Publications
Export 279 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is B [Clear All Filters]
Mining Design Patterns from C++ Source Code. Proceedings of the 19th International Conference on Software Maintenance (ICSM 2003). :305-314.
.
2003. Mobil felhasználók mobilitása. Networkshop 1998.
.
1998. Modeling network-level impacts of P2P flows. 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). :590-594.
.
2011. Negative Effects of Bytecode Instrumentation on Java Source Code Coverage. Proceedings of the IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER'16). :225-235.
.
2016. Netspotter: a framework for network testing. 7th International Conference on Applied Informatics.
.
2007. Netspotter: a framework for network testing. 7th International Conference on Applied Informatics.
.
2007. Network topology discovery. Volume of Extended Abstracts of the 5th Conference of PhD Students in Computer Science. :27.
.
2006. A New Interactive Fault Localization Method with Context Aware User Feedback. Proceedings of the First International Workshop on Intelligent Bug Fixing (IBF 2019). :23-28.
.
2019. New, Linguistics-based, Ontology-enabled Approaches in Biological Information Management. Proceedings of eChallenges e-2006 Conference. :1352-1359.
.
2006. A novel approach for distributed Management and Monitoring of Wireless Mesh Networks. Proceedings of the Regional Conference on Embedded and Ambient Systems (RCEAS 2007). :Paper46.
.
2007. A novel approach for distributed Management and Monitoring of Wireless Mesh Networks. Proceedings of the Regional Conference on Embedded and Ambient Systems (RCEAS 2007). :Paper46.
.
2007. A novel approach for monitoring ad-hoc networks. Proceedings of the Regional Conference on Embedded and Ambient Systems (RCEAS 2007).
.
2007. Opening Up The C/C++ Preprocessor Black Box. Proceedings of the Eight Symposium on Programming Languages and Software Tools (SPLST'03). :45-57.
.
2003. Optimizing for Space : Measurements and Possibilities for Improvement. Proceedings of the 2003 GCC Developers' Summit. :7-20.
.
2003. A Parallel Design Method for Producing Valid Protocols. Proc. of 8th Symposium on Microcomputer and Microprocessor Applications. :689-697.
.
1994. Paxos with multiple leaders. Volume of Extended Abstracts of the 5th Conference of PhD Students in Computer Science. :28.
.
2006. PF-BVM: A Privacy-aware fog-enhanced blockchain validation mechanism. CLOSER 2020 - Proceedings of the 10th International Conference on Cloud Computing and Services Science. :430-439.
.
2020. Predicting Critical Problems from Execution Logs of a Large-Scale Software System. Proceedings of the 11th Symposium on Programming Languages and Software Tools and 7th Nordic Workshop on Model Driven Software Engineering (SPLST'09). :19-30.
.
2009. Prediction Models for Performance, Power, and Energy Efficiency of Software Executed on Heterogeneous Hardware. Proceedings of the 13th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2015). :178–183.
.
2015. .
2012. .
2012. Predictive Complex Event Processing. Proceedings of the 5th Balkan Conference in Informatics. :26–31.
.
2012. Predictive Complex Event Processing. Proceedings of the 5th Balkan Conference in Informatics. :26–31.
.
2012. Predictive Complex Event Processing. Proceedings of the 5th Balkan Conference in Informatics. :26–31.
.
2012. A probabilistic software quality model. Software Maintenance (ICSM), 2011 27th IEEE International Conference on. :243-252.
.
2011.