Publications

Export 279 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Schrettner L, Bohus M.  1994.  A Parallel Design Method for Producing Valid Protocols. Proc. of 8th Symposium on Microcomputer and Microprocessor Applications. :689-697.
O
Beszédes Á, Gergely Tamás, Gyimóthy T, Lóki G, Vidács L.  2003.  Optimizing for Space : Measurements and Possibilities for Improvement. Proceedings of the 2003 GCC Developers' Summit. :7-20.
Vidács L, Beszédes Á.  2003.  Opening Up The C/C++ Preprocessor Black Box. Proceedings of the Eight Symposium on Programming Languages and Software Tools (SPLST'03). :45-57.
N
Bilicki V, Kasza M.  2007.  A novel approach for monitoring ad-hoc networks. Proceedings of the Regional Conference on Embedded and Ambient Systems (RCEAS 2007).
Bilicki V, Béládi R.  2007.  A novel approach for distributed Management and Monitoring of Wireless Mesh Networks. Proceedings of the Regional Conference on Embedded and Ambient Systems (RCEAS 2007). :Paper46.
Bilicki V, Béládi R.  2007.  A novel approach for distributed Management and Monitoring of Wireless Mesh Networks. Proceedings of the Regional Conference on Embedded and Ambient Systems (RCEAS 2007). :Paper46.
Csendes D, Alexin Z, Busa-Fekete R, Kocsor A, Kovács K.  2006.  New, Linguistics-based, Ontology-enabled Approaches in Biological Information Management. Proceedings of eChallenges e-2006 Conference. :1352-1359.
Horváth F, Lacerda VSchnepper, Beszédes Á, Vidács L, Gyimothy T.  2019.  A New Interactive Fault Localization Method with Context Aware User Feedback. Proceedings of the First International Workshop on Intelligent Bug Fixing (IBF 2019). :23-28.
Bilicki V.  2006.  Network topology discovery. Volume of Extended Abstracts of the 5th Conference of PhD Students in Computer Science. :27.
Bilicki V, Bohus M, Kasza M.  2007.  Netspotter: a framework for network testing. 7th International Conference on Applied Informatics.
Bilicki V, Bohus M, Kasza M.  2007.  Netspotter: a framework for network testing. 7th International Conference on Applied Informatics.
Tengeri D, Horváth F, Beszédes Á, Gergely Tamás, Gyimóthy T.  2016.  Negative Effects of Bytecode Instrumentation on Java Source Code Coverage. Proceedings of the IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER'16). :225-235.
M
Hegedűs P, Bán D, Ferenc R, Gyimóthy T.  2012.  Myth or Reality? Analyzing the Effect of Design Patterns on Software Maintainability Communications in Computer and Information Science. 340:138–145.
Bilicki V, Béládi R.  2010.  Monitoring the Quality of Service in Wireless Mesh Networks Consumption Aspect.
Bilicki V, Béládi R.  2010.  Monitoring the Quality of Service in Wireless Mesh Networks Consumption Aspect.
Jelasity M, Bilicki V, Kasza M.  2011.  Modeling network-level impacts of P2P flows. 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). :590-594.
Benbernou S, Brandic I, Cappiello C, Carro M, Comuzzi M, Kertész Attila, Kritikos K, Parkin M, Pernici B, Plebani P.  2010.  Modeling and Negotiating Service Quality. Service Research Challenges and Solutions for the Future Internet. 6500:157-208.
Benbernou S, Brandic I, Cappiello C, Carro M, Comuzzi M, Kertész Attila, Kritikos K, Parkin M, Pernici B, Plebani P.  2010.  Modeling and Negotiating Service Quality. Service Research Challenges and Solutions for the Future Internet. 6500:157-208.
Gergely Tamás, Havasi F, Beszédes Á.  2005.  Model Based Code Compression.
Bilicki V.  2012.  Mobil telefon alapú személyi egyszségtár egy K+F projektben.
Bilicki V.  1998.  Mobil felhasználók mobilitásának modellezése.
Bilicki V.  1998.  Mobil felhasználók mobilitása. Networkshop 1998.
Balanyi Z., Ferenc R.  2003.  Mining Design Patterns from C++ Source Code. Proceedings of the 19th International Conference on Software Maintenance (ICSM 2003). :305-314.
Binkley D, Danicic S, Gyimóthy T, Harman M, Kiss Á, Korel B.  2005.  Minimal Slicing and the Relationships between Forms of Slicing. Proceedings of the 5th {IEEE} International Workshop on Source Code Analysis and Manipulation ({SCAM} 2005). :45–54.
Nagy S, Gyimothy T, Jelasity M, Bilicki V, Végh Á.  2017.  A method for tracking of motion of objects associated with wireless communication devices within a predefined area.