Publications
Export 52 results:
Author Title Type [ Year
] Filters: First Letter Of Last Name is J [Clear All Filters]
.
2011. Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.
.
2010. CIASYS – Change Impact Analysis at System Level. Proceedings of the 14th European Conference on Software Maintenance and Reengineering (CSMR'10). :203-206.
.
2010. Comparison of Different Impact Analysis Methods and Programmer's Opinion – an Empirical Study. Proceedings of the 8th International Conference on the Principles and Practice of Programming in Java (PPPJ'10). :109-118.
.
2010. Reference Architecture for Collaborative Working Environments in Rural Areas. Living Labs for Rural Development - Results from the C@R Integrated Project. :53-82.
.
2009. Meta-Brokering Solutions for Expanding Grid Middleware Limitations. Euro-Par 2008 Workshops. :199–210.
.
2009. Scalable P2P overlays of very small constant degree: an emerging security threat. Lecture notes in computer science. 5873:399-412.
.
2009. Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.
.
2008. Combining Preprocessor Slicing with C/C++ Language Slicing. Proceedings of the 16th IEEE International Conference on Program Comprehension (ICPC'08). :163-171.
.
2008. Efficient static impact analysis. Sixth Conference of PhD Students in Computer Science. :29.
.
2008. Static Execute After Algorithms as Alternatives for Impact Analysis. Periodica Polytechnica Elec. Eng.. 52:163-176.
.
2008. Static Execute After/Before as a Replacement of Traditional Software Dependencies. Proceedings of the 2008 IEEE International Conference on Software Maintenance (ICSM'08). :137-146.
.
2007. Computation of Static Execute After Relation with Applications to Software Maintenance. Proceedings of the 2007 IEEE International Conference on Software Maintenance (ICSM'07). :295-304.
.
2006. Comparison of static- and dynamic call graphs. Volume of Extended Abstracts of 5th Conference of PhD Students in Computer Science (CSCS 2006). :56.
.
2005. General Flow-Sensitive Pointer Analysis and Call Graph Construction. Proceedings of the Estonian Academy of Sciences – Engineering. 11:286–295.
.
2005. General Flow-Sensitive Pointer Analysis and Call Graph Construction. Proceedings of the 9th Symposium on Programming Languages and Software Tools (SPLST 2005). :49–58.
.
2005. Using Dynamic Information in the Interprocedural Static Slicing of Binary Executables. Software Quality Journal. 13:227–245.
.
2004. Code Factoring in GCC. Proceedings of the 2004 GCC Developers' Summit. :79-84.
.
2003. Interprocedural Static Slicing of Binary Executables. Proceedings of the 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003). :118–127.
.
2002. Static Slicing of Binary Executables. Volume of Extended Abstracts of the 3rd Conference of PhD Students in Computer Science (CSCS 2002). :60.
.
2000. A Comparative Study of Several Feature Transformation and Learning Methods for Phoneme Classification. International Journal of Speech Technology. 3:263-276.
.
1999. A Segment-Based Statistical Speech Recognition System for Isolated/continuous Number Recognition. Proceedings of the Fifteenth Annual Symposium on Computational Geometry. :201-211.
.
1998. Structure of SZOTE-PACS. Magyar Radiológusok Társasága XIX. Kongresszusa.
.
1997. Dynamic Process Interaction. Parallel Programming and Java, Concurrent Systems Engineering Series. 50:261-273.
.
1997. Learning Phonetic Rules in a Speech Recognition System.. ILP. 1297:37-44.
.
1993. Investigation of Dynamic Load Balancing in Distributed Memory Multiprocessor Machines. Proc. of 15th Intl. Conf. on Information Technology Interfaces.
