Publications
Export 50 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is J [Clear All Filters]
Software Testing Conferences and Women. Proceedings of the 2018 ACM/IEEE 1st International Workshop on Gender Equality in Software Engineering (GE'18). :17-20.
.
2018. Static Execute After/Before as a Replacement of Traditional Software Dependencies. Proceedings of the 2008 IEEE International Conference on Software Maintenance (ICSM'08). :137-146.
.
2008. Static Slicing of Binary Executables. Volume of Extended Abstracts of the 3rd Conference of PhD Students in Computer Science (CSCS 2002). :60.
.
2002. Structure of SZOTE-PACS. Magyar Radiológusok Társasága XIX. Kongresszusa.
.
1998. Towards an Accurate Prediction of the Question Quality at Stack Overflow Using a Deep-Learning-Based NLP Approach. Proceedings of ICSOFT 2019, 14th International Conference on Software Technologies. :631-639.
.
2019. Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.
.
2009. Uncovering Dependence Clusters and Linchpin Functions. Proceedings of the 31th IEEE International Conference on Software Maintenance and Evolution (ICSME'15). :141-150.
.
2015. Using GPU Acceleration in the GL2D Graphics Engine. Proceedings of the 18th IEEE International Symposium on Consumer Electronics (ISCE 2014). :42–43.
.
2014. Defining and Understanding Smartphone Churn over the Internet: a Measurement Study. 14th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P. :1-5.
.
2014. Smartphone-based Data Collection with Stunner Using Crowdsourcing: Lessons Learnt while Cleaning the Data. IARIA Conference. Best paper award. Twelfth International Multi-Conference on Computing in the Global Information Technology (ICCGI 2017). :28-35.
.
2017. A Comparative Study of Several Feature Transformation and Learning Methods for Phoneme Classification. International Journal of Speech Technology. 3:263-276.
.
2000. Designing and Implementing Control Flow Graph for Magic 4th Generation Language. Acta Cybernetica. 21:419–437.
.
2014. Dynamic Process Interaction. Parallel Programming and Java, Concurrent Systems Engineering Series. 50:261-273.
.
1997. Empirical Investigation of SEA-Based Dependence Cluster Properties. Science of Computer Programming. 105:3-25.
.
2015. General Flow-Sensitive Pointer Analysis and Call Graph Construction. Proceedings of the Estonian Academy of Sciences – Engineering. 11:286–295.
.
2005. Impact Analysis in the Presence of Dependence Clusters Using Static Execute After in WebKit. Journal of Software: Evolution and Process. 26:569-588.
.
2014. Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.
.
2011. Smartphone-based data collection with stunner, the reality of peer-to-peer connectivity and web real-time communications using crowdsourcing: lessons learnt while cleaning the data. International Journal On Advances in Software. 11(1-2):120-130.
.
2018. Static Execute After Algorithms as Alternatives for Impact Analysis. Periodica Polytechnica Elec. Eng.. 52:163-176.
.
2008. Stunner: A Smart Phone Trace for Developing Decentralized Edge Systems. Lecture Notes in Computer Science. vol 11534(Pereira J., Ricci L. (eds) Distributed Applications and Interoperable Systems. DAIS 2019)
.
2019. A Test Environment for Investigation of Dynamic Load Balancing in Transputer Networks. Transputer and Occam Engineering Series. 36:284-295.
.
1993. Using Dynamic Information in the Interprocedural Static Slicing of Binary Executables. Software Quality Journal. 13:227–245.
.
2005. Comparison of static- and dynamic call graphs. Volume of Extended Abstracts of 5th Conference of PhD Students in Computer Science (CSCS 2006). :56.
.
2006. .
2017. .
2017.