Publications

Export 642 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Horváth F, Gergely Tamás, Beszédes Á, Tengeri D, Balogh G, Gyimothy T.  2019.  Code Coverage Differences of Java Bytecode and Source Code. Software Quality Journal. 27(1):79-123.
Horváth F, Bognár S, Gergely Tamás, Rácz R, Beszédes Á, Marinković V.  2014.  Code Coverage Measurement Framework for Android Devices. Acta Cybernetica. 21:439-458.
Horváth E, Forgács I, Kiss Á, Jász Judit, Gyimóthy T.  2005.  General Flow-Sensitive Pointer Analysis and Call Graph Construction. Proceedings of the Estonian Academy of Sciences – Engineering. 11:286–295.
Horváth E, Jász Judit.  2006.  Comparison of static- and dynamic call graphs. Volume of Extended Abstracts of 5th Conference of PhD Students in Computer Science (CSCS 2006). :56.
Horváth T, Alexin Z, Gyimóthy T, Fábricz K.  1990.  Towards a Multilingual Natural Language Understanding Interface (Extended Abstract). CC. :217-218.
Horváth F, la Vancsics B, Vidács L, Beszédes Á, Tengeri D, Gergely Tamás, Gyimóthy T.  2015.  Test Suite Evaluation using Code Coverage Based Metrics. Proceedings of the 14th Symposium on Programming Languages and Software Tools (SPLST'15). :46-60.
Horváth T, Gyimóthy T, Alexin Z, Kocsis F.  1993.  Interactive diagnosis and testing of logic programs. Third Finnish- Estonian- Hungarian Symposium on Programming Languages and Software Tools. :34-47.
Horváth T, Alexin Z, Gyimóthy T, Wrobel S.  1999.  Application of Different Learning Methods to Hungarian Part-of-Speech Tagging. Proceedings of the 9th International Workshop on Inductive Logic Programming. :128–139.
Horváth F, Beszédes Á, la Vancsics B, Balogh G, Vidács L, Gyimóthy T.  2020.  Experiments with Interactive Fault Localization Using Simulated and Real Users. Proceedings of the 36th IEEE International Conference on Software Maintenance and Evolution (ICSME'20).
Horváth E, Forgács I, Kiss Á, Jász Judit, Gyimóthy T.  2005.  General Flow-Sensitive Pointer Analysis and Call Graph Construction. Proceedings of the 9th Symposium on Programming Languages and Software Tools (SPLST 2005). :49–58.
Horváth Z, Hodován R, Kiss Á.  2009.  Separating JavaScript Applications by Processes. Proceedings of the 11th Symposium on Programming Languages and Software Tools (SPLST'09) and 7th Nordic Workshop on Model Driven Software Engineering (NW-MODE'09). :189–194.
Horváth F, Gergely Tamás, Beszédes Á, Tengeri D, Balogh G, Gyimóthy T.  2017.  Code Coverage Differences of Java Bytecode and Source Code Instrumentation Tools. Software Quality Journal.
Horváth F, Lacerda VSchnepper, Beszédes Á, Vidács L, Gyimothy T.  2019.  A New Interactive Fault Localization Method with Context Aware User Feedback. Proceedings of the First International Workshop on Intelligent Bug Fixing (IBF 2019). :23-28.
J
Jász Judit, Beszédes Á, Gyimóthy T, Rajlich V.  2008.  Static Execute After/Before as a Replacement of Traditional Software Dependencies. Proceedings of the 2008 IEEE International Conference on Software Maintenance (ICSM'08). :137-146.
Jász J, Beszédes Á.  2018.  Software Testing Conferences and Women. Proceedings of the 2018 ACM/IEEE 1st International Workshop on Gender Equality in Software Engineering (GE'18). :17-20.
Jász Judit.  2008.  Efficient static impact analysis. Sixth Conference of PhD Students in Computer Science. :29.
Jász Judit.  2008.  Static Execute After Algorithms as Alternatives for Impact Analysis. Periodica Polytechnica Elec. Eng.. 52:163-176.
Jász Judit, Schrettner L, Beszédes Á, Osztrogonác C, Gyimóthy T.  2012.  Impact Analysis Using Static Execute After in WebKit. Proceedings of the16th European Conference on Software Maintenance and Reengineering (CSMR'12). :95–104.
Jelasity M, Bilicki V, Kasza M.  2011.  Modeling network-level impacts of P2P flows. 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). :590-594.
Jelasity M, Bilicki V.  2009.  Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.
Jelasity M, Bilicki V.  2009.  Scalable P2P overlays of very small constant degree: an emerging security threat. Lecture notes in computer science. 5873:399-412.
Jelasity M, Bilicki V.  2011.  Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.
K
Kacsuk P., Kecskemeti G, Kertész Attila, Nemeth Z., Visegrádi Á., Gergely M..  2015.  Infrastructure Aware Scientific Workflows and Their Support by a Science Gateway. Proceedings - 7th International Workshop on Science Gateways, IWSG 2015. :22-27.
Kacsuk P, Kertész Attila, Kiss T.  2008.  Can We Connect Existing Production Grids into a World Wide Grid? High Performance Computing for Computational Science - VECPAR 2008. :109–122.