Publications

Export 262 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Kasza M, Bilicki V.  2007.  WMN for rural communities: a case study. Summer University on Information Technology in Agriculture and Rural Development. :83-94.
Bilicki V, Rak Z.  2010.  Wireless Mesh Networks from the Energy Consumption Aspect.
Bilicki V, Kállai T, Kasza M.  2007.  Wireless Mesh Network For Rural Communities. AVA 3 International Conference on Agricultural Ekonomics , Rural Development and Informatics. :237-247.
Bilicki V, Kasza M, Kállai T.  2007.  Wireless Mesh Network For Rural Communities. IST-Africa 2007 Conference & Exhibition.
Blázsik Z, Holló C., Imreh B, Imreh C., Kovács Z.  2000.  On a well solvable class of the PNS problem. Novi Sad Journal of Mathematics. 30:21-30.
V
Szegedi A, Gergely Tamás, Beszédes Á, Gyimóthy T, Tóth G.  2007.  Verifying the Concept of Union Slices on Java Programs. Proceedings of the 11th European Conference on Software Maintenance and Reengineering (CSMR'07). :233-242.
U
Balogh G, Gergely Tamás, Beszédes Á, Gyimóthy T.  2016.  Using the City Metaphor for Visualizing Test-Related Metrics. Proceedings of the IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, the First International Workshop on Validating Software Tests (VST'16). :17-20.
Balogh G, Gergely Tamás, Beszédes Á, Gyimóthy T.  2016.  Using the City Metaphor for Visualizing Test-Related Metrics. Proceedings of the IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, the First International Workshop on Validating Software Tests (VST'16). :17-20.
Beszédes Á, Gyimóthy T, Lóki G, Diós G, Kovács F.  2007.  Using Backward Dynamic Program Slicing to Isolate Influencing Statements in GDB. Proceedings of the 2007 GCC Developers' Summit. :21-30.
Beszédes Á, Faragó C., Szabó Z.M, Csirik J, Gyimóthy T.  2002.  Union Slices for Program Maintenance. Proceedings of the IEEE International Conference on Software Maintenance (ICSM 2002). :12-21.
Danicic S, Barraclough R, Harman M, Howroyd JD, Kiss Á, Laurence M.  2011.  A unifying theory of control dependence and its application to arbitrary program structures. Theoretical Computer Science. 412:6809–6842.
Binkley D, Beszédes Á, Islam S, Jász Judit, la Vancsics B.  2015.  Uncovering Dependence Clusters and Linchpin Functions. Proceedings of the 31th IEEE International Conference on Software Maintenance and Evolution (ICSME'15). :141-150.
Binkley D, Beszédes Á, Islam S, Jász Judit, la Vancsics B.  2015.  Uncovering Dependence Clusters and Linchpin Functions. Proceedings of the 31th IEEE International Conference on Software Maintenance and Evolution (ICSME'15). :141-150.
T
Antal G, Havas D, Siket István, Beszédes Á, Ferenc R, Mihalicza J.  2016.  Transforming C++11 Code to C++03 to Support Legacy Compilation Environments. Proceedings of 16th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM'16). :177-186.
Barraclough RW, Binkley D, Danicic S, Harman M, Hierons RM, Kiss Á, Laurence M, Ouarbya L.  2010.  A Trajectory-based Strict Semantics for Program Slicing. Theoretical Computer Science. 411:1372–1386.
Barraclough RW, Binkley D, Danicic S, Harman M, Hierons RM, Kiss Á, Laurence M, Ouarbya L.  2010.  A Trajectory-based Strict Semantics for Program Slicing. Theoretical Computer Science. 411:1372–1386.
Bakota Tibor.  2011.  Tracking the evolution of code clones. Proceedings of the 37th Springer LNCS International Conference on Current Trends in Theory and Practice of computer science. :86-98.
Bakota Tibor, Ferenc R, Gyimóthy T, Riva C, Xu J.  2006.  Towards Portable Metrics-based Models for Software Maintenance Problems. Proceedings of the 22nd International Conference on Software Maintenance (ICSM 2006). :483-486.
Jelasity M, Bilicki V.  2009.  Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.
Nagy C, Pántos J, Gergely Tamás, Beszédes Á.  2010.  Towards a Safe Method for Computing Dependencies in Database-Intensive Systems. Proceedings of the 14th European Conference on Software Maintenance and Reengineering (CSMR'10). :166-175.
Bilicki V.  2012.  Topológia felderítés hibrid hálózatokban.
Tengeri D, Beszédes Á, Havas D, Gyimóthy T.  2014.  Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation. Proceedings of the 14th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM'14). :47-52.
Ferenc R, Beszédes Á, Gyimóthy T.  2005.  Tools for Software Maintenance and Reengineering. :16-31.
Binkley D, Danicic S, Gyimóthy T, Harman M, Kiss Á, Korel B.  2006.  Theoretical Foundations of Dynamic Program Slicing. Theoretical Computer Science. 360:23–41.
Bilicki V.  2006.  Testing and Verifying an IPv6 Based Multicast Network. ICCGI '06: Proceedings of the International Multi-Conference on Computing in the Global Information Technology. :3.