Export 50 results:Author Title [ Type] Year
Filters: First Letter Of Last Name is J [Clear All Filters]
A method for tracking of motion of objects associated with wireless communication devices within a predefined area.. 2017.
Comparison of static- and dynamic call graphs. Volume of Extended Abstracts of 5th Conference of PhD Students in Computer Science (CSCS 2006). :56.. 2006.
Using Dynamic Information in the Interprocedural Static Slicing of Binary Executables. Software Quality Journal. 13:227–245.. 2005.
A Test Environment for Investigation of Dynamic Load Balancing in Transputer Networks. Transputer and Occam Engineering Series. 36:284-295.. 1993.
Stunner: A Smart Phone Trace for Developing Decentralized Edge Systems. Lecture Notes in Computer Science. vol 11534(Pereira J., Ricci L. (eds) Distributed Applications and Interoperable Systems. DAIS 2019). 2019.
Static Execute After Algorithms as Alternatives for Impact Analysis. Periodica Polytechnica Elec. Eng.. 52:163-176.. 2008.
Smartphone-based data collection with stunner, the reality of peer-to-peer connectivity and web real-time communications using crowdsourcing: lessons learnt while cleaning the data. International Journal On Advances in Software. 11(1-2):120-130.. 2018.
Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.. 2011.
Impact Analysis in the Presence of Dependence Clusters Using Static Execute After in WebKit. Journal of Software: Evolution and Process. 26:569-588.. 2014.
General Flow-Sensitive Pointer Analysis and Call Graph Construction. Proceedings of the Estonian Academy of Sciences – Engineering. 11:286–295.. 2005.
Empirical Investigation of SEA-Based Dependence Cluster Properties. Science of Computer Programming. 105:3-25.. 2015.
Dynamic Process Interaction. Parallel Programming and Java, Concurrent Systems Engineering Series. 50:261-273.. 1997.
Designing and Implementing Control Flow Graph for Magic 4th Generation Language. Acta Cybernetica. 21:419–437.. 2014.
A Comparative Study of Several Feature Transformation and Learning Methods for Phoneme Classification. International Journal of Speech Technology. 3:263-276.. 2000.
Smartphone-based Data Collection with Stunner Using Crowdsourcing: Lessons Learnt while Cleaning the Data. IARIA Conference. Best paper award. Twelfth International Multi-Conference on Computing in the Global Information Technology (ICCGI 2017). :28-35.. 2017.
Defining and Understanding Smartphone Churn over the Internet: a Measurement Study. 14th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P. :1-5.. 2014.
Using GPU Acceleration in the GL2D Graphics Engine. Proceedings of the 18th IEEE International Symposium on Consumer Electronics (ISCE 2014). :42–43.. 2014.
Uncovering Dependence Clusters and Linchpin Functions. Proceedings of the 31th IEEE International Conference on Software Maintenance and Evolution (ICSME'15). :141-150.. 2015.
Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.. 2009.
Towards an Accurate Prediction of the Question Quality at Stack Overflow Using a Deep-Learning-Based NLP Approach. Proceedings of ICSOFT 2019, 14th International Conference on Software Technologies. :631-639.. 2019.
Structure of SZOTE-PACS. Magyar Radiológusok Társasága XIX. Kongresszusa.. 1998.
Static Slicing of Binary Executables. Volume of Extended Abstracts of the 3rd Conference of PhD Students in Computer Science (CSCS 2002). :60.. 2002.
Static Execute After/Before as a Replacement of Traditional Software Dependencies. Proceedings of the 2008 IEEE International Conference on Software Maintenance (ICSM'08). :137-146.. 2008.
Software Testing Conferences and Women. Proceedings of the 2018 ACM/IEEE 1st International Workshop on Gender Equality in Software Engineering (GE'18). :17-20.. 2018.