Publications
Export 262 results:
Author [ Title
Filters: First Letter Of Last Name is B [Clear All Filters]
Negative Effects of Bytecode Instrumentation on Java Source Code Coverage. Proceedings of the IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER'16). :225-235.
.
2016. Myth or Reality? Analyzing the Effect of Design Patterns on Software Maintainability Communications in Computer and Information Science. 340:138–145.
.
2012. .
2010. .
2010. Modeling network-level impacts of P2P flows. 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). :590-594.
.
2011. Modeling and Negotiating Service Quality. Service Research Challenges and Solutions for the Future Internet. 6500:157-208.
.
2010. Modeling and Negotiating Service Quality. Service Research Challenges and Solutions for the Future Internet. 6500:157-208.
.
2010. .
2005. .
2012. .
1998. Mobil felhasználók mobilitása. Networkshop 1998.
.
1998. Mining Design Patterns from C++ Source Code. Proceedings of the 19th International Conference on Software Maintenance (ICSM 2003). :305-314.
.
2003. Minimal Slicing and the Relationships between Forms of Slicing. Proceedings of the 5th {IEEE} International Workshop on Source Code Analysis and Manipulation ({SCAM} 2005). :45–54.
.
2005. .
2017. .
2017. .
2007. On a Merging Reduction of the Process Network Synthesis Problem. Acta Cybernetica. 14:251-261.
.
1999. Manually annotated Hungarian corpus. Proceedings of the tenth conference on European chapter of the Association for Computational Linguistics - Volume 2. :53-56.
.
2003. Macro Impact Analysis Using Macro Slicing. Proceedings of the Second International Conference on Software and Data Technologies (ICSOFT'07). :230-235.
.
2007. Living Labs Fostering Open Innovation and Rural Development: Methodology and Results. Proceedings of the 14th International Conference on Concurrent Enterprising.
.
2008. Leveraging Contextual Information from Function Call Chains to Improve Fault Localization. Proceedings of the 27th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER'20). :468-479.
.
2020. LAYSI: A Layered Approach for SLA-Violation Propagation in Self-Manageable Cloud Infrastructures. Computer Software and Applications Conference Workshops (COMPSACW), 2010 IEEE 34th Annual. :365-370.
.
2010. LanStore: egy elosztott, megbízható fájl tároló rendszer. Networkshop 2005. :Paper156.
.
2005. LanStore: egy elosztott, megbízható fájl tároló rendszer. Networkshop 2005. :Paper156.
.
2005. LanStore: a highly distributed reliable file storage system. Proceedings of the 3rd International Conference on .NET Technologies. :47-56.
.
2005.