Publications

Export 170 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Hamann L, Vidács L, Gogolla M, Kuhlmann M.  2012.  Abstract Runtime Monitoring with USE. Proceedings of the16th European Conference on Software Maintenance and Reengineering (CSMR'12). :549–552.
Kádár I, Hegedűs P, Ferenc R.  2015.  Adding Constraint Building Mechanisms to a Symbolic Execution Engine Developed for Detecting Runtime Errors. Proceedings of the 15th International Conference on Computational Science and Its Applications (ICCSA 2015). 9159:20–35.
Hegedűs P.  2015.  Advances in Software Product Quality Measurement and its Applications in Software Evolution.
Kókai G, Harmath L, Gyimóthy T.  1997.  Algorithmic Debugging and Testing of Prolog Programs.. LPE. :14-21.
Havasi F, Kiss Á.  2008.  Ambient Assisted Living in Rural Areas: Vision and Pilot Application. Constructing Ambient Intelligence – AmI 2007 Workshops, Darmstadt, Germany, November 7-10, 2007, Revised Papers. 11:246–252.
Gergely T, Balogh G, Horváth F, la Vancsics B, Beszédes Á, Gyimóthy T.  2018.  Analysis of Static and Dynamic Test-to-code Traceability Information. Acta Cybernetica. 23:903-919.
Ujhelyi Z, Horváth Á, Varró D, Csiszár NIstván, Szőke G, Vidács L, Ferenc R.  2014.  Anti-pattern Detection with Model Queries: A Comparison of Approaches. Proceedings of the 2014 Software Evolution Week (Merger of the 18th IEEE European Conference on Software Maintenance and Reengineering & 21st IEEE Working Conference on Reverse Engineering – CSMR-WCRE 2014). :293–302.
Horváth T, Alexin Z, Gyimóthy T, Wrobel S.  1999.  Application of Different Learning Methods to Hungarian Part-of-Speech Tagging. Proceedings of the 9th International Workshop on Inductive Logic Programming. :128–139.
Hócza A, Alexin Z, Csendes D, Csirik J, Gyimóthy T.  2003.  Application of ILP methods in different natural language processing phases for information extraction from Hungarian texts. Kalmár Workshop on Logic and Computer Science. :107-116.
London A, Pelyhe Á, Holló C, Németh T.  2015.  Applying graph-based data mining concepts to the educational sphere,. Proceedings of the 16th International Conference on Computer Systemsm and Technologies, Dublin, Ireland, ACM New York, NY, USA Š2015, June 25 - 26, 2015. :358–365.
Vidács L, Horváth F, Tengeri D, Beszédes Á.  2016.  Assessing the Test Suite of a Large System Based on Code Coverage, Efficiency and Uniqueness. Proceedings of the IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, the First International Workshop on Validating Software Tests (VST'16). :13-16.
Kádár I, Hegedűs P, Ferenc R, Gyimóthy T.  2016.  Assessment of the Code Refactoring Dataset Regarding the Maintainability of Methods. Proceedings of the 16th International Conference on Computational Science and Its Applications (ICCSA 2016). :610–624.
Alexin Z, Gyimóthy T, Horvath T, Fabricz K.  1990.  Attribute Grammar Specification for a natural-language understanding interface. Lecture Notes in Computer Science. 461:313-326.
Toczki J, Gyimóthy T, Kocsis F, Horváth T.  1988.  Automatic Software Generation in Practice: New Features in the HLP/PAS System. Specialized Languages as Tools for Programming Technology. :103–119.
B
Fülöp LJ, Hegedűs P, Ferenc R.  2008.  Befriend - a Benchmark for Evaluating Reverse Engineering Tools. Periodica Polytechnica - Electrical Engineering. 52:153-162.
Tengeri D, Beszédes Á, Gergely Tamás, Vidács L, Havas D, Gyimóthy T.  2015.  Beyond Code Coverage - an Approach for Test Suite Assessment and Improvement. Proceedings of the 8th IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW'15); 10th Testing: Academic and Industrial Conference - Practice and Research Techniques (TAIC PART'15). :1-7.
Gergely Tamás, Havasi F, Gyimóthy T.  2005.  Binary code compression based on decision trees. Proceedings of the Estonian Academy of Sciences Engineering. 11:269-285.
Blázsik Z, Holló C., Imreh B, Imreh C., Kovács Z.  2000.  On bottleneck and k-sum versions of the Process Network Synthesis problems. Novi Sad Journal of Mathematics. 30:11-19.
C
Ferenc R, Hegedűs P, Gyimesi P, Antal G, Bán D, Gyimothy T.  2019.  Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions. 7th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering. :8-14.
Hodován R, Kiss Á, Gyimóthy T.  2017.  Coarse Hierarchical Delta Debugging. Proceedings of the 33rd IEEE International Conference on Software Maintenance and Evolution (ICSME 2017). :194–203.
Harsu M, Bakota Tibor, Siket István, Koskimies K, Systa T.  2009.  Code Clones: Good, Bad, or Ugly? 11th Symposium on Programming Languages and Software Tools SPLST'09. :31-44.
Harsu M, Bakota Tibor, Siket István, Koskimies K, Systa T.  2012.  Code Clones: Good, Bad, or Ugly? Nordic Journal of Computing. 15:3–17.
Horváth F, Gergely Tamás, Beszédes Á, Tengeri D, Balogh G, Gyimothy T.  2019.  Code Coverage Differences of Java Bytecode and Source Code. Software Quality Journal. 27(1):79-123.
Horváth F, Gergely Tamás, Beszédes Á, Tengeri D, Balogh G, Gyimóthy T.  2017.  Code Coverage Differences of Java Bytecode and Source Code Instrumentation Tools. Software Quality Journal.
Horváth F, Bognár S, Gergely Tamás, Rácz R, Beszédes Á, Marinković V.  2014.  Code Coverage Measurement Framework for Android Devices. Acta Cybernetica. 21:439-458.