Publications

Export 661 results:
Author Title [ Type(Asc)] Year
Journal Article
Alexin Z.  2013.  Does fair anonymisation exist?
Kimovski D., Marosi A., Gec S., Saurabh N., Kertész Attila, Kecskemeti G, Stankovski V., Prodan R..  2017.  Distributed environment for efficient virtual machine image management in federated Cloud architectures. Concurrency Computation.
Csoma C.A, Bilicki V, Davies A, Kovács E, Uhlir P.  2011.  Dilemmák és megoldások élőlaboros kísérletek tervezésénél. IME : Informatika és menedzsment az egészségügyben. X:39-43.
Gergely T, Balogh G, Horváth F, la Vancsics B, Beszédes Á, Gyimóthy T.  2019.  Differences between a static and a dynamic test-to-code traceability recovery method. SOFTWARE QUALITY JOURNAL. 27:797-822.
Gergely Tamás, Balogh G, Horváth F, Vancsics B, Beszédes Á, Gyimothy T.  2018.  Differences Between a Static and a Dynamic Test-to-Code Traceability Recovery Method. Software Quality Journal. 27(2):797-822.
Kókai G, Thury A, Gyimóthy T, Csirik J, Csanády M.  1998.  Diagnosis of Heart Diseases with the Help of the PECG System. Annals of Noninvasive Electrocardiology. 3:58.
Vidács L, Dévai R., Ferenc R, Gyimóthy T.  2012.  Developer Support for Understanding Preprocessor Macro Expansions. Communications in Computer and Information Science. 340:121–130.
Dévai R, Jász Judit, Nagy C, Ferenc R.  2014.  Designing and Implementing Control Flow Graph for Magic 4th Generation Language. Acta Cybernetica. 21:419–437.
Pflanzner T., Hovari M., Vass I., Kertesz A..  2020.  Designing an IoT-Cloud Gateway for the Internet of Living Things. Communications in Computer and Information Science. 1218 CCIS:23-41.
Ferenc R, Bán D, Grósz T, Gyimóthy T.  2020.  Deep learning in static, metric-based bug prediction. ARRAY. 6
Blázsik Z, Holló C., Imreh B.  1998.  On Decision-Mappings Related to Process Network Synthesis Problem. Acta Cybernetica. 13:319-328.
Szilágyi G., Harmath L, Gyimóthy T.  2001.  The debug slicing of logic programs. Acta Cybernetica. 15:257–278.
Alexin Z.  2013.  Data privacy in Hungary.
Markus A., Kertész Attila, Kecskemeti G.  2017.  Cost-aware IoT extension of DISSECT-CF. Future Internet. vol. 9
Alexin Z, Dombi J, Fábricz K, Gyimóthy T, Horváth T.  1990.  CONSTRUCTOR: A Natural Language Interface Based on Attribute Grammars. Acta Cybernetica. 9:247-255.
Faragó C, Hegedűs P, Végh ZÁdám, Ferenc R.  2014.  Connection Between Version Control Operations and Quality Change of the Source Code. Acta Cybernetica. 21:585–607.
Kocsor A, Tóth L, Kuba A, Kovács K, Jelasity M, Gyimóthy T, Csirik J.  2000.  A Comparative Study of Several Feature Transformation and Learning Methods for Phoneme Classification. International Journal of Speech Technology. 3:263-276.
Kálmán M, Havasi F, Gyimóthy T.  2006.  Compacting XML documents. Information and Software Technology. 48:90-106.
Vidács L, Beszédes Á, Gyimóthy T.  2009.  Combining preprocessor slicing with C/C++ language slicing. Science of Computer Programming. 74:399-413.
Horváth F, Bognár S, Gergely Tamás, Rácz R, Beszédes Á, Marinković V.  2014.  Code Coverage Measurement Framework for Android Devices. Acta Cybernetica. 21:439-458.
Horváth F, Gergely Tamás, Beszédes Á, Tengeri D, Balogh G, Gyimóthy T.  2017.  Code Coverage Differences of Java Bytecode and Source Code Instrumentation Tools. Software Quality Journal.
Horváth F, Gergely T, Beszédes Á, Tengeri D, Balogh G, Gyimóthy T.  2019.  Code Coverage Differences of Java Bytecode and Source Code Instrumentation Tools. SOFTWARE QUALITY JOURNAL. 27:79-123.
Horváth F, Gergely Tamás, Beszédes Á, Tengeri D, Balogh G, Gyimothy T.  2019.  Code Coverage Differences of Java Bytecode and Source Code. Software Quality Journal. 27(1):79-123.
Harsu M, Bakota Tibor, Siket István, Koskimies K, Systa T.  2012.  Code Clones: Good, Bad, or Ugly? Nordic Journal of Computing. 15:3–17.
Kecskeméti G, Németh Z, Kertész Attila, Ranjan R.  2019.  Cloud workload prediction based on workflow execution time discrepancies. Cluster Computing. vol 22(3):737-755.