Publications
Export 262 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is B [Clear All Filters]
Supporting Software Product Line Testing by Optimizing Code Configuration Coverage. Proceedings of the 8th IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW'15); 10th Testing: Academic and Industrial Conference - Practice and Research Techniques (TAIC PART'15). :1-7.
.
2015. Survey of Code-Size Reduction Methods. ACM Computing Surveys. 35:223-267.
.
2003. A Survey on Blockchain-Fog Integration Approaches. IEEE Access. 8:102657-102668.
.
2020. .
2010. A Survey on Service Quality Description. ACM COMPUTING SURVEYS. 46:1–58.
.
2013. A Survey on Service Quality Description. ACM COMPUTING SURVEYS. 46:1–58.
.
2013. .
2013. .
2013. .
2013. Teaching Software Testing in Hungary. COMPUTERWORLD - Számítástechnika. 42:13-14.
.
2011. Test Suite Evaluation using Code Coverage Based Metrics. Proceedings of the 14th Symposium on Programming Languages and Software Tools (SPLST'15). :46-60.
.
2015. Test Suite Reduction for Fault Detection and Localization: A Combined Approach. Proceedings of the CSMR-WCRE 2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE'14). :204-213.
.
2014. Testing and Verifying an IPv6 Based Multicast Network. ICCGI '06: Proceedings of the International Multi-Conference on Computing in the Global Information Technology. :3.
.
2006. Theoretical Foundations of Dynamic Program Slicing. Theoretical Computer Science. 360:23–41.
.
2006. .
2005. Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation. Proceedings of the 14th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM'14). :47-52.
.
2014. .
2012. Towards a Safe Method for Computing Dependencies in Database-Intensive Systems. Proceedings of the 14th European Conference on Software Maintenance and Reengineering (CSMR'10). :166-175.
.
2010. Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.
.
2009. Towards Portable Metrics-based Models for Software Maintenance Problems. Proceedings of the 22nd International Conference on Software Maintenance (ICSM 2006). :483-486.
.
2006. Tracking the evolution of code clones. Proceedings of the 37th Springer LNCS International Conference on Current Trends in Theory and Practice of computer science. :86-98.
.
2011. A Trajectory-based Strict Semantics for Program Slicing. Theoretical Computer Science. 411:1372–1386.
.
2010. A Trajectory-based Strict Semantics for Program Slicing. Theoretical Computer Science. 411:1372–1386.
.
2010. Transforming C++11 Code to C++03 to Support Legacy Compilation Environments. Proceedings of 16th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM'16). :177-186.
.
2016. Uncovering Dependence Clusters and Linchpin Functions. Proceedings of the 31th IEEE International Conference on Software Maintenance and Evolution (ICSME'15). :141-150.
.
2015.