Interactive diagnosis and testing of logic programs. Third Finnish- Estonian- Hungarian Symposium on Programming Languages and Software Tools. :34-47.. 1993.
Application of Different Learning Methods to Hungarian Part-of-Speech Tagging. Proceedings of the 9th International Workshop on Inductive Logic Programming. :128–139.. 1999.
General Flow-Sensitive Pointer Analysis and Call Graph Construction. Proceedings of the 9th Symposium on Programming Languages and Software Tools (SPLST 2005). :49–58.. 2005.
Code Coverage Differences of Java Bytecode and Source Code Instrumentation Tools. Software Quality Journal.. 2017.
A New Interactive Fault Localization Method with Context Aware User Feedback. Proceedings of the First International Workshop on Intelligent Bug Fixing (IBF 2019). :23-28.. 2019.
A forgalomszabályozás egy optimalizálási modellje. XXVI. Operációkutatási Konferencia.. 2004.
Static Execute After/Before as a Replacement of Traditional Software Dependencies. Proceedings of the 2008 IEEE International Conference on Software Maintenance (ICSM'08). :137-146.. 2008.
Software Testing Conferences and Women. Proceedings of the 2018 ACM/IEEE 1st International Workshop on Gender Equality in Software Engineering (GE'18). :17-20.. 2018.
Efficient static impact analysis. Sixth Conference of PhD Students in Computer Science. :29.. 2008.
Static Execute After Algorithms as Alternatives for Impact Analysis. Periodica Polytechnica Elec. Eng.. 52:163-176.. 2008.
Impact Analysis Using Static Execute After in WebKit. Proceedings of the16th European Conference on Software Maintenance and Reengineering (CSMR'12). :95–104.. 2012.
Modeling network-level impacts of P2P flows. 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). :590-594.. 2011.
Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.. 2009.
Scalable P2P overlays of very small constant degree: an emerging security threat. Lecture notes in computer science. 5873:399-412.. 2009.
Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.. 2011.
Infrastructure Aware Scientific Workflows and Their Support by a Science Gateway. Proceedings - 7th International Workshop on Science Gateways, IWSG 2015. :22-27.. 2015.
Can We Connect Existing Production Grids into a World Wide Grid? High Performance Computing for Computational Science - VECPAR 2008. :109–122.. 2008.
Infrastructure Aware Scientific Workflows and Infrastructure Aware Workflow Managers in Science Gateways. Journal of Grid Computing. 14:641-654.. 2016.
Adding Constraint Building Mechanisms to a Symbolic Execution Engine Developed for Detecting Runtime Errors. Proceedings of the 15th International Conference on Computational Science and Its Applications (ICCSA 2015). 9159:20–35.. 2015.
Runtime Exception Detection in Java Programs Using Symbolic Execution. Proceedings of the 13th Symposium on Programming Languages and Software Tools, SPLST'13. :215–229.. 2013.
A Code Refactoring Dataset and Its Assessment Regarding Software Maintainability. Proceedings of the 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016). :599–603.. 2016.
Runtime Exception Detection in Java Programs Using Symbolic Execution. Acta Cybernetica. 21:331–352.. 2014.
Runtime Exception Detection in Java Programs Using Symbolic Execution. Proceedings of the 13th Symposium on Programming Languages and Software Tools (SPLST 2013). :215–229.. 2013.
Assessment of the Code Refactoring Dataset Regarding the Maintainability of Methods. Proceedings of the 16th International Conference on Computational Science and Its Applications (ICCSA 2016). :610–624.. 2016.