Publications

Export 661 results:
Author Title [ Type(Asc)] Year
Journal Article
Alexin Z.  2008.  A sírban is szem előtt. Népszabadság.
Fidrich M, Bilicki V, Sógor Z, Sey G.  2003.  SIP compression. Periodica Polytechnica-Electrical Engineering. 47:1-2.
van den Brand MGJ, Canfora G, Gyimóthy T.  2004.  Seventh European Conference on Software Maintenance and Reengineering (CSMR 2003). Journal of Software Maintenance and Evolution: Research and Practice. 16:217–218.
Bacsó G., Kis T., Visegrádi Á., Kertész Attila, Nemeth Z..  2016.  A Set of Successive Job Allocation Models in Distributed Computing Infrastructures. Journal of Grid Computing. 14:347-358.
Jelasity M, Bilicki V.  2011.  Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.
Kádár I, Hegedűs P, Ferenc R.  2014.  Runtime Exception Detection in Java Programs Using Symbolic Execution. Acta Cybernetica. 21:331–352.
Capilla R, Duenas JC, Ferenc R.  2011.  A retrospective view of software maintenance and reengineering research a selection of papers from European Conference on Software Maintenance and Reengineering 2010. Journal of Software Maintenance and Evolution: Research and Practice.
Capilla R, Duenas JC, Ferenc R.  2013.  A retrospective view of software maintenance and reengineering research – a selection of papers from European Conference on Software Maintenance and Reengineering 2010. JOURNAL OF SOFTWARE MAINTENANCE AND EVOLUTION-RESEARCH AND PRACTICE. 25:569–574.
Holló C..  2013.  Reliability considerations for process network synthesis problems. CENTRAL EUROPEAN JOURNAL OF OPERATIONS RESEARCH. 22?
Alexin Z, Ábrahám L.  2007.  Reform. Élet és Irodalom. 51
Merz C, Dörflinger J, Bilicki V, Fernández MV, Guzman JG, Horak P, Astorga J, Azanón E, Szűcs V.  2009.  Reference Architecture For Collaborative Working Environments In Rural Areas. eJOV. 11:35-63.
Holló C., Imreh B, Imreh C..  2009.  Reduction techniques for the PNS problems: a novel technique and a review. Optimization and Engineering. 10:351-361.
Ferenc R, Gustafsson J, Müller L, Paakki J.  2002.  Recognizing Design Patterns in C++ programs with the integration of Columbus and Maisa. Acta Cybernetica. 15:669-682.
Ferenc R, Tóth ZGábor, Ladányi G, Siket I, Gyimóthy T.  2020.  A public unified bug dataset for java and its assessment regarding metrics and bug prediction. SOFTWARE QUALITY JOURNAL. 28:1447-1506.
Németh T, Sárkány R, Tornai H, Wiandt Z, Németh-Szabados KViktória, Holló C.  2016.  A programozás oktatásának motivációi a közoktatásban. INFODIDACT 2016 Informatika Szakmódszertani Konferencia elektronikus kiadványa (DVD). :1–7.
Holló C..  2002.  A Procedure Based on Automaton Theory Approach for Solving Modified PNS Problems. Pure Mathematics and Applications. 13:159-169.
Hegedűs P.  2013.  A probabilistic quality model for c# - an industrial case study. ACTA CYBERNETICA - SZEGED. 21:135–147.
Baniata H, Kertész Attila.  2022.  PriFoB: A Privacy-aware Fog-enhanced Blockchain-based system for Global Accreditation and Credential Verification. Journal of Network and Computer Applications. 205
Szendi I, Bagi A, Szalóki S, Hallgató E, Domján N, Kanka A, Gál BIldikó, Karcher É, Pásztor H, Jenei T et al..  2022.  Premorbid screening of healthy students may carry latent liability for schizophrenia or bipolar affective disorder with neurocognitive and neurophenomenological methods. EUROPEAN PSYCHIATRY. 65:S683-S683.
Bán D, Ferenc R, Siket I, Kiss Á, Gyimóthy T.  2018.  Prediction Models for Performance, Power, and Energy Efficiency of Software Executed on Heterogeneous Hardware. Journal of Supercomputing. :25.
Bán D, Ferenc R, Siket I, Kiss Á, Gyimóthy T.  2019.  Prediction models for performance, power, and energy efficiency of software executed on heterogeneous hardware. JOURNAL OF SUPERCOMPUTING. 75:4001-4025.
Kertész Attila, Dombi JD, Benyi A..  2016.  A Pliant-based Virtual Machine Scheduling Solution to Improve the Energy Efficiency of IaaS Clouds. Journal of Grid Computing. 14:41-53.
Ujhelyi Z, Szőke G, Horváth Á, Csiszár NIstván, Vidács L, Varró D, Ferenc R.  2015.  Performance Comparison of Query-based Techniques for Anti-pattern Detection. Information and Software Technology. 65:147–165.
Alexin Z.  2011.  Paternalista adatvédelem. Népszabadság.
Baniata H, Kertész A.  2024.  Partial Pre-Image Attack on Proof-of-Work based Blockchains. Blockchain: Research and Applications.