Publications

Export 262 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
Conference Paper
Beszédes Á, Gyimóthy T, Lóki G, Diós G, Kovács F.  2007.  Using Backward Dynamic Program Slicing to Isolate Influencing Statements in GDB. Proceedings of the 2007 GCC Developers' Summit. :21-30.
Beszédes Á, Faragó C., Szabó Z.M, Csirik J, Gyimóthy T.  2002.  Union Slices for Program Maintenance. Proceedings of the IEEE International Conference on Software Maintenance (ICSM 2002). :12-21.
Binkley D, Beszédes Á, Islam S, Jász Judit, la Vancsics B.  2015.  Uncovering Dependence Clusters and Linchpin Functions. Proceedings of the 31th IEEE International Conference on Software Maintenance and Evolution (ICSME'15). :141-150.
Binkley D, Beszédes Á, Islam S, Jász Judit, la Vancsics B.  2015.  Uncovering Dependence Clusters and Linchpin Functions. Proceedings of the 31th IEEE International Conference on Software Maintenance and Evolution (ICSME'15). :141-150.
Antal G, Havas D, Siket István, Beszédes Á, Ferenc R, Mihalicza J.  2016.  Transforming C++11 Code to C++03 to Support Legacy Compilation Environments. Proceedings of 16th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM'16). :177-186.
Bakota Tibor.  2011.  Tracking the evolution of code clones. Proceedings of the 37th Springer LNCS International Conference on Current Trends in Theory and Practice of computer science. :86-98.
Bakota Tibor, Ferenc R, Gyimóthy T, Riva C, Xu J.  2006.  Towards Portable Metrics-based Models for Software Maintenance Problems. Proceedings of the 22nd International Conference on Software Maintenance (ICSM 2006). :483-486.
Jelasity M, Bilicki V.  2009.  Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.
Nagy C, Pántos J, Gergely Tamás, Beszédes Á.  2010.  Towards a Safe Method for Computing Dependencies in Database-Intensive Systems. Proceedings of the 14th European Conference on Software Maintenance and Reengineering (CSMR'10). :166-175.
Tengeri D, Beszédes Á, Havas D, Gyimóthy T.  2014.  Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation. Proceedings of the 14th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM'14). :47-52.
Bilicki V.  2006.  Testing and Verifying an IPv6 Based Multicast Network. ICCGI '06: Proceedings of the International Multi-Conference on Computing in the Global Information Technology. :3.
Vidács L, Beszédes Á, Tengeri D, Siket István, Gyimóthy T.  2014.  Test Suite Reduction for Fault Detection and Localization: A Combined Approach. Proceedings of the CSMR-WCRE 2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE'14). :204-213.
Horváth F, la Vancsics B, Vidács L, Beszédes Á, Tengeri D, Gergely Tamás, Gyimóthy T.  2015.  Test Suite Evaluation using Code Coverage Based Metrics. Proceedings of the 14th Symposium on Programming Languages and Software Tools (SPLST'15). :46-60.
Vidács L, Horváth F, Mihalicza J, la Vancsics B, Beszédes Á.  2015.  Supporting Software Product Line Testing by Optimizing Code Configuration Coverage. Proceedings of the 8th IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW'15); 10th Testing: Academic and Industrial Conference - Practice and Research Techniques (TAIC PART'15). :1-7.
Kicsi A, Vidács L, Csuvik V, Horváth F, Beszédes Á, Kocsis F.  2018.  Supporting Product Line Adoption by Combining Syntactic and Textual Feature Extraction. International Conference on Software Reuse.
Jász Judit, Beszédes Á, Gyimóthy T, Rajlich V.  2008.  Static Execute After/Before as a Replacement of Traditional Software Dependencies. Proceedings of the 2008 IEEE International Conference on Software Maintenance (ICSM'08). :137-146.
Ferenc R, Langó L, Siket István, Gyimóthy T, Bakota Tibor.  2014.  SourceMeter SonarQube plug-in. Proceedings of the 14th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2014). :77–82.
Hegedűs P, Bakota Tibor, Illés L, Ladányi G, Ferenc R, Gyimóthy T.  2011.  Source Code Metrics and Maintainability: A Case Study.. FGIT-ASEA/DRBC/EL. 257:272-284.
Balla K, Beszédes Á, Csonka G.B, Heckenast T, Kovács A.  2011.  The Software Testing Curriculum in the Hungarian Education in Conjunction with International Standards. Proceedings of the Conference on Informatics in Higher Education 2011 (IF 2011). :1096-1103.
Balla K, Beszédes Á, Csonka G.B, Heckenast T, Kovács A.  2011.  The Software Testing Curriculum in the Hungarian Education in Conjunction with International Standards. Proceedings of the Conference on Informatics in Higher Education 2011 (IF 2011). :1096-1103.
Jász J, Beszédes Á.  2018.  Software Testing Conferences and Women. Proceedings of the 2018 ACM/IEEE 1st International Workshop on Gender Equality in Software Engineering (GE'18). :17-20.
Schrettner L, Fülöp LJ, Beszédes Á, Kiss Á, Gyimóthy T.  2012.  Software Quality Model and Framework with Applications in Industrial Context. Proceedings of the16th European Conference on Software Maintenance and Reengineering (CSMR'12). :453–456.
Kertész Attila, Kecskeméti G, Brandic I.  2009.  An SLA-based resource virtualization approach for on-demand service provision. Proceedings of the 3rd international workshop on Virtualization technologies in distributed computing. :27–34.
la Vancsics B, Gergely T, Beszédes Á.  2020.  Simulating the Effect of Test Flakiness on Fault Localization Effectiveness. Proceedings of the 3rd International Workshop on Validation, Analysis and Evolution of Software Tests (VST'20). :28-35.
Siket István, Sey G, Bilicki V.  2004.  Signaling compression. Fourth Conference of PhD Students in Computer Science (CSCS 2004). :103.