Publications
Software Testing Conferences and Women. Proceedings of the 2018 ACM/IEEE 1st International Workshop on Gender Equality in Software Engineering (GE'18). :17-20.
.
2018. Static Execute After Algorithms as Alternatives for Impact Analysis. Periodica Polytechnica Elec. Eng.. 52:163-176.
.
2008. Efficient static impact analysis. Sixth Conference of PhD Students in Computer Science. :29.
.
2008. Impact Analysis Using Static Execute After in WebKit. Proceedings of the16th European Conference on Software Maintenance and Reengineering (CSMR'12). :95–104.
.
2012. Modeling network-level impacts of P2P flows. 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). :590-594.
.
2011. Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.
.
2009. Scalable P2P overlays of very small constant degree: an emerging security threat. Lecture notes in computer science. 5873:399-412.
.
2009. Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.
.
2011. Can We Connect Existing Production Grids into a World Wide Grid? High Performance Computing for Computational Science - VECPAR 2008. :109–122.
.
2008. Infrastructure Aware Scientific Workflows and Their Support by a Science Gateway. Proceedings - 7th International Workshop on Science Gateways, IWSG 2015. :22-27.
.
2015. Infrastructure Aware Scientific Workflows and Infrastructure Aware Workflow Managers in Science Gateways. Journal of Grid Computing. 14:641-654.
.
2016. Adding Constraint Building Mechanisms to a Symbolic Execution Engine Developed for Detecting Runtime Errors. Proceedings of the 15th International Conference on Computational Science and Its Applications (ICCSA 2015). 9159:20–35.
.
2015. Runtime Exception Detection in Java Programs Using Symbolic Execution. Proceedings of the 13th Symposium on Programming Languages and Software Tools, SPLST'13. :215–229.
.
2013. A Code Refactoring Dataset and Its Assessment Regarding Software Maintainability. Proceedings of the 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016). :599–603.
.
2016. Runtime Exception Detection in Java Programs Using Symbolic Execution. Acta Cybernetica. 21:331–352.
.
2014. Runtime Exception Detection in Java Programs Using Symbolic Execution. Proceedings of the 13th Symposium on Programming Languages and Software Tools (SPLST 2013). :215–229.
.
2013. Assessment of the Code Refactoring Dataset Regarding the Maintainability of Methods. Proceedings of the 16th International Conference on Computational Science and Its Applications (ICCSA 2016). :610–624.
.
2016. A Manually Validated Code Refactoring Dataset and Its Assessment Regarding Software Maintainability. Proceedings of the 12th ACM International Conference on Predictive Models and Data Analytics in Software Engineering (PROMISE 2016). :10:1–10:4.
.
2016. Innovation Commercialization in a Rural Region: The Case of Rural Living Lab, Hungary. Summer University on Information Technology in Agriculture and Rural Development. :1-9.
.
2007. Compacting XML Documents. SPLST. :137-151.
.
2003. Enhanced XML validation using SRML. INTERNATIONAL JOURNAL OF WEB AND SEMANTIC TECHNOLOGY. 4:1–18.
.
2013. Compacting XML documents. Information and Software Technology. 48:90-106.
.
2006. Legal and regulative aspects of IoT cloud systems. Proceedings - 2016 4th International Conference on Future Internet of Things and Cloud Workshops, W-FiCloud 2016. :15-20.
.
2016. What does I(o)T cost? ICPE 2017 - Companion of the 2017 ACM/SPEC International Conference on Performance Engineering. :19-24.
.
2017. Introduction to the Software Quality and Maintainability special issue. Software Quality Journal. 20:263–264.
.
2012.