Code Coverage Measurement Framework for Android Devices. Acta Cybernetica. 21:439-458.. 2014.
Code Coverage Differences of Java Bytecode and Source Code. Software Quality Journal. 27(1):79-123.. 2019.
General Flow-Sensitive Pointer Analysis and Call Graph Construction. Proceedings of the Estonian Academy of Sciences – Engineering. 11:286–295.. 2005.
Comparison of static- and dynamic call graphs. Volume of Extended Abstracts of 5th Conference of PhD Students in Computer Science (CSCS 2006). :56.. 2006.
Test Suite Evaluation using Code Coverage Based Metrics. Proceedings of the 14th Symposium on Programming Languages and Software Tools (SPLST'15). :46-60.. 2015.
Interactive diagnosis and testing of logic programs. Third Finnish- Estonian- Hungarian Symposium on Programming Languages and Software Tools. :34-47.. 1993.
Application of Different Learning Methods to Hungarian Part-of-Speech Tagging. Proceedings of the 9th International Workshop on Inductive Logic Programming. :128–139.. 1999.
Experiments with Interactive Fault Localization Using Simulated and Real Users. Proceedings of the 36th IEEE International Conference on Software Maintenance and Evolution (ICSME'20).. 2020.
General Flow-Sensitive Pointer Analysis and Call Graph Construction. Proceedings of the 9th Symposium on Programming Languages and Software Tools (SPLST 2005). :49–58.. 2005.
Code Coverage Differences of Java Bytecode and Source Code Instrumentation Tools. Software Quality Journal.. 2017.
A New Interactive Fault Localization Method with Context Aware User Feedback. Proceedings of the First International Workshop on Intelligent Bug Fixing (IBF 2019). :23-28.. 2019.
A forgalomszabályozás egy optimalizálási modellje. XXVI. Operációkutatási Konferencia.. 2004.
Static Execute After/Before as a Replacement of Traditional Software Dependencies. Proceedings of the 2008 IEEE International Conference on Software Maintenance (ICSM'08). :137-146.. 2008.
Software Testing Conferences and Women. Proceedings of the 2018 ACM/IEEE 1st International Workshop on Gender Equality in Software Engineering (GE'18). :17-20.. 2018.
Efficient static impact analysis. Sixth Conference of PhD Students in Computer Science. :29.. 2008.
Static Execute After Algorithms as Alternatives for Impact Analysis. Periodica Polytechnica Elec. Eng.. 52:163-176.. 2008.
Impact Analysis Using Static Execute After in WebKit. Proceedings of the16th European Conference on Software Maintenance and Reengineering (CSMR'12). :95–104.. 2012.
Modeling network-level impacts of P2P flows. 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). :590-594.. 2011.
Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.. 2009.
Scalable P2P overlays of very small constant degree: an emerging security threat. Lecture notes in computer science. 5873:399-412.. 2009.
Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.. 2011.
Infrastructure Aware Scientific Workflows and Their Support by a Science Gateway. Proceedings - 7th International Workshop on Science Gateways, IWSG 2015. :22-27.. 2015.
Can We Connect Existing Production Grids into a World Wide Grid? High Performance Computing for Computational Science - VECPAR 2008. :109–122.. 2008.