Publications

Export 655 results:
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
U
Poshyvanyk D, Marcus A, Ferenc R, Gyimóthy T.  2009.  Using information retrieval based coupling measures for impact analysis. Empirical Softw. Engg.. 14:5–32.
Herczeg Z, Kosztyó K, Ledán S, Kiss Á, Obzhirov A, Placer SPena, Jacquemart P, Mudd G, Abbas W, Liang J et al..  2014.  Using GPU Acceleration in the GL2D Graphics Engine. Proceedings of the 18th IEEE International Symposium on Consumer Electronics (ISCE 2014). :42–43.
Kiss Á, Jász Judit, Gyimóthy T.  2005.  Using Dynamic Information in the Interprocedural Static Slicing of Binary Executables. Software Quality Journal. 13:227–245.
Zvada S., Gyimóthy T.  2001.  Using decision trees to infer semantic functions of attribute grammars. Acta Cybern.. 15:279–304.
Horváth F, Beszédes Á, la Vancsics B, Balogh G, Vidács L, Gyimóthy T.  2022.  Using contextual knowledge in interactive fault localization. EMPIRICAL SOFTWARE ENGINEERING. 27
Beszédes Á, Gyimóthy T, Lóki G, Diós G, Kovács F.  2007.  Using Backward Dynamic Program Slicing to Isolate Influencing Statements in GDB. Proceedings of the 2007 GCC Developers' Summit. :21-30.
Beszédes Á, Faragó C., Szabó Z.M, Csirik J, Gyimóthy T.  2002.  Union Slices for Program Maintenance. Proceedings of the IEEE International Conference on Software Maintenance (ICSM 2002). :12-21.
Danicic S, Barraclough R, Harman M, Howroyd JD, Kiss Á, Laurence M.  2011.  A unifying theory of control dependence and its application to arbitrary program structures. Theoretical Computer Science. 412:6809–6842.
Binkley D, Beszédes Á, Islam S, Jász Judit, la Vancsics B.  2015.  Uncovering Dependence Clusters and Linchpin Functions. Proceedings of the 31th IEEE International Conference on Software Maintenance and Evolution (ICSME'15). :141-150.
T
Hodován R, Kiss Á, Gyimóthy T.  2017.  Tree Preprocessing and Test Outcome Caching for Efficient Hierarchical Delta Debugging. Proceedings of the 12th IEEE/ACM International Workshop on Automation of Software Testing (AST 2017). :23–29.
Antal G, Havas D, Siket István, Beszédes Á, Ferenc R, Mihalicza J.  2016.  Transforming C++11 Code to C++03 to Support Legacy Compilation Environments. Proceedings of 16th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM'16). :177-186.
Barraclough RW, Binkley D, Danicic S, Harman M, Hierons RM, Kiss Á, Laurence M, Ouarbya L.  2010.  A Trajectory-based Strict Semantics for Program Slicing. Theoretical Computer Science. 411:1372–1386.
Bakota Tibor.  2011.  Tracking the evolution of code clones. Proceedings of the 37th Springer LNCS International Conference on Current Trends in Theory and Practice of computer science. :86-98.
Bakota Tibor, Ferenc R, Gyimóthy T, Riva C, Xu J.  2006.  Towards Portable Metrics-based Models for Software Maintenance Problems. Proceedings of the 22nd International Conference on Software Maintenance (ICSM 2006). :483-486.
Kertész Attila, Pflanzner T..  2016.  Towards enabling scientific workflows for the future internet of things. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST. 169:399-408.
Pflanzner T., Kertész Attila.  2014.  Towards data interoperability of cloud infrastructures using cloud storage services. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8374 LNCS:85-94.
Hegedűs P, Ladányi G, Siket István, Ferenc R.  2012.  Towards Building Method Level Maintainability Models Based on Expert Evaluations. Communications in Computer and Information Science. 340:146–154.
Tornyai R., Kertész Attila.  2014.  Towards autonomous data sharing across personal clouds. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8806:50-61.
Jelasity M, Bilicki V.  2009.  Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.
Tóth L, Nagy B, Janthó D, Vidács L, Gyimothy T.  2019.  Towards an Accurate Prediction of the Question Quality at Stack Overflow Using a Deep-Learning-Based NLP Approach. Proceedings of ICSOFT 2019, 14th International Conference on Software Technologies. :631-639.
Ferenc R, Sim SE, Holt RC, Koschke R, Gyimóthy T.  2001.  Towards a Standard Schema for C/C++. Proceedings of the 8th Working Conference on Reverse Engineering (WCRE 2001). :49-58.
Nagy C, Pántos J, Gergely Tamás, Beszédes Á.  2010.  Towards a Safe Method for Computing Dependencies in Database-Intensive Systems. Proceedings of the 14th European Conference on Software Maintenance and Reengineering (CSMR'10). :166-175.
Horváth T, Alexin Z, Gyimóthy T, Fábricz K.  1990.  Towards a Multilingual Natural Language Understanding Interface (Extended Abstract). CC. :217-218.
Kecskemeti G, Kertész Attila, Marosi A.C..  2017.  Towards a methodology to form microservices from monolithic ones. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10104 LNCS:284-295.
Fülöp LJ, Hegedűs P, Ferenc R, Gyimóthy T.  2008.  Towards a Benchmark for Evaluating Reverse Engineering Tools. Tool Demonstrations of the 15th Working Conference on Reverse Engineering (WCRE 2008). :335-336.