Export 87 results:Author [ Title] Type Year
Filters: First Letter Of Title is S [Clear All Filters]
Scalable P2P overlays of very small constant degree: an emerging security threat. Lecture notes in computer science. 5873:399-412.. 2009.
Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.. 2011.
Scheduling Solution for Grid Meta-Brokering using the Pliant System.. ICAART (2)'10. :46-53.. 2010.
Script2Ant - a tool for cross-platform scripting between different operating systems. Proceedings of the 11th Symposium on Programming Languages and Software Tools and 7th Nordic Workshop on Model Driven Software Engineering (SPLST'09). :45-48.. 2009.
Security Evolution of the Webkit Browser Engine. 14th IEEE International Symposium on Web Systems (WSE). :17–19.. 2012.
A Segment-Based Statistical Speech Recognition System for Isolated/continuous Number Recognition. Proceedings of the Fifteenth Annual Symposium on Computational Geometry. :201-211.. 1999.
Semantic Processing of a Hungarian Ethnographic Corpus. Proceedings of the First International AMICUS Workshop on Automated Motif Discovery in Cultural Heritage and Scientific Communication Texts. :112-115.. 2010.
Semi-Automatic Test Case Generation from Business Process Models. Proceedings of the 11th Symposium on Programming Languages and Software Tools and 7th Nordic Workshop on Model Driven Software Engineering (SPLST'09). :5-18.. 2009.
A Semi-automatic Usability Evaluation Framework. Computational Science and Its Applications – ICCSA 2013. :529–542.. 2013.
A Semi-automatic Usability Evaluation Framework. Proceedings of the 13th International Conference on Computational Science and Its Applications (ICCSA 2013). 7973:529–542.. 2013.
Service Layer for IDE Integration of C/C++ Preprocessor Related Analysis. Proceedings of the 14th International Conference on Computational Science and Its Applications (ICCSA 2014). 8583. 2014.
A Set of Successive Job Allocation Models in Distributed Computing Infrastructures. Journal of Grid Computing. 14:347-358.. 2016.
Seventh European Conference on Software Maintenance and Reengineering (CSMR 2003). Journal of Software Maintenance and Evolution: Research and Practice. 16:217–218.. 2004.
Signaling compression. Fourth Conference of PhD Students in Computer Science (CSCS 2004). :103.. 2004.
Simulating IoT Cloud systems: A meteorological case study. 2017 2nd International Conference on Fog and Mobile Edge Computing, FMEC 2017. :171-176.. 2017.
Simulating the Effect of Test Flakiness on Fault Localization Effectiveness. Proceedings of the 3rd International Workshop on Validation, Analysis and Evolution of Software Tests (VST'20). :28-35.. 2020.
SIP compression. Periodica Polytechnica-Electrical Engineering. 47:1-2.. 2003.
A sírban is szem előtt. Népszabadság.. 2008.
An SLA-based resource virtualization approach for on-demand service provision. Proceedings of the 3rd international workshop on Virtualization technologies in distributed computing. :27–34.. 2009.
Slicing of Constraint Logic Programs. AADEBUG.. 2000.
Slicing of Constraint Logic Programs. Linköping Electronic Articles in Computer and Information Science. 3:1-27.. 1998.
Smartphone-based data collection with stunner, the reality of peer-to-peer connectivity and web real-time communications using crowdsourcing: lessons learnt while cleaning the data. International Journal On Advances in Software. 11(1-2):120-130.. 2018.
Smartphone-based Data Collection with Stunner Using Crowdsourcing: Lessons Learnt while Cleaning the Data. IARIA Conference. Best paper award. Twelfth International Multi-Conference on Computing in the Global Information Technology (ICCGI 2017). :28-35.. 2017.