Publications

Export 9 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
J
Jász Judit.  2008.  Static Execute After Algorithms as Alternatives for Impact Analysis. Periodica Polytechnica Elec. Eng.. 52:163-176.
Jász J, Beszédes Á.  2018.  Software Testing Conferences and Women. Proceedings of the 2018 ACM/IEEE 1st International Workshop on Gender Equality in Software Engineering (GE'18). :17-20.
Jász Judit, Schrettner L, Beszédes Á, Osztrogonác C, Gyimóthy T.  2012.  Impact Analysis Using Static Execute After in WebKit. Proceedings of the16th European Conference on Software Maintenance and Reengineering (CSMR'12). :95–104.
Jász Judit, Beszédes Á, Gyimóthy T, Rajlich V.  2008.  Static Execute After/Before as a Replacement of Traditional Software Dependencies. Proceedings of the 2008 IEEE International Conference on Software Maintenance (ICSM'08). :137-146.
Jász Judit.  2008.  Efficient static impact analysis. Sixth Conference of PhD Students in Computer Science. :29.
Jelasity M, Bilicki V, Kasza M.  2011.  Modeling network-level impacts of P2P flows. 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). :590-594.
Jelasity M, Bilicki V.  2009.  Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.
Jelasity M, Bilicki V.  2009.  Scalable P2P overlays of very small constant degree: an emerging security threat. Lecture notes in computer science. 5873:399-412.
Jelasity M, Bilicki V.  2011.  Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.