Publications
.
2005.
Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation. Proceedings of the 14th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM'14). :47-52.
.
2014. .
2012. Töröltethetők egészségügyi adataink. Délmagyarország.
.
2008. Towards a Benchmark for Evaluating Design Pattern Miner Tools. Proceedings of the 12th European Conference on Software Maintenance and Reengineering (CSMR 2008). :143-152.
.
2008. Towards a Benchmark for Evaluating Reverse Engineering Tools. Tool Demonstrations of the 15th Working Conference on Reverse Engineering (WCRE 2008). :335-336.
.
2008. Towards a methodology to form microservices from monolithic ones. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10104 LNCS:284-295.
.
2017. .
1990. Towards a Safe Method for Computing Dependencies in Database-Intensive Systems. Proceedings of the 14th European Conference on Software Maintenance and Reengineering (CSMR'10). :166-175.
.
2010. Towards a Standard Schema for C/C++. Proceedings of the 8th Working Conference on Reverse Engineering (WCRE 2001). :49-58.
.
2001. Towards an Accurate Prediction of the Question Quality at Stack Overflow Using a Deep-Learning-Based NLP Approach. Proceedings of ICSOFT 2019, 14th International Conference on Software Technologies. :631-639.
.
2019. Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.
.
2009. Towards autonomous data sharing across personal clouds. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8806:50-61.
.
2014. Towards Building Method Level Maintainability Models Based on Expert Evaluations. Communications in Computer and Information Science. 340:146–154.
.
2012. Towards data interoperability of cloud infrastructures using cloud storage services. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8374 LNCS:85-94.
.
2014. Towards enabling scientific workflows for the future internet of things. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST. 169:399-408.
.
2016. Towards Portable Metrics-based Models for Software Maintenance Problems. Proceedings of the 22nd International Conference on Software Maintenance (ICSM 2006). :483-486.
.
2006. Tracking the evolution of code clones. Proceedings of the 37th Springer LNCS International Conference on Current Trends in Theory and Practice of computer science. :86-98.
.
2011. A Trajectory-based Strict Semantics for Program Slicing. Theoretical Computer Science. 411:1372–1386.
.
2010. Transforming C++11 Code to C++03 to Support Legacy Compilation Environments. Proceedings of 16th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM'16). :177-186.
.
2016. Tree Preprocessing and Test Outcome Caching for Efficient Hierarchical Delta Debugging. Proceedings of the 12th IEEE/ACM International Workshop on Automation of Software Testing (AST 2017). :23–29.
.
2017. Uncovering Dependence Clusters and Linchpin Functions. Proceedings of the 31th IEEE International Conference on Software Maintenance and Evolution (ICSME'15). :141-150.
.
2015. A unifying theory of control dependence and its application to arbitrary program structures. Theoretical Computer Science. 412:6809–6842.
.
2011. Union Slices for Program Maintenance. Proceedings of the IEEE International Conference on Software Maintenance (ICSM 2002). :12-21.
.
2002. Using Backward Dynamic Program Slicing to Isolate Influencing Statements in GDB. Proceedings of the 2007 GCC Developers' Summit. :21-30.
.
2007.