Publications

Export 642 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Karoczkai K., Kertész Attila, Kacsuk P..  2015.  Brokering Solution for Science Gateways Using Multiple Distributed Computing Infrastructures. Proceedings - 7th International Workshop on Science Gateways, IWSG 2015. :28-33.
Karoczkai K., Kertész Attila, Kacsuk P..  2016.  A Meta-Brokering Framework for Science Gateways. Journal of Grid Computing. 14:687-703.
Kanellopoulos Y, Ferenc R.  2012.  Introduction to the Software Quality and Maintainability special issue. Software Quality Journal. 20:263–264.
Kalmar E.E., Kertész Attila, Varadi S., Garg R., Stiller B..  2016.  Legal and regulative aspects of IoT cloud systems. Proceedings - 2016 4th International Conference on Future Internet of Things and Cloud Workshops, W-FiCloud 2016. :15-20.
Kalmar E.E., Kertész Attila.  2017.  What does I(o)T cost? ICPE 2017 - Companion of the 2017 ACM/SPEC International Conference on Performance Engineering. :19-24.
Kálmán M, Havasi F, Gyimóthy T.  2003.  Compacting XML Documents. SPLST. :137-151.
Kálmán M, Havasi F.  2013.  Enhanced XML validation using SRML. INTERNATIONAL JOURNAL OF WEB AND SEMANTIC TECHNOLOGY. 4:1–18.
Kálmán M, Havasi F, Gyimóthy T.  2006.  Compacting XML documents. Information and Software Technology. 48:90-106.
Kállai T, Bilicki V.  2007.  Innovation Commercialization in a Rural Region: The Case of Rural Living Lab, Hungary. Summer University on Information Technology in Agriculture and Rural Development. :1-9.
Kádár I, Hegedűs P, Ferenc R.  2015.  Adding Constraint Building Mechanisms to a Symbolic Execution Engine Developed for Detecting Runtime Errors. Proceedings of the 15th International Conference on Computational Science and Its Applications (ICCSA 2015). 9159:20–35.
Kádár I, Hegedűs P, Ferenc R.  2013.  Runtime Exception Detection in Java Programs Using Symbolic Execution. Proceedings of the 13th Symposium on Programming Languages and Software Tools, SPLST'13. :215–229.
Kádár I, Hegedűs P, Ferenc R, Gyimóthy T.  2016.  A Code Refactoring Dataset and Its Assessment Regarding Software Maintainability. Proceedings of the 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016). :599–603.
Kádár I, Hegedűs P, Ferenc R.  2014.  Runtime Exception Detection in Java Programs Using Symbolic Execution. Acta Cybernetica. 21:331–352.
Kádár I, Hegedűs P, Ferenc R.  2013.  Runtime Exception Detection in Java Programs Using Symbolic Execution. Proceedings of the 13th Symposium on Programming Languages and Software Tools (SPLST 2013). :215–229.
Kádár I, Hegedűs P, Ferenc R, Gyimóthy T.  2016.  Assessment of the Code Refactoring Dataset Regarding the Maintainability of Methods. Proceedings of the 16th International Conference on Computational Science and Its Applications (ICCSA 2016). :610–624.
Kádár I, Hegedűs P, Ferenc R, Gyimóthy T.  2016.  A Manually Validated Code Refactoring Dataset and Its Assessment Regarding Software Maintainability. Proceedings of the 12th ACM International Conference on Predictive Models and Data Analytics in Software Engineering (PROMISE 2016). :10:1–10:4.
Kacsuk P., Kecskemeti G, Kertész Attila, Nemeth Z., Visegrádi Á., Gergely M..  2015.  Infrastructure Aware Scientific Workflows and Their Support by a Science Gateway. Proceedings - 7th International Workshop on Science Gateways, IWSG 2015. :22-27.
Kacsuk P, Kertész Attila, Kiss T.  2008.  Can We Connect Existing Production Grids into a World Wide Grid? High Performance Computing for Computational Science - VECPAR 2008. :109–122.
Kacsuk P., Kecskemeti G, Kertész Attila, Nemeth Z., Kovács J., Farkas Z..  2016.  Infrastructure Aware Scientific Workflows and Infrastructure Aware Workflow Managers in Science Gateways. Journal of Grid Computing. 14:641-654.
J
Jelasity M, Bilicki V, Kasza M.  2011.  Modeling network-level impacts of P2P flows. 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). :590-594.
Jelasity M, Bilicki V.  2009.  Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.
Jelasity M, Bilicki V.  2009.  Scalable P2P overlays of very small constant degree: an emerging security threat. Lecture notes in computer science. 5873:399-412.
Jelasity M, Bilicki V.  2011.  Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.
Jász Judit, Beszédes Á, Gyimóthy T, Rajlich V.  2008.  Static Execute After/Before as a Replacement of Traditional Software Dependencies. Proceedings of the 2008 IEEE International Conference on Software Maintenance (ICSM'08). :137-146.
Jász J, Beszédes Á.  2018.  Software Testing Conferences and Women. Proceedings of the 2018 ACM/IEEE 1st International Workshop on Gender Equality in Software Engineering (GE'18). :17-20.