Publications

Export 9 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is C and Author is P Hegedűs  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Faragó C, Hegedűs P, Ferenc R.  2015.  Code Ownership: Impact on Maintainability. Proceedings of the 15th International Conference on Computational Science and Its Applications (ICCSA 2015). 9159:3–19.
Kádár I, Hegedűs P, Ferenc R, Gyimóthy T.  2016.  A Code Refactoring Dataset and Its Assessment Regarding Software Maintainability. Proceedings of the 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016). :599–603.
Kniesel G, Binun A, Hegedűs P, Fülöp LJ, Chatzigeorgiou A, Gueheneuc Y-G, Tsantalis N.  2009.  A common exchange format for design pattern detection tools.
Fülöp LJ, Ilia Á, Végh ÁZ, Hegedűs P, Ferenc R.  2009.  Comparing and Evaluating Design Pattern Miner Tools. Annales Universitatis Scientiarum Budapestinensis de Rolando Eotvos Nominatae Sectio Computarotica. 31:167-184.
Tóth G, Hegedűs P, Jász Judit, Beszédes Á, Gyimóthy T.  2010.  Comparison of Different Impact Analysis Methods and Programmer's Opinion – an Empirical Study. Proceedings of the 8th International Conference on the Principles and Practice of Programming in Java (PPPJ'10). :109-118.
Faragó C, Hegedűs P, Végh ZÁdám, Ferenc R.  2014.  Connection Between Version Control Operations and Quality Change of the Source Code. Acta Cybernetica. 21:585–607.
Ladányi G, Hegedűs P, Ferenc R, Siket István, Gyimóthy T.  2014.  The Connection of the Bug Density and Maintainability of Classes. 8th International Workshop on Software Quality and Maintainability.
Bakota Tibor, Hegedűs P, Ladányi G, Körtvélyesi P, Ferenc R, Gyimóthy T.  2012.  A Cost Model Based on Software Maintainability. Proceedings of the 28th IEEE International Conference on Software Maintenance (ICSM). :316–325.
Faragó C, Hegedűs P, Ferenc R.  2015.  Cumulative Code Churn: Impact on Maintainability. Proceedings of the 15th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2015). :141–150.