Publications
Predicting Critical Problems from Execution Logs of a Large-Scale Software System. Proceedings of the 11th Symposium on Programming Languages and Software Tools and 7th Nordic Workshop on Model Driven Software Engineering (SPLST'09). :19-30.
.
2009. .
2009. Reduction techniques for the PNS problems: a novel technique and a review. Optimization and Engineering. 10:351-361.
.
2009. Refactoring of C/C++ Preprocessor Constructs at the Model Level. Proceedings of ICSOFT 2009, 4th International Conference on Software and Data Technologies. :232-237.
.
2009. .
2009. Scalable P2P overlays of very small constant degree: an emerging security threat. Lecture notes in computer science. 5873:399-412.
.
2009. Script2Ant - a tool for cross-platform scripting between different operating systems. Proceedings of the 11th Symposium on Programming Languages and Software Tools and 7th Nordic Workshop on Model Driven Software Engineering (SPLST'09). :45-48.
.
2009. Semi-Automatic Test Case Generation from Business Process Models. Proceedings of the 11th Symposium on Programming Languages and Software Tools and 7th Nordic Workshop on Model Driven Software Engineering (SPLST'09). :5-18.
.
2009. Separating JavaScript Applications by Processes. Proceedings of the 11th Symposium on Programming Languages and Software Tools (SPLST'09) and 7th Nordic Workshop on Model Driven Software Engineering (NW-MODE'09). :189–194.
.
2009. An SLA-based resource virtualization approach for on-demand service provision. Proceedings of the 3rd international workshop on Virtualization technologies in distributed computing. :27–34.
.
2009. .
2009. Static security analysis based on input-related software faults. Proceedings of the 13th European Conference on Software Maintenance and Reengineering (CSMR’09). :37-46.
.
2009. A Szeged Treebank függőségi fa formátumban. VI. Magyar Számítógépes Nyelvészeti Konferencia: MSZNY 2009. :127-138.
.
2009. .
2009. Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.
.
2009. Using information retrieval based coupling measures for impact analysis. Empirical Softw. Engg.. 14:5–32.
.
2009. Ambient Assisted Living in Rural Areas: Vision and Pilot Application. Constructing Ambient Intelligence – AmI 2007 Workshops, Darmstadt, Germany, November 7-10, 2007, Revised Papers. 11:246–252.
.
2008. Az egészségügyi adatvédelem 2004 és 2008 között. Élet és Irodalom. 52
.
2008. Az információs társadalom viszonya az információhoz. Élet és Irodalom. 52
.
2008. Bűnügyi nyilvántartó-e az OEP? Népszabadság.
.
2008. Befriend - a Benchmark for Evaluating Reverse Engineering Tools. Periodica Polytechnica - Electrical Engineering. 52:153-162.
.
2008. Can We Connect Existing Production Grids into a World Wide Grid? High Performance Computing for Computational Science - VECPAR 2008. :109–122.
.
2008. Civil társadalombiztosítást!. Népszabadság.
.
2008. Combining Preprocessor Slicing with C/C++ Language Slicing. Proceedings of the 16th IEEE International Conference on Program Comprehension (ICPC'08). :163-171.
.
2008. Continuous Software Quality Supervision Using SourceInventory and Columbus. Research Demonstrations of 30th International Conference on Software Engineering (ICSE'08). :931-932.
.
2008.