {0164-1212}, doi = {10.1016/j.jss.2016.08.071}, url = {http://www.sciencedirect.com/science/article/pii/S0164121216301558?via\%3Dihub}, author = {Sz{\H o}ke, G{\'a}bor and Antal, G{\'a}bor and Csaba Nagy and Rudolf Ferenc and Tibor Gyim{\'o}thy} } @conference {GBS16, title = {Enforcing Techniques and Transformation of {C/C++} Source Code to Heterogeneous Hardware}, booktitle = {Proceedings of the 16th IEEE International Conference on Scalable Computing and Communication (ScalCom 2016)}, year = {2016}, month = {jul}, pages = {1173{\textendash}1180}, publisher = {IEEE Computer Society}, organization = {IEEE Computer Society}, address = {Toulouse, France}, abstract = {Besides well-known CPU based architectures, the so-called accelerators (GPU, DSP, FPGA) are about to gain ground in everyday programming, computing tasks. However, programming such computation units is quite different from traditional programming for CPUs, and special skills are required from the developers. In this paper we present techniques, tooling support for the developers in the first step of re-engineering for parallelism in heterogeneous parallel platforms, namely to assure that the code to be offloaded to an accelerator conforms to its specific requirements by identifying the possible violations in the source code, and also by providing automatic code transformations for their elimination.}, keywords = {C/C++, Cevelop, code transformation, Eclipse CDT, heterogeneous hardware, REPARA, Static Analysis}, doi = {10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0180}, url = {http://ieeexplore.ieee.org/document/7816976/}, author = {Gyimesi, G{\'a}bor and D{\'e}nes B{\'a}n and Istv{\'a}n Siket and Rudolf Ferenc and Brugnoni, Silvano and Corbat, Thomas and Sommerlad, Peter and Suter, Toni} } @conference {Kecskemeti2016591, title = {The ENTICE approach to decompose monolithic services into microservices}, booktitle = {2016 International Conference on High Performance Computing and Simulation, HPCS 2016}, year = {2016}, note = {cited By 3}, pages = {591-596}, doi = {10.1109/HPCSim.2016.7568389}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84991684013\&doi=10.1109\%2fHPCSim.2016.7568389\&partnerID=40\&md5=a124c076bd34560f5dbb1de84aeea5d6}, author = {Kecskemeti, G. and Marosi, A.C. and Attila Kert{\'e}sz} } @article {BSC14, title = {Empirical Investigation of {SEA}-Based Dependence Cluster Properties}, journal = {Science of Computer Programming}, volume = {105}, year = {2015}, note = {Special Issue on SCAM{\textquoteright}13}, pages = {3 - 25}, publisher = {Elsevier B.V.}, keywords = {select:quality}, doi = {http://dx.doi.org/10.1016/j.scico.2014.09.010}, author = {{\'A}rp{\'a}d Besz{\'e}des and Schrettner, Lajos and Csaba, B{\'e}la and Tam{\'a}s Gergely and Judit J{\'a}sz and Tibor Gyim{\'o}thy} } @article {Bacs{\'o}2014169, title = {On Efficiency of Multi-job Grid Allocation Based on Statistical Trace Data}, journal = {Journal of Grid Computing}, volume = {12}, number = {1}, year = {2014}, note = {cited By 3}, pages = {169-186}, doi = {10.1007/s10723-013-9274-3}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84899408842\&doi=10.1007\%2fs10723-013-9274-3\&partnerID=40\&md5=4e15afb48683e0cc723a519b7be6dd14}, author = {Bacs{\'o}, G. and Visegr{\'a}di, {\'A}. and Attila Kert{\'e}sz and Nemeth, Z.} } @conference {Benyi2014519, title = {Energy-aware VM scheduling in IaaS clouds using pliant logic}, booktitle = {CLOSER 2014 - Proceedings of the 4th International Conference on Cloud Computing and Services Science}, year = {2014}, note = {cited By 3}, pages = {519-526}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84902335921\&partnerID=40\&md5=952c7168ba5b385800201e585ee529e2}, author = {Benyi, A. and J D Dombi and Attila Kert{\'e}sz} } @article {16360, title = {Eg{\'e}szs{\'e}g{\"u}gyi adatb{\'a}zisok tisztess{\'e}ges anonimiz{\'a}l{\'a}sa}, year = {2013}, author = {Z. Alexin} } @conference {16361, title = {Empirical investigation of SEA-Based dependence cluster properties}, booktitle = {IEEE 13th International Working Conference on Source Code Analysis and Manipulation, SCAM 2013}, year = {2013}, pages = {1{\textendash}10}, publisher = {IEEE Computer Society}, organization = {IEEE Computer Society}, address = {Piscataway}, abstract = {Dependence clusters are (maximal) groups of source code entities that each depend on the other according to some dependence relation. Such clusters are generally seen as detrimental to many software engineering activities, but their formation and overall structure are not well understood yet. In a set of subject programs from moderate to large sizes, we observed frequent occurrence of dependence clusters using Static Execute After ({SEA}) dependences ({SEA} is a conservative yet efficiently computable dependence relation on program procedures). We identified potential linchpins inside the clusters; these are procedures that can primarily be made responsible for keeping the cluster together. Furthermore, we found that as the size of the system increases, it is more likely that multiple procedures are jointly responsible as sets of linchpins. We also give a heuristic method based on structural metrics for locating possible linchpins as their exact identification is unfeasible in practice, and presently there are no better ways than the brute-force method. We defined novel metrics and comparison methods to be able to demonstrate clusters of different sizes in programs. {\textcopyright} 2013 {IEEE}.}, keywords = {select:quality}, author = {{\'A}rp{\'a}d Besz{\'e}des and Schrettner, L. and B. Csaba and Tam{\'a}s Gergely and Judit J{\'a}sz and Tibor Gyim{\'o}thy}, editor = {Bram Adams and Juergen Rilling and Foutse Khomh} } @article {16362, title = {Enhanced XML validation using SRML}, journal = {INTERNATIONAL JOURNAL OF WEB AND SEMANTIC TECHNOLOGY}, volume = {4}, year = {2013}, pages = {1{\textendash}18}, issn = {0976-2280}, author = {M. K{\'a}lm{\'a}n and F. Havasi} } @article {16363, title = {Enhancing Federated Cloud Management with an Integrated Service Monitoring Approach}, journal = {JOURNAL OF GRID COMPUTING}, volume = {11}, year = {2013}, pages = {699{\textendash}720}, abstract = {Cloud Computing enables the construction and the provisioning of virtualized service-based applications in a simple and cost effective outsourcing to dynamic service environments. Cloud Federations envisage a distributed, heterogeneous environment consisting of various cloud infrastructures by aggregating different {IaaS} provider capabilities coming from both the commercial and the academic area. In this paper, we introduce a federated cloud management solution that operates the federation through utilizing cloud-brokers for various {IaaS} providers. In order to enable an enhanced provider selection and inter-cloud service executions, an integrated monitoring approach is proposed which is capable of measuring the availability and reliability of the provisioned services in different providers. To this end, a minimal metric monitoring service has been designed and used together with a service monitoring solution to measure cloud performance. The transparent and cost effective operation on commercial clouds and the capability to simultaneously monitor both private and public clouds were the major design goals of this integrated cloud monitoring approach. Finally, the evaluation of our proposed solution is presented on different private {IaaS} systems participating in federations.}, issn = {1570-7873}, author = {Attila Kert{\'e}sz and G. Kecskem{\'e}ti and M. Oriol and P. Kotcauer and Acs, S. and M. Rodr{\'\i}gez and O. Merc{\`e} and A. Marosi and J. Marco and X. Franch} } @conference {16319, title = {End User Programming in Smart Home}, booktitle = {Patterns, Programming and Everything}, year = {2012}, pages = {19{\textendash}31}, publisher = {Springer-Verlag}, organization = {Springer-Verlag}, address = {London}, author = {V. Bilicki and Z. Rak and M. Kasza and {\'A}. Z. V{\'e}gh and R. B{\'e}l{\'a}di and Tibor Gyim{\'o}thy}, editor = {Karin K Breitman and R Nigel Horspool} } @conference {SzVK11, title = {Evaluating Data Modeling Aspects for Home Telemonitoring}, booktitle = {Proceedings of PATTERNS 2011, The Third International Conferences on Pervasive Patterns and Applications}, year = {2011}, pages = {78-83}, author = {V. Sz{\H u}cs and {\'A}. Z. V{\'e}gh and M. Kasza and V. Bilicki} } @conference {HHH10, title = {Effect of Object Oriented Refactoring on Testability, Error Proneness and other Maintainability Attributes}, booktitle = {Proceedings of the 1st Workshop on Testing Object-Oriented Systems (ETOOS 2010)}, year = {2010}, pages = {Paper 8}, author = {Gy. Heged{\H u}s and D. Heged{\H u}s and Gy. Hrabovszki and Istv{\'a}n Siket} } @conference {GBG10, title = {Effect of Test Completeness and Redundancy Measurement on Post Release Failures {\textendash} an Industrial Experience Report}, booktitle = {Proceedings of the 2010 IEEE International Conference on Software Maintenance (ICSM{\textquoteright}10)}, year = {2010}, month = {sep}, pages = {Research Track 13}, publisher = {IEEE Computer Society}, organization = {IEEE Computer Society}, author = {Tam{\'a}s Gergely and {\'A}rp{\'a}d Besz{\'e}des and Tibor Gyim{\'o}thy and Gyalai, M.I.} } @article {IS09, title = {{Evaluating the Effectiveness of Object-Oriented Metrics for Bug Prediction}}, journal = {Periodica Polytechnica}, volume = {11}, number = {3{\textendash}4}, year = {2010}, pages = {177{\textendash}186}, author = {Istv{\'a}n Siket} } @article {Alexin09a, title = {Eg{\'e}szs{\'e}g{\"u}gyi {\'e}retlens{\'e}gi}, journal = {N{\'e}pszabads{\'a}g}, year = {2009}, author = {Z. Alexin} } @article {Herczeg:2009:ESE:1664750.1664756, title = {Energy simulation of embedded XScale systems with XEEMU}, journal = {J. Embedded Comput.}, volume = {3}, year = {2009}, month = {August}, pages = {209{\textendash}219}, publisher = {IOS Press}, address = {Amsterdam, The Netherlands, The Netherlands}, keywords = {DVFS, energy consumption, opensource, power dissipation, SDRAM, simulation, XScale}, issn = {1740-4460}, url = {http://dl.acm.org/citation.cfm?id=1664750.1664756}, author = {Z. Herczeg and D. Schmidt and {\'A}kos Kiss and N. Wehn and Tibor Gyim{\'o}thy} } @article {Alexin09j, title = {Etikai k{\'e}rd{\'e}sek a beavatkoz{\'a}ssal nem j{\'a}r{\'o} hum{\'a}n orvosi kutat{\'a}sokban}, journal = {Orvosi Hetilap}, volume = {150}, number = {37}, year = {2009}, pages = {1749-1752}, author = {Z. Alexin} } @conference {Nagy09, title = {Extension of {GCC} with a fully manageable reverse engineering front end}, booktitle = {Proceedings of the 7th international conference on applied informatics (ICAI 2007)}, year = {2009}, pages = {145-152}, author = {Csaba Nagy} } @conference {Jasz08a, title = {Efficient static impact analysis}, booktitle = {Sixth Conference of PhD Students in Computer Science}, year = {2008}, pages = {29}, author = {Judit J{\'a}sz} } @conference {Siket08, title = {Evaluating the Effectiveness of Object-Oriented Metrics for Bug Prediction}, booktitle = {Proceedings of the Sixth Conference of PhD Students in Computer Science (CSCS{\textquoteright}08)}, year = {2008}, pages = {177-186}, author = {Istv{\'a}n Siket} } @article {Kertesz08, title = {The evolution of Grid Brokers: union for interoperability}, journal = {{\'E}let {\'e}s Irodalom}, volume = {52}, number = {43}, year = {2008}, author = {Z. Alexin and L. {\'A}brah{\'a}m} } @conference {PBG08, title = {Experiences in Adapting a Source Code-Based Quality Assessment Technology}, booktitle = {Proceedings of the 12th European Conference on Software Maintenance and Reengineering (CSMR{\textquoteright}08)}, year = {2008}, pages = {311-313}, author = {J. P{\'a}ntos and {\'A}rp{\'a}d Besz{\'e}des and P. Gyenizse and Tibor Gyim{\'o}thy} } @inbook {AlAb06a, title = {Eg{\'e}szs{\'e}g{\"u}gyi adatok v{\'e}delme, v{\'a}logatott publik{\'a}ci{\'o}k}, booktitle = {Orvosi m{\H u}hibaperek}, year = {2006}, pages = {98-168}, author = {Z. Alexin and L. {\'A}brah{\'a}m} } @conference {FGF06, title = {{Evaluating C++ Design Pattern Miner Tools}}, booktitle = {Proceedings of the 6th International Workshop on Source Code Analysis and Manipulation (SCAM 2006)}, year = {2006}, month = {sep}, pages = {127-138}, publisher = {IEEE Computer Society}, organization = {IEEE Computer Society}, author = {F{\"u}l{\"o}p, L.J. and T. Gyovai and Rudolf Ferenc} } @conference {GFS05, title = {{Empirical Validation of Object-Oriented Metrics on Open Source Software for Fault Prediction}}, booktitle = {IEEE Transactions on Software Engineering}, volume = {31}, number = {10}, year = {2005}, month = {oct}, pages = {897-910}, publisher = {IEEE Computer Society}, organization = {IEEE Computer Society}, keywords = {relate:quality, software quality selected}, author = {Tibor Gyim{\'o}thy and Rudolf Ferenc and Istv{\'a}n Siket} } @conference {FSG04, title = {{Extracting Facts from Open Source Software}}, booktitle = {Proceedings of the 20th International Conference on Software Maintenance (ICSM 2004)}, year = {2004}, month = {sep}, pages = {60-69}, publisher = {IEEE Computer Society}, organization = {IEEE Computer Society}, author = {Rudolf Ferenc and Istv{\'a}n Siket and Tibor Gyim{\'o}thy} } @conference {FBG04, title = {{Extracting Facts with Columbus from C++ Code}}, booktitle = {Tool Demonstrations of the 8th European Conference on Software Maintenance and Reengineering (CSMR 2004)}, year = {2004}, month = {mar}, pages = {4-8}, author = {Rudolf Ferenc and {\'A}rp{\'a}d Besz{\'e}des and Tibor Gyim{\'o}thy} } @booklet {GyBF99, title = {An Efficient Relevant Slicing Method for Debugging}, year = {1999}, publisher = {Research Group on Artificial Intelligence, Hungarian Academy of Sciences and J{\'o}zsef Attila University}, author = {Tibor Gyim{\'o}thy and {\'A}rp{\'a}d Besz{\'e}des and I. Forg{\'a}cs} } @conference {GBF99, title = {An Efficient Relevant Slicing Method for Debugging}, booktitle = {Proceedings of the Joint 7th European Software Engineering Conference and 7th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (ESEC/FSE{\textquoteright}99)}, series = {Lecture Notes in Computer Science}, number = {1687}, year = {1999}, month = {sep}, pages = {303-321}, publisher = {Springer-Verlag}, organization = {Springer-Verlag}, keywords = {relate:quality}, author = {Tibor Gyim{\'o}thy and {\'A}rp{\'a}d Besz{\'e}des and I. Forg{\'a}cs} } @article {Gyimothy:1999:ERS:318774.319248, title = {An efficient relevant slicing method for debugging}, journal = {SIGSOFT Softw. Eng. Notes}, volume = {24}, year = {1999}, month = {October}, pages = {303{\textendash}321}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {debugging, dynamic slicing, relevant slicing, software quality selected}, issn = {0163-5948}, doi = {http://doi.acm.org/10.1145/318774.319248}, url = {http://doi.acm.org/10.1145/318774.319248}, author = {Tibor Gyim{\'o}thy and {\'A}rp{\'a}d Besz{\'e}des and I. Forg{\'a}cs} } @booklet {Beszedes_anevaluation, title = {An Evaluation of Reverse Engineering Capabilities of the {TDE/Columbus} system}, year = {1999}, author = {{\'A}rp{\'a}d Besz{\'e}des and Rudolf Ferenc and Tibor Gyim{\'o}thy and F. Magyar and G. M{\'a}rton and M. Tarkianen} } @conference {ASK98, title = {Experience with the SZOTE-PACS Starting Operations}, booktitle = {EuroPACS {\textquoteright}98, 16th Annual Meeting of the EuroPACS Association}, year = {1998}, pages = {43-44}, author = {L. Alm{\'a}si and Zs. Soti and A. Kuba and Z. Alexin and A. Nagy and L. Ny{\'u}l and L. Csernay} } @article {BHI98a, title = {Explicit bounds for the number of feasible solutions of special {PNS}-problem classes}, journal = {Pure Mathematics and Applications}, volume = {9}, year = {1998}, pages = {17-27}, author = {Z. Bl{\'a}zsik and Cs. Holl{\'o} and B. Imreh} } @conference {KCsK96, title = {Educational {PACS} of the Medical University of Szeged}, booktitle = {Proceedings of the Computer Assisted Radiology (CAR96) Conference}, year = {1996}, month = {jun}, pages = {1027}, author = {A. Kuba and L. Csernay and L. Kardos and Z. Alexin and A. Nagy and L. Ny{\'u}l and L. Alm{\'a}si} } @conference {Forgacs96anefficient, title = {An Efficient Interprocedural Slicing Method for Large Programs}, booktitle = {9th International Conference on Software Engineering and Knowledge Engineering}, year = {1996}, pages = {279-287}, author = {I. Forg{\'a}cs and Tibor Gyim{\'o}thy} } @conference {PaaGyiHor94-ILP94, title = {Effective Algorithmic Debugging for Inductive Logic Programming}, booktitle = {GMD-Studien}, volume = {237}, year = {1994}, pages = {175-194}, publisher = {Gesellschaft f{\"u}r Mathematik und Datenverarbeitung MBH}, organization = {Gesellschaft f{\"u}r Mathematik und Datenverarbeitung MBH}, author = {J. Paakki and Tibor Gyim{\'o}thy and T. Horv{\'a}th}, editor = {S. Wrobel} }