Publications

Export 87 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is S  [Clear All Filters]
Conference Proceedings
Szabó Z, Bilicki V, Berta Á, Jánki ZRichárd.  2017.  Smartphone-based Data Collection with Stunner Using Crowdsourcing: Lessons Learnt while Cleaning the Data. IARIA Conference. Best paper award. Twelfth International Multi-Conference on Computing in the Global Information Technology (ICCGI 2017). :28-35.
Journal Article
Jelasity M, Bilicki V.  2011.  Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.
Bacsó G., Kis T., Visegrádi Á., Kertész Attila, Nemeth Z..  2016.  A Set of Successive Job Allocation Models in Distributed Computing Infrastructures. Journal of Grid Computing. 14:347-358.
van den Brand MGJ, Canfora G, Gyimóthy T.  2004.  Seventh European Conference on Software Maintenance and Reengineering (CSMR 2003). Journal of Software Maintenance and Evolution: Research and Practice. 16:217–218.
Fidrich M, Bilicki V, Sógor Z, Sey G.  2003.  SIP compression. Periodica Polytechnica-Electrical Engineering. 47:1-2.
Alexin Z.  2008.  A sírban is szem előtt. Népszabadság.
Szilágyi G., Gyimóthy T, Maluszynski J.  1998.  Slicing of Constraint Logic Programs. Linköping Electronic Articles in Computer and Information Science. 3:1-27.
Szabó Z, Bilicki V, Berta Á, Jánki ZRichárd.  2018.  Smartphone-based data collection with stunner, the reality of peer-to-peer connectivity and web real-time communications using crowdsourcing: lessons learnt while cleaning the data. International Journal On Advances in Software. 11(1-2):120-130.
Siket István, Gyimóthy T.  2010.  The software developers' view on product metrics - A survey-based experiment. Annales Mathematicae et Informaticae. 37:225–240.
Gyimóthy T.  1991.  Software generation based on attribute grammars. Periodica Polytechnica. 35:147-152.
Szilágyi G., Gyimóthy T, Małuszyński J.  2002.  Static and Dynamic Slicing of Constraint Logic Programs. Automated Software Engg.. 9:41–65.
Jász Judit.  2008.  Static Execute After Algorithms as Alternatives for Impact Analysis. Periodica Polytechnica Elec. Eng.. 52:163-176.
Szabó Z, Téglás K, Berta Á, Jelasity M, Bilicki V.  2019.  Stunner: A Smart Phone Trace for Developing Decentralized Edge Systems. Lecture Notes in Computer Science. vol 11534(Pereira J., Ricci L. (eds) Distributed Applications and Interoperable Systems. DAIS 2019)
Markus A., Kertesz A..  2020.  A survey and taxonomy of simulation environments modelling fog computing. Simulation Modelling Practice and Theory. 101
Beszédes Á, Ferenc R, Gyimóthy T, Dolenc A, Karsisto K.  2003.  Survey of Code-Size Reduction Methods. ACM Computing Surveys. 35:223-267.
Baniata H., Kertesz A..  2020.  A Survey on Blockchain-Fog Integration Approaches. IEEE Access. 8:102657-102668.
Kritikos K, Pernici B, Plebani P, Cappiello C, Comuzzi M, Benbernou S, Brandic I, Kertész Attila, Parkin M, Carro M.  2013.  A Survey on Service Quality Description. ACM COMPUTING SURVEYS. 46:1–58.
Gyimóthy T, Toczki J.  1987.  Syntactic pattern recognition in the HLP/PAS system. Acta Cybern.. 8:79–88.
Gyimóthy T, Dombi J.  1982.  Syntactic pattern recognition with modified fuzzy automata. Computational Linguistics and Computer Langugaes. 15:175-193.
Alexin Z.  2006.  Szűrővizsgálatok név nélkül. Magyar Hírlap.
Alexin Z.  2011.  A szektoriális adatvédelmi jog áttekintése. Infokommunikáció és Jog. 42:28-29.
Alexin Z.  2012.  Szemelvények az európai országok egészségügyi adatvédelmi gyakorlatából.