Publications
Export 262 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is B [Clear All Filters]
Opening Up The C/C++ Preprocessor Black Box. Proceedings of the Eight Symposium on Programming Languages and Software Tools (SPLST'03). :45-57.
.
2003. A novel approach for monitoring ad-hoc networks. Proceedings of the Regional Conference on Embedded and Ambient Systems (RCEAS 2007).
.
2007. A novel approach for distributed Management and Monitoring of Wireless Mesh Networks. Proceedings of the Regional Conference on Embedded and Ambient Systems (RCEAS 2007). :Paper46.
.
2007. A novel approach for distributed Management and Monitoring of Wireless Mesh Networks. Proceedings of the Regional Conference on Embedded and Ambient Systems (RCEAS 2007). :Paper46.
.
2007. New, Linguistics-based, Ontology-enabled Approaches in Biological Information Management. Proceedings of eChallenges e-2006 Conference. :1352-1359.
.
2006. A New Interactive Fault Localization Method with Context Aware User Feedback. Proceedings of the First International Workshop on Intelligent Bug Fixing (IBF 2019). :23-28.
.
2019. Network topology discovery. Volume of Extended Abstracts of the 5th Conference of PhD Students in Computer Science. :27.
.
2006. Netspotter: a framework for network testing. 7th International Conference on Applied Informatics.
.
2007. Netspotter: a framework for network testing. 7th International Conference on Applied Informatics.
.
2007. Negative Effects of Bytecode Instrumentation on Java Source Code Coverage. Proceedings of the IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER'16). :225-235.
.
2016. Modeling network-level impacts of P2P flows. 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). :590-594.
.
2011. Mobil felhasználók mobilitása. Networkshop 1998.
.
1998. Mining Design Patterns from C++ Source Code. Proceedings of the 19th International Conference on Software Maintenance (ICSM 2003). :305-314.
.
2003. Minimal Slicing and the Relationships between Forms of Slicing. Proceedings of the 5th {IEEE} International Workshop on Source Code Analysis and Manipulation ({SCAM} 2005). :45–54.
.
2005. Manually annotated Hungarian corpus. Proceedings of the tenth conference on European chapter of the Association for Computational Linguistics - Volume 2. :53-56.
.
2003. Macro Impact Analysis Using Macro Slicing. Proceedings of the Second International Conference on Software and Data Technologies (ICSOFT'07). :230-235.
.
2007. Living Labs Fostering Open Innovation and Rural Development: Methodology and Results. Proceedings of the 14th International Conference on Concurrent Enterprising.
.
2008. Leveraging Contextual Information from Function Call Chains to Improve Fault Localization. Proceedings of the 27th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER'20). :468-479.
.
2020. LAYSI: A Layered Approach for SLA-Violation Propagation in Self-Manageable Cloud Infrastructures. Computer Software and Applications Conference Workshops (COMPSACW), 2010 IEEE 34th Annual. :365-370.
.
2010. LanStore: egy elosztott, megbízható fájl tároló rendszer. Networkshop 2005. :Paper156.
.
2005. LanStore: egy elosztott, megbízható fájl tároló rendszer. Networkshop 2005. :Paper156.
.
2005. LanStore: a highly distributed reliable file storage system. Proceedings of the 3rd International Conference on .NET Technologies. :47-56.
.
2005. Issues of Persistence Service Integration in Enterprise Systems. Proceedings of PATTERNS 2011, The Third International Conferences on Pervasive Patterns and Applications. :96-101.
.
2011. Interoperable Resource Management for establishing Federated Clouds. Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice. :18–35.
.
2012. Integrating Algorithmic Debugging and Unfolding Transformation in an Interactive Learner. Fifth International Workshop on Inductive Logic Programming. :437-452.
.
1996.