Publications

Export 50 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
Miscellaneous
Horváth E, Jász Judit.  2006.  Comparison of static- and dynamic call graphs. Volume of Extended Abstracts of 5th Conference of PhD Students in Computer Science (CSCS 2006). :56.
Journal Article
Kiss Á, Jász Judit, Gyimóthy T.  2005.  Using Dynamic Information in the Interprocedural Static Slicing of Binary Executables. Software Quality Journal. 13:227–245.
Schrettner L, Jelly IE.  1993.  A Test Environment for Investigation of Dynamic Load Balancing in Transputer Networks. Transputer and Occam Engineering Series. 36:284-295.
Szabó Z, Téglás K, Berta Á, Jelasity M, Bilicki V.  2019.  Stunner: A Smart Phone Trace for Developing Decentralized Edge Systems. Lecture Notes in Computer Science. vol 11534(Pereira J., Ricci L. (eds) Distributed Applications and Interoperable Systems. DAIS 2019)
Jász Judit.  2008.  Static Execute After Algorithms as Alternatives for Impact Analysis. Periodica Polytechnica Elec. Eng.. 52:163-176.
Szabó Z, Bilicki V, Berta Á, Jánki ZRichárd.  2018.  Smartphone-based data collection with stunner, the reality of peer-to-peer connectivity and web real-time communications using crowdsourcing: lessons learnt while cleaning the data. International Journal On Advances in Software. 11(1-2):120-130.
Jelasity M, Bilicki V.  2011.  Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.
Schrettner L, Jász Judit, Gergely Tamás, Beszédes Á, Gyimóthy T.  2014.  Impact Analysis in the Presence of Dependence Clusters Using Static Execute After in WebKit. Journal of Software: Evolution and Process. 26:569-588.
Horváth E, Forgács I, Kiss Á, Jász Judit, Gyimóthy T.  2005.  General Flow-Sensitive Pointer Analysis and Call Graph Construction. Proceedings of the Estonian Academy of Sciences – Engineering. 11:286–295.
Beszédes Á, Schrettner L, la Csaba B, Gergely Tamás, Jász Judit, Gyimóthy T.  2015.  Empirical Investigation of SEA-Based Dependence Cluster Properties. Science of Computer Programming. 105:3-25.
Schrettner L, Jelly IE.  1997.  Dynamic Process Interaction. Parallel Programming and Java, Concurrent Systems Engineering Series. 50:261-273.
Dévai R, Jász Judit, Nagy C, Ferenc R.  2014.  Designing and Implementing Control Flow Graph for Magic 4th Generation Language. Acta Cybernetica. 21:419–437.
Kocsor A, Tóth L, Kuba A, Kovács K, Jelasity M, Gyimóthy T, Csirik J.  2000.  A Comparative Study of Several Feature Transformation and Learning Methods for Phoneme Classification. International Journal of Speech Technology. 3:263-276.
Conference Proceedings
Szabó Z, Bilicki V, Berta Á, Jánki ZRichárd.  2017.  Smartphone-based Data Collection with Stunner Using Crowdsourcing: Lessons Learnt while Cleaning the Data. IARIA Conference. Best paper award. Twelfth International Multi-Conference on Computing in the Global Information Technology (ICCGI 2017). :28-35.
Berta Á, Bilicki V, Jelasity M.  2014.  Defining and Understanding Smartphone Churn over the Internet: a Measurement Study. 14th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P. :1-5.
Conference Paper
Herczeg Z, Kosztyó K, Ledán S, Kiss Á, Obzhirov A, Placer SPena, Jacquemart P, Mudd G, Abbas W, Liang J et al..  2014.  Using GPU Acceleration in the GL2D Graphics Engine. Proceedings of the 18th IEEE International Symposium on Consumer Electronics (ISCE 2014). :42–43.
Binkley D, Beszédes Á, Islam S, Jász Judit, la Vancsics B.  2015.  Uncovering Dependence Clusters and Linchpin Functions. Proceedings of the 31th IEEE International Conference on Software Maintenance and Evolution (ICSME'15). :141-150.
Jelasity M, Bilicki V.  2009.  Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.
Tóth L, Nagy B, Janthó D, Vidács L, Gyimothy T.  2019.  Towards an Accurate Prediction of the Question Quality at Stack Overflow Using a Deep-Learning-Based NLP Approach. Proceedings of ICSOFT 2019, 14th International Conference on Software Technologies. :631-639.
Csernay L, Almási L, Soti Z., Jánosi J, Alexin Z, Nagy A, Nyúl L, Kuba A.  1998.  Structure of SZOTE-PACS. Magyar Radiológusok Társasága XIX. Kongresszusa.
Kiss Á, Jász Judit, Lehotai G.  2002.  Static Slicing of Binary Executables. Volume of Extended Abstracts of the 3rd Conference of PhD Students in Computer Science (CSCS 2002). :60.
Jász Judit, Beszédes Á, Gyimóthy T, Rajlich V.  2008.  Static Execute After/Before as a Replacement of Traditional Software Dependencies. Proceedings of the 2008 IEEE International Conference on Software Maintenance (ICSM'08). :137-146.
Jász J, Beszédes Á.  2018.  Software Testing Conferences and Women. Proceedings of the 2018 ACM/IEEE 1st International Workshop on Gender Equality in Software Engineering (GE'18). :17-20.