Publications

Export 625 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Bilicki V.  2012.  Topológia felderítés hibrid hálózatokban.
Alexin Z.  2008.  Töröltethetők egészségügyi adataink. Délmagyarország.
Fülöp LJ, Ferenc R, Gyimóthy T.  2008.  Towards a Benchmark for Evaluating Design Pattern Miner Tools. Proceedings of the 12th European Conference on Software Maintenance and Reengineering (CSMR 2008). :143-152.
Fülöp LJ, Hegedűs P, Ferenc R, Gyimóthy T.  2008.  Towards a Benchmark for Evaluating Reverse Engineering Tools. Tool Demonstrations of the 15th Working Conference on Reverse Engineering (WCRE 2008). :335-336.
Kecskemeti G, Kertész Attila, Marosi A.C..  2017.  Towards a methodology to form microservices from monolithic ones. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10104 LNCS:284-295.
Horváth T, Alexin Z, Gyimóthy T, Fábricz K.  1990.  Towards a Multilingual Natural Language Understanding Interface (Extended Abstract). CC. :217-218.
Nagy C, Pántos J, Gergely Tamás, Beszédes Á.  2010.  Towards a Safe Method for Computing Dependencies in Database-Intensive Systems. Proceedings of the 14th European Conference on Software Maintenance and Reengineering (CSMR'10). :166-175.
Ferenc R, Sim SE, Holt RC, Koschke R, Gyimóthy T.  2001.  Towards a Standard Schema for C/C++. Proceedings of the 8th Working Conference on Reverse Engineering (WCRE 2001). :49-58.
Tóth L, Nagy B, Janthó D, Vidács L, Gyimothy T.  2019.  Towards an Accurate Prediction of the Question Quality at Stack Overflow Using a Deep-Learning-Based NLP Approach. Proceedings of ICSOFT 2019, 14th International Conference on Software Technologies. :631-639.
Jelasity M, Bilicki V.  2009.  Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.
Tornyai R., Kertész Attila.  2014.  Towards autonomous data sharing across personal clouds. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8806:50-61.
Hegedűs P, Ladányi G, Siket István, Ferenc R.  2012.  Towards Building Method Level Maintainability Models Based on Expert Evaluations. Communications in Computer and Information Science. 340:146–154.
Pflanzner T., Kertész Attila.  2014.  Towards data interoperability of cloud infrastructures using cloud storage services. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8374 LNCS:85-94.
Kertész Attila, Pflanzner T..  2016.  Towards enabling scientific workflows for the future internet of things. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST. 169:399-408.
Bakota Tibor, Ferenc R, Gyimóthy T, Riva C, Xu J.  2006.  Towards Portable Metrics-based Models for Software Maintenance Problems. Proceedings of the 22nd International Conference on Software Maintenance (ICSM 2006). :483-486.
Bakota Tibor.  2011.  Tracking the evolution of code clones. Proceedings of the 37th Springer LNCS International Conference on Current Trends in Theory and Practice of computer science. :86-98.
Barraclough RW, Binkley D, Danicic S, Harman M, Hierons RM, Kiss Á, Laurence M, Ouarbya L.  2010.  A Trajectory-based Strict Semantics for Program Slicing. Theoretical Computer Science. 411:1372–1386.
Antal G, Havas D, Siket István, Beszédes Á, Ferenc R, Mihalicza J.  2016.  Transforming C++11 Code to C++03 to Support Legacy Compilation Environments. Proceedings of 16th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM'16). :177-186.
Hodován R, Kiss Á, Gyimóthy T.  2017.  Tree Preprocessing and Test Outcome Caching for Efficient Hierarchical Delta Debugging. Proceedings of the 12th IEEE/ACM International Workshop on Automation of Software Testing (AST 2017). :23–29.