Publications
Export 87 results:
Author Title [ Type] Year Filters: First Letter Of Title is S [Clear All Filters]
A személyes adatok védelmével kapcsolatos ismeretek oktatása a Szegedi Tudományegyetemen. Informatika a felsőoktatásban 2011 konferencia. :584-591.
.
2011. Személyes adatokat tartalmaz-e a Tételes Egészségügyi Adattár? Az e-Health kihívásai. A XXVI. Neumann Kollokvium kiadványa. :175–178.
.
2013. SZOTE-PACS: A Szent-Györgyi Albert Orvostudományi Egyetem képarchiváló és továbbító rendszerének szoftvere. XX. Neumann Kollokvium. :173-176.
.
1996. Smartphone-based Data Collection with Stunner Using Crowdsourcing: Lessons Learnt while Cleaning the Data. IARIA Conference. Best paper award. Twelfth International Multi-Conference on Computing in the Global Information Technology (ICCGI 2017). :28-35.
.
2017. Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.
.
2011. A Set of Successive Job Allocation Models in Distributed Computing Infrastructures. Journal of Grid Computing. 14:347-358.
.
2016. Seventh European Conference on Software Maintenance and Reengineering (CSMR 2003). Journal of Software Maintenance and Evolution: Research and Practice. 16:217–218.
.
2004. SIP compression. Periodica Polytechnica-Electrical Engineering. 47:1-2.
.
2003. A sírban is szem előtt. Népszabadság.
.
2008. Slicing of Constraint Logic Programs. Linköping Electronic Articles in Computer and Information Science. 3:1-27.
.
1998. Smartphone-based data collection with stunner, the reality of peer-to-peer connectivity and web real-time communications using crowdsourcing: lessons learnt while cleaning the data. International Journal On Advances in Software. 11(1-2):120-130.
.
2018. The software developers' view on product metrics - A survey-based experiment. Annales Mathematicae et Informaticae. 37:225–240.
.
2010. Software generation based on attribute grammars. Periodica Polytechnica. 35:147-152.
.
1991. Static and Dynamic Slicing of Constraint Logic Programs. Automated Software Engg.. 9:41–65.
.
2002. Static Execute After Algorithms as Alternatives for Impact Analysis. Periodica Polytechnica Elec. Eng.. 52:163-176.
.
2008. Stunner: A Smart Phone Trace for Developing Decentralized Edge Systems. Lecture Notes in Computer Science. vol 11534(Pereira J., Ricci L. (eds) Distributed Applications and Interoperable Systems. DAIS 2019)
.
2019. A survey and taxonomy of simulation environments modelling fog computing. Simulation Modelling Practice and Theory. 101
.
2020. Survey of Code-Size Reduction Methods. ACM Computing Surveys. 35:223-267.
.
2003. A Survey on Blockchain-Fog Integration Approaches. IEEE Access. 8:102657-102668.
.
2020. A Survey on Service Quality Description. ACM COMPUTING SURVEYS. 46:1–58.
.
2013. Syntactic pattern recognition in the HLP/PAS system. Acta Cybern.. 8:79–88.
.
1987. Syntactic pattern recognition with modified fuzzy automata. Computational Linguistics and Computer Langugaes. 15:175-193.
.
1982. Szűrővizsgálatok név nélkül. Magyar Hírlap.
.
2006. A szektoriális adatvédelmi jog áttekintése. Infokommunikáció és Jog. 42:28-29.
.
2011. .
2012.