Publications
Export 279 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is B [Clear All Filters]
Negative Effects of Bytecode Instrumentation on Java Source Code Coverage. Proceedings of the IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER'16). :225-235.
.
2016. Modeling network-level impacts of P2P flows. 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). :590-594.
.
2011. Mobil felhasználók mobilitása. Networkshop 1998.
.
1998. Mining Design Patterns from C++ Source Code. Proceedings of the 19th International Conference on Software Maintenance (ICSM 2003). :305-314.
.
2003. Minimal Slicing and the Relationships between Forms of Slicing. Proceedings of the 5th {IEEE} International Workshop on Source Code Analysis and Manipulation ({SCAM} 2005). :45–54.
.
2005. Manually annotated Hungarian corpus. Proceedings of the tenth conference on European chapter of the Association for Computational Linguistics - Volume 2. :53-56.
.
2003. Macro Impact Analysis Using Macro Slicing. Proceedings of the Second International Conference on Software and Data Technologies (ICSOFT'07). :230-235.
.
2007. Living Labs Fostering Open Innovation and Rural Development: Methodology and Results. Proceedings of the 14th International Conference on Concurrent Enterprising.
.
2008. Leveraging Contextual Information from Function Call Chains to Improve Fault Localization. 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER). :468-479.
.
2020. LAYSI: A Layered Approach for SLA-Violation Propagation in Self-Manageable Cloud Infrastructures. Computer Software and Applications Conference Workshops (COMPSACW), 2010 IEEE 34th Annual. :365-370.
.
2010. LanStore: egy elosztott, megbízható fájl tároló rendszer. Networkshop 2005. :Paper156.
.
2005. LanStore: egy elosztott, megbízható fájl tároló rendszer. Networkshop 2005. :Paper156.
.
2005. LanStore: a highly distributed reliable file storage system. Proceedings of the 3rd International Conference on .NET Technologies. :47-56.
.
2005. Issues of Persistence Service Integration in Enterprise Systems. Proceedings of PATTERNS 2011, The Third International Conferences on Pervasive Patterns and Applications. :96-101.
.
2011. Interoperable Resource Management for establishing Federated Clouds. Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice. :18–35.
.
2012. Integrating Algorithmic Debugging and Unfolding Transformation in an Interactive Learner. Fifth International Workshop on Inductive Logic Programming. :437-452.
.
1996. Integrating Algorithmic Debugging and Unfolding Transformation in an Interactive Learner. Proceedings of the European Conference on Artificial Intelligence (ECAI'96). :403-407.
.
1996. Innovation Commercialization in a Rural Region: The Case of Rural Living Lab, Hungary. Summer University on Information Technology in Agriculture and Rural Development. :1-9.
.
2007. Information retrieval based feature analysis for product line adoption in 4GL systems. Proceedings of the 17th International Conference on Computational Science and Its Applications (ICCSA'17). :1-6.
.
2017. Impact Analysis Using Static Execute After in WebKit. Proceedings of the16th European Conference on Software Maintenance and Reengineering (CSMR'12). :95–104.
.
2012. .
2012. Identifying Wasted Effort in the Field via Developer Interaction Data. Proceedings of the 31th IEEE International Conference on Software Maintenance and Evolution (ICSME'15), Industry Track. :391-400.
.
2015. Identifying Wasted Effort in the Field via Developer Interaction Data. Proceedings of the 31th IEEE International Conference on Software Maintenance and Evolution (ICSME'15), Industry Track. :391-400.
.
2015. Graph-Less Dynamic Dependence-Based Dynamic Slicing Algorithms. Proceedings of the Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM'06). :21-30.
.
2006. Formalizing Executable Dynamic and Forward Slicing. Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004). :43–52.
.
2004.