Publications

Export 655 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Ferenc R, Beszédes Á, Gyimóthy T.  2005.  Tools for Software Maintenance and Reengineering. :16-31.
Tengeri D, Beszédes Á, Havas D, Gyimóthy T.  2014.  Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation. Proceedings of the 14th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM'14). :47-52.
Bilicki V.  2012.  Topológia felderítés hibrid hálózatokban.
Alexin Z.  2008.  Töröltethetők egészségügyi adataink. Délmagyarország.
Fülöp LJ, Ferenc R, Gyimóthy T.  2008.  Towards a Benchmark for Evaluating Design Pattern Miner Tools. Proceedings of the 12th European Conference on Software Maintenance and Reengineering (CSMR 2008). :143-152.
Fülöp LJ, Hegedűs P, Ferenc R, Gyimóthy T.  2008.  Towards a Benchmark for Evaluating Reverse Engineering Tools. Tool Demonstrations of the 15th Working Conference on Reverse Engineering (WCRE 2008). :335-336.
Kecskemeti G, Kertész Attila, Marosi A.C..  2017.  Towards a methodology to form microservices from monolithic ones. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10104 LNCS:284-295.
Horváth T, Alexin Z, Gyimóthy T, Fábricz K.  1990.  Towards a Multilingual Natural Language Understanding Interface (Extended Abstract). CC. :217-218.
Nagy C, Pántos J, Gergely Tamás, Beszédes Á.  2010.  Towards a Safe Method for Computing Dependencies in Database-Intensive Systems. Proceedings of the 14th European Conference on Software Maintenance and Reengineering (CSMR'10). :166-175.
Ferenc R, Sim SE, Holt RC, Koschke R, Gyimóthy T.  2001.  Towards a Standard Schema for C/C++. Proceedings of the 8th Working Conference on Reverse Engineering (WCRE 2001). :49-58.
Tóth L, Nagy B, Janthó D, Vidács L, Gyimothy T.  2019.  Towards an Accurate Prediction of the Question Quality at Stack Overflow Using a Deep-Learning-Based NLP Approach. Proceedings of ICSOFT 2019, 14th International Conference on Software Technologies. :631-639.
Jelasity M, Bilicki V.  2009.  Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.
Tornyai R., Kertész Attila.  2014.  Towards autonomous data sharing across personal clouds. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8806:50-61.
Hegedűs P, Ladányi G, Siket István, Ferenc R.  2012.  Towards Building Method Level Maintainability Models Based on Expert Evaluations. Communications in Computer and Information Science. 340:146–154.
Pflanzner T., Kertész Attila.  2014.  Towards data interoperability of cloud infrastructures using cloud storage services. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8374 LNCS:85-94.
Kertész Attila, Pflanzner T..  2016.  Towards enabling scientific workflows for the future internet of things. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST. 169:399-408.
Bakota Tibor, Ferenc R, Gyimóthy T, Riva C, Xu J.  2006.  Towards Portable Metrics-based Models for Software Maintenance Problems. Proceedings of the 22nd International Conference on Software Maintenance (ICSM 2006). :483-486.
Bakota Tibor.  2011.  Tracking the evolution of code clones. Proceedings of the 37th Springer LNCS International Conference on Current Trends in Theory and Practice of computer science. :86-98.
Barraclough RW, Binkley D, Danicic S, Harman M, Hierons RM, Kiss Á, Laurence M, Ouarbya L.  2010.  A Trajectory-based Strict Semantics for Program Slicing. Theoretical Computer Science. 411:1372–1386.
Antal G, Havas D, Siket István, Beszédes Á, Ferenc R, Mihalicza J.  2016.  Transforming C++11 Code to C++03 to Support Legacy Compilation Environments. Proceedings of 16th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM'16). :177-186.
Hodován R, Kiss Á, Gyimóthy T.  2017.  Tree Preprocessing and Test Outcome Caching for Efficient Hierarchical Delta Debugging. Proceedings of the 12th IEEE/ACM International Workshop on Automation of Software Testing (AST 2017). :23–29.
U
Binkley D, Beszédes Á, Islam S, Jász Judit, la Vancsics B.  2015.  Uncovering Dependence Clusters and Linchpin Functions. Proceedings of the 31th IEEE International Conference on Software Maintenance and Evolution (ICSME'15). :141-150.
Danicic S, Barraclough R, Harman M, Howroyd JD, Kiss Á, Laurence M.  2011.  A unifying theory of control dependence and its application to arbitrary program structures. Theoretical Computer Science. 412:6809–6842.
Beszédes Á, Faragó C., Szabó Z.M, Csirik J, Gyimóthy T.  2002.  Union Slices for Program Maintenance. Proceedings of the IEEE International Conference on Software Maintenance (ICSM 2002). :12-21.
Beszédes Á, Gyimóthy T, Lóki G, Diós G, Kovács F.  2007.  Using Backward Dynamic Program Slicing to Isolate Influencing Statements in GDB. Proceedings of the 2007 GCC Developers' Summit. :21-30.