Publications

Export 262 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
Conference Paper
Vidács L, Beszédes Á, Tengeri D, Siket István, Gyimóthy T.  2014.  Test Suite Reduction for Fault Detection and Localization: A Combined Approach. Proceedings of the CSMR-WCRE 2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE'14). :204-213.
Bilicki V.  2006.  Testing and Verifying an IPv6 Based Multicast Network. ICCGI '06: Proceedings of the International Multi-Conference on Computing in the Global Information Technology. :3.
Tengeri D, Beszédes Á, Havas D, Gyimóthy T.  2014.  Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation. Proceedings of the 14th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM'14). :47-52.
Nagy C, Pántos J, Gergely Tamás, Beszédes Á.  2010.  Towards a Safe Method for Computing Dependencies in Database-Intensive Systems. Proceedings of the 14th European Conference on Software Maintenance and Reengineering (CSMR'10). :166-175.
Jelasity M, Bilicki V.  2009.  Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.
Bakota Tibor, Ferenc R, Gyimóthy T, Riva C, Xu J.  2006.  Towards Portable Metrics-based Models for Software Maintenance Problems. Proceedings of the 22nd International Conference on Software Maintenance (ICSM 2006). :483-486.
Bakota Tibor.  2011.  Tracking the evolution of code clones. Proceedings of the 37th Springer LNCS International Conference on Current Trends in Theory and Practice of computer science. :86-98.
Antal G, Havas D, Siket István, Beszédes Á, Ferenc R, Mihalicza J.  2016.  Transforming C++11 Code to C++03 to Support Legacy Compilation Environments. Proceedings of 16th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM'16). :177-186.
Binkley D, Beszédes Á, Islam S, Jász Judit, la Vancsics B.  2015.  Uncovering Dependence Clusters and Linchpin Functions. Proceedings of the 31th IEEE International Conference on Software Maintenance and Evolution (ICSME'15). :141-150.
Binkley D, Beszédes Á, Islam S, Jász Judit, la Vancsics B.  2015.  Uncovering Dependence Clusters and Linchpin Functions. Proceedings of the 31th IEEE International Conference on Software Maintenance and Evolution (ICSME'15). :141-150.
Beszédes Á, Faragó C., Szabó Z.M, Csirik J, Gyimóthy T.  2002.  Union Slices for Program Maintenance. Proceedings of the IEEE International Conference on Software Maintenance (ICSM 2002). :12-21.
Beszédes Á, Gyimóthy T, Lóki G, Diós G, Kovács F.  2007.  Using Backward Dynamic Program Slicing to Isolate Influencing Statements in GDB. Proceedings of the 2007 GCC Developers' Summit. :21-30.
Balogh G, Gergely Tamás, Beszédes Á, Gyimóthy T.  2016.  Using the City Metaphor for Visualizing Test-Related Metrics. Proceedings of the IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, the First International Workshop on Validating Software Tests (VST'16). :17-20.
Balogh G, Gergely Tamás, Beszédes Á, Gyimóthy T.  2016.  Using the City Metaphor for Visualizing Test-Related Metrics. Proceedings of the IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, the First International Workshop on Validating Software Tests (VST'16). :17-20.
Szegedi A, Gergely Tamás, Beszédes Á, Gyimóthy T, Tóth G.  2007.  Verifying the Concept of Union Slices on Java Programs. Proceedings of the 11th European Conference on Software Maintenance and Reengineering (CSMR'07). :233-242.
Bilicki V, Kállai T, Kasza M.  2007.  Wireless Mesh Network For Rural Communities. AVA 3 International Conference on Agricultural Ekonomics , Rural Development and Informatics. :237-247.
Bilicki V, Kasza M, Kállai T.  2007.  Wireless Mesh Network For Rural Communities. IST-Africa 2007 Conference & Exhibition.
Kasza M, Bilicki V.  2007.  WMN for rural communities: a case study. Summer University on Information Technology in Agriculture and Rural Development. :83-94.
Conference Proceedings
[Anonymous].  2016.  10th Jubilee Conference of PhD Students in Computer Science (CSCS 2016).
[Anonymous].  2014.  9th Conference of PhD Students in Computer Science (CSCS 2014).
Gyimesi P, Vancsics B, Stocco A, Mazinanian D, Beszédes Á, Ferenc R, Mesbah A.  2019.  BugsJS: a Benchmark of JavaScript Bugs. 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST). :90-101.
Ferenc R, Hegedűs P, Gyimesi P, Antal G, Bán D, Gyimothy T.  2019.  Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions. 7th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering. :8-14.
Berta Á, Bilicki V, Jelasity M.  2014.  Defining and Understanding Smartphone Churn over the Internet: a Measurement Study. 14th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P. :1-5.
Berta Á, Bilicki V, Jelasity M.  2014.  Defining and Understanding Smartphone Churn over the Internet: a Measurement Study. 14th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P. :1-5.
Szabó Z, Bilicki V, Berta Á, Jánki ZRichárd.  2017.  Smartphone-based Data Collection with Stunner Using Crowdsourcing: Lessons Learnt while Cleaning the Data. IARIA Conference. Best paper award. Twelfth International Multi-Conference on Computing in the Global Information Technology (ICCGI 2017). :28-35.