Evaluating C++ Design Pattern Miner Tools. Proceedings of the 6th International Workshop on Source Code Analysis and Manipulation (SCAM 2006). :127-138.. 2006.
Predictive Complex Event Processing. Proceedings of the 5th Balkan Conference in Informatics. :26–31.. 2012.
Comparing and Evaluating Design Pattern Miner Tools. Proceedings of the 10th Symposium on Programming Languages and Software Tools (SPLST'07). :372-386.. 2007.
Befriend - a Benchmark for Evaluating Reverse Engineering Tools. Periodica Polytechnica - Electrical Engineering. 52:153-162.. 2008.
Towards a Benchmark for Evaluating Reverse Engineering Tools. Tool Demonstrations of the 15th Working Conference on Reverse Engineering (WCRE 2008). :335-336.. 2008.
Towards a Benchmark for Evaluating Design Pattern Miner Tools. Proceedings of the 12th European Conference on Software Maintenance and Reengineering (CSMR 2008). :143-152.. 2008.
Implementation of an A+ Interpreter for .NET. JF ICSOFT 2012 - Proceedings of the 7th International Conference on Software Paradigm Trends. :297–302.. 2012.
Legal Considerations of IoT Applications in Fog and Cloud Environments. 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2019). :193-198.. 2019.
Analysis of Static and Dynamic Test-to-code Traceability Information. Acta Cybernetica. 23:903-919.. 2018.
Differences Between a Static and a Dynamic Test-to-Code Traceability Recovery Method. Software Quality Journal. 27(2):797-822.. 2018.
Effect of Test Completeness and Redundancy Measurement on Post Release Failures – an Industrial Experience Report. Proceedings of the 2010 IEEE International Conference on Software Maintenance (ICSM'10). :ResearchTrack13.. 2010.
Binary code compression based on decision trees. Proceedings of the Estonian Academy of Sciences Engineering. 11:269-285.. 2005.
Living Labs Fostering Open Innovation and Rural Development: Methodology and Results. Proceedings of the 14th International Conference on Concurrent Enterprising.. 2008.
Enforcing Techniques and Transformation of C/C++ Source Code to Heterogeneous Hardware. Proceedings of the 16th IEEE International Conference on Scalable Computing and Communication (ScalCom 2016). :1173–1180.. 2016.
Characterization of Source Code Defects by Data Mining Conducted on GitHub. Proceedings of the 15th International Conference on Computational Science and Its Applications (ICCSA 2015). 9159:47–62.. 2015.
An implementation of the HLP. Acta Cybernetica - Szeged. 6:315-327.. 1983.
Software generation based on attribute grammars. Periodica Polytechnica. 35:147-152.. 1991.